![]() |
Xiaolan (Catherine) Zhang
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
| 2008 | ||
|---|---|---|
| 24 | EE | Scott Garriss, Ramón Cáceres, Stefan Berger, Reiner Sailer, Leendert van Doorn, Xiaolan Zhang: Trustworthy and personalized computing on public kiosks. MobiSys 2008: 199-210 |
| 23 | EE | Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou: AutoISES: Automatically Inferring Security Specification and Detecting Violations. USENIX Security Symposium 2008: 379-394 |
| 2007 | ||
| 22 | EE | Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang: Automated Security Debugging Using Program Structural Constraints. ACSAC 2007: 453-462 |
| 21 | EE | Xiaolan Zhang, Jim Kurose, Brian Neil Levine, Donald F. Towsley, Honggang Zhang: Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing. MOBICOM 2007: 195-206 |
| 20 | EE | Xiaolan Zhang, Suzanne McIntosh, Pankaj Rohatgi, John Linwood Griffin: XenSocket: A High-Throughput Interdomain Transport for Virtual Machines. Middleware 2007: 184-203 |
| 19 | EE | Xiaolan Zhang, Giovanni Neglia, James F. Kurose, Donald F. Towsley: Performance modeling of epidemic routing. Computer Networks 51(10): 2867-2891 (2007) |
| 2006 | ||
| 18 | EE | Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, Guillaume Marceau, Liangzhao Zeng: The case for analysis preserving language transformation. ISSTA 2006: 191-202 |
| 17 | EE | Xiaolan Zhang, Giovanni Neglia, James F. Kurose, Donald F. Towsley: Performance Modeling of Epidemic Routing. Networking 2006: 827-839 |
| 16 | EE | Zhang Wu, Hua Luo, Xiaolan Zhang: Optimal np control chart with curtailment. European Journal of Operational Research 174(3): 1723-1741 (2006) |
| 2004 | ||
| 15 | EE | Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn: Attestation-based policy enforcement for remote access. ACM Conference on Computer and Communications Security 2004: 308-317 |
| 14 | EE | Trent Jaeger, Reiner Sailer, Xiaolan Zhang: Resolving constraint conflicts. SACMAT 2004: 105-114 |
| 13 | EE | Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn: Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium 2004: 223-238 |
| 12 | EE | Trent Jaeger, Antony Edwards, Xiaolan Zhang: Consistency analysis of authorization hook placement in the Linux security modules framework. ACM Trans. Inf. Syst. Secur. 7(2): 175-205 (2004) |
| 2003 | ||
| 11 | EE | Trent Jaeger, Xiaolan Zhang, Fidel Cacheda: Policy management using access control spaces. ACM Trans. Inf. Syst. Secur. 6(3): 327-364 (2003) |
| 2002 | ||
| 10 | EE | Antony Edwards, Trent Jaeger, Xiaolan Zhang: Runtime verification of authorization hook placement for the linux security modules framework. ACM Conference on Computer and Communications Security 2002: 225-234 |
| 9 | EE | Trent Jaeger, Antony Edwards, Xiaolan Zhang: Gaining and maintaining confidence in operating systems security. ACM SIGOPS European Workshop 2002: 201-204 |
| 8 | EE | Xiaolan Zhang, Leendert van Doorn, Trent Jaeger, Ronald Perez, Reiner Sailer: Secure coprocessor-based intrusion detection. ACM SIGOPS European Workshop 2002: 239-242 |
| 7 | EE | Trent Jaeger, Antony Edwards, Xiaolan Zhang: Managing access control policies using access control spaces. SACMAT 2002: 3-12 |
| 6 | EE | Xiaolan Zhang, Antony Edwards, Trent Jaeger: Using CQUAL for Static Analysis of Authorization Hook Placement. USENIX Security Symposium 2002: 33-48 |
| 2001 | ||
| 5 | EE | Xiaolan Zhang, Margo I. Seltzer: HBench: JGC-An Application-Specific Benchmark Suite for Evaluating JVM Garbage Collector Performance. COOTS 2001: 47-60 |
| 4 | Xiaolan Zhang, Margo I. Seltzer: HBench: Java: An application-specific benchmarking framework for Java Virtual Machines. Concurrency and Computation: Practice and Experience 13(8-9): 775-792 (2001) | |
| 2000 | ||
| 3 | EE | Xiaolan Zhang, Margo I. Seltzer: HBench: Java: an application-specific benchmarking framework for Java virtual machines. Java Grande 2000: 62-70 |
| 1999 | ||
| 2 | EE | Margo I. Seltzer, David Krinsky, Keith A. Smith, Xiaolan Zhang: The Case for Application-Specific Benchmarking. Workshop on Hot Topics in Operating Systems 1999: 102- |
| 1997 | ||
| 1 | Xiaolan Zhang, Zheng Wang, Nicholas C. Gloy, J. Bradley Chen, Michael D. Smith: System Support for Automated Profiling and Optimization. SOSP 1997: 15-26 | |
| 1 | Stefan Berger | [24] |
| 2 | Ramón Cáceres | [24] |
| 3 | Fidel Cacheda | [11] |
| 4 | J. Bradley Chen | [1] |
| 5 | Leendert van Doorn | [8] [13] [15] [24] |
| 6 | Antony Edwards | [6] [7] [9] [10] [12] |
| 7 | Scott Garriss | [24] |
| 8 | Nicholas C. Gloy | [1] |
| 9 | John Linwood Griffin | [20] |
| 10 | Trent Jaeger | [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [18] |
| 11 | Chongkyung Kil | [22] |
| 12 | Larry Koved | [18] |
| 13 | David Krinsky | [2] |
| 14 | James F. Kurose (Jim Kurose) | [17] [19] [21] |
| 15 | Brian Neil Levine | [21] |
| 16 | Hua Luo | [16] |
| 17 | Xiao Ma | [23] |
| 18 | Guillaume Marceau | [18] |
| 19 | Suzanne McIntosh | [20] |
| 20 | Giovanni Neglia | [17] [19] |
| 21 | Peng Ning | [22] |
| 22 | Ronald Perez | [8] |
| 23 | Marco Pistoia | [18] |
| 24 | Pankaj Rohatgi | [20] |
| 25 | Reiner Sailer | [8] [13] [14] [15] [24] |
| 26 | Margo I. Seltzer | [2] [3] [4] [5] |
| 27 | Emre Can Sezer | [22] |
| 28 | Keith A. Smith | [2] |
| 29 | Michael D. Smith | [1] |
| 30 | Lin Tan | [23] |
| 31 | Donald F. Towsley | [17] [19] [21] |
| 32 | Zheng Wang | [1] |
| 33 | Sam Weber | [18] |
| 34 | Zhang Wu | [16] |
| 35 | Weiwei Xiong | [23] |
| 36 | Liangzhao Zeng | [18] |
| 37 | Honggang Zhang | [21] |
| 38 | Yuanyuan Zhou | [23] |