Search the dblp DataBase
Henry L. Owen :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Sven Krasser , Henry L. Owen , Joachim Sokol , Hans-Peter Huth , Jochen Grimminger Adaptive Per-Flow Traffic Engineering Based on Probe Packet Measurements. [Citation Graph (0, 0)][DBLP ] CNSR, 2005, pp:131-136 [Conf ] Julian B. Grizzard , John G. Levine , Henry L. Owen Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:369-384 [Conf ] David A. Barlow , Vasos Vassiliou , Henry L. Owen A Cryptographic Protocol to Protect MPLS Labels. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:237-242 [Conf ] John G. Levine , Richard LaBella , Henry L. Owen , Didier Contis , Brian Culver The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:92-99 [Conf ] Yu-Xi Lim , Tim Schmoyer , John G. Levine , Henry L. Owen Wireless Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:68-75 [Conf ] Dennis J. Pai , Henry L. Owen An Algorithm for Bandwidth Management with Survivability Constraints in ATM Networks. [Citation Graph (0, 0)][DBLP ] ICC (1), 1997, pp:261-266 [Conf ] Jong-Il Park , Stephen B. Wicker , Henry L. Owen Soft Output Equalization Techniques for pi/4-DQPSK Moblie Radio. [Citation Graph (0, 0)][DBLP ] ICC (3), 1997, pp:1503-1507 [Conf ] Peter E. Sholander , Chris Autry , Henry L. Owen Mapping Wander in SONET/SDH Adaptive Threshold Modulation Pointer Processors. [Citation Graph (0, 0)][DBLP ] ICC (3), 1997, pp:1587-1591 [Conf ] Myung Choi , Henry L. Owen , Joachim Sokol Packet-Size Based Queuing Algorithm for QoS Support. [Citation Graph (0, 0)][DBLP ] ICN (2), 2001, pp:137-147 [Conf ] Hayriye Altunbasak , Sven Krasser , Henry L. Owen , Jochen Grimminger , Hans-Peter Huth , Joachim Sokol Securing Layer 2 in Local Area Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:699-706 [Conf ] Weilai Yang , Henry L. Owen , Douglas M. Blough Determining Differentiated Services Network Pricing Through Auctions. [Citation Graph (0, 0)][DBLP ] ICN (1), 2005, pp:802-809 [Conf ] John Spillane , Henry L. Owen Temporal Partitioning for Partially-Reconfigurable-Field-Programmable Gate. [Citation Graph (0, 0)][DBLP ] IPPS/SPDP Workshops, 1998, pp:37-42 [Conf ] Nicholas Athanasiades , Randal Abler , John G. Levine , Henry L. Owen , George F. Riley Intrusion Detection Testing and Benchmarking Methodologies. [Citation Graph (0, 0)][DBLP ] IWIA, 2003, pp:63-72 [Conf ] John G. Levine , Julian B. Grizzard , Henry L. Owen A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. [Citation Graph (0, 0)][DBLP ] IWIA, 2004, pp:107-128 [Conf ] Hayriye Altunbasak , Sven Krasser , Henry L. Owen , Joachim Sokol , Jochen Grimminger , Hans-Peter Huth Addressing the Weak Link Between Layer 2 and Layer 3 in the Internet Architecture. [Citation Graph (0, 0)][DBLP ] LCN, 2004, pp:417-418 [Conf ] Bob Johnston , Henry L. Owen SDH Digital Cross-Connect Traffic Generation Algorithm. [Citation Graph (0, 0)][DBLP ] MASCOTS, 1999, pp:84-91 [Conf ] Henry L. Owen VLSI Architecture for Switch-Level Simulation. [Citation Graph (0, 0)][DBLP ] MASCOTS, 1993, pp:44-49 [Conf ] Henry L. Owen Synchronous Digital Hierarchy Network Modeling. [Citation Graph (0, 0)][DBLP ] MASCOTS, 1994, pp:229-233 [Conf ] Peter E. Sholander , Henry L. Owen Simulation Model for Analysis of Synchronous Digital Hierarchy Network Payload Jitter. [Citation Graph (0, 0)][DBLP ] MASCOTS, 1995, pp:275-279 [Conf ] Julian B. Grizzard , Sven Krasser , Henry L. Owen , Gregory J. Conti , Eric R. Dodson Towards an Approach for Automatically Repairing Compromised Network Systems. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:389-392 [Conf ] Seong-Ho Jeong , Myung Choi , Randal Abler , Henry L. Owen , John A. Copeland , Joachim Sokol QoS Support for Real-Time Applications Using the Integration of RSVP/Intserv and Diffserv: A Testbed Experiment. [Citation Graph (0, 0)][DBLP ] NETWORKING, 2000, pp:458-469 [Conf ] David Dagon , Xinzhou Qin , Guofei Gu , Wenke Lee , Julian B. Grizzard , John G. Levine , Henry L. Owen HoneyStat: Local Worm Detection Using Honeypots. [Citation Graph (0, 0)][DBLP ] RAID, 2004, pp:39-58 [Conf ] Gregory J. Conti , Julian B. Grizzard , Mustaque Ahamad , Henry L. Owen Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:10- [Conf ] David A. Barlow , Henry L. Owen , Vasos Vassiliou , Jochen Grimminger , Hans-Peter Huth , Joachim Sokol Simulating Router-based Traffic-engineering in Radio Access Networks using NS-2. [Citation Graph (0, 0)][DBLP ] Communications, Internet, and Information Technology, 2002, pp:136-141 [Conf ] Gregory J. Conti , Kulsoom Abdullah , Julian B. Grizzard , John T. Stasko , John A. Copeland , Mustaque Ahamad , Henry L. Owen , Christopher P. Lee Countering Security Information Overload through Alert and Packet Visualization. [Citation Graph (0, 0)][DBLP ] IEEE Computer Graphics and Applications, 2006, v:26, n:2, pp:60-70 [Journal ] Henry L. Owen , Thomas M. Klett Synchronous Digital Hierarchy Network Pointer Simulation. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1994, v:26, n:5, pp:481-491 [Journal ] Peter E. Sholander , Henry L. Owen The impact of mapping wander on the performance of SDH AU-4 and TU-3 uniform pointer processors. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:5, pp:457-473 [Journal ] Seong-Ho Jeong , Henry L. Owen , John A. Copeland , Joachim Sokol QoS support for UDP/TCP based networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2001, v:24, n:1, pp:64-77 [Journal ] Henry L. Owen Ring-based bandwidth dimensioning in SDH networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:2, pp:102-112 [Journal ] Henry L. Owen , Thomas M. Klett Synchronous Digital Hierarchy statistical simulation of pointer activity. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1993, v:16, n:12, pp:759-766 [Journal ] John G. Levine , Julian B. Grizzard , Henry L. Owen Using Honeynets to Protect Large Enterprise Networks. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:6, pp:73-75 [Journal ] John G. Levine , Julian B. Grizzard , Henry L. Owen Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2006, v:4, n:1, pp:24-32 [Journal ] Özgür Gürbüz , Henry L. Owen Dynamic resource scheduling (DRS): a multimedia QoS framework for W-CDMA. [Citation Graph (0, 0)][DBLP ] Wireless Communications and Mobile Computing, 2004, v:4, n:5, pp:529-546 [Journal ] Özgür Gürbüz , Henry L. Owen Power Control Based QoS Provisioning for Multimedia in W-CDMA. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2002, v:8, n:1, pp:37-47 [Journal ] A pricing approach for bandwidth allocation in differentiated service networks. [Citation Graph (, )][DBLP ] Search in 0.007secs, Finished in 0.009secs