The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Philip Koopman: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John DeVale, Philip Koopman
    Performance Evaluation of Exception Handling in I/O Libraries. [Citation Graph (0, 0)][DBLP]
    DSN, 2001, pp:519- [Conf]
  2. John DeVale, Philip Koopman
    Robust Software - No More Excuses. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:145-154 [Conf]
  3. Philip Koopman
    32-Bit Cyclic Redundancy Codes for Internet Applications. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:459-472 [Conf]
  4. Philip Koopman, Tridib Chakravarty
    Cyclic Redundancy Code (CRC) Polynomial Selection For Embedded Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:145-0 [Conf]
  5. Philip Koopman, Henrique Madeira
    Workshop on Dependability Benchmarking. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:790-791 [Conf]
  6. Ravishankar K. Iyer, Zbigniew Kalbarczyk, Philip Koopman, Henrique Madeira, Gunter Heiner, Karama Kanoun, Haim Levendel, Brendan Murphy, Lawrence G. Votta, Don Wilson
    Joint Panel - IPDS and Workshop on Dependability Benchmarking. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:- [Conf]
  7. Elizabeth Latronico, Philip Koopman
    Design Time Reliability Analysis of Distributed Fault Tolerance Algorithms. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:486-495 [Conf]
  8. Elizabeth Latronico, Paul S. Miner, Philip Koopman
    Quantifying the Reliability of Proven SPIDER Group Membership Service Guarantees. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:275-284 [Conf]
  9. Jiantao Pan, Philip Koopman, Daniel P. Siewiorek, Yennun Huang, Robert Gruber, Mimi Ling Jiang
    Robustness Testing and Hardening of CORBA ORB Implementations. [Citation Graph (0, 0)][DBLP]
    DSN, 2001, pp:141-150 [Conf]
  10. Jennifer Morris, Daniel Kroening, Philip Koopman
    Fault Tolerance Tradeoffs in Moving from Decentralized to Centralized Embedded Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:377-0 [Conf]
  11. Michael Paulitsch, Jennifer Morris, Brendan Hall, Kevin Driscoll, Elizabeth Latronico, Philip Koopman
    Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:346-355 [Conf]
  12. Justin Ray, Philip Koopman
    Efficient High Hamming Distance CRCs for Embedded Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:3-12 [Conf]
  13. Charles P. Shelton, Philip Koopman
    Improving System Dependability with Functional Alternatives. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:295-0 [Conf]
  14. Charles P. Shelton, Philip Koopman, Kobey Devale
    Robustness Testing of the Microsoft Win32 API. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:261-0 [Conf]
  15. Philip Koopman, John DeVale
    Comparing the Robustness of POSIX Operating Systems. [Citation Graph (0, 0)][DBLP]
    FTCS, 1999, pp:30-37 [Conf]
  16. Carol L. Hoover, Jeffery P. Hansen, Philip Koopman, Sandeep Tamboli
    The Amaranth Framework: Probabilistic, Utility-Based Quality of Service Management for High-Assurance Computing. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:207-216 [Conf]
  17. Philip Koopman
    Embedded System Design Issues (The Rest of the Story). [Citation Graph (0, 0)][DBLP]
    ICCD, 1996, pp:310-0 [Conf]
  18. Orna Raz, Philip Koopman, Mary Shaw
    Semantic anomaly detection in online data sources. [Citation Graph (0, 0)][DBLP]
    ICSE, 2002, pp:302-312 [Conf]
  19. Christopher Martin, Philip Koopman
    Representing User Workarounds as a Component of System Dependability. [Citation Graph (0, 0)][DBLP]
    PRDC, 2004, pp:353-362 [Conf]
  20. Orna Raz, Rebecca B. Buchheit, Mary Shaw, Philip Koopman, Christos Faloutsos
    Automated Assistance for Eliciting User Expectations. [Citation Graph (0, 0)][DBLP]
    SEKE, 2004, pp:80-85 [Conf]
  21. Elizabeth Latronico, Philip Koopman
    Representing Embedded System Sequence Diagrams as a Formal Language. [Citation Graph (0, 0)][DBLP]
    UML, 2001, pp:302-316 [Conf]
  22. Meredith Beveridge, Philip Koopman
    Jini Meets Embedded Control Networking: A Case Study in Portability Failure. [Citation Graph (0, 0)][DBLP]
    WORDS, 2002, pp:11-18 [Conf]
  23. Charles P. Shelton, Philip Koopman, William Nace
    A Framework for Scalable Analysis and Design of System-wide Graceful Degradation in Distributed Embedded Systems. [Citation Graph (0, 0)][DBLP]
    WORDS, 2003, pp:156-163 [Conf]
  24. Orna Raz, Philip Koopman, Mary Shaw
    Enabling automatic adaptation in systems with under-specified elements. [Citation Graph (0, 0)][DBLP]
    WOSS, 2002, pp:55-60 [Conf]
  25. Arjun Cholkar, Philip Koopman
    A widely deployable Web-based network simulation framework using CORBA IDL-based APIs. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 1999, pp:1587-1594 [Conf]
  26. Philip Koopman
    Embedded System Security. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:7, pp:95-97 [Journal]
  27. Philip Koopman, Robert R. Hoffman
    Work-arounds, Make-work, and Kludges. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2003, v:18, n:6, pp:70-75 [Journal]
  28. Philip Koopman
    Guest Editor's Introduction: Critical Embedded Automotive Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2002, v:22, n:4, pp:14-18 [Journal]
  29. Philip Koopman, Howie Choset, Rajeev Gandhi, Bruce H. Krogh, Diana Marculescu, Priya Narasimhan, JoAnn M. Paul, Ragunathan Rajkumar, Daniel P. Siewiorek, Asim Smailagic, Peter Steenkiste, Donald E. Thomas, Chenxi Wang
    Undergraduate embedded system education at Carnegie Mellon. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Embedded Comput. Syst., 2005, v:4, n:3, pp:500-528 [Journal]
  30. Charles P. Shelton, Philip Koopman
    Using Architectural Properties to Model and Measure Graceful Degradation. [Citation Graph (0, 0)][DBLP]
    WADS, 2002, pp:267-289 [Conf]
  31. Philip Koopman
    Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    LADC, 2007, pp:1-2 [Conf]

  32. Data management mechanisms for embedded system gateways. [Citation Graph (, )][DBLP]


  33. Flexible multicast authentication for time-triggered embedded control network applications. [Citation Graph (, )][DBLP]


  34. System safety as an emergent property in composite systems. [Citation Graph (, )][DBLP]


  35. Message from the conference general chair and coordinator. [Citation Graph (, )][DBLP]


  36. Mitigating the Effects of Internet Timing Faults Across Embedded Network Gateways. [Citation Graph (, )][DBLP]


  37. Indirect Control Path Analysis and Goal Coverage Strategies for Elaborating System Safety Goals in Composite Systems. [Citation Graph (, )][DBLP]


Search in 0.414secs, Finished in 0.417secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002