Garip 15b
M. Garip, M. Gursoy, P. Reiher, M. Gerla, Congestion Attacks to Autonomous Cars Using Vehicular Botnets","
NDSS Workshop on Security of Emerging Networking Technologies (SENT), February 2015.
Available as SENT_2015.pdf
Garip 15a
M. Garip, M. Gursoy, P. Reiher, M. Gerla, "Scalable Reactive Vehicle-to-Vehicle Congestion Avoidance Mechanism,"
First International Workshop on Vehicular Networking and Intelligent Transportation Systems, January 2015.
Available as VENIT_2015.pdf
Pournaghshband 14c
Vahab Pournaghshband, S. Hashemzadeh, and Peter Reiher, "How To Detect Middleboxes: Guidelines on a Methodology,"
Sixth International Conference on Network and Communications Security, December 2014.
Available as NCS14.pdf
Pournaghshband 14b
Vahab Pournaghshband, D. Meyer, M. Holyland, M. Sarrafzadeh, and Peter Reiher, "Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices,"
Workshop on Usable Mobile Security, December 2014.
Available as wums14_paper.pdf
Pournaghshband 14a
Vahab Pournaghshband, Alex Afanaseyev, and Peter Reiher, "End-to-End Detection of Compression of Traffic Flows by Intermediaries,"
IEEE/IFIP Network Operations and Management Symposium (NOMS), May 2014. Available as compression_detection.pdf
Pournaghshband 13
Vahab Pournaghshband, "Teaching the Security Mindset to CS 1 Students,"
44th ACM Technical Symposium on Computer Science Education (ACM SIGCSE), March 2013. Available as cs_education_paper.pdf
Nguyen 12
Nam Nguyen, Leonard Kleinrock, and Peter Reiher, "Debugging Ubiquitous Computing Applications With the Interaction Analyzer,"
International Journal on Advances in Software, vol. 5, no. 34, December 2012. Available as interaction_analyzer_journal.pdf
Pournaghshband 12b
Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher, "Securing Legacy Mobile Medical Devices,"
3rd International Conference on Wireless Mobile Communication and Healthcare (MobiHealth), November 2012. Available as securing_medical_devices.pdf
Fleming 12
Charles Fleming, Peter Peterson, Erik Kline, and Peter Reiher, "Data Tethers: Preventing Information Leakage by Enforcing Environmental Data Access Policies,"
ICC 2012, June 2012. Available as icc_12_data_tethers.pdf
Pournaghshband 12a
Vahab Pournaghshband, Leonard Kleinrock, Peter Reiher, and Alex
Afanaseyev, "Controlling Applications by Managing Network Characteristics,"
IEEE Communication and Information Systems Security Symposium (ICC), June 2012. Available as dissuade.pdf
Nguyen 11
Nam Nguyen,
Leonard Kleinrock, and Peter Reiher, "The Interaction Analyzer: A Tool for
Debugging Ubiquitous Computing Applications
,"
UBICOMM, November
2011. Best Paper Award. Available as interaction analyzer
2011.pdf
Kline 11
Erik Kline, Alex
Afanaseyev, and Peter Reiher, "Shield: DoS Filtering Using Traffic
Deflection," Second International Workshop on Security and
Trust in the Future Internet
(FIST), October 2011. Available as shield.pdf
Peterson 11
Peter Peterson,
Digvijay Singh, William Kaiser, and Peter Reiher, "Investigating
Energy and Security Trade-offs in the Classroom
with the Atom LEAP Testbed,"
Workshop on Computer Security Education and Testbeds, August
2011. Available as CSET-LEAP-2011.pdf
Peterson 10
Peter Peterson and
Peter Reiher, "Security Exercises for the Online Classroom with
DETER," Workshop on Computer Security Eduction and
Testbeds, August 2010.
Available as cset-paper-2010rad.pdf
Afanaseyev 10
Alex Afanaseyev, Neil
Tilley, Peter Reiher, and Leonard Kleinrock, "Host-To-Host
Congestion Control for TCP," IEEE Communications
Surveys and
Tutorials, Vol 12, No. 3, Third Quarter 2010. Available as
TCP-congestion-control.pdf
Kline 09b
Erik Kline, Matthew
Beaumont-Gay, Jelena Mirkovic, and Peter Reiher, "RAD: Reflector
Attack Defense Using Message Authentication Codes,"
Annual
Computer Security Applications Conference (ACSAC), December 2009.
Available as acsac 2009.pdf.
Kline 09a
Erik Kline and Peter
Reiher, "Securing Data Through Avoidance Routing," New Security
Paradigms Workshop, September 2009. Available as nspw09.pdf
Mirkovic 9b
Jelena
Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter Reiher, and Roshan
Tomas,"Accurately Measuring Denial of Service
in Simulation and
Testbed Experiments," IEEE Transactions on Dependable and Secure
Computing, Vol. 6, No. 2,
April-June 2009.
Available as TDSC-2008-04-069.pdf.
Ramakrishna 09
Venkata
Ramakrishna,
Peter Reiher, and Leonard Kleinrock, "Distributed Policy
Resolution
Through Negotiation in
Ubiquitous
Computing
Environments," PerCom 2009. Available as Percom_2009_Distributed_Policy_Resolution.pdf
Mirkovic 09a
Jelena Mirkovic,
Sonia
Fahmy, Peter Reiher, and Roshan Thomas, "How to Test DoS
Defenses,"
Cybersecurity
Applications and
Technologies Conference for Homeland Security (CATCH09), March
2009. Available as catch-ddos-2009.pdf
Mirkovic 08b
J. Mirkovic and
P. Reiher,
“Building Accountability into the Future Internet,”NPSec 2008,
October
2008. Available as
npsec 2008.pdf
Eustice 08b
K. Eustice, A.
M. Jourabchi, J.
Stoops, and P. Reiher, “Improving User Satisfaction in a
Ubiquitous
Computing Application,”
SAUCE 2008,
October 2008. Available as SAUCE 2008.pdf
Da Silva 08
T. Da Silva, K. Eustice, and P.
Reiher, “Johnny Appleseed: Wardriving to Reduce Interference in
Chaotic
Wireless
Deployments,” MSWIM,
October 2008. Available as Johnny_Appleseed.pdf
Mirkovic 08a
J. Mirkovic, P.
Reiher, C.
Papadopoulos, A. Hussain, M. Shepard, M. Berg, and R. Jung,
“Testing a
Collaborative DDoS
Defense in a Red
Team/Blue Team Exercise,” IEEE Transactions on Computing, vol. 57,
no.
8, August 2008. Available
as acm transactions 2008.pdf
Eustice 08a
K. Eustice, V.
Ramakrishna, N. Nguyen,
and P. Reiher, “The Smart Party: A Personalized Location-Aware
Multimedia
Experience,” Consumer
Communications and Networking Conference, January 2008.
Available
as Smart_Party_CCNC_2008.pdf
Weddle 07
C. Weddle,
M. Oldham, J. Qian, A.
Wang, P. Reiher, and G. Kuenning, “PARAID: A Gear-Shifting
Power-Aware
RAID,” ACM
Transactions on Storage, Vol.
3, No. 3, October 2007. Available as tos2007.pdf
Li 07
J. Li, J.
Mirkovic, T. Ehrenkranz,
M.
Wang, P.
Reiher,
and L. Zhang, “Learning the Valid Incoming Direction of IP
Packets,"
Computer
Networks (52), October
2007, pp. 399-417. Available as save2006.pdf
Beaumont-Gay 07
M.
Beaumont-Gay,
K. Eustice, V.
Ramakrishna, and P. Reiher, “Information Protection Via
Environmental Data Tethers,”
New Security Paradigms
Workshop,
September 2007. Available as data-tethers-nspw.pdf
Wang 07
A. Wang, G.
Kuenning, and P.
Reiher, “Using Permuted States and Validated Simulation to Analyze
Conflict Rates in
Optimistic
Replication,”Simulation:
Transactions of the Society for Modeling and Simulation
International,
Vol. 83, No. 8.
August 2007, pp.
551-569,
2007. Available as simulation_2007.pdf
Reiher 07
P. Reiher,
S.
Maki, N. Pissinou,
K. Makki, M. Burmester, T. Van, and T. Ghosh, “Research Directions
in
Security and Privacy
for Mobile
and Wireless Networks,”chapter in Mobile and Wireless Security and
Privacy (editors S. Makki, P. Reiher, K. Makki,
N. Pissinou,
and S. Makki), Springer
Verlag, 2007, pp. 1-22.
Mirkovic 07c
J. Mirkovic,
B.
Wilson, A.
Hussain, S. Fahmy, P. Reiher, R. Thomas, and S. Schwab,
“Automating
DDoS Experimentation,"
Deter
Community
Workshop on Cyber
Security Experimentation and Testing, July
2007. Available as deter.pdf
Eustice 07
K. Eustice, V.
Ramakrishna, A.
Walker, M. Schnaider, N. Nguyen, and P. Reiher, “nan0Sphere:
Location-Driven Fiction for
Groups of
Users,” 12th
International Conference on Human-Computer Interactions, July
2007. Available as heii2007.pdf
Mirkovic 07b
J. Mirkovic,
A.
Hussain, B.
Wilson, S. Fahmy, P. Reiher, R. Thomas, W. Yao, and S. Schwab,
“Towards
User-Centric Metrics
for
Denial-of-Service Measurement,” Workshop on Experimental Computer
Science, June 2007. Available as a8-mirkovic.pdf
Ramakrishna 07
V.
Ramakrishna,
K. Eustice, and
P. Reiher, “Negotiating Agreements Using Policies in Ubiquitous
Computing Scenarios,”
Proceedings
IEEE
International Conference on
Service-Oriented
Computing and Applications (SOCA) 2007, June 2007.
Available as
soca2007.pdf
Mirkovic 07a
J. Mirkovic, S. Fahmy,
R.
Thomas,
S. Wei, P. Reiher, A. Hussain, B. Wilson, S. Schwab, and R.
Chertov,
"DDoS Benchmarks
and
Experimentation
Workbench for the DETER
Testbed," Tridentcom, May 2007. Available as tric.pdf
Ramakrishna 07
V.
Ramakrishna,
Kevin Eustice and Matthew Schnaider, "Chapter 8: Approaches for
Ensuring Security and Privacy
in Unplanned
Ubiquitous
Computing Interactions," Mobile and Wireless Networks
Security and Privacy,
Ed: Makki et
al.,
Springer
Science+Business Media, 2007.
Ramakrishna 06b
V.
Ramakrishna,
Max Robinson, Kevin Eustice and Peter Reiher, "An Active
Self-Optimizing Multiplayer
Gaming
Architecture," Cluster Computing Journal, Vol 9 No 2. special
issue on Autonomic
Computing, Springer
Netherlands,
2006. Available as cluster_computing.pdf
Ramakrishna 06a
- Venkatraman
Ramakrishna,
Kevin Eustice and Matthew Schnaider, "Approaches for
Ensuring Security and Privacy on Unplanned Ubiquitous
Computing Interactions," Proceedings
of
International Workshop on Research Challenges in Security
and Privacy for Mobile and Wireless Networks (WSPWN06),
March
2006. Available as wspwn2006.pdf
Mirkovic 05
- Jelena Mirkovic
and Peter Reiher, "D-WARD: A Source-End Defense Against Flooding
Denial-of-Service Attacks,"IEEE
Transactions
on
Dependable and Secure Computing, Vol. 2, No. 3, pp.
216-232,
September
2005. Available as tdsc_2005.pdf.
Wang 05
- An-I Andy Wang,
Geoff Kuenning, and Peter Reiher, "Using Permuted States and
Validated
Simulation to Analyze Conflict Rates in
Optimistic Replication," 2005 International Symposium on
Performance
Evaluation of Computer and Telecommnications
Systems (SPECTS), July 2005. Available as spects_2005.html.
Li 05
- Jun Li, Toby Ehrenkranz,
Geoff Kuenning, and Peter Reiher, "Simulation and Analysis on
the
Resiliency and Efficiency of Malnets," Symposium on
Measurement, Modeling, and Simulation of Malware, June
2005.
Available as malnet_sim.pdf
- Anderson 05
- Everett Anderson, Kevin
Eustice, Shane Markstrum, Mark Hanson, and Peter Reiher, "Mobile
Contagions: Simulation of Infection and Disease,"
Symposium on
Measurement, Modeling, and Simulation of Malware, June
2005.
Available as mobile worm.pdf.
- Ratner 04
- David Ratner, Peter
Reiher, and Gerald Popek, "ROAM: A Scalable Replication System
for
Mobility," ACM/Kluwer Mobile
Applications and Networks
(MONET),
Vol. 9, No. 5, October 2004, pp. 537-544. Available as roam_monet.pdf.
- Mirkovic 04
- Jelena Mirkovic and Peter
Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanics,"
Computer Communications Review, Vol.
34, No.
2,
April 2004. Available as ccr.pdf.
- Nguyen 04
- N. Nguyen, A. Wang, G.
Kuenning, and P. Reiher, "Electric Field Routing: A Reliable
Framework
for Routing in MANETs," ACM
Mobile
Computing and
Communications
Review (MC2R), Vol 8, No. 2, April 2004, pp.
35-49.
Available as efr_mc2r.ps.
- Li 04
- Jun Li, Gerald Popek, and
Peter Reiher, "Resilient Self-Organizing Overlay Networks for
Security
Update Delivery," IEEE
Journal on
Selected Areas in
Communications, Special Issue on Service Overlay
Networks, Vol.
22, No. 1, January
2004. Available as revere_jsac.pdf.
- Rudenko 04
- Alexey Rudenko and Peter
Reiher, "Adaptation Planning for Unicast Communications in
Active
Networks," IWAN 2003, December 2003. Available
as iwan.pdf.
- Mirkovic 03b
- Jelena Mirkovic, Max
Robinson, and Peter Reiher, "Alliance Formation for DDos
Defense," New
Security Paradigms Workshop,
August
2003. Available as defcom-nspw.pdf.
- Eustice 03b
- Kevin Eustice, V.
Ramakrishna, Shane Markstrum, Peter Reiher, and Gerald Popek,
"WiFi
Nomads and Their Unprotected Devices: The Case for
QED-Quarantine, Examination, and Decontamination," New Security
Pardigms Workshop,August
2003. Available as qed.pdf.
- Wang 03
- A. Wang, G. Kuenning, P.
Reiher, and G. Popek, "The Effects of Memory-Rich Environments
on File
System Microbenchmarks,"
SPECTS, July 2003. Available as spects03.pdf.
- Eustice 03a
- K. Eustice, L. Kleinrock,
S. Markstrum, G. Popek, V. Ramakrishna, and P. Reiher, "Enabling
Secure
Ubiquitous Interactions," 1st
Intl Workshop on Middleware for Pervasive Ad Hoc Computing,
2003. Available as IWMPAC03.pdf.
- Nguyen 03
- N. Nguyen, G. Kuenning,
and P. Reiher, "Detecting Insider Threats by Monitoring System
Call
Activity," IEEE Information Assurance Workshop,
2003. Available as insider.pdf.
- Ramakrishna 03
- V. Ramakrishna, M.
Robinson, K. Eustice, and P. Reiher, "An Active Self-Optimizing
Multiplayer Gaming Architecture," Adaptive Middleware Systems,
June
2003. Available as ams03.pdf.
- Mirkovic 03a
- Jelena
Mirkovic, Gregory Prier, and Peter Reiher, "Source-End
DDoS Defense," IEEE International Symposium on Network
Computing
and
Applications, April
2003, Available as nca03.pdf.
- Mirkovic 02
- Jelena Mirkovic, Greg Prier, and Peter Reiher, "Attacking DDoS
at
the
Source," ICNP 2002, November 2002, Available as dward.ps.
- Burns 02
- Michael Burns, Greg Prier, Jelena Mirkovic, and Peter Reiher,
"Implementing
Address Assurance in the Intel IXP Router," Western Network
Processors Conference, October
2002, Available as npc_paper.pdf.
- Kuenning 02
- Geoffrey Kuenning, Wilkie Ma, Peter Reiher, and Gerald Popek,
"Simplifying
Automated Hoarding Methods," MSWiM 2002, September 2002,
Available as mswim.ps.
- Wang 02b
- An-I Wang, Peter Reiher, Rajive Bagrodia, and Geoffrey
Kuenning,
, "Understanding the Behavior of the Conflict-Rate Metric in
Optimistic
Peer Replication," 5th IEEE Workshop on Mobility in
Databases and
Distributed
Systems,
September 2002, Available as mdds2002.pdf.
- Li 02c
- Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, and Lixia
Zhang, "SAVE:
Source Address Validity Enforcement Protocol," Infocom 2002,
July
2002, Available as infocom02.pdf.
- Wang 02a
- An-I Wang, Peter Reiher, Gerald Popek, and Geoffrey Kuenning,
"Conquest:
Better Performance Through a Disk/RAM Hybrid File System," Usenix
2002,
June 2002, Available as usenix2002.ps.
- Ferreria 02
- Vincent Ferreria, Alexey Rudenko, Kevin Eustice, Richard Guy,
V.
Ramakrishna,
and Peter Reiher, "Panda: Middleware to Provide the Benefits of
Active
Networks to Legacy Applications," DANCE 02 , May 2002,
Available
as panda.pdf.
- Li 02b
- Jun Li, Peter Reiher, Gerald Popek, Mark Yarvis, and Geoffrey
Kuenning,
"An Approach to Measuring Large-Scale Distributed Systems," Testcom
02, March 2002, Available as testcom02.pdf.
- Li 02a
- Jun Li, Mark Yarvis, and Peter Reiher, "Securing Distributed
Adaptation," Computer
Networks, Vol. 38, No. 3, January 2002, Available as sda.pdf.
- Ratner 01
- David Ratner, Peter Reiher, Gerald Popek, and Geoffrey
Kuenning,
"Application
Requirements for Mobile Computing," Mobile Networks and
Applications,
Vol. 6, No. 6, November 2001, Available as replreq.ps.
- Michel 01b
- B. Scott Michel and Peter Reiher, "Peer-to-Peer
Internetworking," Opensig
2001, September 2001, Available as Opensig.ps.
- Michel 01a
- B. Scott Michel and Peter Reiher "Peer-Through-Peer
Communication
for Information
Logistics," Mobile Internet-based Services and Information
Logistics
Workshop, September 2001, Available as MISIL.ps.
- Reiher 01
- Peter Reiher, Kevin Eustice, and Kai-Min Sung, "Adapting
Encrypted Data
Streams in Open Architectures," Adaptive Middleware Workshop,
August
2001, Available as AMSW.ps.
- Li 01
- Jun. Li, Mark Yarvis, Peter Reiher, "Securing Distributed
Adaptation," OpenArch01,
Available as Security_OpenArch01.ps.
- Ekenstam 01
- Todd Ekenstam, Peter Reiher, Charles Matheny, and Gerald
Popek,
"The Bengal
Database Replication System," the Journal of Distributed and
Parallel
Databases, Vol. 9, No. 3, May 2001, Available as bengal.ps.
- Badrinath 00
- B. Badrinath, Armando Fox, Leonard Kleinrock, Gerald Popek,
Peter
Reiher,
and M. Satyanarayanan, "A Conceptual Framework for Network and
Client
Adaptation," Mobile
Networks and Applications, Vol. 5, No. 4, 2000. Available
as adaptation.ps.
- Reiher00
- Peter Reiher, Richard Guy, Mark Yarvis, and Alexey Rudenko,
"Automated
Planning for Open Architectures," Openarch 00, short
paper
session,
March 2000. Available as planning.pdf.
- Yarvis00
- Mark Yarvis, Peter Reiher, and Gerald J. Popek, "A Reliability
Model for
Distributed Adaptation," Openarch 00, March 2000.
Available as reliability.ps.
- Michel00
- Scott Michel, Peter Reiher, Constatin Nikolodakis, and Lixia
Zhang, "URL
Forwarding and Compression in Adaptive Web Caching," Infocom
2000,
March 2000. Available as awc.ps.
- Li99
- Li Jun, Peter Reiher, and Gerald Popek, "Securing Information
Transmission
by Redundancy, The New Security Paradigms Workshop ,
September,
1999. Available as redundancy.ps.
- Ratner99
- David Ratner, Peter Reiher, and Gerald Popek, "Roam: A
Scalable
Replication
System for Mobile Computing," Workshop on Mobile Databases
and
Distributed
Systems (MDDS), September, 1999. Available as roam.ps
- Tsai99c
- Mitchell Tsai, Peter Reiher, and Gerald Popek, "Baby Steps
From
GUI Towards
Dialogue: Mixed Intiative Computerese," AAAI'99 Workshop on
Mixed
Initiative
Intelligence, July 1999. Available as AAAI.context.doc
- Tsai99b
- Mitchell Tsai, Peter Reiher, and Gerald Popek, "Operating
System
Services
for Managing Context," AAAI'99 Workshop on Reasoning in
Context for
AI
Applications," July 1999. Available as AAAI.context.doc
- Tsai99a
- Mitchell Tsai, Peter Reiher, and Gerald Popek, "Command
Management
System
for Next-Generation User Input," Seventh Workshop on Hot
Topics in
Operating
Systems (HotOS), March 1999. Available as HotOS2.ps
- Yarvis99
- Mark Yarvis, Peter Reiher, and Gerald Popek, "A Framework for
Distributed
Adaptation," Seventh Workshop on Hot Topics in Operating
Systems
(HotOS),
March 1999. Available as HotOS1.ps
- Rudenko99
- Alexey Rudenko, Peter Reiher, Gerald Popek, and Geoff
Kuenning,
"Portable
Computer Battery Power Saving Using a Remote Processing
Framework," Mobile
Computing Systems and Application Track of the ACM SAC,
February
1999.
Available as SAC.prn
- Wang99
- An-I Wang, Peter Reiher, Rajive Bagrodia, and Gerald Popek, "A
Simulation
Evaluation of Optimistic Replicated Filing in a Mobile
Environment," 18th
IEEE International Performance, Computing, and Communications
Conference,
February 1999. Available as IPCCC.prn
- Guy98
- Richard Guy, Peter Reiher, David Ratner, Michial Gunter,
Wilkie
Ma, and
Gerald Popek, "Rumor: Mobile Data Access Through Optimistic
Peer-to-Peer
Replication," Workshop on Mobile Data Access, November
1998.
Available
as rumor.ps.
- Rudenko98
- Alexey Rudenko, Peter Reiher, Gerald Popek, and Geoff
Kuenning,
"Saving
Portable Computer Battery Power through Remote Process
Execution," ACM
Mobile Computing and Communication Review (MC2R), Vol. 2,
No. 1,
1998.
Available as power.ps.
- Kuenning98
- Geoff Kuenning, Rajive Bagrodia, Richard Guy, Gerald Popek,
Peter
Reiher,
and An-I Wang, "Measuring the Quality of Service of Optimistic
Replication," ECOOP
'98 Workshop on Mobility and Replication, July 1998.
Available as replqos.ps.
- Page98
- T. W. Page, R. G. Guy, J. S. Heidemann, D. Ratner, P. Reiher,
A.
Goel,
G. H. Kuenning, and G. J. Popek, Perspecives
on
Optimistically Replicated Peer-to-Peer Filing", Software--Practices
and
Experience, 28 2, 155-180, February 1998.
- Page97
- Thomas Page, Richard Guy, John Heidemann, David Ratner, Peter
Reiher, Ashvin
Goel, Geoff Kuenning, and Gerald Popek, "Perspectives on
Optimistically
Replicated, Peer-To-Peer Filing," Software - Practice and
Experience,
December 1997. Available as spe.ps.
- Ratner97
- David Ratner, Peter Reiher, and Gerald Popek, "Replication
Requirements
in Mobile Environments," Proceedings of the Dial M for
Mobility
Workshop,
October 1997. Available as wards.ps.gz
- Kuenning97
- Geoff Kuenning, Peter Reiher, and Gerald Popek, "Experience
with
an Automated
Hoarding System," Personal Technologies, September 1997.
Available
as seerres.ps.
- Ratner96
- David Ratner, Gerald Popek, and Peter Reiher, "The Ward Model:
A
Scalable
Replication Architecture for Mobility," Workshop on Object
Replication
and Mobile Computing, October 1996. Available as wardworkshop.ps.
- Reiher96
- Peter Reiher, Gerald Popek, Michial Gunter, John Salomone,
David
Ratner,
"Peer-to-Peer Reconciliation Based Replication for Mobile
Computers." European
Conference on Object Oriented Programming '96 Second Workshop
on
Mobility
and Replication, June 1996. Available as ecoop.ps
- Heidemann95
- John Shelby Heidemann, Stackable
Design
of File Systems, Technical Report CSD-950032, University
of
California,
Los Angeles, September 1995.
- Heidemann95a
- John Heidemann and Gerald Popek, Performance
of
Cache Coherance in Stackable Filing, Proceedings of the
15th
Symposium on Operating Systems Principles, ACM, December
1995.
- Heidemann95b
- John Heidemann, Ashvin Goel, and Gerald Popek, "Defining
and
Measuring Conflicts in Optimistic Replication," Technical
Report
UCLA-CSD-950033, University of California, Los Angeles,
September, 1995.
- Heidemann94
- John S. Heidemann and Gerald J. Popek,
File-System
Development With Stackable Layers, ACM
Transactions on
Computer
Systems, 12(1):58-59, 1994. An early version is available
as UCLA
Technical
Report CSD-930019.
- Reiher94
- Peter Reiher, John S. Heidemann, David Ratner, Gregory
Skinner,
and Gerald
J. Popek, "Resolving File Conflicts in the Ficus File System," USENIX
Conference
Proceedings, pages 183-195. USENIX, June 1994. Available
as file://ftp.cs.ucla.edu/pub/ficus/usenix_summer_94_resolver.ps.
- Kuenning94
- Geoffrey H. Kuenning, Gerald J. Popek, and Peter Reiher, "An
Analysis of
Trace Data for Predictive File Caching in Mobile Computing, "USENIX
Conference
Proceedings, pages 183-195. USENIX, June 1994. Available
as file://ftp.cs.ucla.edu/pub/ficus/usenix_summer_94_statistics.ps.gz
- Reiher93b
- P.
Reiher, T. Page, G. Popek, J. Cook, and S. Crocker, "Truffles -
Secure File Sharing With Minimal System Administrator
Intervention," Proceedings
of the 1993 World Conference on System Administration,
Networking, and
Security, April, 1993. Available as file://ftp.cs.ucla.edu/pub/ficus/sans2.ps.gz
- Reiher93a
- P.
Reiher, T. Page, G. Popek, J. Cook, and S. Crocker, "Truffles -
A Secure Service For Widespread File Sharing," Proceedings
of the
Privacy
and Security Research Group Workshop on Network and
Distributed System
Security, February 1993. Available as file://ftp.cs.ucla.edu/pub/ficus/psrg93.ps.gz
- Reiher92
- P.
Reiher, "Experiences With Optimistic Synchronization for
Distributed
Operating Systems," Proceedings of the Third Symposium on
Experiences
with Distributed and Multiprocessor Systems, March 1992.
Available
as Available as tw_experiences.pdf.
- Heidemann92
- John S. Heidemann, Thomas W. Page, Richard G. Guy, and
Gerald J. Popek, "Primarily
Disconnected
Pperation: Experiences with Ficus," Proceedings
of
the Second Workshop on management of Replicated Data. IEEE,
November
1992.
- Heidemann91
- John S. Heidemann, "Stackable
Layers:
an Architecture for File System Development," Technical
Report
CSD-910056, University of California, Los Angeles, July 1991.
Master's
Thesis.
- Page91
- Thomas W. Page, Jr., Richard G. Guy, Gerald J. Popek, John S.
Heidemann,
Wai Mak, and Dieter Rothmeier, "Management
of
Replicated Volume Location Data in the Ficus Replicatd File
System," USENIX Conference Proceedings. USENIX,
June 1991
-
- Popek90
- Gerald J. Popek, Richard G. Guy, Thomas W. Page, Jr., and John
S.
Heidemann, "Replication
in
Ficus Distributed File Systems," Proceedings of the
Workshop
on Management of Replicated Data, pages 20-25. IEEE,
November 1990.
- Guy90
- Richard G. Guy, Thomas W. Page, Jr., John S. Heidemann, and
Gerald J. Popek, "Name
Transparency in Very Large Scale Distributed File Systems,"
Second
IEEE Workshop on Experimental Distributed Systems, October
1990.
- Guy90a
- Richard G. Guy, John S. Heidemann, Wai Mak, Thomas W. Page,
Gerald
J. Popek, and Dieter Rothmeier, "Implementation
of
the Ficus Replicated File System," USENIX Conference
Proceedings,
pages 63-71. USENIX, June 1990