BibTeX records: Douglas S. Reeves

download as .bib file

@inproceedings{DBLP:conf/globecom/KimRD21,
  author       = {Tae Hyun Kim and
                  Douglas S. Reeves and
                  Rudra Dutta},
  title        = {Advanced Secure {DNS} Name Autoconfiguration with Authentication for
                  Enterprise IoT Network},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2021, Madrid,
                  Spain, December 7-11, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/GLOBECOM46510.2021.9685237},
  doi          = {10.1109/GLOBECOM46510.2021.9685237},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/KimRD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BushouseR18,
  author       = {Micah Bushouse and
                  Douglas S. Reeves},
  title        = {Goalkeeper: Comprehensive process enforcement from the hypervisor},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {459--473},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.020},
  doi          = {10.1016/J.COSE.2017.11.020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BushouseR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BushouseR18,
  author       = {Micah Bushouse and
                  Douglas S. Reeves},
  editor       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Ram Krishnan and
                  Gabriel Ghinita},
  title        = {Hyperagents: Migrating Host Agents to the Hypervisor},
  booktitle    = {Proceedings of the Eighth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {212--223},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3176258.3176317},
  doi          = {10.1145/3176258.3176317},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/BushouseR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BushouseR18,
  author       = {Micah Bushouse and
                  Douglas S. Reeves},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Furnace: Self-service Tenant {VMI} for the Cloud},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {647--669},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_30},
  doi          = {10.1007/978-3-030-00470-5\_30},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/BushouseR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ShinJHYRR17,
  author       = {Kyuyong Shin and
                  Carlee Joe{-}Wong and
                  Sangtae Ha and
                  Yung Yi and
                  Injong Rhee and
                  Douglas S. Reeves},
  title        = {T-Chain: {A} General Incentive Scheme for Cooperative Computing},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {25},
  number       = {4},
  pages        = {2122--2137},
  year         = {2017},
  url          = {https://doi.org/10.1109/TNET.2017.2685560},
  doi          = {10.1109/TNET.2017.2685560},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/ShinJHYRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BushouseAR17,
  author       = {Micah Bushouse and
                  Sanghyun Ahn and
                  Douglas S. Reeves},
  editor       = {Joseph P. Trien and
                  Stacy J. Prowell and
                  John R. Goodall and
                  Justin M. Beaver and
                  Robert A. Bridges},
  title        = {Arav: monitoring a cloud's virtual routers},
  booktitle    = {Proceedings of the 12th Annual Conference on Cyber and Information
                  Security Research, {CISRC} 2017, Oak Ridge, TN, USA, April 4 - 6,
                  2017},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3064814.3064829},
  doi          = {10.1145/3064814.3064829},
  timestamp    = {Tue, 06 Nov 2018 16:58:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/BushouseAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/AlbaneseCCHHJ0MNRSWY17,
  author       = {Massimiliano Albanese and
                  Nancy J. Cooke and
                  Gonz{\'{a}}lez Coty and
                  David Hall and
                  Christopher G. Healey and
                  Sushil Jajodia and
                  Peng Liu and
                  Michael D. McNeese and
                  Peng Ning and
                  Douglas S. Reeves and
                  V. S. Subrahmanian and
                  Cliff Wang and
                  John Yen},
  editor       = {Peng Liu and
                  Sushil Jajodia and
                  Cliff Wang},
  title        = {Computer-Aided Human Centric Cyber Situation Awareness},
  booktitle    = {Theory and Models for Cyber Situation Awareness},
  series       = {Lecture Notes in Computer Science},
  volume       = {10030},
  pages        = {3--25},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61152-5\_1},
  doi          = {10.1007/978-3-319-61152-5\_1},
  timestamp    = {Mon, 03 Jan 2022 21:52:37 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/AlbaneseCCHHJ0MNRSWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/WangR15,
  author       = {Xinyuan Wang and
                  Douglas S. Reeves},
  title        = {Traceback and Anonymity},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-1-4939-3441-6},
  doi          = {10.1007/978-1-4939-3441-6},
  isbn         = {978-1-4939-3439-3},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/WangR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ShinJHYRR15,
  author       = {Kyuyong Shin and
                  Carlee Joe{-}Wong and
                  Sangtae Ha and
                  Yung Yi and
                  Injong Rhee and
                  Douglas S. Reeves},
  title        = {T-Chain: {A} General Incentive Scheme for Cooperative Computing},
  booktitle    = {35th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2015, Columbus, OH, USA, June 29 - July 2, 2015},
  pages        = {163--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICDCS.2015.25},
  doi          = {10.1109/ICDCS.2015.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/ShinJHYRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangERZNXZA15,
  author       = {Ruowen Wang and
                  William Enck and
                  Douglas S. Reeves and
                  Xinwen Zhang and
                  Peng Ning and
                  Dingbang Xu and
                  Wu Zhou and
                  Ahmed M. Azab},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {EASEAndroid: Automatic Policy Analysis and Refinement for Security
                  Enhanced Android via Large-Scale Semi-Supervised Learning},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {351--366},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wang-ruowen},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangERZNXZA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParkRS13,
  author       = {Young Hee Park and
                  Douglas S. Reeves and
                  Mark Stamp},
  title        = {Deriving common malware behavior through graph clustering},
  journal      = {Comput. Secur.},
  volume       = {39},
  pages        = {419--430},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.09.006},
  doi          = {10.1016/J.COSE.2013.09.006},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ParkRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PyunPRWN12,
  author       = {Young June Pyun and
                  Young Hee Park and
                  Douglas S. Reeves and
                  Xinyuan Wang and
                  Peng Ning},
  title        = {Interval-based flow watermarking for tracing interactive traffic},
  journal      = {Comput. Networks},
  volume       = {56},
  number       = {5},
  pages        = {1646--1665},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comnet.2012.01.017},
  doi          = {10.1016/J.COMNET.2012.01.017},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/PyunPRWN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ShinR12,
  author       = {Kyuyong Shin and
                  Douglas S. Reeves},
  title        = {Winnowing: Protecting {P2P} systems against pollution through cooperative
                  index filtering},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {35},
  number       = {1},
  pages        = {72--84},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jnca.2011.02.015},
  doi          = {10.1016/J.JNCA.2011.02.015},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ShinR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/SoR12,
  author       = {Jung Ki So and
                  Douglas S. Reeves},
  title        = {AntiLiar: Defending against cheating attacks in mesh based streaming},
  booktitle    = {12th {IEEE} International Conference on Peer-to-Peer Computing, {P2P}
                  2012, Tarragona, Spain, September 3-5, 2012},
  pages        = {115--125},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/P2P.2012.6335791},
  doi          = {10.1109/P2P.2012.6335791},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/p2p/SoR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangR11,
  author       = {Xinyuan Wang and
                  Douglas S. Reeves},
  title        = {Robust Correlation of Encrypted Attack Traffic through Stepping Stones
                  by Flow Watermarking},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {8},
  number       = {3},
  pages        = {434--449},
  year         = {2011},
  url          = {https://doi.org/10.1109/TDSC.2010.35},
  doi          = {10.1109/TDSC.2010.35},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ParkR11,
  author       = {Young Hee Park and
                  Douglas S. Reeves},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Deriving common malware behavior through graph clustering},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {497--502},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966986},
  doi          = {10.1145/1966913.1966986},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ParkR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/SoR11,
  author       = {Jung Ki So and
                  Douglas S. Reeves},
  editor       = {Sheng Zhong and
                  Dejing Dou and
                  Yu Wang},
  title        = {Adaptive neighbor management for cooperative {P2P} video-on-demand
                  streaming},
  booktitle    = {30th {IEEE} International Performance Computing and Communications
                  Conference, {IPCCC} 2011, Orlando, Florida, USA, November 17-19, 2011},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PCCC.2011.6108084},
  doi          = {10.1109/PCCC.2011.6108084},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/SoR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/SoR11,
  author       = {Jung Ki So and
                  Douglas S. Reeves},
  editor       = {Jordi Domingo{-}Pascual and
                  Pietro Manzoni and
                  Sergio Palazzo and
                  Ana Pont and
                  Caterina M. Scoglio},
  title        = {Defending against Sybil Nodes in BitTorrent},
  booktitle    = {{NETWORKING} 2011 - 10th International {IFIP} {TC} 6 Networking Conference,
                  Valencia, Spain, May 9-13, 2011, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6641},
  pages        = {25--39},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20798-3\_3},
  doi          = {10.1007/978-3-642-20798-3\_3},
  timestamp    = {Fri, 09 Apr 2021 18:42:28 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/SoR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ParkZRM10,
  author       = {Young Hee Park and
                  Qinghua Zhang and
                  Douglas S. Reeves and
                  Vikram Mulukutla},
  editor       = {Sheikh Iqbal Ahamed and
                  Doo{-}Hwan Bae and
                  Sung Deok Cha and
                  Carl K. Chang and
                  Rajesh Subramanyan and
                  W. Eric Wong and
                  Hen{-}I Yang},
  title        = {AntiBot: Clustering Common Semantic Patterns for Bot Detection},
  booktitle    = {Proceedings of the 34th Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2010, Seoul, Korea, 19-23 July
                  2010},
  pages        = {262--272},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/COMPSAC.2010.33},
  doi          = {10.1109/COMPSAC.2010.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ParkZRM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ParkRMS10,
  author       = {Young Hee Park and
                  Douglas S. Reeves and
                  Vikram Mulukutla and
                  Balaji Sundaravel},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Fast malware classification by automated behavioral graph matching},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {45},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852716},
  doi          = {10.1145/1852666.1852716},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ParkRMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpdc/DuGR10,
  author       = {Juan Du and
                  Xiaohui Gu and
                  Douglas S. Reeves},
  editor       = {Salim Hariri and
                  Kate Keahey},
  title        = {Highly available component sharing in large-scale multi-tenant cloud
                  systems},
  booktitle    = {Proceedings of the 19th {ACM} International Symposium on High Performance
                  Distributed Computing, {HPDC} 2010, Chicago, Illinois, USA, June 21-25,
                  2010},
  pages        = {85--94},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1851476.1851487},
  doi          = {10.1145/1851476.1851487},
  timestamp    = {Thu, 26 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpdc/DuGR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/RoweWR10,
  author       = {Brent Rowe and
                  Dallas Wood and
                  Douglas S. Reeves},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {How the Public Views Strategies Designed to Reduce the Threat of Botnets},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {337--351},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_25},
  doi          = {10.1007/978-3-642-13869-0\_25},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/RoweWR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ParkR09,
  author       = {Young Hee Park and
                  Douglas S. Reeves},
  title        = {Identification of Bot Commands by Run-Time Execution Monitoring},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {321--330},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.37},
  doi          = {10.1109/ACSAC.2009.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ParkR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/McKinneyR09,
  author       = {Steve McKinney and
                  Douglas S. Reeves},
  editor       = {Frederick T. Sheldon and
                  Greg Peterson and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {User identification via process profiling: extended abstract},
  booktitle    = {Fifth Cyber Security and Information Intelligence Research Workshop,
                  {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009},
  pages        = {51},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1558607.1558666},
  doi          = {10.1145/1558607.1558666},
  timestamp    = {Wed, 31 Jan 2024 20:36:02 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/McKinneyR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/ShinRR09,
  author       = {Kyuyong Shin and
                  Douglas S. Reeves and
                  Injong Rhee},
  title        = {Treat-before-trick : Free-riding prevention for BitTorrent-like peer-to-peer
                  networks},
  booktitle    = {23rd {IEEE} International Symposium on Parallel and Distributed Processing,
                  {IPDPS} 2009, Rome, Italy, May 23-29, 2009},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/IPDPS.2009.5161007},
  doi          = {10.1109/IPDPS.2009.5161007},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/ShinRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OConnorR08,
  author       = {Terrence O'Connor and
                  Douglas S. Reeves},
  title        = {Bluetooth Network-Based Misuse Detection},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {377--391},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.39},
  doi          = {10.1109/ACSAC.2008.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OConnorR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/broadnets/Karmous-Edwards08,
  author       = {Gigi Karmous{-}Edwards and
                  Douglas S. Reeves and
                  George N. Rouskas and
                  Lina Battestilli and
                  Priyanka Vegesna and
                  Arun Vishwanath},
  editor       = {Izzat Darwazeh and
                  Byrav Ramamurthy},
  title        = {Edge Reconfigurable Optical Network {(ERON):} Enabling dynamic sharing
                  of static lightpaths},
  booktitle    = {5th International {ICST} Conference on Broadband Communications, Networks,
                  and Systems, {BROADNETS} 2008, London, UK, September 8-11, 2008},
  pages        = {332--334},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/BROADNETS.2008.4769097},
  doi          = {10.1109/BROADNETS.2008.4769097},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/broadnets/Karmous-Edwards08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangR07,
  author       = {Qinghua Zhang and
                  Douglas S. Reeves},
  title        = {MetaAware: Identifying Metamorphic Malware},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {411--420},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.9},
  doi          = {10.1109/ACSAC.2007.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/broadnets/PyunR07,
  author       = {Young June Pyun and
                  Douglas S. Reeves},
  title        = {Strategic deployment of network monitors for attack attribution},
  booktitle    = {Fourth International Conference on Broadband Communications, Networks
                  and Systems, {(BROADNETS} 2007), 10-14 September 2007, Raleigh, North-Carolina,
                  {USA}},
  pages        = {525--534},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/BROADNETS.2007.4550478},
  doi          = {10.1109/BROADNETS.2007.4550478},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/broadnets/PyunR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangRNI07,
  author       = {Qinghua Zhang and
                  Douglas S. Reeves and
                  Peng Ning and
                  S. Purushothaman Iyer},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Analyzing network traffic to detect self-decrypting exploit code},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {4--12},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229291},
  doi          = {10.1145/1229285.1229291},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangRNI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangNR07,
  author       = {Pan Wang and
                  Peng Ning and
                  Douglas S. Reeves},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {A \emph{k}-anonymous communication protocol for overlay networks},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229296},
  doi          = {10.1145/1229285.1229296},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangNR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/PyunPWRN07,
  author       = {Young June Pyun and
                  Young Hee Park and
                  Xinyuan Wang and
                  Douglas S. Reeves and
                  Peng Ning},
  title        = {Tracing Traffic through Intermediate Hosts that Repacketize Flows},
  booktitle    = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  6-12 May 2007, Anchorage, Alaska, {USA}},
  pages        = {634--642},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/INFCOM.2007.80},
  doi          = {10.1109/INFCOM.2007.80},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/PyunPWRN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PengNR06,
  author       = {Pai Peng and
                  Peng Ning and
                  Douglas S. Reeves},
  title        = {On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {334--349},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.28},
  doi          = {10.1109/SP.2006.28},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/PengNR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/PengNRW05,
  author       = {Pai Peng and
                  Peng Ning and
                  Douglas S. Reeves and
                  Xinyuan Wang},
  title        = {Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff
                  Packets},
  booktitle    = {25th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}},
  pages        = {107--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDCSW.2005.30},
  doi          = {10.1109/ICDCSW.2005.30},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcsw/PengNRW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/ZhangWRN05,
  author       = {Qinghua Zhang and
                  Pan Wang and
                  Douglas S. Reeves and
                  Peng Ning},
  title        = {Defending against Sybil Attacks in Sensor Networks},
  booktitle    = {25th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}},
  pages        = {185--191},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDCSW.2005.57},
  doi          = {10.1109/ICDCSW.2005.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/ZhangWRN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangNR05,
  author       = {Pan Wang and
                  Peng Ning and
                  Douglas S. Reeves},
  editor       = {Sihan Qing and
                  Wenbo Mao and
                  Javier L{\'{o}}pez and
                  Guilin Wang},
  title        = {Network Access Control for Mobile Ad-Hoc Networks},
  booktitle    = {Information and Communications Security, 7th International Conference,
                  {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3783},
  pages        = {350--362},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11602897\_30},
  doi          = {10.1007/11602897\_30},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WangNR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/WangRN05,
  author       = {Pan Wang and
                  Douglas S. Reeves and
                  Peng Ning},
  title        = {Secure Address Auto-con.guration for Mobile Ad Hoc Networks},
  booktitle    = {2nd Annual International Conference on Mobile and Ubiquitous Systems
                  (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, {USA}},
  pages        = {519--522},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/MOBIQUITOUS.2005.52},
  doi          = {10.1109/MOBIQUITOUS.2005.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/WangRN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/ShakerR05,
  author       = {Ayman Shaker and
                  Douglas S. Reeves},
  editor       = {Germano Caronni and
                  Nathalie Weiler and
                  Marcel Waldvogel and
                  Nahid Shahmehri},
  title        = {Self-Stabilizing Structured Ring Topology {P2P} Systems},
  booktitle    = {Fifth {IEEE} International Conference on Peer-to-Peer Computing {(P2P}
                  2005), 31 August - 2 September 2005, Konstanz, Germany},
  pages        = {39--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/P2P.2005.34},
  doi          = {10.1109/P2P.2005.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/p2p/ShakerR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/FulpR04,
  author       = {Errin W. Fulp and
                  Douglas S. Reeves},
  title        = {Bandwidth provisioning and pricing for networks with multiple classes
                  of service},
  journal      = {Comput. Networks},
  volume       = {46},
  number       = {1},
  pages        = {41--52},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.comnet.2004.03.018},
  doi          = {10.1016/J.COMNET.2004.03.018},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/FulpR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/WuR04,
  author       = {Kehang Wu and
                  Douglas S. Reeves},
  title        = {Capacity Planning of DiffServ Networks with Best-Effort and Expedited
                  Forwarding Traffic},
  journal      = {Telecommun. Syst.},
  volume       = {25},
  number       = {3-4},
  pages        = {193--207},
  year         = {2004},
  url          = {https://doi.org/10.1023/B:TELS.0000014781.92903.7f},
  doi          = {10.1023/B:TELS.0000014781.92903.7F},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/WuR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NingCRX04,
  author       = {Peng Ning and
                  Yun Cui and
                  Douglas S. Reeves and
                  Dingbang Xu},
  title        = {Techniques and tools for analyzing intrusion alerts},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {274--318},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996947},
  doi          = {10.1145/996943.996947},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NingCRX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhaiNIR04,
  author       = {Yan Zhai and
                  Peng Ning and
                  Purush Iyer and
                  Douglas S. Reeves},
  title        = {Reasoning About Complementary Intrusion Evidence},
  booktitle    = {20th Annual Computer Security Applications Conference {(ACSAC} 2004),
                  6-10 December 2004, Tucson, AZ, {USA}},
  pages        = {39--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CSAC.2004.29},
  doi          = {10.1109/CSAC.2004.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhaiNIR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JiangRN04,
  author       = {Qinglin Jiang and
                  Douglas S. Reeves and
                  Peng Ning},
  editor       = {Tatsuaki Okamoto},
  title        = {Improving Robustness of {PGP} Keyrings by Conflict Detection},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {194--207},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_16},
  doi          = {10.1007/978-3-540-24660-2\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JiangRN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangNR04,
  author       = {Pan Wang and
                  Peng Ning and
                  Douglas S. Reeves},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {Storage-Efficient Stateless Group Key Revocation},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {25--38},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_3},
  doi          = {10.1007/978-3-540-30144-8\_3},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/WangNR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JiangRN04,
  author       = {Qinglin Jiang and
                  Douglas S. Reeves and
                  Peng Ning},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {Certificate Recommendations to Improve the Robustness of Web of Trust},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {292--303},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_25},
  doi          = {10.1007/978-3-540-30144-8\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/JiangRN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/PyunR04,
  author       = {Young June Pyun and
                  Douglas S. Reeves},
  editor       = {Germano Caronni and
                  Nathalie Weiler and
                  Nahid Shahmehri},
  title        = {Constructing a Balanced, (log(N)/loglog(N))-Diameter Super-Peer Topology
                  for Scalable {P2P} Systems},
  booktitle    = {4th International Conference on Peer-to-Peer Computing {(P2P} 2004),
                  15-17 August 2004, Zurich, Switzerland},
  pages        = {210--218},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/PTP.2004.1334949},
  doi          = {10.1109/PTP.2004.1334949},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/p2p/PyunR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/FengR04,
  author       = {Fang Feng and
                  Douglas S. Reeves},
  title        = {Explicit proactive handoff with motion prediction for mobile {IP}},
  booktitle    = {2004 {IEEE} Wireless Communications and Networking Conference , {WCNC}
                  2004, Atlanta, Georgia, USA, 21-25 March 2004},
  pages        = {855--860},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/WCNC.2004.1311298},
  doi          = {10.1109/WCNC.2004.1311298},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/FengR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangR03,
  author       = {Xinyuan Wang and
                  Douglas S. Reeves},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Robust correlation of encrypted attack traffic through stepping stones
                  by manipulation of interpacket delays},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {20--29},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948115},
  doi          = {10.1145/948109.948115},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WangR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/discex/WuMR03,
  author       = {Xiaoyong Wu and
                  Vinay A. Mahadik and
                  Douglas S. Reeves},
  title        = {A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks},
  booktitle    = {3rd {DARPA} Information Survivability Conference and Exposition {(DISCEX-III}
                  2003), 22-24 April 2003, Washington, DC, {USA}},
  pages        = {277},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DISCEX.2003.1194978},
  doi          = {10.1109/DISCEX.2003.1194978},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/discex/WuMR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WuR03,
  author       = {Kehang Wu and
                  Douglas S. Reeves},
  title        = {Capacity planning of DiffServ networks with best-effort and expedited
                  forwarding traffic},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2003, Anchorage, Alaska, USA, 11-15 May, 2003},
  pages        = {1902--1906},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICC.2003.1203929},
  doi          = {10.1109/ICC.2003.1203929},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/WuR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NingCR02,
  author       = {Peng Ning and
                  Yun Cui and
                  Douglas S. Reeves},
  editor       = {Vijayalakshmi Atluri},
  title        = {Constructing attack scenarios through correlation of intrusion alerts},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {245--254},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586144},
  doi          = {10.1145/586110.586144},
  timestamp    = {Tue, 10 Nov 2020 20:00:47 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NingCR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangRW02,
  author       = {Xinyuan Wang and
                  Douglas S. Reeves and
                  Shyhtsun Felix Wu},
  editor       = {Dieter Gollmann and
                  G{\"{u}}nter Karjoth and
                  Michael Waidner},
  title        = {Inter-Packet Delay Based Correlation for Tracing Encrypted Connections
                  through Stepping Stones},
  booktitle    = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research
                  in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2502},
  pages        = {244--263},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45853-0\_15},
  doi          = {10.1007/3-540-45853-0\_15},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangRW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qofis/FulpR02,
  author       = {Errin W. Fulp and
                  Douglas S. Reeves},
  editor       = {Burkhard Stiller and
                  Mikhail I. Smirnov and
                  Martin Karsten and
                  Peter Reichl},
  title        = {The Economic Impact of Network Pricing Intervals},
  booktitle    = {From QoS Provisioning to QoS Charging, Third {COST} 263 International
                  Workshop on Quality of Future Internet Services, QofIS 2002, and Second
                  International Workshop on Internet Charging and QoS Technologies,
                  {ICQT} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2511},
  pages        = {315--324},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45859-X\_30},
  doi          = {10.1007/3-540-45859-X\_30},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/qofis/FulpR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NingCR02,
  author       = {Peng Ning and
                  Yun Cui and
                  Douglas S. Reeves},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Analyzing Intensive Intrusion Alerts via Correlation},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {74--94},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_5},
  doi          = {10.1007/3-540-36084-0\_5},
  timestamp    = {Sat, 07 Sep 2019 11:59:24 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NingCR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KellyR01,
  author       = {T. P. Kelly and
                  Douglas S. Reeves},
  title        = {Optimal Web cache sizing: scalable methods for exact solutions},
  journal      = {Comput. Commun.},
  volume       = {24},
  number       = {2},
  pages        = {163--173},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0140-3664(00)00311-X},
  doi          = {10.1016/S0140-3664(00)00311-X},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/KellyR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/FulpR01,
  author       = {Errin W. Fulp and
                  Douglas S. Reeves},
  editor       = {Kurt Bauknecht and
                  Wilfried Brauer and
                  Thomas A. M{\"{u}}ck},
  title        = {Optimal Provisioning and Pricing of Differentiated Services Using
                  QoS Class Promotion},
  booktitle    = {Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft
                  f{\"{u}}r Informatik, Wirtschaft und Wissenschaft in der Network
                  Economy - Visionen und Wirklichkeit, Jahrestagung der {\"{O}}sterreichischen
                  Computer Gesellschaft 2001, {INFORMATIK/OCG} 2001, Vienna, Austria,
                  September 25-28, 2001, Band 1},
  series       = {Schriftenreihe der {\"{O}}sterreichischen Computer-Gesellschaft},
  volume       = {157},
  pages        = {144--150},
  publisher    = {Konstanz UVK-Verl.-Ges.},
  year         = {2001},
  timestamp    = {Fri, 17 Jul 2020 14:28:31 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/FulpR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icn/FulpR01,
  author       = {Errin W. Fulp and
                  Douglas S. Reeves},
  editor       = {Pascal Lorenz},
  title        = {Optimal Provisioning and Pricing of Internet Differentiated Services
                  in Hierarchical Markets},
  booktitle    = {Networking - {ICN} 2001, First International Conference, Colmar, France,
                  July 9-13, 2001 Proceedings, Part 1},
  series       = {Lecture Notes in Computer Science},
  volume       = {2093},
  pages        = {409--418},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47728-4\_40},
  doi          = {10.1007/3-540-47728-4\_40},
  timestamp    = {Tue, 21 Mar 2023 21:02:31 +0100},
  biburl       = {https://dblp.org/rec/conf/icn/FulpR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/WangRWY01,
  author       = {Xinyuan Wang and
                  Douglas S. Reeves and
                  Shyhtsun Felix Wu and
                  Jim Yuill},
  editor       = {Michel Dupuy and
                  Pierre Paradinas},
  title        = {Sleepy Watermark Tracing: An Active Network-Based Intrusion Response
                  Framework},
  booktitle    = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth
                  Annual Working Conference on Information Security (IFIP/Sec'01), June
                  11-13, 2001, Paris, France},
  series       = {{IFIP} Conference Proceedings},
  volume       = {193},
  pages        = {369--384},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/WangRWY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ibmrd/AlexanderRG00,
  author       = {Winser E. Alexander and
                  Douglas S. Reeves and
                  Clay S. Gloster Jr.},
  title        = {Parallel image processin gwith the block data paralel architecture},
  journal      = {{IBM} J. Res. Dev.},
  volume       = {44},
  number       = {5},
  pages        = {681--702},
  year         = {2000},
  url          = {https://doi.org/10.1147/rd.445.0681},
  doi          = {10.1147/RD.445.0681},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ibmrd/AlexanderRG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ReevesS00,
  author       = {Douglas S. Reeves and
                  Hussein F. Salama},
  title        = {A distributed algorithm for delay-constrained unicast routing},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {8},
  number       = {2},
  pages        = {239--250},
  year         = {2000},
  url          = {https://doi.org/10.1109/90.842145},
  doi          = {10.1109/90.842145},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/ReevesS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/WangSXR00,
  author       = {Haining Wang and
                  Kang G. Shin and
                  Hongjie Xin and
                  Douglas S. Reeves},
  title        = {A Simple Refinement of Slow-Start of {TCP} Congestion Control},
  booktitle    = {Proceedings of the Fifth {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2000), 4-6 July 2000, Antibes, France},
  pages        = {98--105},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ISCC.2000.860615},
  doi          = {10.1109/ISCC.2000.860615},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/WangSXR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/FulpR00,
  author       = {Errin W. Fulp and
                  Douglas S. Reeves},
  editor       = {Guy Pujolle and
                  Harry G. Perros and
                  Serge Fdida and
                  Ulf K{\"{o}}rner and
                  Ioannis Stavrakakis},
  title        = {QoS Rewards and Risks: {A} Multi-market Approach to Resource Allocation},
  booktitle    = {{NETWORKING} 2000, Broadband Communications, High Performance Networking,
                  and Performance of Communication Networks, {IFIP-TC6} / European Commission
                  International Conference, Paris, France, May 14-19, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1815},
  pages        = {945--956},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45551-5\_79},
  doi          = {10.1007/3-540-45551-5\_79},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/FulpR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/IzquierdoR99,
  author       = {Michael R. Izquierdo and
                  Douglas S. Reeves},
  title        = {A Survey of Statistical Source Models for Variable-bit-rate Compressed
                  Video},
  journal      = {Multim. Syst.},
  volume       = {7},
  number       = {3},
  pages        = {199--213},
  year         = {1999},
  url          = {https://doi.org/10.1007/s005300050122},
  doi          = {10.1007/S005300050122},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mms/IzquierdoR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/FulpR98,
  author       = {Errin W. Fulp and
                  Douglas S. Reeves},
  title        = {Distributed Network Flow Control based on Dynamic Competitive Markets},
  booktitle    = {1998 International Conference on Network Protocols {(ICNP} '98), October
                  13-16, 1998, Austin, Texas, {USA}},
  pages        = {119--128},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ICNP.1998.723732},
  doi          = {10.1109/ICNP.1998.723732},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/FulpR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/SalamaRV97,
  author       = {Hussein F. Salama and
                  Douglas S. Reeves and
                  Yannis Viniotis},
  title        = {Evaluation of Multicast Routing Algorithms for Real-Time Communication
                  on High-Speed Networks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {15},
  number       = {3},
  pages        = {332--345},
  year         = {1997},
  url          = {https://doi.org/10.1109/49.564132},
  doi          = {10.1109/49.564132},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/SalamaRV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/FulpR97,
  author       = {Errin W. Fulp and
                  Douglas S. Reeves},
  title        = {On-line Dynamic Bandwidth Allocation},
  booktitle    = {1997 International Conference on Network Protocols {(ICNP} '97), 28-31
                  October 1997, Atlanta, GA, {USA}},
  pages        = {134--141},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ICNP.1997.643704},
  doi          = {10.1109/ICNP.1997.643704},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/FulpR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/SalamaRV97,
  author       = {Hussein F. Salama and
                  Douglas S. Reeves and
                  Yannis Viniotis},
  title        = {A Distributed Algorithm for Delay-Constrained Unicast Routing},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '97, The Conference on Computer Communications,
                  Sixteenth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Driving the Information Revolution, Kobe, Japan, April
                  7-12, 1997},
  pages        = {84--91},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/INFCOM.1997.635117},
  doi          = {10.1109/INFCOM.1997.635117},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/SalamaRV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/SalamaRV97,
  author       = {Hussein F. Salama and
                  Douglas S. Reeves and
                  Yannis Viniotis},
  title        = {The delay-constrained minimum spanning tree problem},
  booktitle    = {Proceedings of the Second {IEEE} Symposium on Computers and Communications
                  {(ISCC} 1997), July 1-3, 1997, Alexandria, Egypt},
  pages        = {699--703},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ISCC.1997.616089},
  doi          = {10.1109/ISCC.1997.616089},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/SalamaRV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/Reeves97,
  author       = {Douglas S. Reeves},
  editor       = {Curt M. White and
                  Carl Erickson and
                  Bruce J. Klein and
                  James E. Miller},
  title        = {A course on multimedia technology for computer science and computer
                  engineering students},
  booktitle    = {Proceedings of the 28th {SIGCSE} Technical Symposium on Computer Science
                  Education, {SIGCSE} 1997, San Jose, California, USA, February 27 -
                  March 1, 1997},
  pages        = {174--178},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/268084.268146},
  doi          = {10.1145/268084.268146},
  timestamp    = {Tue, 23 Mar 2021 10:54:19 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/Reeves97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/AlexanderRG96,
  author       = {Winser E. Alexander and
                  Douglas S. Reeves and
                  Clay S. Gloster Jr.},
  title        = {Parallel image processing with the block data parallel architecture},
  journal      = {Proc. {IEEE}},
  volume       = {84},
  number       = {7},
  pages        = {947--968},
  year         = {1996},
  url          = {https://doi.org/10.1109/5.503297},
  doi          = {10.1109/5.503297},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/AlexanderRG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/CatoR96,
  author       = {Gavin R. Cato and
                  Douglas S. Reeves},
  title        = {Calypso: an implementation of the order graph method},
  booktitle    = {1996 {IEEE} International Conference on Acoustics, Speech, and Signal
                  Processing Conference Proceedings, {ICASSP} '96, Atlanta, Georgia,
                  USA, May 7-10, 1996},
  pages        = {3342--3345},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/ICASSP.1996.550593},
  doi          = {10.1109/ICASSP.1996.550593},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/CatoR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/RampalR95,
  author       = {Sanjeev Rampal and
                  Douglas S. Reeves},
  title        = {Routing and admission control algorithms for multimedia traffic},
  journal      = {Comput. Commun.},
  volume       = {18},
  number       = {10},
  pages        = {755--768},
  year         = {1995},
  url          = {https://doi.org/10.1016/0140-3664(95)98488-Q},
  doi          = {10.1016/0140-3664(95)98488-Q},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/RampalR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpn/SalamaRVS95,
  author       = {Hussein F. Salama and
                  Douglas S. Reeves and
                  Yannis Viniotis and
                  Tsang{-}Ling Sheu},
  editor       = {Ram{\'{o}}n Puigjaner},
  title        = {Evaluation of multicast routing algorithms for real-time communication
                  on high-speed networks},
  booktitle    = {High Performance Networking VI, {IFIP} Sixth International Conference
                  on High Performance Networking 1995},
  series       = {{IFIP} Conference Proceedings},
  volume       = {29},
  pages        = {27--42},
  publisher    = {Chapman {\&} Hall},
  year         = {1995},
  timestamp    = {Thu, 03 Jan 2002 12:00:08 +0100},
  biburl       = {https://dblp.org/rec/conf/hpn/SalamaRVS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeecc/ReevesS94,
  author       = {Douglas S. Reeves and
                  Kang G. Shin},
  title        = {Guest Editors' Introduction: Parallel and Distributed Real-Time Computing},
  journal      = {{IEEE} Parallel Distributed Technol. Syst. Appl.},
  volume       = {2},
  number       = {4},
  pages        = {8},
  year         = {1994},
  url          = {http://doi.ieeecomputersociety.org/10.1109/MCC.1994.10030},
  doi          = {10.1109/MCC.1994.10030},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeecc/ReevesS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhsc/ReevesG94,
  author       = {Douglas S. Reeves and
                  Edward F. Gehringer},
  title        = {Adaptive Routing for Hypercube Multiprocessors: a Performance Study},
  journal      = {Int. J. High Speed Comput.},
  volume       = {6},
  number       = {1},
  pages        = {1--29},
  year         = {1994},
  url          = {https://doi.org/10.1142/S0129053394000020},
  doi          = {10.1142/S0129053394000020},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhsc/ReevesG94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/ArasKRS94,
  author       = {Caglan M. Aras and
                  James F. Kurose and
                  Douglas S. Reeves and
                  Henning Schulzrinne},
  title        = {Real-time communication in packet-switched networks},
  journal      = {Proc. {IEEE}},
  volume       = {82},
  number       = {1},
  pages        = {122--139},
  year         = {1994},
  url          = {https://doi.org/10.1109/5.259431},
  doi          = {10.1109/5.259431},
  timestamp    = {Sat, 11 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/ArasKRS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atmn/RampalRA94,
  author       = {Sanjeev Rampal and
                  Douglas S. Reeves and
                  Dharma P. Agrawal},
  editor       = {Demetres D. Kouvatsos},
  title        = {End-to-end guaranteed QoS with statistical multiplexing for {ATM}
                  networks},
  booktitle    = {{ATM} Networks, Performance Modelling and Analysis, Volume 1 [Second
                  {IFIP} Workshop on Performance Modelling and Evaluation of {ATM} Networks,
                  July 4-7, 1994, Bradford University, {UK]}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {17},
  pages        = {485--497},
  publisher    = {Chapman {\&} Hall},
  year         = {1994},
  timestamp    = {Thu, 03 Jan 2002 11:53:57 +0100},
  biburl       = {https://dblp.org/rec/conf/atmn/RampalRA94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpn/RampalRA94,
  author       = {Sanjeev Rampal and
                  Douglas S. Reeves and
                  Dharma P. Agrawal},
  editor       = {Serge Fdida},
  title        = {An Evalutaion of Routing and Admission Control Algorithms for Real-Time
                  Traffic in Packet-Switched Networks},
  booktitle    = {High Performance Networking V, Proceedings of the {IFIP} {TC6/WG6.4}
                  Fifth International Conference on High Performance Networking, Grenoble,
                  France, 27 June - 1 July, 1994},
  series       = {{IFIP} Transactions},
  volume       = {{C-26}},
  pages        = {79--93},
  publisher    = {North-Holland},
  year         = {1994},
  timestamp    = {Thu, 03 Jan 2002 12:00:08 +0100},
  biburl       = {https://dblp.org/rec/conf/hpn/RampalRA94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/AlexandreAR94,
  author       = {Sean Alexandre and
                  Winser E. Alexander and
                  Douglas S. Reeves},
  editor       = {Vijay K. Madisetti and
                  Erol Gelenbe and
                  Jean C. Walrand},
  title        = {A Programmable Simulator for Analyzing the Block Data Flow Architecture},
  booktitle    = {{MASCOTS} '94, Proceedings of the Second International Workshop on
                  Modeling, Analysis, and Simulation On Computer and Telecommunication
                  Systems, January 31 - February 2, 1994, Durham, North Carolina, {USA}},
  pages        = {399--400},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/MASCOT.1994.284391},
  doi          = {10.1109/MASCOT.1994.284391},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/AlexandreAR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/MeltonPRB92,
  author       = {Matthew S. Melton and
                  Tan Phan and
                  Douglas S. Reeves and
                  David E. van den Bout},
  title        = {The TInMANN {VLSI} chip},
  journal      = {{IEEE} Trans. Neural Networks},
  volume       = {3},
  number       = {3},
  pages        = {375--384},
  year         = {1992},
  url          = {https://doi.org/10.1109/72.129410},
  doi          = {10.1109/72.129410},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/MeltonPRB92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iros/ArasLR92,
  author       = {Caglan M. Aras and
                  Ren C. Luo and
                  Douglas S. Reeves},
  title        = {The Segmented Bus: {A} Dynamically Segmentable Interprocessor Communication
                  Network For Intelligent Mobile Robot Systems},
  booktitle    = {Proceedings of the {IEEE/RSJ} International Conference on Intelligent
                  Robots and Systems, {IROS} 1992, Raleigh, NC, USA, 7-10 Jul 1992},
  pages        = {309--316},
  publisher    = {{IEEE}},
  year         = {1992},
  url          = {https://doi.org/10.1109/IROS.1992.587356},
  doi          = {10.1109/IROS.1992.587356},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iros/ArasLR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ACMse/1992,
  editor       = {Mladen A. Vouk and
                  Douglas S. Reeves and
                  Cherri M. Pancake},
  title        = {Proceedings of the 30th Annual Southeast Regional Conference, 1992,
                  Raleigh, North Carolina, USA, April 8-10, 1992},
  publisher    = {{ACM}},
  year         = {1992},
  url          = {https://doi.org/10.1145/503720},
  doi          = {10.1145/503720},
  isbn         = {0-89791-506-2},
  timestamp    = {Fri, 12 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ACMse/1992.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icftcs/SiegleRK91,
  author       = {Markus Siegle and
                  Douglas S. Reeves and
                  Krzysztof Kozminski},
  editor       = {Mario Dal Cin and
                  Wolfgang Hohl},
  title        = {The Interlocking Bus Network for Fault-Tolerant Processor Arrays},
  booktitle    = {Fault-Tolerant Computing Systems, Tests, Diagnosis, Fault Treatment,
                  5th International {GI/ITG/GMA} Conference, N{\"{u}}rnberg, Germany,
                  September 25-27, 1991, Proceedings},
  series       = {Informatik-Fachberichte},
  volume       = {283},
  pages        = {348--359},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/978-3-642-76930-6\_29},
  doi          = {10.1007/978-3-642-76930-6\_29},
  timestamp    = {Wed, 17 May 2017 14:24:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icftcs/SiegleRK91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/FennisiR90,
  author       = {A. A. Fennisi and
                  Douglas S. Reeves},
  editor       = {A. Joe Turner},
  title        = {Using the stuck-at fault model: how well does it work?},
  booktitle    = {Proceedings of the 28th Annual Southeast Regional Conference, 1990,
                  Greenville, South Carolina, USA, April 18-20, 1990},
  pages        = {40--46},
  publisher    = {{ACM}},
  year         = {1990},
  url          = {https://doi.org/10.1145/98949.98968},
  doi          = {10.1145/98949.98968},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/ACMse/FennisiR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/MeltonPRB90,
  author       = {Matthew S. Melton and
                  Tan Phan and
                  Douglas S. Reeves and
                  David E. van den Bout},
  editor       = {Richard Lippmann and
                  John E. Moody and
                  David S. Touretzky},
  title        = {{VLSI} Implementation of TInMANN},
  booktitle    = {Advances in Neural Information Processing Systems 3, {[NIPS} Conference,
                  Denver, Colorado, USA, November 26-29, 1990]},
  pages        = {1046--1052},
  publisher    = {Morgan Kaufmann},
  year         = {1990},
  url          = {http://papers.nips.cc/paper/364-vlsi-implementation-of-tinmann},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/MeltonPRB90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/ReevesI87,
  author       = {Douglas S. Reeves and
                  Mary Jane Irwin},
  title        = {Fast Methods for Switch-Level Verification of {MOS} Circuits},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {6},
  number       = {5},
  pages        = {766--779},
  year         = {1987},
  url          = {https://doi.org/10.1109/TCAD.1987.1270320},
  doi          = {10.1109/TCAD.1987.1270320},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/ReevesI87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics