2009 | ||
---|---|---|
73 | Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Peter L. Reiher: RAD: Reflector Attack Defense Using Message Authentication Codes. ACSAC 2009: 269-278 | |
72 | Venkatraman Ramakrishna, Peter L. Reiher, Leonard Kleinrock: Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments. PerCom 2009: 1-10 | |
71 | Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas: Accurately Measuring Denial of Service in Simulation and Testbed Experiments. IEEE Trans. Dependable Sec. Comput. 6(2): 81-95 (2009) | |
2008 | ||
70 | Tim Dasilva, Kevin Eustice, Peter L. Reiher: Johnny Appleseed: wardriving to reduce interference in chaotic wireless deployments. MSWiM 2008: 122-131 | |
69 | Kevin Eustice, A. M. Jourabchi, J. Stoops, Peter L. Reiher: Improving User Satisfaction in a Ubiquitous Computing Application. WiMob 2008: 496-501 | |
68 | Peter L. Reiher, John Zimmerman, Kevin Eustice: Message from the SAUCE Workshop Organizing Technical Co-chairs. WiMob 2008 | |
67 | Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter L. Reiher, Lixia Zhang: Learning the valid incoming direction of IP packets. Computer Networks 52(2): 399-417 (2008) | |
66 | Jelena Mirkovic, Peter L. Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, Michael Berg, Robert Jung: Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise. IEEE Trans. Computers 57(8): 1098-1112 (2008) | |
2007 | ||
65 | Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab: Towards user-centric metrics for denial-of-service measurement. Experimental Computer Science 2007: 8 | |
64 | Kevin Eustice, Venkatraman Ramakrishna, Alison Walker, Matthew Schnaider, Nam T. Nguyen, Peter L. Reiher: nan0sphere: Location-Driven Fiction for Groups of Users. HCI (3) 2007: 852-861 | |
63 | Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Wei-Min Yao, Peter L. Reiher, Stephen Schwab, Roshan K. Thomas: When is service really denied?: a user-centric dos metric. SIGMETRICS 2007: 357-358 | |
62 | Venkatraman Ramakrishna, Kevin Eustice, Peter L. Reiher: Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios. SOCA 2007: 180-190 | |
61 | An-I Andy Wang, Geoff Kuenning, Peter L. Reiher: Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication. Simulation 83(8): 551-569 (2007) | |
60 | Charles Weddle, Mathew Oldham, Jin Qian, An-I Andy Wang, Peter L. Reiher, Geoffrey H. Kuenning: PARAID: A gear-shifting power-aware RAID. TOS 3(3): (2007) | |
2006 | ||
59 | George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson: A Framework for a Collaborative DDoS Defense. ACSAC 2006: 33-42 | |
58 | Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko: Measuring denial Of service. QoP 2006: 53-58 | |
57 | Venkatraman Ramakrishna, Max Robinson, Kevin Eustice, Peter L. Reiher: An Active Self-Optimizing Multiplayer Gaming Architecture. Cluster Computing 9(2): 201-215 (2006) | |
56 | An-I Andy Wang, Geoffrey H. Kuenning, Peter L. Reiher, Gerald J. Popek: The Conquest file system: Better performance through a disk/persistent-RAM hybrid design. TOS 2(3): 309-348 (2006) | |
2005 | ||
55 | Margaret H. Dunham, Birgitta König-Ries, Evaggelia Pitoura, Peter L. Reiher, Can Türker: Mobile Information Management, 24.-29. October 2004 IBFI, Schloss Dagstuhl, Germany 2005 | |
54 | Jun Li, Toby Ehrenkranz, Geoffrey H. Kuenning, Peter L. Reiher: Simulation and Analysis on the Resiliency and Efficiency of Malnets. PADS 2005: 262-269 | |
53 | Everett Anderson, Kevin Eustice, Shane Markstrum, Mark H. Hansen, Peter L. Reiher: Mobile Contagion: Simulation of Infection and Defense. PADS 2005: 80-87 | |
52 | An-I Wang, Peter L. Reiher, Geoffrey H. Kuenning: Introducing permuted states for analyzing conflict rates in optimistic replication. SIGMETRICS 2005: 376-377 | |
51 | Jelena Mirkovic, Peter L. Reiher: D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks. IEEE Trans. Dependable Sec. Comput. 2(3): 216-232 (2005) | |
2004 | ||
50 | Margaret H. Dunham, Birgitta König-Ries, Evaggelia Pitoura, Peter L. Reiher, Can Türker: 04441 Abstracts Collection - Mobile Information Management. Mobile Information Management 2004 | |
49 | Margaret H. Dunham, Birgitta König-Ries, Evaggelia Pitoura, Peter L. Reiher, Can Türker: 04441 Executive Summary - Mobile Information Management. Mobile Information Management 2004 | |
48 | Joos-Hendrik Böse, Stefan Böttcher, Le Gruenwald, Evaggelia Pitoura, Peter L. Reiher, George Samaras, Thomas Schwarz, Can Türker: 04441 Working Group - Research Issues in Mobile Transactions. Mobile Information Management 2004 | |
47 | Joos-Hendrik Böse, Stefan Böttcher, Le Gruenwald, Pedro José Marrón, Philipp Obreiter, Evaggelia Pitoura, Peter L. Reiher, Kai-Uwe Sattler, Frank Seliger: 04441 Working Group - Some Open Aspects of Mobile Ad-hoc NETwork, Peer-to-Peer, and Self-organizing Systems. Mobile Information Management 2004 | |
46 | Jelena Mirkovic, Peter L. Reiher: A taxonomy of DDoS attack and DDoS defense mechanisms. Computer Communication Review 34(2): 39-53 (2004) | |
45 | Jun Li, Peter L. Reiher, Gerald J. Popek: Resilient self-organizing overlay networks for security update delivery. IEEE Journal on Selected Areas in Communications 22(1): 189-202 (2004) | |
44 | David Ratner, Peter L. Reiher, Gerald J. Popek: Roam: A Scalable Replication System for Mobility. MONET 9(5): 537-544 (2004) | |
43 | Nam T. Nguyen, An-I Andy Wang, Peter L. Reiher, Geoffrey H. Kuenning: Electric-field-based routing: a reliable framework for routing in MANETs. Mobile Computing and Communications Review 8(2): 35-49 (2004) | |
2003 | ||
42 | Venkatraman Ramakrishna, Max Robinson, Kevin Eustice, Peter L. Reiher: An Active Self-Optimizing Multiplayer Gaming Architecture. Active Middleware Services 2003: 32-41 | |
41 | Max Robinson, Jelena Mirkovic, B. Scott Michel, Matthew Schnaider, Peter L. Reiher: DefCOM: Defensive Cooperative Overlay Mesh. DISCEX (2) 2003: 101-102 | |
40 | Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenning: Detecting Insider Threats by Monitoring System Call Activity. IAW 2003: 45-52 | |
39 | Alexey Rudenko, Peter L. Reiher: Adaptation Planning for Active Networks. IWAN 2003: 252-265 | |
38 | Kevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald J. Popek, Venkatraman Ramakrishna, Peter L. Reiher: Enabling Secure Ubiquitous Interactions. Middleware Workshops 2003: 76-80 | |
37 | Jelena Mirkovic, Gregory Prier, Peter L. Reiher: Source-End DDoS Defense. NCA 2003: 171-178 | |
36 | Jelena Mirkovic, Max Robinson, Peter L. Reiher: Alliance formation for DDoS defense. NSPW 2003: 11-18 | |
35 | Kevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald J. Popek, Venkatraman Ramakrishna, Peter L. Reiher: Securing nomads: the case for quarantine, examination, and decontamination. NSPW 2003: 123-128 | |
2002 | ||
34 | Vincent Ferreria, Alexey Rudenko, Kevin Eustice, Richard G. Guy, Venkatraman Ramakrishna, Peter L. Reiher: Panda: Middleware to Provide the Benefits of Active Networks to Legacy Applications. DANCE 2002: 319-332 | |
33 | An-I Wang, Peter L. Reiher, Rajive Bagrodia, Geoffrey H. Kuenning: Understanding the Behavior of the Conflict-Rate Metric in Optimistic Peer Replication. DEXA Workshops 2002: 757-764 | |
32 | Jelena Mirkovic, Gregory Prier, Peter L. Reiher: Attacking DDoS at the Source. ICNP 2002: 312-321 | |
31 | Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Reiher, Lixia Zhang: SAVE: Source Address Validity Enforcement Protocol. INFOCOM 2002 | |
30 | Geoffrey H. Kuenning, Wilkie Ma, Peter L. Reiher, Gerald J. Popek: Simplifying automated hoarding methods. MSWiM 2002: 15-21 | |
29 | An-I Wang, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning: Conquest: Better Performance Through a Disk/Persistent-RAM Hybrid File System. USENIX Annual Technical Conference, General Track 2002: 15-28 | |
28 | Jun Li, Mark Yarvis, Peter L. Reiher: Securing distributed adaptation. Computer Networks 38(3): 347-371 (2002) | |
27 | Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Ouri Wolfson: Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems. SIGMOD Record 31(2): 73-79 (2002) | |
2001 | ||
26 | Peter L. Reiher, Kevin Eustice, Kai-Min Sung: Adapting Encrypted Data Streams in Open Architectures. Active Middleware Services 2001: 45-50 | |
25 | B. Scott Michel, Peter L. Reiher: Peer-through-Peer Communication for Information Logistics. GI Jahrestagung (1) 2001: 248-256 | |
24 | An-I Wang, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning: The Conquest File System's Life after Disks. HotOS 2001: 186 | |
23 | Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Alexander L. Wolf, Ouri Wolfson: Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona. Infrastructure for Mobile and Wireless Systems 2001: 1-37 | |
22 | Todd Ekenstam, Charles Matheny, Peter L. Reiher, Gerald J. Popek: The Bengal Database Replication System. Distributed and Parallel Databases 9(3): 187-210 (2001) | |
21 | David Ratner, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning: Replication Requirements in Mobile Environments. MONET 6(6): 525-533 (2001) | |
2000 | ||
20 | B. Scott Michel, Konstantinos Nikoloudakis, Peter L. Reiher, Lixia Zhang: URL Forwarding and Compression in Adaptive Web Caching. INFOCOM 2000: 670-678 | |
19 | B. R. Badrinath, Armando Fox, Leonard Kleinrock, Gerald J. Popek, Peter L. Reiher, Mahadev Satyanarayanan: A conceptual framework for network and client adaptation. MONET 5(4): 221-231 (2000) | |
1999 | ||
18 | David Ratner, Peter L. Reiher, Gerald J. Popek: Roam: A Scalable Replication System for Mobile Computing. DEXA Workshop 1999: 96-104 | |
17 | An-I Wang, Peter L. Reiher, Rajive Bagrodia: A simulation evaluation of optimistic replicated filing in mobile environments. IPCCC 1999: 43-51 | |
16 | David Ratner, Peter L. Reiher, Gerald J. Popek, Richard G. Guy: Peer Replication with Selective Control. MDA 1999: 169-181 | |
15 | Alexey Rudenko, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning: The Remote Processing Framework for Portable Computer Power Saving. SAC 1999: 365-372 | |
14 | Mitchell Tsai, Peter L. Reiher, Gerald J. Popek: Command Management System for Next-Generation User Input. Workshop on Hot Topics in Operating Systems 1999: 179-184 | |
13 | Mark Yarvis, Peter L. Reiher, Gerald J. Popek: Conductor: A Framework for Distributed Adaptation. Workshop on Hot Topics in Operating Systems 1999: 44- | |
1998 | ||
12 | Geoffrey H. Kuenning, Rajive Bagrodia, Richard G. Guy, Gerald J. Popek, Peter L. Reiher, An-I Wang: Measuring the Quality of Service of Optimistic Replication. ECOOP Workshops 1998: 319-320 | |
11 | Richard G. Guy, Peter L. Reiher, David Ratner, Michial Gunter, Wilkie Ma, Gerald J. Popek: Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication. ER Workshops 1998: 254-265 | |
10 | Thomas W. Page Jr., Richard G. Guy, John S. Heidemann, David Ratner, Peter L. Reiher, Ashish Goel, Geoffrey H. Kuenning, Gerald J. Popek: Perspectives on Optimistically Replicated, Peer-to-Peer Filing. Softw., Pract. Exper. 28(2): 155-180 (1998) | |
1997 | ||
9 | Geoffrey H. Kuenning, Peter L. Reiher, Gerald J. Popek: Experience with an Automated Hoarding System. Personal and Ubiquitous Computing 1(3): (1997) | |
1994 | ||
8 | Peter L. Reiher, John S. Heidemann, David Ratner, Gregory Skinner, Gerald J. Popek: Resolving File Conflicts in the Ficus File System. USENIX Summer 1994: 183-195 | |
7 | Geoffrey H. Kuenning, Gerald J. Popek, Peter L. Reiher: An Analysis of Trace Data for Predictive File Caching in Mobile Computing. USENIX Summer 1994: 291-303 | |
1991 | ||
6 | David R. Jefferson, Peter L. Reiher: Supercritical speedup. Annual Simulation Symposium 1991: 159-168 | |
1990 | ||
5 | Matthew T. Presley, Peter L. Reiher, Steven F. Bellenot: A time warp implementation of Sharks World. Winter Simulation Conference 1990: 199-203 | |
4 | Peter L. Reiher: Parallel simulation using the time warp operating system. Winter Simulation Conference 1990: 38-45 | |
1989 | ||
3 | Peter L. Reiher, Frederick Wieland, David R. Jefferson: Limitation of optimism in the time warp operating system. Winter Simulation Conference 1989: 765-770 | |
2 | Frederick Wieland, L. Hayley, A. Feinberg, Mike Di Loreto, Leo Blume, J. Ruffles, Peter L. Reiher, Brian Beckman, Phil Hontalas, Steve Bellenot, David R. Jefferson: The Performance of a Distributed Combat Simulation with the Time Warp Operating System. Concurrency - Practice and Experience 1(1): 35-50 (1989) | |
1987 | ||
1 | Peter L. Reiher, Gerald J. Popek: Locus Naming in a Large Scale Environment. Kommunikation in Verteilten Systemen 1987: 167-177 |