Подписаться
Phillip Bradford
Phillip Bradford
University of Connecticut, Stamford
Подтвержден адрес электронной почты в домене uconn.edu
Название
Процитировано
Процитировано
Год
A layered approach to insider threat detection and proactive forensics
P Bradford, N Hu
Proceedings of the Twenty-First Annual Computer Security Applications …, 2005
512005
Towards proactive computer-system forensics
PG Bradford, M Brown, J Perdue, B Self
International Conference on Information Technology: Coding and Computing …, 2004
492004
Applying role based access control and genetic algorithms to insider threat detection
N Hu, PG Bradford, J Liu
Proceedings of the 44th annual Southeast regional conference, 790-791, 2006
392006
Single column discrepancy and dynamic max-mini optimizations for quickly finding the most parsimonious evolutionary trees
PW Purdom, Jr, PG Bradford, K Tamura, S Kumar
Bioinformatics 16 (2), 140-151, 2000
392000
Efficient matrix chain ordering in polylog time
PG Bradford, GJE Rawlins, GE Shannon
SIAM Journal on Computing 27 (2), 466-490, 1998
39*1998
Optimal prefix-free codes for unequal letter costs: Dynamic programming with the Monge property
P Bradford, MJ Golin, LL Larmore, W Rytter
Journal of Algorithms 42 (2), 277-303, 2002
362002
Matching nuts and bolts faster
N Alon, PG Bradford, R Fleischer
Information processing letters 59 (3), 123-127, 1996
351996
Implementing the TEA algorithm on sensors
S Liu, OV Gavrylyako, PG Bradford
Proceedings of the 42nd annual Southeast regional conference, 64-69, 2004
332004
Efficient Parallel Dynamic Programming
PG Bradford
Extended Abstract in the Proceedings of the 30thAllerton Conference on …, 1992
321992
A hierarchical anonymous routing scheme for mobile ad-hoc networks
J Liu, X Hong, J Kong, Q Zheng, N Hu, PG Bradford
MILCOM 2006-2006 IEEE Military Communications conference, 1-7, 2006
312006
Parallel dynamic programming
PG Bradford
Indiana University, 1995
291995
Deferred assignment scheduling in cluster-based servers
V Ungureanu, B Melamed, M Katehakis, PG Bradford
Cluster Computing 9, 57-65, 2006
272006
Protocol completion incentive problems in cryptographic Vickrey auctions
PG Bradford, S Park, MH Rothkopf, H Park
Electronic Commerce Research 8, 57-77, 2008
262008
Security for fixed sensor networks
N Hu, RK Smith, PG Bradford
Proceedings of the 42nd annual Southeast regional conference, 212-213, 2004
242004
Labeled shortest paths in digraphs with negative and positive edge weights
PG Bradford, DA Thomas
RAIRO-Theoretical Informatics and Applications 43 (3), 567-583, 2009
182009
A formalization of the Turing Test
PG Bradford, M Wollowski
ACM SIGART Bulletin 6 (4), 3-10, 1995
171995
Privacy‐preserving secure relative localization in vehicular networks
L Tang, X Hong, PG Bradford
Security and Communication Networks 1 (3), 195-204, 2008
152008
Foundations of security for hash chains in ad hoc networks
PG Bradford, OV Gavrylyako
Cluster Computing 8, 189-195, 2005
152005
Optimal prefix-free codes for unequal letter costs: dynamic programming with the monge property
P Bradford, MJ Golin, LL Larmore, W Rytter
European Symposium on Algorithms, 43-54, 1998
151998
Using digital chains of custody on constrained devices to verify evidence
PG Bradford, DA Ray
2007 IEEE Intelligence and Security Informatics, 8-15, 2007
132007
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20