The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

José Carlos Brustoloni: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Daniel Mossé, Louise Comfort, Ahmed Amer, José Carlos Brustoloni, Panos K. Chrysanthis, Milos Hauskrecht, Alexandros Labrinidis, Rami G. Melhem, Kirk Pruhs
    Secure-CITI Critical Information-Technology Infrastructure. [Citation Graph (0, 0)][DBLP]
    DG.O, 2006, pp:253-254 [Conf]
  2. John L. Bruno, José Carlos Brustoloni, Eran Gabber, Banu Özden, Abraham Silberschatz
    Disk Scheduling with Quality of Service Guarantees. [Citation Graph (0, 0)][DBLP]
    ICMCS, Vol. 2, 1999, pp:400-405 [Conf]
  3. José Carlos Brustoloni
    Interoperation of Copy Avoidance in Network and File I/O. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1999, pp:534-542 [Conf]
  4. José Carlos Brustoloni, Peter Steenkiste
    Copy Emulation in Checksummed, Multiple-Packet Communication. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1997, pp:1122-1130 [Conf]
  5. José Carlos Brustoloni, Peter Steenkiste
    User-Level Protocol Servers with Kernel-Level Performance. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1998, pp:463-471 [Conf]
  6. José Carlos Brustoloni
    Exposed Buffering and Sub-Datagram Flow Control for ATM LANs. [Citation Graph (0, 0)][DBLP]
    LCN, 1994, pp:324-334 [Conf]
  7. José Carlos Brustoloni
    Automatic VPN Client Recovery from IPsec Pass-through Failures. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:756-763 [Conf]
  8. José Carlos Brustoloni, Juan A. Garay
    Application-Independent End-to-End Security in Shared-Link Access Networks. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2000, pp:608-619 [Conf]
  9. Haidong Xia, José Carlos Brustoloni
    Detecting and Blocking Unauthorized Access in Wi-Fi Networks. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:795-806 [Conf]
  10. Haidong Xia, Jayashree Kanchana, José Carlos Brustoloni
    Using Secure Coprocessors to Protect Access to Enterprise Networks. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:154-165 [Conf]
  11. José Carlos Brustoloni, Peter Steenkiste
    Effects of Buffering Semantics on I/O Performance. [Citation Graph (0, 0)][DBLP]
    OSDI, 1996, pp:277-291 [Conf]
  12. Kostas Magoutis, José Carlos Brustoloni, Eran Gabber, Wee Teck Ng, Abraham Silberschatz
    Building appliances out of components using Pebble. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 2000, pp:211-216 [Conf]
  13. John L. Bruno, José Carlos Brustoloni, Eran Gabber, Banu Özden, Abraham Silberschatz
    Retrofitting Quality of Service into a Time-Sharing Operating System. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 1999, pp:15-26 [Conf]
  14. José Carlos Brustoloni, Eran Gabber, Abraham Silberschatz, Amit Singh
    Signaled Receiver Processing. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2000, pp:211-224 [Conf]
  15. Eran Gabber, Christopher Small, John L. Bruno, José Carlos Brustoloni, Abraham Silberschatz
    The Pebble Component-Based Operating System. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 1999, pp:267-282 [Conf]
  16. José Carlos Brustoloni
    Protecting electronic commerce from distributed denial-of-service attacks. [Citation Graph (0, 0)][DBLP]
    WWW, 2002, pp:553-561 [Conf]
  17. Xia Brustoloni, José Carlos Brustoloni
    Hardening Web browsers against man-in-the-middle and eavesdropping attacks. [Citation Graph (0, 0)][DBLP]
    WWW, 2005, pp:489-498 [Conf]
  18. José Carlos Brustoloni, Juan A. Garay
    MicroISPs: providing convenient and low-cost high-bandwidth Internet access. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:33, n:1-6, pp:789-802 [Journal]
  19. José Carlos Brustoloni, Sherif M. Khattab, Christopher Santamaria, Brian Smyth, Daniel Mossé
    Integrated Scheduling of Application- and Network-Layer Tasks in Delay-Tolerant MANETs. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  20. José Carlos Brustoloni
    Laboratory experiments for network security instruction. [Citation Graph (0, 0)][DBLP]
    ACM Journal of Educational Resources in Computing, 2006, v:6, n:4, pp:- [Journal]

  21. Uclinux: a linux security module for trusted-computing-based usage controls enforcement. [Citation Graph (, )][DBLP]


  22. Using reinforcement to strengthen users' secure behaviors. [Citation Graph (, )][DBLP]


  23. Automatically Segregating Greedy and Malicious Internet Flows. [Citation Graph (, )][DBLP]


  24. Efficient Detection of Bots in Subscribers' Computers. [Citation Graph (, )][DBLP]


  25. Sentinel: Hardware-Accelerated Mitigation of Bot-Based DDoS Attacks. [Citation Graph (, )][DBLP]


  26. Updates and Asynchronous Communication in Trusted Computing Systems. [Citation Graph (, )][DBLP]


  27. Bayesian bot detection based on DNS traffic similarity. [Citation Graph (, )][DBLP]


  28. Secure web-based retrieval of documents with usage controls. [Citation Graph (, )][DBLP]


  29. Improving security decisions with polymorphic and audited dialogs. [Citation Graph (, )][DBLP]


  30. Evaluating the usability of usage controls in electronic collaboration. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002