dblp.uni-trier.dewww.uni-trier.de

Steve R. White

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
15EEDavid M. Chess, James E. Hanson, John A. Pershing, Steve R. White: Prospects for simplifying ITSM-based management through self-managing resources. IBM Systems Journal 46(3): 599-608 (2007)
2006
14EESteve R. White: Biologically-Inspired Design: Getting It Wrong and Getting It Right. BICC 2006: 21-32
2004
13EEGerald Tesauro, David M. Chess, William E. Walsh, Rajarshi Das, Alla Segal, Ian Whalley, Jeffrey O. Kephart, Steve R. White: A Multi-Agent Systems Approach to Autonomic Computing. AAMAS 2004: 464-471
12EEDavid M. Chess, Alla Segal, Ian Whalley, Steve R. White: Unity: Experiences with a Prototype Autonomic Computing System. ICAC 2004: 140-147
11EESteve R. White, James E. Hanson, Ian Whalley, David M. Chess, Jeffrey O. Kephart: An Architectural Approach to Autonomic Computing. ICAC 2004: 2-9
2003
10EEDavid M. Chess, Charles C. Palmer, Steve R. White: Security in an autonomic computing environment. IBM Systems Journal 42(1): 107-118 (2003)
9EEPeter G. Capek, David M. Chess, Steve R. White: Merry Christma: An Early Network Worm. IEEE Security & Privacy 1(5): 26-34 (2003)
2000
8 M. D. Durand, Steve R. White: Trading accuracy for speed in parallel simulated annealing with simultaneous moves. Parallel Computing 26(1): 135-150 (2000)
1998
7EEJeffrey O. Kephart, James E. Hanson, David W. Levine, Benjamin N. Grosof, Jakka Sairamesh, Richard Segal, Steve R. White: Dynamics of an Information-Filtering Economy. CIA 1998: 160-171
6 Jeffrey O. Kephart, James E. Hanson, Deffrey O. Levine, Benjamin N. Grosof, Jakka Sairamesh, Richard Segal, Steve R. White: Emergent Behavior in Information Economies. ICMAS 1998: 441-442
1995
5 Jeffrey O. Kephart, Gregory B. Sorkin, William C. Arnold, David M. Chess, Gerald Tesauro, Steve R. White: Biologically Inspired Defenses Against Computer Viruses. IJCAI (1) 1995: 985-996
1991
4 Jeffrey O. Kephart, Steve R. White: Directed-Graph Epidemiological Models of Computer Viruses. IEEE Symposium on Security and Privacy 1991: 343-361
1990
3EESteve R. White, Liam Comerford: ABYSS: An Architecture for Software Protection. IEEE Trans. Software Eng. 16(6): 619-629 (1990)
1989
2EESteve R. White: Covert Distributed Processing with Computer Viruses. CRYPTO 1989: 616-619
1987
1 Steve R. White, Liam Comerford: ABYSS: A Trusted Architecture for Software Protection. IEEE Symposium on Security and Privacy 1987: 38-51

Coauthor Index

1William C. Arnold [5]
2Peter G. Capek [9]
3David M. Chess [5] [9] [10] [11] [12] [13] [15]
4Liam Comerford [1] [3]
5Rajarshi Das [13]
6M. D. Durand [8]
7Benjamin N. Grosof [6] [7]
8James E. Hanson [6] [7] [11] [15]
9Jeffrey O. Kephart [4] [5] [6] [7] [11] [13]
10David W. Levine [7]
11Deffrey O. Levine [6]
12Charles C. Palmer [10]
13John A. Pershing [15]
14Jakka Sairamesh [6] [7]
15Alla Segal [12] [13]
16Richard Segal [6] [7]
17Gregory B. Sorkin [5]
18Gerald Tesauro [5] [13]
19William E. Walsh [13]
20Ian Whalley [11] [12] [13]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)