2009 |
70 | EE | Jelena Mirkovic,
Alefiya Hussain,
Sonia Fahmy,
Peter L. Reiher,
Roshan K. Thomas:
Accurately Measuring Denial of Service in Simulation and Testbed Experiments.
IEEE Trans. Dependable Sec. Comput. 6(2): 81-95 (2009) |
2008 |
69 | EE | Tim Dasilva,
Kevin Eustice,
Peter L. Reiher:
Johnny Appleseed: wardriving to reduce interference in chaotic wireless deployments.
MSWiM 2008: 122-131 |
68 | EE | Kevin Eustice,
A. M. Jourabchi,
J. Stoops,
Peter L. Reiher:
Improving User Satisfaction in a Ubiquitous Computing Application.
WiMob 2008: 496-501 |
67 | EE | Peter L. Reiher,
John Zimmerman,
Kevin Eustice:
Message from the SAUCE Workshop Organizing Technical Co-chairs.
WiMob 2008 |
66 | EE | Jun Li,
Jelena Mirkovic,
Toby Ehrenkranz,
Mengqiu Wang,
Peter L. Reiher,
Lixia Zhang:
Learning the valid incoming direction of IP packets.
Computer Networks 52(2): 399-417 (2008) |
65 | EE | Jelena Mirkovic,
Peter L. Reiher,
Christos Papadopoulos,
Alefiya Hussain,
Marla Shepard,
Michael Berg,
Robert Jung:
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise.
IEEE Trans. Computers 57(8): 1098-1112 (2008) |
2007 |
64 | EE | Jelena Mirkovic,
Alefiya Hussain,
Brett Wilson,
Sonia Fahmy,
Peter L. Reiher,
Roshan K. Thomas,
Wei-Min Yao,
Stephen Schwab:
Towards user-centric metrics for denial-of-service measurement.
Experimental Computer Science 2007: 8 |
63 | EE | Kevin Eustice,
Venkatraman Ramakrishna,
Alison Walker,
Matthew Schnaider,
Nam T. Nguyen,
Peter L. Reiher:
nan0sphere: Location-Driven Fiction for Groups of Users.
HCI (3) 2007: 852-861 |
62 | EE | Jelena Mirkovic,
Alefiya Hussain,
Brett Wilson,
Sonia Fahmy,
Wei-Min Yao,
Peter L. Reiher,
Stephen Schwab,
Roshan K. Thomas:
When is service really denied?: a user-centric dos metric.
SIGMETRICS 2007: 357-358 |
61 | EE | Venkatraman Ramakrishna,
Kevin Eustice,
Peter L. Reiher:
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios.
SOCA 2007: 180-190 |
60 | EE | Charles Weddle,
Mathew Oldham,
Jin Qian,
An-I Andy Wang,
Peter L. Reiher,
Geoffrey H. Kuenning:
PARAID: A gear-shifting power-aware RAID.
TOS 3(3): (2007) |
2006 |
59 | EE | George C. Oikonomou,
Jelena Mirkovic,
Peter L. Reiher,
Max Robinson:
A Framework for a Collaborative DDoS Defense.
ACSAC 2006: 33-42 |
58 | EE | Jelena Mirkovic,
Peter L. Reiher,
Sonia Fahmy,
Roshan K. Thomas,
Alefiya Hussain,
Stephen Schwab,
Calvin Ko:
Measuring denial Of service.
QoP 2006: 53-58 |
57 | EE | Venkatraman Ramakrishna,
Max Robinson,
Kevin Eustice,
Peter L. Reiher:
An Active Self-Optimizing Multiplayer Gaming Architecture.
Cluster Computing 9(2): 201-215 (2006) |
56 | EE | An-I Andy Wang,
Geoffrey H. Kuenning,
Peter L. Reiher,
Gerald J. Popek:
The Conquest file system: Better performance through a disk/persistent-RAM hybrid design.
TOS 2(3): 309-348 (2006) |
2005 |
55 | | Margaret H. Dunham,
Birgitta König-Ries,
Evaggelia Pitoura,
Peter L. Reiher,
Can Türker:
Mobile Information Management, 24.-29. October 2004
IBFI, Schloss Dagstuhl, Germany 2005 |
54 | EE | Jun Li,
Toby Ehrenkranz,
Geoffrey H. Kuenning,
Peter L. Reiher:
Simulation and Analysis on the Resiliency and Efficiency of Malnets.
PADS 2005: 262-269 |
53 | EE | Everett Anderson,
Kevin Eustice,
Shane Markstrum,
Mark H. Hansen,
Peter L. Reiher:
Mobile Contagion: Simulation of Infection and Defense.
PADS 2005: 80-87 |
52 | EE | An-I Wang,
Peter L. Reiher,
Geoffrey H. Kuenning:
Introducing permuted states for analyzing conflict rates in optimistic replication.
SIGMETRICS 2005: 376-377 |
51 | EE | Jelena Mirkovic,
Peter L. Reiher:
D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks.
IEEE Trans. Dependable Sec. Comput. 2(3): 216-232 (2005) |
2004 |
50 | EE | Margaret H. Dunham,
Birgitta König-Ries,
Evaggelia Pitoura,
Peter L. Reiher,
Can Türker:
04441 Abstracts Collection - Mobile Information Management.
Mobile Information Management 2004 |
49 | EE | Margaret H. Dunham,
Birgitta König-Ries,
Evaggelia Pitoura,
Peter L. Reiher,
Can Türker:
04441 Executive Summary - Mobile Information Management.
Mobile Information Management 2004 |
48 | EE | Joos-Hendrik Böse,
Stefan Böttcher,
Le Gruenwald,
Evaggelia Pitoura,
Peter L. Reiher,
George Samaras,
Thomas Schwarz,
Can Türker:
04441 Working Group - Research Issues in Mobile Transactions.
Mobile Information Management 2004 |
47 | EE | Joos-Hendrik Böse,
Stefan Böttcher,
Le Gruenwald,
Pedro José Marrón,
Philipp Obreiter,
Evaggelia Pitoura,
Peter L. Reiher,
Kai-Uwe Sattler,
Frank Seliger:
04441 Working Group - Some Open Aspects of Mobile Ad-hoc NETwork, Peer-to-Peer, and Self-organizing Systems.
Mobile Information Management 2004 |
46 | EE | Jelena Mirkovic,
Peter L. Reiher:
A taxonomy of DDoS attack and DDoS defense mechanisms.
Computer Communication Review 34(2): 39-53 (2004) |
45 | EE | Jun Li,
Peter L. Reiher,
Gerald J. Popek:
Resilient self-organizing overlay networks for security update delivery.
IEEE Journal on Selected Areas in Communications 22(1): 189-202 (2004) |
44 | EE | David Ratner,
Peter L. Reiher,
Gerald J. Popek:
Roam: A Scalable Replication System for Mobility.
MONET 9(5): 537-544 (2004) |
43 | EE | Nam T. Nguyen,
An-I Andy Wang,
Peter L. Reiher,
Geoffrey H. Kuenning:
Electric-field-based routing: a reliable framework for routing in MANETs.
Mobile Computing and Communications Review 8(2): 35-49 (2004) |
2003 |
42 | EE | Venkatraman Ramakrishna,
Max Robinson,
Kevin Eustice,
Peter L. Reiher:
An Active Self-Optimizing Multiplayer Gaming Architecture.
Active Middleware Services 2003: 32-41 |
41 | EE | Max Robinson,
Jelena Mirkovic,
B. Scott Michel,
Matthew Schnaider,
Peter L. Reiher:
DefCOM: Defensive Cooperative Overlay Mesh.
DISCEX (2) 2003: 101-102 |
40 | | Nam T. Nguyen,
Peter L. Reiher,
Geoffrey H. Kuenning:
Detecting Insider Threats by Monitoring System Call Activity.
IAW 2003: 45-52 |
39 | EE | Alexey Rudenko,
Peter L. Reiher:
Adaptation Planning for Active Networks.
IWAN 2003: 252-265 |
38 | | Kevin Eustice,
Leonard Kleinrock,
Shane Markstrum,
Gerald J. Popek,
Venkatraman Ramakrishna,
Peter L. Reiher:
Enabling Secure Ubiquitous Interactions.
Middleware Workshops 2003: 76-80 |
37 | EE | Jelena Mirkovic,
Gregory Prier,
Peter L. Reiher:
Source-End DDoS Defense.
NCA 2003: 171-178 |
36 | EE | Jelena Mirkovic,
Max Robinson,
Peter L. Reiher:
Alliance formation for DDoS defense.
NSPW 2003: 11-18 |
35 | EE | Kevin Eustice,
Leonard Kleinrock,
Shane Markstrum,
Gerald J. Popek,
Venkatraman Ramakrishna,
Peter L. Reiher:
Securing nomads: the case for quarantine, examination, and decontamination.
NSPW 2003: 123-128 |
2002 |
34 | EE | Vincent Ferreria,
Alexey Rudenko,
Kevin Eustice,
Richard G. Guy,
Venkatraman Ramakrishna,
Peter L. Reiher:
Panda: Middleware to Provide the Benefits of Active Networks to Legacy Applications.
DANCE 2002: 319-332 |
33 | EE | An-I Wang,
Peter L. Reiher,
Rajive Bagrodia,
Geoffrey H. Kuenning:
Understanding the Behavior of the Conflict-Rate Metric in Optimistic Peer Replication.
DEXA Workshops 2002: 757-764 |
32 | EE | Jelena Mirkovic,
Gregory Prier,
Peter L. Reiher:
Attacking DDoS at the Source.
ICNP 2002: 312-321 |
31 | EE | Jun Li,
Jelena Mirkovic,
Mengqiu Wang,
Peter L. Reiher,
Lixia Zhang:
SAVE: Source Address Validity Enforcement Protocol.
INFOCOM 2002 |
30 | EE | Geoffrey H. Kuenning,
Wilkie Ma,
Peter L. Reiher,
Gerald J. Popek:
Simplifying automated hoarding methods.
MSWiM 2002: 15-21 |
29 | EE | An-I Wang,
Peter L. Reiher,
Gerald J. Popek,
Geoffrey H. Kuenning:
Conquest: Better Performance Through a Disk/Persistent-RAM Hybrid File System.
USENIX Annual Technical Conference, General Track 2002: 15-28 |
28 | EE | Jun Li,
Mark Yarvis,
Peter L. Reiher:
Securing distributed adaptation.
Computer Networks 38(3): 347-371 (2002) |
27 | EE | Birgitta König-Ries,
Kia Makki,
S. A. M. Makki,
Charles E. Perkins,
Niki Pissinou,
Peter L. Reiher,
Peter Scheuermann,
Jari Veijalainen,
Ouri Wolfson:
Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems.
SIGMOD Record 31(2): 73-79 (2002) |
2001 |
26 | EE | Peter L. Reiher,
Kevin Eustice,
Kai-Min Sung:
Adapting Encrypted Data Streams in Open Architectures.
Active Middleware Services 2001: 45-50 |
25 | | B. Scott Michel,
Peter L. Reiher:
Peer-through-Peer Communication for Information Logistics.
GI Jahrestagung (1) 2001: 248-256 |
24 | EE | An-I Wang,
Peter L. Reiher,
Gerald J. Popek,
Geoffrey H. Kuenning:
The Conquest File System's Life after Disks.
HotOS 2001: 186 |
23 | EE | Birgitta König-Ries,
Kia Makki,
S. A. M. Makki,
Charles E. Perkins,
Niki Pissinou,
Peter L. Reiher,
Peter Scheuermann,
Jari Veijalainen,
Alexander L. Wolf,
Ouri Wolfson:
Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona.
Infrastructure for Mobile and Wireless Systems 2001: 1-37 |
22 | EE | Todd Ekenstam,
Charles Matheny,
Peter L. Reiher,
Gerald J. Popek:
The Bengal Database Replication System.
Distributed and Parallel Databases 9(3): 187-210 (2001) |
21 | | David Ratner,
Peter L. Reiher,
Gerald J. Popek,
Geoffrey H. Kuenning:
Replication Requirements in Mobile Environments.
MONET 6(6): 525-533 (2001) |
2000 |
20 | EE | B. Scott Michel,
Konstantinos Nikoloudakis,
Peter L. Reiher,
Lixia Zhang:
URL Forwarding and Compression in Adaptive Web Caching.
INFOCOM 2000: 670-678 |
19 | | B. R. Badrinath,
Armando Fox,
Leonard Kleinrock,
Gerald J. Popek,
Peter L. Reiher,
Mahadev Satyanarayanan:
A conceptual framework for network and client adaptation.
MONET 5(4): 221-231 (2000) |
1999 |
18 | EE | David Ratner,
Peter L. Reiher,
Gerald J. Popek:
Roam: A Scalable Replication System for Mobile Computing.
DEXA Workshop 1999: 96-104 |
17 | EE | An-I Wang,
Peter L. Reiher,
Rajive Bagrodia:
A simulation evaluation of optimistic replicated filing in mobile environments.
IPCCC 1999: 43-51 |
16 | EE | David Ratner,
Peter L. Reiher,
Gerald J. Popek,
Richard G. Guy:
Peer Replication with Selective Control.
MDA 1999: 169-181 |
15 | EE | Alexey Rudenko,
Peter L. Reiher,
Gerald J. Popek,
Geoffrey H. Kuenning:
The Remote Processing Framework for Portable Computer Power Saving.
SAC 1999: 365-372 |
14 | EE | Mitchell Tsai,
Peter L. Reiher,
Gerald J. Popek:
Command Management System for Next-Generation User Input.
Workshop on Hot Topics in Operating Systems 1999: 179-184 |
13 | EE | Mark Yarvis,
Peter L. Reiher,
Gerald J. Popek:
Conductor: A Framework for Distributed Adaptation.
Workshop on Hot Topics in Operating Systems 1999: 44- |
1998 |
12 | EE | Geoffrey H. Kuenning,
Rajive Bagrodia,
Richard G. Guy,
Gerald J. Popek,
Peter L. Reiher,
An-I Wang:
Measuring the Quality of Service of Optimistic Replication.
ECOOP Workshops 1998: 319-320 |
11 | EE | Richard G. Guy,
Peter L. Reiher,
David Ratner,
Michial Gunter,
Wilkie Ma,
Gerald J. Popek:
Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication.
ER Workshops 1998: 254-265 |
10 | | Thomas W. Page Jr.,
Richard G. Guy,
John S. Heidemann,
David Ratner,
Peter L. Reiher,
Ashish Goel,
Geoffrey H. Kuenning,
Gerald J. Popek:
Perspectives on Optimistically Replicated, Peer-to-Peer Filing.
Softw., Pract. Exper. 28(2): 155-180 (1998) |
1997 |
9 | | Geoffrey H. Kuenning,
Peter L. Reiher,
Gerald J. Popek:
Experience with an Automated Hoarding System.
Personal and Ubiquitous Computing 1(3): (1997) |
1994 |
8 | | Peter L. Reiher,
John S. Heidemann,
David Ratner,
Gregory Skinner,
Gerald J. Popek:
Resolving File Conflicts in the Ficus File System.
USENIX Summer 1994: 183-195 |
7 | | Geoffrey H. Kuenning,
Gerald J. Popek,
Peter L. Reiher:
An Analysis of Trace Data for Predictive File Caching in Mobile Computing.
USENIX Summer 1994: 291-303 |
1991 |
6 | EE | David R. Jefferson,
Peter L. Reiher:
Supercritical speedup.
Annual Simulation Symposium 1991: 159-168 |
1990 |
5 | EE | Matthew T. Presley,
Peter L. Reiher,
Steven F. Bellenot:
A time warp implementation of Sharks World.
Winter Simulation Conference 1990: 199-203 |
4 | EE | Peter L. Reiher:
Parallel simulation using the time warp operating system.
Winter Simulation Conference 1990: 38-45 |
1989 |
3 | EE | Peter L. Reiher,
Frederick Wieland,
David R. Jefferson:
Limitation of optimism in the time warp operating system.
Winter Simulation Conference 1989: 765-770 |
2 | | Frederick Wieland,
L. Hayley,
A. Feinberg,
Mike Di Loreto,
Leo Blume,
J. Ruffles,
Peter L. Reiher,
Brian Beckman,
Phil Hontalas,
Steve Bellenot,
David R. Jefferson:
The Performance of a Distributed Combat Simulation with the Time Warp Operating System.
Concurrency - Practice and Experience 1(1): 35-50 (1989) |
1987 |
1 | | Peter L. Reiher,
Gerald J. Popek:
Locus Naming in a Large Scale Environment.
Kommunikation in Verteilten Systemen 1987: 167-177 |