Find Scholarly Works

Search in all content

Filters for Scholarly Works

Search concepts
Selected Filters
  • 113,150 - 113,200 out of 128,769 results
  • Export search results

Search results

  • Conference contribution

    SDNSOC: Object oriented SDN framework

    Chowdhary, A., Huang, D., Ahn, G-J., Kang, M., Kim, A. & Velazquez, A., Mar 19 2019, SDN-NFV 2019 - Proceedings of the ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, co-located with CODASPY 2019. Association for Computing Machinery, Inc, p. 7-12 6 p. 3309196. (SDN-NFV 2019 - Proceedings of the ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, co-located with CODASPY 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SDRM: Simultaneous determination of regions and function-to-region mapping for scratchpad memories

    Pabalkar, A., Shrivastava, A., Kannan, A. & Lee, J., Jan 1 2008, High Performance Computing - HiPC 2008 - 15th International Conference, Proceedings. Springer Verlag, p. 569-582 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5374 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations
  • Seamless transition of the operating zones for the extended-Duty-Ratio boost converter

    Roy, J. & Ayyanar, R., Nov 3 2017, 2017 IEEE Energy Conversion Congress and Exposition, ECCE 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 4920-4926 7 p. 8096834

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Search breadth and the cost of search

    Lampert, C. M. & Semadeni, M., 2010, Academy of Management 2010 Annual Meeting - Dare to Care: Passion and Compassion in Management Practice and Research, AOM 2010.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Searching entities on the web by sample

    Blanco, L., Crescenzi, V., Merialdo, P. & Papotti, P., 2008, SEBD 2008 - Proceedings of the 16th Italian Symposium on Advanced Database Systems. p. 406-413 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Searching for an alternative form of life on Earth

    Davies, P., Dec 1 2007, Instruments, Methods, and Missions for Astrobiology X. 66940K. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 6694).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Searching for interacting features

    Zhao, Z. & Liu, H., 2007, IJCAI International Joint Conference on Artificial Intelligence. p. 1156-1161 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    178 Scopus citations
  • Searching for photometric variability across the L, T & Y dwarf sequence

    Rajan, A., Wilson, P. A., Patience, J., Pont, F. & De Rosa, R. J., Jun 2013, Exploring the Formation and Evolution of Planetary Systems. S299 ed. Cambridge University Press, p. 301-302 2 p. (Proceedings of the International Astronomical Union; vol. 8, no. S299).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Searching in the dark: A framework for authenticating unknown users in online social networks

    Li, L., Zhao, X. & Xue, G., 2012, 2012 IEEE Global Communications Conference, GLOBECOM 2012. p. 714-719 6 p. 6503197. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Search tactics of images' textual descriptions

    Lin, Y. L., Hong, R. Y., Lan, W. L. & Hsiao, I., Jul 10 2016, HT 2016 - Proceedings of the 27th ACM Conference on Hypertext and Social Media. Association for Computing Machinery, Inc, p. 303-308 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SEAS: A secure and efficient anonymity scheme for low-cost RFID tags

    Misra, S., Verma, M., Huang, D. & Xue, G., Nov 19 2009, Proceedings - 2009 IEEE International Conference on Communications, ICC 2009. 5199437. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • SECONDARY ION MASS SPECTROMETRIC ANALYSIS OF OXYGEN SELF-DIFFUSION IN SINGLE-CRYSTAL MgO.

    Yoo, H. I. & Petuskey, W. T., Dec 1 1984, Advances in Ceramics. American Ceramic Soc Inc, p. 394-405 12 p. (Advances in Ceramics; vol. 10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Secore: Continuous extrospection with high visibility on multi-core ARM platforms

    Zhang, P., Ngabonziza, B., Cho, H., Zhao, Z., Doupe, A. & Ahn, G-J., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, Vol. 2018-January. p. 161-163 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secrecy capacity of a class of orthogonal relay eavesdropper channels

    Aggarwal, V., Sankar, L., Calderbank, A. R. & Poor, H. V., 2009, Information Theory and Applications Workshop, ITA 2009. p. 295-300 6 p. 5044960. (Information Theory and Applications Workshop, ITA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • Secrecy throughput of MANETs with malicious nodes

    Liang, Y., Poor, H. V. & Ying, L., Nov 19 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 1189-1193 5 p. 5205992. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations
  • Secret-sharing based secure communication protocols for passive RFIDs

    Kapoor, H. & Huang, D., Dec 1 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5425639. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption

    Chen, N., Gerla, M., Huang, D. & Hong, X., Sep 28 2010, 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2010. 5546877. (9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Scopus citations
  • Secure and efficient constructions of hash, MAC and PRF for mobile devices

    Zhu, Y., Wang, S., Ma, D., Hu, H. & Ahn, G-J., 2012, 2012 IEEE Global Communications Conference, GLOBECOM 2012. p. 949-954 6 p. 6503235. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SecureCloud: Towards a comprehensive security framework for cloud computing environments

    Takabi, H., Joshi, J. B. D. & Ahn, G-J., 2010, Proceedings - 34th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 2010. p. 393-398 6 p. 5615236. (Proceedings - International Computer Software and Applications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    91 Scopus citations
  • Secure cloud-assisted location based reminder

    Zhao, X., Li, L. & Xue, G., 2013, ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. p. 323-328 6 p. (ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Secure Crowdsourced Indoor Positioning Systems

    Li, T., Chen, Y., Zhang, R., Zhang, Y. & Hedgpeth, T., Oct 8 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-April. p. 1034-1042 9 p. 8486398

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Secure crowdsourcing-based cooperative pectrum sensing

    Zhang, R., Zhang, J., Zhang, Y. & Zhang, C., Sep 2 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 2526-2534 9 p. 6567059. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Scopus citations
  • Secure data processing framework for mobile cloud computing

    Huang, D., Zhou, Z., Xu, L., Xing, T. & Zhong, Y., Jul 26 2011, 2011 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011. p. 614-618 5 p. 5928886. (2011 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    84 Scopus citations
  • Secure display for FIDO transaction confirmation

    Zhang, Y., Wang, X., Zhao, Z. & Li, H., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, Vol. 2018-January. p. 155-157 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Secure indoor positioning against signal strength attacks via optimized multi-voting

    Li, Y., Hu, Y., Zhang, R., Zhang, Y. & Hedgpeth, T., Jun 24 2019, Proceedings of the International Symposium on Quality of Service, IWQoS 2019. Association for Computing Machinery, Inc, 33. (Proceedings of the International Symposium on Quality of Service, IWQoS 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure information sharing using role-based delegation

    Ahn, G. J. & Mohan, B., 2004, International Conference on Information Technology: Coding Computing, ITCC 2004. IEEE Computer Society, p. 810-815 6 p. (International Conference on Information Technology: Coding Computing, ITCC; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Secure localization and location verification in sensor networks

    Lee, Y-H., Phadke, V., Lee, J. W. & Deshmukh, A., Jan 1 2005, Mobile Ad-hoc and Sensor Networks - First International Conference, MSN 2005, Proceedings. Springer Verlag, p. 278-287 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3794 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure localization in wireless sensor networks

    Zhang, Y., Liu, W. & Fang, Y., 2005, MILCOM 2005: Military Communications Conference 2005. Institute of Electrical and Electronics Engineers Inc., p. 3169-3175 7 p. 1606144. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Secure mediated databases

    Candan, K., Jajodia, S. & Subrahmanian, V. S., 1996, Proceedings - International Conference on Data Engineering. Los Alamitos, CA, United States: IEEE, p. 28-37 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Scopus citations
  • Secure multidimensional range queries in sensor networks

    Zhang, R., Shi, J. & Zhang, Y., Nov 27 2009, MobiHoc'09 - Proceedings of the 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 197-206 10 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    44 Scopus citations
  • Secure multi-path DATA deliver in sensor networks

    Huang, D., Dec 1 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference. 5379954. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure outsourced skyline query processing via untrusted cloud service providers

    Chen, W., Liu, M., Zhang, R., Zhang, Y. & Liu, S., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-July. 7524509

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • SECURE QUERY PROCESSING USING AI TECHNIQUES.

    Thuraisingham, M. B., Tsai, W. T. & Keefe, T. F., Jan 1 1988, Proceedings of the Hawaii International Conference on System Science. IEEE, p. 561-570 10 p. (Proceedings of the Hawaii International Conference on System Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Secure range queries in tiered sensor networks

    Shi, J., Zhang, R. & Zhang, Y., Oct 12 2009, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications. p. 945-953 9 p. 5062005. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    74 Scopus citations
  • Secure RSS-fingerprint-based indoor positioning: Attacks and countermeasures

    Yuan, L., Hu, Y., Li, Y., Zhang, R., Zhang, Y. & Hedgpeth, T., Aug 10 2018, 2018 IEEE Conference on Communications and Network Security, CNS 2018. Institute of Electrical and Electronics Engineers Inc., 8433131

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Secure sharing of electronic health records in clouds

    Wu, R., Ahn, G-J. & Hu, H., 2012, CollaborateCom 2012 - Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing. p. 711-718 8 p. 6450972. (CollaborateCom 2012 - Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    62 Scopus citations
  • Secure the internet, one home at a time

    Xu, K., Wang, F. & Jia, X., Feb 23 2016, 2015 IEEE Global Communications Conference, GLOBECOM 2015. Institute of Electrical and Electronics Engineers Inc., 7417086

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure top-k query processing via untrusted location-based service providers

    Zhang, R., Zhang, Y. & Zhang, C., Jun 4 2012, 2012 Proceedings IEEE INFOCOM, INFOCOM 2012. p. 1170-1178 9 p. 6195476. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Scopus citations
  • Secure web referral service

    Nagarajan, V. & Huang, D., May 11 2012, International Conference on Information Networking 2012, ICOIN 2012 - Conference Program. p. 53-58 6 p. 6164348. (International Conference on Information Networking).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Secure web referral services for mobile cloud computing

    Xu, L., Li, L., Nagarajan, V., Huang, D. & Tsai, W. T., Aug 5 2013, Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013. p. 584-593 10 p. 6525579. (Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Secure wireless communications via cooperative relaying and jamming

    Tang, L., Gong, X., Wu, J. & Zhang, J., Dec 1 2011, 2011 IEEE GLOBECOM Workshops, GC Wkshps 2011. p. 849-853 5 p. 6162575. (2011 IEEE GLOBECOM Workshops, GC Wkshps 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations
  • Secure wireless gateway

    Godber, A. & Dasgupta, P., 2002, Proceedings of the Workshop on Wireless Security. Association for Computing Machinery (ACM), p. 41-46 6 p. (Proceedings of the Workshop on Wireless Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Securing cyberspace: Identifying key actors in hacker communities

    Benjamin, V. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 24-29 6 p. 6283296. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Scopus citations
  • Securing dynamic spectrum use

    Cui, M., Syrotiuk, V. & Colbourn, C., 2004, IEEE Vehicular Technology Conference. 2 ed. Vol. 60. p. 1153-1157 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Securing knowledge assets and processes: Lessons from the defense and intelligence sectors

    Desouza, K. C. & Vanapalli, G. K., 2005, Proceedings of the Annual Hawaii International Conference on System Sciences. Spraque, Jr., R. H. (ed.). p. 27 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Securing P2P networks using peer reputations: Is there a silver bullet?

    Dewan, P. & Dasgupta, P., Dec 1 2005, 2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005. p. 30-36 7 p. 1405139. (2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • Securing reputation data in peer-to-peer networks

    Dewan, P. & Dasgupta, P., 2004, Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems. Gonzalez, T. (ed.). Vol. 16. p. 485-490 6 p. 439-039

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Securing resource-constrained wireless ad hoc networks

    Fang, Y. & Zhang, Y., 2007, 2007 IEEE Sarnoff Symposium, SARNOFF. 4567365. (2007 IEEE Sarnoff Symposium, SARNOFF).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Securing sensor networks with location-based keys

    Zhang, Y., Liu, W., Lou, W. & Fang, Y., 2005, 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wireless for the Masses - Ready for Take-off. p. 1909-1914 6 p. NET30-1. (IEEE Wireless Communications and Networking Conference, WCNC; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    64 Scopus citations
  • Securing social media user data - An adversarial approach

    Beigi, G., Shu, K., Zhang, Y. & Liu, H., Jul 3 2018, HT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media. Association for Computing Machinery, Inc, p. 165-173 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations