|
Search the dblp DataBase
Steve R. White:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Gerald Tesauro, David M. Chess, William E. Walsh, Rajarshi Das, Alla Segal, Ian Whalley, Jeffrey O. Kephart, Steve R. White
A Multi-Agent Systems Approach to Autonomic Computing. [Citation Graph (0, 0)][DBLP] AAMAS, 2004, pp:464-471 [Conf]
- Jeffrey O. Kephart, James E. Hanson, David W. Levine, Benjamin N. Grosof, Jakka Sairamesh, Richard Segal, Steve R. White
Dynamics of an Information-Filtering Economy. [Citation Graph (0, 0)][DBLP] CIA, 1998, pp:160-171 [Conf]
- Steve R. White
Covert Distributed Processing with Computer Viruses. [Citation Graph (0, 0)][DBLP] CRYPTO, 1989, pp:616-619 [Conf]
- David M. Chess, Alla Segal, Ian Whalley, Steve R. White
Unity: Experiences with a Prototype Autonomic Computing System. [Citation Graph (0, 0)][DBLP] ICAC, 2004, pp:140-147 [Conf]
- Steve R. White, James E. Hanson, Ian Whalley, David M. Chess, Jeffrey O. Kephart
An Architectural Approach to Autonomic Computing. [Citation Graph (0, 0)][DBLP] ICAC, 2004, pp:2-9 [Conf]
- Jeffrey O. Kephart, James E. Hanson, Deffrey O. Levine, Benjamin N. Grosof, Jakka Sairamesh, Richard Segal, Steve R. White
Emergent Behavior in Information Economies. [Citation Graph (0, 0)][DBLP] ICMAS, 1998, pp:441-442 [Conf]
- Jeffrey O. Kephart, Gregory B. Sorkin, William C. Arnold, David M. Chess, Gerald Tesauro, Steve R. White
Biologically Inspired Defenses Against Computer Viruses. [Citation Graph (0, 0)][DBLP] IJCAI (1), 1995, pp:985-996 [Conf]
- Jeffrey O. Kephart, Steve R. White
Directed-Graph Epidemiological Models of Computer Viruses. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:343-361 [Conf]
- Steve R. White, Liam Comerford
ABYSS: A Trusted Architecture for Software Protection. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1987, pp:38-51 [Conf]
- David M. Chess, Charles C. Palmer, Steve R. White
Security in an autonomic computing environment. [Citation Graph (0, 0)][DBLP] IBM Systems Journal, 2003, v:42, n:1, pp:107-118 [Journal]
- Peter G. Capek, David M. Chess, Steve R. White
Merry Christma: An Early Network Worm. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:5, pp:26-34 [Journal]
- M. D. Durand, Steve R. White
Trading accuracy for speed in parallel simulated annealing with simultaneous moves. [Citation Graph (0, 0)][DBLP] Parallel Computing, 2000, v:26, n:1, pp:135-150 [Journal]
- Steve R. White, Liam Comerford
ABYSS: An Architecture for Software Protection. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1990, v:16, n:6, pp:619-629 [Journal]
Biologically-Inspired Design: Getting It Wrong and Getting It Right. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|