Folgen
Andrew Newell
Titel
Zitiert von
Zitiert von
Jahr
Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks
K Akkaya, A Newell
Computer Communications 32 (7-10), 1233-1244, 2009
1402009
Plagiarizing smartphone applications: attack strategies and defense techniques
R Potharaju, A Newell, C Nita-Rotaru, X Zhang
International symposium on engineering secure software and systems, 106-120, 2012
1222012
Real-time visual feedback for user positioning with respect to a camera and a display
A Bud, A Newell, J Palmer
US Patent 9,412,169, 2016
712016
Distributed collaborative camera actuation for redundant data elimination in wireless multimedia sensor networks
A Newell, K Akkaya
Ad Hoc Networks 9 (4), 514-527, 2011
562011
On the practicality of integrity attacks on document-level sentiment analysis
A Newell, R Potharaju, L Xiang, C Nita-Rotaru
Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014
502014
Increasing network resiliency by optimally assigning diverse variants to routing nodes
A Newell, D Obenshain, T Tantillo, C Nita-Rotaru, Y Amir
IEEE Transactions on Dependable and Secure Computing 12 (6), 602-614, 2014
412014
Optimizing distributed actor systems for dynamic interactive services
A Newell, G Kliot, I Menache, A Gopalan, S Akiyama, M Silberstein
Proceedings of the Eleventh European Conference on Computer Systems, 1-15, 2016
262016
Entropy attacks and countermeasures in wireless network coding
AJ Newell, R Curtmola, C Nita-Rotaru
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
242012
Node-capture resilient key establishment in sensor networks: Design space and new protocols
A Newell, H Yao, A Ryker, T Ho, C Nita-Rotaru
ACM Computing Surveys (CSUR) 47 (2), 1-34, 2014
232014
Practical intrusion-tolerant networks
D Obenshain, T Tantillo, A Babay, J Schultz, A Newell, ME Hoque, Y Amir, ...
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
192016
Split null keys: A null space based defense for pollution attacks in wireless network coding
A Newell, C Nita-Rotaru
2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2012
182012
Providing multi-perspective event coverage in wireless multimedia sensor networks
A Newell, K Akkaya, E Yildiz
IEEE Local Computer Network Conference, 464-471, 2010
172010
Self-actuation of camera sensors for redundant data elimination in wireless multimedia sensor networks
A Newell, K Akkaya
2009 IEEE International Conference on Communications, 1-5, 2009
162009
On the practicality of cryptographic defences against pollution attacks in wireless network coding
A Newell, J Dong, C Nita-Rotaru
ACM Computing Surveys (CSUR) 45 (3), 1-26, 2013
142013
Taiji: managing global user traffic for large-scale internet services at the edge
D Chou, T Xu, K Veeraraghavan, A Newell, S Margulis, L Xiao, PM Ruiz, ...
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 430-446, 2019
132019
A stitch in time: the needlework of aging women in antebellum America
AE Newell
Ohio University Press, 2014
102014
" Tattered to Pieces": Amy Fiske's Sampler and the Changing Roles of Women in Antebellum New England
AE Newell
na, 1750
61750
RAS: Continuously Optimized Region-Wide Datacenter Resource Allocation
A Newell, D Skarlatos, J Fan, P Kumar, M Khutornenko, M Pundir, ...
Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles …, 2021
42021
What should we be comparing for writer identification?
AJ Newell
2013 12th International Conference on Document Analysis and Recognition, 418-422, 2013
22013
Invariant encoding schemes for visual recognition
AJ Newell
UCL (University College London), 2012
22012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20