The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Douglas S. Reeves: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. A. A. Fennisi, Douglas S. Reeves
    Using the stuck-at fault model: how well does it work? [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 1990, pp:40-46 [Conf]
  2. Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves
    Reasoning About Complementary Intrusion Evidence. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:39-48 [Conf]
  3. Sanjeev Rampal, Douglas S. Reeves, Dharma P. Agrawal
    End-to-end guaranteed QoS with statistical multiplexing for ATM networks. [Citation Graph (0, 0)][DBLP]
    Modelling and Evaluation of ATM Networks, 1994, pp:485-497 [Conf]
  4. Peng Ning, Yun Cui, Douglas S. Reeves
    Constructing attack scenarios through correlation of intrusion alerts. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:245-254 [Conf]
  5. Xinyuan Wang, Douglas S. Reeves
    Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:20-29 [Conf]
  6. Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer
    Analyzing network traffic to detect self-decrypting exploit code. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:4-12 [Conf]
  7. Pan Wang, Peng Ning, Douglas S. Reeves
    A k-anonymous communication protocol for overlay networks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:45-56 [Conf]
  8. Qinglin Jiang, Douglas S. Reeves, Peng Ning
    Improving Robustness of PGP Keyrings by Conflict Detection. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:194-207 [Conf]
  9. Xiaoyong Wu, Vinay A. Mahadik, Douglas S. Reeves
    A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:277-0 [Conf]
  10. Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu
    Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:244-263 [Conf]
  11. Errin W. Fulp, Douglas S. Reeves
    Optimal Provisioning and Pricing of Differentiated Services Using QoS Class Promotion. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 2001, pp:144-150 [Conf]
  12. Sanjeev Rampal, Douglas S. Reeves, Dharma P. Agrawal
    An Evalutaion of Routing and Admission Control Algorithms for Real-Time Traffic in Packet-Switched Networks. [Citation Graph (0, 0)][DBLP]
    HPN, 1994, pp:79-93 [Conf]
  13. Hussein F. Salama, Douglas S. Reeves, Yannis Viniotis, Tsang-Ling Sheu
    Evaluation of multicast routing algorithms for real-time communication on high-speed networks. [Citation Graph (0, 0)][DBLP]
    HPN, 1995, pp:27-42 [Conf]
  14. Pai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang
    Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:107-113 [Conf]
  15. Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning
    Defending against Sybil Attacks in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:185-191 [Conf]
  16. Markus Siegle, Douglas S. Reeves, Krzysztof Kozminski
    The Interlocking Bus Network for Fault-Tolerant Processor Arrays. [Citation Graph (0, 0)][DBLP]
    Fault-Tolerant Computing Systems, 1991, pp:348-359 [Conf]
  17. Pan Wang, Peng Ning, Douglas S. Reeves
    Network Access Control for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:350-362 [Conf]
  18. Errin W. Fulp, Douglas S. Reeves
    Optimal Provisioning and Pricing of Internet Differentiated Services in Hierarchical Markets. [Citation Graph (0, 0)][DBLP]
    ICN (1), 2001, pp:409-418 [Conf]
  19. Errin W. Fulp, Douglas S. Reeves
    On-line Dynamic Bandwidth Allocation. [Citation Graph (0, 0)][DBLP]
    ICNP, 1997, pp:134-141 [Conf]
  20. Errin W. Fulp, Douglas S. Reeves
    Distributed Network Flow Control based on Dynamic Competitive Markets. [Citation Graph (0, 0)][DBLP]
    ICNP, 1998, pp:119-128 [Conf]
  21. Hussein F. Salama, Douglas S. Reeves, Yannis Viniotis
    A Distributed Algorithm for Delay-Constrained Unicast Routing. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1997, pp:84-91 [Conf]
  22. Haining Wang, Kang G. Shin, Hongjie Xin, Douglas S. Reeves
    A Simple Refinement of Slow-Start of TCP Congestion Control. [Citation Graph (0, 0)][DBLP]
    ISCC, 2000, pp:98-105 [Conf]
  23. Qinglin Jiang, Douglas S. Reeves, Peng Ning
    Certificate Recommendations to Improve the Robustness of Web of Trust. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:292-303 [Conf]
  24. Pan Wang, Peng Ning, Douglas S. Reeves
    Storage-Efficient Stateless Group Key Revocation. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:25-38 [Conf]
  25. Sean Alexandre, Winser E. Alexander, Douglas S. Reeves
    A Programmable Simulator for Analyzing the Block Data Flow Architecture. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1994, pp:399-400 [Conf]
  26. Pan Wang, Douglas S. Reeves, Peng Ning
    Secure Address Auto-con.guration for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:519-522 [Conf]
  27. Errin W. Fulp, Douglas S. Reeves
    QoS Rewards and Risks: A Multi-market Approach to Resource Allocation. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2000, pp:945-956 [Conf]
  28. Matt Melton, Tan Phan, Douglas S. Reeves, David E. van den Bout
    VLSI Implementation of TInMANN. [Citation Graph (0, 0)][DBLP]
    NIPS, 1990, pp:1046-1052 [Conf]
  29. Young June Pyun, Douglas S. Reeves
    Constructing a Balanced, (log(N)/loglog(N))-Diameter Super-Peer Topology for Scalable P2P Systems. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2004, pp:210-218 [Conf]
  30. Ayman Shaker, Douglas S. Reeves
    Self-Stabilizing Structured Ring Topology P2P Systems. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2005, pp:39-46 [Conf]
  31. Errin W. Fulp, Douglas S. Reeves
    The Economic Impact of Network Pricing Intervals. [Citation Graph (0, 0)][DBLP]
    QofIS, 2002, pp:315-324 [Conf]
  32. Peng Ning, Yun Cui, Douglas S. Reeves
    Analyzing Intensive Intrusion Alerts via Correlation. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:74-94 [Conf]
  33. Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu, Jim Yuill
    Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:369-384 [Conf]
  34. Douglas S. Reeves
    A course on multimedia technology for computer science and computer engineering students. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 1997, pp:174-178 [Conf]
  35. Pai Peng, Peng Ning, Douglas S. Reeves
    On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:334-349 [Conf]
  36. Errin W. Fulp, Douglas S. Reeves
    Bandwidth provisioning and pricing for networks with multiple classes of service. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:46, n:1, pp:41-52 [Journal]
  37. T. P. Kelly, Douglas S. Reeves
    Optimal Web cache sizing: scalable methods for exact solutions. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2001, v:24, n:2, pp:163-173 [Journal]
  38. Sanjeev Rampal, Douglas S. Reeves
    Routing and admission control algorithms for multimedia traffic. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:10, pp:755-768 [Journal]
  39. Winser E. Alexander, Douglas S. Reeves, Clay S. Gloster Jr.
    Parallel image processin gwith the block data paralel architecture. [Citation Graph (0, 0)][DBLP]
    IBM Journal of Research and Development, 2000, v:44, n:5, pp:681-702 [Journal]
  40. Hussein F. Salama, Douglas S. Reeves, Yannis Viniotis
    Evaluation of Multicast Routing Algorithms for Real-Time Communication on High-Speed Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1997, v:15, n:3, pp:332-345 [Journal]
  41. Michael R. Izquierdo, Douglas S. Reeves
    A Survey of Statistical Source Models for Variable-bit-rate Compressed Video. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 1999, v:7, n:3, pp:199-213 [Journal]
  42. Douglas S. Reeves, Mary Jane Irwin
    Fast Methods for Switch-Level Verification of MOS Circuits. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1987, v:6, n:5, pp:766-779 [Journal]
  43. Kehang Wu, Douglas S. Reeves
    Capacity Planning of DiffServ Networks with Best-Effort and Expedited Forwarding Traffic. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2004, v:25, n:3-4, pp:193-207 [Journal]
  44. Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu
    Techniques and tools for analyzing intrusion alerts. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:274-318 [Journal]
  45. Douglas S. Reeves, Hussein F. Salama
    A distributed algorithm for delay-constrained unicast routing. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2000, v:8, n:2, pp:239-250 [Journal]
  46. Young June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning
    Tracing Traffic through Intermediate Hosts that Repacketize Flows. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:634-642 [Conf]

  47. MetaAware: Identifying Metamorphic Malware. [Citation Graph (, )][DBLP]


  48. Bluetooth Network-Based Misuse Detection. [Citation Graph (, )][DBLP]


  49. Identification of Bot Commands by Run-Time Execution Monitoring. [Citation Graph (, )][DBLP]


  50. Strategic deployment of network monitors for attack attribution. [Citation Graph (, )][DBLP]


  51. Highly available component sharing in large-scale multi-tenant cloud systems. [Citation Graph (, )][DBLP]


  52. Treat-before-trick : Free-riding prevention for BitTorrent-like peer-to-peer networks. [Citation Graph (, )][DBLP]


  53. How the Public Views Strategies Designed to Reduce the Threat of Botnets. [Citation Graph (, )][DBLP]


Search in 0.016secs, Finished in 0.017secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002