other persons with the same name:
2008 | ||
---|---|---|
20 | EE | John J. Leonard, Jonathan P. How, Seth J. Teller, Mitch Berger, Stefan Campbell, Gaston A. Fiore, Luke Fletcher, Emilio Frazzoli, Albert Huang, Sertac Karaman, Olivier Koch, Yoshiaki Kuwata, David Moore, Edwin Olson, Steve Peters, Justin Teo, Robert Truax, Matthew Walter, David Barrett, Alexander Epstein, Keoni Maheloni, Katy Moyer, Troy Jones, Ryan Buckley, Matthew E. Antone, Robert Galejs, Siddhartha Krishnamurthy, Jonathan Williams: A perception-driven autonomous urban vehicle. J. Field Robotics 25(10): 727-774 (2008) |
19 | EE | Luke Fletcher, Seth J. Teller, Edwin Olson, David Moore, Yoshiaki Kuwata, Jonathan How, John J. Leonard, Isaac Miller, Mark Campbell, Dan Huttenlocher, Aaron Nathan, Frank-Robert Kline: The MIT-Cornell collision and why it happened. J. Field Robotics 25(10): 775-807 (2008) |
2006 | ||
18 | EE | David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage: Inferring Internet denial-of-service activity. ACM Trans. Comput. Syst. 24(2): 115-139 (2006) |
2005 | ||
17 | EE | Ken Keys, David Moore, Cristian Estan: A robust system for accurate real-time summaries of internet traffic. SIGMETRICS 2005: 85-96 |
16 | EE | Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage: Scalability, fidelity, and containment in the potemkin virtual honeyfarm. SOSP 2005: 148-162 |
15 | EE | Colleen Shannon, David Moore, Ken Keys, Marina Fomenkov, Bradley Huffaker, Kimberly C. Claffy: The internet measurement data catalog. Computer Communication Review 35(5): 97-100 (2005) |
2004 | ||
14 | EE | Cristian Estan, Ken Keys, David Moore, George Varghese: Building a better NetFlow. SIGCOMM 2004: 245-256 |
13 | EE | Stuart Staniford, David Moore, Vern Paxson, Nicholas Weaver: The top speed of flash worms. WORM 2004: 33-42 |
12 | EE | Colleen Shannon, David Moore: The Spread of the Witty Worm. IEEE Security & Privacy 2(4): 46-50 (2004) |
11 | EE | Constantinos Dovrolis, Parameswaran Ramanathan, David Moore: Packet-dispersion techniques and a capacity-estimation methodology. IEEE/ACM Trans. Netw. 12(6): 963-977 (2004) |
2003 | ||
10 | EE | Ranjita Bhagwan, David Moore, Stefan Savage, Geoffrey M. Voelker: Replication Strategies for Highly Available Peer-to-Peer Storage. Future Directions in Distributed Computing 2003: 153-158 |
9 | EE | David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage: Internet Quarantine: Requirements for Containing Self-Propagating Code. INFOCOM 2003 |
8 | David Moore: Network Telescopes: Tracking Denial-of-Service Attacks and Internet Worms Around the Globe. LISA 2003 | |
7 | EE | David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver: Inside the Slammer Worm. IEEE Security & Privacy 1(4): 33-39 (2003) |
2002 | ||
6 | EE | David Moore, Colleen Shannon, Kimberly C. Claffy: Code-Red: a case study on the spread and victims of an internet worm. Internet Measurement Workshop 2002: 273-284 |
5 | EE | Colleen Shannon, David Moore, Kimberly C. Claffy: Beyond folklore: observations on fragmented traffic. IEEE/ACM Trans. Netw. 10(6): 709-720 (2002) |
2001 | ||
4 | EE | Constantinos Dovrolis, Parameswaran Ramanathan, David Moore: What Do Packet Dispersion Techniques Measure? INFOCOM 2001: 905-914 |
3 | EE | Colleen Shannon, David Moore, Kimberly C. Claffy: Characteristics of fragmented IP traffic on internet links. Internet Measurement Workshop 2001: 83-97 |
2 | EE | David Moore, Ken Keys, Ryan Koga, Edouard Lagache, Kimberly C. Claffy: The CoralReef Software Suite as a Tool for System and Network Administrators. LISA 2001: 133-144 |
1 | EE | Marina Fomenkov, Kimberly C. Claffy, Bradley Huffaker, David Moore: Macroscopic Internet Topology and Performance Measurements from the DNS Root Name Servers. LISA 2001: 231-240 |