The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Lin Tan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhenmin Li, Lin Tan, Xuanhui Wang, Shan Lu, Yuanyuan Zhou, ChengXiang Zhai
    Have things changed now?: an empirical study of bug characteristics in modern open source software. [Citation Graph (0, 0)][DBLP]
    ASID, 2006, pp:25-33 [Conf]
  2. Lin Tan, Timothy Sherwood
    A High Throughput String Matching Architecture for Intrusion Detection and Prevention. [Citation Graph (0, 0)][DBLP]
    ISCA, 2005, pp:112-122 [Conf]
  3. Qingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, Kimberly Keeton, John Wilkes
    Hibernator: helping disk arrays sleep through the winter. [Citation Graph (0, 0)][DBLP]
    SOSP, 2005, pp:177-190 [Conf]
  4. Lin Tan, Timothy Sherwood
    Architectures for Bit-Split String Scanning in Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2006, v:26, n:1, pp:110-117 [Journal]
  5. Lin Tan, Brett Brotherton, Timothy Sherwood
    Bit-split string-matching engines for intrusion detection and prevention. [Citation Graph (0, 0)][DBLP]
    TACO, 2006, v:3, n:1, pp:3-34 [Journal]
  6. Lin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou
    /*icomment: bugs or bad comments?*/. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:145-158 [Conf]
  7. Lin Tan
    Signs in the Laplace expansions and the parity of the distinguished representatives. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1994, v:131, n:1-3, pp:287-299 [Journal]

  8. SherLog: error diagnosis by connecting clues from run-time logs. [Citation Graph (, )][DBLP]


  9. Quantifying Trust Based on Service Level Agreement for Software as a Service. [Citation Graph (, )][DBLP]


  10. HotComments: How to Make Program Comments More Useful? [Citation Graph (, )][DBLP]


  11. Listening to programmers - Taxonomies and characteristics of comments in operating system code. [Citation Graph (, )][DBLP]


  12. AutoISES: Automatically Inferring Security Specification and Detecting Violations. [Citation Graph (, )][DBLP]


  13. A Scheme to Aid Construction of Left-Hand Sides of Axioms in Algebraic Specifications forObject-Oriented Program Testing. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002