Search the dblp DataBase
Eric Cole :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Vignesh Kumar , Eric Cole Fair Scheduling in Wireless Networks with Controlled Compensation for Faulty Channels. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2005, pp:203-208 [Conf ] Sandra Ring , Eric Cole Volatile Memory Computer Forensics to Detect Kernel Level Compromise. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:158-170 [Conf ] Vignesh Kumar , Eric Cole A Packet Fair Queueing Algorithm with Controlled Compensation for Wireless TCP/IP Networks. [Citation Graph (0, 0)][DBLP ] IMSA, 2005, pp:1-6 [Conf ] Vignesh Kumar Munirajan , Eric Cole An agent based certificate revocation scheme for public key management in mobile and wireless adhoc networks. [Citation Graph (0, 0)][DBLP ] IMSA, 2006, pp:132-136 [Conf ] Vignesh Kumar Munirajan , Ferat Sahin , Eric Cole Ant colony optimization based swarms: implementation for the mine detection application. [Citation Graph (0, 0)][DBLP ] SMC (1), 2004, pp:716-721 [Conf ] Sandra Ring , David Esler , Eric Cole Self-healing mechanisms for kernel system compromises. [Citation Graph (0, 0)][DBLP ] WOSS, 2004, pp:100-104 [Conf ] Sandra Ring , Eric Cole Taking a Lesson from Stealthy Rootkits. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:4, pp:38-45 [Journal ] Search in 0.001secs, Finished in 0.001secs