The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Udo W. Pooch: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Udo W. Pooch
    Translation of Decision Tables. [Citation Graph (1, 0)][DBLP]
    ACM Comput. Surv., 1974, v:6, n:2, pp:125-151 [Journal]
  2. Udo W. Pooch, Al Nieder
    A Survey of Indexing Techniques for Sparse Matrices. [Citation Graph (1, 0)][DBLP]
    ACM Comput. Surv., 1973, v:5, n:2, pp:109-133 [Journal]
  3. David A. Umphress, Udo W. Pooch, Murat Tanik
    Fast prototyping of a goal-orientedsimulation environment sytem. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1988, pp:120-130 [Conf]
  4. Sunil Santha, Udo W. Pooch
    JAGATH: A Methodology and Its Application for Distributed Systems Performance Evaluation and Control. [Citation Graph (0, 0)][DBLP]
    Computer Performance Evaluation (Tools), 1998, pp:365-368 [Conf]
  5. Jianfeng Cai, Yunhuai Liu, Jie Lian, Mo Li, Udo W. Pooch, Lionel M. Ni
    Truthful Topology Control inWireless Ad Hoc Networks with Selfish Nodes. [Citation Graph (0, 0)][DBLP]
    ICPP, 2006, pp:203-210 [Conf]
  6. Bin Lu II, Udo W. Pooch
    Security in QoS Models and Signaling Systems for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2003, pp:563-569 [Conf]
  7. Jianfeng Cai, Haiyun You, Bin Lu, Udo W. Pooch, Mi Lu
    Whisper - A Lightweight Anonymous Communication Mechanism in Wireless Ad-hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICWN, 2005, pp:482-488 [Conf]
  8. Udo W. Pooch
    The Design of an Integrated Packet/Circuit Switched Network Simulator. [Citation Graph (0, 0)][DBLP]
    IMACS World Congress, 1982, pp:107-115 [Conf]
  9. Jianfeng Cai, Udo W. Pooch
    Allocate Fair Payoff for Cooperation in Wireless Ad Hoc Networks Using Shapley Value. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2004, pp:- [Conf]
  10. Jian Chen, Yong Guan, Udo W. Pooch
    A Spatial-Based Multi-Resolution Data Dissemination Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  11. Jian Chen, Yong Guan, Udo W. Pooch
    Customizing a Geographical Routing Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:586-591 [Conf]
  12. Bin Lu, Udo W. Pooch
    A Lightweight Authentication Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:546-551 [Conf]
  13. Ganesha Beedubail, Udo W. Pooch
    An Architecture for Object Replication in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1997, pp:50-59 [Conf]
  14. Anil Gurijala, Udo W. Pooch
    The Effect of Mobility on Consistency and Access Time in Distributed System. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1997, pp:1160-1164 [Conf]
  15. Anish S. Karmarkar, Udo W. Pooch
    A Framework for Communication Support in Object Oriented Distributed Systems. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1997, pp:182-185 [Conf]
  16. Sridhar Muppidi, Udo W. Pooch
    Architecture for Performance Instrument in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1996, pp:1334-1345 [Conf]
  17. Bin Lu II, Udo W. Pooch
    A Game Theoretic Framework for Bandwidth Reservation in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    QSHINE, 2004, pp:234-241 [Conf]
  18. John M. D. Hill, Curtis A. Carver Jr., Jeffrey W. Humphries, Udo W. Pooch
    Using an isolated network laboratory to teach advanced networks and security. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2001, pp:36-40 [Conf]
  19. Curtis A. Carver Jr., John M. D. Hill, Udo W. Pooch
    Third Generation Adaptive Hypermedia Systems. [Citation Graph (0, 0)][DBLP]
    WebNet, 1999, pp:177-182 [Conf]
  20. Bo Sun, Kui Wu, Udo W. Pooch
    Alert aggregation in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:69-78 [Conf]
  21. John A. Hamilton Jr., Udo W. Pooch
    An Open Simulation Architecture for Force XXI. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 1995, pp:1296-1303 [Conf]
  22. John R. Surdu, John M. D. Hill, Udo W. Pooch
    Anticipatory Planning Support System. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 2000, pp:950-957 [Conf]
  23. Rahul Chattergy, Udo W. Pooch
    Analysis of the Availability of Computer Systems Using Computer-Aided Algebra. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1978, v:21, n:7, pp:586-591 [Journal]
  24. Udo W. Pooch
    Papers from SIGGRAPH 76 - Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1976, v:19, n:10, pp:541- [Journal]
  25. Michel Kouadio, Udo W. Pooch
    A taxonomy and design considerations for Internet accounting. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:5, pp:39-48 [Journal]
  26. Rahul Chattergy, Udo W. Pooch
    A Distributed Function Computer with Dedicated Processors. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1979, v:22, n:1, pp:37-40 [Journal]
  27. D. L. Dance, Udo W. Pooch
    An Adaptive On Line Data Compression System. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1976, v:19, n:3, pp:216-224 [Journal]
  28. W. T. Graybeal, Udo W. Pooch
    The Design of Calibration Experiments for Syntheticc Jobs. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1981, v:24, n:2, pp:132-138 [Journal]
  29. Anthony P. Lucido, Rahul Chattergy, Udo W. Pooch
    A Survey of Microprogram Verification and Validation Methods. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1981, v:24, n:2, pp:139-142 [Journal]
  30. David A. Umphress, Udo W. Pooch, Murat Tanik
    Fast Prototyping of a Goal-Oriented Simulation Environment System. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1989, v:32, n:6, pp:541-548 [Journal]
  31. Gregory B. White, Udo W. Pooch
    Cooperating security managers: Distributed intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:5, pp:441-450 [Journal]
  32. Udo W. Pooch
    Corrigendum: ``Translation of Decision Tables''. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1974, v:6, n:4, pp:321- [Journal]
  33. Richard M. Feldman, Gerald Wayne Adkins, Guy L. Curry, Udo W. Pooch
    Measurement Bias in Feedback Queues. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1981, v:28, n:2, pp:351-357 [Journal]
  34. Bernard J. Jansen, Udo W. Pooch
    A review of Web searching studies and a framework for future research. [Citation Graph (0, 0)][DBLP]
    JASIST, 2001, v:52, n:3, pp:235-246 [Journal]
  35. V. Thomas Rhyne, Philip S. Noe, Melvin H. McKinney, Udo W. Pooch
    A New Technique for the Fast Minimization of Switching Functions. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1977, v:26, n:8, pp:757-764 [Journal]
  36. Bin Lu, Udo W. Pooch
    Cooperative security-enforcement routing in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    MWCN, 2002, pp:157-161 [Conf]
  37. Michel Kouadio, Udo W. Pooch
    Technology on social issues of videoconferencing on the Internet: a survey. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2002, v:25, n:1, pp:37-56 [Journal]

  38. PACKET tracing: a new paradigm for teaching computer network courses. [Citation Graph (, )][DBLP]


  39. Computer ethics education: impact from societal norms. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002