|
Search the dblp DataBase
Chad Verbowski:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yi-Min Wang, Chad Verbowski, Daniel R. Simon
Persistent-State Checkpoint Comparison for Troubleshooting Configuration Failures. [Citation Graph (0, 0)][DBLP] DSN, 2003, pp:311-316 [Conf]
- Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski
Detecting Stealth Software with Strider GhostBuster. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:368-377 [Conf]
- John Dunagan, Roussi Roussev, Brad Daniels, Aaron Johnson, Chad Verbowski, Yi-Min Wang
Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests. [Citation Graph (0, 0)][DBLP] ICAC, 2004, pp:106-113 [Conf]
- Chad Verbowski, John Dunagan, Brad Daniels, Yi-Min Wang
Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration. [Citation Graph (0, 0)][DBLP] LISA, 2004, pp:- [Conf]
- Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. [Citation Graph (0, 0)][DBLP] LISA, 2004, pp:33-46 [Conf]
- Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang
STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. [Citation Graph (0, 0)][DBLP] LISA, 2003, pp:159-172 [Conf]
- Chad Verbowski
System Administration: Drowning in Management Complexity. [Citation Graph (0, 0)][DBLP] LISA, 2006, pp:- [Conf]
- Chad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev, Yi-Min Wang
LiveOps: Systems Management as a Service. [Citation Graph (0, 0)][DBLP] LISA, 2006, pp:187-203 [Conf]
- Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wang
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Chad Verbowski, Emre Kiciman, Arunvijay Kumar, Brad Daniels, Shan Lu, Juhan Lee, Yi-Min Wang, Roussi Roussev
Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management. [Citation Graph (0, 0)][DBLP] OSDI, 2006, pp:117-130 [Conf]
- Chad Verbowski, Emre Kiciman, Brad Daniels, Yi-Min Wang, Roussi Roussev, Shan Lu, Juhan Lee
Analyzing persistent state interactions to improve state management. [Citation Graph (0, 0)][DBLP] SIGMETRICS/Performance, 2006, pp:363-364 [Conf]
- Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch
SubVirt: Implementing malware with virtual machines. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:314-327 [Conf]
- Yi-Min Wang, Lili Qiu, Chad Verbowski, Dimitris Achlioptas, Gautam Das, Per-Åke Larson
Summary-based routing for content-based event distribution networks. [Citation Graph (0, 0)][DBLP] Computer Communication Review, 2004, v:34, n:5, pp:59-74 [Journal]
- Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang
Strider: a black-box, state-based approach to change and configuration management and support. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 2004, v:53, n:2, pp:143-164 [Journal]
Search in 0.002secs, Finished in 0.002secs
|