The SCEAS System
Navigation Menu

Search the dblp DataBase


Barry E. Mullins: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. M. T. Hyland, Barry E. Mullins, Rusty O. Baldwin, Michael A. Temple
    Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:249-256 [Conf]
  2. Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass
    The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:271- [Conf]
  3. Justin T. Kautz, Barry E. Mullins, Rusty O. Baldwin, Scott R. Graham
    An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:292- [Conf]
  4. Barry E. Mullins, Nathaniel J. Davis IV, Scott F. Midkiff
    A Wireless Local Area Network Protocol that Improves Throughput via Adaptive Control. [Citation Graph (0, 0)][DBLP]
    ICC (3), 1997, pp:1427-1431 [Conf]
  5. Gregory J. Brault, Christopher J. Augeri, Barry E. Mullins, Rusty O. Baldwin, Christopher B. Mayer
    Enabling Skip Graphs to Process K-Dimensional Range Queries in a Mobile Sensor Network. [Citation Graph (0, 0)][DBLP]
    NCA, 2007, pp:273-282 [Conf]
  6. Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers
    Alert Verification Evasion Through Server Response Forging. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:256-275 [Conf]

  7. A survey of state-of-the-art in anonymity metrics. [Citation Graph (, )][DBLP]

  8. Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment. [Citation Graph (, )][DBLP]

  9. Towards a Taxonomy of Wired and Wireless Anonymous Networks. [Citation Graph (, )][DBLP]

  10. Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes. [Citation Graph (, )][DBLP]

  11. A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission. [Citation Graph (, )][DBLP]

  12. Using Relocatable Bitstreams for Fault Tolerance. [Citation Graph (, )][DBLP]

  13. Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information. [Citation Graph (, )][DBLP]

  14. An analysis of XML compression efficiency. [Citation Graph (, )][DBLP]

  15. Program Fragmentation as a Metamorphic Software Protection. [Citation Graph (, )][DBLP]

  16. Wireless sensor networks: guidelines for design and a survey of current research. [Citation Graph (, )][DBLP]

  17. Enhancing realistic hands-on network training in a virtual environment. [Citation Graph (, )][DBLP]

  18. Iterative Configuration Method: An Effective and Efficient Heuristic for Service Oriented Infrastructure Resource Allocation. [Citation Graph (, )][DBLP]

  19. Energy cost and error performance of range-aware, anchor-free localization algorithms. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002