The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kevin A. Kwiat: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat
    QoS-LI: QoS Loss Inference in Disadvantaged Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:524-529 [Conf]
  2. Ben Hardekopf, Kevin A. Kwiat
    Exploiting the Overlap of Security and Fault-Tolerance. [Citation Graph (0, 0)][DBLP]
    AIWoRC, 2000, pp:361-366 [Conf]
  3. Kevin A. Kwiat
    Engineering Resource Management for the Information Grid and the Emerging Role of E-Commerce. [Citation Graph (0, 0)][DBLP]
    AIWoRC, 2000, pp:319-324 [Conf]
  4. Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat
    USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems. [Citation Graph (0, 0)][DBLP]
    Annual Simulation Symposium, 2006, pp:196-203 [Conf]
  5. Kaliappa Nadar Ravindran, Kevin A. Kwiat, Ali Sabbir, Bei Cao
    Replica voting: A distributed middleware service for real-time dependable systems. [Citation Graph (0, 0)][DBLP]
    COMSWARE, 2006, pp:- [Conf]
  6. Kaliappa Nadar Ravindran, Ali Sabbir, Kevin A. Kwiat
    Timed Publish-Subscribe Coomunication for Distributed Embedded Systems. [Citation Graph (0, 0)][DBLP]
    DS-RT, 2005, pp:290-297 [Conf]
  7. Kevin A. Kwiat, Warren Debany, Salim Hariri
    Software Fault Tolerance Using Dynamically Reconfigurable FPGAs. [Citation Graph (0, 0)][DBLP]
    Great Lakes Symposium on VLSI, 1996, pp:39-0 [Conf]
  8. Kaliappa Nadar Ravindran, Kevin A. Kwiat, G. Ding
    Simulation-Based Validation of Protocols for Distributed Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  9. Kaliappa Nadar Ravindran, Kevin A. Kwiat, Ali Sabbir
    Adapting Distributed Voting Algorithms for Secure Real-Time Embedded Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2004, pp:347-353 [Conf]
  10. Kaliappa Nadar Ravindran, Ali Sabbir, Kevin A. Kwiat
    Incorporating Timeliness in Atomic Write of Shared Data for Distributed Embedded Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2004, pp:884-889 [Conf]
  11. Zesheng Chen, Lixin Gao, Kevin A. Kwiat
    Modeling the Spread of Active Worms. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  12. Sami A. Al-Arian, Kevin A. Kwiat
    Defining a Standard for Fault Simulator Evaluation. [Citation Graph (0, 0)][DBLP]
    ITC, 1988, pp:1001- [Conf]
  13. Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat
    A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. [Citation Graph (0, 0)][DBLP]
    IWIA, 2003, pp:25-36 [Conf]
  14. Jiang Wu, Sarma Vangala, Lixin Gao, Kevin A. Kwiat
    An Effective Architecture and Algorithm for Detecting Worms with Various Scan. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  15. Kevin A. Kwiat
    Can Reliability and Security be Joined Reliably and Securely?. [Citation Graph (0, 0)][DBLP]
    SRDS, 2001, pp:72-73 [Conf]
  16. Shambhu J. Upadhyaya, Ramkumar Chinchani, Kevin A. Kwiat
    An Analytical Framework for Reasoning about Intrusions. [Citation Graph (0, 0)][DBLP]
    SRDS, 2001, pp:99-0 [Conf]
  17. Kevin A. Kwiat, Shangping Ren
    A Coordination Model for Improving Software System Attack-tolerance and Survivability in Open Hostile Environments. [Citation Graph (0, 0)][DBLP]
    SUTC (1), 2006, pp:394-402 [Conf]
  18. Kevin A. Kwiat, Kaliappa Nadar Ravindran, P. Hurley
    Energy-Efficient Replica Voting Mechanisms for Secure Real-Time Embedded Systems. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2005, pp:153-162 [Conf]
  19. Jiang Wu, Kaliappa Nadar Ravindran, Ali Sabbir, Kevin A. Kwiat
    Engineering of Replica Voting Protocols for Energy-Efficiency in Data Delivery. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2006, pp:456-458 [Conf]
  20. Warren H. Debany Jr., Kevin A. Kwiat, Sami A. Al-Arian
    A Method for Consistent Fault Coverage Reporting. [Citation Graph (0, 0)][DBLP]
    IEEE Design & Test of Computers, 1993, v:10, n:3, pp:68-79 [Journal]
  21. Kevin A. Kwiat
    Using Markets to Engineer Resource Management for the Information Grid. [Citation Graph (0, 0)][DBLP]
    Information Systems Frontiers, 2002, v:4, n:1, pp:55-62 [Journal]
  22. Jianhong Xia, Sarma Vangala, Jiang Wu, Lixin Gao, Kevin A. Kwiat
    Effective worm detection for various scan techniques. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:4, pp:359-387 [Journal]
  23. Shangping Ren, Yue Yu, Nianen Chen, Jeffrey J. P. Tsai, Kevin A. Kwiat
    The role of roles in supporting reconfigurability and fault localizations for open distributed and embedded systems. [Citation Graph (0, 0)][DBLP]
    TAAS, 2007, v:2, n:3, pp:- [Journal]

  24. Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks. [Citation Graph (, )][DBLP]


  25. A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. [Citation Graph (, )][DBLP]


  26. A Middleware Architecture for Replica Voting on Fuzzy Data in Dependable Real-time Systems. [Citation Graph (, )][DBLP]


  27. Performance engineering of replica voting protocols for high assurance data collection systems. [Citation Graph (, )][DBLP]


  28. Secure Distributed Agreement Protocols for Information Assurance Applications. [Citation Graph (, )][DBLP]


  29. Retrofitting Cyber Physical Systems for Survivability through External Coordination. [Citation Graph (, )][DBLP]


  30. QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems. [Citation Graph (, )][DBLP]


  31. Congestion control and fairness in wireless sensor networks. [Citation Graph (, )][DBLP]


  32. Take Intelligent Risk and Optimize Decision Based on Time, Available Resources and Risk Tolerance Limits. [Citation Graph (, )][DBLP]


  33. Improving complex distributed software system availability through information hiding. [Citation Graph (, )][DBLP]


  34. An Economic Approach to Hierarchical Routing in Resource Rationed Ad Hoc Networks. [Citation Graph (, )][DBLP]


  35. Dynamic spectrum access in cognitive radio based tactical networks. [Citation Graph (, )][DBLP]


  36. Traffic based dynamic routing for wireless sensor networks. [Citation Graph (, )][DBLP]


  37. User-input driven QoS management in ad hoc networks. [Citation Graph (, )][DBLP]


Search in 0.020secs, Finished in 0.021secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002