Search the dblp DataBase
Atul Prakash :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jang Ho Lee , Atul Prakash , Trent Jaeger , Gwobaw Wu Supporting Multi-User, Multi-Applet Workspaces in CBE. [Citation Graph (1, 0)][DBLP ] CSCW, 1996, pp:344-353 [Conf ] Atul Prakash , Hyong Sop Shim DistView: Support for Building Efficient Collaborative Applications Using Replicated Objects. [Citation Graph (1, 0)][DBLP ] CSCW, 1994, pp:153-164 [Conf ] C. V. Ramamoorthy , Atul Prakash , Wei-Tek Tsai , Yutaka Usuda Software Engineering: Problems and Perspectives. [Citation Graph (1, 0)][DBLP ] IEEE Computer, 1984, v:17, n:10, pp:191-209 [Journal ] Atul Prakash , Rajalakshmi Subramanian Filter: an algorithm for reducing cascaded rollbacks in optimistic distributed simulations. [Citation Graph (0, 0)][DBLP ] Annual Simulation Symposium, 1991, pp:123-132 [Conf ] Scott Gifford , Jim Knox , Jonathan James , Atul Prakash Introduction to the talking points project. [Citation Graph (0, 0)][DBLP ] ASSETS, 2006, pp:271-272 [Conf ] Santanu Paul , Atul Prakash Generating programming language-based pattern matchers. [Citation Graph (0, 0)][DBLP ] CASCON, 1993, pp:227-243 [Conf ] Santanu Paul , Atul Prakash , Erich B. Buss , John Henshaw Theories and techniques of program understanding. [Citation Graph (0, 0)][DBLP ] CASCON, 1991, pp:37-53 [Conf ] Kevin Borders , Atul Prakash Web tap: detecting covert web traffic. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:110-120 [Conf ] Kevin Borders , Xin Zhao , Atul Prakash CPOL: high-performance policy evaluation. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:147-157 [Conf ] Trent Jaeger , Atul Prakash Support for the File System Security Requirements of Computational E-Mail Systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:1-9 [Conf ] Susan E. McDaniel , Gary M. Olson , Terry E. Weymouth , Craig E. Rasmussen , Atul Prakash , C. Robert Clauer , Daniel E. Atkins , Ramani Penmetsa , Nelson R. Manohar , Hyong Sop Shim The upper atmospheric research collaboratory. [Citation Graph (0, 0)][DBLP ] CHI Conference Companion, 1994, pp:21-22 [Conf ] Michael J. Knister , Atul Prakash DistEdit: A Distributed Toolkit for Supporting Multiple Group Editors. [Citation Graph (0, 0)][DBLP ] CSCW, 1990, pp:343-355 [Conf ] Robert W. Hall , Amit G. Mathur , Farnam Jahanian , Atul Prakash , Craig Rassmussen Corona: A Communication Service for Scalable, Reliable Group Collaboration Systems. [Citation Graph (0, 0)][DBLP ] CSCW, 1996, pp:140-149 [Conf ] Radu Litiu , Atul Prakash Developing adaptive groupware applications using a mobile component framework. [Citation Graph (0, 0)][DBLP ] CSCW, 2000, pp:107-116 [Conf ] Atul Prakash , Michael J. Knister Undoing Actions in Collaborative Work. [Citation Graph (0, 0)][DBLP ] CSCW, 1992, pp:273-280 [Conf ] Trent Jaeger , Atul Prakash Implementation of a discretionary access control model for script-based systems. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:70-84 [Conf ] Xin Zhao , Atul Prakash Source Authentication in Group Communication Systems. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2003, pp:455-459 [Conf ] Jim Irrer , Atul Prakash , Patrick McDaniel Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:44-46 [Conf ] Patrick McDaniel , Atul Prakash A Flexible Architecture for Security Policy Enforcement. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:234-239 [Conf ] Hyong Sop Shim , Robert W. Hall , Atul Prakash , Farnam Jahanian Providing Flexible Services for Managing Shared State in Collaborative Systems. [Citation Graph (0, 0)][DBLP ] ECSCW, 1997, pp:237-0 [Conf ] Nelson R. Manohar , Atul Prakash The Session Capture and Replay Paradigm for Asynchronous Collaboration. [Citation Graph (0, 0)][DBLP ] ECSCW, 1995, pp:147-0 [Conf ] Trent Jaeger , Atul Prakash Management and utilization of knowledge for the automatic improvement of workflow performance. [Citation Graph (0, 0)][DBLP ] COOCS, 1995, pp:32-43 [Conf ] Brian Noble , Li Li , Atul Prakash The Case for Better Throughput Estimation. [Citation Graph (0, 0)][DBLP ] Workshop on Hot Topics in Operating Systems, 1999, pp:70-75 [Conf ] Radu Litiu , Atul Prakash Stateful Group Communication Services. [Citation Graph (0, 0)][DBLP ] ICDCS, 1999, pp:82-89 [Conf ] Atul Prakash , C. V. Ramamoorthy Hierarchical Distributed Simulations. [Citation Graph (0, 0)][DBLP ] ICDCS, 1988, pp:341-348 [Conf ] Tom Rodden , Paul Dourish , Lennart E. Fahlén , Chris Greenhalgh , Atul Prakash , John Riedl Computer Supported Cooperative Work: New Challenges or Old Problems (Panel). [Citation Graph (0, 0)][DBLP ] ICDCS, 1995, pp:180-181 [Conf ] Robert E. Strom , Guruduth Banavar , Kevan Miller , Atul Prakash , Michael Ward Concurrency Control and View Notification Algorithms for Collaborative Replicated Objects. [Citation Graph (0, 0)][DBLP ] ICDCS, 1997, pp:0-0 [Conf ] Nelson R. Manohar , Atul Prakash A Flexible Architecture for Integrating Heterogeneous Media on Replayable Workspaces. [Citation Graph (0, 0)][DBLP ] ICMCS, 1996, pp:274-278 [Conf ] Amit G. Mathur , Atul Prakash A Protocol Composition-Based Approach to QoS Control in Collaboration Systems. [Citation Graph (0, 0)][DBLP ] ICMCS, 1996, pp:62-69 [Conf ] Santanu Paul , Atul Prakash Querying Source Code Using an Algebraic Query Language. [Citation Graph (0, 0)][DBLP ] ICSM, 1994, pp:127-136 [Conf ] Trent Jaeger , Atul Prakash , Masayuki Ishikawa A Framework for Automatic Improvement of Workflows to Meet Performance Goals. [Citation Graph (0, 0)][DBLP ] ICTAI, 1994, pp:640-646 [Conf ] Nelson R. Manohar , Atul Prakash Dealing with Synchronization and Timing Variability in the Playback of Interactive Session Recordings. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 1995, pp:45-56 [Conf ] Amit G. Mathur , Atul Prakash Protocols for Integrated Audio and Shared Windows in Collaborative Systems. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 1994, pp:381-388 [Conf ] Xin Zhao , Atul Prakash WSF: An HTTP-Level Firewall for Hardening Web Servers. [Citation Graph (0, 0)][DBLP ] IASTED PDCS, 2005, pp:248-253 [Conf ] Trent Jaeger , Atul Prakash Requirements of role-based access control for collaborative systems. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf ] Pavan Verma , Atul Prakash FACE: A Firewall Analysis and Configuration Engine. [Citation Graph (0, 0)][DBLP ] SAINT, 2005, pp:74-81 [Conf ] Trent Jaeger , Atul Prakash Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems. [Citation Graph (0, 0)][DBLP ] SEKE, 1995, pp:103-105 [Conf ] Trent Jaeger , Atul Prakash BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems. [Citation Graph (0, 0)][DBLP ] SEKE, 1993, pp:191-198 [Conf ] Kevin Borders , Xin Zhao , Atul Prakash Siren: Catching Evasive Malware (Short Paper). [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:78-85 [Conf ] Patrick Drew McDaniel , Atul Prakash Methods and Limitations of Security Policy Reconciliation. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:73-87 [Conf ] Hyong Sop Shim , Atul Prakash Tolerating Client and Communication Failures in Distributed Groupware Systems. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1998, pp:221-227 [Conf ] C. V. Ramamoorthy , Atul Prakash , Vijay K. Garg , Tsuneo Yamaura , Anupam Bhide Issues in the Development of Large, Distributed, and Reliable Software. [Citation Graph (0, 0)][DBLP ] Advances in Computers, 1987, v:26, n:, pp:393-443 [Journal ] Michael J. Knister , Atul Prakash Issues in the Design of a Toolkit for Supporting Multiple Group Editors. [Citation Graph (0, 0)][DBLP ] Computing Systems, 1993, v:6, n:2, pp:135-166 [Journal ] Erich B. Buss , Renato de Mori , W. Morven Gentleman , John Henshaw , J. Howard Johnson , Kostas Kontogiannis , Ettore Merlo , Hausi A. Müller , John Mylopoulos , Santanu Paul , Atul Prakash , Martin Stanley , Scott R. Tilley , Joel Troster , Kenny Wong Investigating Reverse Engineering Technologies for the CAS Program Understanding Project. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 1994, v:33, n:3, pp:477-500 [Journal ] Gary M. Olson , Daniel E. Atkins , C. Robert Clauer , Thomas A. Finholt , Farnam Jahanian , Timothy L. Killeen , Atul Prakash , Terry E. Weymouth The Upper Atmospheric Research Collaboratory (UARC). [Citation Graph (0, 0)][DBLP ] Interactions, 1998, v:5, n:3, pp:48-55 [Journal ] Sushila Subramanian , G. Robert Malan , Hyong Sop Shim , Jang Ho Lee , Peter Knoop , Terry E. Weymouth , Farnam Jahanian , Atul Prakash Software Architecture for the UARC Web-Based Collaboratory. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 1999, v:3, n:2, pp:46-54 [Journal ] Patrick McDaniel , Atul Prakash Enforcing provisioning and authorization policy in the Antigone system. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2006, v:14, n:6, pp:483-511 [Journal ] Radu Litiu , Atul Prakash DACIA: A Mobile Component Framework for Buildinh Adaptive Distributed Applications. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2001, v:35, n:2, pp:31-42 [Journal ] Robert E. Strom , Guruduth Banavar , Kevan Miller , Atul Prakash , Michael Ward Concurrency Control and View Notification Algorithms for Collaborative Replicated Objects. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1998, v:47, n:4, pp:458-471 [Journal ] Trent Jaeger , Atul Prakash , Jochen Liedtke , Nayeem Islam Flexible Control of Downloaded Executable Content. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:2, pp:177-228 [Journal ] Patrick McDaniel , Atul Prakash Methods and limitations of security policy reconciliation. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:3, pp:259-291 [Journal ] Atul Prakash , Hyong Sop Shim , Jang Ho Lee Data Management Issues and Trade-Offs in CSCW Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 1999, v:11, n:1, pp:213-227 [Journal ] Atul Prakash , Michael J. Knister A Framework for Undoing Actions in Collaborative Systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput.-Hum. Interact., 1994, v:1, n:4, pp:295-330 [Journal ] Santanu Paul , Atul Prakash A Framework for Source Code Search Using Program Patterns. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1994, v:20, n:6, pp:463-475 [Journal ] Santanu Paul , Atul Prakash A Query Algebra for Program Databases. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:3, pp:202-217 [Journal ] C. V. Ramamoorthy , Vijay K. Garg , Atul Prakash Programming in the Large. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1986, v:12, n:7, pp:769-783 [Journal ] C. V. Ramamoorthy , Vijay K. Garg , Atul Prakash Support for Reusability in Genesis. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1988, v:14, n:8, pp:1145-1154 [Journal ] C. V. Ramamoorthy , Yutaka Usuda , Atul Prakash , Wei-Tek Tsai The Evolution Support Environment System. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1990, v:16, n:11, pp:1225-1234 [Journal ] Fighting Phishing with Trusted Email. [Citation Graph (, )][DBLP ] Spector: Automatically Analyzing Shell Code. [Citation Graph (, )][DBLP ] Social networks and context-aware spam. [Citation Graph (, )][DBLP ] Securing sensitive content in a view-only file system. [Citation Graph (, )][DBLP ] Security in Practice - Security-Usability Chasm. [Citation Graph (, )][DBLP ] Prism: Providing Flexible and Fast Filesystem Cloning Service for Virtual Servers. [Citation Graph (, )][DBLP ] Towards Protecting Sensitive Files in a Compromised System. [Citation Graph (, )][DBLP ] Quantifying Information Leaks in Outbound Web Traffic. [Citation Graph (, )][DBLP ] Towards Quantification of Network-Based Information Leaks via HTTP. [Citation Graph (, )][DBLP ] Analyzing websites for user-visible security design flaws. [Citation Graph (, )][DBLP ] Using a virtual machine to protect sensitive Grid resources. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.457secs