Search the dblp DataBase
Edward W. Felten :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Pei Cao , Edward W. Felten , Anna R. Karlin , Kai Li A Study of Integrated Prefetching and Caching Strategies. [Citation Graph (3, 0)][DBLP ] SIGMETRICS, 1995, pp:188-197 [Conf ] Matthias A. Blumrich , Kai Li , Richard Alpert , Cezary Dubnicki , Edward W. Felten , Jonathan Sandberg Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer. [Citation Graph (1, 0)][DBLP ] ISCA, 1994, pp:142-153 [Conf ] Pei Cao , Edward W. Felten , Kai Li Implementation and Performance of Application-Controlled File Caching. [Citation Graph (1, 0)][DBLP ] OSDI, 1994, pp:165-177 [Conf ] Pei Cao , Edward W. Felten , Kai Li Application-Controlled File Caching Policies. [Citation Graph (1, 0)][DBLP ] USENIX Summer, 1994, pp:171-182 [Conf ] Pei Cao , Edward W. Felten , Anna R. Karlin , Kai Li Implementation and Performance of Integrated Application-Controlled File Caching, Prefetching, and Disk Scheduling. [Citation Graph (1, 0)][DBLP ] ACM Trans. Comput. Syst., 1996, v:14, n:4, pp:311-343 [Journal ] Michael A. Schneider , Edward W. Felten Efficient Commerce Protocols based on One-Time Pads. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:317-0 [Conf ] Stefanos N. Damianakis , Cezary Dubnicki , Edward W. Felten Stream Sockets on SHRIMP. [Citation Graph (0, 0)][DBLP ] CANPC, 1997, pp:16-30 [Conf ] Andrew W. Appel , Edward W. Felten Proof-Carrying Authentication. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1999, pp:52-62 [Conf ] Edward W. Felten , Michael A. Schneider Timing attacks on Web privacy. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:25-32 [Conf ] Matthias Jacob , Dan Boneh , Edward W. Felten Attacking an Obfuscated Cipher by Injecting Faults. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2002, pp:16-31 [Conf ] Brent R. Waters , Edward W. Felten , Amit Sahai Receiver anonymity via incomparable public keys. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:112-121 [Conf ] Brent Waters , Ari Juels , J. Alex Halderman , Edward W. Felten New client puzzle outsourcing techniques for DoS resistance. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:246-256 [Conf ] Batya Friedman , W. David Hurley , Daniel C. Howe , Edward W. Felten , Helen Nissenbaum Users' conceptions of web security: a comparative study. [Citation Graph (0, 0)][DBLP ] CHI Extended Abstracts, 2002, pp:746-747 [Conf ] Batya Friedman , W. David Hurley , Daniel C. Howe , Helen Nissenbaum , Edward W. Felten Users' conceptions of risks and harms on the web: a comparative study. [Citation Graph (0, 0)][DBLP ] CHI Extended Abstracts, 2002, pp:614-615 [Conf ] Shirley Gaw , Edward W. Felten , Patricia Fernandez-Kelly Secrecy, flagging, and paranoia: adoption criteria in encrypted email. [Citation Graph (0, 0)][DBLP ] CHI, 2006, pp:591-600 [Conf ] Lynette I. Millett , Batya Friedman , Edward W. Felten Cookies and web browser design: toward realizing informed consent online. [Citation Graph (0, 0)][DBLP ] CHI, 2001, pp:46-52 [Conf ] Lujo Bauer , Michael A. Schneider , Edward W. Felten , Andrew W. Appel Access Control on the Web Using Proof-carrying Authorization. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:117-119 [Conf ] Edward W. Felten , Steve W. Otto A Highly Parallel Chess Program. [Citation Graph (0, 0)][DBLP ] FGCS, 1988, pp:1001-1009 [Conf ] Batya Friedman , Daniel C. Howe , Edward W. Felten Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design. [Citation Graph (0, 0)][DBLP ] HICSS, 2002, pp:247- [Conf ] Matthias A. Blumrich , Cezary Dubnicki , Edward W. Felten , Kai Li Protected, User-Level DMA for the SHRIMP Network Interface. [Citation Graph (0, 0)][DBLP ] HPCA, 1996, pp:154-165 [Conf ] Liviu Iftode , Cezary Dubnicki , Edward W. Felten , Kai Li Improving Release-Consistent Shared Virtual Memory Using Automatic Update. [Citation Graph (0, 0)][DBLP ] HPCA, 1996, pp:14-25 [Conf ] Richard Alpert , Cezary Dubnicki , Edward W. Felten , Kai Li Design and Implementation of NX Message Passing Using Shrimp Virtual Memory Mapped Communication. [Citation Graph (0, 0)][DBLP ] ICPP, Vol. 1, 1996, pp:111-119 [Conf ] Edward W. Felten , Steve W. Otto , Scott Karlin The Traveling Salesman Problem on a Hypercubic, MIMD Computer. [Citation Graph (0, 0)][DBLP ] ICPP, 1985, pp:6-10 [Conf ] Stefanos N. Damianakis , Yuqun Chen , Edward W. Felten Reducing Waiting Costs in User-Level Communication. [Citation Graph (0, 0)][DBLP ] IPPS, 1997, pp:381-387 [Conf ] Cezary Dubnicki , Liviu Iftode , Edward W. Felten , Kai Li Software Support for Virtual Memory-Mapped Communication. [Citation Graph (0, 0)][DBLP ] IPPS, 1996, pp:372-281 [Conf ] Matthias A. Blumrich , Richard Alpert , Yuqun Chen , Douglas W. Clark , Stefanos N. Damianakis , Cezary Dubnicki , Edward W. Felten , Liviu Iftode , Kai Li , Margaret Martonosi , Robert A. Shillner Design Choices in the SHRIMP System: An Empirical Study. [Citation Graph (0, 0)][DBLP ] ISCA, 1998, pp:330-341 [Conf ] Matthias A. Blumrich , Kai Li , Richard Alpert , Cezary Dubnicki , Edward W. Felten , Jonathan Sandberg Retrospective: Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer. [Citation Graph (0, 0)][DBLP ] 25 Years ISCA: Retrospectives and Reprints, 1998, pp:92-94 [Conf ] Matthias A. Blumrich , Kai Li , Richard Alpert , Cezary Dubnicki , Edward W. Felten , Jonathan Sandberg Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer. [Citation Graph (0, 0)][DBLP ] 25 Years ISCA: Retrospectives and Reprints, 1998, pp:473-484 [Conf ] Edward W. Felten , Richard Alpert , Angelos Bilas , Matthias A. Blumrich , Douglas W. Clark , Stefanos N. Damianakis , Cezary Dubnicki , Liviu Iftode , Kai Li Early Experience with Message-Passing on the SHRIMP Multicomputer. [Citation Graph (0, 0)][DBLP ] ISCA, 1996, pp:296-307 [Conf ] Gordon Stoll , Bin Wei , Douglas W. Clark , Edward W. Felten , Kai Li , Pat Hanrahan Evaluating Multi-Port Frame Buffer Designs for a Mesh-Connected Multicomputer. [Citation Graph (0, 0)][DBLP ] ISCA, 1995, pp:96-105 [Conf ] Edward W. Felten Dr. Felton Goes to Washington: A Personal View of the Microsoft Antitrust Case. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:- [Conf ] Tracy Kimbrel , Andrew Tomkins , R. Hugo Patterson , Brian N. Bershad , Pei Cao , Edward W. Felten , Garth A. Gibson , Anna R. Karlin , Kai Li A Trace-Driven Comparison of Algorithms for Parallel Prefetching and Caching. [Citation Graph (0, 0)][DBLP ] OSDI, 1996, pp:19-34 [Conf ] Juan Alemany , Edward W. Felten Performance Issues in Non-blocking Synchronization on Shared-memory Multiprocessors. [Citation Graph (0, 0)][DBLP ] PODC, 1992, pp:125-134 [Conf ] Minwen Ji , Edward W. Felten , Kai Li Performance Measurements for Multithreaded Programs. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1998, pp:161-170 [Conf ] Tracy Kimbrel , Pei Cao , Edward W. Felten , Anna R. Karlin , Kai Li Integrating Parallel Prefetching and Caching. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1996, pp:262-263 [Conf ] Dan S. Wallach , Dirk Balfanz , Drew Dean , Edward W. Felten Extensible Security Architecture for Java. [Citation Graph (0, 0)][DBLP ] SOSP, 1997, pp:116-128 [Conf ] Drew Dean , Edward W. Felten , Dan S. Wallach Java Security: From HotJava to Netscape and Beyond. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:190-200 [Conf ] Lujo Bauer , Michael A. Schneider , Edward W. Felten A General and Flexible Access-Control System for the Web. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:93-108 [Conf ] J. Alex Halderman , Brent R. Waters , Edward W. Felten Privacy management for portable recording devices. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:16-24 [Conf ] J. Alex Halderman , Brent Waters , Edward W. Felten A convenient method for securely managing passwords. [Citation Graph (0, 0)][DBLP ] WWW, 2005, pp:471-479 [Conf ] Andrew W. Appel , Edward W. Felten Technological access control interferes with noninfringing scholarship. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:9, pp:21-23 [Journal ] Edward W. Felten A skeptical view of DRM and fair use. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:4, pp:56-59 [Journal ] Edward W. Felten DRM and public policy. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:7, pp:112- [Journal ] Edward W. Felten Webware Security. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1997, v:40, n:4, pp:130- [Journal ] Paul Messina , Clive F. Baillie , Edward W. Felten , Paul Hipes , Ray Williams , Arnold Alagar , Anke Kamrath , Robert Leary , Wayne Pfeiffer , Jack M. Rogers , David Walker Benchmarking Advanced Architecture Computers. [Citation Graph (0, 0)][DBLP ] Concurrency - Practice and Experience, 1990, v:2, n:3, pp:195-255 [Journal ] Helen Nissenbaum , Batya Friedman , Edward W. Felten Computer Security: Competing Concepts [Citation Graph (0, 0)][DBLP ] CoRR, 2001, v:0, n:, pp:- [Journal ] Edward W. Felten Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:3, pp:60-62 [Journal ] Edward W. Felten , J. Alex Halderman Digital Rights Management, Spyware, and Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2006, v:4, n:1, pp:18-23 [Journal ] Gary McGraw , Edward W. Felten Mobile Code and Security - Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 1998, v:2, n:6, pp:26-29 [Journal ] Angelos Bilas , Edward W. Felten Fast RPC on the SHRIMP Virtual Memory Mapped Network Interface. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1997, v:40, n:1, pp:138-146 [Journal ] Matthias A. Blumrich , Cezary Dubnicki , Edward W. Felten , Kai Li , Malena R. Mesarina Virtual-Memory-Mapped Network Interfaces. [Citation Graph (0, 0)][DBLP ] IEEE Micro, 1995, v:15, n:1, pp:21-28 [Journal ] John Viega , Tom Mutdosch , Gary McGraw , Edward W. Felten Statically Scanning Java Code: Finding Security Vulnerabilities. [Citation Graph (0, 0)][DBLP ] IEEE Software, 2000, v:17, n:5, pp:- [Journal ] Lujo Bauer , Andrew W. Appel , Edward W. Felten Mechanisms for secure modular programming in Java. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 2003, v:33, n:5, pp:461-480 [Journal ] Dan S. Wallach , Andrew W. Appel , Edward W. Felten SAFKASI: a security mechanism for language-based systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:4, pp:341-378 [Journal ] Coping with Outside-the-Box Attacks. [Citation Graph (, )][DBLP ] Understanding Java Stack Inspection. [Citation Graph (, )][DBLP ] Fingerprinting Blank Paper Using Commodity Scanners. [Citation Graph (, )][DBLP ] In Defense of Pseudorandom Sample Selection. [Citation Graph (, )][DBLP ] Lest We Remember: Cold Boot Attacks on Encryption Keys. [Citation Graph (, )][DBLP ] Password management strategies for online accounts. [Citation Graph (, )][DBLP ] Lest we remember: cold-boot attacks on encryption keys. [Citation Graph (, )][DBLP ] Search in 0.034secs, Finished in 0.036secs