ISI Technical Reports

This section contains all Technical Reports published by ISI over the past several decades. The search box below enables searches by report titles, authors and report numbers. Technical Reports written by ISI researchers, but not published by ISI, may be available through the author’s individual website.

Journal articles and other publications can be found here.

SecureCore Security Architecture: Authority Mode and Emergency ManagementT. E. Levin, G. Bhaskara, T. D. Nguyen, P. C. Clark, T. V. Benzel, and C. E. Irvine
November, 2007

Design Principles and Guidelines for SecurityT. E. Levin, C. E. Irvine, T. V. Benzel, G. Bhaskara, P. C. Clark, and T. D. Nguyen
November, 2007

Towards Concurrent Communication in Wireless NetworksD. Son, J. Heidemann, and B. Krishnamachari
August, 2007

Estimating P2P Traffic Volume at USCG. Bartlett, J. Heidemann, C. Papadopoulos, and J. Pepin
July, 2007

State Estimation in Optical CDMA NetworksP. Kamath, J. D. Touch, and J. A. Bannister
June, 2007

Internet Packet Size Distributions: Some ObservationsR. Sinha, C. Papadopoulos, and J. Heidemann
May, 2007

Understanding Passive and Active Service Discovery (Extended)G. Bartlett, J. Heidemann, and C. Papadopoulos
May, 2007

Exploring Visible Internet Hosts through Census and SurveyJ. Heidemann, Y. Pradkin, R. Govindan, C. Papadopoulos, and J. Bannister
May, 2007

Applied Learning NetworksJ. Bannister, W. - M. Shen, J. D. Touch, F. Hou, and V. Pingali
April, 2007

T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor NetworksA. Syed, W. Ye, and J. Heidemann
April, 2007