Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Peter L. Reiher
2010 – today
- 2013
[c63]Adam Cozzette, Kathryn Lingel, Steve Matsumoto, Oliver Ortlieb, Jandria Alexander, Joseph Betser, Luke Florer, Geoff Kuenning, John Nilles, Peter L. Reiher: Improving the security of Android inter-component communication. IM 2013: 808-811- 2012
[c62]Aaron Fujimoto, Peter Peterson, Peter L. Reiher: Comparing the Power of Full Disk Encryption Alternatives. IGCC 2012: 1-6
[c61]Charles Fleming, Peter Peterson, Erik Kline, Peter L. Reiher: Data Tethers: Preventing information leakage by enforcing environmental data access policies. ICC 2012: 835-840
[c60]Vahab Pournaghshband, Leonard Kleinrock, Peter L. Reiher, Alexander Afanasyev: Controlling applications by managing network characteristics. ICC 2012: 1085-1090
[c59]Michael Gray, Peter Peterson, Peter L. Reiher: Scaling Down Off-the-Shelf Data Compression: Backwards-Compatible Fine-Grain Mixing. ICDCS 2012: 112-121
[c58]Vahab Pournaghshband, Majid Sarrafzadeh, Peter L. Reiher: Securing Legacy Mobile Medical Devices. MobiHealth 2012: 163-172- 2011
[j23]Joseph D. Touch, Ilia Baldine, Rudra Dutta, Gregory G. Finn, Bryan Ford, Scott Jordan, Daniel Massey, Abraham Matta, Christos Papadopoulos, Peter L. Reiher, George N. Rouskas: A Dynamic Recursive Unified Internet Design (DRUID). Computer Networks 55(4): 919-935 (2011)
[c57]Erik Kline, Alexander Afanasyev, Peter L. Reiher: Shield: DoS filtering using traffic deflecting. ICNP 2011: 37-42- 2010
[j22]Alexander Afanasyev, N. Tilley, Peter L. Reiher, Leonard Kleinrock: Host-to-Host Congestion Control for TCP. IEEE Communications Surveys and Tutorials 12(3): 304-342 (2010)
2000 – 2009
- 2009
[j21]Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas: Accurately Measuring Denial of Service in Simulation and Testbed Experiments. IEEE Trans. Dependable Sec. Comput. 6(2): 81-95 (2009)
[c56]Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Peter L. Reiher: RAD: Reflector Attack Defense Using Message Authentication Codes. ACSAC 2009: 269-278
[c55]
[c54]Venkatraman Ramakrishna, Peter L. Reiher, Leonard Kleinrock: Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments. PerCom 2009: 1-10- 2008
[j20]Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter L. Reiher, Lixia Zhang: Learning the valid incoming direction of IP packets. Computer Networks 52(2): 399-417 (2008)
[j19]Jelena Mirkovic, Peter L. Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, Michael Berg, Robert Jung: Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise. IEEE Trans. Computers 57(8): 1098-1112 (2008)
[c53]Tim Dasilva, Kevin Eustice, Peter L. Reiher: Johnny Appleseed: wardriving to reduce interference in chaotic wireless deployments. MSWiM 2008: 122-131
[c52]Kevin Eustice, A. M. Jourabchi, J. Stoops, Peter L. Reiher: Improving User Satisfaction in a Ubiquitous Computing Application. WiMob 2008: 496-501
[c51]Peter L. Reiher, John Zimmerman, Kevin Eustice: Message from the SAUCE Workshop Organizing Technical Co-chairs. WiMob 2008- 2007
[j18]An-I Andy Wang, Geoff Kuenning, Peter L. Reiher: Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication. Simulation 83(8): 551-569 (2007)
[j17]Charles Weddle, Mathew Oldham, Jin Qian, An-I Andy Wang, Peter L. Reiher, Geoffrey H. Kuenning: PARAID: A gear-shifting power-aware RAID. TOS 3(3) (2007)
[c50]Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab: Towards user-centric metrics for denial-of-service measurement. Experimental Computer Science 2007: 8
[c49]Charles Weddle, Mathew Oldham, Jin Qian, An-I Andy Wang, Peter L. Reiher, Geoff Kuenning: PARAID: A Gear-Shifting Power-Aware RAID. FAST 2007: 245-260
[c48]Kevin Eustice, Venkatraman Ramakrishna, Alison Walker, Matthew Schnaider, Nam T. Nguyen, Peter L. Reiher: nan0sphere: Location-Driven Fiction for Groups of Users. HCI (3) 2007: 852-861
[c47]Matt Beaumont-Gay, Kevin Eustice, Peter L. Reiher: Information protection via environmental data tethers. NSPW 2007: 67-73
[c46]Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Wei-Min Yao, Peter L. Reiher, Stephen Schwab, Roshan K. Thomas: When is service really denied?: a user-centric dos metric. SIGMETRICS 2007: 357-358
[c45]Venkatraman Ramakrishna, Kevin Eustice, Peter L. Reiher: Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios. SOCA 2007: 180-190- 2006
[j16]Venkatraman Ramakrishna, Max Robinson, Kevin Eustice, Peter L. Reiher: An Active Self-Optimizing Multiplayer Gaming Architecture. Cluster Computing 9(2): 201-215 (2006)
[j15]An-I Andy Wang, Geoffrey H. Kuenning, Peter L. Reiher, Gerald J. Popek: The Conquest file system: Better performance through a disk/persistent-RAM hybrid design. TOS 2(3): 309-348 (2006)
[c44]George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson: A Framework for a Collaborative DDoS Defense. ACSAC 2006: 33-42
[c43]Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko: Measuring denial Of service. QoP 2006: 53-58- 2005
[j14]Jelena Mirkovic, Peter L. Reiher: D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks. IEEE Trans. Dependable Sec. Comput. 2(3): 216-232 (2005)
[c42]Everett Anderson, Kevin Eustice, Shane Markstrum, Mark H. Hansen, Peter L. Reiher: Mobile Contagion: Simulation of Infection and Defense. PADS 2005: 80-87
[c41]Jun Li, Toby Ehrenkranz, Geoffrey H. Kuenning, Peter L. Reiher: Simulation and Analysis on the Resiliency and Efficiency of Malnets. PADS 2005: 262-269
[c40]An-I Wang, Peter L. Reiher, Geoffrey H. Kuenning: Introducing permuted states for analyzing conflict rates in optimistic replication. SIGMETRICS 2005: 376-377
[e1]Margaret H. Dunham, Birgitta König-Ries, Evaggelia Pitoura, Peter L. Reiher, Can Türker (Eds.): Mobile Information Management, 24.-29. October 2004. Dagstuhl Seminar Proceedings 04441, IBFI, Schloss Dagstuhl, Germany 2005- 2004
[j13]Jelena Mirkovic, Peter L. Reiher: A taxonomy of DDoS attack and DDoS defense mechanisms. Computer Communication Review 34(2): 39-53 (2004)
[j12]Jun Li, Peter L. Reiher, Gerald J. Popek: Resilient self-organizing overlay networks for security update delivery. IEEE Journal on Selected Areas in Communications 22(1): 189-202 (2004)
[j11]David Ratner, Peter L. Reiher, Gerald J. Popek: Roam: A Scalable Replication System for Mobility. MONET 9(5): 537-544 (2004)
[j10]Nam T. Nguyen, An-I Andy Wang, Peter L. Reiher, Geoffrey H. Kuenning: Electric-field-based routing: a reliable framework for routing in MANETs. Mobile Computing and Communications Review 8(2): 35-49 (2004)
[c39]Joos-Hendrik Böse, Stefan Böttcher, Le Gruenwald, Pedro José Marrón, Philipp Obreiter, Evaggelia Pitoura, Peter L. Reiher, Kai-Uwe Sattler, Frank Seliger: 04441 Working Group - Some Open Aspects of Mobile Ad-hoc NETwork, Peer-to-Peer, and Self-organizing Systems. Mobile Information Management 2004
[c38]Joos-Hendrik Böse, Stefan Böttcher, Le Gruenwald, Evaggelia Pitoura, Peter L. Reiher, George Samaras, Thomas Schwarz, Can Türker: 04441 Working Group - Research Issues in Mobile Transactions. Mobile Information Management 2004
[c37]Margaret H. Dunham, Birgitta König-Ries, Evaggelia Pitoura, Peter L. Reiher, Can Türker: 04441 Executive Summary - Mobile Information Management. Mobile Information Management 2004
[c36]Margaret H. Dunham, Birgitta König-Ries, Evaggelia Pitoura, Peter L. Reiher, Can Türker: 04441 Abstracts Collection - Mobile Information Management. Mobile Information Management 2004- 2003
[c35]Max Robinson, Jelena Mirkovic, B. Scott Michel, Matthew Schnaider, Peter L. Reiher: DefCOM: Defensive Cooperative Overlay Mesh. DISCEX (2) 2003: 101-102
[c34]Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenning: Detecting Insider Threats by Monitoring System Call Activity. IAW 2003: 45-52
[c33]Venkatraman Ramakrishna, Max Robinson, Kevin Eustice, Peter L. Reiher: An Active Self-Optimizing Multiplayer Gaming Architecture. Active Middleware Services 2003: 32-41
[c32]
[c31]Kevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald J. Popek, Venkatraman Ramakrishna, Peter L. Reiher: Enabling Secure Ubiquitous Interactions. Middleware Workshops 2003: 76-80
[c30]
[c29]Jelena Mirkovic, Max Robinson, Peter L. Reiher: Alliance formation for DDoS defense. NSPW 2003: 11-18
[c28]Kevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald J. Popek, Venkatraman Ramakrishna, Peter L. Reiher: Securing nomads: the case for quarantine, examination, and decontamination. NSPW 2003: 123-128- 2002
[b1]Jun Li, Peter L. Reiher, Gerald J. Popek: Disseminating Security Updates at Internet Scale. Advances in Information Security 8, Springer 2002, pp. 1-144
[j9]Jun Li, Mark Yarvis, Peter L. Reiher: Securing distributed adaptation. Computer Networks 38(3): 347-371 (2002)
[j8]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Ouri Wolfson: Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems. SIGMOD Record 31(2): 73-79 (2002)
[c27]Vincent Ferreria, Alexey Rudenko, Kevin Eustice, Richard G. Guy, Venkatraman Ramakrishna, Peter L. Reiher: Panda: Middleware to Provide the Benefits of Active Networks to Legacy Applications. DANCE 2002: 319-332
[c26]An-I Wang, Peter L. Reiher, Rajive Bagrodia, Geoffrey H. Kuenning: Understanding the Behavior of the Conflict-Rate Metric in Optimistic Peer Replication. DEXA Workshops 2002: 757-764
[c25]
[c24]Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Reiher, Lixia Zhang: SAVE: Source Address Validity Enforcement Protocol. INFOCOM 2002
[c23]Geoffrey H. Kuenning, Wilkie Ma, Peter L. Reiher, Gerald J. Popek: Simplifying automated hoarding methods. MSWiM 2002: 15-21
[c22]An-I Wang, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning: Conquest: Better Performance Through a Disk/Persistent-RAM Hybrid File System. USENIX Annual Technical Conference, General Track 2002: 15-28- 2001
[j7]Todd Ekenstam, Charles Matheny, Peter L. Reiher, Gerald J. Popek: The Bengal Database Replication System. Distributed and Parallel Databases 9(3): 187-210 (2001)
[j6]David Ratner, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning: Replication Requirements in Mobile Environments. MONET 6(6): 525-533 (2001)
[c21]B. Scott Michel, Peter L. Reiher: Peer-through-Peer Communication for Information Logistics. GI Jahrestagung (1) 2001: 248-256
[c20]An-I Wang, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning: The Conquest File System's Life after Disks. HotOS 2001: 186
[c19]Peter L. Reiher, Kevin Eustice, Kai-Min Sung: Adapting Encrypted Data Streams in Open Architectures. Active Middleware Services 2001: 45-50
[c18]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Alexander L. Wolf, Ouri Wolfson: Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona. Infrastructure for Mobile and Wireless Systems 2001: 1-37- 2000
[j5]B. R. Badrinath, Armando Fox, Leonard Kleinrock, Gerald J. Popek, Peter L. Reiher, Mahadev Satyanarayanan: A conceptual framework for network and client adaptation. MONET 5(4): 221-231 (2000)
[c17]B. Scott Michel, Konstantinos Nikoloudakis, Peter L. Reiher, Lixia Zhang: URL Forwarding and Compression in Adaptive Web Caching. INFOCOM 2000: 670-678
1990 – 1999
- 1999
[c16]David Ratner, Peter L. Reiher, Gerald J. Popek: Roam: A Scalable Replication System for Mobile Computing. DEXA Workshop 1999: 96-104
[c15]Mark Yarvis, Peter L. Reiher, Gerald J. Popek: Conductor: A Framework for Distributed Adaptation. Workshop on Hot Topics in Operating Systems 1999: 44-
[c14]Mitchell Tsai, Peter L. Reiher, Gerald J. Popek: Command Management System for Next-Generation User Input. Workshop on Hot Topics in Operating Systems 1999: 179-184
[c13]An-I Wang, Peter L. Reiher, Rajive Bagrodia: A simulation evaluation of optimistic replicated filing in mobile environments. IPCCC 1999: 43-51
[c12]David Ratner, Peter L. Reiher, Gerald J. Popek, Richard G. Guy: Peer Replication with Selective Control. MDA 1999: 169-181
[c11]Jun Li, Peter L. Reiher, Gerald J. Popek: Securing information transmission by redundancy. NSPW 1999: 112-117
[c10]Alexey Rudenko, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning: The Remote Processing Framework for Portable Computer Power Saving. SAC 1999: 365-372- 1998
[j4]Alexey Rudenko, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning: Saving portable computer battery power through remote process execution. Mobile Computing and Communications Review 2(1): 19-26 (1998)
[j3]Thomas W. Page Jr., Richard G. Guy, John S. Heidemann, David Ratner, Peter L. Reiher, Ashish Goel, Geoffrey H. Kuenning, Gerald J. Popek: Perspectives on Optimistically Replicated, Peer-to-Peer Filing. Softw., Pract. Exper. 28(2): 155-180 (1998)
[c9]Geoffrey H. Kuenning, Rajive Bagrodia, Richard G. Guy, Gerald J. Popek, Peter L. Reiher, An-I Wang: Measuring the Quality of Service of Optimistic Replication. ECOOP Workshops 1998: 319-320
[c8]Richard G. Guy, Peter L. Reiher, David Ratner, Michial Gunter, Wilkie Ma, Gerald J. Popek: Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication. ER Workshops 1998: 254-265- 1997
[j2]Geoffrey H. Kuenning, Peter L. Reiher, Gerald J. Popek: Experience with an Automated Hoarding System. Personal and Ubiquitous Computing 1(3): 145-155 (1997)- 1994
[c7]Peter L. Reiher, John S. Heidemann, David Ratner, Gregory Skinner, Gerald J. Popek: Resolving File Conflicts in the Ficus File System. USENIX Summer 1994: 183-195
[c6]Geoffrey H. Kuenning, Gerald J. Popek, Peter L. Reiher: An Analysis of Trace Data for Predictive File Caching in Mobile Computing. USENIX Summer 1994: 291-303- 1991
[c5]David R. Jefferson, Peter L. Reiher: Supercritical speedup. Annual Simulation Symposium 1991: 159-168- 1990
[c4]Peter L. Reiher: Parallel simulation using the time warp operating system. Winter Simulation Conference 1990: 38-45
[c3]Matthew T. Presley, Peter L. Reiher, Steven F. Bellenot: A time warp implementation of Sharks World. Winter Simulation Conference 1990: 199-203
1980 – 1989
- 1989
[j1]Frederick Wieland, L. Hayley, A. Feinberg, Mike Di Loreto, Leo Blume, J. Ruffles, Peter L. Reiher, Brian Beckman, Phil Hontalas, Steve Bellenot, David R. Jefferson: The Performance of a Distributed Combat Simulation with the Time Warp Operating System. Concurrency - Practice and Experience 1(1): 35-50 (1989)
[c2]Peter L. Reiher, Frederick Wieland, David R. Jefferson: Limitation of optimism in the time warp operating system. Winter Simulation Conference 1989: 765-770- 1987
[c1]Peter L. Reiher, Gerald J. Popek: Locus Naming in a Large Scale Environment. Kommunikation in Verteilten Systemen 1987: 167-177
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:15 CEST by the dblp team



