Ciaran Mc Goldrick
Citata da
Citata da
PowerTOSSIM z: realistic energy modelling for wireless sensor network environments
E Perla, AË Cathßin, RS Carbajo, M Huggard, C Mc Goldrick
Proceedings of the 3nd ACM workshop on Performance monitoring andá…, 2008
Multi-identity and multi-key leveled FHE from learning with errors
M Clear, C McGoldrick
Annual Cryptology Conference, 630-656, 2015
Securing vehicle to vehicle communications using blockchain through visible light and acoustic side-channels
S Rowan, M Clear, M Gerla, M Huggard, CM Goldrick
arXiv preprint arXiv:1704.02553, 2017
Image coding using the singular value decomposition and vector quantization
CS McGoldrick, WJ Dowling, A Bury
Image Processing and its Applications, 1995., Fifth International Conferenceá…, 1995
Performance evaluation of the 6LoWPAN protocol on MICAz and TelosB motes
B Cody-Kenny, D Guerin, D Ennis, R Simon Carbajo, M Huggard, ...
Proceedings of the 4th ACM workshop on Performance monitoring andá…, 2009
A comparative study of active queue management schemes
A Bitorika, M Robin, M Huggard, C Mc Goldrick, 2004
Bootstrappable identity-based fully homomorphic encryption
M Clear, C McGoldrick
International Conference on Cryptology and Network Security, 1-19, 2014
ASDAH: An automated structural change detection algorithm based on the Hilbert–Huang transform
ES Carbajo, RS Carbajo, C Mc Goldrick, B Basu
Mechanical Systems and Signal Processing 47 (1-2), 78-93, 2014
An end-to-end routing protocol for peer-to-peer communication in wireless sensor networks
R Simˇn Carbajo, M Huggard, C McGoldrick
Proceedings of the 6th workshop on middleware for network eccentric andá…, 2008
Peer learning with lego mindstorms
C McGoldrick, M Huggard
34th Annual Frontiers in Education, 2004. FIE 2004., S2F-24, 2004
Simulating mobility in wsns: Bridging the gap between ns-2 and tossim 2. x
C Stevens, C Lyons, R Hendrych, RS Carbajo, M Huggard, C Mc Goldrick
2009 13th IEEE/ACM International Symposium on Distributed Simulation andá…, 2009
Anonymous IBE from quadratic residuosity with improved performance
M Clear, H Tewari, C McGoldrick
International Conference on Cryptology in Africa, 377-397, 2014
Delivering improved QoS and cell throughput in UMTS based HSDPA networks
R Shreevastav, C McGoldrick, M Huggard
2009 IEEE International Symposium on a World of Wireless, Mobile andá…, 2009
Incentivising students to pursue computer science programmes
M Huggard, C Mc Goldrick
Proceedings. Frontiers in Education. 36th Annual Conference, 3-8, 2006
Routing in wireless sensor networks for wind turbine monitoring
RS Carbajo, ES Carbajo, B Basu, C Mc Goldrick
Pervasive and Mobile Computing 39, 1-35, 2017
A SDN-Controlled Underwater MAC and Routing Testbed
Fan, Roulin, L Wei, P Du, C Mc Goldrick, M Gerla
MILCOM 2016, 2016
Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE
M Clear, C Mc Goldrick
International Conference on Security and Cryptography (SECRYPT), 2013
Attribute-based fully homomorphic encryption with a bounded number of inputs
M Clear, CM Goldrick
International Journal of Applied Cryptography 3 (4), 363-376, 2017
Using active queue management to enhance performance in IEEE802. 11
G Pibiri, C Mc Goldrick, M Huggard
Proceedings of the 4th ACM workshop on Performance monitoring andá…, 2009
An SDN architecture for under water search and surveillance
R Fan, C Mc Goldrick, M Gerla
2017 13th Annual Conference on Wireless On-demand Network Systems andá…, 2017
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20