The SCEAS System
Navigation Menu

Search the dblp DataBase


George Cybenko: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. David Kotz, Robert S. Gray, Saurab Nog, Daniela Rus, Sumit Chawla, George Cybenko
    AGENT TCL: Targeting the Needs of Mobile Computers. [Citation Graph (1, 0)][DBLP]
    IEEE Internet Computing, 1997, v:1, n:4, pp:58-67 [Journal]
  2. George Cybenko, Vincent H. Berk, Ian D. Gregorio-De Souza, Chad Behre
    Practical Autonomic Computing. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:3-14 [Conf]
  3. George Cybenko
    Complexity Theory of Neural Networks and Classification Problems. [Citation Graph (0, 0)][DBLP]
    EURASIP Workshop, 1990, pp:26-44 [Conf]
  4. Christopher Roblee, Vincent Berk, George Cybenko
    Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. [Citation Graph (0, 0)][DBLP]
    ICAC, 2005, pp:123-133 [Conf]
  5. George Cybenko, David W. Krumme, K. N. Venkataraman
    Simultaneous Broadcasting in Multiprocessor Networks. [Citation Graph (0, 0)][DBLP]
    ICPP, 1986, pp:555-558 [Conf]
  6. David K. Bradley, George Cybenko, John L. Larson, F. Ahmad, J. Golab, M. Straka
    Supercomputer workload decomposition and analysis. [Citation Graph (0, 0)][DBLP]
    ICS, 1991, pp:458-467 [Conf]
  7. George Cybenko, Lyle D. Kipp, Lynn Pointer, David J. Kuck
    Supercomputer performance evaluation and the Perfect Benchmarks. [Citation Graph (0, 0)][DBLP]
    ICS, 1990, pp:254-266 [Conf]
  8. George Cybenko
    High Performance Wireless Computing. [Citation Graph (0, 0)][DBLP]
    ISHPC, 1997, pp:71- [Conf]
  9. Robert S. Gray, David Kotz, George Cybenko, Daniela Rus
    D'Agents: Security in a Multiple-Language, Mobile-Agent System. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:154-187 [Conf]
  10. George Cybenko, Tom Allen
    Recursive Binary Partitions-Abstract. [Citation Graph (0, 0)][DBLP]
    PPSC, 1987, pp:212- [Conf]
  11. Allan Tuchman, George Cybenko, David Jablonowski, Brian Bliss, Sanjay Sharma
    Vista: A System for Remote Data Visualization. [Citation Graph (0, 0)][DBLP]
    PPSC, 1991, pp:575-580 [Conf]
  12. Javed A. Aslam, Zack J. Butler, Florin Constantin, Valentino Crespi, George Cybenko, Daniela Rus
    Tracking a moving object with a binary sensor network. [Citation Graph (0, 0)][DBLP]
    SenSys, 2003, pp:150-161 [Conf]
  13. Allan Tuchman, David Jablonowski, George Cybenko
    Run-Time Visualization of Program Data. [Citation Graph (0, 0)][DBLP]
    IEEE Visualization, 1991, pp:255-261 [Conf]
  14. Guofei Jiang, George Cybenko
    Functional Validation in Grid Computing. [Citation Graph (0, 0)][DBLP]
    Autonomous Agents and Multi-Agent Systems, 2004, v:8, n:2, pp:119-130 [Journal]
  15. George Cybenko, Annarita Giani, Paul Thompson
    Cognitive Hacking. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 2004, v:60, n:, pp:36-75 [Journal]
  16. Brian E. Brewington, George Cybenko
    How dynamic is the Web? [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:33, n:1-6, pp:257-276 [Journal]
  17. Brian E. Brewington, George Cybenko
    Keeping Up with the Changing Web. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:5, pp:52-58 [Journal]
  18. George Cybenko, Annarita Giani, Paul Thompson
    Cognitive Hacking: A Battle for the Mind. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2002, v:35, n:8, pp:50-56 [Journal]
  19. George Cybenko
    Large-Scope Computing: The Industrial Challenges. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1996, v:28, n:4es, pp:21- [Journal]
  20. John Yen, Robert Popp, George Cybenko, Latanya Sweeney, Paul Rosenzweig
    Homeland Security. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2005, v:20, n:5, pp:76-86 [Journal]
  21. George Cybenko
    A Critical Need, An Ambitious Mission, A New Magazine. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:5-9 [Journal]
  22. George Cybenko
    From the Editor: Sapphire/Slammer Redux. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:6- [Journal]
  23. George Cybenko
    Boiling Frogs? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:5- [Journal]
  24. George Cybenko
    From the Editors: Privacy Is the Issue. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:5-7 [Journal]
  25. George Cybenko
    From the Editors: Don't Bring a Knife to a Gunfight. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:5- [Journal]
  26. George Cybenko
    Security Alchemy. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:6, pp:5- [Journal]
  27. George Cybenko
    The One-Eyed Man Is King. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:4-5 [Journal]
  28. George Cybenko
    Why Johnny Can't Evaluate Security Risk. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:5- [Journal]
  29. Guofei Jiang, George Cybenko, James A. Hendler
    Semantic Interoperability and Information Fluidity. [Citation Graph (0, 0)][DBLP]
    Int. J. Cooperative Inf. Syst., 2006, v:15, n:1, pp:1-22 [Journal]
  30. George Cybenko, David W. Krumme, K. N. Venkataraman
    Fixed Hypercube Embedding. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1987, v:25, n:1, pp:35-39 [Journal]
  31. George Cybenko
    Dynamic Load Balancing for Distributed Memory Multiprocessors. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1989, v:7, n:2, pp:279-301 [Journal]
  32. David Kotz, George Cybenko, Robert S. Gray, Guofei Jiang, Ronald A. Peterson, Martin O. Hofmann, Daria A. Chacón, Kenneth R. Whitebread, James A. Hendler
    Performance Analysis of Mobile Agents for Filtering Data Streams on Wireless Networks. [Citation Graph (0, 0)][DBLP]
    MONET, 2002, v:7, n:2, pp:163-174 [Journal]
  33. M. Berry, George Cybenko, John L. Larson
    Scientific benchmark characterizations. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1991, v:17, n:10-11, pp:1173-1194 [Journal]
  34. David W. Krumme, George Cybenko, K. N. Venkataraman
    Gossiping in Minimal Time. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1992, v:21, n:1, pp:111-139 [Journal]
  35. Robert S. Gray, George Cybenko, David Kotz, Ronald A. Peterson, Daniela Rus
    D'Agents: Applications and performance of a mobile-agent system. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2002, v:32, n:6, pp:543-573 [Journal]
  36. Diego Hernando, Valentino Crespi, George Cybenko
    Efficient computation of the hidden Markov model entropy for a given observation sequence. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:7, pp:2681-2685 [Journal]

  37. Performance analysis of mobile agents for filtering data streams on wireless networks. [Citation Graph (, )][DBLP]

  38. A Language of Life: Characterizing People Using Cell Phone Tracks. [Citation Graph (, )][DBLP]

  39. Process Query Systems. [Citation Graph (, )][DBLP]

  40. Cybersecurity Strategies: The QuERIES Methodology. [Citation Graph (, )][DBLP]

  41. Learning Hidden Markov Models using Non-Negative Matrix Factorization [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002