Search the dblp DataBase
Douglas S. Reeves :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
A. A. Fennisi , Douglas S. Reeves Using the stuck-at fault model: how well does it work? [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 1990, pp:40-46 [Conf ] Yan Zhai , Peng Ning , Purush Iyer , Douglas S. Reeves Reasoning About Complementary Intrusion Evidence. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:39-48 [Conf ] Sanjeev Rampal , Douglas S. Reeves , Dharma P. Agrawal End-to-end guaranteed QoS with statistical multiplexing for ATM networks. [Citation Graph (0, 0)][DBLP ] Modelling and Evaluation of ATM Networks, 1994, pp:485-497 [Conf ] Peng Ning , Yun Cui , Douglas S. Reeves Constructing attack scenarios through correlation of intrusion alerts. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:245-254 [Conf ] Xinyuan Wang , Douglas S. Reeves Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:20-29 [Conf ] Qinghua Zhang , Douglas S. Reeves , Peng Ning , S. Purushothaman Iyer Analyzing network traffic to detect self-decrypting exploit code. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:4-12 [Conf ] Pan Wang , Peng Ning , Douglas S. Reeves A k -anonymous communication protocol for overlay networks. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:45-56 [Conf ] Qinglin Jiang , Douglas S. Reeves , Peng Ning Improving Robustness of PGP Keyrings by Conflict Detection. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:194-207 [Conf ] Xiaoyong Wu , Vinay A. Mahadik , Douglas S. Reeves A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:277-0 [Conf ] Xinyuan Wang , Douglas S. Reeves , Shyhtsun Felix Wu Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. [Citation Graph (0, 0)][DBLP ] ESORICS, 2002, pp:244-263 [Conf ] Errin W. Fulp , Douglas S. Reeves Optimal Provisioning and Pricing of Differentiated Services Using QoS Class Promotion. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (1), 2001, pp:144-150 [Conf ] Sanjeev Rampal , Douglas S. Reeves , Dharma P. Agrawal An Evalutaion of Routing and Admission Control Algorithms for Real-Time Traffic in Packet-Switched Networks. [Citation Graph (0, 0)][DBLP ] HPN, 1994, pp:79-93 [Conf ] Hussein F. Salama , Douglas S. Reeves , Yannis Viniotis , Tsang-Ling Sheu Evaluation of multicast routing algorithms for real-time communication on high-speed networks. [Citation Graph (0, 0)][DBLP ] HPN, 1995, pp:27-42 [Conf ] Pai Peng , Peng Ning , Douglas S. Reeves , Xinyuan Wang Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:107-113 [Conf ] Qinghua Zhang , Pan Wang , Douglas S. Reeves , Peng Ning Defending against Sybil Attacks in Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:185-191 [Conf ] Markus Siegle , Douglas S. Reeves , Krzysztof Kozminski The Interlocking Bus Network for Fault-Tolerant Processor Arrays. [Citation Graph (0, 0)][DBLP ] Fault-Tolerant Computing Systems, 1991, pp:348-359 [Conf ] Pan Wang , Peng Ning , Douglas S. Reeves Network Access Control for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:350-362 [Conf ] Errin W. Fulp , Douglas S. Reeves Optimal Provisioning and Pricing of Internet Differentiated Services in Hierarchical Markets. [Citation Graph (0, 0)][DBLP ] ICN (1), 2001, pp:409-418 [Conf ] Errin W. Fulp , Douglas S. Reeves On-line Dynamic Bandwidth Allocation. [Citation Graph (0, 0)][DBLP ] ICNP, 1997, pp:134-141 [Conf ] Errin W. Fulp , Douglas S. Reeves Distributed Network Flow Control based on Dynamic Competitive Markets. [Citation Graph (0, 0)][DBLP ] ICNP, 1998, pp:119-128 [Conf ] Hussein F. Salama , Douglas S. Reeves , Yannis Viniotis A Distributed Algorithm for Delay-Constrained Unicast Routing. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1997, pp:84-91 [Conf ] Haining Wang , Kang G. Shin , Hongjie Xin , Douglas S. Reeves A Simple Refinement of Slow-Start of TCP Congestion Control. [Citation Graph (0, 0)][DBLP ] ISCC, 2000, pp:98-105 [Conf ] Qinglin Jiang , Douglas S. Reeves , Peng Ning Certificate Recommendations to Improve the Robustness of Web of Trust. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:292-303 [Conf ] Pan Wang , Peng Ning , Douglas S. Reeves Storage-Efficient Stateless Group Key Revocation. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:25-38 [Conf ] Sean Alexandre , Winser E. Alexander , Douglas S. Reeves A Programmable Simulator for Analyzing the Block Data Flow Architecture. [Citation Graph (0, 0)][DBLP ] MASCOTS, 1994, pp:399-400 [Conf ] Pan Wang , Douglas S. Reeves , Peng Ning Secure Address Auto-con.guration for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2005, pp:519-522 [Conf ] Errin W. Fulp , Douglas S. Reeves QoS Rewards and Risks: A Multi-market Approach to Resource Allocation. [Citation Graph (0, 0)][DBLP ] NETWORKING, 2000, pp:945-956 [Conf ] Matt Melton , Tan Phan , Douglas S. Reeves , David E. van den Bout VLSI Implementation of TInMANN. [Citation Graph (0, 0)][DBLP ] NIPS, 1990, pp:1046-1052 [Conf ] Young June Pyun , Douglas S. Reeves Constructing a Balanced, (log(N)/loglog(N))-Diameter Super-Peer Topology for Scalable P2P Systems. [Citation Graph (0, 0)][DBLP ] Peer-to-Peer Computing, 2004, pp:210-218 [Conf ] Ayman Shaker , Douglas S. Reeves Self-Stabilizing Structured Ring Topology P2P Systems. [Citation Graph (0, 0)][DBLP ] Peer-to-Peer Computing, 2005, pp:39-46 [Conf ] Errin W. Fulp , Douglas S. Reeves The Economic Impact of Network Pricing Intervals. [Citation Graph (0, 0)][DBLP ] QofIS, 2002, pp:315-324 [Conf ] Peng Ning , Yun Cui , Douglas S. Reeves Analyzing Intensive Intrusion Alerts via Correlation. [Citation Graph (0, 0)][DBLP ] RAID, 2002, pp:74-94 [Conf ] Xinyuan Wang , Douglas S. Reeves , Shyhtsun Felix Wu , Jim Yuill Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. [Citation Graph (0, 0)][DBLP ] SEC, 2001, pp:369-384 [Conf ] Douglas S. Reeves A course on multimedia technology for computer science and computer engineering students. [Citation Graph (0, 0)][DBLP ] SIGCSE, 1997, pp:174-178 [Conf ] Pai Peng , Peng Ning , Douglas S. Reeves On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:334-349 [Conf ] Errin W. Fulp , Douglas S. Reeves Bandwidth provisioning and pricing for networks with multiple classes of service. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:46, n:1, pp:41-52 [Journal ] T. P. Kelly , Douglas S. Reeves Optimal Web cache sizing: scalable methods for exact solutions. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2001, v:24, n:2, pp:163-173 [Journal ] Sanjeev Rampal , Douglas S. Reeves Routing and admission control algorithms for multimedia traffic. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1995, v:18, n:10, pp:755-768 [Journal ] Winser E. Alexander , Douglas S. Reeves , Clay S. Gloster Jr. Parallel image processin gwith the block data paralel architecture. [Citation Graph (0, 0)][DBLP ] IBM Journal of Research and Development, 2000, v:44, n:5, pp:681-702 [Journal ] Hussein F. Salama , Douglas S. Reeves , Yannis Viniotis Evaluation of Multicast Routing Algorithms for Real-Time Communication on High-Speed Networks. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1997, v:15, n:3, pp:332-345 [Journal ] Michael R. Izquierdo , Douglas S. Reeves A Survey of Statistical Source Models for Variable-bit-rate Compressed Video. [Citation Graph (0, 0)][DBLP ] Multimedia Syst., 1999, v:7, n:3, pp:199-213 [Journal ] Douglas S. Reeves , Mary Jane Irwin Fast Methods for Switch-Level Verification of MOS Circuits. [Citation Graph (0, 0)][DBLP ] IEEE Trans. on CAD of Integrated Circuits and Systems, 1987, v:6, n:5, pp:766-779 [Journal ] Kehang Wu , Douglas S. Reeves Capacity Planning of DiffServ Networks with Best-Effort and Expedited Forwarding Traffic. [Citation Graph (0, 0)][DBLP ] Telecommunication Systems, 2004, v:25, n:3-4, pp:193-207 [Journal ] Peng Ning , Yun Cui , Douglas S. Reeves , Dingbang Xu Techniques and tools for analyzing intrusion alerts. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:274-318 [Journal ] Douglas S. Reeves , Hussein F. Salama A distributed algorithm for delay-constrained unicast routing. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2000, v:8, n:2, pp:239-250 [Journal ] Young June Pyun , Young Hee Park , Xinyuan Wang , Douglas S. Reeves , Peng Ning Tracing Traffic through Intermediate Hosts that Repacketize Flows. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:634-642 [Conf ] MetaAware: Identifying Metamorphic Malware. [Citation Graph (, )][DBLP ] Bluetooth Network-Based Misuse Detection. [Citation Graph (, )][DBLP ] Identification of Bot Commands by Run-Time Execution Monitoring. [Citation Graph (, )][DBLP ] Strategic deployment of network monitors for attack attribution. [Citation Graph (, )][DBLP ] Highly available component sharing in large-scale multi-tenant cloud systems. [Citation Graph (, )][DBLP ] Treat-before-trick : Free-riding prevention for BitTorrent-like peer-to-peer networks. [Citation Graph (, )][DBLP ] How the Public Views Strategies Designed to Reduce the Threat of Botnets. [Citation Graph (, )][DBLP ] Search in 0.025secs, Finished in 0.029secs