Works Published in 2008

search works

Displaying works 1 - 20 of 137 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2008 conference paper

Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections Following Project EVEREST

Proceedings of the USENIX/ACCURATE Electronic Voting Technology (EVT) Workshop.

By: K. Butler, W. Enck, H. Hursti, S. McLaughlin, P. Traynor & P. McDaniel

Source: ORCID
Added: January 2, 2024

2008 conference paper

Realizing massive-scale conditional access systems through attribute-based cryptosystems

In Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS).

By: P. Traynor, K. Butler, W. Enck & P. McDaniel

Source: ORCID
Added: January 2, 2024

2008 journal article

Privacy Preserving Web-based Email

Algorithms, Architectures and Information Systems Security, 3, 349.

TL;DR: This paper creates virtual channels over online services (e.g., Google's Gmail, Microsoft's Hotmail) through which messages and cryptographic keys are delivered and creates a wired “spread-spectrum” mechanism for protecting the privacy of web-based communication. (via Semantic Scholar)
Source: ORCID
Added: January 2, 2024

2008 conference paper

Pinup: Pinning user files to known applications

2008 Annual Computer Security Applications Conference (ACSAC), 55–64.

By: W. Enck, P. McDaniel & T. Jaeger

Event: IEEE

Source: ORCID
Added: January 2, 2024

2008 journal article

Mitigating Android software misuse before it happens

Pennsylvania State University, Tech. Rep. NAS-TR-0094-2008.

By: W. Enck, M. Ongtang & P. McDaniel

Source: ORCID
Added: January 2, 2024

2008 journal article

Exploiting open functionality in SMS-capable cellular networks

Journal of Computer Security, 16(6), 713–742.

By: P. Traynor, W. Enck, P. Mcdaniel & T. La Porta

Source: ORCID
Added: January 2, 2024

2008 conference paper

Defending against attacks on main memory persistence

2008 Annual Computer Security Applications Conference (ACSAC), 65–74.

By: W. Enck, K. Butler, T. Richardson, P. McDaniel & A. Smith

Event: IEEE

Source: ORCID
Added: January 2, 2024

2008 report

A measurement framework of alert characteristics for false positive mitigation models

North Carolina State University. Dept. of Computer Science.

By: S. Heckman & L. Williams

Source: ORCID
Added: July 18, 2023

2008 conference paper

On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques

Proceedings of the Second ACM-IEEE international symposium on Empirical software engineering and measurement, 41–50.

By: S. Heckman & L. Williams

Event: ACM

Source: ORCID
Added: July 18, 2023

2008 book

Traffic Grooming for Optical Networks

Georgios Rouskas

Ed(s): R. Dutta, A. Kamal & G. Rouskas*

TL;DR: This paper will concern you to try reading traffic grooming for optical networks as one of the reading material to finish quickly. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: July 2, 2023

2008 chapter

Hierarchical Traffic Grooming

In R. Dutta, A. E. Kamal, & G. N. Rouskas (Eds.), Optical Networks (pp. 73–88).

By: G. Rouskas* & R. Dutta

Ed(s): R. Dutta, A. Kamal & G. Rouskas*

TL;DR: Hierarchical traffic grooming techniques for networks with a special topology are surveyed in Section 1.2. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: July 2, 2023

2008 chapter book

Introduction

By: R. Dutta, A. Kamal & G. Rouskas*

Sources: Crossref, NC State University Libraries
Added: June 26, 2023

2008 chapter book

Grooming Mechanisms in SONET/SDH and Next-Generation SONET/SDH

By: R. Dutta, A. Kamal & G. Rouskas*

TL;DR: The move to optical transmission systems was accompanied by a move to a synchronous architecture, which means that SONET/SDH performs multiplexing in a strictly time division multiplexed, and the distinctions between the two are not important. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: June 26, 2023

2008 conference paper

State extensions for java pathfinder

30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008, 863–866.

By: T. Gvero*, M. Gligoric*, S. Lauterburg*, M. d’Amorim*, D. Marinov* & S. Khurshid*

TL;DR: This paper summarizes four extensions that have been developed to the JPF state representation and operations and provides a new functionality to JPF, and three extensions improve performance of JPF in various scenarios. (via Semantic Scholar)
Source: ORCID
Added: June 21, 2023

2008 journal article

Delta Execution for Efficient State-Space Exploration of Object-Oriented Programs

IEEE Trans. Software Eng., 34(5), 597–613.

By: M. d’Amorim*, S. Lauterburg* & D. Marinov*

Source: ORCID
Added: June 21, 2023

2008 conference paper

30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008

ACM.

Marcelo D'Amorim

Ed(s): W. Sch\"a

Source: ORCID
Added: June 21, 2023

2008 chapter

On optimal sizing of tiered network services

In 27th Ieee Conference on Computer Communications (Infocom), Vols 1-5 (pp. 1–5).

By: Q. Lv, G. Rouskas & Ieee

Contributors: Ieee, Q. Lv & G. Rouskas

Source: ORCID
Added: June 21, 2023

2008 journal article

Efficient resource management using advance reservations for heterogeneous Grids

2008 Ieee International Symposium on Parallel & Distributed Processing, Vols 1-8, 916–927.

By: C. Castillo, G. Rouskas, K. Harfoush & Ieee

Contributors: C. Castillo, K. Harfoush, Ieee & G. Rouskas

Source: ORCID
Added: June 21, 2023

2008 journal article

Edge Reconfigurable Optical Network (ERON): Enabling Dynamic Sharing of Static Lightpaths

2008 5th International Conference on Broadband Communications, Networks and Systems (Broadnets 2008), 332–334.

By: G. Karmous-Edwards n, D. Reeves n, G. Rouskas n, L. Battestilli n, P. Vegesna n, A. Vishwanath n, Ieee

Contributors: L. Battestilli n, Ieee, G. Karmous-Edwards, D. Reeves n, G. Rouskas n, P. Vegesna n, A. Vishwanath n

TL;DR: This paper describes the key concepts involved in the design of an efficient ERON network combined with routing and reservation algorithms to assure low blocking probabilities and describes the management and control architecture and protocols required to provide end-user/application control of the dynamic lightpaths. (via Semantic Scholar)
Source: ORCID
Added: June 21, 2023

2008 journal article

A New Internet Architecture to Enable Software Defined Optics and Evolving Optical Switching Models

2008 5th International Conference on Broadband Communications, Networks and Systems (Broadnets 2008), 71–76.

By: G. Rouskas n, R. Dutta n, I. Baldine & Ieee

Contributors: I. Baldine, R. Dutta n, Ieee & G. Rouskas

TL;DR: This paper provides an update on the current status of the SILO architecture and the prototype software implementation and introduces the concept of ldquosoftware defined opticsrdquo (SDO) to refer to the emerging intelligent and programmable optical layer. (via Semantic Scholar)
Source: ORCID
Added: June 21, 2023

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.