|
Search the dblp DataBase
Nicholas Weaver:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Nicholas Weaver, John Wawrzynek
A Comparison of the AES Candidates Amenability to FPGA Implementation. [Citation Graph (0, 0)][DBLP] AES Candidate Conference, 2000, pp:28-39 [Conf]
- Michael Chu, Nicholas Weaver, Kolja Sulimma, André DeHon, John Wawrzynek
Object Oriented Circuit-Generators in Java. [Citation Graph (0, 0)][DBLP] FCCM, 1998, pp:158-166 [Conf]
- Nicholas Weaver, John Wawrzynek
The Effects of Datapath Placement and C-Slow Retiming on Three Computational Benchmarks. [Citation Graph (0, 0)][DBLP] FCCM, 2002, pp:303-0 [Conf]
- Nicholas Weaver, Vern Paxson, José M. González
The shunt: an FPGA-based accelerator for network intrusion prevention. [Citation Graph (0, 0)][DBLP] FPGA, 2007, pp:199-206 [Conf]
- Nicholas Weaver, John R. Hauser, John Wawrzynek
The SFRA: a corner-turn FPGA architecture. [Citation Graph (0, 0)][DBLP] FPGA, 2004, pp:3-12 [Conf]
- Nicholas Weaver, Yury Markovskiy, Yatish Patel, John Wawrzynek
Post-placement C-slow retiming for the xilinx virtex FPGA. [Citation Graph (0, 0)][DBLP] FPGA, 2003, pp:185-194 [Conf]
- Abhishek Kumar, Vern Paxson, Nicholas Weaver
Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event. [Citation Graph (0, 0)][DBLP] Internet Measurment Conference, 2005, pp:351-364 [Conf]
- Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H. Katz
Protocol-Independent Adaptive Replay of Application Dialog. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Stuart Staniford, Vern Paxson, Nicholas Weaver
How to Own the Internet in Your Spare Time. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2002, pp:149-167 [Conf]
- Nicholas Weaver, Stuart Staniford, Vern Paxson
Very Fast Containment of Scanning Worms. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2004, pp:29-44 [Conf]
- Stuart Staniford, David Moore, Vern Paxson, Nicholas Weaver
The top speed of flash worms. [Citation Graph (0, 0)][DBLP] WORM, 2004, pp:33-42 [Conf]
- Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson
Preliminary results using scale-down to explore worm dynamics. [Citation Graph (0, 0)][DBLP] WORM, 2004, pp:65-72 [Conf]
- Nicholas Weaver
The Kadison-Singer problem in discrepancy theory. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 2004, v:278, n:1-3, pp:227-239 [Journal]
- David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver
Inside the Slammer Worm. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:4, pp:33-39 [Journal]
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. [Citation Graph (, )][DBLP]
Emµcode: Masking hard faults in complex functional units. [Citation Graph (, )][DBLP]
Detecting Forged TCP Reset Packets. [Citation Graph (, )][DBLP]
Principles for Developing Comprehensive Network Visibility. [Citation Graph (, )][DBLP]
A taxonomy of computer worms. [Citation Graph (, )][DBLP]
Think Evil (tm). [Citation Graph (, )][DBLP]
An architecture for exploiting multi-core processors to parallelize network intrusion prevention. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|