1,597 results on '"Towsley, Don"'
Search Results
202. Future Applications
203. Secrecy in Communications
204. Dynamic Key Management in a Smart Grid
205. Communication Security and Key Safety
206. Dynamic Secrets
207. Reliability Analysis for Communication Security
208. Dynamic Wireless Security
209. I/O-efficient calculation of H-group closeness centrality over disk-resident graphs
210. Security importance assessment for system objects and malware detection
211. Enabling opportunistic search and placement in cache networks
212. Smoothing Effect of the Superposition of Homogeneous Sources in Tandem Networks
213. Quantum Walk Neural Networks for Graph-Structured Data
214. Minimizing Response Times and Queue Lengths in Systems of Parallel Queues
215. Asymptotic Behavior of a Multiplexer Fed by a Long-Range Dependent Process
216. Probabilistic Inference on Integrity for Access Behavior Based Malware Detection
217. On the Capacity Region of a Quantum Switch with Entanglement Purification
218. A Quantum Overlay Network for Efficient Entanglement Distribution
219. The Online Knapsack Problem with Departures
220. Resource Allocation for Rate and Fidelity Maximization in Quantum Networks
221. Introduction
222. NONSTANDARD REGULAR VARIATION OF IN-DEGREE AND OUT-DEGREE IN THE PREFERENTIAL ATTACHMENT MODEL
223. Characterization of User Online Dating Behavior and Preference on a Large Online Dating Site
224. Efficient on-line processor scheduling for a class of IRIS (increasing reward with increasing service) real-time tasks
225. Trace driven analysis of write caching policies for disks
226. Resisting structural re-identification in anonymized social networks
227. Foundations of Quantum Federated Learning Over Classical and Quantum Networks
228. Quantum walk neural networks with feature dependent coins
229. Routing entanglement in the quantum internet
230. Percolation thresholds for photonic quantum computing
231. Resource Sharing in the Edge: A Distributed Bargaining-Theoretic Approach
232. On optimal monitor placement for localizing node failures via network tomography
233. Accurate DNS query characteristics estimation via active probing
234. The Online Knapsack Problem with Departures
235. Whom to follow: Efficient followee selection for cascading outbreak detection on online social networks
236. On the Analysis and Evaluation of Proximity-based Load-balancing Policies
237. A New Upper Bound on Cache Hit Probability for Non-Anticipative Caching Policies
238. On the Capacity Region of Bipartite and Tripartite Entanglement Switching
239. Quantum Network Tomography with Multi-party State Distribution
240. The Capacity Region of Entanglement Switching: Stability and Zero Latency
241. Scheduling Quantum Teleportation with Noisy Memories
242. Measurement-Based Quantum Computing as a Tangram Puzzle
243. Improving Random Walk Estimation Accuracy with Uniform Restarts
244. Performance evaluation of hierarchical TTL-based cache networks
245. A Network Formation Game Approach to Study BitTorrent Tit-for-Tat
246. Modeling TCP in a Multi-rate Multi-user CDMA System
247. Quantum Networks for Open Science (QNOS) Workshop
248. Performance Modeling of Epidemic Routing
249. Exploiting the IPID Field to Infer Network Path and End-System Characteristics
250. Classifying latent infection states in complex networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.