Author of the publication

Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol.

, , , , and . ESAS, volume 4357 of Lecture Notes in Computer Science, page 98-112. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Methods and opportunities for rejuvenation in aging distributed software systems., , and . ISSRE Workshops, page 1-6. IEEE Computer Society, (2008)Design and evaluation of a mass configuration protocol (MCONF) for tactical MANETs., , , , and . MILCOM, page 1361-1366. IEEE, (2015)The leading EDGE in high-speed data communications services: The InterSpan® Asynchronous Transfer Mode Service., , and . AT&T Tech. J., 74 (4): 38-49 (1995)Games applied to jam resistant DSA radios., , , and . MILCOM, page 1-6. IEEE, (2012)Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs., , and . WOSP, page 172-180. ACM, (2007)Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol., , , , and . ESAS, volume 4357 of Lecture Notes in Computer Science, page 98-112. Springer, (2006)Monitoring for security intrusion using performance signatures., , , , and . WOSP/SIPEW, page 93-104. ACM, (2010)Methods and opportunities for rejuvenation in aging distributed software systems., , and . J. Syst. Softw., 83 (9): 1568-1578 (2010)Comparative Performance of Interleaved and Non-Interleaved Pipelining in LAPD Terminal Adaptors., and . INFOCOM, page 694-701. IEEE Computer Society, (1990)Stochastic Process Models for Packet/Analytic-Based Network Simulations., , , and . PADS, page 72-79. IEEE Computer Society, (2008)