|
Search the dblp DataBase
Dan S. Wallach:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Algis Rudys, Dan S. Wallach
Transactional Rollback for Language-Based Systems. [Citation Graph (0, 0)][DBLP] DSN, 2002, pp:439-448 [Conf]
- Eyal de Lara, Dan S. Wallach, Willy Zwaenepoel
Architectures for Adaption Systems. [Citation Graph (0, 0)][DBLP] HotOS, 2001, pp:167- [Conf]
- Alan Mislove, Ansley Post, Charles Reis, Paul Willmann, Peter Druschel, Dan S. Wallach, Xavier Bonnaire, Pierre Sens, Jean-Michel Busca, Luciana Bezerra Arantes
POST: A Secure, Resilient, Cooperative Messaging System. [Citation Graph (0, 0)][DBLP] HotOS, 2003, pp:61-66 [Conf]
- Seth James Nielson, Scott Crosby, Dan S. Wallach
A Taxonomy of Rational Attacks. [Citation Graph (0, 0)][DBLP] IPTPS, 2005, pp:36-46 [Conf]
- Tsuen-Wan Ngan, Dan S. Wallach, Peter Druschel
Enforcing Fair Sharing of Peer-to-Peer Resources. [Citation Graph (0, 0)][DBLP] IPTPS, 2003, pp:149-159 [Conf]
- Algis Rudys, Dan S. Wallach
Enforcing Java Run-Time Properties Using Bytecode Rewriting. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:185-200 [Conf]
- Dan S. Wallach
A Survey of Peer-to-Peer Security Issues. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:42-57 [Conf]
- Y. Charlie Hu, Weimin Yu, Alan L. Cox, Dan S. Wallach, Willy Zwaenepoel
Run-Time Support for Distributed Sharing in Typed Languages. [Citation Graph (0, 0)][DBLP] LCR, 2000, pp:192-206 [Conf]
- Jason Flinn, Eyal de Lara, Mahadev Satyanarayanan, Dan S. Wallach, Willy Zwaenepoel
Reducing the Energy Usage of Office Applications. [Citation Graph (0, 0)][DBLP] Middleware, 2001, pp:252-272 [Conf]
- Animesh Nandi, Tsuen-Wan Ngan, Atul Singh, Peter Druschel, Dan S. Wallach
Scrivener: Providing Incentives in Cooperative Content Distribution Systems. [Citation Graph (0, 0)][DBLP] Middleware, 2005, pp:270-291 [Conf]
- Andreas Haeberlen, Eliot Flannery, Andrew M. Ladd, Algis Rudys, Dan S. Wallach, Lydia E. Kavraki
Practical robust localization over large-scale 802.11 wireless networks. [Citation Graph (0, 0)][DBLP] MOBICOM, 2004, pp:70-84 [Conf]
- Andrew M. Ladd, Kostas E. Bekris, Algis Rudys, Lydia E. Kavraki, Dan S. Wallach, Guillaume Marceau
Robotics-based location sensing using wireless ethernet. [Citation Graph (0, 0)][DBLP] MOBICOM, 2002, pp:227-238 [Conf]
- Eyal de Lara, Rajnish Kumar, Dan S. Wallach, Willy Zwaenepoel
Collaboration and Multimedia Authoring on Mobile Devices. [Citation Graph (0, 0)][DBLP] MobiSys, 2003, pp:- [Conf]
- Algis Rudys, John Clements, Dan S. Wallach
Termination in Language-based Systems. [Citation Graph (0, 0)][DBLP] NDSS, 2001, pp:- [Conf]
- Cristian Coarfa, Peter Druschel, Dan S. Wallach
Performance Analysis of TLS Web Servers. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Miguel Castro, Peter Druschel, Ayalvadi J. Ganesh, Antony I. T. Rowstron, Dan S. Wallach
Secure Routing for Structured Peer-to-Peer Overlay Networks. [Citation Graph (0, 0)][DBLP] OSDI, 2002, pp:- [Conf]
- Dan S. Wallach, Sharma Kunapalli, Michael F. Cohen
Accelerated MPEG compression of dynamic polygonal scenes. [Citation Graph (0, 0)][DBLP] SIGGRAPH, 1994, pp:193-196 [Conf]
- Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten
Extensible Security Architecture for Java. [Citation Graph (0, 0)][DBLP] SOSP, 1997, pp:116-128 [Conf]
- Drew Dean, Edward W. Felten, Dan S. Wallach
Java Security: From HotJava to Netscape and Beyond. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1996, pp:190-200 [Conf]
- Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach
Analysis of an Electronic Voting System. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2004, pp:27-0 [Conf]
- David W. Price, Algis Rudys, Dan S. Wallach
Garbage Collector Memory Accounting in Language-Based Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:263-274 [Conf]
- Eyal de Lara, Dan S. Wallach, Willy Zwaenepoel
Puppeteer: Component-based Adaptation for Mobile Computing. [Citation Graph (0, 0)][DBLP] USITS, 2001, pp:159-170 [Conf]
- Yuri Dotsenko, Eyal de Lara, Dan S. Wallach, Willy Zwaenepoel
Extensible Adaptation via Constraint Solving. [Citation Graph (0, 0)][DBLP] WMCSA, 2002, pp:117-127 [Conf]
- Ping Tao, Algis Rudys, Andrew M. Ladd, Dan S. Wallach
Wireless LAN location-sensing for security applications. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2003, pp:11-20 [Conf]
- Dan S. Wallach
Copy Protection Technology is Doomed. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:10, pp:48-49 [Journal]
- Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach
Managing the Performance Impact of Web Security. [Citation Graph (0, 0)][DBLP] Electronic Commerce Research, 2005, v:5, n:1, pp:99-116 [Journal]
- Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, Dan S. Wallach
Hack-a-Vote: Security Issues with Electronic Voting Systems. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:1, pp:32-37 [Journal]
- Shiuhpyng W. Shieh, Dan S. Wallach
Guest Editors' Introduction: Ad Hoc and P2P Security. [Citation Graph (0, 0)][DBLP] IEEE Internet Computing, 2005, v:9, n:6, pp:14-15 [Journal]
- Algis Rudys, Dan S. Wallach
Termination in language-based systems. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:2, pp:138-168 [Journal]
- Cristian Coarfa, Peter Druschel, Dan S. Wallach
Performance analysis of TLS Web servers. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Syst., 2006, v:24, n:1, pp:39-69 [Journal]
- Y. Charlie Hu, Weimin Yu, Alan L. Cox, Dan S. Wallach, Willy Zwaenepoel
Run-time support for distributed sharing in safe languages. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Syst., 2003, v:21, n:1, pp:1-35 [Journal]
- Dan S. Wallach, Andrew W. Appel, Edward W. Felten
SAFKASI: a security mechanism for language-based systems. [Citation Graph (0, 0)][DBLP] ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:4, pp:341-378 [Journal]
- Eyal de Lara, Yogesh Chopra, Rajnish Kumar, Nilesh Vaghela, Dan S. Wallach, Willy Zwaenepoel
Iterative Adaptation for Mobile Clients Using Existing APIs. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2005, v:16, n:10, pp:966-981 [Journal]
- Andrew M. Ladd, Kostas E. Bekris, Algis Rudys, Lydia E. Kavraki, Dan S. Wallach
Robotics-Based Location Sensing Using Wireless Ethernet. [Citation Graph (0, 0)][DBLP] Wireless Networks, 2005, v:11, n:1-2, pp:189-204 [Journal]
- Atul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S. Wallach
Eclipse Attacks on Overlay Networks: Threats and Defenses. [Citation Graph (0, 0)][DBLP] INFOCOM, 2006, pp:- [Conf]
Electronic voting machines versus traditional methods: improved preference, similar performance. [Citation Graph (, )][DBLP]
Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries. [Citation Graph (, )][DBLP]
Building Incentives into Tor. [Citation Graph (, )][DBLP]
Finding the Evidence in Tamper-Evident Logs. [Citation Graph (, )][DBLP]
AP3: cooperative, decentralized anonymous communication. [Citation Graph (, )][DBLP]
Understanding Java Stack Inspection. [Citation Graph (, )][DBLP]
VoteBox: A Tamper-evident, Verifiable Electronic Voting System. [Citation Graph (, )][DBLP]
The Case for Networked Remote Voting Precincts. [Citation Graph (, )][DBLP]
Technical perspective - Tools for information to flow securely and Swift-ly. [Citation Graph (, )][DBLP]
Technical perspective - Native Client: a clever alternative. [Citation Graph (, )][DBLP]
Search in 0.050secs, Finished in 0.053secs
|