dblp.uni-trier.dewww.uni-trier.de

David Evans

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
46EEAnh Nguyen-Tuong, David Evans, John C. Knight, Benjamin Cox, Jack W. Davidson: Security through redundant data diversity. DSN 2008: 187-196
45EEDavid Evans, David M. Eyers: Deontic logic for modelling data flow and use compliance. MPAC 2008: 19-24
44EEKarsten Nohl, David Evans: Hiding in Groups: On the Expressiveness of Privacy Distributions. SEC 2008: 1-15
43EEKarsten Nohl, David Evans, Starbug, Henryk Plötz: Reverse-Engineering a Cryptographic RFID Tag. USENIX Security Symposium 2008: 185-194
2007
42 David Evans, Sadaoki Furui, Chantal Soulé-Dupuy: Computer-Assisted Information Retrieval (Recherche d'Information et ses Applications) - RIAO 2007, 8th International Conference, Carnegie Mellon University, Pittsburgh, PA, USA, May 30 - June 1, 2007. Proceedings, CD-ROM CID 2007
41EEDavid Evans, Alastair R. Beresford, Trevor Burbridge, Andrea Soppera: Context-Derived Pseudonyms for Protection of Privacy in Transport Middleware and Applications. PerCom Workshops 2007: 395-400
2006
40EEMax Chacón, Darwin Diaz, Luis Ríos, David Evans, Ronney Panerai: Support Vector Machine with External Recurrences for Modeling Dynamic Cerebral Autoregulation. CIARP 2006: 954-963
39EEKarsten Nohl, David Evans: Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper). ICICS 2006: 228-237
38EEJinlin Yang, David Evans, Deepali Bhardwaj, Thirumalesh Bhat, Manuvir Das: Perracotta: mining temporal API rules from imperfect traces. ICSE 2006: 282-291
37EEDavid Evans, Michael Peck: Inculcating invariants in introductory courses. ICSE 2006: 673-678
36EEWei Hu, Jason Hiser, Daniel Williams, Adrian Filipi, Jack W. Davidson, David Evans, John C. Knight, Anh Nguyen-Tuong, Jonathan C. Rowanhill: Secure and practical defense against code-injection attacks using software dynamic translation. VEE 2006: 2-12
35EENathanael Paul, David Evans: Comparing Java and .NET security: Lessons learned and missed. Computers & Security 25(5): 338-350 (2006)
34EEGregory E. Graham, M. Anzar Afaq, David Evans, Gerald Guglielmo, Eric Wicklund, Peter Love: Contextual constraint modeling in Grid application workflows. Concurrency and Computation: Practice and Experience 18(10): 1277-1292 (2006)
2005
33EEMax Chacón, Cristopher Blanco, Ronney Panerai, David Evans: Nonlinear Modeling of Dynamic Cerebral Autoregulation Using Recurrent Neural Networks. CIARP 2005: 205-213
32EEMahnas Jean Mohammadi-Aragh, Ikuko Fujisaki, Derek Irby, David Evans, Robert Moorhead, Scott Roberts: Visualization of Computer-Modeled Forests for Forest Management. EuroVis 2005: 183-190
31 Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans: Automatically Hardening Web Applications Using Precise Tainting. SEC 2005: 295-308
30EEDavid Evans: Toasters, Seat Belts, and Inferring Program Properties. VSTTE 2005: 354-361
29EEGregory E. Graham, M. Anzar Afaq, David Evans, Gerald Guglielmo, Eric Wicklund, Peter Love: Contextual Constraint Modeling in Grid Application Workflows CoRR abs/cs/0503045: (2005)
2004
28EENathanael Paul, David Evans: .NET Security: Lessons Learned and Missed from Java. ACSAC 2004: 272-281
27EEDavid Evans, Raimondas Lencevicius: Second International Workshop on Dynamic Analysis (WODA 2004). ICSE 2004: 763
26EEJinlin Yang, David Evans: Automatically Inferring Temporal Properties for Program Evolution . ISSRE 2004: 340-351
25EELingxuan Hu, David Evans: Localization for mobile sensor networks. MOBICOM 2004: 45-57
24EELingxuan Hu, David Evans: Using Directional Antennas to Prevent Wormhole Attacks. NDSS 2004
23EEJinlin Yang, David Evans: Dynamically inferring temporal properties. PASTE 2004: 23-28
22EEDavid Evans: What Biology Can (and Can't) Teach Us About Security. USENIX Security Symposium 2004
21EEDavid Evans, Raimondas Lencevicius: ICSE 2004 workshop summary second international workshop on dynamic analysis (WODA 2004). ACM SIGSOFT Software Engineering Notes 29(5): 1-2 (2004)
20EESimone Leão, Ian Bishop, David Evans: Spatial-temporal model for demand and allocation of waste landfills in growing urban regions. Computers, Environment and Urban Systems 28(4): 353-385 (2004)
19EEDavid Evans, Nathanael Paul: Election Security: Perception and Reality. IEEE Security & Privacy 2(1): 24-31 (2004)
18EEKang Zhuo, Li Yan, Hugo de Garis, David Evans, Lishan Kang: Multi-modal function optimization with the ZEDS (zoomed evolutionary dual strategy) algorithmzoomed evolutionary algorithm. Int. J. Comput. Math. 81(6): 675-684 (2004)
17EEChristopher Frost, Michael Peck, David Evans: Pancakes, puzzles, and polynomials: cracking the Cracker Barrel. SIGACT News 35(1): 80-84 (2004)
2003
16EELingxuan Hu, David Evans: Secure Aggregation for Wireless Network. SAINT Workshops 2003: 384-394
15EEGregory E. Graham, David Evans, Iain Bertram: McRunjob: A High Energy Physics Workflow Planner for Grid Production Processing CoRR cs.DC/0305063: (2003)
14EEJohnny W. Wong, David Evans, Michael Kwok: On Staleness and the Delivery of Web Pages. Information Systems Frontiers 5(2): 129-136 (2003)
2002
13EESelvin George, David Evans, Lance Davidson: A biologically inspired programming model for self-healing systems. WOSS 2002: 102-104
12EEDavid Evans, David Larochelle: Improving Security Using Extensible Lightweight Static Analysis. IEEE Software 19(1): 42-51 (2002)
2001
11EEJohnny W. Wong, David Evans, Michael Kwok: On staleness and the delivery of web pages. CASCON 2001: 17
10EEKeen Browne, Jon McCune, Adam Trost, David Evans, David C. Brogan: Behavior Combination and Swarm Programming. RoboCup 2001: 499-502
2000
9 Emilia Stoica, David Evans: Dynamic term selection in learning a query from examples. RIAO 2000: 1703-1719
1999
8EEDavid Evans, Andrew Twyman: Flexible Policy-Directed Code Safety. IEEE Symposium on Security and Privacy 1999: 32-45
7EEYonggang Du, Christoph Herrmann, Klaus Peter May, David Evans: A flat wireless ATM LAN architecture with distributed ATM switching in base stations. Computer Networks 31(9-10): 931-942 (1999)
1997
6 Johnny W. Wong, Kelly A. Lyons, David Evans, Rolf J. Velthuys, Gregor von Bochmann, Eric Dubois, Nicolas D. Georganas, Gerald W. Neufeld, M. Tamer Özsu, Jeff Brinskelle, Abdelhakim Hafid, Norman C. Hutchinson, Paul Iglinski, Brigitte Kerhervé, Louise Lamont, Dwight J. Makaroff, Duane Szafron: Enabling Technology for Distributed Multimedia Applications. IBM Systems Journal 36(4): 489-507 (1997)
1996
5EEDavid Evans: An architecture for enforcement of usage contracts in distributed multimedia systems. CASCON 1996: 10
4 David Evans: Static Detection of Dynamic Memory Errors. PLDI 1996: 44-53
1994
3 Floor Rikkens, David Evans, Rein Vos: Specifying Adverse Drug Reactions by Formulating Contexts. RIAO 1994: 82-94
2EEDavid Evans, John V. Guttag, James J. Horning, Yang Meng Tan: LCLint: A Tool for Using Specifications to Check Code. SIGSOFT FSE 1994: 87-96
1968
1 David Evans, Andries van Dam: Data Structure Programming System. IFIP Congress (1) 1968: 557-564

Coauthor Index

1M. Anzar Afaq [29] [34]
2Alastair R. Beresford [41]
3Iain Bertram [15]
4Deepali Bhardwaj [38]
5Thirumalesh Bhat [38]
6Ian Bishop [20]
7Cristopher Blanco [33]
8Gregor von Bochmann [6]
9Jeff Brinskelle [6]
10David C. Brogan [10]
11Keen Browne [10]
12Trevor Burbridge [41]
13Max Chacón [33] [40]
14Benjamin Cox [46]
15Andries van Dam [1]
16Manuvir Das [38]
17Jack W. Davidson [36] [46]
18Lance Davidson [13]
19Darwin Diaz [40]
20Yonggang Du [7]
21Eric Dubois [6]
22David M. Eyers [45]
23Adrian Filipi [36]
24Christopher Frost [17]
25Ikuko Fujisaki [32]
26Sadaoki Furui [42]
27Hugo de Garis [18]
28Nicolas D. Georganas [6]
29Selvin George [13]
30Gregory E. Graham [15] [29] [34]
31Doug Greene [31]
32Salvatore Guarnieri [31]
33Gerald Guglielmo [29] [34]
34John V. Guttag [2]
35Abdelhakim Hafid [6]
36Christoph Herrmann [7]
37Jason Hiser [36]
38James J. Horning (Jim Horning) [2]
39Lingxuan Hu [16] [24] [25]
40Wei Hu [36]
41Norman C. Hutchinson [6]
42Paul Iglinski [6]
43Derek Irby [32]
44Lishan Kang [18]
45Brigitte Kerhervé [6]
46John C. Knight [36] [46]
47Michael Kwok [11] [14]
48Louise Lamont [6]
49David Larochelle [12]
50Simone Leão [20]
51Raimondas Lencevicius [21] [27]
52Peter Love [29] [34]
53Kelly A. Lyons [6]
54Dwight J. Makaroff [6]
55Klaus Peter May [7]
56Jon McCune [10]
57Mahnas Jean Mohammadi-Aragh [32]
58Robert Moorhead [32]
59Gerald W. Neufeld [6]
60Anh Nguyen-Tuong [31] [36] [46]
61Karsten Nohl [39] [43] [44]
62M. Tamer Özsu [6]
63Ronney Panerai [33] [40]
64Nathanael Paul [19] [28] [35]
65Michael Peck [17] [37]
66Henryk Plötz [43]
67Floor Rikkens [3]
68Luis Ríos [40]
69Scott Roberts [32]
70Jonathan C. Rowanhill [36]
71Jeff Shirley [31]
72Andrea Soppera [41]
73Chantal Soulé-Dupuy (C. Soulé-Dupuy) [42]
74 Starbug [43]
75Emilia Stoica [9]
76Duane Szafron [6]
77Yang Meng Tan [2]
78Adam Trost [10]
79Andrew Twyman [8]
80Rolf J. Velthuys [6]
81Rein Vos [3]
82Eric Wicklund [29] [34]
83Daniel Williams [36]
84Johnny W. Wong [6] [11] [14]
85Li Yan [18]
86Jinlin Yang [23] [26] [38]
87Kang Zhuo [18]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)