![]() | ![]() |
Xiaolan (Catherine) Zhang
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
2008 | ||
---|---|---|
24 | EE | Scott Garriss, Ramón Cáceres, Stefan Berger, Reiner Sailer, Leendert van Doorn, Xiaolan Zhang: Trustworthy and personalized computing on public kiosks. MobiSys 2008: 199-210 |
23 | EE | Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou: AutoISES: Automatically Inferring Security Specification and Detecting Violations. USENIX Security Symposium 2008: 379-394 |
2007 | ||
22 | EE | Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang: Automated Security Debugging Using Program Structural Constraints. ACSAC 2007: 453-462 |
21 | EE | Xiaolan Zhang, Jim Kurose, Brian Neil Levine, Donald F. Towsley, Honggang Zhang: Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing. MOBICOM 2007: 195-206 |
20 | EE | Xiaolan Zhang, Suzanne McIntosh, Pankaj Rohatgi, John Linwood Griffin: XenSocket: A High-Throughput Interdomain Transport for Virtual Machines. Middleware 2007: 184-203 |
19 | EE | Xiaolan Zhang, Giovanni Neglia, James F. Kurose, Donald F. Towsley: Performance modeling of epidemic routing. Computer Networks 51(10): 2867-2891 (2007) |
2006 | ||
18 | EE | Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, Guillaume Marceau, Liangzhao Zeng: The case for analysis preserving language transformation. ISSTA 2006: 191-202 |
17 | EE | Xiaolan Zhang, Giovanni Neglia, James F. Kurose, Donald F. Towsley: Performance Modeling of Epidemic Routing. Networking 2006: 827-839 |
16 | EE | Zhang Wu, Hua Luo, Xiaolan Zhang: Optimal np control chart with curtailment. European Journal of Operational Research 174(3): 1723-1741 (2006) |
2004 | ||
15 | EE | Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leendert van Doorn: Attestation-based policy enforcement for remote access. ACM Conference on Computer and Communications Security 2004: 308-317 |
14 | EE | Trent Jaeger, Reiner Sailer, Xiaolan Zhang: Resolving constraint conflicts. SACMAT 2004: 105-114 |
13 | EE | Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn: Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium 2004: 223-238 |
12 | EE | Trent Jaeger, Antony Edwards, Xiaolan Zhang: Consistency analysis of authorization hook placement in the Linux security modules framework. ACM Trans. Inf. Syst. Secur. 7(2): 175-205 (2004) |
2003 | ||
11 | EE | Trent Jaeger, Xiaolan Zhang, Fidel Cacheda: Policy management using access control spaces. ACM Trans. Inf. Syst. Secur. 6(3): 327-364 (2003) |
2002 | ||
10 | EE | Antony Edwards, Trent Jaeger, Xiaolan Zhang: Runtime verification of authorization hook placement for the linux security modules framework. ACM Conference on Computer and Communications Security 2002: 225-234 |
9 | EE | Trent Jaeger, Antony Edwards, Xiaolan Zhang: Gaining and maintaining confidence in operating systems security. ACM SIGOPS European Workshop 2002: 201-204 |
8 | EE | Xiaolan Zhang, Leendert van Doorn, Trent Jaeger, Ronald Perez, Reiner Sailer: Secure coprocessor-based intrusion detection. ACM SIGOPS European Workshop 2002: 239-242 |
7 | EE | Trent Jaeger, Antony Edwards, Xiaolan Zhang: Managing access control policies using access control spaces. SACMAT 2002: 3-12 |
6 | EE | Xiaolan Zhang, Antony Edwards, Trent Jaeger: Using CQUAL for Static Analysis of Authorization Hook Placement. USENIX Security Symposium 2002: 33-48 |
2001 | ||
5 | EE | Xiaolan Zhang, Margo I. Seltzer: HBench: JGC-An Application-Specific Benchmark Suite for Evaluating JVM Garbage Collector Performance. COOTS 2001: 47-60 |
4 | Xiaolan Zhang, Margo I. Seltzer: HBench: Java: An application-specific benchmarking framework for Java Virtual Machines. Concurrency and Computation: Practice and Experience 13(8-9): 775-792 (2001) | |
2000 | ||
3 | EE | Xiaolan Zhang, Margo I. Seltzer: HBench: Java: an application-specific benchmarking framework for Java virtual machines. Java Grande 2000: 62-70 |
1999 | ||
2 | EE | Margo I. Seltzer, David Krinsky, Keith A. Smith, Xiaolan Zhang: The Case for Application-Specific Benchmarking. Workshop on Hot Topics in Operating Systems 1999: 102- |
1997 | ||
1 | Xiaolan Zhang, Zheng Wang, Nicholas C. Gloy, J. Bradley Chen, Michael D. Smith: System Support for Automated Profiling and Optimization. SOSP 1997: 15-26 |
1 | Stefan Berger | [24] |
2 | Ramón Cáceres | [24] |
3 | Fidel Cacheda | [11] |
4 | J. Bradley Chen | [1] |
5 | Leendert van Doorn | [8] [13] [15] [24] |
6 | Antony Edwards | [6] [7] [9] [10] [12] |
7 | Scott Garriss | [24] |
8 | Nicholas C. Gloy | [1] |
9 | John Linwood Griffin | [20] |
10 | Trent Jaeger | [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [18] |
11 | Chongkyung Kil | [22] |
12 | Larry Koved | [18] |
13 | David Krinsky | [2] |
14 | James F. Kurose (Jim Kurose) | [17] [19] [21] |
15 | Brian Neil Levine | [21] |
16 | Hua Luo | [16] |
17 | Xiao Ma | [23] |
18 | Guillaume Marceau | [18] |
19 | Suzanne McIntosh | [20] |
20 | Giovanni Neglia | [17] [19] |
21 | Peng Ning | [22] |
22 | Ronald Perez | [8] |
23 | Marco Pistoia | [18] |
24 | Pankaj Rohatgi | [20] |
25 | Reiner Sailer | [8] [13] [14] [15] [24] |
26 | Margo I. Seltzer | [2] [3] [4] [5] |
27 | Emre Can Sezer | [22] |
28 | Keith A. Smith | [2] |
29 | Michael D. Smith | [1] |
30 | Lin Tan | [23] |
31 | Donald F. Towsley | [17] [19] [21] |
32 | Zheng Wang | [1] |
33 | Sam Weber | [18] |
34 | Zhang Wu | [16] |
35 | Weiwei Xiong | [23] |
36 | Liangzhao Zeng | [18] |
37 | Honggang Zhang | [21] |
38 | Yuanyuan Zhou | [23] |