The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Golden G. Richard III: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bin Fu, Golden Richard III, Yixin Chen
    Some new approaches for preventing software tampering. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:655-660 [Conf]
  2. Frank Adelstein, Yun Gao, Golden G. Richard III
    Automatically Creating Realistic Targets for Digital Forensics Investigation. [Citation Graph (0, 0)][DBLP]
    DFRWS, 2005, pp:- [Conf]
  3. Golden G. Richard III, Vassil Roussev
    Scalpel: A Frugal, High Performance File Carver. [Citation Graph (0, 0)][DBLP]
    DFRWS, 2005, pp:- [Conf]
  4. Frank Adelstein, Frederick A. Hosch, Golden G. Richard III, Loren Schwiebert
    Bessie: Portable Generation of Network Topologies for Simulation. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1998, pp:787-791 [Conf]
  5. Frank Adelstein, Golden G. Richard III, Loren Schwiebert
    Building Dynamic Multicast Trees in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:17-0 [Conf]
  6. Lawrence Klos, Golden G. Richard III
    A Reliable Extension to the ODMRP Ad Hoc Multicast Protocol. [Citation Graph (0, 0)][DBLP]
    ICWN, 2005, pp:45-51 [Conf]
  7. Yixin Chen, Vassil Roussev, Golden G. Richard III, Yun Gao
    Content-Based Image Retrieval for Digital Forensics. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:271-282 [Conf]
  8. Frank Adelstein, Prasanth Alla, Rob Joyce, Golden G. Richard III
    Physically Locating Wireless Intruders. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:482-0 [Conf]
  9. Jérémie Allard, Paul Gonin, Minoo Singh, Golden G. Richard III
    A User Level Framework for Ad Hoc Routing. [Citation Graph (0, 0)][DBLP]
    LCN, 2002, pp:13-19 [Conf]
  10. Changli Jiao, Loren Schwiebert, Golden G. Richard III
    Adaptive Header Compression for Wireless Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2001, pp:377-379 [Conf]
  11. Lawrence Klos, Golden G. Richard III
    Reliable Group Communication in an Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    LCN, 2002, pp:458-462 [Conf]
  12. Abdulrahman H. Altalhi, Golden G. Richard III
    Virtual Paths Routing: A Highly Dynamic Routing Protocol for Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2004, pp:81-86 [Conf]
  13. Lawrence Klos, Golden G. Richard III
    Julep: an environment for the evaluation of distributed process recovery protocols. [Citation Graph (0, 0)][DBLP]
    PRDC, 2000, pp:169-176 [Conf]
  14. Jérémie Allard, V. Chinta, S. Gundala, Golden G. Richard III
    Jini Meets UPnP: An Architecture for Jini/UPnP Interoperability. [Citation Graph (0, 0)][DBLP]
    SAINT, 2003, pp:268-275 [Conf]
  15. Golden G. Richard III, Mukesh Singhal
    Using Logging and Asynchronous Checkpointing to Implement Recoverable Distributed Shared Memory. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1993, pp:58-67 [Conf]
  16. Golden G. Richard III, Shengru Tu
    On Patterns for Practical Fault Tolerant Software in Java. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1998, pp:144-150 [Conf]
  17. Golden G. Richard III, Vassil Roussev
    Next-generation digital forensics. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:76-80 [Journal]
  18. Frank Adelstein, Golden G. Richard III, Loren Schwiebert
    Distributed multicast tree generation with dynamic group membership. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:10, pp:1105-1128 [Journal]
  19. Vassil Roussev, Yixin Chen, Timothy Bourg, Golden G. Richard III
    md5bloom: Forensic filesystem hashing revisited. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:Supplement-1, pp:82-90 [Journal]
  20. Golden G. Richard III
    Efficient Vector Time with Dynamic Process Creation and Termination. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1998, v:55, n:1, pp:109-120 [Journal]
  21. Frank Adelstein, Prasanth Alla, Rob Joyce, Golden G. Richard III
    Physically Locating Wireless Intruders. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:4-19 [Journal]
  22. Frank Adelstein, Golden G. Richard III, Loren Schwiebert, Rick Parent, Mukesh Singhal
    A Distributed Graphics Library System. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1994, v:24, n:4, pp:363-376 [Journal]

  23. Class-Aware Similarity Hashing for Data Classification. [Citation Graph (, )][DBLP]


  24. In-Place File Carving. [Citation Graph (, )][DBLP]


  25. File System Support for Digital Evidence Bags. [Citation Graph (, )][DBLP]


  26. dRamDisk: efficient RAM sharing on a commodity cluster. [Citation Graph (, )][DBLP]


  27. Forensic discovery auditing of digital evidence containers. [Citation Graph (, )][DBLP]


Search in 0.034secs, Finished in 0.036secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002