The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

James Irvine: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chong Shen, Dirk Pesch, James Irvine
    A Framework for Self-Management of Hybrid Wireless Networks Using Autonomic Computing Principles. [Citation Graph (0, 0)][DBLP]
    CNSR, 2005, pp:261-266 [Conf]
  2. Edward Brown, James Irvine, Bill Wilkie
    Rapid prototyping of a test harness for forward error correcting codes (abstract only). [Citation Graph (0, 0)][DBLP]
    FPGA, 2005, pp:276- [Conf]
  3. Daniel Denning, Malachy Devlin, James Irvine
    Hardware co-simulation in system generator of the AES-128 encryption algorithm. [Citation Graph (0, 0)][DBLP]
    FPGA, 2004, pp:247- [Conf]
  4. Michael Gilroy, James Irvine, William Berrie
    FPGA based RAID 6 hardware accelerator. [Citation Graph (0, 0)][DBLP]
    FPGA, 2006, pp:232- [Conf]
  5. Ian Robertson, James Irvine, Patrick Lysaght, David Robinson
    Timing verification of dynamically reconfigurable logic for the xilinx virtex FPGA series. [Citation Graph (0, 0)][DBLP]
    FPGA, 2002, pp:127-135 [Conf]
  6. Oliver Sims, James Irvine
    A real-time implementation of Richardson-Lucy deconvolution. [Citation Graph (0, 0)][DBLP]
    FPGA, 2006, pp:232- [Conf]
  7. Daniel Denning, Neil Harold, Malachy Devlin, James Irvine
    Using System Generator to Design a Reconfigurable Video Encryption System. [Citation Graph (0, 0)][DBLP]
    FPL, 2003, pp:980-983 [Conf]
  8. Daniel Denning, James Irvine, Malachy Devlin
    A Key Agile 17.4 Gbit/sec Camellia Implementation. [Citation Graph (0, 0)][DBLP]
    FPL, 2004, pp:546-554 [Conf]
  9. Ian Robertson, James Irvine, Patrick Lysaght, David Robinson
    Improved Functional Simulation of Dynamically Reconfigurable Logic. [Citation Graph (0, 0)][DBLP]
    FPL, 2002, pp:152-161 [Conf]
  10. Daniel Denning, James Irvine, Derek Stark, Malachy Devlin
    Multi-User FPGA Co-Simulation over TCP/IP. [Citation Graph (0, 0)][DBLP]
    IEEE International Workshop on Rapid System Prototyping, 2004, pp:151-156 [Conf]
  11. John Dunlop, Gwenaël Le Bodic, James Irvine, Demessie Girma
    QoS management with dynamic bearer selection schemes. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:37, n:1, pp:45-53 [Journal]
  12. Ian Robertson, James Irvine
    A design flow for partially reconfigurable hardware. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Embedded Comput. Syst., 2004, v:3, n:2, pp:257-283 [Journal]
  13. Irene C. Y. Ma, James Irvine
    Characteristics of WAP Traffic. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2004, v:10, n:1, pp:71-81 [Journal]
  14. Oliver Sims, James Irvine
    An FPGA Implementation of Pattern-Selective Pyramidal Image Fusion. [Citation Graph (0, 0)][DBLP]
    FPL, 2006, pp:1-4 [Conf]
  15. Michael Gilroy, James Irvine
    RAID 6 Hardware Acceleration. [Citation Graph (0, 0)][DBLP]
    FPL, 2006, pp:1-6 [Conf]
  16. R. Mathur, James Irvine, John Dunlop, Yeonwoo Lee, Steve McLaughlin
    Cost/commitment tradeoffs in UMTS networks using the digital marketplace. [Citation Graph (0, 0)][DBLP]
    MWCN, 2002, pp:251-255 [Conf]

  17. Key Management in Web of Trust for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  18. Exploiting Redundancies to Improve Performance of LT Decoding. [Citation Graph (, )][DBLP]


  19. A Threshold Key Management Scheme for Mobile Ad Hoc Networks Using Elliptic Curve Dlog-Based Cryptosystem. [Citation Graph (, )][DBLP]


  20. Ubiquitous Entity Interactions and Dispatcher Architecture. [Citation Graph (, )][DBLP]


  21. Authentication and Authorisation for a Personal Distributed Environment. [Citation Graph (, )][DBLP]


  22. Anonymous Network Access Using the Digital Marketplace. [Citation Graph (, )][DBLP]


  23. Commitment-Aware Reputation System for the Digital Marketplace. [Citation Graph (, )][DBLP]


  24. On Demand Self-Organized Public Key Management for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  25. A Digital Marketplace for Tussle in Next Generation Wireless Networks. [Citation Graph (, )][DBLP]


  26. A Trust Based Threshold Cryptography Key Management for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  27. Relationship Mapping for Proactive Growth of Knowledge Networks. [Citation Graph (, )][DBLP]


  28. An Elliptic Curve Distributed Key Management for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  29. Analysis of Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.332secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002