Search the dblp DataBase
Peter L. Reiher :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Geoffrey H. Kuenning , Rajive Bagrodia , Richard G. Guy , Gerald J. Popek , Peter L. Reiher , An-I Wang Measuring the Quality of Service of Optimistic Replication. [Citation Graph (1, 0)][DBLP ] ECOOP Workshops, 1998, pp:319-320 [Conf ] Geoffrey H. Kuenning , Gerald J. Popek , Peter L. Reiher An Analysis of Trace Data for Predictive File Caching in Mobile Computing. [Citation Graph (1, 0)][DBLP ] USENIX Summer, 1994, pp:291-303 [Conf ] Peter L. Reiher , John S. Heidemann , David Ratner , Gregory Skinner , Gerald J. Popek Resolving File Conflicts in the Ficus File System. [Citation Graph (1, 0)][DBLP ] USENIX Summer, 1994, pp:183-195 [Conf ] Thomas W. Page Jr. , Richard G. Guy , John S. Heidemann , David Ratner , Peter L. Reiher , Ashish Goel , Geoffrey H. Kuenning , Gerald J. Popek Perspectives on Optimistically Replicated, Peer-to-Peer Filing. [Citation Graph (1, 0)][DBLP ] Softw., Pract. Exper., 1998, v:28, n:2, pp:155-180 [Journal ] David R. Jefferson , Peter L. Reiher Supercritical speedup. [Citation Graph (0, 0)][DBLP ] Annual Simulation Symposium, 1991, pp:159-168 [Conf ] Joos-Hendrik Böse , Stefan Böttcher , Le Gruenwald , Pedro José Marrón , Philipp Obreiter , Evaggelia Pitoura , Peter L. Reiher , Kai-Uwe Sattler , Frank Seliger 04441 Working Group - Some Open Aspects of Mobile Ad-hoc NETwork, Peer-to-Peer, and Self-organizing Systems. [Citation Graph (0, 0)][DBLP ] Mobile Information Management, 2004, pp:- [Conf ] Joos-Hendrik Böse , Stefan Böttcher , Le Gruenwald , Evaggelia Pitoura , Peter L. Reiher , George Samaras , Thomas Schwarz , Can Türker 04441 Working Group - Research Issues in Mobile Transactions. [Citation Graph (0, 0)][DBLP ] Mobile Information Management, 2004, pp:- [Conf ] Margaret H. Dunham , Birgitta König-Ries , Evaggelia Pitoura , Peter L. Reiher , Can Türker 04441 Executive Summary - Mobile Information Management. [Citation Graph (0, 0)][DBLP ] Mobile Information Management, 2004, pp:- [Conf ] Margaret H. Dunham , Birgitta König-Ries , Evaggelia Pitoura , Peter L. Reiher , Can Türker 04441 Abstracts Collection - Mobile Information Management. [Citation Graph (0, 0)][DBLP ] Mobile Information Management, 2004, pp:- [Conf ] Vincent Ferreria , Alexey Rudenko , Kevin Eustice , Richard G. Guy , Venkatraman Ramakrishna , Peter L. Reiher Panda: Middleware to Provide the Benefits of Active Networks to Legacy Applications. [Citation Graph (0, 0)][DBLP ] DANCE, 2002, pp:319-332 [Conf ] David Ratner , Peter L. Reiher , Gerald J. Popek Roam: A Scalable Replication System for Mobile Computing. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1999, pp:96-104 [Conf ] An-I Wang , Peter L. Reiher , Rajive Bagrodia , Geoffrey H. Kuenning Understanding the Behavior of the Conflict-Rate Metric in Optimistic Peer Replication. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2002, pp:757-764 [Conf ] Max Robinson , Jelena Mirkovic , B. Scott Michel , Matthew Schnaider , Peter L. Reiher DefCOM: Defensive Cooperative Overlay Mesh. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:101-102 [Conf ] Richard G. Guy , Peter L. Reiher , David Ratner , Michial Gunter , Wilkie Ma , Gerald J. Popek Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication. [Citation Graph (0, 9)][DBLP ] ER Workshops, 1998, pp:254-265 [Conf ] B. Scott Michel , Peter L. Reiher Peer-through-Peer Communication for Information Logistics. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (1), 2001, pp:248-256 [Conf ] Mitchell Tsai , Peter L. Reiher , Gerald J. Popek Command Management System for Next-Generation User Input. [Citation Graph (0, 0)][DBLP ] Workshop on Hot Topics in Operating Systems, 1999, pp:179-184 [Conf ] An-I Wang , Peter L. Reiher , Gerald J. Popek , Geoffrey H. Kuenning The Conquest File System's Life after Disks. [Citation Graph (0, 0)][DBLP ] HotOS, 2001, pp:186- [Conf ] Mark Yarvis , Peter L. Reiher , Gerald J. Popek Conductor: A Framework for Distributed Adaptation. [Citation Graph (0, 0)][DBLP ] Workshop on Hot Topics in Operating Systems, 1999, pp:44-0 [Conf ] Nam T. Nguyen , Peter L. Reiher , Geoffrey H. Kuenning Detecting Insider Threats by Monitoring System Call Activity. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:45-52 [Conf ] Jelena Mirkovic , Gregory Prier , Peter L. Reiher Attacking DDoS at the Source. [Citation Graph (0, 0)][DBLP ] ICNP, 2002, pp:312-321 [Conf ] Venkatraman Ramakrishna , Max Robinson , Kevin Eustice , Peter L. Reiher An Active Self-Optimizing Multiplayer Gaming Architecture. [Citation Graph (0, 0)][DBLP ] Active Middleware Services, 2003, pp:32-41 [Conf ] Peter L. Reiher , Kevin Eustice , Kai-Min Sung Adapting Encrypted Data Streams in Open Architectures. [Citation Graph (0, 0)][DBLP ] Active Middleware Services, 2001, pp:45-50 [Conf ] Jun Li , Jelena Mirkovic , Mengqiu Wang , Peter L. Reiher , Lixia Zhang SAVE: Source Address Validity Enforcement Protocol. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2002, pp:- [Conf ] B. Scott Michel , Konstantinos Nikoloudakis , Peter L. Reiher , Lixia Zhang URL Forwarding and Compression in Adaptive Web Caching. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2000, pp:670-678 [Conf ] Alexey Rudenko , Peter L. Reiher Adaptation Planning for Active Networks. [Citation Graph (0, 0)][DBLP ] IWAN, 2003, pp:252-265 [Conf ] Peter L. Reiher , Gerald J. Popek Locus Naming in a Large Scale Environment. [Citation Graph (0, 0)][DBLP ] Kommunikation in Verteilten Systemen, 1987, pp:167-177 [Conf ] David Ratner , Peter L. Reiher , Gerald J. Popek , Richard G. Guy Peer Replication with Selective Control. [Citation Graph (0, 0)][DBLP ] MDA, 1999, pp:169-181 [Conf ] Kevin Eustice , Leonard Kleinrock , Shane Markstrum , Gerald J. Popek , Venkatraman Ramakrishna , Peter L. Reiher Enabling Secure Ubiquitous Interactions. [Citation Graph (0, 0)][DBLP ] Middleware Workshops, 2003, pp:76-80 [Conf ] Geoffrey H. Kuenning , Wilkie Ma , Peter L. Reiher , Gerald J. Popek Simplifying automated hoarding methods. [Citation Graph (0, 0)][DBLP ] MSWiM, 2002, pp:15-21 [Conf ] Jelena Mirkovic , Gregory Prier , Peter L. Reiher Source-End DDoS Defense. [Citation Graph (0, 0)][DBLP ] NCA, 2003, pp:171-178 [Conf ] Birgitta König-Ries , Kia Makki , S. A. M. Makki , Charles E. Perkins , Niki Pissinou , Peter L. Reiher , Peter Scheuermann , Jari Veijalainen , Alexander L. Wolf , Ouri Wolfson Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona. [Citation Graph (0, 0)][DBLP ] Infrastructure for Mobile and Wireless Systems, 2001, pp:1-37 [Conf ] Kevin Eustice , Leonard Kleinrock , Shane Markstrum , Gerald J. Popek , Venkatraman Ramakrishna , Peter L. Reiher Securing nomads: the case for quarantine, examination, and decontamination. [Citation Graph (0, 0)][DBLP ] NSPW, 2003, pp:123-128 [Conf ] Jelena Mirkovic , Max Robinson , Peter L. Reiher Alliance formation for DDoS defense. [Citation Graph (0, 0)][DBLP ] NSPW, 2003, pp:11-18 [Conf ] Everett Anderson , Kevin Eustice , Shane Markstrum , Mark Hansen , Peter L. Reiher Mobile Contagion: Simulation of Infection and Defense. [Citation Graph (0, 0)][DBLP ] PADS, 2005, pp:80-87 [Conf ] Jun Li , Toby Ehrenkranz , Geoffrey H. Kuenning , Peter L. Reiher Simulation and Analysis on the Resiliency and Efficiency of Malnets. [Citation Graph (0, 0)][DBLP ] PADS, 2005, pp:262-269 [Conf ] Alexey Rudenko , Peter L. Reiher , Gerald J. Popek , Geoffrey H. Kuenning The Remote Processing Framework for Portable Computer Power Saving. [Citation Graph (0, 0)][DBLP ] SAC, 1999, pp:365-372 [Conf ] An-I Wang , Peter L. Reiher , Geoffrey H. Kuenning Introducing permuted states for analyzing conflict rates in optimistic replication. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2005, pp:376-377 [Conf ] An-I Wang , Peter L. Reiher , Gerald J. Popek , Geoffrey H. Kuenning Conquest: Better Performance Through a Disk/Persistent-RAM Hybrid File System. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2002, pp:15-28 [Conf ] Matthew T. Presley , Peter L. Reiher , Steven F. Bellenot A time warp implementation of Sharks World. [Citation Graph (0, 0)][DBLP ] Winter Simulation Conference, 1990, pp:199-203 [Conf ] Peter L. Reiher Parallel simulation using the time warp operating system. [Citation Graph (0, 0)][DBLP ] Winter Simulation Conference, 1990, pp:38-45 [Conf ] Peter L. Reiher , Frederick Wieland , David R. Jefferson Limitation of optimism in the time warp operating system. [Citation Graph (0, 0)][DBLP ] Winter Simulation Conference, 1989, pp:765-770 [Conf ] Jelena Mirkovic , Peter L. Reiher A taxonomy of DDoS attack and DDoS defense mechanisms. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:2, pp:39-53 [Journal ] Venkatraman Ramakrishna , Max Robinson , Kevin Eustice , Peter L. Reiher An Active Self-Optimizing Multiplayer Gaming Architecture. [Citation Graph (0, 0)][DBLP ] Cluster Computing, 2006, v:9, n:2, pp:201-215 [Journal ] Jun Li , Mark Yarvis , Peter L. Reiher Securing distributed adaptation. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2002, v:38, n:3, pp:347-371 [Journal ] Frederick Wieland , L. Hayley , A. Feinberg , Mike Di Loreto , Leo Blume , J. Ruffles , Peter L. Reiher , Brian Beckman , Phil Hontalas , Steve Bellenot , David R. Jefferson The Performance of a Distributed Combat Simulation with the Time Warp Operating System. [Citation Graph (0, 0)][DBLP ] Concurrency - Practice and Experience, 1989, v:1, n:1, pp:35-50 [Journal ] Todd Ekenstam , Charles Matheny , Peter L. Reiher , Gerald J. Popek The Bengal Database Replication System. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 2001, v:9, n:3, pp:187-210 [Journal ] B. R. Badrinath , Armando Fox , Leonard Kleinrock , Gerald J. Popek , Peter L. Reiher , Mahadev Satyanarayanan A conceptual framework for network and client adaptation. [Citation Graph (0, 0)][DBLP ] MONET, 2000, v:5, n:4, pp:221-231 [Journal ] David Ratner , Peter L. Reiher , Gerald J. Popek Roam: A Scalable Replication System for Mobility. [Citation Graph (0, 0)][DBLP ] MONET, 2004, v:9, n:5, pp:537-544 [Journal ] David Ratner , Peter L. Reiher , Gerald J. Popek , Geoffrey H. Kuenning Replication Requirements in Mobile Environments. [Citation Graph (0, 0)][DBLP ] MONET, 2001, v:6, n:6, pp:525-533 [Journal ] Geoffrey H. Kuenning , Peter L. Reiher , Gerald J. Popek Experience with an Automated Hoarding System. [Citation Graph (0, 0)][DBLP ] Personal and Ubiquitous Computing, 1997, v:1, n:3, pp:- [Journal ] Nam T. Nguyen , An-I Andy Wang , Peter L. Reiher , Geoffrey H. Kuenning Electric-field-based routing: a reliable framework for routing in MANETs. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2004, v:8, n:2, pp:35-49 [Journal ] Birgitta König-Ries , Kia Makki , S. A. M. Makki , Charles E. Perkins , Niki Pissinou , Peter L. Reiher , Peter Scheuermann , Jari Veijalainen , Ouri Wolfson Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2002, v:31, n:2, pp:73-79 [Journal ] Jelena Mirkovic , Peter L. Reiher D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:216-232 [Journal ] An-I Andy Wang , Geoffrey H. Kuenning , Peter L. Reiher , Gerald J. Popek The Conquest file system: Better performance through a disk/persistent-RAM hybrid design. [Citation Graph (0, 0)][DBLP ] TOS, 2006, v:2, n:3, pp:309-348 [Journal ] George C. Oikonomou , Jelena Mirkovic , Peter L. Reiher , Max Robinson A Framework for a Collaborative DDoS Defense. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:33-42 [Conf ] Kevin Eustice , Venkatraman Ramakrishna , Alison Walker , Matthew Schnaider , Nam T. Nguyen , Peter L. Reiher nan0sphere: Location-Driven Fiction for Groups of Users. [Citation Graph (0, 0)][DBLP ] HCI (3), 2007, pp:852-861 [Conf ] Jelena Mirkovic , Alefiya Hussain , Brett Willson , Sonia Fahmy , Wei-Min Yao , Peter L. Reiher , Stephen Schwab , Roshan Thomas When is service really denied?: a user-centric dos metric. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2007, pp:357-358 [Conf ] An-I Wang , Peter L. Reiher , Rajive Bagrodia A simulation evaluation of optimistic replicated filing in mobile environments. [Citation Graph (0, 0)][DBLP ] IPCCC, 1999, pp:43-51 [Conf ] Charles Weddle , Mathew Oldham , Jin Qian , An-I Andy Wang , Peter L. Reiher , Geoff Kuenning PARAID: A gear-shifting power-aware RAID. [Citation Graph (0, 0)][DBLP ] TOS, 2007, v:3, n:3, pp:- [Journal ] RAD: Reflector Attack Defense Using Message Authentication Codes. [Citation Graph (, )][DBLP ] Measuring denial Of service. [Citation Graph (, )][DBLP ] PARAID: A Gear-Shifting Power-Aware RAID. [Citation Graph (, )][DBLP ] Johnny Appleseed: wardriving to reduce interference in chaotic wireless deployments. [Citation Graph (, )][DBLP ] Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments. [Citation Graph (, )][DBLP ] Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios. [Citation Graph (, )][DBLP ] Towards user-centric metrics for denial-of-service measurement. [Citation Graph (, )][DBLP ] Message from the SAUCE Workshop Organizing Technical Co-chairs. [Citation Graph (, )][DBLP ] Improving User Satisfaction in a Ubiquitous Computing Application. [Citation Graph (, )][DBLP ] Learning the valid incoming direction of IP packets. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.603secs