2008 | ||
---|---|---|
41 | EE | George Cybenko, Valentino Crespi: Learning Hidden Markov Models using Non-Negative Matrix Factorization CoRR abs/0809.4086: (2008) |
2007 | ||
40 | EE | George Cybenko, Vincent H. Berk: Process Query Systems. IEEE Computer 40(1): 62-70 (2007) |
39 | EE | Jason I. Hong, Mahadev Satyanarayanan, George Cybenko: Guest Editors' Introduction: Security & Privacy. IEEE Pervasive Computing 6(4): 15-17 (2007) |
2006 | ||
38 | EE | George Cybenko, Vincent H. Berk, Ian D. Gregorio-De Souza, Chad Behre: Practical Autonomic Computing. COMPSAC (1) 2006: 3-14 |
37 | EE | George Cybenko: Why Johnny Can't Evaluate Security Risk. IEEE Security & Privacy 4(1): 5 (2006) |
36 | EE | Guofei Jiang, George Cybenko, James A. Hendler: Semantic Interoperability and Information Fluidity. Int. J. Cooperative Inf. Syst. 15(1): 1-22 (2006) |
2005 | ||
35 | EE | Christopher Roblee, Vincent H. Berk, George Cybenko: Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. ICAC 2005: 123-133 |
34 | EE | John Yen, Robert Popp, George Cybenko, Latanya Sweeney, Paul Rosenzweig: Homeland Security. IEEE Intelligent Systems 20(5): 76-86 (2005) |
33 | EE | George Cybenko: The One-Eyed Man Is King. IEEE Security & Privacy 3(4): 4-5 (2005) |
32 | EE | Diego Hernando, Valentino Crespi, George Cybenko: Efficient computation of the hidden Markov model entropy for a given observation sequence. IEEE Transactions on Information Theory 51(7): 2681-2685 (2005) |
2004 | ||
31 | George Cybenko, Annarita Giani, Paul Thompson: Cognitive Hacking. Advances in Computers 60: 36-75 (2004) | |
30 | EE | Guofei Jiang, George Cybenko: Functional Validation in Grid Computing. Autonomous Agents and Multi-Agent Systems 8(2): 119-130 (2004) |
29 | EE | George Cybenko: From the Editors: Don't Bring a Knife to a Gunfight. IEEE Security & Privacy 2(2): 5 (2004) |
28 | EE | George Cybenko: Security Alchemy. IEEE Security & Privacy 2(6): 5 (2004) |
2003 | ||
27 | EE | Javed A. Aslam, Zack J. Butler, Florin Constantin, Valentino Crespi, George Cybenko, Daniela Rus: Tracking a moving object with a binary sensor network. SenSys 2003: 150-161 |
26 | EE | George Cybenko: A Critical Need, An Ambitious Mission, A New Magazine. IEEE Security & Privacy 1(1): 5-9 (2003) |
25 | EE | George Cybenko: From the Editor: Sapphire/Slammer Redux. IEEE Security & Privacy 1(2): 6 (2003) |
24 | EE | George Cybenko: Boiling Frogs? IEEE Security & Privacy 1(4): 5 (2003) |
23 | EE | George Cybenko: From the Editors: Privacy Is the Issue. IEEE Security & Privacy 1(6): 5-7 (2003) |
22 | EE | Valentino Crespi, George Cybenko, Guofei Jiang: The theory of trackability with applications to sensor networks. TOSN 4(3): (2003) |
2002 | ||
21 | EE | George Cybenko, Annarita Giani, Paul Thompson: Cognitive Hacking: A Battle for the Mind. IEEE Computer 35(8): 50-56 (2002) |
20 | David Kotz, George Cybenko, Robert S. Gray, Guofei Jiang, Ronald A. Peterson, Martin O. Hofmann, Daria A. Chacón, Kenneth R. Whitebread, James A. Hendler: Performance Analysis of Mobile Agents for Filtering Data Streams on Wireless Networks. MONET 7(2): 163-174 (2002) | |
19 | Robert S. Gray, George Cybenko, David Kotz, Ronald A. Peterson, Daniela Rus: D'Agents: Applications and performance of a mobile-agent system. Softw., Pract. Exper. 32(6): 543-573 (2002) | |
2000 | ||
18 | EE | David Kotz, Guofei Jiang, Robert S. Gray, George Cybenko, Ronald A. Peterson: Performance analysis of mobile agents for filtering data streams on wireless networks. MSWiM 2000: 85-94 |
17 | EE | Brian E. Brewington, George Cybenko: How dynamic is the Web? Computer Networks 33(1-6): 257-276 (2000) |
16 | EE | Brian E. Brewington, George Cybenko: Keeping Up with the Changing Web. IEEE Computer 33(5): 52-58 (2000) |
1998 | ||
15 | EE | Robert S. Gray, David Kotz, George Cybenko, Daniela Rus: D'Agents: Security in a Multiple-Language, Mobile-Agent System. Mobile Agents and Security 1998: 154-187 |
1997 | ||
14 | George Cybenko: High Performance Wireless Computing. ISHPC 1997: 71 | |
13 | David Kotz, Robert S. Gray, Saurab Nog, Daniela Rus, Sumit Chawla, George Cybenko: AGENT TCL: Targeting the Needs of Mobile Computers. IEEE Internet Computing 1(4): 58-67 (1997) | |
1996 | ||
12 | George Cybenko: Large-Scope Computing: The Industrial Challenges. ACM Comput. Surv. 28(4es): 21 (1996) | |
1992 | ||
11 | David W. Krumme, George Cybenko, K. N. Venkataraman: Gossiping in Minimal Time. SIAM J. Comput. 21(1): 111-139 (1992) | |
1991 | ||
10 | EE | David K. Bradley, George Cybenko, John L. Larson, F. Ahmad, J. Golab, M. Straka: Supercomputer workload decomposition and analysis. ICS 1991: 458-467 |
9 | Allan Tuchman, David Jablonowski, George Cybenko: Run-Time Visualization of Program Data. IEEE Visualization 1991: 255-261 | |
8 | Allan Tuchman, George Cybenko, David Jablonowski, Brian Bliss, Sanjay Sharma: Vista: A System for Remote Data Visualization. PPSC 1991: 575-580 | |
7 | M. Berry, George Cybenko, John L. Larson: Scientific benchmark characterizations. Parallel Computing 17(10-11): 1173-1194 (1991) | |
1990 | ||
6 | George Cybenko: Complexity Theory of Neural Networks and Classification Problems. EURASIP Workshop 1990: 26-44 | |
5 | EE | George Cybenko, Lyle D. Kipp, Lynn Pointer, David J. Kuck: Supercomputer performance evaluation and the Perfect Benchmarks. ICS 1990: 254-266 |
1989 | ||
4 | George Cybenko: Dynamic Load Balancing for Distributed Memory Multiprocessors. J. Parallel Distrib. Comput. 7(2): 279-301 (1989) | |
1987 | ||
3 | George Cybenko, Tom Allen: Recursive Binary Partitions-Abstract. PPSC 1987: 212 | |
2 | George Cybenko, David W. Krumme, K. N. Venkataraman: Fixed Hypercube Embedding. Inf. Process. Lett. 25(1): 35-39 (1987) | |
1986 | ||
1 | George Cybenko, David W. Krumme, K. N. Venkataraman: Simultaneous Broadcasting in Multiprocessor Networks. ICPP 1986: 555-558 |