default search action
Udo W. Pooch
Person information
- affiliation: Texas A&M University, College Station, Texas, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2006
- [j34]Bo Sun, Kui Wu, Udo W. Pooch:
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks 2(3): 297-324 (2006) - [c49]Jianfeng Cai, Yunhuai Liu, Jie Lian, Mo Li, Udo W. Pooch, Lionel M. Ni:
Truthful Topology Control inWireless Ad Hoc Networks with Selfish Nodes. ICPP 2006: 203-210 - 2005
- [c48]Jianfeng Cai, Haiyun You, Bin Lu, Udo W. Pooch, Mi Lu:
Whisper - A Lightweight Anonymous Communication Mechanism in Wireless Ad-hoc Networks. ICWN 2005: 482-488 - [c47]Jian Chen, Yong Guan, Udo W. Pooch:
A Spatial-Based Multi-Resolution Data Dissemination Scheme for Wireless Sensor Networks. IPDPS 2005 - [c46]Bin Lu, Udo W. Pooch:
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks. ITCC (2) 2005: 546-551 - [c45]Jian Chen, Yong Guan, Udo W. Pooch:
Customizing a Geographical Routing Protocol for Wireless Sensor Networks. ITCC (2) 2005: 586-591 - [c44]Bin Lu, Udo W. Pooch:
Security in QoS signaling systems for mobile ad hoc networks. WiMob (3) 2005: 213-220 - 2004
- [j33]Bernard J. Jansen, Udo W. Pooch:
Assisting the searcher: utilizing software agents for Web search systems. Internet Res. 14(1): 19-33 (2004) - [c43]Jian Chen, Yong Guan, Udo W. Pooch:
An efficient data dissemination method in wireless sensor networks. GLOBECOM 2004: 3200-3204 - [c42]Bo Sun, Kui Wu, Udo W. Pooch:
Towards adaptive intrusion detection in mobile ad hoc networks. GLOBECOM 2004: 3551-3555 - [c41]Jianfeng Cai, Udo W. Pooch:
Allocate Fair Payoff for Cooperation in Wireless Ad Hoc Networks Using Shapley Value. IPDPS 2004 - [c40]Jianfeng Cai, Udo W. Pooch:
Play alone or together - truthful and efficient routing in wireless ad hoc networks with selfish nodes. MASS 2004: 457-465 - [c39]Jian Chen, Yong Guan, Udo W. Pooch:
Customizing GPSR for wireless sensor networks. MASS 2004: 549-551 - [c38]Bin Lu II, Udo W. Pooch:
A Game Theoretic Framework for Bandwidth Reservation in Mobile Ad Hoc Networks. QSHINE 2004: 234-241 - 2003
- [c37]Bo Sun, Kui Wu, Udo W. Pooch:
Routing anomaly detection in mobile ad hoc networks. ICCCN 2003: 25-31 - [c36]Bin Lu II, Udo W. Pooch:
Security in QoS Models and Signaling Systems for Mobile Ad Hoc Networks. International Conference on Wireless Networks 2003: 563-569 - [c35]Bo Sun, Kui Wu, Udo W. Pooch:
Alert aggregation in mobile ad hoc networks. Workshop on Wireless Security 2003: 69-78 - 2002
- [j32]Michel Kouadio, Udo W. Pooch:
A taxonomy and design considerations for Internet accounting. Comput. Commun. Rev. 32(5): 39-48 (2002) - [j31]Michel Kouadio, Udo W. Pooch:
Technology on social issues of videoconferencing on the Internet: a survey. J. Netw. Comput. Appl. 25(1): 37-56 (2002) - [c34]Bin Lu, Udo W. Pooch:
Cooperative security-enforcement routing in mobile ad hoc networks. MWCN 2002: 157-161 - 2001
- [j30]Bernard J. Jansen, Udo W. Pooch:
A review of Web searching studies and a framework for future research. J. Assoc. Inf. Sci. Technol. 52(3): 235-246 (2001) - [j29]John M. D. Hill, John R. Surdu, Curtis A. Carver Jr., James A. Vaglia, Udo W. Pooch:
An Interactive Design, Visualization, and Analysis Tool for Information Flow Over a Tactical Data Network. Simul. 77(3-4): 104-113 (2001) - [c33]John M. D. Hill, Curtis A. Carver Jr., Jeffrey W. Humphries, Udo W. Pooch:
Using an isolated network laboratory to teach advanced networks and security. SIGCSE 2001: 36-40 - 2000
- [j28]John R. Surdu, Udo W. Pooch:
Simulations Technologies in the Mission Operational Environment. Simul. 74(3): 138-160 (2000) - [c32]Daniel Ragsdale, Curtis A. Carver Jr., Jeffrey W. Humphries, Udo W. Pooch:
Adaptation techniques for intrusion detection and intrusion response systems. SMC 2000: 2344-2349 - [c31]John R. Surdu, John M. D. Hill, Udo W. Pooch:
Anticipatory Planning Support System. WSC 2000: 950-957
1990 – 1999
- 1999
- [c30]Curtis A. Carver Jr., John M. D. Hill, Udo W. Pooch:
Third Generation Adaptive Hypermedia Systems. WebNet 1999: 177-182 - 1998
- [c29]Sunil Santha, Udo W. Pooch:
JAGATH: A Methodology and Its Application for Distributed Systems Performance Evaluation and Control. Computer Performance Evaluation (Tools) 1998: 365-368 - 1997
- [j27]Gregory B. White, Eric A. Fisch, Udo W. Pooch:
Government-Based Security Standards. Inf. Secur. J. A Glob. Perspect. 6(3): 9-19 (1997) - [c28]Ganesha Beedubail, Udo W. Pooch:
An Architecture for Object Replication in Distributed Systems. PDPTA 1997: 50-59 - [c27]Anish S. Karmarkar, Udo W. Pooch:
A Framework for Communication Support in Object Oriented Distributed Systems. PDPTA 1997: 182-185 - [c26]Anil Gurijala, Udo W. Pooch:
The Effect of Mobility on Consistency and Access Time in Distributed System. PDPTA 1997: 1160-1164 - 1996
- [j26]Gregory B. White, Udo W. Pooch:
Cooperating security managers: Distributed intrusion detection systems. Comput. Secur. 15(5): 441-450 (1996) - [j25]Gregory B. White, Eric A. Fisch, Udo W. Pooch:
Cooperating security managers: a peer-based intrusion detection system. IEEE Netw. 10(1): 20-23 (1996) - [j24]John A. Hamilton Jr., Gary R. Ratterree, Paul C. Brutch, Udo W. Pooch:
Public Domain Tools for Modeling and Simulating Computer Networks. Simul. 67(3): 161-169 (1996) - [c25]Willis F. Marti, Udo W. Pooch, John A. Hamilton Jr.:
PACKET tracing: a new paradigm for teaching computer network courses. ITiCSE 1996: 162-164 - [c24]Sridhar Muppidi, Udo W. Pooch:
Architecture for Performance Instrument in Distributed Systems. PDPTA 1996: 1334-1345 - 1995
- [j23]Gregory B. White, Udo W. Pooch:
Problems with DCE security services. Comput. Commun. Rev. 25(5): 5-12 (1995) - [j22]John A. Hamilton Jr., Gary R. Ratterree, Udo W. Pooch:
AToolkit for Monitoring the Utilization and Performance of Computer Networks. Simul. 64(5): 297-301 (1995) - [c23]John A. Hamilton Jr., David A. Cook, Udo W. Pooch:
Distributed simulation in Ada 95. TRI-Ada 1995: 105-113 - [c22]John A. Hamilton Jr., Udo W. Pooch:
A survey of object-oriented methodologies. TRI-Ada 1995: 226-234 - [c21]John A. Hamilton Jr., Udo W. Pooch:
An Open Simulation Architecture for Force XXI. WSC 1995: 1296-1303 - 1994
- [c20]Eric A. Fisch, Gregory B. White, Udo W. Pooch:
The design of an audit trail analysis tool. ACSAC 1994: 126-132 - [c19]Gregory B. White, Udo W. Pooch:
Computer ethics education: impact from societal norms. Ethics in Computer Age 1994: 170-173 - 1992
- [j21]David K. Hess, David R. Safford, Udo W. Pooch:
A Unix network protocol security study: network information service. Comput. Commun. Rev. 22(5): 24-28 (1992)
1980 – 1989
- 1989
- [j20]David A. Umphress, Udo W. Pooch, Murat M. Tanik:
Fast Prototyping of a Goal-Oriented Simulation Environment System. Comput. J. 32(6): 541-548 (1989) - 1988
- [c18]David A. Umphress, Udo W. Pooch, Murat M. Tanik:
Fast prototyping of a goal-orientedsimulation environment system. ACM Conference on Computer Science 1988: 120-130 - 1986
- [c17]Kenneth R. Hebert, Udo W. Pooch:
Routing as a flow control strategy in an integrated circuit/packet switched communications network. WSC 1986: 786-794 - 1985
- [c16]Udo W. Pooch, Mark J. Kiemele:
A sizing and timing analysis of an integrated computer network simulator. WSC 1985: 322-330 - 1984
- [c15]Mark J. Kiemele, Udo W. Pooch:
Topological optimization of an integrated circuit/packet-switched computer network. WSC 1984: 604-618 - [e2]Udo W. Pooch, C. Dennis Pegden, Gerard C. Blais, Susan L. Solomon, Sallie V. Sheppard:
Proceedings of the 16th conference on Winter simulation, WSC 1984, Dallas, TX, USA, November 28-30, 1984. ACM 1984 [contents] - 1982
- [c14]Udo W. Pooch:
The Design of an Integrated Packet/Circuit Switched Network Simulator. IMACS World Congress 1982: 107-115 - [c13]Lawrence L. Rose, E. B. Zucker, Peter L. Haigh, Udo W. Pooch, Edward R. Comer, Ronald M. Huhn:
Simulation of computer systems: looking back. WSC 1982: 698-702 - [c12]Stephen D. Roberts, Jerry Banks, James Kho, Udo W. Pooch, John S. Ramberg:
Teaching simulation to undergraduates. WSC 1982: 706 - 1981
- [j19]W. T. Graybeal, Udo W. Pooch:
The Design of Calibration Experiments for Syntheticc Jobs. Comput. J. 24(2): 132-138 (1981) - [j18]Anthony P. Lucido, Rahul Chattergy, Udo W. Pooch:
A Survey of Microprogram Verification and Validation Methods. Comput. J. 24(2): 139-142 (1981) - [j17]Richard M. Feldman, Gerald Wayne Adkins, Guy L. Curry, Udo W. Pooch:
Measurement Bias in Feedback Queues. J. ACM 28(2): 351-357 (1981)
1970 – 1979
- 1979
- [j16]Rahul Chattergy, Udo W. Pooch:
A Distributed Function Computer with Dedicated Processors. Comput. J. 22(1): 37-40 (1979) - [c11]Udo W. Pooch, Charles Neblock, Rahul Chattergy:
A simulation model for network routing. WSC 1979: 435-445 - 1978
- [j15]Rahul Chattergy, Udo W. Pooch:
Analysis of the Availability of Computer Systems Using Computer-Aided Algebra. Commun. ACM 21(7): 586-591 (1978) - [j14]Udo W. Pooch, Rahul Chattergy, Richard H. Austing, Michael C. Mulder:
The Oregon Report Computer Science and Computer Engineering Education in the 80's. Computer 11(9): 69-83 (1978) - 1977
- [j13]Gerald W. Adkins, Udo W. Pooch:
Computer Simulation: a Tutorial. Computer 10(4): 12-17 (1977) - [j12]Rahul Chattergy, Udo W. Pooch:
Integrated Design and Verification of Simulation Programs. Computer 10(4): 40-45 (1977) - [j11]Udo W. Pooch:
Computer Networks [Guest editor's introduction]. Computer 10(11): 10-11 (1977) - [j10]William Greene, Udo W. Pooch:
A Review of Classification Schemes for Computer Communication Networks. Computer 10(11): 12-21 (1977) - [j9]Rahul Chattergy, Udo W. Pooch:
Continuing Education for the Computer Professional: * The Role of the Professional Society. Computer 10(12): 124-128 (1977) - [j8]V. Thomas Rhyne, Philip S. Noe, Melvin H. McKinney, Udo W. Pooch:
A New Technique for the Fast Minimization of Switching Functions. IEEE Trans. Computers 26(8): 757-764 (1977) - [c10]Don M. Warner, Udo W. Pooch:
Model of a multiprogrammed computer system with a multilevel memory hierarchy. ACM Annual Conference 1977: 351-357 - [c9]David S. Burris, Udo W. Pooch:
The dynamic matrix model. ACM Annual Conference 1977: 386-391 - [c8]Udo W. Pooch, Don M. Warner:
An extension of the central server model. WSC 1977: 618-625 - 1976
- [j7]Udo W. Pooch:
Papers from SIGGRAPH 76 - Introduction. Commun. ACM 19(10): 541 (1976) - [j6]Dennis L. Dance, Udo W. Pooch:
An Adaptive On Line Data Compression System. Comput. J. 19(3): 216-224 (1976) - [j5]Udo W. Pooch:
Computer Graphics and Man-Machine Interactions [Guest editorial]. Computer 9(8): 13 (1976) - [j4]Udo W. Pooch:
Computer Graphics, Interactive Techniques, and Image Processing 1970-1975: A Bibliography. Computer 9(8): 46-64 (1976) - [c7]Udo W. Pooch, David M. Burris, Patrice Burgevin, Jacques Leroudier, Errol H. Pollnow, Harry F. Tibbals, Anita K. Jones:
SIGOPS (Paper Session). ACM Annual Conference 1976: 336 - [c6]Udo W. Pooch, David M. Burris:
A Modified Locality Matrix Model (MLMM) - dynamic clustering in a demand paging environment. ACM Annual Conference 1976: 337-343 - [c5]Udo W. Pooch:
A dynamic clustering strategy in a demand paging environment. ANSS 1976: 11-22 - [c4]Harold E. Livings, Udo W. Pooch:
A heuristic teleprocessing network design technique. ANSS 1976: 71-76 - [c3]Udo W. Pooch:
A user-oriented computer graphics system. SIGGRAPH 1976: 25-31 - [e1]Udo W. Pooch:
Proceedings of the 3rd Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH 1976, Philadelphia, Pennsylvania, USA, July 14-16, 1976. ACM 1976, ISBN 978-1-4503-7353-1 [contents] - 1975
- [c2]Robert L. Hedges, Udo W. Pooch:
A measure for program locality in demand paging. ACM Annual Conference 1975: 181-186 - [c1]Thomas E. Reeves, Udo W. Pooch:
A multiple subsystem simulator of processor scheduling. ANSS 1975: 129-138 - 1974
- [j3]Udo W. Pooch:
Translation of Decision Tables. ACM Comput. Surv. 6(2): 125-151 (1974) - [j2]Udo W. Pooch:
Corrigendum: "Translation of Decision Tables". ACM Comput. Surv. 6(4): 321 (1974) - 1973
- [j1]Udo W. Pooch, Al Nieder:
A Survey of Indexing Techniques for Sparse Matrices. ACM Comput. Surv. 5(2): 109-133 (1973)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint