The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dan S. Wallach: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Algis Rudys, Dan S. Wallach
    Transactional Rollback for Language-Based Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:439-448 [Conf]
  2. Eyal de Lara, Dan S. Wallach, Willy Zwaenepoel
    Architectures for Adaption Systems. [Citation Graph (0, 0)][DBLP]
    HotOS, 2001, pp:167- [Conf]
  3. Alan Mislove, Ansley Post, Charles Reis, Paul Willmann, Peter Druschel, Dan S. Wallach, Xavier Bonnaire, Pierre Sens, Jean-Michel Busca, Luciana Bezerra Arantes
    POST: A Secure, Resilient, Cooperative Messaging System. [Citation Graph (0, 0)][DBLP]
    HotOS, 2003, pp:61-66 [Conf]
  4. Seth James Nielson, Scott Crosby, Dan S. Wallach
    A Taxonomy of Rational Attacks. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2005, pp:36-46 [Conf]
  5. Tsuen-Wan Ngan, Dan S. Wallach, Peter Druschel
    Enforcing Fair Sharing of Peer-to-Peer Resources. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2003, pp:149-159 [Conf]
  6. Algis Rudys, Dan S. Wallach
    Enforcing Java Run-Time Properties Using Bytecode Rewriting. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:185-200 [Conf]
  7. Dan S. Wallach
    A Survey of Peer-to-Peer Security Issues. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:42-57 [Conf]
  8. Y. Charlie Hu, Weimin Yu, Alan L. Cox, Dan S. Wallach, Willy Zwaenepoel
    Run-Time Support for Distributed Sharing in Typed Languages. [Citation Graph (0, 0)][DBLP]
    LCR, 2000, pp:192-206 [Conf]
  9. Jason Flinn, Eyal de Lara, Mahadev Satyanarayanan, Dan S. Wallach, Willy Zwaenepoel
    Reducing the Energy Usage of Office Applications. [Citation Graph (0, 0)][DBLP]
    Middleware, 2001, pp:252-272 [Conf]
  10. Animesh Nandi, Tsuen-Wan Ngan, Atul Singh, Peter Druschel, Dan S. Wallach
    Scrivener: Providing Incentives in Cooperative Content Distribution Systems. [Citation Graph (0, 0)][DBLP]
    Middleware, 2005, pp:270-291 [Conf]
  11. Andreas Haeberlen, Eliot Flannery, Andrew M. Ladd, Algis Rudys, Dan S. Wallach, Lydia E. Kavraki
    Practical robust localization over large-scale 802.11 wireless networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2004, pp:70-84 [Conf]
  12. Andrew M. Ladd, Kostas E. Bekris, Algis Rudys, Lydia E. Kavraki, Dan S. Wallach, Guillaume Marceau
    Robotics-based location sensing using wireless ethernet. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2002, pp:227-238 [Conf]
  13. Eyal de Lara, Rajnish Kumar, Dan S. Wallach, Willy Zwaenepoel
    Collaboration and Multimedia Authoring on Mobile Devices. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2003, pp:- [Conf]
  14. Algis Rudys, John Clements, Dan S. Wallach
    Termination in Language-based Systems. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  15. Cristian Coarfa, Peter Druschel, Dan S. Wallach
    Performance Analysis of TLS Web Servers. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  16. Miguel Castro, Peter Druschel, Ayalvadi J. Ganesh, Antony I. T. Rowstron, Dan S. Wallach
    Secure Routing for Structured Peer-to-Peer Overlay Networks. [Citation Graph (0, 0)][DBLP]
    OSDI, 2002, pp:- [Conf]
  17. Dan S. Wallach, Sharma Kunapalli, Michael F. Cohen
    Accelerated MPEG compression of dynamic polygonal scenes. [Citation Graph (0, 0)][DBLP]
    SIGGRAPH, 1994, pp:193-196 [Conf]
  18. Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten
    Extensible Security Architecture for Java. [Citation Graph (0, 0)][DBLP]
    SOSP, 1997, pp:116-128 [Conf]
  19. Drew Dean, Edward W. Felten, Dan S. Wallach
    Java Security: From HotJava to Netscape and Beyond. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:190-200 [Conf]
  20. Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach
    Analysis of an Electronic Voting System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:27-0 [Conf]
  21. David W. Price, Algis Rudys, Dan S. Wallach
    Garbage Collector Memory Accounting in Language-Based Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:263-274 [Conf]
  22. Eyal de Lara, Dan S. Wallach, Willy Zwaenepoel
    Puppeteer: Component-based Adaptation for Mobile Computing. [Citation Graph (0, 0)][DBLP]
    USITS, 2001, pp:159-170 [Conf]
  23. Yuri Dotsenko, Eyal de Lara, Dan S. Wallach, Willy Zwaenepoel
    Extensible Adaptation via Constraint Solving. [Citation Graph (0, 0)][DBLP]
    WMCSA, 2002, pp:117-127 [Conf]
  24. Ping Tao, Algis Rudys, Andrew M. Ladd, Dan S. Wallach
    Wireless LAN location-sensing for security applications. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:11-20 [Conf]
  25. Dan S. Wallach
    Copy Protection Technology is Doomed. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:10, pp:48-49 [Journal]
  26. Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach
    Managing the Performance Impact of Web Security. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2005, v:5, n:1, pp:99-116 [Journal]
  27. Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, Dan S. Wallach
    Hack-a-Vote: Security Issues with Electronic Voting Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:32-37 [Journal]
  28. Shiuhpyng W. Shieh, Dan S. Wallach
    Guest Editors' Introduction: Ad Hoc and P2P Security. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2005, v:9, n:6, pp:14-15 [Journal]
  29. Algis Rudys, Dan S. Wallach
    Termination in language-based systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:2, pp:138-168 [Journal]
  30. Cristian Coarfa, Peter Druschel, Dan S. Wallach
    Performance analysis of TLS Web servers. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2006, v:24, n:1, pp:39-69 [Journal]
  31. Y. Charlie Hu, Weimin Yu, Alan L. Cox, Dan S. Wallach, Willy Zwaenepoel
    Run-time support for distributed sharing in safe languages. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2003, v:21, n:1, pp:1-35 [Journal]
  32. Dan S. Wallach, Andrew W. Appel, Edward W. Felten
    SAFKASI: a security mechanism for language-based systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:4, pp:341-378 [Journal]
  33. Eyal de Lara, Yogesh Chopra, Rajnish Kumar, Nilesh Vaghela, Dan S. Wallach, Willy Zwaenepoel
    Iterative Adaptation for Mobile Clients Using Existing APIs. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2005, v:16, n:10, pp:966-981 [Journal]
  34. Andrew M. Ladd, Kostas E. Bekris, Algis Rudys, Lydia E. Kavraki, Dan S. Wallach
    Robotics-Based Location Sensing Using Wireless Ethernet. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2005, v:11, n:1-2, pp:189-204 [Journal]
  35. Atul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S. Wallach
    Eclipse Attacks on Overlay Networks: Threats and Defenses. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]

  36. Electronic voting machines versus traditional methods: improved preference, similar performance. [Citation Graph (, )][DBLP]


  37. Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries. [Citation Graph (, )][DBLP]


  38. Building Incentives into Tor. [Citation Graph (, )][DBLP]


  39. Finding the Evidence in Tamper-Evident Logs. [Citation Graph (, )][DBLP]


  40. AP3: cooperative, decentralized anonymous communication. [Citation Graph (, )][DBLP]


  41. Understanding Java Stack Inspection. [Citation Graph (, )][DBLP]


  42. VoteBox: A Tamper-evident, Verifiable Electronic Voting System. [Citation Graph (, )][DBLP]


  43. The Case for Networked Remote Voting Precincts. [Citation Graph (, )][DBLP]


  44. Technical perspective - Tools for information to flow securely and Swift-ly. [Citation Graph (, )][DBLP]


  45. Technical perspective - Native Client: a clever alternative. [Citation Graph (, )][DBLP]


Search in 0.050secs, Finished in 0.053secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002