Douglas S. Reeves

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

50EEQinghua Zhang, Douglas S. Reeves: MetaAware: Identifying Metamorphic Malware. ACSAC 2007: 411-420
49EEQinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer: Analyzing network traffic to detect self-decrypting exploit code. ASIACCS 2007: 4-12
48EEPan Wang, Peng Ning, Douglas S. Reeves: A k-anonymous communication protocol for overlay networks. ASIACCS 2007: 45-56
47EEYoung June Pyun, Douglas S. Reeves: Strategic deployment of network monitors for attack attribution. BROADNETS 2007: 525-534
46EEYoung June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning: Tracing Traffic through Intermediate Hosts that Repacketize Flows. INFOCOM 2007: 634-642
45EEPai Peng, Peng Ning, Douglas S. Reeves: On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. IEEE Symposium on Security and Privacy 2006: 334-349
44EEPai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang: Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. ICDCS Workshops 2005: 107-113
43EEQinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning: Defending against Sybil Attacks in Sensor Networks. ICDCS Workshops 2005: 185-191
42EEPan Wang, Peng Ning, Douglas S. Reeves: Network Access Control for Mobile Ad-Hoc Networks. ICICS 2005: 350-362
41EEPan Wang, Douglas S. Reeves, Peng Ning: Secure Address Auto-con.guration for Mobile Ad Hoc Networks. MobiQuitous 2005: 519-522
40EEAyman Shaker, Douglas S. Reeves: Self-Stabilizing Structured Ring Topology P2P Systems. Peer-to-Peer Computing 2005: 39-46
39EEYan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves: Reasoning About Complementary Intrusion Evidence. ACSAC 2004: 39-48
38EEQinglin Jiang, Douglas S. Reeves, Peng Ning: Improving Robustness of PGP Keyrings by Conflict Detection. CT-RSA 2004: 194-207
37EEPan Wang, Peng Ning, Douglas S. Reeves: Storage-Efficient Stateless Group Key Revocation. ISC 2004: 25-38
36EEQinglin Jiang, Douglas S. Reeves, Peng Ning: Certificate Recommendations to Improve the Robustness of Web of Trust. ISC 2004: 292-303
35EEYoung June Pyun, Douglas S. Reeves: Constructing a Balanced, (log(N)/loglog(N))-Diameter Super-Peer Topology for Scalable P2P Systems. Peer-to-Peer Computing 2004: 210-218
34EEPeng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu: Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. 7(2): 274-318 (2004)
33EEErrin W. Fulp, Douglas S. Reeves: Bandwidth provisioning and pricing for networks with multiple classes of service. Computer Networks 46(1): 41-52 (2004)
32EEKehang Wu, Douglas S. Reeves: Capacity Planning of DiffServ Networks with Best-Effort and Expedited Forwarding Traffic. Telecommunication Systems 25(3-4): 193-207 (2004)
31EEXinyuan Wang, Douglas S. Reeves: Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. ACM Conference on Computer and Communications Security 2003: 20-29
30EEXiaoyong Wu, Vinay A. Mahadik, Douglas S. Reeves: A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks. DISCEX (2) 2003: 277-
29EEPeng Ning, Yun Cui, Douglas S. Reeves: Constructing attack scenarios through correlation of intrusion alerts. ACM Conference on Computer and Communications Security 2002: 245-254
28EEXinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu: Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. ESORICS 2002: 244-263
27EEErrin W. Fulp, Douglas S. Reeves: The Economic Impact of Network Pricing Intervals. QofIS 2002: 315-324
26EEPeng Ning, Yun Cui, Douglas S. Reeves: Analyzing Intensive Intrusion Alerts via Correlation. RAID 2002: 74-94
25 Errin W. Fulp, Douglas S. Reeves: Optimal Provisioning and Pricing of Differentiated Services Using QoS Class Promotion. GI Jahrestagung (1) 2001: 144-150
24EEErrin W. Fulp, Douglas S. Reeves: Optimal Provisioning and Pricing of Internet Differentiated Services in Hierarchical Markets. ICN (1) 2001: 409-418
23 Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu, Jim Yuill: Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. SEC 2001: 369-384
22 T. P. Kelly, Douglas S. Reeves: Optimal Web cache sizing: scalable methods for exact solutions. Computer Communications 24(2): 163-173 (2001)
21EEHaining Wang, Kang G. Shin, Hongjie Xin, Douglas S. Reeves: A Simple Refinement of Slow-Start of TCP Congestion Control. ISCC 2000: 98-105
20EEErrin W. Fulp, Douglas S. Reeves: QoS Rewards and Risks: A Multi-market Approach to Resource Allocation. NETWORKING 2000: 945-956
19EEWinser E. Alexander, Douglas S. Reeves, Clay S. Gloster Jr.: Parallel image processin gwith the block data paralel architecture. IBM Journal of Research and Development 44(5): 681-702 (2000)
18EEDouglas S. Reeves, Hussein F. Salama: A distributed algorithm for delay-constrained unicast routing. IEEE/ACM Trans. Netw. 8(2): 239-250 (2000)
17EEMichael R. Izquierdo, Douglas S. Reeves: A Survey of Statistical Source Models for Variable-bit-rate Compressed Video. Multimedia Syst. 7(3): 199-213 (1999)
16EEErrin W. Fulp, Douglas S. Reeves: Distributed Network Flow Control based on Dynamic Competitive Markets. ICNP 1998: 119-128
15EEErrin W. Fulp, Douglas S. Reeves: On-line Dynamic Bandwidth Allocation. ICNP 1997: 134-141
14 Hussein F. Salama, Douglas S. Reeves, Yannis Viniotis: A Distributed Algorithm for Delay-Constrained Unicast Routing. INFOCOM 1997: 84-91
13EEDouglas S. Reeves: A course on multimedia technology for computer science and computer engineering students. SIGCSE 1997: 174-178
12 Hussein F. Salama, Douglas S. Reeves, Yannis Viniotis: Evaluation of Multicast Routing Algorithms for Real-Time Communication on High-Speed Networks. IEEE Journal on Selected Areas in Communications 15(3): 332-345 (1997)
11 Hussein F. Salama, Douglas S. Reeves, Yannis Viniotis, Tsang-Ling Sheu: Evaluation of multicast routing algorithms for real-time communication on high-speed networks. HPN 1995: 27-42
10EESanjeev Rampal, Douglas S. Reeves: Routing and admission control algorithms for multimedia traffic. Computer Communications 18(10): 755-768 (1995)
9 Sanjeev Rampal, Douglas S. Reeves, Dharma P. Agrawal: An Evalutaion of Routing and Admission Control Algorithms for Real-Time Traffic in Packet-Switched Networks. HPN 1994: 79-93
8 Sean Alexandre, Winser E. Alexander, Douglas S. Reeves: A Programmable Simulator for Analyzing the Block Data Flow Architecture. MASCOTS 1994: 399-400
7 Sanjeev Rampal, Douglas S. Reeves, Dharma P. Agrawal: End-to-end guaranteed QoS with statistical multiplexing for ATM networks. Modelling and Evaluation of ATM Networks 1994: 485-497
6EEDouglas S. Reeves, Edward F. Gehringer: Adaptive Routing for Hypercube Multiprocessors: a Performance Study. International Journal of High Speed Computing 6(1): 1-29 (1994)
5 Mladen A. Vouk, Douglas S. Reeves, Cherri M. Pancake: Proceedings of the 30th Annual Southeast Regional Conference, 1992, Raleigh, North Carolina, USA, April 8-10, 1992 ACM 1992
4 Markus Siegle, Douglas S. Reeves, Krzysztof Kozminski: The Interlocking Bus Network for Fault-Tolerant Processor Arrays. Fault-Tolerant Computing Systems 1991: 348-359
3EEA. A. Fennisi, Douglas S. Reeves: Using the stuck-at fault model: how well does it work? ACM Southeast Regional Conference 1990: 40-46
2EEMatt Melton, Tan Phan, Douglas S. Reeves, David E. van den Bout: VLSI Implementation of TInMANN. NIPS 1990: 1046-1052
1EEDouglas S. Reeves, Mary Jane Irwin: Fast Methods for Switch-Level Verification of MOS Circuits. IEEE Trans. on CAD of Integrated Circuits and Systems 6(5): 766-779 (1987)

Coauthor Index

1Dharma P. Agrawal [7] [9]
2Winser E. Alexander [8] [19]
3Sean Alexandre [8]
4David E. van den Bout [2]
5Yun Cui [26] [29] [34]
6A. A. Fennisi [3]
7Errin W. Fulp [15] [16] [20] [24] [25] [27] [33]
8Edward F. Gehringer [6]
9Clay S. Gloster Jr. (Clay Gloster) [19]
10Mary Jane Irwin [1]
11Purush Iyer [39]
12S. Purushothaman Iyer (S. Purushothaman) [49]
13Michael R. Izquierdo [17]
14Qinglin Jiang [36] [38]
15T. P. Kelly [22]
16Krzysztof Kozminski [4]
17Vinay A. Mahadik [30]
18Matt Melton [2]
19Peng Ning [26] [29] [34] [36] [37] [38] [39] [41] [42] [43] [44] [45] [46] [48] [49]
20Cherri M. Pancake [5]
21Young Hee Park [46]
22Pai Peng [44] [45]
23Tan Phan [2]
24Young June Pyun [35] [46] [47]
25Sanjeev Rampal [7] [9] [10]
26Hussein F. Salama [11] [12] [14] [18]
27Ayman Shaker [40]
28Tsang-Ling Sheu [11]
29Kang G. Shin [21]
30Markus Siegle [4]
31Yannis Viniotis [11] [12] [14]
32Mladen A. Vouk [5]
33Haining Wang [21]
34Pan Wang [37] [41] [42] [43] [48]
35Xinyuan Wang [23] [28] [31] [44] [46]
36Kehang Wu [32]
37Shyhtsun Felix Wu [23] [28]
38Xiaoyong Wu [30]
39Hongjie Xin [21]
40Dingbang Xu [34]
41Jim Yuill [23]
42Yan Zhai [39]
43Qinghua Zhang [43] [49] [50]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)