The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jonathan M. Smith: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith
    Implementing a distributed firewall. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:190-199 [Conf]
  2. Albert G. Broscius, Jonathan M. Smith
    Exploiting Parallelism in Hardware Implementations of the DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:367-376 [Conf]
  3. Jonathan M. Smith
    Practical Problems with a Cryptographic Protection Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:64-73 [Conf]
  4. Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith
    A Secure PLAN. [Citation Graph (0, 0)][DBLP]
    DANCE, 2002, pp:224-237 [Conf]
  5. Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith
    The STRONGMAN Architecture. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:178-188 [Conf]
  6. D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith
    Security in Active Networks. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:433-451 [Conf]
  7. Ilija Hadzic, Jonathan M. Smith
    P4: A platform for FPGA implementation of protocol boosters. [Citation Graph (0, 0)][DBLP]
    FPL, 1997, pp:438-447 [Conf]
  8. Ilija Hadzic, Sanjay Udani, Jonathan M. Smith
    FPGA Viruses. [Citation Graph (0, 0)][DBLP]
    FPL, 1999, pp:291-300 [Conf]
  9. Jonathan M. Smith, Gerald Q. Maguire Jr.
    Transparent Concurrent Execution of Mutually Exclusive Alternatives. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1989, pp:44-52 [Conf]
  10. Klara Nahrstedt, Jonathan M. Smith
    New Algorithms for Admission Control and Scheduling to Support Multimedia Feedback Remote Control Applications. [Citation Graph (0, 0)][DBLP]
    ICMCS, 1996, pp:532-539 [Conf]
  11. Jonathan M. Smith, Gerald Q. Maguire Jr.
    Exploring "Multiple Worlds" in Parallel. [Citation Graph (0, 0)][DBLP]
    ICPP (2), 1989, pp:239-245 [Conf]
  12. David D. Clark, David L. Tennenhouse, David J. Farber, Jonathan M. Smith, Bruce S. Davie, W. David Sincoskie, Inder S. Gopal, Bharath K. Kadaba
    An Overview of the AURORA Gigabit Testbed. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1992, pp:569-581 [Conf]
  13. Yun Mao, Björn Knutsson, Honghui Lu, Jonathan M. Smith
    DHARMA: distributed home agent for robust mobile access. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:1196-1206 [Conf]
  14. Klara Nahrstedt, Jonathan M. Smith
    A Service Kernel for Multimedia Endstations. [Citation Graph (0, 0)][DBLP]
    IWACA, 1994, pp:8-22 [Conf]
  15. D. Scott Alexander, Jonathan M. Smith
    The Architecture of ALIEN. [Citation Graph (0, 0)][DBLP]
    IWAN, 1999, pp:1-12 [Conf]
  16. Kostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
    Scalable Resource Control in Active Networks. [Citation Graph (0, 0)][DBLP]
    IWAN, 2000, pp:343-357 [Conf]
  17. Kostas G. Anagnostakis, Sotiris Ioannidis, Stefan Miltchev, Jonathan M. Smith
    Practical Network Applications on a Lightweight Active Management Environment. [Citation Graph (0, 0)][DBLP]
    IWAN, 2001, pp:101-115 [Conf]
  18. Alex Galis, Bernhard Plattner, Jonathan M. Smith, Spyros G. Denazis, Eckhard Moeller, Hui Guo, Cornel Klein, Joan Serrat, Jan Laarhuis, George T. Karetsos, Chris Todd
    A Flexible IP Active Networks Architecture. [Citation Graph (0, 0)][DBLP]
    IWAN, 2000, pp:1-15 [Conf]
  19. Jonathan M. Smith, Shih-Fu Chang
    Quad-Tree Segmentation for Texture-Based Image Query. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 1994, pp:279-286 [Conf]
  20. William A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith
    Automated Recovery in a Secure Bootstrap Process. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  21. Jonathan M. Smith
    PDIS and The Information Highway. [Citation Graph (0, 3)][DBLP]
    PDIS, 1994, pp:220-222 [Conf]
  22. James Alexander, Jonathan M. Smith
    Engineering Privacy in Public: Confounding Face Recognition. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2003, pp:88-106 [Conf]
  23. Jonathan S. Shapiro, David J. Farber, Jonathan M. Smith
    State Caching in the EROS Kernel. [Citation Graph (0, 0)][DBLP]
    POS, 1996, pp:88-100 [Conf]
  24. C. Brendan, S. Traw, Jonathan M. Smith
    A High-Performance Host Interface for ATM Networks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1991, pp:317-325 [Conf]
  25. D. Scott Alexander, Marianne Shaw, Scott Nettles, Jonathan M. Smith
    Active Bridging. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1997, pp:101-111 [Conf]
  26. Steve Muir, Jonathan M. Smith
    Functional divisions in the Piglet multiprocessor operating system. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1998, pp:255-260 [Conf]
  27. Jonathan S. Shapiro, Jonathan M. Smith, David J. Farber
    EROS: a fast capability system. [Citation Graph (0, 0)][DBLP]
    SOSP, 1999, pp:170-185 [Conf]
  28. William A. Arbaugh, David J. Farber, Jonathan M. Smith
    A Secure and Reliable Bootstrap Architecture. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:65-71 [Conf]
  29. Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
    Secure and Flexible Global File Sharing. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2003, pp:165-178 [Conf]
  30. Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
    Design and Implementation of Virtual Private Services. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:269-274 [Conf]
  31. Steve Muir, Jonathan M. Smith
    An operating system architecture for network processors. [Citation Graph (0, 0)][DBLP]
    ANCS, 2005, pp:61-70 [Conf]
  32. Jonathan M. Smith
    The influence of ATM on operating systems. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:5, pp:29-37 [Journal]
  33. David D. Clark, Bruce S. Davie, David J. Farber, Inder S. Gopal, Bharath K. Kadaba, W. David Sincoskie, Jonathan M. Smith, David L. Tennenhouse
    The AURORA Gigabit Testbed. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1993, v:25, n:6, pp:599-621 [Journal]
  34. Jonathan M. Smith, David J. Farber
    Traffic Characteristics of a Distributed Memory System. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1991, v:22, n:2, pp:143-154 [Journal]
  35. Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, D. Li, Jonathan M. Smith
    Flexible network monitoring with FLAME. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:14, pp:2548-2563 [Journal]
  36. William A. Arbaugh, James R. Davin, David J. Farber, Jonathan M. Smith
    Security for Virtual Private Intranets. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:9, pp:48-55 [Journal]
  37. Jonathan M. Smith
    Programmable Networks: Selected Challenges in Computer Networking. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1999, v:32, n:1, pp:40-42 [Journal]
  38. Jonathan M. Smith, Kenneth L. Calvert, Sandra L. Murphy, Hilarie K. Orman, Larry L. Peterson
    Activating Networks: A Progress Report. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1999, v:32, n:4, pp:32-41 [Journal]
  39. Jonathan M. Smith, Gerald Q. Maguire Jr.
    Effects of Copy-on-Write Memory Management on the Response Time of UNIX Fork Operations. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1988, v:1, n:3, pp:255-278 [Journal]
  40. Jonathan M. Smith
    The Software Design Laboratory. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1991, v:4, n:4, pp:385-404 [Journal]
  41. Klara Nahrstedt, Jonathan M. Smith
    The QOS Broker. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 1995, v:2, n:1, pp:53-67 [Journal]
  42. C. Brendan, S. Traw, Jonathan M. Smith
    Hardware/Software Organization of a High-Performance ATM Host Interface. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:2, pp:240-253 [Journal]
  43. Klara Nahrstedt, Jonathan M. Smith
    Design, Implementation, and Experiences of the OMEGA End-Point Architecture. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1996, v:14, n:7, pp:1263-1279 [Journal]
  44. Ming-Chit Tam, Jonathan M. Smith, David J. Farber
    A Taxonomy-Based Comparison of Several Distributed Shared Memory Systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1990, v:24, n:3, pp:40-67 [Journal]
  45. Jonathan M. Smith
    A Survey of Process Migration Mechanisms. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1988, v:22, n:3, pp:28-40 [Journal]
  46. Gerald Q. Maguire Jr., Jonathan M. Smith
    Process migration: effects on scientific computation. [Citation Graph (0, 0)][DBLP]
    SIGPLAN Notices, 1988, v:23, n:3, pp:102-106 [Journal]
  47. Jonathan M. Smith
    Rapid Location of Mount Points. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1989, v:19, n:9, pp:829-838 [Journal]
  48. Ilija Hadzic, Jonathan M. Smith
    Balancing performance and flexibility with hardware support for network architectures. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2003, v:21, n:4, pp:375-411 [Journal]
  49. Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith
    A secure PLAN. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:413-426 [Journal]
  50. Jonathan M. Smith, Scott Nettles
    Active Networking: One View of the Past, Present, and Future. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2004, v:34, n:1, pp:4-18 [Journal]
  51. Yun Mao, Feng Wang, Lili Qiu, Simon S. Lam, Jonathan M. Smith
    S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    NSDI, 2007, pp:- [Conf]
  52. Angelos D. Keromytis, Jonathan M. Smith
    Requirements for scalable access control and security management architectures. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2007, v:7, n:2, pp:- [Journal]

  53. Networkmd: topology inference and failure diagnosis in the last mile. [Citation Graph (, )][DBLP]


  54. Sub-operating systems: a new approach to application security. [Citation Graph (, )][DBLP]


  55. Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. [Citation Graph (, )][DBLP]


  56. MOSAIC: unified declarative platform for dynamic overlay composition. [Citation Graph (, )][DBLP]


  57. Efficient packet monitoring for network management. [Citation Graph (, )][DBLP]


  58. Differential privacy for collaborative security. [Citation Graph (, )][DBLP]


  59. QuanTM: a quantitative trust management system. [Citation Graph (, )][DBLP]


  60. Fighting physics: a tough battle. [Citation Graph (, )][DBLP]


  61. Viewpoint - On public service and computer science. [Citation Graph (, )][DBLP]


  62. Dynamic Trust Management. [Citation Graph (, )][DBLP]


  63. Decentralized access control in distributed file systems. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.459secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002