On-Line Papers Published by Peter Reiher
I also have published a number of
papers
that are not yet available on-line. Send me e-mail if you
need copies of any of those.
-
Garip 19b
-
M. T. Garip, J. Lin, P. Reiher, and M. Gerla
"SHIELDNET: An Adaptive Detection Mechanism against Vehicular Botnets in VANETs"
IEEE Vehicular Networking Conference (VNC), December 2019.
Available as VNC_2019.pdf
-
Garip 19a
-
M. T. Garip, P. Reiher, and M. Gerla
"RIoT: A Rapid Exploit Delivery Mechanism against IoT Devices Using Vehicular Botnets"
Vehicular Technlogy Conference (VTC) 2019, September 2019.
Available as VTC_2019.pdf
-
Zhang 19
-
M. Zhang, L. Shi, D. Sisodia, J. Li, and P. Reiher
"On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic,"
2019 IFIP/IEEE International Symposium on Integrated Network Management
(IM 2019), April 2019.
Available as ifip2019.pdf
-
Garip 18
-
M. Garip, P. Reiher, and M. Gerla
"BOTVEILLANCE: A Vehicular Botnet Surveillance Attack Against Pseudonymours Systems in VANETs,"
IFIP Wireless and Mobile Networking Conference, December 2018.
Available as Botveillance.pdf
-
Shi 2018
-
L. Shi, M. Zhang, J. Li, and P. Reiher
"Pathfinder: Capturing DDoS Traffic Footprints on the Internet,"
IFIP Networking 2018, May 2018.
Available as pathfinder.pdf
-
Mirkovic 17
-
J. Mirkovic, E. Kline, and P. Reiher
"RESECT: Self-Learning Traffic Filters for IP Spoofing Defense,"
ACSAC, December 2017.
Available as RESECT.pdf
-
Garip 17
-
M. Garip, P. Kim, P. Reiher, and M. Gerla
"INTERLOC: An Interference-Aware RSSI-Based Localization and Sybil Attack
Detection Mechanism for Vehicular Ad Hoc Networks,"
IEEE CCNC Workshop on Security and Cognitive Informations for Homeland Defense, January 2017.
Available as ccnc_2017.pdf
-
Garip 16
-
M. Garip, P. Reiher, and M. Gerla
"GHOST: Concealing Vehicular Botnet Communication in the VANET Control Channel,"
IWCMC, September 2016.
Available as ghost_2016.pdf
-
Peterson 16
-
P. Peterson and P. Reiher
"Datacomp: Locally Independent Adaptive Compression for Real-World Systems,"
ICDCS, June 2016.
Available as icdcs_2016.pdf
-
Mitchell 15b
-
M. Mitchell, A. Wang, and P. Reiher
"Cashtags: Protecting the Input and Display of Sensitive Data,"
Usenix Security Symposium 2015, August 2015.
Available as cashtags.pdf
-
Mitchell 15a
-
M. Mitchell, R. Patidar, M. Saini, P. Singh, A. Wang, and P. Reiher
"Mobile Usage Patterns and Privacy Implications,"
Permoby 2015, March 2015.
Available as permoby_2015.pdf
-
Garip 15b
-
M. Garip, M. Gursoy, P. Reiher, M. Gerla,
"Congestion Attacks to Autonomous Cars Using Vehicular Botnets,"
NDSS Workshop on Security of Emerging Networking Technologies (SENT), February 2015.
Available as SENT_2015.pdf
-
Garip 15a
-
M. Garip, M. Gursoy, P. Reiher, M. Gerla,
"Scalable Reactive Vehicle-to-Vehicle Congestion Avoidance Mechanism,"
First International Workshop on Vehicular Networking and Intelligent Transportation Systems, January 2015.
Available as VENIT_2015.pdf
-
Pournaghshband 14c
-
Vahab Pournaghshband, S. Hashemzadeh, and Peter Reiher.
"How To Detect Middleboxes: Guidelines on a Methodology,"
Sixth International Conference on Network and Communications Security, December 2014.
Available as NCS14.pdf
-
Pournaghshband 14b
-
Vahab Pournaghshband, D. Meyer, M. Holyland, M. Sarrafzadeh, and Peter Reiher.
"Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices,"
Workshop on Usable Mobile Security, December 2014.
Available as wums14_paper.pdf
-
Pournaghshband 14a
-
Vahab Pournaghshband, Alex Afanaseyev, and Peter Reiher.
"End-to-End Detection of Compression of Traffic Flows by Intermediaries,"
IFIP/IEEE Network Operations and Management Systems, May 2014.
Available as noms14_paper.pdf
-
Cozzette 13
-
Adam Cozzette, Kathryn Lingel, Steve Matsumoto, Oliver Ortlieb, Jandria Alexander, Joseph Betser, Luke Florer, Geoff Kuenning, John Nilles, and Peter Reiher,
"Improving the Security of Android Inter-Component Communication," short paper, IFIP/IEEE International Symposium on Integrated Network Management, May 2013.
Available as inm_13.pdf
-
Nguyen 12
-
Nam Nguyen, Leonard Kleinrock, and Peter Reiher.
"Debugging Ubiquitous Computing Applications With the Interaction Analyzer,"
International Journal on Advances in Software, vol. 5, no. 34, December 2012.
Available as interaction_analyzer_journal.pdf
-
Pournaghshband 12
-
Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher.
"Securing Legacy Mobile Medical Devices,"
Mobihealth 12, November 2012.
Available as mobihealth12.pdf
-
Fujimoto 12
-
Aaron Fujimoto, Peter Peterson, and Peter Reiher.
"Comparing the Power of Full Disk Encryption Alternatives".
2nd Workshop on Energy Consumption and Reliability of Storage Systems, June 2012.
Available as erss_12.pdf
-
Gray 12
-
Michael Gray, Peter Peterson, and Peter Reiher.
"Scaling Down Off-the-Shelf Data Compression: Backwards-Compatible Fine-Grain Mixing".
ICDCS, June 2012.
Available as icdcs_12.pdf
-
Fleming 12
-
Charles Fleming, Peter Peterson, Erik Kline, and Peter Reiher.
"Data Tethers: Preventing Information Leakage by Enforcing Environmental Data Access Policies".
ICC, June 2012.
Available as icc_12_data_tethers.pdf
-
Pournaghshband 12
-
Vahab Pournaghshband, Alex Afanaseyev, Leonard Kleinrock, and Peter Reiher.
"Controlling Applications by Managing Network Characteristics".
ICC, June 2012.
Available as icc_12_dissuade.pdf
-
Nguyen 11
-
Nam Nguyen, Leonard Kleinrock, and Peter Reiher.
"The Interaction Analyzer: A Tool for Debugging Ubiquitous Computing Applications".
Ubicomm, November 2011.
Available as interaction_analyzer_2011.pdf
-
Kline 11
-
Erik Kline, Alex Afanaseyev, and Peter Reiher.
"Shield: DoS Filtering Using Traffic Deflection".
Second International Workshop on Security and Trust in the Future Internet (FIST), October 2011.
Available as shield.pdf
-
Peterson 11
-
Peter Peterson, Digvijay Singh, William Kaiser, and Peter Reiher.
"Investigating Energy and Security Trade-offs in the Classroom With the Atom LEAP Testbed".
Workshop on Computer Security Education and Testbeds, August 2011.
Available as CSET-LEAP-2011.pdf
-
Touch 11
-
Joe Touch, Ilia Baldine, Rudra Dutta, Gregory Finn, Bryan Ford, Scott Jordan,
Dan Massey, Abraham Matta, Christos Papadopoulos, Peter Reiher, and George Rouskas.
"A Dynamic Recursive Unified Internet Design (DRUID)".
Computer Networks, April 2011.
Available as druid.pdf
-
Peterson 10
-
Peter Peterson and Peter Reiher.
"Security Exercises for the Online Classroom With DETER".
Workshop on Computer Security Education and Testbeds, August 2010.
Available as cset-paper-2010rad.pdf
-
Afanaseyev 10
-
Alex Afanaseyev, Neil Tilley, Peter Reiher, and Leonard Kleinrock.
"Host-To-Host Congestion Control for TCP".
IEEE Communications Surveys and Tutorials, Vol. 12, No. 3, Third Quarter 2010.
Available as TCP-congestion-control.pdf
-
Kline 09b
-
Erik Kline, Matthew Beaumont-Gay, Jelena Mirkovic, and Peter Reiher.
"RAD: Reflector Attack Defense Using Message Authentication Codes".
Annual Computer Security Applications Conference (ACSAC), December 2009. Available as
acsac_2009.pdf.
-
Kline 09a
-
Erik Kline and Peter Reiher.
"Securing Data Through Avoidance Routing".
New Security Paradigms Workshop, September 2009.
Available as nspw09.pdf
-
Mirkovic 09b
-
Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter Reiher, and Roshan Thomas.
"Accurately Measuring Denial of Service in Simulation and Testbed Experiments".
IEEE Transactions on Dependable and Secure Computing, Vol. 6, No. 2, April-June 2009.
Available as TDSC-2008-04-0069.pdf
-
Ramakrishna 09
-
Venkata Ramakrishna, Peter Reiher, and Leonard Kleinrock.
"Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments".
PerCom 2009, March 2009.
Available as Percom_2009_Distributed_Policy_Resolution.pdf.
-
-
Mirkovic 09a
-
Jelena Mirkovic, Sonia Fahmy, Peter Reiher, and Roshan Thomas.
"How to Test DoS Defenses".
Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH09), March 2009.
Available as catch-ddos-2009.pdf.
-
Mirkovic 08b
-
Jelena Mirkovic and Peter Reiher.
"Building Accountability Into the Future Internet".
Network Protocol Security Workshop, October 2008.
Available as npsec_2008.pdf.
-
Eustice 08b
-
Kevin Eustice, Amir Jourabchi, Jason Stoops, and Peter Reiher.
"Improving User Satisfaction in a Ubiquitous Computing Environment".
Workshop on Social Aspects of Ubiquitous Computing Environments, October 2008.
Available as SAUCE_2008.pdf.
-
DaSilva 08
-
Timothy Da Silva, Kevin Eustice, and Peter Reiher.
"Johnny Appleseed: Wardriving to Reduce Interference in Chaotic Wireless Deployments".
MSWIM 2008, October 2008.
Available as Johnny_Appleseed.pdf.
-
Mirkovic 08a
-
Jelena Mirkovic, Peter Reiher, Christos Papadopoulos, Alefiya Hussain, Marla
Shepard, Michael Berg, and Robert Jung.
"Testing a Collaborative DDoS Defense in a Red Team/Blue Team Exercise".
IEEE Transactions on Computers, Vol. 57, No. 7., July 2008.
Available as acm_transactions_2008.pdf.
-
Eustice 08a
-
Kevin Eustice, V. Ramakrishna, Nam Nguyen, and Peter Reiher.
"The Smart Party: A Personalized Location-aware Multimedia Experience".
Consumer Communications and Networking Conference (CCNC) 2008, January 2008.
Available as
Smart_Party_CCNC_2008.pdf.
-
Li 07
-
Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter Reiher, and Lixia
Zhang. "Learning the Valid Incoming Direction of IP Packets".
Computer Networks. (52).
October 2007, pp 399-417.
Available as
save2006.pdf.
-
Beaumont-Gay 07
-
Matthew Beaumont-Gay, Kevin Eustice, V. Ramakrishna, and
Peter Reiher. "Information Protection Via Environmental Data Tethers".
New Security Paradigms Workshop.
September 2007.
Available as
data-tethers-nspw.pdf.
-
Wang 07
-
An-I (Andy) Wang, Geoff Kuenning, and Peter Reiher.
"Using Permuted States and Validated Simulation to Analyze Conflict Rates in
Optimistic Replication".
Simulation: Transactions of the Society for Modeling and Simulation International, Vol. 83, No. 8,
August 2007.
Available as simulation_2007.pdf.
-
Eustice 07
-
Kevin Eustice, V. Ramakrishna, Alison Walker, Matthew Schnaider, Nam Nguyen, and
Peter Reiher. "nan0sphere: Location-Driven Fiction for Groups of Users",
Proceedings of the 12th International Conference on Human-Computer Interactions,
July 2007.
Available as
hcii2007.pdf.
-
Mirkovic 07c
-
Jelena Mirkovic, B. Wilson, Alifiya Hussain, Sonia Fahmy, Peter Reiher,
Roshan Thomas, and Steven Schwab. "Automating DDoS Experimentation", Deter
Community Workshop on Cyber Security Experimentation and Test, July 2007.
Available as
deter.pdf.
-
Mirkovic 07b
-
Jelena Mirkovic, A. Hussain, B. Wilson,, Sonia Fahmy, Peter Reiher,
Roshan Thomas, W. Yao, and Steven Schwab. "Towards User-Centric Metrics for
Denial-of Service Measurement", Workshop on Experimental Computer Science, June 2007.
Available as
a8-mirkovic.pdf.
-
Weddle 07b
-
Charles Weddle, Mathew Oldham, Jin Qian, An-I Andy Wang, Peter Reiher, Geoff Kuenning. PARAID: A Gear-Shifting Power-Aware RAID. ACM Transactions on Storage (TOS), 3(3), October 2007 (invited). Available as "tos2007.pdf.
-
Ramakrishna 07
-
V. Ramakrishna, Kevin Eustice, and Peter Reiher. "Negotiating Agreements
Using Policies in Ubiquitous Computing Scenarios", IEEE International Conference
on Service-Oriented Computing and Applications (SOCA), June 2007.
Available as
soca2007.pdf.
-
Mirkovic 07a
-
Jelena Mirkovic, Sonia Fahmy, Roshan Thomas, S. Wei, Peter. Reiher, Alyfia Hussain, B. Wilson, Steven Schwab, and R. Chertov.
"DDoS Benchmarks and Experimentation Workbench for the DETER Testbed",
Tridentcom, May 2007.
Available as
tric.pdf.
-
Weddle 07a
-
Charles Weddle, Mathew Oldham, Jin Qian, An-I Andy Wang, Peter Reiher, Geoff Kuenning. "PARAID: A Gear-Shifting Power-Aware RAID". Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST), February 2007.
Available as
fast2007.pdf.
-
Wang 06
-
An-I Andy Wang, Geoff Kuenning, Peter Reiher, and Gerald Popek. "The Conquest File System: Better Performance Through a Disk/Persistent-RAM Hybrid Design". ACM Transactions on Storage, 2(3), pp. 1-40, August 2006.
Available as
tos2006.pdf.
-
Oikonomou 06
-
George Oikonomou, Peter Reiher, Max Robinson, and Jelena Mirkovic, "A Framework
for A Collaborative DDoS Defense,"
2006 Annual Computer Security Applications Conference (ACSAC 22), December 2006.
Available as
defcom.pdf.
-
Mirkovic 06b
-
Jelena Mirkovic, E. Arikan, S. Wei, Sonia Fahmy, Roshan Thomas, and Peter Reiher,
"Benchmarks for DDoS Defense Evaluation,"
Proceedings of the Milcom 2006, October 2006.
Available as
milcom06.pdf.
-
Mirkovic 06a
-
Jelena Mirkovic, Peter Reiher, Sonia Fahmy, Roshan Thomas, Alifia Hussein, Steven Schwab, and Calvin Ko,
"Measuring Denial-of-Service,"
Proceedings of 2006 Quality of Protection Workshop, October 2006.
Available as
qop.pdf.
-
Ramakrishna 06
-
Venkata Ramakrishna, Max Robinson, Kevin Eustice, and Peter Reiher,
"An Active Self-Optimizing Multiplayer Gaming Architecture,"
Cluster Computing, Vol. 9, No. 6, April 2006, pp 201-215.
Available as
cluster_computing.pdf.
-
Mirkovic 05
-
Jelena Mirkovic and Peter Reiher, "D-WARD: A Source-End Defense Against Flooding
Denial-of-Service Attacks,"
IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 3, September
2005, pp. 216-232.
Available as
tdsc_2005.pdf.
-
Wang 05
-
An-I Andy Wang, Geoff Kuenning, and Peter Reiher, "Using Permuted States and
Validated Simulation to Analyze Conflict Rates in Optimistic Replication,"
2005 International Symposium on Performance Evaluation of Computer and
Telecommunications Systems (SPECTS), July 2005.
Available as spects_2005.html.
-
Jun 05
-
Jun Li, Toby Ehrenkranz, Geoff Kuenning, and Peter Reiher, "Simulation and
Analysis on the Resiliency and Efficiency of Malnets," Symposium on Measurement,
Modeling, and Simulation of Malware, June 2005.
Available as malnet_sim.pdf.
-
Anderson 05
-
Everett Anderson, Kevin Eustice, Shane Markstrum, Mark Hanson, and
Peter Reiher, "Mobile Contagion: SImulation of Infection and
Disease," Symposium on Measurement, Modeling, and Simulation of
Malware, June 2005.
Available as mobile_worm.pdf.
- Dunham 04
-
Margaret Dunham, Birgitta Koenig-Reis, Evaggelia Pitoura, Peter Reiher, and Can Turker, "Mobile Information Management: Executive Summary," Dagstuhul Seminar
Proceedings, October, 2004.
Available as 04441.SWM7.Paper.257.pdf
-
Ratner 04
-
David Ratner, Peter Reiher, and Gerald Popek, "ROAM: A Scalable
Replication System for Mobility," ACM/Kluwer Mobile Applications
and Networks (MONET), Vol.9, No. 5, October 2004, pp. 537-544.
Available as roam_monet.pdf.
-
Mirkovic 04
-
Jelena Mirkovic and Peter Reiher, "A Taxonomy of DDoS Attacks and
DDoS Defense Mechanisms," Computer Communications Review,
Vol. 34, No. 2, April 2004.
Available as ccr.pdf.
-
Nguyen 04
-
N. Nguyen, A. Wang, G. Kuenning, and P. Reiher, "Electric Field
Routing: A Reliable Framework for Routing in MANETs,"
ACM Mobile Computing and Communications Review (MC2R),
Vol. 8, No. 2, April 2004, pp. 35-49.
Available as efr_mc2r.ps.
-
Li 04
-
Jun Li, Gerald Popek, and Peter Reiher, "Resilient Self-Organizing
Overlay Networks for Security Update Delivery,"
IEEE Journal on Selected Areas in Communications,
Special Issue on Service Overlay Networks, Vol. 22, No. 1, January
2004.
Available as revere_jsac.pdf.
-
Rudenko 04
-
Alexey Rudenko and Peter Reiher, "Adaptation Planning for Unicast
Communications in Active Networks," IWAN 2003, December 2003.
Available as iwan.pdf.
-
Mirkovic 03b
-
Jelena Mirkovic, Max Robinson, and Peter Reiher, "Alliance Formation
For DDoS Defense" New Security Paradigms Workshop, August 2003.
Available as defcom-nspw.pdf.
-
Eustice 03b
-
Kevin Eustice, V. Ramakrishna, Shane Markstrum, Peter Reiher, and
Gerald Popek, "WiFi Nomads and Their Unprotected Devices: The
Case for QED-Quarantine, Examination, and Decontamination,"
New Security Paradigms Workshop, August 2003.
Available as qed.pdf.
-
Wang 03
-
Wang, A., Kuenning, G,, Reiher, P., and Popek, G., "The Effects of Memory-Rich
Environments on File System Microbenchmarks," SPECTS, July 2003.
Available as spects03.pdf.
-
Eustice 03a
-
Eustice, K., Kleinrock, L., Markstrum, S., Popek, G., Ramakrishna, V.,
and Reiher, P., "Enabling Secure Ubiquitous Interactions,"
1st International Workshop on Middleware for Pervasive
Ad-Hoc Computing, 2003. Available as IWMPAC03.pdf.
-
Nguyen 03
-
Nguyen, N., Kuenning, G., and Reiher, P., "Detecting Insider Threats
by Monitoring System Call Activity," IEEE Information Assurance Workshop, 2003.
Available as insider.pdf.
-
Ramakrishna 03
-
Ramakrishna, V. Robinson, M., Eustice, K., and Reiher, P.,
"An Active Self-Optimizing Multiplayer Gaming Architecture,"
Adaptive Middleware Systems, June 2003. Available as ams03.pdf.
-
Mirkovic 03a
-
Jelena Mirkovic, Gregory Prier, and Peter Reiher, "Challenges of Source-End DDoS Defense,"
IEEE International Symposium on Network Computing and Applications , April
2003, Available as nca03.pdf.
- Mirkovic 02
- Jelena Mirkovic, Greg Prier, and Peter Reiher
"Attacking DDoS at the Source,"
ICNP, November 2002,
Available as dward.ps.
- Burns 02
- Michael Burns, Greg Prier, Jelena Mirkovic, and Peter Reiher
"Implementing Address Assurance in the Intel IXP Router,"
Western Network Processors Conference, October 2002,
Available as npc_paper.pdf.
- Kuenning 02
- Geoff Kuenning, Wilkie Ma, Peter Reiher, and Gerald Popek,
"Simplifying Automated Hoarding Methods,"
MSWiM 2002, September 2002,
Available as mswim.ps.
- Wang 02b
- An-I Wang, Peter Reiher, Rajive Bagrodia, Geoffrey Kuenning
"Understanding the Behavior of the Conflict-Rate Metric in Optimistic Peer
Replication,"
5th IEEE Workshop on Mobility in Database and Distributed Systems, September 2002,
Available as mdds2002.pdf.
- Li 02c
- Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, and Lixia Zhang,
"SAVE: Source Address Validity Enforcement Protocol,"
Infocom 2002, July 2002,
Available as infocom02.pdf.
- Wang 02a
- An-I Wang, Peter Reiher, Gerald Popek, and Geoffrey Kuenning,
"Conquest: Better Performance Through a Disk/RAM Hybrid File System,"
Usenix 2002, June 2002,
Available as usenix2002.ps.
- Ferreria 02
- Vincent Ferreria, Alexey Rudenko, Kevin Eustice, Richard Guy, V. Ramakrishna, and Peter Reiher,
"Panda: Middleware to Provide the Benefits of Active Networks to Legacy Applications,"
DANCE 02 , May 2002,
Available as panda.pdf.
- Li 02b
- Jun Li, Peter Reiher, Gerald Popek, Mark Yarvis, and Geoffrey Kuenning,
"An Approach to Measuring Large-Scale Distributed Systems,"
Testcom 02, March 2002,
Available as testcom02.pdf.
- Li 02a
- Jun Li, Mark Yarvis, and Peter Reiher,
"Securing Distributed Adaptation,"
Computer Networks, Vol. 38, No. 3, January 2002,
Available as sda.pdf.
- Ratner 01
- David Ratner, Peter Reiher, Gerald Popek, and Geoffrey Kuenning,
"Application Requirements for Mobile Computing,"
Mobile Networks and Applications, Vol. 6, No. 6, November 2001,
Available as replreq.ps.
- Michel 01b
- B. Scott Michel and Peter Reiher,
"Peer-to-Peer Internetworking,"
Opensig 2001, September 2001,
Available as Opensig.ps.
- Michel 01a
- B. Scott Michel and Peter Reiher
"Peer-Through-Peer Communication for Information Logistics,"
Mobile Internet-based Services and Information Logistics Workshop, September 2001,
Available as MISIL.ps.
- Reiher 01
- Peter Reiher, Kevin Eustice, and Kai-Min Sung,
"Adapting Encrypted Data Streams in Open Architectures,"
Adaptive Middleware Workshop, August 2001,
Available as AMSW.ps.
- Li 01
- Jun. Li, Mark Yarvis, Peter Reiher,
"Securing Distributed Adaptation,"
OpenArch01,
Available as Security_OpenArch01.ps.
- Ekenstam 01
- Todd Ekenstam, Peter Reiher, Charles Matheny, and Gerald Popek,
"The Bengal Database Replication System,"
the Journal of Distributed and Parallel Databases, Vol. 9, No. 3,
May 2001,
Available as bengal.ps.
- Badrinath00
- B. Badrinath, Armando Fox, Leonard Kleinrock, Gerald Popek, Peter
Reiher, and M. Satyanarayanan,
"A Conceptual Framework for Network and Client Adaptation,"
Mobile Networks and Applications, Vol. 5, No. 4, 2000.
Available as adaptation.ps.
- Reiher00
- Peter Reiher, Richard Guy, Mark Yarvis, and Alexey Rudenko,
"Automated Planning for Open Architectures,"
Openarch 00, short paper session, March 2000.
Available as planning.pdf.
- Yarvis00
- Mark Yarvis, Peter Reiher, and Gerald J. Popek,
"A Reliability Model for Distributed Adaptation,"
Openarch 00, March 2000.
Available as reliability.ps.
- Michel00
- Scott Michel, Peter Reiher, Constatin Nikolodakis, and Lixia Zhang,
"URL Forwarding and Compression in Adaptive Web Caching,"
Infocom 2000, March 2000.
Available as awc.ps.
- Li99
- Li Jun, Peter Reiher, and Gerald Popek, "Securing Information Transmission
by Redundancy,
the New Security Paradigms Workshop , September, 1999.
Available as redundancy.ps.
- Ratner99
- David Ratner, Peter Reiher, and Gerald Popek, "Roam: A Scalable
Replication System for Mobile Computing",
Workshop on Mobile Databases and Distributed Systems (MDDS),
September, 1999.
Available as roam.ps
- Tsai99c
-
Mitchell Tsai, Peter Reiher, and Gerald Popek, "Baby Steps From GUI Towards
Dialogue: Mixed Intiative Computerese", AAAI'99 Workshop on
Mixed Initiative Intelligence, July 1999.
Available as AAAI.context.doc
- Tsai99b
-
Mitchell Tsai, Peter Reiher, and Gerald Popek, "Operating System Services for
Managing Context", AAAI'99 Workshop on Reasoning in
Context for AI Applications`, July 1999.
Available as AAAI.context.doc
- Tsai99a
-
Mitchell Tsai, Peter Reiher, and Gerald Popek, "Command Management System
for Next-Generation User Input",
Seventh Workshop on Hot Topics in Operating Systems (HotOS), March 1999.
Available as HotOS2.ps
- Yarvis99
-
Mark Yarvis, Peter Reiher, and Gerald Popek, "A Framework for Distributed
Adaptation",
Seventh Workshop on Hot Topics in Operating Systems (HotOS), March 1999.
Available as HotOS1.ps
- Rudenko99
-
Alexey Rudenko, Peter Reiher, Gerald Popek, and Geoff Kuenning, "Portable Computer
Battery Power Saving Using a Remote Processing Framework",
Mobile Computing Systems and Application Track of the
ACM SAC, February 1999.
Available as SAC.ps
- Wang99
-
An-I Wang, Peter Reiher, Rajive Bagrodia, and Gerald Popek, "A Simulation
Evaluation of Optimistic Replicated Filing in a Mobile Environment",
18th IEEE International Performance, Computing, and Communications
Conference,
February, 1999.
Available as IPCCC.pdf
- Guy98
-
Richard Guy, Peter Reiher, David Ratner, Michial Gunter, Wilkie Ma, and Gerald
Popek, "Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication",
Workshop on Mobile Data Access, November 1998.
Available as rumor.ps.
- Rudenko98
-
Alexey Rudenko, Peter Reiher, Gerald Popek, and Geoff Kuenning, "Saving Portable
Computer Battery Power through Remote Process Execution",
ACM Mobile Computing and Communication Review (MC2R),
Vol. 2, No. 1, 1998.
Available as power.pdf.
- Kuenning98
-
Geoff Kuenning, Rajive Bagrodia, Richard Guy, Gerald Popek, Peter Reiher, and
An-I Wang, "Measuring the Quality of Service of Optimistic Replication",
ECOOP '98 Workshop on Mobility and Replication,
July, 1998.
Available as replqos.ps.
- Page98
-
Thomas Page, Richard Guy, John Heidemann, David Ratner, Peter Reiher, Ashvin Goel, Geoff Kuenning and Gerald Popek, "Perspectives on Optimistically Replicated, Peer-To-Peer Filing,” Software—Practice and Experience, Vol. 28, No. 2, February 1998.
Available as perspectives.pdf.
- Ratner97
-
David Ratner, Peter Reiher, and Gerald Popek, "Replication Requirements in Mobile
Environments", Proceedings of the Dial M for Mobility Workshop,
Oct. 1997.
Available as wards.pdf
- Kuenning97
-
Geoff Kuenning, Peter Reiher, and Gerald Popek, "Experience with an Automated
Hoarding System", Personal Technologies, Sept. 1997.
Available as seerres.ps.
- Ratner96
-
David Ratner, Gerald Popek, and Peter Reiher,
"The Ward Model: A Scalable Replication Architecture for Mobility",
Workshop on Object Replication and Mobile Computing, October 1996.
Available as ormc96.ps.
- Reiher96
-
Peter Reiher, Gerald Popek, Michial Gunter, John Salomone, David Ratner,
"Peer-to-Peer Reconciliation Based Replication for Mobile Computers".
European Conference on Object Oriented Programming '96 Second
Workshop on Mobility and Replication, ,
June 1996. Available as
ecoop.ps
- Reiher94
-
Peter Reiher, John S. Heidemann, David Ratner, Gregory Skinner, and Gerald J.
Popek.
"Resolving file conflicts in the Ficus file system".
In USENIX Conference Proceedings, pages 183-195. USENIX,
June 1994. Available as
ftp://ftp.cs.ucla.edu/pub/ficus/usenix_summer_94_resolver.ps.gz
- Kuenning94
-
Geoffrey H. Kuenning, Gerald J. Popek, and Peter Reiher.
"An Analysis of Trace Data for Predictive File Caching in Mobile Computing".
In USENIX Conference Proceedings, pages 183-195. USENIX,
June 1994. Available as
ftp://ftp.cs.ucla.edu/pub/ficus/usenix_summer_94_statistics.ps.gz
- Reiher93b
-
Reiher, P., Page, T., Popek, G., Cook, J., and
Crocker, S., "Truffles - Secure File Sharing With
Minimal System Administrator Intervention",
Proceedings of the 1993 World Conference on System
Administration, Networking, and Security, April,
1993. Available as
http://lasr.cs.ucla.edu/reiher/papers/sans2.ps
- Reiher93a
-
Reiher, P., Page, T., Popek, G., Cook, J., and
Crocker, S., "Truffles - A Secure Service For
Widespread File Sharing", Proceedings of the Privacy
and Security Research Group Workshop on Network and
Distributed System Security, February, 1993. Available as
http://lasr.cs.ucla.edu/reiher/papers/psrg93.ps
- Reiher92
-
Reiher, P., "Experiences With Optimistic Synchronization for Distributed
Operating Systems", Proceedings of the Third Symposium on Experiences
with Distributed and Multiprocessor Systems, March 1992. Available
as
Available as tw_experiences.pdf.
- Reiher91c
-
Reiher, P. and Jefferson, D., "Supercritical Speedup",
roceedings of the 24th Annual Simulation Symposium,
April, 1991. Available as
supercrit.pdf.
- Reiher91b
-
Reiher, P., Bellenot, S., and Jefferson, D., Debugging the Time Warp Operating
System and Its Applications, Proceedings of the Symposium on Experiences
with Distributed and Multiprocessor Systems II, March 1991. Available as
ftp://ftp.cs.ucla.edu/pub/ficus/reiher/tw.papers/tw_debug.ps.gz
- Reiher91a
-
Reiher, P., Bellenot, S., and Jefferson, D., Temporal Decomposition of
Simulations Under the Time Warp Operating System, Proceedings of the 1991
Principles of Distributed Simulation Conference, January 1991. Available
as
ftp://ftp.cs.ucla.edu/pub/ficus/reiher/tw.papers/tw_temporal_decomp.ps.gz
- Presley90
-
Presley, M., Reiher, P., and Bellenot, S., A Time
Warp Implementation of Sharks World, Proceedings of
the 1990 Winter Simulation Conference, December 1990. Available as
ftp://ftp.cs.ucla.edu/pub/ficus/reiher/tw.papers/shark.ps.gz
- Reiher90c
-
Reiher, P. and Jefferson, D., Virtual Time Based
Dynamic Load Management in the Time Warp Operating
System, Transactions of the Society for Computer
Simulation, Vol. 7, #2, June 1990. Available as
ftp://ftp.cs.ucla.edu/pub/ficus/reiher/tw.papers/dlm.ps.gz
- Reiher90b
-
Reiher, P., Parallel Simulation Using the Time Warp Operating System,
Proceedings of the 1990 Winter Simulation Conference, December 1990.
Available as
ftp://ftp.cs.ucla.edu/pub/ficus/reiher/tw.papers/tw_tutorial.ps.gz
- Reiher90a
-
Reiher, P., Wieland, F., and Hontalas, P., Providing Determinism in the Time
Warp Operating System - Costs, Benefits, and Implications, Proceedings
of the IEEE Workshop on Experimental Distributed Systems, October 1990.
Available as
ftp://ftp.cs.ucla.edu/pub/ficus/reiher/tw.papers/tw_determ.ps.gz
reiher@cs.ucla.edu
Last modified: Monday June 17 2019