The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Edward W. Felten: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Pei Cao, Edward W. Felten, Anna R. Karlin, Kai Li
    A Study of Integrated Prefetching and Caching Strategies. [Citation Graph (3, 0)][DBLP]
    SIGMETRICS, 1995, pp:188-197 [Conf]
  2. Matthias A. Blumrich, Kai Li, Richard Alpert, Cezary Dubnicki, Edward W. Felten, Jonathan Sandberg
    Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer. [Citation Graph (1, 0)][DBLP]
    ISCA, 1994, pp:142-153 [Conf]
  3. Pei Cao, Edward W. Felten, Kai Li
    Implementation and Performance of Application-Controlled File Caching. [Citation Graph (1, 0)][DBLP]
    OSDI, 1994, pp:165-177 [Conf]
  4. Pei Cao, Edward W. Felten, Kai Li
    Application-Controlled File Caching Policies. [Citation Graph (1, 0)][DBLP]
    USENIX Summer, 1994, pp:171-182 [Conf]
  5. Pei Cao, Edward W. Felten, Anna R. Karlin, Kai Li
    Implementation and Performance of Integrated Application-Controlled File Caching, Prefetching, and Disk Scheduling. [Citation Graph (1, 0)][DBLP]
    ACM Trans. Comput. Syst., 1996, v:14, n:4, pp:311-343 [Journal]
  6. Michael A. Schneider, Edward W. Felten
    Efficient Commerce Protocols based on One-Time Pads. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:317-0 [Conf]
  7. Stefanos N. Damianakis, Cezary Dubnicki, Edward W. Felten
    Stream Sockets on SHRIMP. [Citation Graph (0, 0)][DBLP]
    CANPC, 1997, pp:16-30 [Conf]
  8. Andrew W. Appel, Edward W. Felten
    Proof-Carrying Authentication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:52-62 [Conf]
  9. Edward W. Felten, Michael A. Schneider
    Timing attacks on Web privacy. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:25-32 [Conf]
  10. Matthias Jacob, Dan Boneh, Edward W. Felten
    Attacking an Obfuscated Cipher by Injecting Faults. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:16-31 [Conf]
  11. Brent R. Waters, Edward W. Felten, Amit Sahai
    Receiver anonymity via incomparable public keys. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:112-121 [Conf]
  12. Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten
    New client puzzle outsourcing techniques for DoS resistance. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:246-256 [Conf]
  13. Batya Friedman, W. David Hurley, Daniel C. Howe, Edward W. Felten, Helen Nissenbaum
    Users' conceptions of web security: a comparative study. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2002, pp:746-747 [Conf]
  14. Batya Friedman, W. David Hurley, Daniel C. Howe, Helen Nissenbaum, Edward W. Felten
    Users' conceptions of risks and harms on the web: a comparative study. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2002, pp:614-615 [Conf]
  15. Shirley Gaw, Edward W. Felten, Patricia Fernandez-Kelly
    Secrecy, flagging, and paranoia: adoption criteria in encrypted email. [Citation Graph (0, 0)][DBLP]
    CHI, 2006, pp:591-600 [Conf]
  16. Lynette I. Millett, Batya Friedman, Edward W. Felten
    Cookies and web browser design: toward realizing informed consent online. [Citation Graph (0, 0)][DBLP]
    CHI, 2001, pp:46-52 [Conf]
  17. Lujo Bauer, Michael A. Schneider, Edward W. Felten, Andrew W. Appel
    Access Control on the Web Using Proof-carrying Authorization. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:117-119 [Conf]
  18. Edward W. Felten, Steve W. Otto
    A Highly Parallel Chess Program. [Citation Graph (0, 0)][DBLP]
    FGCS, 1988, pp:1001-1009 [Conf]
  19. Batya Friedman, Daniel C. Howe, Edward W. Felten
    Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design. [Citation Graph (0, 0)][DBLP]
    HICSS, 2002, pp:247- [Conf]
  20. Matthias A. Blumrich, Cezary Dubnicki, Edward W. Felten, Kai Li
    Protected, User-Level DMA for the SHRIMP Network Interface. [Citation Graph (0, 0)][DBLP]
    HPCA, 1996, pp:154-165 [Conf]
  21. Liviu Iftode, Cezary Dubnicki, Edward W. Felten, Kai Li
    Improving Release-Consistent Shared Virtual Memory Using Automatic Update. [Citation Graph (0, 0)][DBLP]
    HPCA, 1996, pp:14-25 [Conf]
  22. Richard Alpert, Cezary Dubnicki, Edward W. Felten, Kai Li
    Design and Implementation of NX Message Passing Using Shrimp Virtual Memory Mapped Communication. [Citation Graph (0, 0)][DBLP]
    ICPP, Vol. 1, 1996, pp:111-119 [Conf]
  23. Edward W. Felten, Steve W. Otto, Scott Karlin
    The Traveling Salesman Problem on a Hypercubic, MIMD Computer. [Citation Graph (0, 0)][DBLP]
    ICPP, 1985, pp:6-10 [Conf]
  24. Stefanos N. Damianakis, Yuqun Chen, Edward W. Felten
    Reducing Waiting Costs in User-Level Communication. [Citation Graph (0, 0)][DBLP]
    IPPS, 1997, pp:381-387 [Conf]
  25. Cezary Dubnicki, Liviu Iftode, Edward W. Felten, Kai Li
    Software Support for Virtual Memory-Mapped Communication. [Citation Graph (0, 0)][DBLP]
    IPPS, 1996, pp:372-281 [Conf]
  26. Matthias A. Blumrich, Richard Alpert, Yuqun Chen, Douglas W. Clark, Stefanos N. Damianakis, Cezary Dubnicki, Edward W. Felten, Liviu Iftode, Kai Li, Margaret Martonosi, Robert A. Shillner
    Design Choices in the SHRIMP System: An Empirical Study. [Citation Graph (0, 0)][DBLP]
    ISCA, 1998, pp:330-341 [Conf]
  27. Matthias A. Blumrich, Kai Li, Richard Alpert, Cezary Dubnicki, Edward W. Felten, Jonathan Sandberg
    Retrospective: Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer. [Citation Graph (0, 0)][DBLP]
    25 Years ISCA: Retrospectives and Reprints, 1998, pp:92-94 [Conf]
  28. Matthias A. Blumrich, Kai Li, Richard Alpert, Cezary Dubnicki, Edward W. Felten, Jonathan Sandberg
    Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer. [Citation Graph (0, 0)][DBLP]
    25 Years ISCA: Retrospectives and Reprints, 1998, pp:473-484 [Conf]
  29. Edward W. Felten, Richard Alpert, Angelos Bilas, Matthias A. Blumrich, Douglas W. Clark, Stefanos N. Damianakis, Cezary Dubnicki, Liviu Iftode, Kai Li
    Early Experience with Message-Passing on the SHRIMP Multicomputer. [Citation Graph (0, 0)][DBLP]
    ISCA, 1996, pp:296-307 [Conf]
  30. Gordon Stoll, Bin Wei, Douglas W. Clark, Edward W. Felten, Kai Li, Pat Hanrahan
    Evaluating Multi-Port Frame Buffer Designs for a Mesh-Connected Multicomputer. [Citation Graph (0, 0)][DBLP]
    ISCA, 1995, pp:96-105 [Conf]
  31. Edward W. Felten
    Dr. Felton Goes to Washington: A Personal View of the Microsoft Antitrust Case. [Citation Graph (0, 0)][DBLP]
    LISA, 2000, pp:- [Conf]
  32. Tracy Kimbrel, Andrew Tomkins, R. Hugo Patterson, Brian N. Bershad, Pei Cao, Edward W. Felten, Garth A. Gibson, Anna R. Karlin, Kai Li
    A Trace-Driven Comparison of Algorithms for Parallel Prefetching and Caching. [Citation Graph (0, 0)][DBLP]
    OSDI, 1996, pp:19-34 [Conf]
  33. Juan Alemany, Edward W. Felten
    Performance Issues in Non-blocking Synchronization on Shared-memory Multiprocessors. [Citation Graph (0, 0)][DBLP]
    PODC, 1992, pp:125-134 [Conf]
  34. Minwen Ji, Edward W. Felten, Kai Li
    Performance Measurements for Multithreaded Programs. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1998, pp:161-170 [Conf]
  35. Tracy Kimbrel, Pei Cao, Edward W. Felten, Anna R. Karlin, Kai Li
    Integrating Parallel Prefetching and Caching. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1996, pp:262-263 [Conf]
  36. Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten
    Extensible Security Architecture for Java. [Citation Graph (0, 0)][DBLP]
    SOSP, 1997, pp:116-128 [Conf]
  37. Drew Dean, Edward W. Felten, Dan S. Wallach
    Java Security: From HotJava to Netscape and Beyond. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:190-200 [Conf]
  38. Lujo Bauer, Michael A. Schneider, Edward W. Felten
    A General and Flexible Access-Control System for the Web. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:93-108 [Conf]
  39. J. Alex Halderman, Brent R. Waters, Edward W. Felten
    Privacy management for portable recording devices. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:16-24 [Conf]
  40. J. Alex Halderman, Brent Waters, Edward W. Felten
    A convenient method for securely managing passwords. [Citation Graph (0, 0)][DBLP]
    WWW, 2005, pp:471-479 [Conf]
  41. Andrew W. Appel, Edward W. Felten
    Technological access control interferes with noninfringing scholarship. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:9, pp:21-23 [Journal]
  42. Edward W. Felten
    A skeptical view of DRM and fair use. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:4, pp:56-59 [Journal]
  43. Edward W. Felten
    DRM and public policy. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:7, pp:112- [Journal]
  44. Edward W. Felten
    Webware Security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:4, pp:130- [Journal]
  45. Paul Messina, Clive F. Baillie, Edward W. Felten, Paul Hipes, Ray Williams, Arnold Alagar, Anke Kamrath, Robert Leary, Wayne Pfeiffer, Jack M. Rogers, David Walker
    Benchmarking Advanced Architecture Computers. [Citation Graph (0, 0)][DBLP]
    Concurrency - Practice and Experience, 1990, v:2, n:3, pp:195-255 [Journal]
  46. Helen Nissenbaum, Batya Friedman, Edward W. Felten
    Computer Security: Competing Concepts [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  47. Edward W. Felten
    Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:60-62 [Journal]
  48. Edward W. Felten, J. Alex Halderman
    Digital Rights Management, Spyware, and Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:18-23 [Journal]
  49. Gary McGraw, Edward W. Felten
    Mobile Code and Security - Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:6, pp:26-29 [Journal]
  50. Angelos Bilas, Edward W. Felten
    Fast RPC on the SHRIMP Virtual Memory Mapped Network Interface. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1997, v:40, n:1, pp:138-146 [Journal]
  51. Matthias A. Blumrich, Cezary Dubnicki, Edward W. Felten, Kai Li, Malena R. Mesarina
    Virtual-Memory-Mapped Network Interfaces. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 1995, v:15, n:1, pp:21-28 [Journal]
  52. John Viega, Tom Mutdosch, Gary McGraw, Edward W. Felten
    Statically Scanning Java Code: Finding Security Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  53. Lujo Bauer, Andrew W. Appel, Edward W. Felten
    Mechanisms for secure modular programming in Java. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2003, v:33, n:5, pp:461-480 [Journal]
  54. Dan S. Wallach, Andrew W. Appel, Edward W. Felten
    SAFKASI: a security mechanism for language-based systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:4, pp:341-378 [Journal]

  55. Coping with Outside-the-Box Attacks. [Citation Graph (, )][DBLP]


  56. Understanding Java Stack Inspection. [Citation Graph (, )][DBLP]


  57. Fingerprinting Blank Paper Using Commodity Scanners. [Citation Graph (, )][DBLP]


  58. In Defense of Pseudorandom Sample Selection. [Citation Graph (, )][DBLP]


  59. Lest We Remember: Cold Boot Attacks on Encryption Keys. [Citation Graph (, )][DBLP]


  60. Password management strategies for online accounts. [Citation Graph (, )][DBLP]


  61. Lest we remember: cold-boot attacks on encryption keys. [Citation Graph (, )][DBLP]


Search in 0.008secs, Finished in 0.424secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002