PaperExposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicastGal Badishi, Idit Keidar, et al.IEEE TDSC
PaperScheduling algorithms for the broadcast delivery of digital productsJoel L. Wolf, Mark S. Squillante, et al.IEEE Transactions on Knowledge and Data Engineering
PaperTight bounds for delay-sensitive aggregationYvonne Anne Pignolet, Stefan Schmid, et al.Discrete Mathematics and Theoretical Computer Science
Conference paperNon-gaussian statistical timing analysis using second-order polynomial fittingLerong Cheng, Jinjun Xiong, et al.ASP-DAC 2008