|
Search the dblp DataBase
Manuel Costa:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Miguel Castro, Manuel Costa, Antony I. T. Rowstron
Performance and Dependability of Structured Peer-to-Peer Overlays. [Citation Graph (0, 0)][DBLP] DSN, 2004, pp:9-18 [Conf]
- Manuel Costa, Miguel Castro, Antony I. T. Rowstron, Peter B. Key
PIC: Practical Internet Coordinates for Distance Estimation. [Citation Graph (0, 0)][DBLP] ICDCS, 2004, pp:178-187 [Conf]
- Miguel Castro, Manuel Sequeira, Manuel Costa, Paulo Guedes
Efficient and Flexible Object Sharing. [Citation Graph (0, 0)][DBLP] ICPP, Vol. 1, 1996, pp:128-137 [Conf]
- Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien
A First Look at Peer-to-Peer Worms: Threats and Defenses. [Citation Graph (0, 0)][DBLP] IPTPS, 2005, pp:24-35 [Conf]
- Manuel Costa, Paulo Guedes, Manuel Sequeira, Nuno Neves, Miguel Castro
Lightweight Logging for Lazy Release Consistent Distributed Shared Memory. [Citation Graph (0, 0)][DBLP] OSDI, 1996, pp:59-73 [Conf]
- Miguel Castro, Manuel Costa, Tim Harris
Securing Software by Enforcing Data-flow Integrity. [Citation Graph (0, 0)][DBLP] OSDI, 2006, pp:147-160 [Conf]
- Manuel Costa, Jon Crowcroft, Miguel Castro, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham
Vigilante: end-to-end containment of internet worms. [Citation Graph (0, 0)][DBLP] SOSP, 2005, pp:133-147 [Conf]
- Miguel Castro, Manuel Costa, Antony I. T. Rowstron
Should we build Gnutella on a structured overlay? [Citation Graph (0, 0)][DBLP] Computer Communication Review, 2004, v:34, n:1, pp:131-136 [Journal]
- Miguel Castro, Manuel Costa, Antony I. T. Rowstron
Debunking Some Myths About Structured and Unstructured Overlays. [Citation Graph (0, 0)][DBLP] NSDI, 2005, pp:- [Conf]
- Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Zhang, Marcus Peinado
Bouncer: securing software by blocking bad input. [Citation Graph (0, 0)][DBLP] SOSP, 2007, pp:117-130 [Conf]
Better bug reporting with better privacy. [Citation Graph (, )][DBLP]
Dynamically checking ownership policies in concurrent c/c++ programs. [Citation Graph (, )][DBLP]
Fast byte-granularity software fault isolation. [Citation Graph (, )][DBLP]
Preventing Memory Error Exploits with WIT. [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.007secs
|