The SCEAS System
Navigation Menu

Search the dblp DataBase


Christian F. Tschudin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christian F. Tschudin
    A Self-Deploying Election Service for Active Networks. [Citation Graph (0, 0)][DBLP]
    COORDINATION, 1999, pp:183-195 [Conf]
  2. Christian F. Tschudin, Lidia Yamamoto
    Self-Healing Protocol Implementations. [Citation Graph (0, 0)][DBLP]
    Service Management and Self-Organization in IP-based Networks, 2005, pp:- [Conf]
  3. Christian F. Tschudin
    Apoptosis - the Programmed Death of Distributed Services. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:253-260 [Conf]
  4. Christian F. Tschudin, Henrik Lundgren, Erik Nordström
    Embedding MANETs in the Real World. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:578-589 [Conf]
  5. Tomas Sander, Christian F. Tschudin
    On Software Protection via Function Hiding. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:111-123 [Conf]
  6. Christian F. Tschudin
    An Active Networks Overlay Network (ANON). [Citation Graph (0, 0)][DBLP]
    IWAN, 1999, pp:156-164 [Conf]
  7. Christian F. Tschudin
    Protokollimplementierung mit Kommunikationsboten. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1995, pp:475-489 [Conf]
  8. Albert Banchs, Wolfgang Effelsberg, Christian F. Tschudin, Volker Turau
    Multicasting Multimedia Streams with Active Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 1998, pp:150-0 [Conf]
  9. Christian F. Tschudin
    Open Resource Allocation for Mobile Code. [Citation Graph (0, 0)][DBLP]
    Mobile Agents, 1997, pp:186-197 [Conf]
  10. Tomas Sander, Christian F. Tschudin
    Protecting Mobile Agents Against Malicious Hosts. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:44-60 [Conf]
  11. Christian F. Tschudin
    Instruction-Based Communications. [Citation Graph (0, 0)][DBLP]
    Mobile Object Systems, 1996, pp:67-90 [Conf]
  12. Christian F. Tschudin
    The Messenger Environment MØ - A Condensed Description. [Citation Graph (0, 0)][DBLP]
    Mobile Object Systems, 1996, pp:149-156 [Conf]
  13. Evgeny Osipov, Christian F. Tschudin
    Evaluating the Effect of Ad Hoc Routing on TCP Performance in IEEE 802.11 Based MANETs. [Citation Graph (0, 0)][DBLP]
    NEW2AN, 2006, pp:298-312 [Conf]
  14. Christian F. Tschudin
    Flexible Protocol Stacks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1991, pp:197-205 [Conf]
  15. Christian F. Tschudin, Lidia Yamamoto
    A Metabolic Approach to Protocol Resilience. [Citation Graph (0, 0)][DBLP]
    WAC, 2004, pp:191-206 [Conf]
  16. Lidia Yamamoto, Christian F. Tschudin
    Experiments on the Automatic Evolution of Protocols Using Genetic Programming. [Citation Graph (0, 0)][DBLP]
    WAC, 2005, pp:13-28 [Conf]
  17. Henrik Lundgren, Erik Nordström, Christian F. Tschudin
    Coping with communication gray zones in IEEE 802.11b based ad hoc networks. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2002, pp:49-55 [Conf]
  18. Christian F. Tschudin, Per Gunningberg, Henrik Lundgren, Erik Nordström
    Lessons from experimental MANET research. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2005, v:3, n:2, pp:221-233 [Journal]
  19. Christian F. Tschudin, Richard Gold
    Network pointers. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:23-28 [Journal]
  20. Henrik Lundgren, Erik Nordström, Christian F. Tschudin
    The gray zone problem in IEEE 802.11b based ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:104-105 [Journal]
  21. Erik Nordström, Per Gunningberg, Christian F. Tschudin
    Comparison of forwarding strategies in internet connected MANETs. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2004, v:8, n:4, pp:72-76 [Journal]
  22. Giovanna Di Marzo Serugendo, Murhimanya Muhugusa, Christian F. Tschudin
    A Survey of Theories for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    World Wide Web, 1998, v:1, n:3, pp:139-153 [Journal]
  23. Christian F. Tschudin, Lidia Yamamoto
    Harnessing Self-modifying Code for Resilient Software. [Citation Graph (0, 0)][DBLP]
    WRAC, 2005, pp:197-204 [Conf]

  24. A System Architecture for Evolving Protocol Stacks (Invited Paper). [Citation Graph (, )][DBLP]

  25. Demo abstract: Operating a sensor network at 3500 m above sea level. [Citation Graph (, )][DBLP]

  26. PermaDAQ: A scientific instrument for precision sensing and data recovery in environmental extremes. [Citation Graph (, )][DBLP]

  27. Using meta-code for building task-specific WSNs. [Citation Graph (, )][DBLP]

  28. Virtual network stacks. [Citation Graph (, )][DBLP]

  29. Towards Mobile Cryptography. [Citation Graph (, )][DBLP]

  30. Basic Abstractions for an Autonomic Network Architecture. [Citation Graph (, )][DBLP]

  31. PermaSense: investigating permafrost with a WSN in the Swiss Alps. [Citation Graph (, )][DBLP]

  32. Dynamic names and private address maps: complete self-configuration for MANETs. [Citation Graph (, )][DBLP]

  33. An Artificial Chemistry for Networking. [Citation Graph (, )][DBLP]

  34. Robust and flexible Internet connectivity for mobile ad hoc networks. [Citation Graph (, )][DBLP]

  35. Serial experiments online. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002