Xiaolan Zhang

Xiaolan (Catherine) Zhang

List of publications from the DBLP Bibliography Server - FAQ

other persons with the same name:

Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

24EEScott Garriss, Ramón Cáceres, Stefan Berger, Reiner Sailer, Leendert van Doorn, Xiaolan Zhang: Trustworthy and personalized computing on public kiosks. MobiSys 2008: 199-210
23EELin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou: AutoISES: Automatically Inferring Security Specification and Detecting Violations. USENIX Security Symposium 2008: 379-394
22EEChongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang: Automated Security Debugging Using Program Structural Constraints. ACSAC 2007: 453-462
21EEXiaolan Zhang, Jim Kurose, Brian Neil Levine, Donald F. Towsley, Honggang Zhang: Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing. MOBICOM 2007: 195-206
20EEXiaolan Zhang, Suzanne McIntosh, Pankaj Rohatgi, John Linwood Griffin: XenSocket: A High-Throughput Interdomain Transport for Virtual Machines. Middleware 2007: 184-203
19EEXiaolan Zhang, Giovanni Neglia, James F. Kurose, Donald F. Towsley: Performance modeling of epidemic routing. Computer Networks 51(10): 2867-2891 (2007)
18EEXiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, Guillaume Marceau, Liangzhao Zeng: The case for analysis preserving language transformation. ISSTA 2006: 191-202
17EEXiaolan Zhang, Giovanni Neglia, James F. Kurose, Donald F. Towsley: Performance Modeling of Epidemic Routing. Networking 2006: 827-839
16EEZhang Wu, Hua Luo, Xiaolan Zhang: Optimal np control chart with curtailment. European Journal of Operational Research 174(3): 1723-1741 (2006)
15EEReiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn: Attestation-based policy enforcement for remote access. ACM Conference on Computer and Communications Security 2004: 308-317
14EETrent Jaeger, Reiner Sailer, Xiaolan Zhang: Resolving constraint conflicts. SACMAT 2004: 105-114
13EEReiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn: Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium 2004: 223-238
12EETrent Jaeger, Antony Edwards, Xiaolan Zhang: Consistency analysis of authorization hook placement in the Linux security modules framework. ACM Trans. Inf. Syst. Secur. 7(2): 175-205 (2004)
11EETrent Jaeger, Xiaolan Zhang, Fidel Cacheda: Policy management using access control spaces. ACM Trans. Inf. Syst. Secur. 6(3): 327-364 (2003)
10EEAntony Edwards, Trent Jaeger, Xiaolan Zhang: Runtime verification of authorization hook placement for the linux security modules framework. ACM Conference on Computer and Communications Security 2002: 225-234
9EETrent Jaeger, Antony Edwards, Xiaolan Zhang: Gaining and maintaining confidence in operating systems security. ACM SIGOPS European Workshop 2002: 201-204
8EEXiaolan Zhang, Leendert van Doorn, Trent Jaeger, Ronald Perez, Reiner Sailer: Secure coprocessor-based intrusion detection. ACM SIGOPS European Workshop 2002: 239-242
7EETrent Jaeger, Antony Edwards, Xiaolan Zhang: Managing access control policies using access control spaces. SACMAT 2002: 3-12
6EEXiaolan Zhang, Antony Edwards, Trent Jaeger: Using CQUAL for Static Analysis of Authorization Hook Placement. USENIX Security Symposium 2002: 33-48
5EEXiaolan Zhang, Margo I. Seltzer: HBench: JGC-An Application-Specific Benchmark Suite for Evaluating JVM Garbage Collector Performance. COOTS 2001: 47-60
4 Xiaolan Zhang, Margo I. Seltzer: HBench: Java: An application-specific benchmarking framework for Java Virtual Machines. Concurrency and Computation: Practice and Experience 13(8-9): 775-792 (2001)
3EEXiaolan Zhang, Margo I. Seltzer: HBench: Java: an application-specific benchmarking framework for Java virtual machines. Java Grande 2000: 62-70
2EEMargo I. Seltzer, David Krinsky, Keith A. Smith, Xiaolan Zhang: The Case for Application-Specific Benchmarking. Workshop on Hot Topics in Operating Systems 1999: 102-
1 Xiaolan Zhang, Zheng Wang, Nicholas C. Gloy, J. Bradley Chen, Michael D. Smith: System Support for Automated Profiling and Optimization. SOSP 1997: 15-26

Coauthor Index

1Stefan Berger [24]
2Ramón Cáceres [24]
3Fidel Cacheda [11]
4J. Bradley Chen [1]
5Leendert van Doorn [8] [13] [15] [24]
6Antony Edwards [6] [7] [9] [10] [12]
7Scott Garriss [24]
8Nicholas C. Gloy [1]
9John Linwood Griffin [20]
10Trent Jaeger [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [18]
11Chongkyung Kil [22]
12Larry Koved [18]
13David Krinsky [2]
14James F. Kurose (Jim Kurose) [17] [19] [21]
15Brian Neil Levine [21]
16Hua Luo [16]
17Xiao Ma [23]
18Guillaume Marceau [18]
19Suzanne McIntosh [20]
20Giovanni Neglia [17] [19]
21Peng Ning [22]
22Ronald Perez [8]
23Marco Pistoia [18]
24Pankaj Rohatgi [20]
25Reiner Sailer [8] [13] [14] [15] [24]
26Margo I. Seltzer [2] [3] [4] [5]
27Emre Can Sezer [22]
28Keith A. Smith [2]
29Michael D. Smith [1]
30Lin Tan [23]
31Donald F. Towsley [17] [19] [21]
32Zheng Wang [1]
33Sam Weber [18]
34Zhang Wu [16]
35Weiwei Xiong [23]
36Liangzhao Zeng [18]
37Honggang Zhang [21]
38Yuanyuan Zhou [23]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)