The SCEAS System
Navigation Menu

Search the dblp DataBase


Joseph G. Tront: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Timothy Buennemeyer, Randolph Marchany, Joseph G. Tront
    Ubiquitous Security: Privacy versus Protection. [Citation Graph (0, 0)][DBLP]
    PSC, 2006, pp:71-77 [Conf]
  2. Kwanghyun Kim, Joseph G. Tront, Dong Sam Ha
    Automatic Insertion of BIST Hardware Using VHDL. [Citation Graph (0, 0)][DBLP]
    DAC, 1988, pp:9-15 [Conf]
  3. Anil Bazaz, James D. Arthur, Joseph G. Tront
    Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:95-102 [Conf]
  4. Thomas H. Drayer, Joseph G. Tront, William E. King IV, Richard W. Conners
    MORRPH: a modular and reprogrammable real-time processing hardware. [Citation Graph (0, 0)][DBLP]
    FCCM, 1995, pp:11-19 [Conf]
  5. Thomas H. Drayer, Joseph G. Tront, Richard W. Conners, Philip A. Araman
    A Development System for Creating Real-time Machine Vision Hardware using Field Programmable Gate Arrays. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  6. Randy C. Marchany, Joseph G. Tront
    Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2002, pp:192- [Conf]
  7. Randy C. Marchany, Joseph G. Tront
    E-commerce Security Issues. [Citation Graph (0, 0)][DBLP]
    HICSS, 2002, pp:193- [Conf]
  8. Joseph G. Tront, Randy C. Marchany
    CANDI: A System for Classifying the Security Risks in Network Appliances. [Citation Graph (0, 0)][DBLP]
    HICSS, 2003, pp:204- [Conf]
  9. Joseph G. Tront, Randy C. Marchany
    Internet Security: Intrusion Detection and Prevention: Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  10. Joseph G. Tront, Randy C. Marchany
    Internet Security: Intrusion Detection and Prevention in Mobile Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:162- [Conf]
  11. Timothy Buennemeyer, Faiz Munshi, Randy C. Marchany, Joseph G. Tront
    Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack Detection. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:163- [Conf]
  12. Xia Teng, Brandon Muramatsu, Jianwei Zhang, Joseph G. Tront, Flora P. McMartin, Alice M. Agogino
    Implementation Issues on the Quality Evaluation ofWeb-Based Courses and Digital Learning Resources. [Citation Graph (0, 0)][DBLP]
    ICWL, 2004, pp:379-385 [Conf]
  13. Visvanathan Subramanian, Joseph G. Tront, Charles W. Bostian, Scott F. Midkiff
    Design and Implementation of a Configurable Platform for Embedded Communication Systems. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2003, pp:189- [Conf]
  14. Joseph G. Tront
    Synchronized Streaming Media in VLSI Education. [Citation Graph (0, 0)][DBLP]
    MSE, 2001, pp:75-76 [Conf]
  15. Jeanette Tyler McCall, Joseph G. Tront, F. Gail Gray, Robert M. Haralick, William M. McCormack
    Parallel Computer Architectures and Problem Solving Strategies for the Consistent Labeling Problem. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1985, v:34, n:11, pp:973-980 [Journal]
  16. Joseph G. Tront, Donald D. Givone
    A Design for Multiple-Valued Logic Gates Based on MESFET's. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1979, v:28, n:11, pp:854-862 [Journal]
  17. Kwanghyun Kim, Dong Sam Ha, Joseph G. Tront
    On using signature registers as pseudorandom pattern generators in built-in self-testing. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1988, v:7, n:8, pp:919-928 [Journal]
  18. Joseph G. Tront, Vinod Eligeti, Jane C. Prey
    WriteOn: a tool for classroom presentations on tablet PCs. [Citation Graph (0, 0)][DBLP]
    ITiCSE, 2006, pp:352- [Conf]
  19. C. A. Ryan, Joseph G. Tront
    FX: a fast approximate fault simulator for the switch-level using VHDL. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. VLSI Syst., 1996, v:4, n:3, pp:336-345 [Journal]

  20. VHDL switch level fault simulation. [Citation Graph (, )][DBLP]

  21. Mobile Device Profiling and Intrusion Detection Using Smart Batteries. [Citation Graph (, )][DBLP]

  22. Simulating the Deployment of Battery-Sensing Intrusion Protection Systems. [Citation Graph (, )][DBLP]

  23. Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices. [Citation Graph (, )][DBLP]

  24. WriteOn1.0: a tablet PC-based tool for effective classroom instruction. [Citation Graph (, )][DBLP]

  25. Facilitating Pedagogical Practices through a Large-Scale Tablet PC Deployment. [Citation Graph (, )][DBLP]

Search in 0.041secs, Finished in 0.042secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002