The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Richard R. Brooks: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sri Hari Krishna Narayanan, Mahmut T. Kandemir, R. R. Brooks, Ibrahim Kolcu
    Secure Execution of Computations in Untrusted Hosts. [Citation Graph (0, 0)][DBLP]
    Ada-Europe, 2006, pp:106-118 [Conf]
  2. Feihui Li, Guilin Chen, Mahmut T. Kandemir, R. R. Brooks
    A Compiler-Based Approach to Data Security. [Citation Graph (0, 0)][DBLP]
    CC, 2005, pp:188-203 [Conf]
  3. Richard R. Brooks, Eric Grele, Wojtek Klimkiewicz, Jamila Moore, Christopher Griffin, Brian Kovak, John Koch
    Reactive Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DARS, 2000, pp:471-472 [Conf]
  4. Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin, R. R. Brooks, Soontae Kim, Wei Zhang 0002
    Masking the Energy Behavior of DES Encryption. [Citation Graph (0, 0)][DBLP]
    DATE, 2003, pp:10084-10089 [Conf]
  5. M. Pirretti, Greg M. Link, R. R. Brooks, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin
    Fault Tolerant Algorithms for Network-On-Chip Interconnect. [Citation Graph (0, 0)][DBLP]
    ISVLSI, 2004, pp:46-51 [Conf]
  6. Hendra Saputra, Ozcan Ozturk, Narayanan Vijaykrishnan, Mahmut T. Kandemir, R. R. Brooks
    A Data-Driven Approach for Embedded Security. [Citation Graph (0, 0)][DBLP]
    ISVLSI, 2005, pp:104-109 [Conf]
  7. Hendra Saputra, Guangyu Chen, R. R. Brooks, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin
    Code protection for resource-constrained embedded devices. [Citation Graph (0, 0)][DBLP]
    LCTES, 2004, pp:240-248 [Conf]
  8. Richard R. Brooks, S. Sitharama Iyengar, Jianhua Chen
    Automatic Correlation and Calibration of Noisy Sensor Readings Using Elite Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 1996, v:84, n:1-2, pp:339-354 [Journal]
  9. Glenn Carl, Richard R. Brooks, Suresh Rai
    Wavelet based Denial-of-Service detection. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:8, pp:600-615 [Journal]
  10. Richard R. Brooks, S. Sitharama Iyengar
    Robust Distributed Comupting and Sensing Algorithm. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1996, v:29, n:6, pp:53-60 [Journal]
  11. Richard R. Brooks, Thomas E. Keiser
    Mobile Code Daemons for Networks of Embedded Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2004, v:8, n:4, pp:72-79 [Journal]
  12. Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai
    Denial-of-Service Attack-Detection Techniques. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2006, v:10, n:1, pp:82-89 [Journal]
  13. Richard R. Brooks, David Friedlander, John Koch, Shashi Phoha
    Tracking multiple targets with self-organizing distributed ground sensors. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2004, v:64, n:7, pp:874-884 [Journal]
  14. Richard R. Brooks, Mengxia Zhu, Jacob Lamb, S. Sitharama Iyengar
    Aspect-oriented design of sensor networks. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2004, v:64, n:7, pp:853-865 [Journal]
  15. S. Sitharama Iyengar, Richard R. Brooks
    Special issue introduction--the road map for distributed sensor networks in the context of computing and communication. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2004, v:64, n:7, pp:785-787 [Journal]
  16. Ying Chen, Richard R. Brooks, S. Sitharama Iyengar, Nageswara S. V. Rao, Jacob Barhen
    Efficient Global Optimization for Image Registration. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2002, v:14, n:1, pp:79-92 [Journal]
  17. Richard R. Brooks, Nathan Orr
    A Model for Mobile Code Using Interacting Automata. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2002, v:1, n:4, pp:313-326 [Journal]
  18. Christopher Griffin, Richard R. Brooks
    A note on the spread of worms in scale-free networks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2006, v:36, n:1, pp:198-202 [Journal]
  19. S. H. K. Narayanan, Mahmut T. Kandemir, R. Brooks
    Performance aware secure code partitioning. [Citation Graph (0, 0)][DBLP]
    DATE, 2007, pp:1122-1127 [Conf]

Search in 0.027secs, Finished in 0.028secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002