|
Search the dblp DataBase
Phillip G. Bradford:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradford
Implementing the TEA algorithm on sensors. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 2004, pp:64-69 [Conf]
- Ning Hu, Randy K. Smith, Phillip G. Bradford
Security for fixed sensor networks. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 2004, pp:212-213 [Conf]
- Ning Hu, Phillip G. Bradford, Jun Liu
Applying role based access control and genetic algorithms to insider threat detection. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 2006, pp:790-791 [Conf]
- Phillip G. Bradford, Mordecai J. Golin, Lawrence L. Larmore, Wojciech Rytter
Optimal Prefix-Free Codes for Unequal Letter Costs: Dynamic Programming with the Monge Property. [Citation Graph (0, 0)][DBLP] ESA, 1998, pp:43-54 [Conf]
- Phillip G. Bradford, Knut Reinert
Lower Bounds for Row Minima Searching (Extended Abstract). [Citation Graph (0, 0)][DBLP] ICALP, 1996, pp:454-465 [Conf]
- Phillip G. Bradford, Olga V. Gavrylyako
Foundations of Security for Hash Chains in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2003, pp:743-748 [Conf]
- Phillip G. Bradford, Olga V. Gavrylyako
Hash Chains with Diminishing Ranges for Sensors. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 2004, pp:77-83 [Conf]
- Phillip G. Bradford, Olga V. Gavrylyako, Randy K. Smith
Perfect Secrecy in Wireless Networks. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 2003, pp:409-416 [Conf]
- Phillip G. Bradford, Olga V. Gavrylyako, Charles Ward, Nathan Wiegand
A Proposal for a Multimedia Traffic Analysis Attack. [Citation Graph (0, 0)][DBLP] ICWN, 2005, pp:261-267 [Conf]
- Phillip G. Bradford, Gregory J. E. Rawlins, Gregory E. Shannon
Efficient Matrix Chain Ordering in Polylog Time. [Citation Graph (0, 0)][DBLP] IPPS, 1994, pp:234-241 [Conf]
- Phillip G. Bradford, Rudolf Fleischer
Matching Nuts and Bolts Faster. [Citation Graph (0, 0)][DBLP] ISAAC, 1995, pp:402-408 [Conf]
- Phillip G. Bradford, Marcus Brown, Josh Perdue, Bonnie Self
Towards Proactive Computer-System Forensics. [Citation Graph (0, 0)][DBLP] ITCC (2), 2004, pp:648-652 [Conf]
- Phillip G. Bradford, Venkatesh Chopella, Gregory J. E. Rawlins
Lower Bounds for the Matrix Chain Ordering Problem (Extended bstract). [Citation Graph (0, 0)][DBLP] LATIN, 1995, pp:112-130 [Conf]
- Lei Tang, Xiaoyan Hong, Phillip G. Bradford
Secure Relative Location Determination in Vehicular Network. [Citation Graph (0, 0)][DBLP] MSN, 2006, pp:543-554 [Conf]
- Victoria Ungureanu, Benjamin Melamed, Phillip G. Bradford, Michael Katehakis
Class-Dependent Assignment in cluster-based servers. [Citation Graph (0, 0)][DBLP] SAC, 2004, pp:1420-1425 [Conf]
- Paul Walton Purdom Jr., Phillip G. Bradford, Koichiro Tamura, Sudhir Kumar
Single column discrepancy and dynamic max-mini optimizations for quickly finding the most parsimonious evolutionary trees. [Citation Graph (0, 0)][DBLP] Bioinformatics, 2000, v:16, n:2, pp:140-151 [Journal]
- Phillip G. Bradford, Olga V. Gavrylyako
Foundations of Security for Hash Chains in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] Cluster Computing, 2005, v:8, n:2-3, pp:189-195 [Journal]
- Victoria Ungureanu, Benjamin Melamed, Michael Katehakis, Phillip G. Bradford
Deferred Assignment Scheduling in Cluster-Based Servers. [Citation Graph (0, 0)][DBLP] Cluster Computing, 2006, v:9, n:1, pp:57-65 [Journal]
- Phillip G. Bradford, Vasilis Capoyleas
Weak epsilon-Nets for Points on a Hypersphere. [Citation Graph (0, 0)][DBLP] Discrete & Computational Geometry, 1997, v:18, n:1, pp:83-91 [Journal]
- Phillip G. Bradford, Herbert E. Brown, Paula M. Saunders
Pricing, Agents, Perceived Value and the Internet. [Citation Graph (0, 0)][DBLP] First Monday, 2001, v:6, n:6, pp:- [Journal]
- Noga Alon, Phillip G. Bradford, Rudolf Fleischer
Matching Nuts and Bolts Faster. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1996, v:59, n:3, pp:123-127 [Journal]
- Phillip G. Bradford, Rudolf Fleischer, Michiel H. M. Smid
More Efficient Parallel Totally Monotone Matrix Searching. [Citation Graph (0, 0)][DBLP] J. Algorithms, 1997, v:23, n:2, pp:386-400 [Journal]
- Phillip G. Bradford, Mordecai J. Golin, Lawrence L. Larmore, Wojciech Rytter
Optimal Prefix-Free Codes for Unequal Letter Costs: Dynamic Programming with the Monge Property. [Citation Graph (0, 0)][DBLP] J. Algorithms, 2002, v:42, n:2, pp:277-303 [Journal]
- Phillip G. Bradford, Gregory J. E. Rawlins, Gregory E. Shannon
Efficient Matrix Chain Ordering in Polylog Time. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1998, v:27, n:2, pp:466-490 [Journal]
- Phillip G. Bradford, Michael N. Katehakis
A Probabilistic Study on Combinatorial Expanders and Hashing. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 2007, v:37, n:1, pp:83-111 [Journal]
- Phillip G. Bradford, Michael Wollowski
A Formalization of the Turing Test. [Citation Graph (0, 0)][DBLP] SIGART Bulletin, 1995, v:6, n:4, pp:3-10 [Journal]
- Phillip G. Bradford, Daniel A. Ray
Using Digital Chains of Custody on Constrained Devices to Verify Evidence. [Citation Graph (0, 0)][DBLP] ISI, 2007, pp:8-15 [Conf]
- Phillip G. Bradford, Daniel A. Ray
An online algorithm for generating fractal hash chains applied to digital chains of custody [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
Finding the Change-Point in a Binary Stream with Two Unknown, but Distant, Distributions. [Citation Graph (, )][DBLP]
A Distributed Context-Free Language Constrained Shortest Path Algorithm. [Citation Graph (, )][DBLP]
An Integrated System for Insider Threat Detection. [Citation Graph (, )][DBLP]
Indicator Random Variables in Traffic Analysis and the Birthday Problem. [Citation Graph (, )][DBLP]
Issues in Simulation for Valuing Long-Term Forwards. [Citation Graph (, )][DBLP]
Protocol completion incentive problems in cryptographic Vickrey auctions. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.302secs
|