2007 |
15 | EE | David M. Chess,
James E. Hanson,
John A. Pershing,
Steve R. White:
Prospects for simplifying ITSM-based management through self-managing resources.
IBM Systems Journal 46(3): 599-608 (2007) |
2006 |
14 | EE | Steve R. White:
Biologically-Inspired Design: Getting It Wrong and Getting It Right.
BICC 2006: 21-32 |
2004 |
13 | EE | Gerald Tesauro,
David M. Chess,
William E. Walsh,
Rajarshi Das,
Alla Segal,
Ian Whalley,
Jeffrey O. Kephart,
Steve R. White:
A Multi-Agent Systems Approach to Autonomic Computing.
AAMAS 2004: 464-471 |
12 | EE | David M. Chess,
Alla Segal,
Ian Whalley,
Steve R. White:
Unity: Experiences with a Prototype Autonomic Computing System.
ICAC 2004: 140-147 |
11 | EE | Steve R. White,
James E. Hanson,
Ian Whalley,
David M. Chess,
Jeffrey O. Kephart:
An Architectural Approach to Autonomic Computing.
ICAC 2004: 2-9 |
2003 |
10 | EE | David M. Chess,
Charles C. Palmer,
Steve R. White:
Security in an autonomic computing environment.
IBM Systems Journal 42(1): 107-118 (2003) |
9 | EE | Peter G. Capek,
David M. Chess,
Steve R. White:
Merry Christma: An Early Network Worm.
IEEE Security & Privacy 1(5): 26-34 (2003) |
2000 |
8 | | M. D. Durand,
Steve R. White:
Trading accuracy for speed in parallel simulated annealing with simultaneous moves.
Parallel Computing 26(1): 135-150 (2000) |
1998 |
7 | EE | Jeffrey O. Kephart,
James E. Hanson,
David W. Levine,
Benjamin N. Grosof,
Jakka Sairamesh,
Richard Segal,
Steve R. White:
Dynamics of an Information-Filtering Economy.
CIA 1998: 160-171 |
6 | | Jeffrey O. Kephart,
James E. Hanson,
Deffrey O. Levine,
Benjamin N. Grosof,
Jakka Sairamesh,
Richard Segal,
Steve R. White:
Emergent Behavior in Information Economies.
ICMAS 1998: 441-442 |
1995 |
5 | | Jeffrey O. Kephart,
Gregory B. Sorkin,
William C. Arnold,
David M. Chess,
Gerald Tesauro,
Steve R. White:
Biologically Inspired Defenses Against Computer Viruses.
IJCAI (1) 1995: 985-996 |
1991 |
4 | | Jeffrey O. Kephart,
Steve R. White:
Directed-Graph Epidemiological Models of Computer Viruses.
IEEE Symposium on Security and Privacy 1991: 343-361 |
1990 |
3 | EE | Steve R. White,
Liam Comerford:
ABYSS: An Architecture for Software Protection.
IEEE Trans. Software Eng. 16(6): 619-629 (1990) |
1989 |
2 | EE | Steve R. White:
Covert Distributed Processing with Computer Viruses.
CRYPTO 1989: 616-619 |
1987 |
1 | | Steve R. White,
Liam Comerford:
ABYSS: A Trusted Architecture for Software Protection.
IEEE Symposium on Security and Privacy 1987: 38-51 |