Search the dblp DataBase
David Kotz :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
David Kotz , Carla Schlatter Ellis Practical Prefetching Techniques for Parallel File Systems. [Citation Graph (4, 0)][DBLP ] PDIS, 1991, pp:182-189 [Conf ] David Kotz Disk-directed I/O for MIMD Multiprocessors. [Citation Graph (2, 0)][DBLP ] OSDI, 1994, pp:61-74 [Conf ] David Kotz Multiprocessor File System Interfaces. [Citation Graph (1, 0)][DBLP ] PDIS, 1993, pp:194-201 [Conf ] David Kotz , Robert S. Gray , Saurab Nog , Daniela Rus , Sumit Chawla , George Cybenko AGENT TCL: Targeting the Needs of Mobile Computers. [Citation Graph (1, 0)][DBLP ] IEEE Internet Computing, 1997, v:1, n:4, pp:58-67 [Journal ] David Kotz Disk-Directed I/O for MIMD Multiprocessors. [Citation Graph (1, 0)][DBLP ] ACM Trans. Comput. Syst., 1997, v:15, n:1, pp:41-74 [Journal ] David Kotz , Carla Schlatter Ellis Prefetching in File Systems for MIMD Multiprocessors. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1990, v:1, n:2, pp:218-230 [Journal ] David Kotz , Nils Nieuwejaar Flexibility and Performance of Parallel File Systems. [Citation Graph (0, 0)][DBLP ] ACPC, 1996, pp:1-11 [Conf ] Jonathan Bredin , David Kotz , Daniela Rus Market-Based Resource Control for Mobile Agents. [Citation Graph (0, 0)][DBLP ] Agents, 1998, pp:197-204 [Conf ] Jonathan Bredin , Rajiv T. Maheswaran , Çagri Imer , Tamer Basar , David Kotz , Daniela Rus A game-theoretic formulation of multi-agent resource allocation. [Citation Graph (0, 0)][DBLP ] Agents, 2000, pp:349-356 [Conf ] Daniela Rus , Robert S. Gray , David Kotz Transportable Information Agents. [Citation Graph (0, 0)][DBLP ] Agents, 1997, pp:228-236 [Conf ] Ron Oldfield , David Kotz Armada: A Parallel File System for Computational Grids. [Citation Graph (0, 0)][DBLP ] CCGRID, 2001, pp:194-201 [Conf ] Jon Howell , David Kotz A Formal Semantics for SPKI. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:140-158 [Conf ] David Kotz Disk-Directed I/O for an Out-of-Core Computation. [Citation Graph (0, 0)][DBLP ] HPDC, 1995, pp:159-166 [Conf ] Javed A. Aslam , Sergey Bratus , David Kotz , Ronald A. Peterson , Daniela Rus , Brett Tofel The Kerf toolkit for intrusion analysis. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:301-302 [Conf ] Guanling Chen , David Kotz Dependency Management in Distributed Settings. [Citation Graph (0, 0)][DBLP ] ICAC, 2004, pp:272-273 [Conf ] Carla Schlatter Ellis , David Kotz Prefetching in File Systems for MIMD Multiprocessors. [Citation Graph (0, 0)][DBLP ] ICPP (1), 1989, pp:306-314 [Conf ] Nils Nieuwejaar , David Kotz The Galley Parallel File System. [Citation Graph (0, 0)][DBLP ] International Conference on Supercomputing, 1996, pp:374-381 [Conf ] Libo Song , David Kotz , Ravi Jain , Xiaoning He Evaluating location predictors with extensive Wi-Fi mobility data. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2004, pp:- [Conf ] Nils Nieuwejaar , David Kotz Performance of the Gallery Parallel File System. [Citation Graph (0, 0)][DBLP ] IOPADS, 1996, pp:83-94 [Conf ] Apratim Purakayastha , Carla Schlatter Ellis , David Kotz ENWRICH a Compute-Processor Write Caching Scheme for Parallel File Systems. [Citation Graph (0, 0)][DBLP ] IOPADS, 1996, pp:55-68 [Conf ] Daniel C. Hyde , David Kotz , Gordon Makinson , Panagiotis Takis Metaxas , Christopher H. Nevison , Nan C. Schaller , Gregory V. Wilson Different Approaches to Parallel Computing Education. [Citation Graph (0, 0)][DBLP ] IPPS, 1995, pp:846-0 [Conf ] Apratim Purakayastha , Carla Schlatter Ellis , David Kotz , Nils Nieuwejaar , Michael L. Best Characterizing parallel file-access patterns on a large-scale multiprocessor. [Citation Graph (0, 0)][DBLP ] IPPS, 1995, pp:165-172 [Conf ] Minkyong Kim , David Kotz Classifying the Mobility of Users and the Popularity of Access Points. [Citation Graph (0, 0)][DBLP ] LoCA, 2005, pp:198-210 [Conf ] Robert S. Gray , David Kotz , Ronald A. Peterson , Joyce Barton , Daria A. Chacón , Peter Gerken , Martin O. Hofmann , Jeffrey M. Bradshaw , Maggie R. Breedy , Renia Jeffers , Niranjan Suri Mobile-Agent versus Client/Server Performance: Scalability in an Information-Retrieval Task. [Citation Graph (0, 0)][DBLP ] Mobile Agents, 2001, pp:229-243 [Conf ] Arne Grimstrup , Robert S. Gray , David Kotz , Maggie R. Breedy , Marco M. Carvalho , Thomas B. Cowin , Daria A. Chacón , Joyce Barton , Chris Garrett , Martin Hofmann 0004 Toward Interoperability of Mobile-Agent Systems. [Citation Graph (0, 0)][DBLP ] Mobile Agents, 2002, pp:106-120 [Conf ] Robert S. Gray , David Kotz , George Cybenko , Daniela Rus D'Agents: Security in a Multiple-Language, Mobile-Agent System. [Citation Graph (0, 0)][DBLP ] Mobile Agents and Security, 1998, pp:154-187 [Conf ] Tristan Henderson , David Kotz , Ilya Abyzov The changing usage of a mature campus-wide wireless network. [Citation Graph (0, 0)][DBLP ] MOBICOM, 2004, pp:187-201 [Conf ] David Kotz , Kobby Essien Analysis of a campus-wide wireless network. [Citation Graph (0, 0)][DBLP ] MOBICOM, 2002, pp:107-118 [Conf ] Guanling Chen , Ming Li , David Kotz Design and Implementation of a Large-Scale Context Fusion Network. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2004, pp:246-255 [Conf ] Rajnish Kumar , Arnab Paul , Umakishore Ramachandran , David Kotz On Improving Wireless Broadcast Reliability of Sensor Networks Using Erasure Codes. [Citation Graph (0, 0)][DBLP ] MSN, 2006, pp:155-170 [Conf ] Robert S. Gray , David Kotz , Calvin C. Newport , Nikita Dubrovsky , Aaron Fiske , Jason Liu , Christopher Masone , Susan McGrath , Yougu Yuan Outdoor experimental comparison of four ad hoc routing algorithms. [Citation Graph (0, 0)][DBLP ] MSWiM, 2004, pp:220-229 [Conf ] David Kotz , Calvin C. Newport , Robert S. Gray , Jason Liu , Yougu Yuan , Chip Elliott Experimental evaluation of wireless simulation assumptions. [Citation Graph (0, 0)][DBLP ] MSWiM, 2004, pp:78-82 [Conf ] Jon Howell , David Kotz End-to-End Authorization. [Citation Graph (0, 0)][DBLP ] OSDI, 2000, pp:151-164 [Conf ] Jason Liu , Yougu Yuan , David M. Nicol , Robert S. Gray , Calvin C. Newport , David Kotz , L. Felipe Perrone Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols. [Citation Graph (0, 0)][DBLP ] PADS, 2004, pp:7-16 [Conf ] Guanling Chen , David Kotz Context-Sensitive Resource Discovery. [Citation Graph (0, 0)][DBLP ] PerCom, 2003, pp:243-252 [Conf ] Guanling Chen , David Kotz Policy-Driven Data Dissemination for Context-Aware Applications. [Citation Graph (0, 0)][DBLP ] PerCom, 2005, pp:283-289 [Conf ] Kazuhiro Minami , David Kotz Secure Context-Sensitive Authorization. [Citation Graph (0, 0)][DBLP ] PerCom, 2005, pp:257-268 [Conf ] Minkyong Kim , Jeffrey J. Fielding , David Kotz Risks of Using AP Locations Discovered Through War Driving. [Citation Graph (0, 0)][DBLP ] Pervasive, 2006, pp:67-82 [Conf ] Kazuhiro Minami , David Kotz Scalability in a Secure Distributed Proof System. [Citation Graph (0, 0)][DBLP ] Pervasive, 2006, pp:220-237 [Conf ] David Kotz , Nils Nieuwejaar Dynamic file-access characteristics of a production parallel scientific workload. [Citation Graph (0, 0)][DBLP ] SC, 1994, pp:640-649 [Conf ] Vivek Khera , Owen L. Astrachan , David Kotz The internet programming contest: a report and philosophy. [Citation Graph (0, 0)][DBLP ] SIGCSE, 1993, pp:48-52 [Conf ] David Kotz A data-parallel programming library for education (DAPPLE). [Citation Graph (0, 0)][DBLP ] SIGCSE, 1995, pp:76-81 [Conf ] David Kotz , Preston Crow The Expected Lifetime of "Single-Address-Space" Operating Systems. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1994, pp:161-170 [Conf ] David Kotz , Robert S. Gray , Daniela Rus Transportable agents support worldwide applications. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1996, pp:41-48 [Conf ] Guanling Chen , David Kotz Context Aggregation and Dissemination in Ubiquitous Computing Systems. [Citation Graph (0, 0)][DBLP ] WMCSA, 2002, pp:105-0 [Conf ] Jonathan Bredin , David Kotz , Daniela Rus , Rajiv T. Maheswaran , Çagri Imer , Tamer Basar Computational Markets to Regulate Mobile-Agent Systems. [Citation Graph (0, 0)][DBLP ] Autonomous Agents and Multi-Agent Systems, 2003, v:6, n:3, pp:235-263 [Journal ] Jihwang Yeo , David Kotz , Tristan Henderson CRAWDAD: a community resource for archiving wireless data at Dartmouth. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2006, v:36, n:2, pp:21-22 [Journal ] Ron Oldfield , David Kotz Improving Data Access for Computational Grid Applications. [Citation Graph (0, 0)][DBLP ] Cluster Computing, 2006, v:9, n:1, pp:79-99 [Journal ] Omer F. Rana , David Kotz Special Issue: High Performance Agent Systems. [Citation Graph (0, 0)][DBLP ] Concurrency and Computation: Practice and Experience, 2001, v:13, n:1, pp:3-4 [Journal ] Alok N. Choudhary , David Kotz Large-Scale File Systems with the Flexibility of Databases. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1996, v:28, n:4es, pp:207- [Journal ] David Kotz , Preston Crow The Expected Lifetime of Single-Address-Space Operating Systems. [Citation Graph (0, 0)][DBLP ] Computing Systems, 1996, v:9, n:3, pp:155-178 [Journal ] David Kotz , Carla Schlatter Ellis Practical Prefetching Techniques for Multiprocessor File Systems. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 1993, v:1, n:1, pp:33-51 [Journal ] David Kotz , Robert S. Gray , Daniela Rus Mobile Agents: Future Directions for Mobile Agent Research. [Citation Graph (0, 0)][DBLP ] IEEE Distributed Systems Online, 2002, v:3, n:8, pp:- [Journal ] Ron Oldfield , David Kotz Armada: a parallel I/O framework for computational grids. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2002, v:18, n:4, pp:501-523 [Journal ] Javed A. Aslam , Sergey Bratus , David Kotz , Ronald A. Peterson , Brett Tofel , Daniela Rus The Kerf Toolkit for Intrusion Analysis. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:6, pp:42-52 [Journal ] Daniela Rus , Robert S. Gray , David Kotz Transportable Information Agents. [Citation Graph (0, 0)][DBLP ] J. Intell. Inf. Syst., 1997, v:9, n:3, pp:215-238 [Journal ] David Kotz , Carla Schlatter Ellis Caching and Writeback Policies in Parallel File Systems. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1993, v:17, n:1-2, pp:140-145 [Journal ] David Kotz , George Cybenko , Robert S. Gray , Guofei Jiang , Ronald A. Peterson , Martin O. Hofmann , Daria A. Chacón , Kenneth R. Whitebread , James A. Hendler Performance Analysis of Mobile Agents for Filtering Data Streams on Wireless Networks. [Citation Graph (0, 0)][DBLP ] MONET, 2002, v:7, n:2, pp:163-174 [Journal ] Nils Nieuwejaar , David Kotz The Galley Parallel File System. [Citation Graph (0, 0)][DBLP ] Parallel Computing, 1997, v:23, n:4-5, pp:447-476 [Journal ] Libo Song , David Kotz , Ravi Jain , Xiaoning He Evaluating location predictors with extensive Wi-Fi mobility data. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2003, v:7, n:4, pp:64-65 [Journal ] Libo Song , Udayan Deshpande , Ulas C. Kozat , David Kotz , Ravi Jain Bandwidth reservation using WLAN handoff prediction. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2006, v:10, n:4, pp:22-23 [Journal ] David Kotz Message from the Chair, Novemver 2001. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2002, v:36, n:1, pp:1- [Journal ] David Kotz , Robert S. Gray Mobile Agents and the Future of the Internet. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1999, v:33, n:3, pp:7-13 [Journal ] David Kotz , Nils Nieuwejaar Flexibility and Performance of Parallel File Systems. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1996, v:30, n:2, pp:63-73 [Journal ] Robert S. Gray , George Cybenko , David Kotz , Ronald A. Peterson , Daniela Rus D'Agents: Applications and performance of a mobile-agent system. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 2002, v:32, n:6, pp:543-573 [Journal ] Libo Song , David Kotz , Ravi Jain , Xiaoning He Evaluating Next-Cell Predictors with Extensive Wi-Fi Mobility Data. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Mob. Comput., 2006, v:5, n:12, pp:1633-1649 [Journal ] Nils Nieuwejaar , David Kotz , Apratim Purakayastha , Carla Schlatter Ellis , Michael L. Best File-Access Characteristics of Parallel Scientific Workloads. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1996, v:7, n:10, pp:1075-1089 [Journal ] David Kotz , Kobby Essien Analysis of a Campus-Wide Wireless Network. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2005, v:11, n:1-2, pp:115-133 [Journal ] Ming Li , David Kotz Group-aware Stream Filtering. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2007, pp:14- [Conf ] Libo Song , Udayan Deshpande , Ulas C. Kozat , David Kotz , Ravi Jain Predictability of WLAN Mobility and Its Effects on Bandwidth Provisioning. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Minkyong Kim , David Kotz , Songkuk Kim Extracting a Mobility Model from Real User Traces. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Apu Kapadia , Tristan Henderson , Jeffrey J. Fielding , David Kotz Virtual Walls: Protecting Digital Privacy in Pervasive Environments. [Citation Graph (0, 0)][DBLP ] Pervasive, 2007, pp:162-179 [Conf ] Minkyong Kim , David Kotz Periodic properties of user mobility and access-point popularity. [Citation Graph (0, 0)][DBLP ] Personal and Ubiquitous Computing, 2007, v:11, n:6, pp:465-479 [Journal ] Event dissemination via group-aware stream filtering. [Citation Graph (, )][DBLP ] Localized Bridging Centrality for Distributed Network Analysis. [Citation Graph (, )][DBLP ] Activity-aware ECG-based patient authentication for remote health monitoring. [Citation Graph (, )][DBLP ] Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength. [Citation Graph (, )][DBLP ] Evaluating opportunistic routing protocols with large realistic contact traces. [Citation Graph (, )][DBLP ] Anonysense: privacy-aware people-centric sensing. [Citation Graph (, )][DBLP ] Performance analysis of mobile agents for filtering data streams on wireless networks. [Citation Graph (, )][DBLP ] Refocusing in 802.11 Wireless Measurement. [Citation Graph (, )][DBLP ] AnonySense: Opportunistic and Privacy-Preserving Context Collection. [Citation Graph (, )][DBLP ] Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract). [Citation Graph (, )][DBLP ] Caching and writeback policies in parallel file systems. [Citation Graph (, )][DBLP ] Saluki: A high-performance Wi-Fi sniffing program. [Citation Graph (, )][DBLP ] Active behavioral fingerprinting of wireless devices. [Citation Graph (, )][DBLP ] On the reliability of wireless fingerprinting using clock skews. [Citation Graph (, )][DBLP ] Coordinated Sampling to Improve the Efficiency of Wireless Network Monitoring. [Citation Graph (, )][DBLP ] CRAWDAD workshop 2007. [Citation Graph (, )][DBLP ] The changing usage of a mature campus-wide wireless network. [Citation Graph (, )][DBLP ] Mesh-Mon: A multi-radio mesh monitoring and management system. [Citation Graph (, )][DBLP ] Search in 0.071secs, Finished in 0.074secs