On-Line Papers Published by Peter Reiher

I also have published a number of papers that are not yet available on-line. Send me e-mail if you need copies of any of those.
Garip 19b
M. T. Garip, J. Lin, P. Reiher, and M. Gerla "SHIELDNET: An Adaptive Detection Mechanism against Vehicular Botnets in VANETs" IEEE Vehicular Networking Conference (VNC), December 2019. Available as VNC_2019.pdf
Garip 19a
M. T. Garip, P. Reiher, and M. Gerla "RIoT: A Rapid Exploit Delivery Mechanism against IoT Devices Using Vehicular Botnets" Vehicular Technlogy Conference (VTC) 2019, September 2019. Available as VTC_2019.pdf
Zhang 19
M. Zhang, L. Shi, D. Sisodia, J. Li, and P. Reiher "On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic," 2019 IFIP/IEEE International Symposium on Integrated Network Management (IM 2019), April 2019. Available as ifip2019.pdf
Garip 18
M. Garip, P. Reiher, and M. Gerla "BOTVEILLANCE: A Vehicular Botnet Surveillance Attack Against Pseudonymours Systems in VANETs," IFIP Wireless and Mobile Networking Conference, December 2018. Available as Botveillance.pdf
Shi 2018
L. Shi, M. Zhang, J. Li, and P. Reiher "Pathfinder: Capturing DDoS Traffic Footprints on the Internet," IFIP Networking 2018, May 2018. Available as pathfinder.pdf
Mirkovic 17
J. Mirkovic, E. Kline, and P. Reiher "RESECT: Self-Learning Traffic Filters for IP Spoofing Defense," ACSAC, December 2017. Available as RESECT.pdf
Garip 17
M. Garip, P. Kim, P. Reiher, and M. Gerla "INTERLOC: An Interference-Aware RSSI-Based Localization and Sybil Attack Detection Mechanism for Vehicular Ad Hoc Networks," IEEE CCNC Workshop on Security and Cognitive Informations for Homeland Defense, January 2017. Available as ccnc_2017.pdf
Garip 16
M. Garip, P. Reiher, and M. Gerla "GHOST: Concealing Vehicular Botnet Communication in the VANET Control Channel," IWCMC, September 2016. Available as ghost_2016.pdf
Peterson 16
P. Peterson and P. Reiher "Datacomp: Locally Independent Adaptive Compression for Real-World Systems," ICDCS, June 2016. Available as icdcs_2016.pdf
Mitchell 15b
M. Mitchell, A. Wang, and P. Reiher "Cashtags: Protecting the Input and Display of Sensitive Data," Usenix Security Symposium 2015, August 2015. Available as cashtags.pdf
Mitchell 15a
M. Mitchell, R. Patidar, M. Saini, P. Singh, A. Wang, and P. Reiher "Mobile Usage Patterns and Privacy Implications," Permoby 2015, March 2015. Available as permoby_2015.pdf
Garip 15b
M. Garip, M. Gursoy, P. Reiher, M. Gerla, "Congestion Attacks to Autonomous Cars Using Vehicular Botnets," NDSS Workshop on Security of Emerging Networking Technologies (SENT), February 2015. Available as SENT_2015.pdf
Garip 15a
M. Garip, M. Gursoy, P. Reiher, M. Gerla, "Scalable Reactive Vehicle-to-Vehicle Congestion Avoidance Mechanism," First International Workshop on Vehicular Networking and Intelligent Transportation Systems, January 2015. Available as VENIT_2015.pdf
Pournaghshband 14c
Vahab Pournaghshband, S. Hashemzadeh, and Peter Reiher. "How To Detect Middleboxes: Guidelines on a Methodology," Sixth International Conference on Network and Communications Security, December 2014. Available as NCS14.pdf
Pournaghshband 14b
Vahab Pournaghshband, D. Meyer, M. Holyland, M. Sarrafzadeh, and Peter Reiher. "Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices," Workshop on Usable Mobile Security, December 2014. Available as wums14_paper.pdf
Pournaghshband 14a
Vahab Pournaghshband, Alex Afanaseyev, and Peter Reiher. "End-to-End Detection of Compression of Traffic Flows by Intermediaries," IFIP/IEEE Network Operations and Management Systems, May 2014. Available as noms14_paper.pdf
Cozzette 13
Adam Cozzette, Kathryn Lingel, Steve Matsumoto, Oliver Ortlieb, Jandria Alexander, Joseph Betser, Luke Florer, Geoff Kuenning, John Nilles, and Peter Reiher, "Improving the Security of Android Inter-Component Communication," short paper, IFIP/IEEE International Symposium on Integrated Network Management, May 2013. Available as inm_13.pdf
Nguyen 12
Nam Nguyen, Leonard Kleinrock, and Peter Reiher. "Debugging Ubiquitous Computing Applications With the Interaction Analyzer," International Journal on Advances in Software, vol. 5, no. 34, December 2012. Available as interaction_analyzer_journal.pdf
Pournaghshband 12
Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher. "Securing Legacy Mobile Medical Devices," Mobihealth 12, November 2012. Available as mobihealth12.pdf
Fujimoto 12
Aaron Fujimoto, Peter Peterson, and Peter Reiher. "Comparing the Power of Full Disk Encryption Alternatives". 2nd Workshop on Energy Consumption and Reliability of Storage Systems, June 2012. Available as erss_12.pdf
Gray 12
Michael Gray, Peter Peterson, and Peter Reiher. "Scaling Down Off-the-Shelf Data Compression: Backwards-Compatible Fine-Grain Mixing". ICDCS, June 2012. Available as icdcs_12.pdf
Fleming 12
Charles Fleming, Peter Peterson, Erik Kline, and Peter Reiher. "Data Tethers: Preventing Information Leakage by Enforcing Environmental Data Access Policies". ICC, June 2012. Available as icc_12_data_tethers.pdf
Pournaghshband 12
Vahab Pournaghshband, Alex Afanaseyev, Leonard Kleinrock, and Peter Reiher. "Controlling Applications by Managing Network Characteristics". ICC, June 2012. Available as icc_12_dissuade.pdf
Nguyen 11
Nam Nguyen, Leonard Kleinrock, and Peter Reiher. "The Interaction Analyzer: A Tool for Debugging Ubiquitous Computing Applications". Ubicomm, November 2011. Available as interaction_analyzer_2011.pdf
Kline 11
Erik Kline, Alex Afanaseyev, and Peter Reiher. "Shield: DoS Filtering Using Traffic Deflection". Second International Workshop on Security and Trust in the Future Internet (FIST), October 2011. Available as shield.pdf
Peterson 11
Peter Peterson, Digvijay Singh, William Kaiser, and Peter Reiher. "Investigating Energy and Security Trade-offs in the Classroom With the Atom LEAP Testbed". Workshop on Computer Security Education and Testbeds, August 2011. Available as CSET-LEAP-2011.pdf
Touch 11
Joe Touch, Ilia Baldine, Rudra Dutta, Gregory Finn, Bryan Ford, Scott Jordan, Dan Massey, Abraham Matta, Christos Papadopoulos, Peter Reiher, and George Rouskas. "A Dynamic Recursive Unified Internet Design (DRUID)". Computer Networks, April 2011. Available as druid.pdf
Peterson 10
Peter Peterson and Peter Reiher. "Security Exercises for the Online Classroom With DETER". Workshop on Computer Security Education and Testbeds, August 2010. Available as cset-paper-2010rad.pdf
Afanaseyev 10
Alex Afanaseyev, Neil Tilley, Peter Reiher, and Leonard Kleinrock. "Host-To-Host Congestion Control for TCP". IEEE Communications Surveys and Tutorials, Vol. 12, No. 3, Third Quarter 2010. Available as TCP-congestion-control.pdf
Kline 09b
Erik Kline, Matthew Beaumont-Gay, Jelena Mirkovic, and Peter Reiher. "RAD: Reflector Attack Defense Using Message Authentication Codes". Annual Computer Security Applications Conference (ACSAC), December 2009. Available as acsac_2009.pdf.
Kline 09a
Erik Kline and Peter Reiher. "Securing Data Through Avoidance Routing". New Security Paradigms Workshop, September 2009. Available as nspw09.pdf
Mirkovic 09b
Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter Reiher, and Roshan Thomas. "Accurately Measuring Denial of Service in Simulation and Testbed Experiments". IEEE Transactions on Dependable and Secure Computing, Vol. 6, No. 2, April-June 2009. Available as TDSC-2008-04-0069.pdf
Ramakrishna 09
Venkata Ramakrishna, Peter Reiher, and Leonard Kleinrock. "Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments". PerCom 2009, March 2009. Available as Percom_2009_Distributed_Policy_Resolution.pdf.
Mirkovic 09a
Jelena Mirkovic, Sonia Fahmy, Peter Reiher, and Roshan Thomas. "How to Test DoS Defenses". Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH09), March 2009. Available as catch-ddos-2009.pdf.
Mirkovic 08b
Jelena Mirkovic and Peter Reiher. "Building Accountability Into the Future Internet". Network Protocol Security Workshop, October 2008. Available as npsec_2008.pdf.
Eustice 08b
Kevin Eustice, Amir Jourabchi, Jason Stoops, and Peter Reiher. "Improving User Satisfaction in a Ubiquitous Computing Environment". Workshop on Social Aspects of Ubiquitous Computing Environments, October 2008. Available as SAUCE_2008.pdf.
DaSilva 08
Timothy Da Silva, Kevin Eustice, and Peter Reiher. "Johnny Appleseed: Wardriving to Reduce Interference in Chaotic Wireless Deployments". MSWIM 2008, October 2008. Available as Johnny_Appleseed.pdf.
Mirkovic 08a
Jelena Mirkovic, Peter Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, Michael Berg, and Robert Jung. "Testing a Collaborative DDoS Defense in a Red Team/Blue Team Exercise". IEEE Transactions on Computers, Vol. 57, No. 7., July 2008. Available as acm_transactions_2008.pdf.
Eustice 08a
Kevin Eustice, V. Ramakrishna, Nam Nguyen, and Peter Reiher. "The Smart Party: A Personalized Location-aware Multimedia Experience". Consumer Communications and Networking Conference (CCNC) 2008, January 2008. Available as Smart_Party_CCNC_2008.pdf.
Li 07
Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter Reiher, and Lixia Zhang. "Learning the Valid Incoming Direction of IP Packets". Computer Networks. (52). October 2007, pp 399-417. Available as save2006.pdf.
Beaumont-Gay 07
Matthew Beaumont-Gay, Kevin Eustice, V. Ramakrishna, and Peter Reiher. "Information Protection Via Environmental Data Tethers". New Security Paradigms Workshop. September 2007. Available as data-tethers-nspw.pdf.
Wang 07
An-I (Andy) Wang, Geoff Kuenning, and Peter Reiher. "Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication". Simulation: Transactions of the Society for Modeling and Simulation International, Vol. 83, No. 8, August 2007. Available as simulation_2007.pdf.
Eustice 07
Kevin Eustice, V. Ramakrishna, Alison Walker, Matthew Schnaider, Nam Nguyen, and Peter Reiher. "nan0sphere: Location-Driven Fiction for Groups of Users", Proceedings of the 12th International Conference on Human-Computer Interactions, July 2007. Available as hcii2007.pdf.
Mirkovic 07c
Jelena Mirkovic, B. Wilson, Alifiya Hussain, Sonia Fahmy, Peter Reiher, Roshan Thomas, and Steven Schwab. "Automating DDoS Experimentation", Deter Community Workshop on Cyber Security Experimentation and Test, July 2007. Available as deter.pdf.
Mirkovic 07b
Jelena Mirkovic, A. Hussain, B. Wilson,, Sonia Fahmy, Peter Reiher, Roshan Thomas, W. Yao, and Steven Schwab. "Towards User-Centric Metrics for Denial-of Service Measurement", Workshop on Experimental Computer Science, June 2007. Available as a8-mirkovic.pdf.
Weddle 07b
Charles Weddle, Mathew Oldham, Jin Qian, An-I Andy Wang, Peter Reiher, Geoff Kuenning. PARAID: A Gear-Shifting Power-Aware RAID. ACM Transactions on Storage (TOS), 3(3), October 2007 (invited). Available as "tos2007.pdf.
Ramakrishna 07
V. Ramakrishna, Kevin Eustice, and Peter Reiher. "Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios", IEEE International Conference on Service-Oriented Computing and Applications (SOCA), June 2007. Available as soca2007.pdf.
Mirkovic 07a
Jelena Mirkovic, Sonia Fahmy, Roshan Thomas, S. Wei, Peter. Reiher, Alyfia Hussain, B. Wilson, Steven Schwab, and R. Chertov. "DDoS Benchmarks and Experimentation Workbench for the DETER Testbed", Tridentcom, May 2007. Available as tric.pdf.
Weddle 07a
Charles Weddle, Mathew Oldham, Jin Qian, An-I Andy Wang, Peter Reiher, Geoff Kuenning. "PARAID: A Gear-Shifting Power-Aware RAID". Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST), February 2007. Available as fast2007.pdf.
Wang 06
An-I Andy Wang, Geoff Kuenning, Peter Reiher, and Gerald Popek. "The Conquest File System: Better Performance Through a Disk/Persistent-RAM Hybrid Design". ACM Transactions on Storage, 2(3), pp. 1-40, August 2006. Available as tos2006.pdf.
Oikonomou 06
George Oikonomou, Peter Reiher, Max Robinson, and Jelena Mirkovic, "A Framework for A Collaborative DDoS Defense," 2006 Annual Computer Security Applications Conference (ACSAC 22), December 2006. Available as defcom.pdf.
Mirkovic 06b
Jelena Mirkovic, E. Arikan, S. Wei, Sonia Fahmy, Roshan Thomas, and Peter Reiher, "Benchmarks for DDoS Defense Evaluation," Proceedings of the Milcom 2006, October 2006. Available as milcom06.pdf.
Mirkovic 06a
Jelena Mirkovic, Peter Reiher, Sonia Fahmy, Roshan Thomas, Alifia Hussein, Steven Schwab, and Calvin Ko, "Measuring Denial-of-Service," Proceedings of 2006 Quality of Protection Workshop, October 2006. Available as qop.pdf.
Ramakrishna 06
Venkata Ramakrishna, Max Robinson, Kevin Eustice, and Peter Reiher, "An Active Self-Optimizing Multiplayer Gaming Architecture," Cluster Computing, Vol. 9, No. 6, April 2006, pp 201-215. Available as cluster_computing.pdf.
Mirkovic 05
Jelena Mirkovic and Peter Reiher, "D-WARD: A Source-End Defense Against Flooding Denial-of-Service Attacks," IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 3, September 2005, pp. 216-232. Available as tdsc_2005.pdf.
Wang 05
An-I Andy Wang, Geoff Kuenning, and Peter Reiher, "Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication," 2005 International Symposium on Performance Evaluation of Computer and Telecommunications Systems (SPECTS), July 2005. Available as spects_2005.html.
Jun 05
Jun Li, Toby Ehrenkranz, Geoff Kuenning, and Peter Reiher, "Simulation and Analysis on the Resiliency and Efficiency of Malnets," Symposium on Measurement, Modeling, and Simulation of Malware, June 2005. Available as malnet_sim.pdf.
Anderson 05
Everett Anderson, Kevin Eustice, Shane Markstrum, Mark Hanson, and Peter Reiher, "Mobile Contagion: SImulation of Infection and Disease," Symposium on Measurement, Modeling, and Simulation of Malware, June 2005. Available as mobile_worm.pdf.
Dunham 04
Margaret Dunham, Birgitta Koenig-Reis, Evaggelia Pitoura, Peter Reiher, and Can Turker, "Mobile Information Management: Executive Summary," Dagstuhul Seminar Proceedings, October, 2004. Available as 04441.SWM7.Paper.257.pdf
Ratner 04
David Ratner, Peter Reiher, and Gerald Popek, "ROAM: A Scalable Replication System for Mobility," ACM/Kluwer Mobile Applications and Networks (MONET), Vol.9, No. 5, October 2004, pp. 537-544. Available as roam_monet.pdf.
Mirkovic 04
Jelena Mirkovic and Peter Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," Computer Communications Review, Vol. 34, No. 2, April 2004. Available as ccr.pdf.
Nguyen 04
N. Nguyen, A. Wang, G. Kuenning, and P. Reiher, "Electric Field Routing: A Reliable Framework for Routing in MANETs," ACM Mobile Computing and Communications Review (MC2R), Vol. 8, No. 2, April 2004, pp. 35-49. Available as efr_mc2r.ps.
Li 04
Jun Li, Gerald Popek, and Peter Reiher, "Resilient Self-Organizing Overlay Networks for Security Update Delivery," IEEE Journal on Selected Areas in Communications, Special Issue on Service Overlay Networks, Vol. 22, No. 1, January 2004. Available as revere_jsac.pdf.
Rudenko 04
Alexey Rudenko and Peter Reiher, "Adaptation Planning for Unicast Communications in Active Networks," IWAN 2003, December 2003. Available as iwan.pdf.
Mirkovic 03b
Jelena Mirkovic, Max Robinson, and Peter Reiher, "Alliance Formation For DDoS Defense" New Security Paradigms Workshop, August 2003. Available as defcom-nspw.pdf.
Eustice 03b
Kevin Eustice, V. Ramakrishna, Shane Markstrum, Peter Reiher, and Gerald Popek, "WiFi Nomads and Their Unprotected Devices: The Case for QED-Quarantine, Examination, and Decontamination," New Security Paradigms Workshop, August 2003. Available as qed.pdf.
Wang 03
Wang, A., Kuenning, G,, Reiher, P., and Popek, G., "The Effects of Memory-Rich Environments on File System Microbenchmarks," SPECTS, July 2003. Available as spects03.pdf.
Eustice 03a
Eustice, K., Kleinrock, L., Markstrum, S., Popek, G., Ramakrishna, V., and Reiher, P., "Enabling Secure Ubiquitous Interactions," 1st International Workshop on Middleware for Pervasive Ad-Hoc Computing, 2003. Available as IWMPAC03.pdf.
Nguyen 03
Nguyen, N., Kuenning, G., and Reiher, P., "Detecting Insider Threats by Monitoring System Call Activity," IEEE Information Assurance Workshop, 2003. Available as insider.pdf.
Ramakrishna 03
Ramakrishna, V. Robinson, M., Eustice, K., and Reiher, P., "An Active Self-Optimizing Multiplayer Gaming Architecture," Adaptive Middleware Systems, June 2003. Available as ams03.pdf.
Mirkovic 03a
Jelena Mirkovic, Gregory Prier, and Peter Reiher, "Challenges of Source-End DDoS Defense," IEEE International Symposium on Network Computing and Applications , April 2003, Available as nca03.pdf.
Mirkovic 02
Jelena Mirkovic, Greg Prier, and Peter Reiher "Attacking DDoS at the Source," ICNP, November 2002, Available as dward.ps.
Burns 02
Michael Burns, Greg Prier, Jelena Mirkovic, and Peter Reiher "Implementing Address Assurance in the Intel IXP Router," Western Network Processors Conference, October 2002, Available as npc_paper.pdf.
Kuenning 02
Geoff Kuenning, Wilkie Ma, Peter Reiher, and Gerald Popek, "Simplifying Automated Hoarding Methods," MSWiM 2002, September 2002, Available as mswim.ps.
Wang 02b
An-I Wang, Peter Reiher, Rajive Bagrodia, Geoffrey Kuenning "Understanding the Behavior of the Conflict-Rate Metric in Optimistic Peer Replication," 5th IEEE Workshop on Mobility in Database and Distributed Systems, September 2002, Available as mdds2002.pdf.
Li 02c
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, and Lixia Zhang, "SAVE: Source Address Validity Enforcement Protocol," Infocom 2002, July 2002, Available as infocom02.pdf.
Wang 02a
An-I Wang, Peter Reiher, Gerald Popek, and Geoffrey Kuenning, "Conquest: Better Performance Through a Disk/RAM Hybrid File System," Usenix 2002, June 2002, Available as usenix2002.ps.
Ferreria 02
Vincent Ferreria, Alexey Rudenko, Kevin Eustice, Richard Guy, V. Ramakrishna, and Peter Reiher, "Panda: Middleware to Provide the Benefits of Active Networks to Legacy Applications," DANCE 02 , May 2002, Available as panda.pdf.
Li 02b
Jun Li, Peter Reiher, Gerald Popek, Mark Yarvis, and Geoffrey Kuenning, "An Approach to Measuring Large-Scale Distributed Systems," Testcom 02, March 2002, Available as testcom02.pdf.
Li 02a
Jun Li, Mark Yarvis, and Peter Reiher, "Securing Distributed Adaptation," Computer Networks, Vol. 38, No. 3, January 2002, Available as sda.pdf.
Ratner 01
David Ratner, Peter Reiher, Gerald Popek, and Geoffrey Kuenning, "Application Requirements for Mobile Computing," Mobile Networks and Applications, Vol. 6, No. 6, November 2001, Available as replreq.ps.
Michel 01b
B. Scott Michel and Peter Reiher, "Peer-to-Peer Internetworking," Opensig 2001, September 2001, Available as Opensig.ps.
Michel 01a
B. Scott Michel and Peter Reiher "Peer-Through-Peer Communication for Information Logistics," Mobile Internet-based Services and Information Logistics Workshop, September 2001, Available as MISIL.ps.
Reiher 01
Peter Reiher, Kevin Eustice, and Kai-Min Sung, "Adapting Encrypted Data Streams in Open Architectures," Adaptive Middleware Workshop, August 2001, Available as AMSW.ps.
Li 01
Jun. Li, Mark Yarvis, Peter Reiher, "Securing Distributed Adaptation," OpenArch01, Available as Security_OpenArch01.ps.

Ekenstam 01
Todd Ekenstam, Peter Reiher, Charles Matheny, and Gerald Popek, "The Bengal Database Replication System," the Journal of Distributed and Parallel Databases, Vol. 9, No. 3, May 2001, Available as bengal.ps.

Badrinath00
B. Badrinath, Armando Fox, Leonard Kleinrock, Gerald Popek, Peter Reiher, and M. Satyanarayanan, "A Conceptual Framework for Network and Client Adaptation," Mobile Networks and Applications, Vol. 5, No. 4, 2000. Available as adaptation.ps.

Reiher00
Peter Reiher, Richard Guy, Mark Yarvis, and Alexey Rudenko, "Automated Planning for Open Architectures," Openarch 00, short paper session, March 2000. Available as planning.pdf.

Yarvis00
Mark Yarvis, Peter Reiher, and Gerald J. Popek, "A Reliability Model for Distributed Adaptation," Openarch 00, March 2000. Available as reliability.ps.

Michel00
Scott Michel, Peter Reiher, Constatin Nikolodakis, and Lixia Zhang, "URL Forwarding and Compression in Adaptive Web Caching," Infocom 2000, March 2000. Available as awc.ps.

Li99
Li Jun, Peter Reiher, and Gerald Popek, "Securing Information Transmission by Redundancy, the New Security Paradigms Workshop , September, 1999. Available as redundancy.ps.

Ratner99
David Ratner, Peter Reiher, and Gerald Popek, "Roam: A Scalable Replication System for Mobile Computing", Workshop on Mobile Databases and Distributed Systems (MDDS), September, 1999. Available as roam.ps

Tsai99c
Mitchell Tsai, Peter Reiher, and Gerald Popek, "Baby Steps From GUI Towards Dialogue: Mixed Intiative Computerese", AAAI'99 Workshop on Mixed Initiative Intelligence, July 1999. Available as AAAI.context.doc

Tsai99b
Mitchell Tsai, Peter Reiher, and Gerald Popek, "Operating System Services for Managing Context", AAAI'99 Workshop on Reasoning in Context for AI Applications`, July 1999. Available as AAAI.context.doc

Tsai99a
Mitchell Tsai, Peter Reiher, and Gerald Popek, "Command Management System for Next-Generation User Input", Seventh Workshop on Hot Topics in Operating Systems (HotOS), March 1999. Available as HotOS2.ps

Yarvis99
Mark Yarvis, Peter Reiher, and Gerald Popek, "A Framework for Distributed Adaptation", Seventh Workshop on Hot Topics in Operating Systems (HotOS), March 1999. Available as HotOS1.ps

Rudenko99
Alexey Rudenko, Peter Reiher, Gerald Popek, and Geoff Kuenning, "Portable Computer Battery Power Saving Using a Remote Processing Framework", Mobile Computing Systems and Application Track of the ACM SAC, February 1999. Available as SAC.ps

Wang99
An-I Wang, Peter Reiher, Rajive Bagrodia, and Gerald Popek, "A Simulation Evaluation of Optimistic Replicated Filing in a Mobile Environment", 18th IEEE International Performance, Computing, and Communications Conference, February, 1999. Available as IPCCC.pdf

Guy98
Richard Guy, Peter Reiher, David Ratner, Michial Gunter, Wilkie Ma, and Gerald Popek, "Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication", Workshop on Mobile Data Access, November 1998. Available as rumor.ps.

Rudenko98
Alexey Rudenko, Peter Reiher, Gerald Popek, and Geoff Kuenning, "Saving Portable Computer Battery Power through Remote Process Execution", ACM Mobile Computing and Communication Review (MC2R), Vol. 2, No. 1, 1998. Available as power.pdf.

Kuenning98
Geoff Kuenning, Rajive Bagrodia, Richard Guy, Gerald Popek, Peter Reiher, and An-I Wang, "Measuring the Quality of Service of Optimistic Replication", ECOOP '98 Workshop on Mobility and Replication, July, 1998. Available as replqos.ps.

Page98
Thomas Page, Richard Guy, John Heidemann, David Ratner, Peter Reiher, Ashvin Goel, Geoff Kuenning and Gerald Popek, "Perspectives on Optimistically Replicated, Peer-To-Peer Filing,” Software—Practice and Experience, Vol. 28, No. 2, February 1998. Available as perspectives.pdf.

Ratner97
David Ratner, Peter Reiher, and Gerald Popek, "Replication Requirements in Mobile Environments", Proceedings of the Dial M for Mobility Workshop, Oct. 1997. Available as wards.pdf

Kuenning97
Geoff Kuenning, Peter Reiher, and Gerald Popek, "Experience with an Automated Hoarding System", Personal Technologies, Sept. 1997. Available as seerres.ps.

Ratner96
David Ratner, Gerald Popek, and Peter Reiher, "The Ward Model: A Scalable Replication Architecture for Mobility", Workshop on Object Replication and Mobile Computing, October 1996. Available as ormc96.ps.

Reiher96
Peter Reiher, Gerald Popek, Michial Gunter, John Salomone, David Ratner, "Peer-to-Peer Reconciliation Based Replication for Mobile Computers". European Conference on Object Oriented Programming '96 Second Workshop on Mobility and Replication, , June 1996. Available as ecoop.ps

Reiher94
Peter Reiher, John S. Heidemann, David Ratner, Gregory Skinner, and Gerald J. Popek. "Resolving file conflicts in the Ficus file system". In USENIX Conference Proceedings, pages 183-195. USENIX, June 1994. Available as ftp://ftp.cs.ucla.edu/pub/ficus/usenix_summer_94_resolver.ps.gz

Kuenning94
Geoffrey H. Kuenning, Gerald J. Popek, and Peter Reiher. "An Analysis of Trace Data for Predictive File Caching in Mobile Computing". In USENIX Conference Proceedings, pages 183-195. USENIX, June 1994. Available as ftp://ftp.cs.ucla.edu/pub/ficus/usenix_summer_94_statistics.ps.gz

Reiher93b
Reiher, P., Page, T., Popek, G., Cook, J., and Crocker, S., "Truffles - Secure File Sharing With Minimal System Administrator Intervention", Proceedings of the 1993 World Conference on System Administration, Networking, and Security, April, 1993. Available as http://lasr.cs.ucla.edu/reiher/papers/sans2.ps

Reiher93a
Reiher, P., Page, T., Popek, G., Cook, J., and Crocker, S., "Truffles - A Secure Service For Widespread File Sharing", Proceedings of the Privacy and Security Research Group Workshop on Network and Distributed System Security, February, 1993. Available as http://lasr.cs.ucla.edu/reiher/papers/psrg93.ps

Reiher92
Reiher, P., "Experiences With Optimistic Synchronization for Distributed Operating Systems", Proceedings of the Third Symposium on Experiences with Distributed and Multiprocessor Systems, March 1992. Available as Available as tw_experiences.pdf.

Reiher91c
Reiher, P. and Jefferson, D., "Supercritical Speedup", roceedings of the 24th Annual Simulation Symposium, April, 1991. Available as supercrit.pdf.

Reiher91b
Reiher, P., Bellenot, S., and Jefferson, D., Debugging the Time Warp Operating System and Its Applications, Proceedings of the Symposium on Experiences with Distributed and Multiprocessor Systems II, March 1991. Available as ftp://ftp.cs.ucla.edu/pub/ficus/reiher/tw.papers/tw_debug.ps.gz

Reiher91a
Reiher, P., Bellenot, S., and Jefferson, D., Temporal Decomposition of Simulations Under the Time Warp Operating System, Proceedings of the 1991 Principles of Distributed Simulation Conference, January 1991. Available as ftp://ftp.cs.ucla.edu/pub/ficus/reiher/tw.papers/tw_temporal_decomp.ps.gz

Presley90
Presley, M., Reiher, P., and Bellenot, S., A Time Warp Implementation of Sharks World, Proceedings of the 1990 Winter Simulation Conference, December 1990. Available as ftp://ftp.cs.ucla.edu/pub/ficus/reiher/tw.papers/shark.ps.gz

Reiher90c
Reiher, P. and Jefferson, D., Virtual Time Based Dynamic Load Management in the Time Warp Operating System, Transactions of the Society for Computer Simulation, Vol. 7, #2, June 1990. Available as ftp://ftp.cs.ucla.edu/pub/ficus/reiher/tw.papers/dlm.ps.gz

Reiher90b
Reiher, P., Parallel Simulation Using the Time Warp Operating System, Proceedings of the 1990 Winter Simulation Conference, December 1990. Available as ftp://ftp.cs.ucla.edu/pub/ficus/reiher/tw.papers/tw_tutorial.ps.gz

Reiher90a
Reiher, P., Wieland, F., and Hontalas, P., Providing Determinism in the Time Warp Operating System - Costs, Benefits, and Implications, Proceedings of the IEEE Workshop on Experimental Distributed Systems, October 1990. Available as ftp://ftp.cs.ucla.edu/pub/ficus/reiher/tw.papers/tw_determ.ps.gz


reiher@cs.ucla.edu
Last modified: Monday June 17 2019