The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Calvin C. Newport: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gregory Chockler, Murat Demirbas, Seth Gilbert, Nancy A. Lynch, Calvin C. Newport, Tina Nolte
    Reconciling the Theory and Practice of (Un)Reliable Wireless Broadcast. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:42-48 [Conf]
  2. Robert S. Gray, David Kotz, Calvin C. Newport, Nikita Dubrovsky, Aaron Fiske, Jason Liu, Christopher Masone, Susan McGrath, Yougu Yuan
    Outdoor experimental comparison of four ad hoc routing algorithms. [Citation Graph (0, 0)][DBLP]
    MSWiM, 2004, pp:220-229 [Conf]
  3. David Kotz, Calvin C. Newport, Robert S. Gray, Jason Liu, Yougu Yuan, Chip Elliott
    Experimental evaluation of wireless simulation assumptions. [Citation Graph (0, 0)][DBLP]
    MSWiM, 2004, pp:78-82 [Conf]
  4. Seth Gilbert, Rachid Guerraoui, Calvin C. Newport
    Of Malicious Motes and Suspicious Sensors: On the Efficiency of Malicious Interference in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    OPODIS, 2006, pp:215-229 [Conf]
  5. Jason Liu, Yougu Yuan, David M. Nicol, Robert S. Gray, Calvin C. Newport, David Kotz, L. Felipe Perrone
    Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols. [Citation Graph (0, 0)][DBLP]
    PADS, 2004, pp:7-16 [Conf]
  6. Gregory Chockler, Murat Demirbas, Seth Gilbert, Calvin C. Newport, Tina Nolte
    Consensus and collision detectors in wireless Ad Hoc networks. [Citation Graph (0, 0)][DBLP]
    PODC, 2005, pp:197-206 [Conf]
  7. Rachid Guerraoui, Maurice Herlihy, Petr Kouznetsov, Nancy A. Lynch, Calvin C. Newport
    On the weakest failure detector ever. [Citation Graph (0, 0)][DBLP]
    PODC, 2007, pp:235-243 [Conf]
  8. Shlomi Dolev, Seth Gilbert, Rachid Guerraoui, Calvin C. Newport
    Gossiping in a Multi-channel Radio Network. [Citation Graph (0, 0)][DBLP]
    DISC, 2007, pp:208-222 [Conf]

  9. Provably secure ciphertext policy ABE. [Citation Graph (, )][DBLP]


  10. Modeling Radio Networks. [Citation Graph (, )][DBLP]


  11. Prioritized gossip in vehicular networks. [Citation Graph (, )][DBLP]


  12. Interference-Resilient Information Exchange. [Citation Graph (, )][DBLP]


  13. Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET. [Citation Graph (, )][DBLP]


  14. Secure communication over radio channels. [Citation Graph (, )][DBLP]


  15. Brief announcement: hardness of broadcasting in wireless networks with unreliable communication. [Citation Graph (, )][DBLP]


  16. The wireless synchronization problem. [Citation Graph (, )][DBLP]


  17. Broadcasting in unreliable radio networks. [Citation Graph (, )][DBLP]


  18. Securing every bit: authenticated broadcast in radio networks. [Citation Graph (, )][DBLP]


  19. The Abstract MAC Layer. [Citation Graph (, )][DBLP]


  20. Consensus and collision detectors in radio networks. [Citation Graph (, )][DBLP]


  21. On the weakest failure detector ever. [Citation Graph (, )][DBLP]


Search in 0.054secs, Finished in 0.056secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002