Search the dblp DataBase
David Evans :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Nathanael Paul , David Evans .NET Security: Lessons Learned and Missed from Java. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:272-281 [Conf ] David Evans An architecture for enforcement of usage contracts in distributed multimedia systems. [Citation Graph (0, 0)][DBLP ] CASCON, 1996, pp:10- [Conf ] Johnny W. Wong , David Evans , Michael Kwok On staleness and the delivery of web pages. [Citation Graph (0, 0)][DBLP ] CASCON, 2001, pp:17- [Conf ] Max Chacón , Cristopher Blanco , Ronney Panerai , David Evans Nonlinear Modeling of Dynamic Cerebral Autoregulation Using Recurrent Neural Networks. [Citation Graph (0, 0)][DBLP ] CIARP, 2005, pp:205-213 [Conf ] Max Chacón , Darwin Diaz , Luis Ríos , David Evans , Ronney Panerai Support Vector Machine with External Recurrences for Modeling Dynamic Cerebral Autoregulation. [Citation Graph (0, 0)][DBLP ] CIARP, 2006, pp:954-963 [Conf ] Karsten Nohl , David Evans Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:228-237 [Conf ] David Evans , Raimondas Lencevicius Second International Workshop on Dynamic Analysis (WODA 2004). [Citation Graph (0, 0)][DBLP ] ICSE, 2004, pp:763- [Conf ] David Evans , Michael Peck Inculcating invariants in introductory courses. [Citation Graph (0, 0)][DBLP ] ICSE, 2006, pp:673-678 [Conf ] Jinlin Yang , David Evans , Deepali Bhardwaj , Thirumalesh Bhat , Manuvir Das Perracotta: mining temporal API rules from imperfect traces. [Citation Graph (0, 0)][DBLP ] ICSE, 2006, pp:282-291 [Conf ] David Evans , Andries van Dam Data Structure Programming System. [Citation Graph (0, 0)][DBLP ] IFIP Congress (1), 1968, pp:557-564 [Conf ] Jinlin Yang , David Evans Automatically Inferring Temporal Properties for Program Evolution . [Citation Graph (0, 0)][DBLP ] ISSRE, 2004, pp:340-351 [Conf ] Lingxuan Hu , David Evans Localization for mobile sensor networks. [Citation Graph (0, 0)][DBLP ] MOBICOM, 2004, pp:45-57 [Conf ] Lingxuan Hu , David Evans Using Directional Antennas to Prevent Wormhole Attacks. [Citation Graph (0, 0)][DBLP ] NDSS, 2004, pp:- [Conf ] Jinlin Yang , David Evans Dynamically inferring temporal properties. [Citation Graph (0, 0)][DBLP ] PASTE, 2004, pp:23-28 [Conf ] David Evans Static Detection of Dynamic Memory Errors. [Citation Graph (0, 0)][DBLP ] PLDI, 1996, pp:44-53 [Conf ] Keen Browne , Jon McCune , Adam Trost , David Evans , David C. Brogan Behavior Combination and Swarm Programming. [Citation Graph (0, 0)][DBLP ] RoboCup, 2001, pp:499-502 [Conf ] Lingxuan Hu , David Evans Secure Aggregation for Wireless Network. [Citation Graph (0, 0)][DBLP ] SAINT Workshops, 2003, pp:384-394 [Conf ] Anh Nguyen-Tuong , Salvatore Guarnieri , Doug Greene , Jeff Shirley , David Evans Automatically Hardening Web Applications Using Precise Tainting. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:295-308 [Conf ] David Evans , John V. Guttag , James J. Horning , Yang Meng Tan LCLint: A Tool for Using Specifications to Check Code. [Citation Graph (0, 0)][DBLP ] SIGSOFT FSE, 1994, pp:87-96 [Conf ] David Evans , Andrew Twyman Flexible Policy-Directed Code Safety. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1999, pp:32-45 [Conf ] David Evans What Biology Can (and Can't) Teach Us About Security. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:- [Conf ] Selvin George , David Evans , Lance Davidson A biologically inspired programming model for self-healing systems. [Citation Graph (0, 0)][DBLP ] WOSS, 2002, pp:102-104 [Conf ] Wei Hu , Jason Hiser , Daniel Williams , Adrian Filipi , Jack W. Davidson , David Evans , John C. Knight , Anh Nguyen-Tuong , Jonathan C. Rowanhill Secure and practical defense against code-injection attacks using software dynamic translation. [Citation Graph (0, 0)][DBLP ] VEE, 2006, pp:2-12 [Conf ] Yonggang Du , Christoph Herrmann , Klaus Peter May , David Evans A flat wireless ATM LAN architecture with distributed ATM switching in base stations. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:9-10, pp:931-942 [Journal ] Nathanael Paul , David Evans Comparing Java and .NET security: Lessons learned and missed. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:5, pp:338-350 [Journal ] Gregory E. Graham , M. Anzar Afaq , David Evans , Gerald Guglielmo , Eric Wicklund , Peter Love Contextual constraint modeling in Grid application workflows. [Citation Graph (0, 0)][DBLP ] Concurrency and Computation: Practice and Experience, 2006, v:18, n:10, pp:1277-1292 [Journal ] Gregory E. Graham , David Evans , Iain Bertram McRunjob: A High Energy Physics Workflow Planner for Grid Production Processing [Citation Graph (0, 0)][DBLP ] CoRR, 2003, v:0, n:, pp:- [Journal ] Johnny W. Wong , Kelly A. Lyons , David Evans , Rolf J. Velthuys , Gregor von Bochmann , Eric Dubois , Nicolas D. Georganas , Gerald W. Neufeld , M. Tamer Özsu , Jeff Brinskelle , Abdelhakim Hafid , Norman C. Hutchinson , Paul Iglinski , Brigitte Kerhervé , Louise Lamont , Dwight J. Makaroff , Duane Szafron Enabling Technology for Distributed Multimedia Applications. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 1997, v:36, n:4, pp:489-507 [Journal ] David Evans , Nathanael Paul Election Security: Perception and Reality. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:1, pp:24-31 [Journal ] Kang Zhuo , Li Yan , Hugo de Garis , David Evans , Lishan Kang Multi-modal function optimization with the ZEDS (zoomed evolutionary dual strategy) algorithmzoomed evolutionary algorithm. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Math., 2004, v:81, n:6, pp:675-684 [Journal ] Johnny W. Wong , David Evans , Michael Kwok On Staleness and the Delivery of Web Pages. [Citation Graph (0, 0)][DBLP ] Information Systems Frontiers, 2003, v:5, n:2, pp:129-136 [Journal ] David Evans , David Larochelle Improving Security Using Extensible Lightweight Static Analysis. [Citation Graph (0, 0)][DBLP ] IEEE Software, 2002, v:19, n:1, pp:42-51 [Journal ] Simone Leão , Ian Bishop , David Evans Spatial-temporal model for demand and allocation of waste landfills in growing urban regions. [Citation Graph (0, 0)][DBLP ] Computers, Environment and Urban Systems, 2004, v:28, n:4, pp:353-385 [Journal ] Mahnas Jean Mohammadi-Aragh , Ikuko Fujisaki , Derek Irby , David Evans , Robert Moorhead , Scott Roberts Visualization of Computer-Modeled Forests for Forest Management. [Citation Graph (0, 0)][DBLP ] EuroVis, 2005, pp:183-190 [Conf ] Gregory E. Graham , M. Anzar Afaq , David Evans , Gerald Guglielmo , Eric Wicklund , Peter Love Contextual Constraint Modeling in Grid Application Workflows [Citation Graph (0, 0)][DBLP ] CoRR, 2005, v:0, n:, pp:- [Journal ] Privacy through Noise: A Design Space for Private Identification. [Citation Graph (, )][DBLP ] Towards middleware-aware integration of event-based communication into the Palladio component model. [Citation Graph (, )][DBLP ] Security through redundant data diversity. [Citation Graph (, )][DBLP ] Towards a Complex Automata Multiscale Model of In-Stent Restenosis. [Citation Graph (, )][DBLP ] Data Quality? Don't Waste Your Time. [Citation Graph (, )][DBLP ] Deontic logic for modelling data flow and use compliance. [Citation Graph (, )][DBLP ] Context-Derived Pseudonyms for Protection of Privacy in Transport Middleware and Applications. [Citation Graph (, )][DBLP ] Hiding in Groups: On the Expressiveness of Privacy Distributions. [Citation Graph (, )][DBLP ] Reverse-Engineering a Cryptographic RFID Tag. [Citation Graph (, )][DBLP ] Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans. [Citation Graph (, )][DBLP ] Toasters, Seat Belts, and Inferring Program Properties. [Citation Graph (, )][DBLP ] Dynamic term selection in learning a query from examples. [Citation Graph (, )][DBLP ] Specifying Adverse Drug Reactions by Formulating Contexts. [Citation Graph (, )][DBLP ] Search in 0.022secs, Finished in 0.026secs