A survey on multicasting in software-defined networking S Islam, N Muslim, JW Atwood IEEE Communications Surveys & Tutorials 20 (1), 355-387, 2017 | 91 | 2017 |
A classification of reliable multicast protocols JW Atwood IEEE network 18 (3), 24-34, 2004 | 62 | 2004 |
Ultimate: unearthing latent time profiled temporal associations SA Aljawarneh, V Radhakrishna, JW Atwood Proceedings of the First International Conference on Data Science, E …, 2018 | 50 | 2018 |
Reliable multicasting in the Xpress transport protocol JW Atwood, O Catrina, J Fenton, WT Strayer Proceedings of LCN-21st Annual Conference on Local Computer Networks, 202-211, 1996 | 46 | 1996 |
Project SUE as a learning experience KC Sevcik, JW Atwood, MS Grushcow, RC Holt, JJ Horning, D Tsichritzis Proceedings of the December 5-7, 1972, fall joint computer conference, part …, 1972 | 39 | 1972 |
Particularities of data mining in medicine: lessons learned from patient medical time series data analysis S Aljawarneh, A Anguera, JW Atwood, JA Lara, D Lizcano EURASIP Journal on Wireless Communications and Networking 2019 (1), 260, 2019 | 38 | 2019 |
Scalable solutions for secure group communications R Mukherjee, JW Atwood Computer Networks 51 (12), 3525-3548, 2007 | 33 | 2007 |
A framework to add AAA functionalities in IP multicast S Islam, JW Atwood Advanced Int'l Conference on Telecommunications and Int'l Conference on …, 2006 | 30 | 2006 |
An architecture for secure and accountable multicasting JW Atwood 32nd IEEE Conference on Local Computer Networks (LCN 2007), 73-78, 2007 | 29 | 2007 |
Randomized energy aware routing algorithms in mobile ad hoc networks IT Haque, C Assi, JW Atwood Proceedings of the 8th ACM international symposium on Modeling, analysis and …, 2005 | 29 | 2005 |
Rendezvous point relocation in protocol independent multicast-sparse mode R Mukherjee, JW Atwood Telecommunication Systems 24, 207-220, 2003 | 29 | 2003 |
SIM-KM: Scalable infrastructure for multicast key management R Mukherjee, JW Atwood 29th Annual IEEE International Conference on Local Computer Networks, 335-342, 2004 | 28 | 2004 |
Proxy encryptions for secure multicast key management R Mukherjee, JW Atwood 28th Annual IEEE International Conference on Local Computer Networks, 2003 …, 2003 | 28 | 2003 |
A new fuzzing technique for software vulnerability mining Z Wu, JW Atwood, X Zhu International Conference on Software Engineering, 2009 | 24 | 2009 |
Call data record based big data analytics for smart cities MN Mouchili, JW Atwood, S Aljawarneh Proceedings of the Second International Conference on Data Science, E …, 2019 | 21 | 2019 |
Concurrency in operating systems JW Atwood Computer 9 (10), 18-26, 1976 | 16 | 1976 |
A web database Security model using the Host identity protocol X Zhu, JW Atwood 11th International Database Engineering and Applications Symposium (IDEAS …, 2007 | 15 | 2007 |
A secure multicast model for peer-to-peer and access networks using the host identity protocol X Zhu, JW Atwood 2007 4th IEEE Consumer Communications and Networking Conference, 1098-1102, 2007 | 15 | 2007 |
Securing RTP Packets Using Per‐Packet Key Exchange for Real‐Time Multimedia Y Jung, E Festijo, JW Atwood ETRI Journal 35 (4), 726-729, 2013 | 12 | 2013 |
Multicast receiver access control by IGMP-AC S Islam, JW Atwood Computer Networks 53 (7), 989-1013, 2009 | 12 | 2009 |