2009 | ||
---|---|---|
49 | Karsten Nohl, David Evans: Privacy through Noise: A Design Space for Private Identification. ACSAC 2009: 518-527 | |
48 | David Evans, Robert H. Warren: Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans. CSE (3) 2009: 133-138 | |
47 | Alfonso Caiazzo, David Evans, Jean-Luc Falcone, Jan Hegewald, Eric Lorenz, Bernd Stahl, Dinan Wang, Jörg Bernsdorf, Bastien Chopard, Julian Gunn, D. Rodney Hose, Manfred Krafczyk, Patricia V. Lawford, Rod Smallwood, Dawn Walker, Alfons G. Hoekstra: Towards a Complex Automata Multiscale Model of In-Stent Restenosis. ICCS (1) 2009: 705-714 | |
2008 | ||
46 | Anh Nguyen-Tuong, David Evans, John C. Knight, Benjamin Cox, Jack W. Davidson: Security through redundant data diversity. DSN 2008: 187-196 | |
45 | David Evans, David M. Eyers: Deontic logic for modelling data flow and use compliance. MPAC 2008: 19-24 | |
44 | Karsten Nohl, David Evans: Hiding in Groups: On the Expressiveness of Privacy Distributions. SEC 2008: 1-15 | |
43 | Karsten Nohl, David Evans, Starbug, Henryk Plötz: Reverse-Engineering a Cryptographic RFID Tag. USENIX Security Symposium 2008: 185-194 | |
2007 | ||
42 | David Evans, Sadaoki Furui, Chantal Soulé-Dupuy: Computer-Assisted Information Retrieval (Recherche d'Information et ses Applications) - RIAO 2007, 8th International Conference, Carnegie Mellon University, Pittsburgh, PA, USA, May 30 - June 1, 2007. Proceedings, CD-ROM CID 2007 | |
41 | David Evans, Alastair R. Beresford, Trevor Burbridge, Andrea Soppera: Context-Derived Pseudonyms for Protection of Privacy in Transport Middleware and Applications. PerCom Workshops 2007: 395-400 | |
2006 | ||
40 | Max Chacón, Darwin Diaz, Luis Ríos, David Evans, Ronney Panerai: Support Vector Machine with External Recurrences for Modeling Dynamic Cerebral Autoregulation. CIARP 2006: 954-963 | |
39 | Karsten Nohl, David Evans: Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper). ICICS 2006: 228-237 | |
38 | Jinlin Yang, David Evans, Deepali Bhardwaj, Thirumalesh Bhat, Manuvir Das: Perracotta: mining temporal API rules from imperfect traces. ICSE 2006: 282-291 | |
37 | David Evans, Michael Peck: Inculcating invariants in introductory courses. ICSE 2006: 673-678 | |
36 | Wei Hu, Jason Hiser, Daniel Williams, Adrian Filipi, Jack W. Davidson, David Evans, John C. Knight, Anh Nguyen-Tuong, Jonathan C. Rowanhill: Secure and practical defense against code-injection attacks using software dynamic translation. VEE 2006: 2-12 | |
35 | Nathanael Paul, David Evans: Comparing Java and .NET security: Lessons learned and missed. Computers & Security 25(5): 338-350 (2006) | |
34 | Gregory E. Graham, M. Anzar Afaq, David Evans, Gerald Guglielmo, Eric Wicklund, Peter Love: Contextual constraint modeling in Grid application workflows. Concurrency and Computation: Practice and Experience 18(10): 1277-1292 (2006) | |
2005 | ||
33 | Max Chacón, Cristopher Blanco, Ronney Panerai, David Evans: Nonlinear Modeling of Dynamic Cerebral Autoregulation Using Recurrent Neural Networks. CIARP 2005: 205-213 | |
32 | Mahnas Jean Mohammadi-Aragh, Ikuko Fujisaki, Derek Irby, David Evans, Robert Moorhead, Scott Roberts: Visualization of Computer-Modeled Forests for Forest Management. EuroVis 2005: 183-190 | |
31 | Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans: Automatically Hardening Web Applications Using Precise Tainting. SEC 2005: 295-308 | |
30 | David Evans: Toasters, Seat Belts, and Inferring Program Properties. VSTTE 2005: 354-361 | |
29 | Gregory E. Graham, M. Anzar Afaq, David Evans, Gerald Guglielmo, Eric Wicklund, Peter Love: Contextual Constraint Modeling in Grid Application Workflows CoRR abs/cs/0503045: (2005) | |
2004 | ||
28 | Nathanael Paul, David Evans: .NET Security: Lessons Learned and Missed from Java. ACSAC 2004: 272-281 | |
27 | David Evans, Raimondas Lencevicius: Second International Workshop on Dynamic Analysis (WODA 2004). ICSE 2004: 763 | |
26 | Jinlin Yang, David Evans: Automatically Inferring Temporal Properties for Program Evolution . ISSRE 2004: 340-351 | |
25 | Lingxuan Hu, David Evans: Localization for mobile sensor networks. MOBICOM 2004: 45-57 | |
24 | Lingxuan Hu, David Evans: Using Directional Antennas to Prevent Wormhole Attacks. NDSS 2004 | |
23 | Jinlin Yang, David Evans: Dynamically inferring temporal properties. PASTE 2004: 23-28 | |
22 | David Evans: What Biology Can (and Can't) Teach Us About Security. USENIX Security Symposium 2004 | |
21 | David Evans, Raimondas Lencevicius: ICSE 2004 workshop summary second international workshop on dynamic analysis (WODA 2004). ACM SIGSOFT Software Engineering Notes 29(5): 1-2 (2004) | |
20 | Simone Leão, Ian Bishop, David Evans: Spatial-temporal model for demand and allocation of waste landfills in growing urban regions. Computers, Environment and Urban Systems 28(4): 353-385 (2004) | |
19 | David Evans, Nathanael Paul: Election Security: Perception and Reality. IEEE Security & Privacy 2(1): 24-31 (2004) | |
18 | Kang Zhuo, Li Yan, Hugo de Garis, David Evans, Lishan Kang: Multi-modal function optimization with the ZEDS (zoomed evolutionary dual strategy) algorithmzoomed evolutionary algorithm. Int. J. Comput. Math. 81(6): 675-684 (2004) | |
17 | Christopher Frost, Michael Peck, David Evans: Pancakes, puzzles, and polynomials: cracking the Cracker Barrel. SIGACT News 35(1): 80-84 (2004) | |
2003 | ||
16 | Lingxuan Hu, David Evans: Secure Aggregation for Wireless Network. SAINT Workshops 2003: 384-394 | |
15 | Gregory E. Graham, David Evans, Iain Bertram: McRunjob: A High Energy Physics Workflow Planner for Grid Production Processing CoRR cs.DC/0305063: (2003) | |
14 | Johnny W. Wong, David Evans, Michael Kwok: On Staleness and the Delivery of Web Pages. Information Systems Frontiers 5(2): 129-136 (2003) | |
2002 | ||
13 | Selvin George, David Evans, Lance Davidson: A biologically inspired programming model for self-healing systems. WOSS 2002: 102-104 | |
12 | David Evans, David Larochelle: Improving Security Using Extensible Lightweight Static Analysis. IEEE Software 19(1): 42-51 (2002) | |
2001 | ||
11 | Johnny W. Wong, David Evans, Michael Kwok: On staleness and the delivery of web pages. CASCON 2001: 17 | |
10 | Keen Browne, Jon McCune, Adam Trost, David Evans, David C. Brogan: Behavior Combination and Swarm Programming. RoboCup 2001: 499-502 | |
2000 | ||
9 | Emilia Stoica, David Evans: Dynamic term selection in learning a query from examples. RIAO 2000: 1703-1719 | |
1999 | ||
8 | David Evans, Andrew Twyman: Flexible Policy-Directed Code Safety. IEEE Symposium on Security and Privacy 1999: 32-45 | |
7 | Yonggang Du, Christoph Herrmann, Klaus Peter May, David Evans: A flat wireless ATM LAN architecture with distributed ATM switching in base stations. Computer Networks 31(9-10): 931-942 (1999) | |
1997 | ||
6 | Johnny W. Wong, Kelly A. Lyons, David Evans, Rolf J. Velthuys, Gregor von Bochmann, Eric Dubois, Nicolas D. Georganas, Gerald W. Neufeld, M. Tamer Özsu, Jeff Brinskelle, Abdelhakim Hafid, Norman C. Hutchinson, Paul Iglinski, Brigitte Kerhervé, Louise Lamont, Dwight J. Makaroff, Duane Szafron: Enabling Technology for Distributed Multimedia Applications. IBM Systems Journal 36(4): 489-507 (1997) | |
1996 | ||
5 | David Evans: An architecture for enforcement of usage contracts in distributed multimedia systems. CASCON 1996: 10 | |
4 | David Evans: Static Detection of Dynamic Memory Errors. PLDI 1996: 44-53 | |
1994 | ||
3 | Floor Rikkens, David Evans, Rein Vos: Specifying Adverse Drug Reactions by Formulating Contexts. RIAO 1994: 82-94 | |
2 | David Evans, John V. Guttag, James J. Horning, Yang Meng Tan: LCLint: A Tool for Using Specifications to Check Code. SIGSOFT FSE 1994: 87-96 | |
1968 | ||
1 | David Evans, Andries van Dam: Data Structure Programming System. IFIP Congress (1) 1968: 557-564 |