The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rusty O. Baldwin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. M. T. Hyland, Barry E. Mullins, Rusty O. Baldwin, Michael A. Temple
    Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:249-256 [Conf]
  2. Brian S. Peterson, Rusty O. Baldwin, Jeffrey P. Kharoufeh
    A Specification-Compatible Bluetooth Inquiry Simplification. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  3. Brian S. Peterson, Rusty O. Baldwin, Richard A. Raines
    Bluetooth Discovery Time with Multiple Inquirers. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  4. Justin T. Kautz, Barry E. Mullins, Rusty O. Baldwin, Scott R. Graham
    An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:292- [Conf]
  5. G. L. Peterson, Richard A. Raines, Rusty O. Baldwin
    Graduate Digital Forensics Education at the Air Force Institute of Technology. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:264- [Conf]
  6. Kenneth S. Edge, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Robert Bennington, Christopher Reuter
    The Use of Attack and Protection Trees to Analyze Security for an Online Banking System. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:144- [Conf]
  7. Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin
    Developing an Insider Threat Model Using Functional Decomposition. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:412-417 [Conf]
  8. Ryan W. Thomas, Richard A. Raines, Rusty O. Baldwin, Michael A. Temple
    Performance analysis of multicast algorithms for mobile satellite communication networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:11-12, pp:1085-1093 [Journal]
  9. Rusty O. Baldwin, Nathaniel J. Davis IV, Scott F. Midkiff, John E. Kobza
    Queueing network analysis: concepts, terminology, and methods. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2003, v:66, n:2, pp:99-117 [Journal]
  10. Rusty O. Baldwin, Brian S. Peterson, Robert F. Mills
    Using playing cards to estimate interference in frequency-hopping spread spectrum radio networks. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:12, pp:1782-1788 [Journal]
  11. Rusty O. Baldwin, Nathaniel J. Davis IV, John E. Kobza, Scott F. Midkiff
    Real-time queueing theory: A tutorial presentation with an admission control application. [Citation Graph (0, 0)][DBLP]
    Queueing Syst., 2000, v:35, n:1-4, pp:1-21 [Journal]
  12. Rusty O. Baldwin, Nathaniel J. Davis IV, Scott F. Midkiff, Richard A. Raines
    Packetized voice transmission using RT-MAC, a wireless real-time medium access control protocol. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2001, v:5, n:3, pp:11-25 [Journal]
  13. Brian S. Peterson, Rusty O. Baldwin, Richard A. Raines
    Inquiry packet interference in bluetooth scatternets. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2004, v:8, n:2, pp:66-75 [Journal]
  14. Brian S. Peterson, Rusty O. Baldwin, Jeffrey P. Kharoufeh
    Bluetooth Inquiry Time Characterization and Selection. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:9, pp:1173-1187 [Journal]
  15. Gregory J. Brault, Christopher J. Augeri, Barry E. Mullins, Rusty O. Baldwin, Christopher B. Mayer
    Enabling Skip Graphs to Process K-Dimensional Range Queries in a Mobile Sensor Network. [Citation Graph (0, 0)][DBLP]
    NCA, 2007, pp:273-282 [Conf]
  16. Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers
    Alert Verification Evasion Through Server Response Forging. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:256-275 [Conf]

  17. A survey of state-of-the-art in anonymity metrics. [Citation Graph (, )][DBLP]


  18. Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment. [Citation Graph (, )][DBLP]


  19. Towards a Taxonomy of Wired and Wireless Anonymous Networks. [Citation Graph (, )][DBLP]


  20. Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes. [Citation Graph (, )][DBLP]


  21. A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission. [Citation Graph (, )][DBLP]


  22. Using Relocatable Bitstreams for Fault Tolerance. [Citation Graph (, )][DBLP]


  23. An analysis of XML compression efficiency. [Citation Graph (, )][DBLP]


  24. Program Fragmentation as a Metamorphic Software Protection. [Citation Graph (, )][DBLP]


  25. Wireless sensor networks: guidelines for design and a survey of current research. [Citation Graph (, )][DBLP]


  26. Energy cost and error performance of range-aware, anchor-free localization algorithms. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002