Displaying works 1 - 20 of 137 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2008 conference paper
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections Following Project EVEREST
Proceedings of the USENIX/ACCURATE Electronic Voting Technology (EVT) Workshop.
2008 conference paper
Realizing massive-scale conditional access systems through attribute-based cryptosystems
In Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS).
2008 journal article
Privacy Preserving Web-based Email
Algorithms, Architectures and Information Systems Security, 3, 349.
2008 conference paper
Pinup: Pinning user files to known applications
2008 Annual Computer Security Applications Conference (ACSAC), 55–64.
Event: IEEE
2008 journal article
Mitigating Android software misuse before it happens
Pennsylvania State University, Tech. Rep. NAS-TR-0094-2008.
2008 journal article
Exploiting open functionality in SMS-capable cellular networks
Journal of Computer Security, 16(6), 713–742.
2008 conference paper
Defending against attacks on main memory persistence
2008 Annual Computer Security Applications Conference (ACSAC), 65–74.
Event: IEEE
2008 report
A measurement framework of alert characteristics for false positive mitigation models
North Carolina State University. Dept. of Computer Science.
2008 conference paper
On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques
Proceedings of the Second ACM-IEEE international symposium on Empirical software engineering and measurement, 41–50.
Event: ACM
2008 book
2008 chapter
Hierarchical Traffic Grooming
In R. Dutta, A. E. Kamal, & G. N. Rouskas (Eds.), Optical Networks (pp. 73–88).
Ed(s): R. Dutta, A. Kamal & G. Rouskas*
2008 chapter book
Introduction
2008 chapter book
Grooming Mechanisms in SONET/SDH and Next-Generation SONET/SDH
2008 conference paper
State extensions for java pathfinder
30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008, 863–866.
2008 journal article
Delta Execution for Efficient State-Space Exploration of Object-Oriented Programs
IEEE Trans. Software Eng., 34(5), 597–613.
2008 conference paper
30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008
ACM.
Ed(s): W. Sch\"a
2008 chapter
On optimal sizing of tiered network services
In 27th Ieee Conference on Computer Communications (Infocom), Vols 1-5 (pp. 1–5).
Contributors: Ieee, Q. Lv & G. Rouskas
2008 journal article
Efficient resource management using advance reservations for heterogeneous Grids
2008 Ieee International Symposium on Parallel & Distributed Processing, Vols 1-8, 916–927.
Contributors: C. Castillo, K. Harfoush, Ieee & G. Rouskas
2008 journal article
Edge Reconfigurable Optical Network (ERON): Enabling Dynamic Sharing of Static Lightpaths
2008 5th International Conference on Broadband Communications, Networks and Systems (Broadnets 2008), 332–334.
Contributors: L. Battestilli n, Ieee, G. Karmous-Edwards, D. Reeves n, G. Rouskas n , P. Vegesna n, A. Vishwanath n
2008 journal article
A New Internet Architecture to Enable Software Defined Optics and Evolving Optical Switching Models
2008 5th International Conference on Broadband Communications, Networks and Systems (Broadnets 2008), 71–76.
Contributors: I. Baldine, R. Dutta n, Ieee & G. Rouskas
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.