Laboratory for Advanced Systems Research

 Publications

Garip 15b
       
M. Garip, M. Gursoy, P. Reiher, M. Gerla, Congestion Attacks to Autonomous Cars Using Vehicular Botnets","
        NDSS Workshop on Security of Emerging Networking Technologies (SENT), February 2015. Available as SENT_2015.pdf

Garip 15a
       
M. Garip, M. Gursoy, P. Reiher, M. Gerla, "Scalable Reactive Vehicle-to-Vehicle Congestion Avoidance Mechanism,"
        First International Workshop on Vehicular Networking and Intelligent Transportation Systems, January 2015. Available as VENIT_2015.pdf

Pournaghshband 14c
       
Vahab Pournaghshband, S. Hashemzadeh, and Peter Reiher, "How To Detect Middleboxes: Guidelines on a Methodology,"
        Sixth International Conference on Network and Communications Security, December 2014. Available as NCS14.pdf

Pournaghshband 14b
       
Vahab Pournaghshband, D. Meyer, M. Holyland, M. Sarrafzadeh, and Peter Reiher, "Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices,"
        Workshop on Usable Mobile Security, December 2014. Available as wums14_paper.pdf

Pournaghshband 14a
       
Vahab Pournaghshband, Alex Afanaseyev, and Peter Reiher, "End-to-End Detection of Compression of Traffic Flows by Intermediaries,"
        IEEE/IFIP Network Operations and Management Symposium (NOMS), May 2014. Available as compression_detection.pdf

Pournaghshband 13
       
Vahab Pournaghshband, "Teaching the Security Mindset to CS 1 Students,"
        44th ACM Technical Symposium on Computer Science Education (ACM SIGCSE), March 2013. Available as cs_education_paper.pdf

Nguyen 12
       
Nam Nguyen, Leonard Kleinrock, and Peter Reiher, "Debugging Ubiquitous Computing Applications With the Interaction Analyzer,"
        International Journal on Advances in Software, vol. 5, no. 34, December 2012. Available as interaction_analyzer_journal.pdf

Pournaghshband 12b
       
Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher, "Securing Legacy Mobile Medical Devices,"
        3rd International Conference on Wireless Mobile Communication and Healthcare (MobiHealth), November 2012. Available as securing_medical_devices.pdf

Fleming 12
       
Charles Fleming, Peter Peterson, Erik Kline, and Peter Reiher, "Data Tethers: Preventing Information Leakage by Enforcing Environmental Data Access Policies,"
        ICC 2012, June 2012. Available as icc_12_data_tethers.pdf

Pournaghshband 12a
       
Vahab Pournaghshband, Leonard Kleinrock, Peter Reiher, and Alex Afanaseyev, "Controlling Applications by Managing Network Characteristics,"
        IEEE Communication and Information Systems Security Symposium (ICC), June 2012. Available as dissuade.pdf

Nguyen 11
       
Nam Nguyen, Leonard Kleinrock, and Peter Reiher, "The Interaction Analyzer:  A Tool for Debugging Ubiquitous Computing Applications ,"
        UBICOMM, November 2011.  Best Paper Award. Available as interaction analyzer 2011.pdf

Kline 11
       
Erik Kline, Alex Afanaseyev, and Peter Reiher, "Shield: DoS Filtering Using Traffic Deflection," Second International Workshop on Security and
       Trust in the Future Internet (FIST), October 2011. Available as shield.pdf
Peterson 11
       
Peter Peterson, Digvijay Singh, William Kaiser, and Peter Reiher, "Investigating Energy and Security Trade-offs in the Classroom
       with the Atom LEAP Testbed," Workshop on Computer Security Education and Testbeds, August 2011.  Available as CSET-LEAP-2011.pdf
Peterson 10
      
  Peter Peterson and Peter Reiher, "Security Exercises for the Online Classroom with DETER," Workshop on Computer Security Eduction and
        Testbeds, August 2010. Available as cset-paper-2010rad.pdf
Afanaseyev 10
         Alex Afanaseyev, Neil Tilley, Peter Reiher, and Leonard Kleinrock, "Host-To-Host Congestion Control for TCP," IEEE Communications
         Surveys and Tutorials, Vol 12, No. 3, Third Quarter 2010. Available as TCP-congestion-control.pdf
Kline 09b
          Erik Kline, Matthew Beaumont-Gay, Jelena Mirkovic, and Peter Reiher, "RAD: Reflector Attack Defense Using Message Authentication Codes,"
          Annual Computer Security Applications Conference (ACSAC), December 2009. Available as acsac 2009.pdf.
Kline 09a
          Erik Kline and Peter Reiher, "Securing Data Through Avoidance Routing," New Security Paradigms Workshop, September 2009. Available as nspw09.pdf             
Mirkovic 9b
       
Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter Reiher, and Roshan Tomas,"Accurately Measuring Denial of Service
        in Simulation and Testbed Experiments," IEEE Transactions on Dependable and Secure Computing, Vol. 6, No. 2,
        April-June 2009. Available as TDSC-2008-04-069.pdf.
Ramakrishna 09
        Venkata Ramakrishna, Peter Reiher, and Leonard Kleinrock, "Distributed Policy Resolution Through Negotiation in
        Ubiquitous Computing Environments," PerCom 2009. Available as Percom_2009_Distributed_Policy_Resolution.pdf
Mirkovic 09a
        Jelena Mirkovic, Sonia Fahmy, Peter Reiher, and Roshan Thomas, "How to Test DoS Defenses," Cybersecurity
        Applications and Technologies Conference for Homeland Security (CATCH09), March 2009. Available as catch-ddos-2009.pdf
Mirkovic 08b
       J. Mirkovic and P. Reiher, “Building Accountability into the Future Internet,”NPSec 2008, October 2008. Available as npsec 2008.pdf
Eustice 08b

       K. Eustice, A. M. Jourabchi, J. Stoops, and P. Reiher, “Improving User Satisfaction in a Ubiquitous Computing Application,”
       SAUCE 2008, October 2008.  Available as SAUCE 2008.pdf
Da Silva 08
      T. Da Silva, K. Eustice, and P. Reiher, “Johnny Appleseed: Wardriving to Reduce Interference in Chaotic Wireless
       Deployments,” MSWIM, October 2008.  Available as Johnny_Appleseed.pdf
Mirkovic 08a
      J. Mirkovic, P. Reiher, C. Papadopoulos, A. Hussain, M. Shepard, M. Berg, and R. Jung, “Testing a Collaborative DDoS
      Defense in a Red Team/Blue Team Exercise,” IEEE Transactions on Computing, vol. 57, no. 8, August 2008. Available
      as acm transactions 2008.pdf
Eustice 08a
       K. Eustice, V. Ramakrishna, N. Nguyen, and P. Reiher, “The Smart Party: A Personalized Location-Aware Multimedia
       Experience,” Consumer Communications and Networking Conference, January 2008.  Available as Smart_Party_CCNC_2008.pdf
Weddle 07
        C. Weddle, M. Oldham, J. Qian, A. Wang, P. Reiher, and G. Kuenning, “PARAID: A Gear-Shifting Power-Aware
        RAID,” ACM Transactions on Storage, Vol. 3, No. 3, October 2007. Available as tos2007.pdf
Li 07
         J. Li, J. Mirkovic, T. Ehrenkranz, M. Wang, P. Reiher, and L. Zhang, “Learning the Valid Incoming Direction of IP Packets,"
       Computer Networks (52), October 2007, pp. 399-417.  Available as save2006.pdf
Beaumont-Gay 07
         M. Beaumont-Gay, K. Eustice, V. Ramakrishna, and P. Reiher, “Information Protection Via Environmental Data Tethers,”
      New Security Paradigms Workshop, September 2007.  Available as data-tethers-nspw.pdf
Wang 07
         A. Wang, G. Kuenning, and P. Reiher, “Using Permuted States and Validated Simulation to Analyze Conflict Rates in
        Optimistic Replication,”Simulation: Transactions of the Society for Modeling and Simulation International, Vol. 83, No. 8.
        August 2007, pp. 551-569, 2007. Available as simulation_2007.pdf 
Reiher 07
         P. Reiher, S. Maki, N. Pissinou, K. Makki, M. Burmester, T. Van, and T. Ghosh, “Research Directions in Security and Privacy
         for Mobile and Wireless Networks,”chapter in Mobile and Wireless Security and Privacy (editors S. Makki, P. Reiher, K. Makki,
         N. Pissinou, and S. Makki), Springer Verlag, 2007, pp. 1-22.
Mirkovic 07c
         J. Mirkovic, B. Wilson, A. Hussain, S. Fahmy, P. Reiher, R. Thomas, and S. Schwab, “Automating DDoS Experimentation,"
         Deter Community Workshop on Cyber Security Experimentation and Testing, July 2007.  Available as deter.pdf
Eustice 07
        K. Eustice, V. Ramakrishna, A. Walker, M. Schnaider, N. Nguyen, and P. Reiher, “nan0Sphere: Location-Driven Fiction for
         Groups of Users,” 12th International Conference on Human-Computer Interactions, July 2007.  Available as heii2007.pdf
Mirkovic 07b
         J. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, P. Reiher, R. Thomas, W. Yao, and S. Schwab, “Towards User-Centric Metrics
         for Denial-of-Service Measurement,” Workshop on Experimental Computer Science, June 2007.  Available as a8-mirkovic.pdf
Ramakrishna 07
         V. Ramakrishna, K. Eustice, and P. Reiher, “Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios,”
         Proceedings IEEE International Conference on Service-Oriented Computing and Applications (SOCA) 2007, June 2007.
         Available as soca2007.pdf
Mirkovic 07a
       J. Mirkovic, S. Fahmy, R. Thomas, S. Wei, P. Reiher, A. Hussain, B. Wilson, S. Schwab, and R. Chertov, "DDoS Benchmarks
         and Experimentation Workbench for the DETER Testbed," Tridentcom, May 2007.  Available as tric.pdf
Ramakrishna 07
       
V. Ramakrishna, Kevin Eustice and Matthew Schnaider, "Chapter 8: Approaches for Ensuring Security and Privacy
        in Unplanned Ubiquitous Computing Interactions," Mobile and Wireless Networks Security and Privacy,
        Ed: Makki et al., Springer Science+Business Media, 2007.
Ramakrishna 06b
         
V. Ramakrishna, Max Robinson, Kevin Eustice and Peter Reiher, "An Active Self-Optimizing Multiplayer
         Gaming Architecture," Cluster Computing Journal, Vol 9 No 2. special issue on Autonomic Computing, Springer
         Netherlands, 2006. Available as cluster_computing.pdf
Ramakrishna 06a

Venkatraman Ramakrishna, Kevin Eustice and Matthew Schnaider, "Approaches for Ensuring Security and Privacy on Unplanned Ubiquitous Computing Interactions," Proceedings of International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN06), March 2006.  Available as wspwn2006.pdf
Mirkovic 05
Jelena Mirkovic and Peter Reiher, "D-WARD: A Source-End Defense Against Flooding Denial-of-Service Attacks,"IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 3, pp. 216-232, September 2005. Available as tdsc_2005.pdf.
Wang 05
An-I Andy Wang, Geoff Kuenning, and Peter Reiher, "Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication," 2005 International Symposium on Performance Evaluation of Computer and Telecommnications Systems (SPECTS), July 2005. Available as spects_2005.html.
Li 05
Jun Li, Toby Ehrenkranz, Geoff Kuenning, and Peter Reiher, "Simulation and Analysis on the Resiliency and Efficiency of Malnets," Symposium on Measurement, Modeling, and Simulation of Malware, June 2005.  Available as  malnet_sim.pdf
Anderson 05
Everett Anderson, Kevin Eustice, Shane Markstrum, Mark Hanson, and Peter Reiher, "Mobile Contagions:  Simulation of Infection and Disease," Symposium on Measurement, Modeling, and Simulation of Malware, June 2005.  Available as  mobile worm.pdf.
Ratner 04
David Ratner, Peter Reiher, and Gerald Popek, "ROAM: A Scalable Replication System for Mobility," ACM/Kluwer Mobile Applications and Networks (MONET), Vol. 9, No. 5, October 2004, pp. 537-544.  Available as roam_monet.pdf.
Mirkovic 04
Jelena Mirkovic and Peter Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanics," Computer Communications Review, Vol. 34, No. 2, April 2004.  Available as ccr.pdf.
Nguyen 04
N. Nguyen, A. Wang, G. Kuenning, and P. Reiher, "Electric Field Routing: A Reliable Framework for Routing in MANETs," ACM Mobile Computing and Communications Review (MC2R), Vol 8, No. 2, April 2004, pp. 35-49.  Available as efr_mc2r.ps.
Li 04
Jun Li, Gerald Popek, and Peter Reiher, "Resilient Self-Organizing Overlay Networks for Security Update Delivery," IEEE Journal on Selected Areas in Communications, Special Issue on Service Overlay Networks, Vol. 22, No. 1, January 2004.  Available as revere_jsac.pdf.
Rudenko 04
Alexey Rudenko and Peter Reiher, "Adaptation Planning for Unicast Communications in Active Networks," IWAN 2003, December 2003. Available as iwan.pdf.
Mirkovic 03b
Jelena Mirkovic, Max Robinson, and Peter Reiher, "Alliance Formation for DDos Defense," New Security Paradigms Workshop, August 2003. Available as defcom-nspw.pdf.
Eustice 03b
Kevin Eustice, V. Ramakrishna, Shane Markstrum, Peter Reiher, and Gerald Popek, "WiFi Nomads and Their Unprotected Devices: The Case for QED-Quarantine, Examination, and Decontamination," New Security Pardigms Workshop,August 2003. Available as qed.pdf.
Wang 03
A. Wang, G. Kuenning, P. Reiher, and G. Popek, "The Effects of Memory-Rich Environments on File System Microbenchmarks," SPECTS, July 2003. Available as spects03.pdf.
Eustice 03a
K. Eustice, L. Kleinrock, S. Markstrum, G. Popek, V. Ramakrishna, and P. Reiher, "Enabling Secure Ubiquitous Interactions," 1st Intl Workshop on Middleware for Pervasive Ad Hoc Computing, 2003. Available as IWMPAC03.pdf.
Nguyen 03
N. Nguyen, G. Kuenning, and P. Reiher, "Detecting Insider Threats by Monitoring System Call Activity," IEEE Information Assurance Workshop, 2003. Available as insider.pdf.
Ramakrishna 03
V. Ramakrishna, M. Robinson, K. Eustice, and P. Reiher, "An Active Self-Optimizing Multiplayer Gaming Architecture,"  Adaptive Middleware Systems, June 2003. Available as ams03.pdf.
Mirkovic 03a
Jelena Mirkovic, Gregory Prier, and Peter Reiher, "Source-End DDoS Defense," IEEE International Symposium on Network Computing and Applications, April 2003, Available as nca03.pdf.
Mirkovic 02
Jelena Mirkovic, Greg Prier, and Peter Reiher, "Attacking DDoS at the Source," ICNP 2002, November 2002, Available as dward.ps.
Burns 02
Michael Burns, Greg Prier, Jelena Mirkovic, and Peter Reiher, "Implementing Address Assurance in the Intel IXP Router," Western Network Processors Conference, October 2002, Available as npc_paper.pdf.
Kuenning 02
Geoffrey Kuenning, Wilkie Ma, Peter Reiher, and Gerald Popek, "Simplifying Automated Hoarding Methods," MSWiM 2002, September 2002, Available as mswim.ps.
Wang 02b
An-I Wang, Peter Reiher, Rajive Bagrodia, and Geoffrey Kuenning, , "Understanding the Behavior of the Conflict-Rate Metric in Optimistic Peer Replication," 5th IEEE Workshop on Mobility in Databases and Distributed Systems, September 2002, Available as mdds2002.pdf.
Li 02c
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, and Lixia Zhang, "SAVE: Source Address Validity Enforcement Protocol," Infocom 2002, July 2002, Available as infocom02.pdf.
Wang 02a
An-I Wang, Peter Reiher, Gerald Popek, and Geoffrey Kuenning, "Conquest: Better Performance Through a Disk/RAM Hybrid File System," Usenix 2002, June 2002, Available as usenix2002.ps.
Ferreria 02
Vincent Ferreria, Alexey Rudenko, Kevin Eustice, Richard Guy, V. Ramakrishna, and Peter Reiher, "Panda: Middleware to Provide the Benefits of Active Networks to Legacy Applications," DANCE 02 , May 2002, Available as panda.pdf.
Li 02b
Jun Li, Peter Reiher, Gerald Popek, Mark Yarvis, and Geoffrey Kuenning, "An Approach to Measuring Large-Scale Distributed Systems," Testcom 02, March 2002, Available as testcom02.pdf.
Li 02a
Jun Li, Mark Yarvis, and Peter Reiher, "Securing Distributed Adaptation," Computer Networks, Vol. 38, No. 3, January 2002, Available as sda.pdf.
Ratner 01
David Ratner, Peter Reiher, Gerald Popek, and Geoffrey Kuenning, "Application Requirements for Mobile Computing," Mobile Networks and Applications, Vol. 6, No. 6, November 2001, Available as replreq.ps.
Michel 01b
B. Scott Michel and Peter Reiher, "Peer-to-Peer Internetworking," Opensig 2001, September 2001, Available as Opensig.ps.
Michel 01a
B. Scott Michel and Peter Reiher "Peer-Through-Peer Communication for Information Logistics," Mobile Internet-based Services and Information Logistics Workshop, September 2001, Available as MISIL.ps.
Reiher 01
Peter Reiher, Kevin Eustice, and Kai-Min Sung, "Adapting Encrypted Data Streams in Open Architectures," Adaptive Middleware Workshop, August 2001, Available as AMSW.ps.
Li 01
Jun. Li, Mark Yarvis, Peter Reiher, "Securing Distributed Adaptation," OpenArch01, Available as Security_OpenArch01.ps.
Ekenstam 01
Todd Ekenstam, Peter Reiher, Charles Matheny, and Gerald Popek, "The Bengal Database Replication System," the Journal of Distributed and Parallel Databases, Vol. 9, No. 3, May 2001, Available as bengal.ps.
Badrinath 00
B. Badrinath, Armando Fox, Leonard Kleinrock, Gerald Popek, Peter Reiher, and M. Satyanarayanan, "A Conceptual Framework for Network and Client Adaptation," Mobile Networks and Applications, Vol. 5, No. 4, 2000. Available as adaptation.ps.
Reiher00
Peter Reiher, Richard Guy, Mark Yarvis, and Alexey Rudenko, "Automated Planning for Open Architectures," Openarch 00, short paper session, March 2000. Available as planning.pdf.
Yarvis00
Mark Yarvis, Peter Reiher, and Gerald J. Popek, "A Reliability Model for Distributed Adaptation," Openarch 00, March 2000. Available as reliability.ps.
Michel00
Scott Michel, Peter Reiher, Constatin Nikolodakis, and Lixia Zhang, "URL Forwarding and Compression in Adaptive Web Caching," Infocom 2000, March 2000. Available as awc.ps.
Li99
Li Jun, Peter Reiher, and Gerald Popek, "Securing Information Transmission by Redundancy, The New Security Paradigms Workshop , September, 1999. Available as redundancy.ps.
Ratner99
David Ratner, Peter Reiher, and Gerald Popek, "Roam: A Scalable Replication System for Mobile Computing," Workshop on Mobile Databases and Distributed Systems (MDDS), September, 1999. Available as roam.ps
Tsai99c
Mitchell Tsai, Peter Reiher, and Gerald Popek, "Baby Steps From GUI Towards Dialogue: Mixed Intiative Computerese," AAAI'99 Workshop on Mixed Initiative Intelligence, July 1999. Available as AAAI.context.doc
Tsai99b
Mitchell Tsai, Peter Reiher, and Gerald Popek, "Operating System Services for Managing Context," AAAI'99 Workshop on Reasoning in Context for AI Applications," July 1999. Available as AAAI.context.doc
Tsai99a
Mitchell Tsai, Peter Reiher, and Gerald Popek, "Command Management System for Next-Generation User Input," Seventh Workshop on Hot Topics in Operating Systems (HotOS), March 1999. Available as HotOS2.ps
Yarvis99
Mark Yarvis, Peter Reiher, and Gerald Popek, "A Framework for Distributed Adaptation," Seventh Workshop on Hot Topics in Operating Systems (HotOS), March 1999. Available as HotOS1.ps
Rudenko99
Alexey Rudenko, Peter Reiher, Gerald Popek, and Geoff Kuenning, "Portable Computer Battery Power Saving Using a Remote Processing Framework," Mobile Computing Systems and Application Track of the ACM SAC, February 1999. Available as SAC.prn
Wang99
An-I Wang, Peter Reiher, Rajive Bagrodia, and Gerald Popek, "A Simulation Evaluation of Optimistic Replicated Filing in a Mobile Environment," 18th IEEE International Performance, Computing, and Communications Conference, February 1999. Available as IPCCC.prn
Guy98
Richard Guy, Peter Reiher, David Ratner, Michial Gunter, Wilkie Ma, and Gerald Popek, "Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication," Workshop on Mobile Data Access, November 1998. Available as rumor.ps.
Rudenko98
Alexey Rudenko, Peter Reiher, Gerald Popek, and Geoff Kuenning, "Saving Portable Computer Battery Power through Remote Process Execution," ACM Mobile Computing and Communication Review (MC2R), Vol. 2, No. 1, 1998. Available as power.ps.
Kuenning98
Geoff Kuenning, Rajive Bagrodia, Richard Guy, Gerald Popek, Peter Reiher, and An-I Wang, "Measuring the Quality of Service of Optimistic Replication," ECOOP '98 Workshop on Mobility and Replication, July 1998. Available as replqos.ps.
Page98
T. W. Page, R. G. Guy, J. S. Heidemann, D. Ratner, P. Reiher, A. Goel, G. H. Kuenning, and G. J. Popek, Perspecives on Optimistically Replicated Peer-to-Peer Filing", Software--Practices and Experience, 28 2, 155-180, February 1998.
Page97
Thomas Page, Richard Guy, John Heidemann, David Ratner, Peter Reiher, Ashvin Goel, Geoff Kuenning, and Gerald Popek, "Perspectives on Optimistically Replicated, Peer-To-Peer Filing," Software - Practice and Experience, December 1997. Available as spe.ps.
Ratner97
David Ratner, Peter Reiher, and Gerald Popek, "Replication Requirements in Mobile Environments," Proceedings of the Dial M for Mobility Workshop, October 1997. Available as wards.ps.gz
Kuenning97
Geoff Kuenning, Peter Reiher, and Gerald Popek, "Experience with an Automated Hoarding System," Personal Technologies, September 1997. Available as seerres.ps.
Ratner96
David Ratner, Gerald Popek, and Peter Reiher, "The Ward Model: A Scalable Replication Architecture for Mobility," Workshop on Object Replication and Mobile Computing, October 1996. Available as wardworkshop.ps.
Reiher96
Peter Reiher, Gerald Popek, Michial Gunter, John Salomone, David Ratner, "Peer-to-Peer Reconciliation Based Replication for Mobile Computers." European Conference on Object Oriented Programming '96 Second Workshop on Mobility and Replication, June 1996. Available as ecoop.ps
Heidemann95
John Shelby Heidemann, Stackable Design of File Systems, Technical Report CSD-950032, University of California, Los Angeles, September 1995.
Heidemann95a
John Heidemann and Gerald Popek, Performance of Cache Coherance in Stackable Filing, Proceedings of the 15th Symposium on Operating Systems Principles, ACM, December 1995.
Heidemann95b
John Heidemann, Ashvin Goel, and Gerald Popek, "Defining and Measuring Conflicts in Optimistic Replication," Technical Report UCLA-CSD-950033, University of California, Los Angeles, September, 1995.
Heidemann94
John S. Heidemann and Gerald J. Popek, File-System Development With Stackable Layers, ACM Transactions on Computer Systems, 12(1):58-59, 1994. An early version is available as UCLA Technical Report CSD-930019.
Reiher94
Peter Reiher, John S. Heidemann, David Ratner, Gregory Skinner, and Gerald J. Popek, "Resolving File Conflicts in the Ficus File System," USENIX Conference Proceedings, pages 183-195. USENIX, June 1994. Available as file://ftp.cs.ucla.edu/pub/ficus/usenix_summer_94_resolver.ps.

Kuenning94
Geoffrey H. Kuenning, Gerald J. Popek, and Peter Reiher, "An Analysis of Trace Data for Predictive File Caching in Mobile Computing, "USENIX Conference Proceedings, pages 183-195. USENIX, June 1994. Available as file://ftp.cs.ucla.edu/pub/ficus/usenix_summer_94_statistics.ps.gz
Reiher93b
P.  Reiher, T. Page, G. Popek, J. Cook, and S. Crocker, "Truffles - Secure File Sharing With Minimal System Administrator Intervention," Proceedings of the 1993 World Conference on System Administration, Networking, and Security, April, 1993. Available as file://ftp.cs.ucla.edu/pub/ficus/sans2.ps.gz
Reiher93a
P.  Reiher, T. Page, G. Popek, J. Cook, and S. Crocker, "Truffles - A Secure Service For Widespread File Sharing," Proceedings of the Privacy and Security Research Group Workshop on Network and Distributed System Security, February 1993. Available as file://ftp.cs.ucla.edu/pub/ficus/psrg93.ps.gz
Reiher92
P.  Reiher, "Experiences With Optimistic Synchronization for Distributed Operating Systems," Proceedings of the Third Symposium on Experiences with Distributed and Multiprocessor Systems, March 1992. Available as Available as tw_experiences.pdf.
Heidemann92
John S. Heidemann, Thomas W. Page, Richard G. Guy, and Gerald J. Popek, "Primarily Disconnected Pperation: Experiences with Ficus," Proceedings of the Second Workshop on management of Replicated Data. IEEE, November 1992.
Heidemann91
John S. Heidemann, "Stackable Layers: an Architecture for File System Development," Technical Report CSD-910056, University of California, Los Angeles, July 1991. Master's Thesis.
Page91
Thomas W. Page, Jr., Richard G. Guy, Gerald J. Popek, John S. Heidemann, Wai Mak, and Dieter Rothmeier, "Management of Replicated Volume Location Data in the Ficus Replicatd File System," USENIX Conference Proceedings. USENIX, June 1991

Popek90
Gerald J. Popek, Richard G. Guy, Thomas W. Page, Jr., and John S. Heidemann, "Replication in Ficus Distributed File Systems," Proceedings of the Workshop on Management of Replicated Data, pages 20-25. IEEE, November 1990.
Guy90
Richard G. Guy, Thomas W. Page, Jr., John S. Heidemann, and Gerald J. Popek, "Name Transparency in Very Large Scale Distributed File Systems," Second IEEE Workshop on Experimental Distributed Systems, October 1990.
Guy90a
Richard G. Guy, John S. Heidemann, Wai Mak, Thomas W. Page, Gerald J. Popek, and Dieter Rothmeier, "Implementation of the Ficus Replicated File System," USENIX Conference Proceedings, pages 63-71. USENIX, June 1990





 

 


reiher@cs.ucla.edu

Last modified:  February 2009