dblp.uni-trier.dewww.uni-trier.de

Peter L. Reiher

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
70EEJelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas: Accurately Measuring Denial of Service in Simulation and Testbed Experiments. IEEE Trans. Dependable Sec. Comput. 6(2): 81-95 (2009)
2008
69EETim Dasilva, Kevin Eustice, Peter L. Reiher: Johnny Appleseed: wardriving to reduce interference in chaotic wireless deployments. MSWiM 2008: 122-131
68EEKevin Eustice, A. M. Jourabchi, J. Stoops, Peter L. Reiher: Improving User Satisfaction in a Ubiquitous Computing Application. WiMob 2008: 496-501
67EEPeter L. Reiher, John Zimmerman, Kevin Eustice: Message from the SAUCE Workshop Organizing Technical Co-chairs. WiMob 2008
66EEJun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter L. Reiher, Lixia Zhang: Learning the valid incoming direction of IP packets. Computer Networks 52(2): 399-417 (2008)
65EEJelena Mirkovic, Peter L. Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, Michael Berg, Robert Jung: Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise. IEEE Trans. Computers 57(8): 1098-1112 (2008)
2007
64EEJelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab: Towards user-centric metrics for denial-of-service measurement. Experimental Computer Science 2007: 8
63EEKevin Eustice, Venkatraman Ramakrishna, Alison Walker, Matthew Schnaider, Nam T. Nguyen, Peter L. Reiher: nan0sphere: Location-Driven Fiction for Groups of Users. HCI (3) 2007: 852-861
62EEJelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Wei-Min Yao, Peter L. Reiher, Stephen Schwab, Roshan K. Thomas: When is service really denied?: a user-centric dos metric. SIGMETRICS 2007: 357-358
61EEVenkatraman Ramakrishna, Kevin Eustice, Peter L. Reiher: Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios. SOCA 2007: 180-190
60EECharles Weddle, Mathew Oldham, Jin Qian, An-I Andy Wang, Peter L. Reiher, Geoffrey H. Kuenning: PARAID: A gear-shifting power-aware RAID. TOS 3(3): (2007)
2006
59EEGeorge C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson: A Framework for a Collaborative DDoS Defense. ACSAC 2006: 33-42
58EEJelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko: Measuring denial Of service. QoP 2006: 53-58
57EEVenkatraman Ramakrishna, Max Robinson, Kevin Eustice, Peter L. Reiher: An Active Self-Optimizing Multiplayer Gaming Architecture. Cluster Computing 9(2): 201-215 (2006)
56EEAn-I Andy Wang, Geoffrey H. Kuenning, Peter L. Reiher, Gerald J. Popek: The Conquest file system: Better performance through a disk/persistent-RAM hybrid design. TOS 2(3): 309-348 (2006)
2005
55 Margaret H. Dunham, Birgitta König-Ries, Evaggelia Pitoura, Peter L. Reiher, Can Türker: Mobile Information Management, 24.-29. October 2004 IBFI, Schloss Dagstuhl, Germany 2005
54EEJun Li, Toby Ehrenkranz, Geoffrey H. Kuenning, Peter L. Reiher: Simulation and Analysis on the Resiliency and Efficiency of Malnets. PADS 2005: 262-269
53EEEverett Anderson, Kevin Eustice, Shane Markstrum, Mark H. Hansen, Peter L. Reiher: Mobile Contagion: Simulation of Infection and Defense. PADS 2005: 80-87
52EEAn-I Wang, Peter L. Reiher, Geoffrey H. Kuenning: Introducing permuted states for analyzing conflict rates in optimistic replication. SIGMETRICS 2005: 376-377
51EEJelena Mirkovic, Peter L. Reiher: D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks. IEEE Trans. Dependable Sec. Comput. 2(3): 216-232 (2005)
2004
50EEMargaret H. Dunham, Birgitta König-Ries, Evaggelia Pitoura, Peter L. Reiher, Can Türker: 04441 Abstracts Collection - Mobile Information Management. Mobile Information Management 2004
49EEMargaret H. Dunham, Birgitta König-Ries, Evaggelia Pitoura, Peter L. Reiher, Can Türker: 04441 Executive Summary - Mobile Information Management. Mobile Information Management 2004
48EEJoos-Hendrik Böse, Stefan Böttcher, Le Gruenwald, Evaggelia Pitoura, Peter L. Reiher, George Samaras, Thomas Schwarz, Can Türker: 04441 Working Group - Research Issues in Mobile Transactions. Mobile Information Management 2004
47EEJoos-Hendrik Böse, Stefan Böttcher, Le Gruenwald, Pedro José Marrón, Philipp Obreiter, Evaggelia Pitoura, Peter L. Reiher, Kai-Uwe Sattler, Frank Seliger: 04441 Working Group - Some Open Aspects of Mobile Ad-hoc NETwork, Peer-to-Peer, and Self-organizing Systems. Mobile Information Management 2004
46EEJelena Mirkovic, Peter L. Reiher: A taxonomy of DDoS attack and DDoS defense mechanisms. Computer Communication Review 34(2): 39-53 (2004)
45EEJun Li, Peter L. Reiher, Gerald J. Popek: Resilient self-organizing overlay networks for security update delivery. IEEE Journal on Selected Areas in Communications 22(1): 189-202 (2004)
44EEDavid Ratner, Peter L. Reiher, Gerald J. Popek: Roam: A Scalable Replication System for Mobility. MONET 9(5): 537-544 (2004)
43EENam T. Nguyen, An-I Andy Wang, Peter L. Reiher, Geoffrey H. Kuenning: Electric-field-based routing: a reliable framework for routing in MANETs. Mobile Computing and Communications Review 8(2): 35-49 (2004)
2003
42EEVenkatraman Ramakrishna, Max Robinson, Kevin Eustice, Peter L. Reiher: An Active Self-Optimizing Multiplayer Gaming Architecture. Active Middleware Services 2003: 32-41
41EEMax Robinson, Jelena Mirkovic, B. Scott Michel, Matthew Schnaider, Peter L. Reiher: DefCOM: Defensive Cooperative Overlay Mesh. DISCEX (2) 2003: 101-102
40 Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenning: Detecting Insider Threats by Monitoring System Call Activity. IAW 2003: 45-52
39EEAlexey Rudenko, Peter L. Reiher: Adaptation Planning for Active Networks. IWAN 2003: 252-265
38 Kevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald J. Popek, Venkatraman Ramakrishna, Peter L. Reiher: Enabling Secure Ubiquitous Interactions. Middleware Workshops 2003: 76-80
37EEJelena Mirkovic, Gregory Prier, Peter L. Reiher: Source-End DDoS Defense. NCA 2003: 171-178
36EEJelena Mirkovic, Max Robinson, Peter L. Reiher: Alliance formation for DDoS defense. NSPW 2003: 11-18
35EEKevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald J. Popek, Venkatraman Ramakrishna, Peter L. Reiher: Securing nomads: the case for quarantine, examination, and decontamination. NSPW 2003: 123-128
2002
34EEVincent Ferreria, Alexey Rudenko, Kevin Eustice, Richard G. Guy, Venkatraman Ramakrishna, Peter L. Reiher: Panda: Middleware to Provide the Benefits of Active Networks to Legacy Applications. DANCE 2002: 319-332
33EEAn-I Wang, Peter L. Reiher, Rajive Bagrodia, Geoffrey H. Kuenning: Understanding the Behavior of the Conflict-Rate Metric in Optimistic Peer Replication. DEXA Workshops 2002: 757-764
32EEJelena Mirkovic, Gregory Prier, Peter L. Reiher: Attacking DDoS at the Source. ICNP 2002: 312-321
31EEJun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Reiher, Lixia Zhang: SAVE: Source Address Validity Enforcement Protocol. INFOCOM 2002
30EEGeoffrey H. Kuenning, Wilkie Ma, Peter L. Reiher, Gerald J. Popek: Simplifying automated hoarding methods. MSWiM 2002: 15-21
29EEAn-I Wang, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning: Conquest: Better Performance Through a Disk/Persistent-RAM Hybrid File System. USENIX Annual Technical Conference, General Track 2002: 15-28
28EEJun Li, Mark Yarvis, Peter L. Reiher: Securing distributed adaptation. Computer Networks 38(3): 347-371 (2002)
27EEBirgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Ouri Wolfson: Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems. SIGMOD Record 31(2): 73-79 (2002)
2001
26EEPeter L. Reiher, Kevin Eustice, Kai-Min Sung: Adapting Encrypted Data Streams in Open Architectures. Active Middleware Services 2001: 45-50
25 B. Scott Michel, Peter L. Reiher: Peer-through-Peer Communication for Information Logistics. GI Jahrestagung (1) 2001: 248-256
24EEAn-I Wang, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning: The Conquest File System's Life after Disks. HotOS 2001: 186
23EEBirgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Alexander L. Wolf, Ouri Wolfson: Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona. Infrastructure for Mobile and Wireless Systems 2001: 1-37
22EETodd Ekenstam, Charles Matheny, Peter L. Reiher, Gerald J. Popek: The Bengal Database Replication System. Distributed and Parallel Databases 9(3): 187-210 (2001)
21 David Ratner, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning: Replication Requirements in Mobile Environments. MONET 6(6): 525-533 (2001)
2000
20EEB. Scott Michel, Konstantinos Nikoloudakis, Peter L. Reiher, Lixia Zhang: URL Forwarding and Compression in Adaptive Web Caching. INFOCOM 2000: 670-678
19 B. R. Badrinath, Armando Fox, Leonard Kleinrock, Gerald J. Popek, Peter L. Reiher, Mahadev Satyanarayanan: A conceptual framework for network and client adaptation. MONET 5(4): 221-231 (2000)
1999
18EEDavid Ratner, Peter L. Reiher, Gerald J. Popek: Roam: A Scalable Replication System for Mobile Computing. DEXA Workshop 1999: 96-104
17EEAn-I Wang, Peter L. Reiher, Rajive Bagrodia: A simulation evaluation of optimistic replicated filing in mobile environments. IPCCC 1999: 43-51
16EEDavid Ratner, Peter L. Reiher, Gerald J. Popek, Richard G. Guy: Peer Replication with Selective Control. MDA 1999: 169-181
15EEAlexey Rudenko, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning: The Remote Processing Framework for Portable Computer Power Saving. SAC 1999: 365-372
14EEMitchell Tsai, Peter L. Reiher, Gerald J. Popek: Command Management System for Next-Generation User Input. Workshop on Hot Topics in Operating Systems 1999: 179-184
13EEMark Yarvis, Peter L. Reiher, Gerald J. Popek: Conductor: A Framework for Distributed Adaptation. Workshop on Hot Topics in Operating Systems 1999: 44-
1998
12EEGeoffrey H. Kuenning, Rajive Bagrodia, Richard G. Guy, Gerald J. Popek, Peter L. Reiher, An-I Wang: Measuring the Quality of Service of Optimistic Replication. ECOOP Workshops 1998: 319-320
11EERichard G. Guy, Peter L. Reiher, David Ratner, Michial Gunter, Wilkie Ma, Gerald J. Popek: Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication. ER Workshops 1998: 254-265
10 Thomas W. Page Jr., Richard G. Guy, John S. Heidemann, David Ratner, Peter L. Reiher, Ashish Goel, Geoffrey H. Kuenning, Gerald J. Popek: Perspectives on Optimistically Replicated, Peer-to-Peer Filing. Softw., Pract. Exper. 28(2): 155-180 (1998)
1997
9 Geoffrey H. Kuenning, Peter L. Reiher, Gerald J. Popek: Experience with an Automated Hoarding System. Personal and Ubiquitous Computing 1(3): (1997)
1994
8 Peter L. Reiher, John S. Heidemann, David Ratner, Gregory Skinner, Gerald J. Popek: Resolving File Conflicts in the Ficus File System. USENIX Summer 1994: 183-195
7 Geoffrey H. Kuenning, Gerald J. Popek, Peter L. Reiher: An Analysis of Trace Data for Predictive File Caching in Mobile Computing. USENIX Summer 1994: 291-303
1991
6EEDavid R. Jefferson, Peter L. Reiher: Supercritical speedup. Annual Simulation Symposium 1991: 159-168
1990
5EEMatthew T. Presley, Peter L. Reiher, Steven F. Bellenot: A time warp implementation of Sharks World. Winter Simulation Conference 1990: 199-203
4EEPeter L. Reiher: Parallel simulation using the time warp operating system. Winter Simulation Conference 1990: 38-45
1989
3EEPeter L. Reiher, Frederick Wieland, David R. Jefferson: Limitation of optimism in the time warp operating system. Winter Simulation Conference 1989: 765-770
2 Frederick Wieland, L. Hayley, A. Feinberg, Mike Di Loreto, Leo Blume, J. Ruffles, Peter L. Reiher, Brian Beckman, Phil Hontalas, Steve Bellenot, David R. Jefferson: The Performance of a Distributed Combat Simulation with the Time Warp Operating System. Concurrency - Practice and Experience 1(1): 35-50 (1989)
1987
1 Peter L. Reiher, Gerald J. Popek: Locus Naming in a Large Scale Environment. Kommunikation in Verteilten Systemen 1987: 167-177

Coauthor Index

1Everett Anderson [53]
2B. R. Badrinath (Badri Nath) [19]
3Rajive Bagrodia [12] [17] [33]
4Brian Beckman [2]
5Steve Bellenot [2]
6Steven F. Bellenot [5]
7Michael Berg [65]
8Leo Blume [2]
9Joos-Hendrik Böse [47] [48]
10Stefan Böttcher [47] [48]
11Tim Dasilva [69]
12Margaret H. Dunham (Margaret H. Eich) [49] [50] [55]
13Toby Ehrenkranz [54] [66]
14Todd Ekenstam [22]
15Kevin Eustice [26] [34] [35] [38] [42] [53] [57] [61] [63] [67] [68] [69]
16Sonia Fahmy [58] [62] [64] [70]
17A. Feinberg [2]
18Vincent Ferreria [34]
19Armando Fox [19]
20Ashish Goel [10]
21Le Gruenwald [47] [48]
22Michial Gunter [11]
23Richard G. Guy [10] [11] [12] [16] [34]
24Mark H. Hansen [53]
25L. Hayley [2]
26John S. Heidemann [8] [10]
27Phil Hontalas [2]
28Alefiya Hussain [58] [62] [64] [65] [70]
29David R. Jefferson [2] [3] [6]
30A. M. Jourabchi [68]
31Robert Jung [65]
32Leonard Kleinrock [19] [35] [38]
33Calvin Ko [58]
34Birgitta König-Ries [23] [27] [49] [50] [55]
35Geoffrey H. Kuenning [7] [9] [10] [12] [15] [21] [24] [29] [30] [33] [40] [43] [52] [54] [56] [60]
36Jun Li [28] [31] [45] [54] [66]
37Mike Di Loreto [2]
38Wilkie Ma [11] [30]
39Kia Makki [23] [27]
40S. A. M. Makki (Shamila Makki) [23] [27]
41Shane Markstrum [35] [38] [53]
42Pedro José Marrón [47]
43Charles Matheny [22]
44B. Scott Michel [20] [25] [41]
45Jelena Mirkovic [31] [32] [36] [37] [41] [46] [51] [58] [59] [62] [64] [65] [66] [70]
46Nam T. Nguyen [40] [43] [63]
47Konstantinos Nikoloudakis [20]
48Philipp Obreiter [47]
49George C. Oikonomou [59]
50Mathew Oldham [60]
51Thomas W. Page Jr. [10]
52Christos Papadopoulos [65]
53Charles E. Perkins [23] [27]
54Niki Pissinou [23] [27]
55Evaggelia Pitoura [47] [48] [49] [50] [55]
56Gerald J. Popek [1] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [18] [19] [21] [22] [24] [29] [30] [35] [38] [44] [45] [56]
57Matthew T. Presley [5]
58Gregory Prier [32] [37]
59Jin Qian [60]
60Venkatraman Ramakrishna [34] [35] [38] [42] [57] [61] [63]
61David Ratner [8] [10] [11] [16] [18] [21] [44]
62Max Robinson [36] [41] [42] [57] [59]
63Alexey Rudenko [15] [34] [39]
64J. Ruffles [2]
65George Samaras [48]
66Kai-Uwe Sattler [47]
67Mahadev Satyanarayanan (M. Satyanarayanan) [19]
68Peter Scheuermann [23] [27]
69Matthew Schnaider [41] [63]
70Stephen Schwab [58] [62] [64]
71Thomas Schwarz [48]
72Frank Seliger [47]
73Marla Shepard [65]
74Gregory Skinner [8]
75J. Stoops [68]
76Kai-Min Sung [26]
77Roshan K. Thomas [58] [62] [64] [70]
78Mitchell Tsai [14]
79Can Türker [48] [49] [50] [55]
80Jari Veijalainen [23] [27]
81Alison Walker [63]
82An-I Wang (An-I Andy Wang) [12] [17] [24] [29] [33] [43] [52] [56] [60]
83Mengqiu Wang [31] [66]
84Charles Weddle [60]
85Frederick Wieland [2] [3]
86Brett Wilson [62] [64]
87Alexander L. Wolf [23]
88Ouri Wolfson [23] [27]
89Wei-Min Yao [62] [64]
90Mark Yarvis [13] [28]
91Lixia Zhang [20] [31] [66]
92John Zimmerman [67]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)