


Остановите войну!
for scientists:


default search action
Peter L. Reiher
Person information

- affiliation: University of California, Los Angeles, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [i5]Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, Peter L. Reiher:
Adaptive Distributed Filtering of DDoS Traffic on the Internet. CoRR abs/2305.13296 (2023) - 2022
- [j24]Lumin Shi
, Jun Li
, Mingwei Zhang
, Peter L. Reiher
:
On Capturing DDoS Traffic Footprints on the Internet. IEEE Trans. Dependable Secur. Comput. 19(4): 2755-2770 (2022) - 2020
- [c81]Robert Roy, Erika Dennis, An-I Andy Wang, Peter L. Reiher, Sarah M. Diesburg
:
An exploration of targeted provenance for reliability. SAC 2020: 1207-1213
2010 – 2019
- 2019
- [c80]Mingwei Zhang, Lumin Shi, Devkishen Sisodia, Jun Li, Peter L. Reiher:
On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic. IM 2019: 180-188 - [c79]Mevlut Turker Garip, Jonathan Lin, Peter L. Reiher, Mario Gerla:
SHIELDNET: An Adaptive Detection Mechanism against Vehicular Botnets in VANETs. VNC 2019: 1-7 - [c78]Mevlut Turker Garip, Peter L. Reiher, Mario Gerla:
RIoT: A Rapid Exploit Delivery Mechanism against IoT Devices Using Vehicular Botnets. VTC Fall 2019: 1-6 - 2018
- [c77]Mevlut Turker Garip, Peter L. Reiher, Mario Gerla:
BOTVEILLANCE: A Vehicular Botnet Surveillance Attack against Pseudonymous Systems in VANETs. WMNC 2018: 53-60 - [c76]Lumin Shi, Mingwei Zhang, Jun Li, Peter L. Reiher:
PathFinder: Capturing DDoS Traffic Footprints on the Internet. Networking 2018: 10-18 - 2017
- [c75]Jelena Mirkovic, Erik Kline, Peter L. Reiher:
RESECT: Self-Learning Traffic Filters for IP Spoofing Defense. ACSAC 2017: 474-485 - [c74]Mevlut Turker Garip, Paul Hyungmin Kim, Peter L. Reiher, Mario Gerla:
INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks. CCNC 2017: 1-6 - 2016
- [c73]Peter A. H. Peterson, Peter L. Reiher:
Datacomp: Locally Independent Adaptive Compression for Real-World Systems. ICDCS 2016: 211-220 - [c72]Mevlut Turker Garip, Peter L. Reiher, Mario Gerla:
Ghost: Concealing vehicular botnet communication in the VANET control channel. IWCMC 2016: 1-6 - 2015
- [c71]Mevlut Turker Garip, Mehmet Emre Gursoy, Peter L. Reiher, Mario Gerla:
Scalable reactive vehicle-to-vehicle congestion avoidance mechanism. CCNC 2015: 943-948 - [c70]Michael Mitchell, Ratnesh Patidar, Manik Saini, Parteek Singh, An-I Wang, Peter L. Reiher:
Mobile usage patterns and privacy implications. PerCom Workshops 2015: 457-462 - [c69]Michael Mitchell, An-I Andy Wang, Peter L. Reiher:
Cashtags: Protecting the Input and Display of Sensitive Data. USENIX Security Symposium 2015: 961-976 - 2014
- [c68]Vahab Pournaghshband, David Meyer, Michael Holyland, Majid Sarrafzadeh, Peter L. Reiher:
Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices. CSE 2014: 758-763 - [c67]Vahab Pournaghshband, Alexander Afanasyev
, Peter L. Reiher:
End-to-end detection of compression of traffic flows by intermediaries. NOMS 2014: 1-8 - [c66]Jun Li, Skyler Berg, Mingwei Zhang, Peter L. Reiher, Tao Wei:
Drawbridge: software-defined DDoS-resistant traffic engineering. SIGCOMM 2014: 591-592 - 2013
- [c65]Adam Cozzette, Kathryn Lingel, Steve Matsumoto, Oliver Ortlieb, Jandria Alexander, Joseph Betser, Luke Florer, Geoff Kuenning, John Nilles, Peter L. Reiher:
Improving the security of Android inter-component communication. IM 2013: 808-811 - 2012
- [c64]Aaron Fujimoto, Peter Peterson, Peter L. Reiher:
Comparing the Power of Full Disk Encryption Alternatives. IGCC 2012: 1-6 - [c63]Charles Fleming, Peter Peterson, Erik Kline, Peter L. Reiher:
Data Tethers: Preventing information leakage by enforcing environmental data access policies. ICC 2012: 835-840 - [c62]Vahab Pournaghshband, Leonard Kleinrock, Peter L. Reiher, Alexander Afanasyev
:
Controlling applications by managing network characteristics. ICC 2012: 1085-1090 - [c61]Michael Gray, Peter Peterson, Peter L. Reiher:
Scaling Down Off-the-Shelf Data Compression: Backwards-Compatible Fine-Grain Mixing. ICDCS 2012: 112-121 - [c60]Vahab Pournaghshband, Majid Sarrafzadeh, Peter L. Reiher:
Securing Legacy Mobile Medical Devices. MobiHealth 2012: 163-172 - 2011
- [j23]Joseph D. Touch, Ilia Baldine
, Rudra Dutta
, Gregory G. Finn, Bryan Ford
, Scott Jordan, Daniel Massey, Abraham Matta, Christos Papadopoulos, Peter L. Reiher, George N. Rouskas
:
A Dynamic Recursive Unified Internet Design (DRUID). Comput. Networks 55(4): 919-935 (2011) - [c59]Erik Kline, Alexander Afanasyev
, Peter L. Reiher:
Shield: DoS filtering using traffic deflecting. ICNP 2011: 37-42 - [c58]Peter Peterson, Digvijay Singh, William J. Kaiser, Peter L. Reiher:
Investigating Energy and Security Trade-offs in the Classroom with the Atom LEAP Testbed. CSET 2011 - 2010
- [j22]Alexander Afanasyev
, N. Tilley, Peter L. Reiher, Leonard Kleinrock:
Host-to-Host Congestion Control for TCP. IEEE Commun. Surv. Tutorials 12(3): 304-342 (2010) - [c57]Peter Peterson, Peter L. Reiher:
Security Exercises for the Online Classroom with DETER. CSET 2010
2000 – 2009
- 2009
- [j21]Jelena Mirkovic, Alefiya Hussain
, Sonia Fahmy
, Peter L. Reiher, Roshan K. Thomas:
Accurately Measuring Denial of Service in Simulation and Testbed Experiments. IEEE Trans. Dependable Secur. Comput. 6(2): 81-95 (2009) - [c56]Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Peter L. Reiher:
RAD: Reflector Attack Defense Using Message Authentication Codes. ACSAC 2009: 269-278 - [c55]Erik Kline, Peter L. Reiher:
Securing data through avoidance routing. NSPW 2009: 115-124 - [c54]Venkatraman Ramakrishna, Peter L. Reiher, Leonard Kleinrock:
Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments. PerCom 2009: 1-10 - 2008
- [j20]Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter L. Reiher, Lixia Zhang:
Learning the valid incoming direction of IP packets. Comput. Networks 52(2): 399-417 (2008) - [j19]Jelena Mirkovic, Peter L. Reiher, Christos Papadopoulos, Alefiya Hussain
, Marla Shepard, Michael Berg, Robert Jung:
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise. IEEE Trans. Computers 57(8): 1098-1112 (2008) - [c53]Kevin Eustice, Venkatraman Ramakrishna, Nam T. Nguyen, Peter L. Reiher:
The Smart Party: A Personalized Location-Aware Multimedia Experience. CCNC 2008: 873-877 - [c52]Tim Dasilva, Kevin Eustice, Peter L. Reiher:
Johnny Appleseed: wardriving to reduce interference in chaotic wireless deployments. MSWiM 2008: 122-131 - [c51]Kevin Eustice, A. M. Jourabchi, J. Stoops, Peter L. Reiher:
Improving User Satisfaction in a Ubiquitous Computing Application. WiMob 2008: 496-501 - [c50]Peter L. Reiher, John Zimmerman, Kevin Eustice:
Message from the SAUCE Workshop Organizing Technical Co-chairs. WiMob 2008 - 2007
- [j18]An-I Andy Wang, Geoff Kuenning
, Peter L. Reiher:
Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication. Simul. 83(8): 551-569 (2007) - [j17]Charles Weddle, Mathew Oldham, Jin Qian, An-I Andy Wang, Peter L. Reiher, Geoffrey H. Kuenning:
PARAID: A gear-shifting power-aware RAID. ACM Trans. Storage 3(3): 13:1-13:33 (2007) - [c49]Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy
, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab
:
Towards user-centric metrics for denial-of-service measurement. Experimental Computer Science 2007: 8 - [c48]Charles Weddle, Mathew Oldham, Jin Qian, An-I Andy Wang, Peter L. Reiher, Geoff Kuenning:
PARAID: A Gear-Shifting Power-Aware RAID. FAST 2007: 245-260 - [c47]Kevin Eustice, Venkatraman Ramakrishna, Alison Walker, Matthew Schnaider, Nam T. Nguyen, Peter L. Reiher:
nan0sphere: Location-Driven Fiction for Groups of Users. HCI (3) 2007: 852-861 - [c46]Matt Beaumont-Gay, Kevin Eustice, Peter L. Reiher:
Information protection via environmental data tethers. NSPW 2007: 67-73 - [c45]Jelena Mirkovic, Alefiya Hussain
, Brett Wilson, Sonia Fahmy
, Wei-Min Yao, Peter L. Reiher, Stephen Schwab
, Roshan K. Thomas:
When is service really denied?: a user-centric dos metric. SIGMETRICS 2007: 357-358 - [c44]Venkatraman Ramakrishna, Kevin Eustice, Peter L. Reiher:
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios. SOCA 2007: 180-190 - [c43]Jelena Mirkovic, Songjie Wei, Alefiya Hussain, Brett Wilson, Roshan K. Thomas, Stephen Schwab, Sonia Fahmy
, Roman Chertov, Peter L. Reiher:
DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed. TRIDENTCOM 2007: 1-7 - [c42]Jelena Mirkovic, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas:
Automating DDoS Experimentation. DETER 2007 - 2006
- [j16]Venkatraman Ramakrishna, Max Robinson, Kevin Eustice, Peter L. Reiher:
An Active Self-Optimizing Multiplayer Gaming Architecture. Clust. Comput. 9(2): 201-215 (2006) - [j15]An-I Andy Wang, Geoffrey H. Kuenning
, Peter L. Reiher, Gerald J. Popek:
The Conquest file system: Better performance through a disk/persistent-RAM hybrid design. ACM Trans. Storage 2(3): 309-348 (2006) - [c41]George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson:
A Framework for a Collaborative DDoS Defense. ACSAC 2006: 33-42 - [c40]Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy
, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab
, Calvin Ko:
Measuring denial Of service. QoP 2006: 53-58 - 2005
- [j14]Jelena Mirkovic, Peter L. Reiher:
D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks. IEEE Trans. Dependable Secur. Comput. 2(3): 216-232 (2005) - [c39]Everett Anderson, Kevin Eustice, Shane Markstrum, Mark H. Hansen, Peter L. Reiher:
Mobile Contagion: Simulation of Infection and Defense. PADS 2005: 80-87 - [c38]Jun Li, Toby Ehrenkranz, Geoffrey H. Kuenning, Peter L. Reiher:
Simulation and Analysis on the Resiliency and Efficiency of Malnets. PADS 2005: 262-269 - [c37]An-I Wang, Peter L. Reiher, Geoffrey H. Kuenning:
Introducing permuted states for analyzing conflict rates in optimistic replication. SIGMETRICS 2005: 376-377 - [e1]Margaret H. Dunham, Birgitta König-Ries, Evaggelia Pitoura, Peter L. Reiher, Can Türker:
Mobile Information Management, 24.-29. October 2004. Dagstuhl Seminar Proceedings 04441, IBFI, Schloss Dagstuhl, Germany 2005 [contents] - 2004
- [j13]Jelena Mirkovic, Peter L. Reiher:
A taxonomy of DDoS attack and DDoS defense mechanisms. Comput. Commun. Rev. 34(2): 39-53 (2004) - [j12]Jun Li, Peter L. Reiher, Gerald J. Popek:
Resilient self-organizing overlay networks for security update delivery. IEEE J. Sel. Areas Commun. 22(1): 189-202 (2004) - [j11]David Ratner, Peter L. Reiher, Gerald J. Popek:
Roam: A Scalable Replication System for Mobility. Mob. Networks Appl. 9(5): 537-544 (2004) - [j10]Nam T. Nguyen, An-I Andy Wang, Peter L. Reiher, Geoffrey H. Kuenning:
Electric-field-based routing: a reliable framework for routing in MANETs. ACM SIGMOBILE Mob. Comput. Commun. Rev. 8(2): 35-49 (2004) - [i4]Joos-Hendrik Böse, Stefan Böttcher, Le Gruenwald, Pedro José Marrón, Philipp Obreiter, Evaggelia Pitoura, Peter L. Reiher, Kai-Uwe Sattler, Frank Seliger:
04441 Working Group - Some Open Aspects of Mobile Ad-hoc NETwork, Peer-to-Peer, and Self-organizing Systems. Mobile Information Management 2004 - [i3]Joos-Hendrik Böse, Stefan Böttcher, Le Gruenwald, Evaggelia Pitoura, Peter L. Reiher, George Samaras, Thomas Schwarz, Can Türker:
04441 Working Group - Research Issues in Mobile Transactions. Mobile Information Management 2004 - [i2]Margaret H. Dunham, Birgitta König-Ries, Evaggelia Pitoura, Peter L. Reiher, Can Türker:
04441 Executive Summary - Mobile Information Management. Mobile Information Management 2004 - [i1]Margaret H. Dunham, Birgitta König-Ries, Evaggelia Pitoura, Peter L. Reiher, Can Türker:
04441 Abstracts Collection - Mobile Information Management. Mobile Information Management 2004 - 2003
- [c36]Max Robinson, Jelena Mirkovic, B. Scott Michel, Matthew Schnaider, Peter L. Reiher:
DefCOM: Defensive Cooperative Overlay Mesh. DISCEX (2) 2003: 101-102 - [c35]Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenning:
Detecting Insider Threats by Monitoring System Call Activity. IAW 2003: 45-52 - [c34]Venkatraman Ramakrishna, Max Robinson, Kevin Eustice, Peter L. Reiher:
An Active Self-Optimizing Multiplayer Gaming Architecture. Active Middleware Services 2003: 32-41 - [c33]Alexey Rudenko, Peter L. Reiher:
Adaptation Planning for Active Networks. IWAN 2003: 252-265 - [c32]Kevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald J. Popek, Venkatraman Ramakrishna, Peter L. Reiher:
Enabling Secure Ubiquitous Interactions. Middleware Workshops 2003: 76-80 - [c31]Jelena Mirkovic, Gregory Prier, Peter L. Reiher:
Source-End DDoS Defense. NCA 2003: 171-178 - [c30]Jelena Mirkovic, Max Robinson, Peter L. Reiher:
Alliance formation for DDoS defense. NSPW 2003: 11-18 - [c29]Kevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald J. Popek, Venkatraman Ramakrishna, Peter L. Reiher:
Securing nomads: the case for quarantine, examination, and decontamination. NSPW 2003: 123-128 - 2002
- [b1]Jun Li, Peter L. Reiher, Gerald J. Popek:
Disseminating Security Updates at Internet Scale. Advances in Information Security 8, Springer 2002, pp. 1-144 - [j9]Jun Li, Mark Yarvis, Peter L. Reiher:
Securing distributed adaptation. Comput. Networks 38(3): 347-371 (2002) - [j8]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Ouri Wolfson
:
Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems. SIGMOD Rec. 31(2): 73-79 (2002) - [c28]Vincent Ferreria, Alexey Rudenko, Kevin Eustice, Richard G. Guy, Venkatraman Ramakrishna, Peter L. Reiher:
Panda: Middleware to Provide the Benefits of Active Networks to Legacy Applications. DANCE 2002: 319-332 - [c27]An-I Wang, Peter L. Reiher, Rajive L. Bagrodia, Geoffrey H. Kuenning:
Understanding the Behavior of the Conflict-Rate Metric in Optimistic Peer Replication. DEXA Workshops 2002: 757-764 - [c26]Jelena Mirkovic, Gregory Prier, Peter L. Reiher:
Attacking DDoS at the Source. ICNP 2002: 312-321 - [c25]Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Reiher, Lixia Zhang:
SAVE: Source Address Validity Enforcement Protocol. INFOCOM 2002: 1557-1566 - [c24]Geoffrey H. Kuenning, Wilkie Ma, Peter L. Reiher, Gerald J. Popek:
Simplifying automated hoarding methods. MSWiM 2002: 15-21 - [c23]An-I Wang, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning:
Conquest: Better Performance Through a Disk/Persistent-RAM Hybrid File System. USENIX Annual Technical Conference, General Track 2002: 15-28 - 2001
- [j7]Todd Ekenstam, Charles Matheny, Peter L. Reiher, Gerald J. Popek:
The Bengal Database Replication System. Distributed Parallel Databases 9(3): 187-210 (2001) - [j6]David Ratner, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning:
Replication Requirements in Mobile Environments. Mob. Networks Appl. 6(6): 525-533 (2001) - [c22]B. Scott Michel, Peter L. Reiher:
Peer-through-Peer Communication for Information Logistics. GI Jahrestagung (1) 2001: 248-256 - [c21]An-I Wang, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning:
The Conquest File System's Life after Disks. HotOS 2001: 186 - [c20]Peter L. Reiher, Kevin Eustice, Kai-Min Sung:
Adapting Encrypted Data Streams in Open Architectures. Active Middleware Services 2001: 45-50 - [c19]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Alexander L. Wolf, Ouri Wolfson
:
Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona. Infrastructure for Mobile and Wireless Systems 2001: 1-37 - 2000
- [j5]B. R. Badrinath, Armando Fox, Leonard Kleinrock, Gerald J. Popek, Peter L. Reiher, Mahadev Satyanarayanan
:
A conceptual framework for network and client adaptation. Mob. Networks Appl. 5(4): 221-231 (2000) - [c18]B. Scott Michel, Konstantinos Nikoloudakis, Peter L. Reiher, Lixia Zhang:
URL Forwarding and Compression in Adaptive Web Caching. INFOCOM 2000: 670-678
1990 – 1999
- 1999
- [c17]David Ratner, Peter L. Reiher, Gerald J. Popek:
Roam: A Scalable Replication System for Mobile Computing. DEXA Workshop 1999: 96-104 - [c16]Mark Yarvis, Peter L. Reiher, Gerald J. Popek:
Conductor: A Framework for Distributed Adaptation. Workshop on Hot Topics in Operating Systems 1999: 44-51 - [c15]Mitchell Tsai, Peter L. Reiher, Gerald J. Popek:
Command Management System for Next-Generation User Input. Workshop on Hot Topics in Operating Systems 1999: 179-184 - [c14]An-I Wang, Peter L. Reiher, Rajive L. Bagrodia:
A simulation evaluation of optimistic replicated filing in mobile environments. IPCCC 1999: 43-51 - [c13]David Ratner, Peter L. Reiher, Gerald J. Popek, Richard G. Guy:
Peer Replication with Selective Control. MDA 1999: 169-181 - [c12]Jun Li, Peter L. Reiher, Gerald J. Popek:
Securing information transmission by redundancy. NSPW 1999: 112-117 - [c11]Alexey Rudenko, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning:
The Remote Processing Framework for Portable Computer Power Saving. SAC 1999: 365-372 - 1998
- [j4]Alexey Rudenko, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning:
Saving portable computer battery power through remote process execution. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2(1): 19-26 (1998) - [j3]Thomas W. Page Jr., Richard G. Guy, John S. Heidemann, David Ratner, Peter L. Reiher, Ashish Goel, Geoffrey H. Kuenning, Gerald J. Popek:
Perspectives on Optimistically Replicated, Peer-to-Peer Filing. Softw. Pract. Exp. 28(2): 155-180 (1998) - [c10]Geoffrey H. Kuenning, Rajive L. Bagrodia, Richard G. Guy, Gerald J. Popek, Peter L. Reiher, An-I Wang:
Measuring the Quality of Service of Optimistic Replication. ECOOP Workshops 1998: 319-320 - [c9]Richard G. Guy, Peter L. Reiher, David Ratner, Michial A. Gunter, Wilkie Ma, Gerald J. Popek:
Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication. ER Workshops 1998: 254-265 - 1997
- [j2]Geoffrey H. Kuenning
, Peter L. Reiher, Gerald J. Popek:
Experience with an Automated Hoarding System. Pers. Ubiquitous Comput. 1(3): 145-155 (1997) - 1994
- [c8]Peter L. Reiher, John S. Heidemann, David Ratner, Gregory Skinner, Gerald J. Popek:
Resolving File Conflicts in the Ficus File System. USENIX Summer 1994: 183-195 - [c7]Geoffrey H. Kuenning, Gerald J. Popek, Peter L. Reiher:
An Analysis of Trace Data for Predictive File Caching in Mobile Computing. USENIX Summer 1994: 291-303 - 1991
- [c6]David R. Jefferson, Peter L. Reiher:
Supercritical speedup. Annual Simulation Symposium 1991: 159-168 - 1990
- [c5]Peter L. Reiher:
Parallel simulation using the time warp operating system. WSC 1990: 38-45 - [c4]Matthew T. Presley, Peter L. Reiher, Steven F. Bellenot:
A time warp implementation of Sharks World. WSC 1990: 199-203
1980 – 1989
- 1989
- [j1]Frederick Wieland, L. Hayley, A. Feinberg, Mike Di Loreto, Leo Blume, J. Ruffles, Peter L. Reiher, Brian Beckman, Phil Hontalas, Steve Bellenot, David R. Jefferson:
The Performance of a Distributed Combat Simulation with the Time Warp Operating System. Concurr. Pract. Exp. 1(1): 35-50 (1989) - [c3]Peter L. Reiher, Frederick Wieland, David R. Jefferson:
Limitation of optimism in the time warp operating system. WSC 1989: 765-770 - 1988
- [c2]David R. Jefferson, Brian Beckman, Leo Blume, M. Diloreto, Phil Hontalas, Peter L. Reiher, Kathy Sturdevant, Jack Tupman, John J. Wedel, Frederick Wieland, Herb Younger:
The status of the time warp operating system. C³P 1988: 738-744 - 1987
- [c1]Peter L. Reiher, Gerald J. Popek:
Locus Naming in a Large Scale Environment. Kommunikation in Verteilten Systemen 1987: 167-177