2008 |
10 | EE | Lin Tan,
Chi-Hung Chi,
Jianming Deng:
Quantifying Trust Based on Service Level Agreement for Software as a Service.
COMPSAC 2008: 116-119 |
9 | EE | Huo Yan Chen,
Lin Tan,
T. H. Tse:
A Scheme to Aid Construction of Left-Hand Sides of Axioms in Algebraic Specifications forObject-Oriented Program Testing.
CSSE (2) 2008: 747-750 |
8 | EE | Lin Tan,
Xiaolan Zhang,
Xiao Ma,
Weiwei Xiong,
Yuanyuan Zhou:
AutoISES: Automatically Inferring Security Specification and Detecting Violations.
USENIX Security Symposium 2008: 379-394 |
2007 |
7 | EE | Lin Tan,
Ding Yuan,
Gopal Krishna,
Yuanyuan Zhou:
/*icomment: bugs or bad comments?*/.
SOSP 2007: 145-158 |
2006 |
6 | EE | Zhenmin Li,
Lin Tan,
Xuanhui Wang,
Shan Lu,
Yuanyuan Zhou,
Chengxiang Zhai:
Have things changed now?: an empirical study of bug characteristics in modern open source software.
ASID 2006: 25-33 |
5 | EE | Lin Tan,
Timothy Sherwood:
Architectures for Bit-Split String Scanning in Intrusion Detection.
IEEE Micro 26(1): 110-117 (2006) |
4 | EE | Lin Tan,
Brett Brotherton,
Timothy Sherwood:
Bit-split string-matching engines for intrusion detection and prevention.
TACO 3(1): 3-34 (2006) |
2005 |
3 | EE | Lin Tan,
Timothy Sherwood:
A High Throughput String Matching Architecture for Intrusion Detection and Prevention.
ISCA 2005: 112-122 |
2 | EE | Qingbo Zhu,
Zhifeng Chen,
Lin Tan,
Yuanyuan Zhou,
Kimberly Keeton,
John Wilkes:
Hibernator: helping disk arrays sleep through the winter.
SOSP 2005: 177-190 |
1994 |
1 | EE | Lin Tan:
Signs in the Laplace expansions and the parity of the distinguished representatives.
Discrete Mathematics 131(1-3): 287-299 (1994) |