The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nicholas Weaver: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nicholas Weaver, John Wawrzynek
    A Comparison of the AES Candidates Amenability to FPGA Implementation. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:28-39 [Conf]
  2. Michael Chu, Nicholas Weaver, Kolja Sulimma, André DeHon, John Wawrzynek
    Object Oriented Circuit-Generators in Java. [Citation Graph (0, 0)][DBLP]
    FCCM, 1998, pp:158-166 [Conf]
  3. Nicholas Weaver, John Wawrzynek
    The Effects of Datapath Placement and C-Slow Retiming on Three Computational Benchmarks. [Citation Graph (0, 0)][DBLP]
    FCCM, 2002, pp:303-0 [Conf]
  4. Nicholas Weaver, Vern Paxson, José M. González
    The shunt: an FPGA-based accelerator for network intrusion prevention. [Citation Graph (0, 0)][DBLP]
    FPGA, 2007, pp:199-206 [Conf]
  5. Nicholas Weaver, John R. Hauser, John Wawrzynek
    The SFRA: a corner-turn FPGA architecture. [Citation Graph (0, 0)][DBLP]
    FPGA, 2004, pp:3-12 [Conf]
  6. Nicholas Weaver, Yury Markovskiy, Yatish Patel, John Wawrzynek
    Post-placement C-slow retiming for the xilinx virtex FPGA. [Citation Graph (0, 0)][DBLP]
    FPGA, 2003, pp:185-194 [Conf]
  7. Abhishek Kumar, Vern Paxson, Nicholas Weaver
    Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event. [Citation Graph (0, 0)][DBLP]
    Internet Measurment Conference, 2005, pp:351-364 [Conf]
  8. Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H. Katz
    Protocol-Independent Adaptive Replay of Application Dialog. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  9. Stuart Staniford, Vern Paxson, Nicholas Weaver
    How to Own the Internet in Your Spare Time. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:149-167 [Conf]
  10. Nicholas Weaver, Stuart Staniford, Vern Paxson
    Very Fast Containment of Scanning Worms. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:29-44 [Conf]
  11. Stuart Staniford, David Moore, Vern Paxson, Nicholas Weaver
    The top speed of flash worms. [Citation Graph (0, 0)][DBLP]
    WORM, 2004, pp:33-42 [Conf]
  12. Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson
    Preliminary results using scale-down to explore worm dynamics. [Citation Graph (0, 0)][DBLP]
    WORM, 2004, pp:65-72 [Conf]
  13. Nicholas Weaver
    The Kadison-Singer problem in discrepancy theory. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2004, v:278, n:1-3, pp:227-239 [Journal]
  14. David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver
    Inside the Slammer Worm. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:33-39 [Journal]

  15. Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. [Citation Graph (, )][DBLP]


  16. Emµcode: Masking hard faults in complex functional units. [Citation Graph (, )][DBLP]


  17. Detecting Forged TCP Reset Packets. [Citation Graph (, )][DBLP]


  18. Principles for Developing Comprehensive Network Visibility. [Citation Graph (, )][DBLP]


  19. A taxonomy of computer worms. [Citation Graph (, )][DBLP]


  20. Think Evil (tm). [Citation Graph (, )][DBLP]


  21. An architecture for exploiting multi-core processors to parallelize network intrusion prevention. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002