The SCEAS System
Navigation Menu

Search the dblp DataBase


Robert G. Cole: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Baruch Awerbuch, Robert G. Cole, Reza Curtmola, David Holmer, Herbert Rubens
    Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:98-112 [Conf]
  2. Anurag Kumar, Robert G. Cole
    Comparative Performance of Interleaved and Non-Interleaved Pipelining in LAPD Terminal Adaptors. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1990, pp:694-701 [Conf]
  3. Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis
    Requirements on Worm Mitigation Technologies in MANETS. [Citation Graph (0, 0)][DBLP]
    PADS, 2005, pp:207-214 [Conf]
  4. Alberto Avritzer, Robert G. Cole, Elaine J. Weyuker
    Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs. [Citation Graph (0, 0)][DBLP]
    WOSP, 2007, pp:172-180 [Conf]
  5. Robert G. Cole, J. H. Rosenbluth
    Voice over IP performance monitoring. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2001, v:31, n:2, pp:9-24 [Journal]
  6. Anurag Kumar, Robert G. Cole
    Comparative Performance of Interleaved and Non-Interleaved Pipelining in ATM Terminal Adapters. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1995, v:27, n:4, pp:521-535 [Journal]
  7. Gagan L. Choudhury, Robert G. Cole
    Design and analysis of optimal adaptive de-jitter buffers. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:6, pp:529-537 [Journal]
  8. Robert G. Cole
    Experience and Analysis of Network Interconnection. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1990, v:8, n:1, pp:49-56 [Journal]
  9. Mohamed Abdelhafez, George F. Riley, Robert G. Cole, Nam Phamdo
    Modeling and Simulations of TCP MANET Worms. [Citation Graph (0, 0)][DBLP]
    PADS, 2007, pp:123-130 [Conf]

  10. Stochastic Process Models for Packet/Analytic-Based Network Simulations. [Citation Graph (, )][DBLP]

  11. Monitoring for security intrusion using performance signatures. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002