Dynamic Tuning Retransmission Limit of IEEE 802.11 MAC Protocol for Networked...
Authors: Jia Bai, Emeka P. Eyisi, Yuan Xue, and Xenofon D. Koutsoukos Appeared In: Green Computing and Communications (GreenCom), 2010 IEEE/ACM Int'l Conference on & Int'l Conference on Cyber,...
View ArticleDeclarative Access Policies Based on Objects, Relationships, and States
Chen, Simin. 2012. Declarative Access Policies Based on Objects, Relationships, and States. Proceedings of the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity....
View ArticlePrivacy-preserving channel access using blindfolded packet transmissions
Banerjee, D., Bo Dong, Biswas, S., Taghizadeh, M.. 2014. Privacy-preserving channel access using blindfolded packet transmissions. Communication Systems and Networks (COMSNETS), 2014 Sixth...
View ArticleDelegated Authenticated Authorization for Constrained Environments
Gerdes, S., Bergmann, O., Bormann, C.. 2014. Delegated Authenticated Authorization for Constrained Environments. Network Protocols (ICNP), 2014 IEEE 22nd International Conference on. :654-659.
View ArticleSmart diagnose procedure for data acquisition systems inside dams
Bande, V., Pop, S., Pitica, D.. 2014. Smart diagnose procedure for data acquisition systems inside dams. Design and Technology in Electronic Packaging (SIITME), 2014 IEEE 20th International Symposium...
View ArticleKey Management for Static Wireless Sensor Networks With Node Adding
Gandino, F., Montrucchio, B., Rebaudengo, M.. 2014. Key Management for Static Wireless Sensor Networks With Node Adding. Industrial Informatics, IEEE Transactions on. 10:1133-1143.
View ArticleModeling Network Medium Access Protocols for Network Quality of Service Analysis
Emfinger, W., Karsai, G.. 2015. Modeling Network Medium Access Protocols for Network Quality of Service Analysis. Real-Time Distributed Computing (ISORC), 2015 IEEE 18th International Symposium on....
View ArticleVerification across Intellectual Property Boundaries
Abstract: Sagar Chaki License: Creative Commons Attribution-NonCommercial 3.0 read more
View ArticleDynamic Tuning Retransmission Limit of IEEE 802.11 MAC Protocol for Networked...
Authors: Jia Bai, Emeka P. Eyisi, Yuan Xue, and Xenofon D. Koutsoukos Appeared In: Green Computing and Communications (GreenCom), 2010 IEEE/ACM Int'l Conference on & Int'l Conference on Cyber,...
View ArticleDeclarative Access Policies Based on Objects, Relationships, and States
Chen, Simin. 2012. Declarative Access Policies Based on Objects, Relationships, and States. Proceedings of the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity....
View ArticleDeclarative Access Policies based on Objects, Relationships, and States
Simin Chen. 2012. Declarative Access Policies based on Objects, Relationships, and States. SPLASH '12 Proceedings of the 3rd annual conference on Systems, programming, and applications: software for...
View ArticlePrivacy-preserving channel access using blindfolded packet transmissions
Banerjee, D., Bo Dong, Biswas, S., Taghizadeh, M.. 2014. Privacy-preserving channel access using blindfolded packet transmissions. Communication Systems and Networks (COMSNETS), 2014 Sixth...
View ArticleDelegated Authenticated Authorization for Constrained Environments
Gerdes, S., Bergmann, O., Bormann, C.. 2014. Delegated Authenticated Authorization for Constrained Environments. Network Protocols (ICNP), 2014 IEEE 22nd International Conference on. :654-659.
View ArticleSmart diagnose procedure for data acquisition systems inside dams
Bande, V., Pop, S., Pitica, D.. 2014. Smart diagnose procedure for data acquisition systems inside dams. Design and Technology in Electronic Packaging (SIITME), 2014 IEEE 20th International Symposium...
View ArticleKey Management for Static Wireless Sensor Networks With Node Adding
Gandino, F., Montrucchio, B., Rebaudengo, M.. 2014. Key Management for Static Wireless Sensor Networks With Node Adding. Industrial Informatics, IEEE Transactions on. 10:1133-1143.
View ArticleModeling Network Medium Access Protocols for Network Quality of Service Analysis
Emfinger, W., Karsai, G.. 2015. Modeling Network Medium Access Protocols for Network Quality of Service Analysis. Real-Time Distributed Computing (ISORC), 2015 IEEE 18th International Symposium on....
View ArticleVerification across Intellectual Property Boundaries
Abstract: Sagar Chaki License: Creative Commons Attribution-NonCommercial 3.0 read more
View Article"Caesar: high-speed and memory-efficient forwarding engine for future...
M. Moradi, F. Qian, Q. Xu, Z. M. Mao, D. Bethea, M. K. Reiter. 2015. "Caesar: high-speed and memory-efficient forwarding engine for future internet architecture". 2015 ACM/IEEE Symposium on...
View ArticleCryptanalysis and improvement of two RFID-OT protocols based on quadratic...
Jin, Y., Zhu, H., Shi, Z., Lu, X., Sun, L.. 2015. Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues. 2015 IEEE International Conference on Communications (ICC)....
View Article