Paul S. Fisher

According to our database1, Paul S. Fisher authored at least 46 papers between 1973 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
fFTP: a fast file transfer protocol for home N-screen platform.
Pers. Ubiquitous Comput., 2018

Mining intelligent solution to compensate missing data context of medical IoT devices.
Pers. Ubiquitous Comput., 2018

2017
Generation of Finite Inductive, Pseudo Random, Binary Sequences.
J. Inf. Process. Syst., 2017

Packet Damage-Resistant Analysis Using a Data Mining Mechanism in Wireless Sensor Networks.
Proceedings of the 2017 International Conference on Intelligent Environments, 2017

2015
A Smart Backoff Scheme for Multicast Flows in Wireless LAN.
Smart Comput. Rev., 2015

APPMPS: An Asynchronous Parallel Plastic Multiprocessing System.
IEEE Syst. J., 2015

2014
Lossless Data Hiding for Binary Document Images Using n n -Pairs Pattern.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Adaptive video streaming over HTTP.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
Implementation of framework to identify potential phishing websites.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

2012
A reliable overlay video transport protocol for multicast agents in wireless mesh networks.
Int. J. Commun. Syst., 2012

Motion recognition with smart phone embedded 3-axis accelerometer sensor.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

2011
On Combining Fractional-Pixel Interpolation and Motion Estimation: A Cost-Effective Approach.
IEEE Trans. Circuits Syst. Video Technol., 2011

An Adaptive Primary Path Switching Scheme for Seamless mSCTP Handover.
Smart Comput. Rev., 2011

A Fair Transmission Opportunity by Detecting and Punishing the Malicious Wireless Stations in IEEE 802.11e EDCA Network.
IEEE Syst. J., 2011

2010
A Lightweight SCTP for Partially Reliable Overlay Video Multicast Service for Mobile Terminals.
IEEE Trans. Multim., 2010

Dynamic cluster header selection and conditional re-clustering for wireless sensor networks.
IEEE Trans. Consumer Electron., 2010

(N, 1) secret sharing approach based on steganography with gray digital images.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

An Enhancement of mSCTP Handover with an Adaptive Primary Path Switching Scheme.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

Inter-mode decision with varied computational complexity.
Proceedings of the Visual Communications and Image Processing 2010, 2010

The Complexity and Application of Syntactic Pattern Recognition Using Finite Inductive Strings.
Proceedings of the Pattern Recognition in Bioinformatics, 2010

An Integrated Algorithm for Fractional Pixel Interpolation and Motion Estimation of H.264.
Proceedings of the 2010 Data Compression Conference (DCC 2010), 2010

Optimizing XML-to-SQL query translation for analytical databases using intelligent path derivation.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

2009
A multiplayer real-time game protocol architecture for reducing network latency.
IEEE Trans. Consumer Electron., 2009

Syntactic Pattern Recognition Using Finite Inductive Strings.
Proceedings of the Pattern Recognition in Bioinformatics, 2009

FI-based file access predictor.
Proceedings of the 47th Annual Southeast Regional Conference, 2009

2008
FI-Based Local Group Key Generation/Distribution for Mobile Multicast in a Hierarchical Mobile IPv6 Network.
KSII Trans. Internet Inf. Syst., 2008

Secure Scalable and Reliable Mobile Multicast with FI-Based Local Group Key.
Proceedings of the 2008 International Conference on Internet Computing, 2008

An object discarding policy with FI systems for cooperative hybrid caching architecture.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

2007
Application of FI sequences for authentication in a network.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2000
Rule generation based on rough set theory.
Proceedings of the Data Mining and Knowledge Discovery: Theory, 2000

Knowledge acquisition: neural network learning.
Proceedings of the Data Mining and Knowledge Discovery: Theory, 2000

1999
A novel logical neuron model.
Int. J. Intell. Syst., 1999

1995
Image quality measures and their performance.
IEEE Trans. Commun., 1995

1994
Efficient Parallel Algorithms for Pattern Recognition.
Parallel Algorithms Appl., 1994

Mavric's Brain.
Proceedings of the Seventh International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, 1994

1982
A troughput model: sequential vs concurrent processing.
Inf. Syst., 1982

Evolving to distributed database environments.
Comput. Commun., 1982

1981
Software Engineering: An Example of Misuse.
Softw. Pract. Exp., 1981

1979
Considerations for determining the degrees of centralization or decentralization in the computing environment.
Inf. Manag., 1979

Data access in distributed data base management systems.
Inf. Manag., 1979

Data base management system environments present and future.
Proceedings of the Second symposium on Small systems, 1979

1978
The language problem for small systems (Panel Session).
Proceedings of the first SIGMINI symposium on Small systems, 1978

Mediator: An Integrated Approach to Information Retrieval.
Proceedings of the ACM-SIGIR, 1978

1976
SIGMOD(Paper Session).
Proceedings of the 1976 Annual Conference, Houston, Texas, USA, October 20-22, 1976, 1976

Evaluation of conversion to a back-end data base management system.
Proceedings of the 1976 Annual Conference, Houston, Texas, USA, October 20-22, 1976, 1976

1973
Separation of introductory programming and language instruction.
Proceedings of the 3rd SIGCSE Technical Symposium on Computer Science Education, 1973


  Loading...