The SCEAS System
Navigation Menu

Search the dblp DataBase


Michael E. Kounavis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew T. Campbell, Michael E. Kounavis, John B. Vicente
    Programmable Networks. [Citation Graph (0, 0)][DBLP]
    Informatics, 2001, pp:34-49 [Conf]
  2. Abhijeet Joglekar, Michael E. Kounavis, Frank L. Berry
    A Scalable and High Performance Software iSCSI Implementation. [Citation Graph (0, 0)][DBLP]
    FAST, 2005, pp:- [Conf]
  3. Michael E. Kounavis, Frank L. Berry
    A Systematic Approach to Building High Performance Software-Based CRC Generators. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:855-862 [Conf]
  4. John B. Vicente, Michael E. Kounavis, Daniel A. Villela, Michah Lerner, Andrew T. Campbell
    Programming Internet Quality of Service. [Citation Graph (0, 0)][DBLP]
    USM, 2000, pp:106-123 [Conf]
  5. Andrew T. Campbell, Michael E. Kounavis, Raymond R.-F. Liao
    Programmable mobile networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:7, pp:741-765 [Journal]
  6. Michael E. Kounavis, Andrew T. Campbell, Gen Ito, Giuseppe Bianchi
    Design, Implementation and Evaluation of Programmable Handoff in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    MONET, 2001, v:6, n:5, pp:443-461 [Journal]
  7. Michael E. Kounavis, Andrew T. Campbell, Stephen T. Chou, John B. Vicente
    Programming the data path in network processor-based routers. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2005, v:35, n:11, pp:1041-1078 [Journal]
  8. Michael E. Kounavis, Alok Kumar, Raj Yavatkar
    Sorting Packets by Packet Schedulers Using a Connected Trie Data Structure. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:436-444 [Conf]

  9. Fast multiplication techniques for public key cryptography. [Citation Graph (, )][DBLP]

  10. Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication. [Citation Graph (, )][DBLP]

  11. A Technique for Accelerating Characteristic 2 Elliptic Curve Cryptography. [Citation Graph (, )][DBLP]

  12. An Event-Driven, Inclusionary and Secure Approach to Kernel Integrity. [Citation Graph (, )][DBLP]

  13. Encrypting the internet. [Citation Graph (, )][DBLP]

  14. A survey of programmable networks. [Citation Graph (, )][DBLP]

  15. Two stage packet classification using most specific filter matching and transport level sharing. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002