Algis Rudys, Ph.D. - Publications

Affiliations: 
2007 Rice University, Houston, TX 
Area:
Computer Science

11 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2005 Ladd AM, Bekris KE, Rudys A, Kavraki LE, Wallach DS. Robotics-based location sensing using wireless ethernet Wireless Networks. 11: 189-204. DOI: 10.1007/S11276-004-4755-8  0.56
2004 Ladd AM, Bekris KE, Rudys AP, Wallach DS, Kavraki LE. On the feasibility of using wireless Ethernet for indoor localization Ieee Transactions On Robotics and Automation. 20: 555-559. DOI: 10.1109/Tra.2004.824948  0.56
2004 Bannet J, Price DW, Rudys A, Singer J, Wallach DS. Hack-a-Vote: Security Issues with Electronic Voting Systems Ieee Security and Privacy. 2: 32-37. DOI: 10.1109/MSECP.2004.1264851  0.56
2004 Haeberlen A, Rudys A, Flannery E, Wallach DS, Ladd AM, Kavraki LE. Practical robust localization over large-scale 802.11 wireless networks Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 70-84.  0.56
2003 Price DW, Rudys A, Wallach DS. Garbage collector memory accounting in language-based systems Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 263-274. DOI: 10.1109/SECPRI.2003.1199342  0.56
2003 Rudys A, Wallach DS. Enforcing Java run-time properties using bytecode rewriting Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2609: 185-200.  0.56
2003 Price DW, Rudys A, Wallach DS. Garbage collector memory accounting in language-based systems Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 263-274.  0.56
2003 Tao P, Rudys A, Ladd AM, Wallach DS. Wireless LAN Location-Sensing for Security Applications Proceedings of the Workshop On Wireless Security. 11-20.  0.56
2002 Rudys A, Wallach DS. Termination in language-based systems Acm Transactions On Information and System Security. 5: 138-168. DOI: 10.1145/505586.505589  1
2002 Rudys A, Wallach DS. Transaction rollback for language-based systems Proceedings of the 2002 International Conference On Dependable Systems and Networks. 439-448. DOI: 10.1109/DSN.2002.1028929  0.56
2002 Ladd AM, Bekris KE, Marceau G, Rudys A, Wallach DS, Kavraki LE. Using wireless ethernet for localization Ieee International Conference On Intelligent Robots and Systems. 1: 402-408.  0.56
Show low-probability matches.