Search the dblp DataBase
Xiaolan Zhang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Antony Edwards , Trent Jaeger , Xiaolan Zhang Runtime verification of authorization hook placement for the linux security modules framework. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:225-234 [Conf ] Reiner Sailer , Trent Jaeger , Xiaolan Zhang , Leendert van Doorn Attestation-based policy enforcement for remote access. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:308-317 [Conf ] Xiaolan Zhang , Margo I. Seltzer HBench: JGC-An Application-Specific Benchmark Suite for Evaluating JVM Garbage Collector Performance. [Citation Graph (0, 0)][DBLP ] COOTS, 2001, pp:47-60 [Conf ] Margo I. Seltzer , David Krinsky , Keith A. Smith , Xiaolan Zhang The Case for Application-Specific Benchmarking. [Citation Graph (0, 0)][DBLP ] Workshop on Hot Topics in Operating Systems, 1999, pp:102-0 [Conf ] Xiaolan Zhang , Larry Koved , Marco Pistoia , Sam Weber , Trent Jaeger , Guillaume Marceau , Liangzhao Zeng The case for analysis preserving language transformation. [Citation Graph (0, 0)][DBLP ] ISSTA, 2006, pp:191-202 [Conf ] Xiaolan Zhang , Margo I. Seltzer HBench: Java: an application-specific benchmarking framework for Java virtual machines. [Citation Graph (0, 0)][DBLP ] Java Grande, 2000, pp:62-70 [Conf ] Xiaolan Zhang , Giovanni Neglia , James F. Kurose , Donald F. Towsley Performance Modeling of Epidemic Routing. [Citation Graph (0, 0)][DBLP ] Networking, 2006, pp:827-839 [Conf ] Trent Jaeger , Antony Edwards , Xiaolan Zhang Managing access control policies using access control spaces. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:3-12 [Conf ] Trent Jaeger , Reiner Sailer , Xiaolan Zhang Resolving constraint conflicts. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:105-114 [Conf ] Xiaolan Zhang , Zheng Wang , Nicholas C. Gloy , J. Bradley Chen , Michael D. Smith System Support for Automated Profiling and Optimization. [Citation Graph (0, 0)][DBLP ] SOSP, 1997, pp:15-26 [Conf ] Reiner Sailer , Xiaolan Zhang , Trent Jaeger , Leendert van Doorn Design and Implementation of a TCG-based Integrity Measurement Architecture. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:223-238 [Conf ] Xiaolan Zhang , Antony Edwards , Trent Jaeger Using CQUAL for Static Analysis of Authorization Hook Placement. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:33-48 [Conf ] Xiaolan Zhang , Margo I. Seltzer HBench: Java: An application-specific benchmarking framework for Java Virtual Machines. [Citation Graph (0, 0)][DBLP ] Concurrency and Computation: Practice and Experience, 2001, v:13, n:8-9, pp:775-792 [Journal ] Trent Jaeger , Antony Edwards , Xiaolan Zhang Consistency analysis of authorization hook placement in the Linux security modules framework. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:175-205 [Journal ] Trent Jaeger , Xiaolan Zhang , Fidel Cacheda Policy management using access control spaces. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:3, pp:327-364 [Journal ] Zhang Wu , Hua Luo , Xiaolan Zhang Optimal np control chart with curtailment. [Citation Graph (0, 0)][DBLP ] European Journal of Operational Research, 2006, v:174, n:3, pp:1723-1741 [Journal ] Xiaolan Zhang , Suzanne McIntosh , Pankaj Rohatgi , John Linwood Griffin XenSocket: A High-Throughput Interdomain Transport for Virtual Machines. [Citation Graph (0, 0)][DBLP ] Middleware, 2007, pp:184-203 [Conf ] Xiaolan Zhang , Giovanni Neglia , James F. Kurose , Donald F. Towsley Performance modeling of epidemic routing. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2867-2891 [Journal ] Automated Security Debugging Using Program Structural Constraints. [Citation Graph (, )][DBLP ] HIMA: A Hypervisor-Based Integrity Measurement Agent. [Citation Graph (, )][DBLP ] Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. [Citation Graph (, )][DBLP ] Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing. [Citation Graph (, )][DBLP ] Trustworthy and personalized computing on public kiosks. [Citation Graph (, )][DBLP ] Secure coprocessor-based intrusion detection. [Citation Graph (, )][DBLP ] Gaining and maintaining confidence in operating systems security. [Citation Graph (, )][DBLP ] AutoISES: Automatically Inferring Security Specification and Detecting Violations. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs