The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David Evans: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nathanael Paul, David Evans
    .NET Security: Lessons Learned and Missed from Java. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:272-281 [Conf]
  2. David Evans
    An architecture for enforcement of usage contracts in distributed multimedia systems. [Citation Graph (0, 0)][DBLP]
    CASCON, 1996, pp:10- [Conf]
  3. Johnny W. Wong, David Evans, Michael Kwok
    On staleness and the delivery of web pages. [Citation Graph (0, 0)][DBLP]
    CASCON, 2001, pp:17- [Conf]
  4. Max Chacón, Cristopher Blanco, Ronney Panerai, David Evans
    Nonlinear Modeling of Dynamic Cerebral Autoregulation Using Recurrent Neural Networks. [Citation Graph (0, 0)][DBLP]
    CIARP, 2005, pp:205-213 [Conf]
  5. Max Chacón, Darwin Diaz, Luis Ríos, David Evans, Ronney Panerai
    Support Vector Machine with External Recurrences for Modeling Dynamic Cerebral Autoregulation. [Citation Graph (0, 0)][DBLP]
    CIARP, 2006, pp:954-963 [Conf]
  6. Karsten Nohl, David Evans
    Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:228-237 [Conf]
  7. David Evans, Raimondas Lencevicius
    Second International Workshop on Dynamic Analysis (WODA 2004). [Citation Graph (0, 0)][DBLP]
    ICSE, 2004, pp:763- [Conf]
  8. David Evans, Michael Peck
    Inculcating invariants in introductory courses. [Citation Graph (0, 0)][DBLP]
    ICSE, 2006, pp:673-678 [Conf]
  9. Jinlin Yang, David Evans, Deepali Bhardwaj, Thirumalesh Bhat, Manuvir Das
    Perracotta: mining temporal API rules from imperfect traces. [Citation Graph (0, 0)][DBLP]
    ICSE, 2006, pp:282-291 [Conf]
  10. David Evans, Andries van Dam
    Data Structure Programming System. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (1), 1968, pp:557-564 [Conf]
  11. Jinlin Yang, David Evans
    Automatically Inferring Temporal Properties for Program Evolution . [Citation Graph (0, 0)][DBLP]
    ISSRE, 2004, pp:340-351 [Conf]
  12. Lingxuan Hu, David Evans
    Localization for mobile sensor networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2004, pp:45-57 [Conf]
  13. Lingxuan Hu, David Evans
    Using Directional Antennas to Prevent Wormhole Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  14. Jinlin Yang, David Evans
    Dynamically inferring temporal properties. [Citation Graph (0, 0)][DBLP]
    PASTE, 2004, pp:23-28 [Conf]
  15. David Evans
    Static Detection of Dynamic Memory Errors. [Citation Graph (0, 0)][DBLP]
    PLDI, 1996, pp:44-53 [Conf]
  16. Keen Browne, Jon McCune, Adam Trost, David Evans, David C. Brogan
    Behavior Combination and Swarm Programming. [Citation Graph (0, 0)][DBLP]
    RoboCup, 2001, pp:499-502 [Conf]
  17. Lingxuan Hu, David Evans
    Secure Aggregation for Wireless Network. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2003, pp:384-394 [Conf]
  18. Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans
    Automatically Hardening Web Applications Using Precise Tainting. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:295-308 [Conf]
  19. David Evans, John V. Guttag, James J. Horning, Yang Meng Tan
    LCLint: A Tool for Using Specifications to Check Code. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 1994, pp:87-96 [Conf]
  20. David Evans, Andrew Twyman
    Flexible Policy-Directed Code Safety. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:32-45 [Conf]
  21. David Evans
    What Biology Can (and Can't) Teach Us About Security. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:- [Conf]
  22. Selvin George, David Evans, Lance Davidson
    A biologically inspired programming model for self-healing systems. [Citation Graph (0, 0)][DBLP]
    WOSS, 2002, pp:102-104 [Conf]
  23. Wei Hu, Jason Hiser, Daniel Williams, Adrian Filipi, Jack W. Davidson, David Evans, John C. Knight, Anh Nguyen-Tuong, Jonathan C. Rowanhill
    Secure and practical defense against code-injection attacks using software dynamic translation. [Citation Graph (0, 0)][DBLP]
    VEE, 2006, pp:2-12 [Conf]
  24. Yonggang Du, Christoph Herrmann, Klaus Peter May, David Evans
    A flat wireless ATM LAN architecture with distributed ATM switching in base stations. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:9-10, pp:931-942 [Journal]
  25. Nathanael Paul, David Evans
    Comparing Java and .NET security: Lessons learned and missed. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:5, pp:338-350 [Journal]
  26. Gregory E. Graham, M. Anzar Afaq, David Evans, Gerald Guglielmo, Eric Wicklund, Peter Love
    Contextual constraint modeling in Grid application workflows. [Citation Graph (0, 0)][DBLP]
    Concurrency and Computation: Practice and Experience, 2006, v:18, n:10, pp:1277-1292 [Journal]
  27. Gregory E. Graham, David Evans, Iain Bertram
    McRunjob: A High Energy Physics Workflow Planner for Grid Production Processing [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  28. Johnny W. Wong, Kelly A. Lyons, David Evans, Rolf J. Velthuys, Gregor von Bochmann, Eric Dubois, Nicolas D. Georganas, Gerald W. Neufeld, M. Tamer Özsu, Jeff Brinskelle, Abdelhakim Hafid, Norman C. Hutchinson, Paul Iglinski, Brigitte Kerhervé, Louise Lamont, Dwight J. Makaroff, Duane Szafron
    Enabling Technology for Distributed Multimedia Applications. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1997, v:36, n:4, pp:489-507 [Journal]
  29. David Evans, Nathanael Paul
    Election Security: Perception and Reality. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:24-31 [Journal]
  30. Kang Zhuo, Li Yan, Hugo de Garis, David Evans, Lishan Kang
    Multi-modal function optimization with the ZEDS (zoomed evolutionary dual strategy) algorithmzoomed evolutionary algorithm. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Math., 2004, v:81, n:6, pp:675-684 [Journal]
  31. Johnny W. Wong, David Evans, Michael Kwok
    On Staleness and the Delivery of Web Pages. [Citation Graph (0, 0)][DBLP]
    Information Systems Frontiers, 2003, v:5, n:2, pp:129-136 [Journal]
  32. David Evans, David Larochelle
    Improving Security Using Extensible Lightweight Static Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2002, v:19, n:1, pp:42-51 [Journal]
  33. Simone Leão, Ian Bishop, David Evans
    Spatial-temporal model for demand and allocation of waste landfills in growing urban regions. [Citation Graph (0, 0)][DBLP]
    Computers, Environment and Urban Systems, 2004, v:28, n:4, pp:353-385 [Journal]
  34. Mahnas Jean Mohammadi-Aragh, Ikuko Fujisaki, Derek Irby, David Evans, Robert Moorhead, Scott Roberts
    Visualization of Computer-Modeled Forests for Forest Management. [Citation Graph (0, 0)][DBLP]
    EuroVis, 2005, pp:183-190 [Conf]
  35. Gregory E. Graham, M. Anzar Afaq, David Evans, Gerald Guglielmo, Eric Wicklund, Peter Love
    Contextual Constraint Modeling in Grid Application Workflows [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]

  36. Privacy through Noise: A Design Space for Private Identification. [Citation Graph (, )][DBLP]


  37. Towards middleware-aware integration of event-based communication into the Palladio component model. [Citation Graph (, )][DBLP]


  38. Security through redundant data diversity. [Citation Graph (, )][DBLP]


  39. Towards a Complex Automata Multiscale Model of In-Stent Restenosis. [Citation Graph (, )][DBLP]


  40. Data Quality? Don't Waste Your Time. [Citation Graph (, )][DBLP]


  41. Deontic logic for modelling data flow and use compliance. [Citation Graph (, )][DBLP]


  42. Context-Derived Pseudonyms for Protection of Privacy in Transport Middleware and Applications. [Citation Graph (, )][DBLP]


  43. Hiding in Groups: On the Expressiveness of Privacy Distributions. [Citation Graph (, )][DBLP]


  44. Reverse-Engineering a Cryptographic RFID Tag. [Citation Graph (, )][DBLP]


  45. Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans. [Citation Graph (, )][DBLP]


  46. Toasters, Seat Belts, and Inferring Program Properties. [Citation Graph (, )][DBLP]


  47. Dynamic term selection in learning a query from examples. [Citation Graph (, )][DBLP]


  48. Specifying Adverse Drug Reactions by Formulating Contexts. [Citation Graph (, )][DBLP]


Search in 0.016secs, Finished in 0.019secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002