The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Phillip G. Bradford: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradford
    Implementing the TEA algorithm on sensors. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2004, pp:64-69 [Conf]
  2. Ning Hu, Randy K. Smith, Phillip G. Bradford
    Security for fixed sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2004, pp:212-213 [Conf]
  3. Ning Hu, Phillip G. Bradford, Jun Liu
    Applying role based access control and genetic algorithms to insider threat detection. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:790-791 [Conf]
  4. Phillip G. Bradford, Mordecai J. Golin, Lawrence L. Larmore, Wojciech Rytter
    Optimal Prefix-Free Codes for Unequal Letter Costs: Dynamic Programming with the Monge Property. [Citation Graph (0, 0)][DBLP]
    ESA, 1998, pp:43-54 [Conf]
  5. Phillip G. Bradford, Knut Reinert
    Lower Bounds for Row Minima Searching (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ICALP, 1996, pp:454-465 [Conf]
  6. Phillip G. Bradford, Olga V. Gavrylyako
    Foundations of Security for Hash Chains in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:743-748 [Conf]
  7. Phillip G. Bradford, Olga V. Gavrylyako
    Hash Chains with Diminishing Ranges for Sensors. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2004, pp:77-83 [Conf]
  8. Phillip G. Bradford, Olga V. Gavrylyako, Randy K. Smith
    Perfect Secrecy in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2003, pp:409-416 [Conf]
  9. Phillip G. Bradford, Olga V. Gavrylyako, Charles Ward, Nathan Wiegand
    A Proposal for a Multimedia Traffic Analysis Attack. [Citation Graph (0, 0)][DBLP]
    ICWN, 2005, pp:261-267 [Conf]
  10. Phillip G. Bradford, Gregory J. E. Rawlins, Gregory E. Shannon
    Efficient Matrix Chain Ordering in Polylog Time. [Citation Graph (0, 0)][DBLP]
    IPPS, 1994, pp:234-241 [Conf]
  11. Phillip G. Bradford, Rudolf Fleischer
    Matching Nuts and Bolts Faster. [Citation Graph (0, 0)][DBLP]
    ISAAC, 1995, pp:402-408 [Conf]
  12. Phillip G. Bradford, Marcus Brown, Josh Perdue, Bonnie Self
    Towards Proactive Computer-System Forensics. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:648-652 [Conf]
  13. Phillip G. Bradford, Venkatesh Chopella, Gregory J. E. Rawlins
    Lower Bounds for the Matrix Chain Ordering Problem (Extended bstract). [Citation Graph (0, 0)][DBLP]
    LATIN, 1995, pp:112-130 [Conf]
  14. Lei Tang, Xiaoyan Hong, Phillip G. Bradford
    Secure Relative Location Determination in Vehicular Network. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:543-554 [Conf]
  15. Victoria Ungureanu, Benjamin Melamed, Phillip G. Bradford, Michael Katehakis
    Class-Dependent Assignment in cluster-based servers. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:1420-1425 [Conf]
  16. Paul Walton Purdom Jr., Phillip G. Bradford, Koichiro Tamura, Sudhir Kumar
    Single column discrepancy and dynamic max-mini optimizations for quickly finding the most parsimonious evolutionary trees. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2000, v:16, n:2, pp:140-151 [Journal]
  17. Phillip G. Bradford, Olga V. Gavrylyako
    Foundations of Security for Hash Chains in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 2005, v:8, n:2-3, pp:189-195 [Journal]
  18. Victoria Ungureanu, Benjamin Melamed, Michael Katehakis, Phillip G. Bradford
    Deferred Assignment Scheduling in Cluster-Based Servers. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 2006, v:9, n:1, pp:57-65 [Journal]
  19. Phillip G. Bradford, Vasilis Capoyleas
    Weak epsilon-Nets for Points on a Hypersphere. [Citation Graph (0, 0)][DBLP]
    Discrete & Computational Geometry, 1997, v:18, n:1, pp:83-91 [Journal]
  20. Phillip G. Bradford, Herbert E. Brown, Paula M. Saunders
    Pricing, Agents, Perceived Value and the Internet. [Citation Graph (0, 0)][DBLP]
    First Monday, 2001, v:6, n:6, pp:- [Journal]
  21. Noga Alon, Phillip G. Bradford, Rudolf Fleischer
    Matching Nuts and Bolts Faster. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1996, v:59, n:3, pp:123-127 [Journal]
  22. Phillip G. Bradford, Rudolf Fleischer, Michiel H. M. Smid
    More Efficient Parallel Totally Monotone Matrix Searching. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 1997, v:23, n:2, pp:386-400 [Journal]
  23. Phillip G. Bradford, Mordecai J. Golin, Lawrence L. Larmore, Wojciech Rytter
    Optimal Prefix-Free Codes for Unequal Letter Costs: Dynamic Programming with the Monge Property. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 2002, v:42, n:2, pp:277-303 [Journal]
  24. Phillip G. Bradford, Gregory J. E. Rawlins, Gregory E. Shannon
    Efficient Matrix Chain Ordering in Polylog Time. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1998, v:27, n:2, pp:466-490 [Journal]
  25. Phillip G. Bradford, Michael N. Katehakis
    A Probabilistic Study on Combinatorial Expanders and Hashing. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2007, v:37, n:1, pp:83-111 [Journal]
  26. Phillip G. Bradford, Michael Wollowski
    A Formalization of the Turing Test. [Citation Graph (0, 0)][DBLP]
    SIGART Bulletin, 1995, v:6, n:4, pp:3-10 [Journal]
  27. Phillip G. Bradford, Daniel A. Ray
    Using Digital Chains of Custody on Constrained Devices to Verify Evidence. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:8-15 [Conf]
  28. Phillip G. Bradford, Daniel A. Ray
    An online algorithm for generating fractal hash chains applied to digital chains of custody [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  29. Finding the Change-Point in a Binary Stream with Two Unknown, but Distant, Distributions. [Citation Graph (, )][DBLP]


  30. A Distributed Context-Free Language Constrained Shortest Path Algorithm. [Citation Graph (, )][DBLP]


  31. An Integrated System for Insider Threat Detection. [Citation Graph (, )][DBLP]


  32. Indicator Random Variables in Traffic Analysis and the Birthday Problem. [Citation Graph (, )][DBLP]


  33. Issues in Simulation for Valuing Long-Term Forwards. [Citation Graph (, )][DBLP]


  34. Protocol completion incentive problems in cryptographic Vickrey auctions. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.302secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002