José Carlos Brustoloni

Jose Carlos Brustoloni

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

27EERicardo Villamarín-Salomón, José Carlos Brustoloni: Bayesian bot detection based on DNS traffic similarity. SAC 2009: 2035-2041
26EEPeter Djalaliev, José Carlos Brustoloni: Secure web-based retrieval of documents with usage controls. SAC 2009: 2062-2069
25EEJosé Carlos Brustoloni, David Kyle: Updates and Asynchronous Communication in Trusted Computing Systems. ICDCS 2008: 194-205
24EEJosé Carlos Brustoloni, Ricardo Villamarín-Salomón, Peter Djalaliev, David Kyle: Evaluating the usability of usage controls in electronic collaboration. SOUPS 2008: 85-92
23EEJosé Carlos Brustoloni, Shuo Chen: Automatically Segregating Greedy and Malicious Internet Flows. ICC 2007: 1949-1954
22EEJosé Carlos Brustoloni, Ricardo Villamarín-Salomón: Improving security decisions with polymorphic and audited dialogs. SOUPS 2007: 76-85
21EEDavid Kyle, José Carlos Brustoloni: Uclinux: a linux security module for trusted-computing-based usage controls enforcement. STC 2007: 63-70
20EEDaniel Mossé, Louise Comfort, Ahmed Amer, José Carlos Brustoloni, Panos K. Chrysanthis, Milos Hauskrecht, Alexandros Labrinidis, Rami G. Melhem, Kirk Pruhs: Secure-CITI Critical Information-Technology Infrastructure. DG.O 2006: 253-254
19EEJosé Carlos Brustoloni, Sherif M. Khattab, Christopher Santamaria, Brian Smyth, Daniel Mossé: Integrated Scheduling of Application- and Network-Layer Tasks in Delay-Tolerant MANETs. GLOBECOM 2006
18EEJosé Carlos Brustoloni: Laboratory experiments for network security instruction. ACM Journal of Educational Resources in Computing 6(4): (2006)
17EEJosé Carlos Brustoloni: Automatic VPN Client Recovery from IPsec Pass-through Failures. LCN 2005: 756-763
16EEHaidong Xia, Jayashree Kanchana, José Carlos Brustoloni: Using Secure Coprocessors to Protect Access to Enterprise Networks. NETWORKING 2005: 154-165
15EEXia Brustoloni, José Carlos Brustoloni: Hardening Web browsers against man-in-the-middle and eavesdropping attacks. WWW 2005: 489-498
14EEHaidong Xia, José Carlos Brustoloni: Detecting and Blocking Unauthorized Access in Wi-Fi Networks. NETWORKING 2004: 795-806
13EEJosé Carlos Brustoloni: Protecting electronic commerce from distributed denial-of-service attacks. WWW 2002: 553-561
12EEKostas Magoutis, José Carlos Brustoloni, Eran Gabber, Wee Teck Ng, Abraham Silberschatz: Building appliances out of components using Pebble. ACM SIGOPS European Workshop 2000: 211-216
11EEJosé Carlos Brustoloni, Juan A. Garay: Application-Independent End-to-End Security in Shared-Link Access Networks. NETWORKING 2000: 608-619
10EEJosé Carlos Brustoloni, Eran Gabber, Abraham Silberschatz, Amit Singh: Signaled Receiver Processing. USENIX Annual Technical Conference, General Track 2000: 211-224
9EEJosé Carlos Brustoloni, Juan A. Garay: MicroISPs: providing convenient and low-cost high-bandwidth Internet access. Computer Networks 33(1-6): 789-802 (2000)
8EEJohn L. Bruno, José Carlos Brustoloni, Eran Gabber, Banu Özden, Abraham Silberschatz: Disk Scheduling with Quality of Service Guarantees. ICMCS, Vol. 2 1999: 400-405
7 José Carlos Brustoloni: Interoperation of Copy Avoidance in Network and File I/O. INFOCOM 1999: 534-542
6EEJohn L. Bruno, José Carlos Brustoloni, Eran Gabber, Banu Özden, Abraham Silberschatz: Retrofitting Quality of Service into a Time-Sharing Operating System. USENIX Annual Technical Conference, General Track 1999: 15-26
5EEEran Gabber, Christopher Small, John L. Bruno, José Carlos Brustoloni, Abraham Silberschatz: The Pebble Component-Based Operating System. USENIX Annual Technical Conference, General Track 1999: 267-282
4 José Carlos Brustoloni, Peter Steenkiste: User-Level Protocol Servers with Kernel-Level Performance. INFOCOM 1998: 463-471
3 José Carlos Brustoloni, Peter Steenkiste: Copy Emulation in Checksummed, Multiple-Packet Communication. INFOCOM 1997: 1122-1130
2 José Carlos Brustoloni, Peter Steenkiste: Effects of Buffering Semantics on I/O Performance. OSDI 1996: 277-291
1 José Carlos Brustoloni: Exposed Buffering and Sub-Datagram Flow Control for ATM LANs. LCN 1994: 324-334

Coauthor Index

1Ahmed Amer [20]
2John L. Bruno [5] [6] [8]
3Xia Brustoloni [15]
4Shuo Chen [23]
5Panos K. Chrysanthis [20]
6Louise Comfort [20]
7Peter Djalaliev [24] [26]
8Eran Gabber [5] [6] [8] [10] [12]
9Juan A. Garay [9] [11]
10Milos Hauskrecht [20]
11Jayashree Kanchana [16]
12Sherif M. Khattab [19]
13David Kyle [21] [24] [25]
14Alexandros Labrinidis [20]
15Kostas Magoutis [12]
16Rami G. Melhem [20]
17Daniel Mossé [19] [20]
18Wee Teck Ng [12]
19Banu Özden [6] [8]
20Kirk Pruhs [20]
21Christopher Santamaria [19]
22Abraham Silberschatz (Avi Silberschatz) [5] [6] [8] [10] [12]
23Amit Singh [10]
24Christopher Small [5]
25Brian Smyth [19]
26Peter Steenkiste [2] [3] [4]
27Ricardo Villamarín-Salomón [22] [24] [27]
28Haidong Xia [14] [16]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)