The SCEAS System
Navigation Menu

Search the dblp DataBase


John Dunagan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Dunagan, Roussi Roussev, Brad Daniels, Aaron Johnson, Chad Verbowski, Yi-Min Wang
    Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests. [Citation Graph (0, 0)][DBLP]
    ICAC, 2004, pp:106-113 [Conf]
  2. Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker
    Finding diversity in remote code injection exploits. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:53-64 [Conf]
  3. Chad Verbowski, John Dunagan, Brad Daniels, Yi-Min Wang
    Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:- [Conf]
  4. Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang
    STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:159-172 [Conf]
  5. Paramvir Bahl, Ranveer Chandra, John Dunagan
    SSCH: slotted seeded channel hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2004, pp:216-230 [Conf]
  6. Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wang
    A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  7. John Dunagan, Nicholas J. A. Harvey, Michael B. Jones, Dejan Kostic, Marvin Theimer, Alec Wolman
    FUSE: Lightweight Guaranteed Distributed Failure Notification. [Citation Graph (0, 0)][DBLP]
    OSDI, 2004, pp:151-166 [Conf]
  8. Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, Saher Esmeir
    BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML. [Citation Graph (0, 0)][DBLP]
    OSDI, 2006, pp:61-74 [Conf]
  9. John Dunagan, Santosh Vempala
    On Euclidean Embeddings and Bandwidth Minimization. [Citation Graph (0, 0)][DBLP]
    RANDOM-APPROX, 2001, pp:229-240 [Conf]
  10. Avrim Blum, John Dunagan
    Smoothed analysis of the perceptron algorithm for linear programming. [Citation Graph (0, 0)][DBLP]
    SODA, 2002, pp:905-914 [Conf]
  11. John Dunagan, Santosh Vempala
    Optimal outlier removal in high-dimensional. [Citation Graph (0, 0)][DBLP]
    STOC, 2001, pp:627-636 [Conf]
  12. John Dunagan, Santosh Vempala
    A simple polynomial-time rescaling algorithm for solving linear programs. [Citation Graph (0, 0)][DBLP]
    STOC, 2004, pp:315-320 [Conf]
  13. John Dunagan, Daniel A. Spielman, Shang-Hua Teng
    Smoothed Analysis of Interior-Point Algorithms: Condition Number [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  14. John Dunagan, Santosh Vempala
    Optimal outlier removal in high-dimensional spaces. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2004, v:68, n:2, pp:335-373 [Journal]
  15. Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang
    Strider: a black-box, state-based approach to change and configuration management and support. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2004, v:53, n:2, pp:143-164 [Journal]
  16. John Dunagan, Nicholas J. A. Harvey
    Iteratively constructing preconditioners via the conjugate gradient method. [Citation Graph (0, 0)][DBLP]
    STOC, 2007, pp:207-216 [Conf]
  17. Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, Saher Esmeir
    BrowserShield: Vulnerability-driven filtering of dynamic HTML. [Citation Graph (0, 0)][DBLP]
    TWEB, 2007, v:1, n:3, pp:- [Journal]

  18. Generic Application-Level Protocol Analyzer and its Language. [Citation Graph (, )][DBLP]

  19. Characterizing Botnets from Email Spam Records. [Citation Graph (, )][DBLP]

  20. Volley: Automated Data Placement for Geo-Distributed Cloud Services. [Citation Graph (, )][DBLP]

  21. Centrifuge: Integrated Lease Management and Partitioning for Cloud Services. [Citation Graph (, )][DBLP]

  22. Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002