Search the dblp DataBase
Moses Garuba :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Legand L. Burge III , Suleiman Baajun , Donald Charity , Moses Garuba PSTORE: Pervasive Storage for Disaster Recovery of Mobile Device Data. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2003, pp:838-841 [Conf ] Joseph Gill , Legand L. Burge III , Moses Garuba The Design and Implementation of the Spacecraft Navigation & Ancillary Information Web Service. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2004, pp:988-992 [Conf ] Legand L. Burge III , Moses Garuba , Charita Brent Improving Retention of Minority Freshmen in Engineering by Applying the Six Sigma Methodology. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:723-728 [Conf ] Moses Garuba , Edward Appiah , Legand L. Burge III Performance Study of a MLS/DBMS Implemented as a Kernelized Architecture. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:566-0 [Conf ] Moses Garuba , Anteneh Girma Impact Of External Security Measures On Data Access Implementation With Online Database Management System. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:243-248 [Conf ] Moses Garuba , Ronald Langrin , Legand L. Burge III A Constraint-Based Query Modification Engine for Retrofitting COTS DBMS's. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:551-556 [Conf ] Joseph Gill , Legand L. Burge III , Moses Garuba The Design and Implementation of the MESSENGER Trajectory Database. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:557-561 [Conf ] Rajni Goel , Moses Garuba , Chunmei Liu , Trang Nguyen The Security Threat Posed by Steganographic Content on the Internet. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:794-798 [Conf ] Rajni Goel , Moses Garuba , Anteneh Girma Research Directions in Quantum Cryptography. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:779-784 [Conf ] Moses Garuba , Jiang Li Preventing parameterized vulnerability in Web based applications. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:790-793 [Conf ] Moses Garuba , Jiang Li , Legand L. Burge III Comparative Analysis of Email Filtering Technologies. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:785-789 [Conf ] Kathleen Kaplan , Legand L. Burge III , Moses Garuba A Parallel Algorithm for Approximate String Matching. [Citation Graph (0, 0)][DBLP ] PDPTA, 2003, pp:1844-1848 [Conf ] Legand L. Burge III , Suleiman Baajun , Moses Garuba A ubiquitous stable storage for mobile computing devices. [Citation Graph (0, 0)][DBLP ] SAC, 2001, pp:401-404 [Conf ] Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities. [Citation Graph (, )][DBLP ] Intrusion Techniques: Comparative Study of Network Intrusion Detection Systems. [Citation Graph (, )][DBLP ] A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers. [Citation Graph (, )][DBLP ] Multicast Using Static Trees. [Citation Graph (, )][DBLP ] Security in the New Era of Telecommunication: Threats, Risks and Controls of VoIP. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs