The SCEAS System
Navigation Menu

Search the dblp DataBase


Emilia Rosti: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Emilia Rosti, Evgenia Smirni, Thomas D. Wagner, Amy W. Apon, Lawrence W. Dowdy
    The KSR1: Experimentation and Modeling of Poststore. [Citation Graph (1, 0)][DBLP]
    SIGMETRICS, 1993, pp:74-85 [Conf]
  2. Arianna Arona, Danilo Bruschi, Emilia Rosti
    Adding Availability to Log Services of Untrusted Machines. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:199-0 [Conf]
  3. Roberto Barbieri, Danilo Bruschi, Emilia Rosti
    Voice over IPsec: Analysis and Solutions. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:261-270 [Conf]
  4. Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
    Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:188-195 [Conf]
  5. Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
    How to unwittingly sign non-repudiable documents with Java applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:192-196 [Conf]
  6. Danilo Bruschi, A. Ornaghi, Emilia Rosti
    S-ARP: a Secure Address Resolution Protocol. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:66-75 [Conf]
  7. Paolo Cremonesi, Emilia Rosti, Giuseppe Serazzi
    Xaba: Exact, Approximate, and Asymptotic Solvers for Multi-class Closed Queueing Networks. [Citation Graph (0, 0)][DBLP]
    Computer Performance Evaluation / TOOLS, 2000, pp:71-85 [Conf]
  8. Danilo Bruschi, Fiorella de Cindio, D. Ferrazzi, G. Poletti, Emilia Rosti
    Internet Voting: Do people accept it? Do they trust it? [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:437-440 [Conf]
  9. Danilo Bruschi, Emilia Rosti, R. Banfi
    A Tool for Pro-active Defense Against the Buffer Overrun Attack. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:17-31 [Conf]
  10. Evgenia Smirni, Emilia Rosti
    Modeling speedup of SPMD applications on the Intel Paragon: a case study. [Citation Graph (0, 0)][DBLP]
    HPCN Europe, 1995, pp:94-101 [Conf]
  11. Evgenia Smirni, Emilia Rosti, Giuseppe Serazzi, Lawrence W. Dowdy, Kenneth C. Sevcik
    Performance Gains from Leaving Idle Processors in Multiprocessor Systems. [Citation Graph (0, 0)][DBLP]
    ICPP (3), 1995, pp:203-210 [Conf]
  12. Emilia Rosti, Evgenia Smirni, Giuseppe Serazzi, Lawrence W. Dowdy
    Analysis of Non-Work-Conserving Processor Partitioning Policies. [Citation Graph (0, 0)][DBLP]
    JSSPP, 1995, pp:165-181 [Conf]
  13. Emilia Rosti, Francesco Schiavoni, Giuseppe Serazzi
    Queueing Network Models with Two Classes of Customers. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1997, pp:229-234 [Conf]
  14. Evgenia Smirni, C. A. Childers, Emilia Rosti, Lawrence W. Dowdy
    Thread Placement on the Intel Paragon: Modeling and Experimentation. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1995, pp:226-231 [Conf]
  15. Stefano Basagni, Kris Herrin, Danilo Bruschi, Emilia Rosti
    Secure pebblenets. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2001, pp:156-163 [Conf]
  16. Danilo Bruschi, Emilia Rosti
    AngeL: a tool to disarm computer systems. [Citation Graph (0, 0)][DBLP]
    NSPW, 2001, pp:63-69 [Conf]
  17. Emilia Rosti, Giuseppe Serazzi, Evgenia Smirni, Mark S. Squillante
    The Impact of I/O on Program Behavior and Parallel Scheduling. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1998, pp:56-65 [Conf]
  18. Danilo Bruschi, A. Curti, Emilia Rosti
    A quantitative study of Public Key Infrastructures. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:1, pp:56-67 [Journal]
  19. Danilo Bruschi, Emilia Rosti
    Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues. [Citation Graph (0, 0)][DBLP]
    MONET, 2002, v:7, n:6, pp:503-511 [Journal]
  20. Paolo Cremonesi, Emilia Rosti, Giuseppe Serazzi, Evgenia Smirni
    Performance evaluation of parallel systems. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1999, v:25, n:13-14, pp:1677-1698 [Journal]
  21. Emilia Rosti, Evgenia Smirni, Lawrence W. Dowdy, Giuseppe Serazzi, Brian M. Carlson
    Robust Partitioning Policies of Multiprocessor Systems. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 1994, v:19, n:2-3, pp:141-165 [Journal]
  22. Lawrence W. Dowdy, Emilia Rosti, Giuseppe Serazzi, Evgenia Smirni
    Scheduling issues in high-performance computing. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS Performance Evaluation Review, 1999, v:26, n:4, pp:60-69 [Journal]
  23. Emilia Rosti, Evgenia Smirni, Lawrence W. Dowdy, Giuseppe Serazzi, Kenneth C. Sevcik
    Processor Saving Scheduling Policies for Multiprocessor Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1998, v:47, n:2, pp:178-189 [Journal]
  24. Emilia Rosti, Giuseppe Serazzi, Evgenia Smirni, Mark S. Squillante
    Models of Parallel Applications with Large Computation and I/O Requirements. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2002, v:28, n:3, pp:286-307 [Journal]

Search in 0.037secs, Finished in 0.038secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002