The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Brian D. Noble: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Brian D. Noble
    Fellowship Winner: The Structure And Evolution Of A Distributed Measurement Framework. [Citation Graph (0, 0)][DBLP]
    Int. CMG Conference, 1995, pp:1177-1183 [Conf]
  2. Minkyong Kim, Landon P. Cox, Brian D. Noble
    Safety, Visibility, and Performance in a Wide-Area File System. [Citation Graph (0, 0)][DBLP]
    FAST, 2002, pp:131-144 [Conf]
  3. Peter M. Chen, Brian D. Noble
    When Virtual is Better than Real. [Citation Graph (0, 0)][DBLP]
    HotOS, 2001, pp:133-138 [Conf]
  4. Landon P. Cox, Brian D. Noble
    Fast Reconciliations in Fluid Replication. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2001, pp:449-458 [Conf]
  5. Thomas J. Hacker, Brian D. Noble, Brian D. Athey
    Improving Throughput and Maintaining Fairness using Parallel TCP. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  6. Minkyong Kim, Brian D. Noble
    Mobile network estimation. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2001, pp:298-309 [Conf]
  7. Jungkeun Yoon, Brian D. Noble, Mingyan Liu, Minkyong Kim
    Building realistic mobility models from coarse-grained traces. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2006, pp:177-190 [Conf]
  8. Anthony J. Nicholson, Yatin Chawathe, Mike Y. Chen, Brian D. Noble, David Wetherall
    Improved access point selection. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2006, pp:233-245 [Conf]
  9. Landon P. Cox, Christopher D. Murray, Brian D. Noble
    Pastiche: Making Backup Cheap and Easy. [Citation Graph (0, 0)][DBLP]
    OSDI, 2002, pp:- [Conf]
  10. Anthony J. Nicholson, Ian E. Smith, Jeff Hughes, Brian D. Noble
    LoKey: Leveraging the SMS Network in Decentralized, End-to-End Trust Establishment. [Citation Graph (0, 0)][DBLP]
    Pervasive, 2006, pp:202-219 [Conf]
  11. Magesh Jayapandian, Brian D. Noble, James W. Mickens, H. V. Jagadish
    Using Delay to Defend Against Database Extraction. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:202-218 [Conf]
  12. James W. Mickens, Brian D. Noble
    Predicting node availability in peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2005, pp:378-379 [Conf]
  13. Brian D. Noble, Ben Fleis, Landon P. Cox
    Deferring trust in fluid replication. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 2000, pp:79-84 [Conf]
  14. Landon P. Cox, Brian D. Noble
    Samsara: honor among thieves in peer-to-peer storage. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:120-132 [Conf]
  15. James W. Mickens, Brian D. Noble
    Improving distributed system performance using machine availability prediction. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS Performance Evaluation Review, 2006, v:34, n:2, pp:16-18 [Journal]
  16. Brian D. Noble
    Scanning the literature. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:1, pp:1-2 [Journal]
  17. Brian D. Noble
    Scanning the literature. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:1-2 [Journal]
  18. Anthony J. Nicholson, Mark D. Corner, Brian D. Noble
    Mobile Device Security Using Transient Authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:11, pp:1489-1502 [Journal]
  19. Mark D. Corner, Brian D. Noble
    Protecting File Systems with Transient Authentication. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2005, v:11, n:1-2, pp:7-19 [Journal]
  20. James W. Mickens, Brian D. Noble
    Concilium: Collaborative Diagnosis of Broken Overlay Routes. [Citation Graph (0, 0)][DBLP]
    DSN, 2007, pp:225-234 [Conf]
  21. James W. Mickens, Brian D. Noble
    Exploiting Availability Prediction in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    NSDI, 2006, pp:- [Conf]

  22. Adaptive data block scheduling for parallel TCP streams. [Citation Graph (, )][DBLP]


  23. BreadCrumbs: forecasting mobile connectivity. [Citation Graph (, )][DBLP]


  24. The case for transient authentication. [Citation Graph (, )][DBLP]


  25. Using Provenance to Aid in Personal File Search. [Citation Graph (, )][DBLP]


  26. quFiles: a unifying abstraction for mobile data management. [Citation Graph (, )][DBLP]


  27. The case for intentional networking. [Citation Graph (, )][DBLP]


  28. Modeling epidemic spreading in mobile environments. [Citation Graph (, )][DBLP]


  29. Distributing private data in challenged network environments. [Citation Graph (, )][DBLP]


  30. Analytical Models for Epidemics in Mobile Networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002