default search action
Douglas C. Sicker
Person information
- affiliation: Carnegie Mellon University, Department of Engineering and Public Policy, Pittsburgh, PA, USA
- affiliation (former): University of Colorado, Boulder, CO, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Minh-Sang Van Nguyen, Dinh-Thuan Do, Alireza Vahid, Sami Muhaidat, Douglas C. Sicker:
Enhancing NOMA Backscatter IoT Communications With RIS. IEEE Internet Things J. 11(4): 5604-5622 (2024) - [c71]Tiep Minh Hoang, Alireza Vahid, Douglas C. Sicker, Ashutosh Sabharwal:
Physical-Layer Spoofing in WiFi 6 to Steer the Beam Toward the Attacker. ICC 2024: 4006-4011 - 2022
- [c70]Vahid Rezaei, Jafar Haadi Jafarian, Douglas C. Sicker:
Arbitrarily Fast Switched Distributed Stabilization of Partially Unknown Interconnected Multiagent Systems: A Proactive Cyber Defense Perspective. ACC 2022: 336-341 - 2021
- [i10]Vahid Rezaei, Jafar Haadi Jafarian, Douglas C. Sicker:
Arbitrarily Fast Switched Distributed Stabilization of Partially Unknown Interconnected Multiagent Systems: A Proactive Cyber Defense Perspective. CoRR abs/2110.14199 (2021) - 2020
- [c69]Rohit Singh, Douglas C. Sicker, Kazi Mohammed Saidul Huq:
MOTH- Mobility-induced Outages in THz: A Beyond 5G (B5G) application. CCNC 2020: 1-9 - [c68]Rohit Singh, Douglas C. Sicker:
Reliable THz Communications for Outdoor based Applications- Use Cases and Methods. CCNC 2020: 1-4 - [c67]Rohit Singh, Douglas C. Sicker:
Ultra-dense low data rate (UDLD) communication in the THz. NANOCOM 2020: 21:1-21:7 - [c66]Aman Tyagi, Matthew Babcock, Kathleen M. Carley, Douglas C. Sicker:
Polarizing Tweets on Climate Change. SBP-BRiMS 2020: 107-117 - [c65]Rohit Singh, Douglas C. Sicker:
SHINE (Strategies for High-frequency INdoor Environments) with Efficient THz-AP Placement. VTC Spring 2020: 1-7 - [c64]Rohit Singh, Douglas C. Sicker:
An Analytical Model for Efficient Indoor THz Access Point Deployment. WCNC 2020: 1-8 - [i9]Rohit Singh, Douglas C. Sicker:
An Analytical Model for Efficient Indoor THz Access Point Deployment. CoRR abs/2001.11167 (2020) - [i8]Rohit Singh, Douglas C. Sicker:
SHINE (Strategies for High-frequency INdoor Environments) with Efficient THz-AP Placement. CoRR abs/2003.07015 (2020) - [i7]Aman Tyagi, Matthew Babcock, Kathleen M. Carley, Douglas C. Sicker:
Polarizing Tweets on Climate Change. CoRR abs/2008.13054 (2020) - [i6]Rohit Singh, Doug Sicker:
Ultra-dense Low Data Rate (UDLD) Communication in the THz. CoRR abs/2009.10674 (2020)
2010 – 2019
- 2019
- [j34]Frankie E. Catota, M. Granger Morgan, Douglas C. Sicker:
Cybersecurity education in a developing nation: the Ecuadorian environment. J. Cybersecur. 5(1): tyz001 (2019) - [j33]Douglas C. Sicker:
The Breadth of Policy and Regulatory Issues Facing IoT. IEEE Internet Things Mag. 2(1): 4-5 (2019) - [j32]Douglas C. Sicker:
Policy and Regulatory Issues. IEEE Internet Things Mag. 2(3): 2-3 (2019) - [j31]Kazi Mohammed Saidul Huq, Sherif Adeshina Busari, Jonathan Rodriguez, Valerio Frascolla, Wael Bazzi, Douglas C. Sicker:
Terahertz-Enabled Wireless System for Beyond-5G Ultra-Fast Networks: A Brief Survey. IEEE Netw. 33(4): 89-95 (2019) - [j30]Martin B. H. Weiss, Kevin Werbach, Douglas C. Sicker, Carlos E. Caicedo Bastidas:
On the Application of Blockchains to Spectrum Management. IEEE Trans. Cogn. Commun. Netw. 5(2): 193-205 (2019) - [j29]Rohit Singh, Douglas C. Sicker:
Part 15++: An Enhanced ID-Based Approach for Etiquette and Enforcement Management in Unlicensed Band. IEEE Trans. Cogn. Commun. Netw. 5(3): 754-767 (2019) - [j28]Sherif Adeshina Busari, Kazi Mohammed Saidul Huq, Shahid Mumtaz, Jonathan Rodriguez, Yi Fang, Douglas C. Sicker, Saba Al-Rubaye, Antonios Tsourdos:
Generalized Hybrid Beamforming for Vehicular Connectivity Using THz Massive MIMO. IEEE Trans. Veh. Technol. 68(9): 8372-8383 (2019) - [c63]Rohit Singh, Douglas C. Sicker:
Parameter Modeling for Small-Scale Mobility in Indoor THz Communication. GLOBECOM 2019: 1-6 - [c62]Logan Warberg, Alessandro Acquisti, Douglas C. Sicker:
Can Privacy Nudges be Tailored to Individuals' Decision Making and Personality Traits? WPES@CCS 2019: 175-197 - [i5]Rohit Singh, Douglas C. Sicker:
Parameter Modeling for Small-Scale Mobility in Indoor THz Communication. CoRR abs/1908.09047 (2019) - [i4]Rohit Singh, Douglas C. Sicker:
Reliable THz Communications for Outdoor based Applications- Use Cases and Methods. CoRR abs/1911.05330 (2019) - [i3]Rohit Singh, Douglas C. Sicker, Kazi Mohammed Saidul Huq:
MOTH- Mobility-induced Outages in THz: A Beyond 5G (B5G) application. CoRR abs/1911.05589 (2019) - 2018
- [j27]Frankie E. Catota, M. Granger Morgan, Douglas C. Sicker:
Cybersecurity incident response capabilities in the Ecuadorian financial sector. J. Cybersecur. 4(1): tyy002 (2018) - [j26]Douglas C. Sicker, David J. Redl:
Policy and Regulatory Issues. IEEE Internet Things Mag. 1(1): 4-5 (2018) - [c61]Rohit Singh, Douglas C. Sicker:
Improving Spectrum Efficiency in Heterogeneous Networks Using Granular Identification. CrownCom 2018: 189-199 - [c60]Rohit Singh, Douglas C. Sicker:
Part 15++: An Enhanced ID-based Approach for Etiquette and Enforcement Management in Unlicensed Band. DySPAN 2018: 1-10 - [c59]Rohit Singh, Douglas C. Sicker:
Identifier Based Greedy Approach for Mitigating Harmful Interference. VTC Fall 2018: 1-5 - 2017
- [c58]Pedro J. Bustamante, Martin B. H. Weiss, Douglas C. Sicker:
Analysis of the experimental licenses of the Federal Communications Commission (FCC). DySPAN 2017: 1 - 2016
- [j25]Hongxiang Li, Bin Li, Tuan Tran, Douglas C. Sicker:
Transmission Schemes for Multicasting Hard Deadline Constrained Prioritized Data in Wireless Multimedia Streaming. IEEE Trans. Wirel. Commun. 15(3): 1631-1641 (2016) - [c57]Nathaniel Horner, Ines Azevedo, Doug Sicker, Yuvraj Agarwal:
Dynamic data center load response to variability in private and public electricity costs. SmartGridComm 2016: 80-85 - 2015
- [j24]Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. Sicker:
GRaTIS: Free Bits in the Network. IEEE Trans. Mob. Comput. 14(1): 72-85 (2015) - 2014
- [j23]Clemith J. Houston Jr., Douglas C. Sicker:
Maturity and Process Capability Models and Their Use in Measuring Resilience in Critical Infrastructure Protection Sectors. Int. J. Strateg. Inf. Technol. Appl. 5(2): 44-63 (2014) - [j22]Gábor Molnár, Scott J. Savage, Douglas C. Sicker:
Measuring Broadband Internet Prices. J. Telecommun. High Technol. Law 12(1): 73-88 (2014) - [j21]Eric Anderson, Caleb T. Phillips, Douglas C. Sicker, Dirk Grunwald:
Optimization Decomposition for Scheduling and System Configuration in Wireless Networks. IEEE/ACM Trans. Netw. 22(1): 271-284 (2014) - [c56]Murad Kaplan, Chenyu Zheng, Matthew Monaco, Eric Keller, Douglas C. Sicker:
WASP: a software-defined communication layer for hybrid wireless networks. ANCS 2014: 5-16 - [c55]Chenyu Zheng, Lijun Chen, Douglas C. Sicker, Xinying Zeng:
Hybrid cellular-MANETs in practice: A microblogging system for smart devices in disaster areas. IWCMC 2014: 648-653 - [c54]Chenyu Zheng, Lijun Chen, Douglas C. Sicker:
Hybrid cellular-MANETs: An energy-aware routing design. WONS 2014: 9-16 - 2013
- [j20]Caleb T. Phillips, Douglas C. Sicker, Dirk Grunwald:
A Survey of Wireless Path Loss Prediction and Coverage Mapping Methods. IEEE Commun. Surv. Tutorials 15(1): 255-270 (2013) - [j19]Chenyu Zheng, Douglas C. Sicker:
A Survey on Biologically Inspired Algorithms for Computer Networking. IEEE Commun. Surv. Tutorials 15(3): 1160-1191 (2013) - [c53]Aveek Dutta, Dola Saha, Dirk Grunwald, Douglas C. Sicker:
CODIPHY: composing on-demand intelligent physical layers. SRIF@SIGCOMM 2013: 1-8 - [c52]Chenyu Zheng, Douglas C. Sicker, Lijun Chen:
Self-organized context-aware hybrid MANETs. WONS 2013: 128-130 - 2012
- [c51]Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. Sicker:
GRaTIS: Sensing and intelligence for performance in the presence of legacy networks. CrownCom 2012: 42-47 - [c50]Caleb T. Phillips, Michael Ton, Douglas C. Sicker, Dirk Grunwald:
Practical radio environment mapping with geostatistics. DySPAN 2012: 422-433 - [c49]Aveek Dutta, Dola Saha, Dirk Grunwald, Douglas C. Sicker:
Secret Agent Radio: Covert Communication through Dirty Constellations. Information Hiding 2012: 160-175 - [c48]Jun Du, Chenyu Zheng, Zeqi Zhang, Zhongqiang Zhai, Yang Yu, Nengqiang He, Douglas C. Sicker, Yong Ren:
A smartphone-based traffic information service platform for pedestrian and bicycle systems. ITSC 2012: 685-690 - 2011
- [j18]Eric Anderson, Caleb T. Phillips, Douglas C. Sicker, Dirk Grunwald:
Modeling environmental effects on directionality in wireless networks. Math. Comput. Model. 53(11-12): 2078-2092 (2011) - [c47]Caleb T. Phillips, Scott M. Raynel, Jamie Curtis, Sam Bartels, Douglas C. Sicker, Dirk Grunwald, Tony McGregor:
The Efficacy of Path Loss Models for Fixed Rural Wireless Links. PAM 2011: 42-51 - [c46]Christopher B. Schenk, Douglas C. Sicker:
Finding Event-Specific Influencers in Dynamic Social Networks. SocialCom/PASSAT 2011: 501-504 - [i2]Caleb T. Phillips, Douglas C. Sicker, Dirk Grunwald:
The Stability of The Longley-Rice Irregular Terrain Model for Typical Problems. CoRR abs/1109.1843 (2011) - 2010
- [j17]Jang Hyun Baek, Jong Hun Park, Douglas C. Sicker, Taehan Lee:
Modeling and Performance Analysis of the Movement-Based Registration with Implicit Registration. IEICE Trans. Commun. 93-B(5): 1306-1309 (2010) - [c45]Aveek Dutta, Dola Saha, Dirk Grunwald, Douglas C. Sicker:
An architecture for software defined cognitive radio. ANCS 2010: 5 - [c44]Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, Damon McCoy, Douglas C. Sicker:
Practical Defenses for Evil Twin Attacks in 802.11. GLOBECOM 2010: 1-6 - [c43]Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. Sicker:
Channel Assignment in Virtual Cut-through Switching Based Wireless Mesh Networks. ICDCN 2010: 271-282 - [c42]Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. Sicker:
Active radar - A cooperative approach using multicarrier communication. LCN 2010: 627-630 - [c41]Aveek Dutta, Dola Saha, Dirk Grunwald, Douglas C. Sicker:
Practical implementation of blind synchronization in NC-OFDM based cognitive radio networks. CoRoNet@MOBICOM 2010: 1-6 - [c40]Gary V. Yee, Dirk Grunwald, Douglas C. Sicker:
Understanding the joint application of wireless optimizations. WiNTECH 2010: 31-38 - [c39]Eric Anderson, Caleb T. Phillips, Gary V. Yee, Douglas C. Sicker, Dirk Grunwald:
Challenges in Deploying Steerable Wireless Testbeds. TRIDENTCOM 2010: 231-240
2000 – 2009
- 2009
- [j16]Christian Doerr, Dirk Grunwald, Douglas C. Sicker:
Local control of cognitive radio networks. Ann. des Télécommunications 64(7-8): 503-534 (2009) - [j15]Dola Saha, Dirk Grunwald, Douglas C. Sicker:
Wireless innovation through software radios. Comput. Commun. Rev. 39(1): 62-67 (2009) - [c38]Kevin S. Bauer, Damon McCoy, Eric W. Anderson, Markus Breitenbach, Gregory Z. Grudic, Dirk Grunwald, Douglas C. Sicker:
The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can. GLOBECOM 2009: 1-6 - [c37]Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. Sicker:
PHY Aided MAC - A New Paradigm. INFOCOM 2009: 2986-2990 - [c36]Kevin S. Bauer, Dirk Grunwald, Douglas C. Sicker:
Predicting Tor path compromise by exit port. IPCCC 2009: 384-387 - [c35]Eric Anderson, Caleb T. Phillips, Harold Gonzales, Kevin S. Bauer, Douglas C. Sicker, Dirk Grunwald:
SniffMob: inferring human contact patterns using wireless devices. HotPlanet@MobiSys 2009: 4 - [c34]Kevin S. Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas C. Sicker:
Physical Layer Attacks on Unlinkability in Wireless LANs. Privacy Enhancing Technologies 2009: 108-127 - [c33]Aveek Dutta, Dola Saha, Dirk Grunwald, Douglas C. Sicker:
SMACK: a SMart ACKnowledgment scheme for broadcast messages in wireless networks. SIGCOMM 2009: 15-26 - [c32]Kevin S. Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas C. Sicker:
Performing traffic analysis on a wireless identifier-free link layer. Richard Tapia Celebration of Diversity in Computing Conference 2009: 18-23 - [c31]Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Douglas C. Sicker:
BitStalker: Accurately and efficiently monitoring bittorrent traffic. WIFS 2009: 181-185 - [c30]Eric Anderson, Caleb T. Phillips, Douglas C. Sicker, Dirk Grunwald:
Modeling environmental effects on directionality in wireless networks. WiOpt 2009: 1-7 - [c29]Eric Anderson, Gary V. Yee, Caleb T. Phillips, Douglas C. Sicker, Dirk Grunwald:
The impact of directional antenna models on simulation accuracy. WiOpt 2009: 1-7 - [c28]Caleb T. Phillips, Douglas C. Sicker, Dirk Grunwald, Suresh Singh:
Techniques for simulation of realistic infrastructure wireless network traffic. WiOpt 2009: 1-7 - [p2]Robert McTasney, Dirk Grunwald, Douglas C. Sicker:
Low Latency in Wireless Mesh Networks. Guide to Wireless Mesh Networks 2009: 379-424 - 2008
- [j14]Timothy X. Brown, Douglas C. Sicker:
Examining the Viability of Broadband Wireless Access under Alternative Licensing Models in the TV Broadcast Bands. EURASIP J. Wirel. Commun. Netw. 2008 (2008) - [c27]Caleb T. Phillips, Russell Senior, Douglas C. Sicker, Dirk Grunwald:
Robust Coverage and Performance Testing for Large-Area Wireless Networks. AccessNets 2008: 457-469 - [c26]Christian Doerr, Dirk Grunwald, Douglas C. Sicker:
Local Independent Control of Cognitive Radio Networks. CrownCom 2008: 1-9 - [c25]Robert McTasney, Dirk Grunwald, Douglas C. Sicker:
Interference Mitigation In Wireless Mesh Networks Through STDMA Wormhole Switching. CrownCom 2008: 1-6 - [c24]Christian Doerr, Douglas C. Sicker, Dirk Grunwald:
Dynamic Control Channel Assignment in Cognitive Radio Networks Using Swarm Intelligence. GLOBECOM 2008: 4866-4871 - [c23]Christian Doerr, Michael Colagrosso, Dirk Grunwald, Douglas C. Sicker:
Scalability of cognitive radio control algorithms. ISWPC 2008: 685-692 - [c22]Caleb T. Phillips, Suresh Singh, Douglas C. Sicker, Dirk Grunwald:
Applying models of user activity for dynamic power management in wireless devices. Mobile HCI 2008: 315-318 - [c21]Damon McCoy, Kevin S. Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker:
Shining Light in Dark Places: Understanding the Tor Network. Privacy Enhancing Technologies 2008: 63-76 - [c20]Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Douglas C. Sicker:
BitBlender: Light-Weight Anonymity for BitTorrent. SecureComm 2008 - [c19]Eric W. Anderson, Caleb T. Phillips, Kevin S. Bauer, Dirk Grunwald, Douglas C. Sicker:
Modeling directionality in wireless networks: extended abstract. SIGMETRICS 2008: 443-444 - [c18]Christian Doerr, Dirk Grunwald, Douglas C. Sicker:
Enhancing Cognitive Radio Algorithms Through Efficient, Automatic Adaptation Management. VTC Fall 2008: 1-5 - [c17]Robert McTasney, Dirk Grunwald, Douglas C. Sicker:
Multichannel Wormhole Switching vs. CSMA/CA for Wireless Mesh Networking. WCNC 2008: 2105-2110 - [c16]Aveek Dutta, Jeff Fifield, Graham Schelle, Dirk Grunwald, Douglas C. Sicker:
An intelligent physical layer for cognitive radio networks. WICON 2008: 12 - 2007
- [j13]Troy Weingart, Douglas C. Sicker, Dirk Grunwald:
Identifying Opportunities for Exploiting Cross-Layer Interactions in Adaptive Wireless Systems. Adv. Multim. 2007: 49604:1-49604:11 (2007) - [j12]Jang Hyun Baek, Kyung Hee Kim, Douglas C. Sicker:
Modeling and Optimization of Zone-Based Registration for Mobile Communication Network. Asia Pac. J. Oper. Res. 24(5): 667-685 (2007) - [j11]Douglas C. Sicker:
The technology of dynamic spectrum access and its challenges [Guest Editorial]. IEEE Commun. Mag. 45(6): 48 (2007) - [j10]Douglas C. Sicker, Paul Ohm, Shannon Gunaji:
The Analog Hole and the Price Of Music: An Empirical Study. J. Telecommun. High Technol. Law 5(3): 573-588 (2007) - [j9]Troy Weingart, Douglas C. Sicker, Dirk Grunwald:
A Statistical Method for Reconfiguration of Cognitive Radios. IEEE Wirel. Commun. 14(4): 34-40 (2007) - [c15]John Giacomoni, John K. Bennett, Antonio Carzaniga, Douglas C. Sicker, Manish Vachharajani, Alexander L. Wolf:
Frame shared memory: line-rate networking on commodity hardware. ANCS 2007: 27-36 - [c14]Troy Weingart, Gary V. Yee, Douglas C. Sicker, Dirk Grunwald:
Implementation of a Reconfiguration Algorithm for Cognitive Radio. CrownCom 2007: 171-180 - [c13]Christian Doerr, Douglas C. Sicker, Dirk Grunwald:
Optimizing for sparse training of Cognitive Radio networks. CWNETS@QSHINE 2007: 5:1-5:7 - [c12]Christian Doerr, Douglas C. Sicker, Dirk Grunwald:
Experiences Implementing Cognitive Radio Control Algorithms. GLOBECOM 2007: 4045-4050 - [c11]Robert McTasney, Dirk Grunwald, Douglas C. Sicker:
Low-Latency Multichannel Wireless Mesh Networks. ICCCN 2007: 1082-1087 - [c10]Douglas C. Sicker, Paul Ohm, Dirk Grunwald:
Legal issues surrounding monitoring during network research. Internet Measurement Conference 2007: 141-148 - [c9]Damon McCoy, Douglas C. Sicker, Dirk Grunwald:
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks. SECON 2007: 678-684 - [c8]Christian Doerr, Douglas C. Sicker, Dirk Grunwald:
What a cognitive radio network could learn from a school of fish. WICON 2007: 8 - [c7]Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker:
Low-resource routing attacks against tor. WPES 2007: 11-20 - 2006
- [j8]John M. Chapin, Douglas C. Sicker:
IEEE Optical Communications [Guest editorial]. IEEE Commun. Mag. 44(5): 30 (2006) - [j7]John Chaplin, Douglas C. Sicker:
Safety and certification for new radio technologies. IEEE Commun. Mag. 44(9): 30-31 (2006) - [j6]Douglas C. Sicker, Lisa Blumensaadt:
Misunderstanding the Layered Model(s). J. Telecommun. High Technol. Law 4(2): 299-320 (2006) - [j5]Hannes Tschofenig, Rainer Falk, Jon Peterson, Jeff Hodges, Douglas C. Sicker, James M. Polk:
Using SAML to protect the session initiation protocol (SIP). IEEE Netw. 20(5): 14-17 (2006) - [c6]Anmol Sheth, Christian Doerr, Dirk Grunwald, Richard Han, Douglas C. Sicker:
MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs. MobiSys 2006: 191-204 - [i1]Jon Peterson, James M. Polk, Douglas C. Sicker, Hannes Tschofenig:
Trait-Based Authorization Requirements for the Session Initiation Protocol (SIP). RFC 4484: 1-15 (2006) - 2005
- [c5]Abhijit Sur, Douglas C. Sicker:
Multi layer rules based framework for vertical handoff. BROADNETS 2005: 613-624 - [c4]Jang Hyun Baek, Jae Young Seo, Douglas C. Sicker:
Performance Analysis and Optimization of an Improved Dynamic Movement-Based Location Update Scheme in Mobile Cellular Networks. ICCSA (4) 2005: 528-537 - 2004
- [j4]Tom D. Lookabaugh, Douglas C. Sicker:
Selective encryption for consumer applications. IEEE Commun. Mag. 42(5): 124-129 (2004) - [j3]Michael Stukas, Douglas C. Sicker:
An Evaluation of VoIP Traversal of Firewalls and NATs within an Enterprise Environment. Inf. Syst. Frontiers 6(3): 219-228 (2004) - [j2]Douglas C. Sicker, Tom D. Lookabaugh:
VoIP Security: Not an Afterthought. ACM Queue 2(6): 56-64 (2004) - [c3]Tom D. Lookabaugh, Douglas C. Sicker:
Selective encryption for consumer applications. CCNC 2004: 516-521 - [p1]Tom D. Lookabaugh, Douglas C. Sicker:
Security and Lock-In. Economics of Information Security 2004: 225-246 - 2003
- [c2]Douglas C. Sicker:
Applying a Layered Policy Model to IP Based Voice Services. HICSS 2003: 151 - [c1]Douglas C. Sicker, Ameet Kulkarni, Anand Chavali, Mudassir Fajandar:
A Federated Model for Secure Web-Based Videoconferencing. ITCC 2003: 396-400 - 2002
- [j1]Douglas C. Sicker, Joshua L. Mindel:
Refinements of a Layered Model for Telecommunications Policy. J. Telecommun. High Technol. Law 1(1): 69-94 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint