Stephen W. Neville
According to our database1,
Stephen W. Neville
authored at least 47 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Small Tamper-Resistant Anti-Recycling IC Sensor With a Reused I/O Interface and DC Signalling.
IEEE Open J. Circuits Syst., 2024
Exploring Emerging Industry Trends for Large-Scale Software System Performance Predictability: The Role of Apache and Xen.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2024
On the Impact of Reliable Protocols on Run-Time Software System Performance Predictability.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2024
2023
Leveraging Public Information to Fit a Compact Hot Carrier Injection Model to a Target Technology.
IEEE Access, 2023
2018
An analog of the prime number theorem for finite fields via truncated polylogarithm expansions.
Math. Comput., 2018
Int. J. Inf. Technol. Decis. Mak., 2018
Proceedings of the IEEE 61st International Midwest Symposium on Circuits and Systems, 2018
2017
Proceedings of the IEEE Pacific Rim Conference on Communications, 2017
DockerSim: Full-stack simulation of container-based Software-as-a-Service (SaaS) cloud deployments and environments.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2017
2015
Proceedings of the IEEE Pacific Rim Conference on Communications, 2015
Consumers' Sentiment Analysis of Popular Phone Brands and Operating System Preference Using Twitter Data: A Feasibility Study.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
IEEE Trans. Computers, 2014
Big file protocol (BFP): A traffic shaping approach for efficient transport of large files.
Proceedings of the IEEE 15th International Conference on High Performance Switching and Routing, 2014
Statistical Assessment of Sybil-Placement Strategies within DHT-Structured Peer-to-Peer Botnets.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
Clust. Comput., 2013
Empirical Evidence for Non-equilibrium Behaviors within Peer-to-Peer Structured Botnets.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Proceedings of the 9th International Conference on Information, 2013
Proceedings of the Eighth International Conference on P2P, 2013
2012
Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation.
IEEE Trans. Inf. Forensics Secur., 2012
Proceedings of the 2012 Seventh International Conference on Broadband, 2012
Assessing the Expected Performance of the OLSR Routing Protocol for Denser Urban Core Ad Hoc Network Deployments.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
Proceedings of the 2012 Seventh International Conference on P2P, 2012
Assessing Trade-Offs between Stealthiness and Node Recruitment Rates in Peer-to-Peer Botnets.
Proceedings of the 2012 Seventh International Conference on P2P, 2012
2011
Efficiently Achieving Full Three-Way Non-repudiation in Consumer-Level eCommerce and M-Commerce Transactions.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 22nd International Symposium on Personal, 2011
Controlling spam and spear phishing via peered network overlays and non-repudiable traceback.
Proceedings of the 2011 eCrime Researchers Summit, 2011
Proceedings of the 2011 International Conference on Broadband, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
Dynamic Resource Allocation in Computing Clouds Using Distributed Multiple Criteria Decision Analysis.
Proceedings of the IEEE International Conference on Cloud Computing, 2010
2009
On the Empirical Evaluation of Spatial and Temporal Characteristics of Ultra-Wideband Channel.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009
Proceedings of IEEE International Conference on Communications, 2009
The Rational for Developing Larger-scale 1000+ Machine Emulation-Based Research Test Beds.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008
2006
2005
Proceedings of the IEEE International Conference on Systems, 2005
Necessary conditions for determining a robust time threshold in standard INFOSEC alert clustering algorithms.
Proceedings of the IEEE International Conference on Systems, 2005
1998
A model based approach to fault detection for the reverse path of cable television networks.
IEEE Trans. Broadcast., 1998
1996
Intell. Autom. Soft Comput., 1996