default search action
Peter L. Reiher
Person information
- affiliation: University of California, Los Angeles, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Yebo Feng, Jun Li, Devkishen Sisodia, Peter L. Reiher:
On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic. IEEE Trans. Dependable Secur. Comput. 21(4): 2211-2226 (2024) - [c84]Vahab Pournaghshband, Peter L. Reiher:
End-to-End Detection of Middlebox Interference. NOMS 2024: 1-9 - 2023
- [c83]Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, Peter L. Reiher:
Toward Adaptive DDoS-Filtering Rule Generation. CNS 2023: 1-9 - [c82]Haikuo Yin, Brandon Lou, Peter L. Reiher:
A Method for Summarizing and Classifying Evasive Malware. RAID 2023: 455-470 - [i5]Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, Peter L. Reiher:
Adaptive Distributed Filtering of DDoS Traffic on the Internet. CoRR abs/2305.13296 (2023) - 2022
- [j24]Lumin Shi, Jun Li, Mingwei Zhang, Peter L. Reiher:
On Capturing DDoS Traffic Footprints on the Internet. IEEE Trans. Dependable Secur. Comput. 19(4): 2755-2770 (2022) - 2020
- [c81]Robert Roy, Erika Dennis, An-I Andy Wang, Peter L. Reiher, Sarah M. Diesburg:
An exploration of targeted provenance for reliability. SAC 2020: 1207-1213
2010 – 2019
- 2019
- [c80]Mingwei Zhang, Lumin Shi, Devkishen Sisodia, Jun Li, Peter L. Reiher:
On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic. IM 2019: 180-188 - [c79]Mevlut Turker Garip, Jonathan Lin, Peter L. Reiher, Mario Gerla:
SHIELDNET: An Adaptive Detection Mechanism against Vehicular Botnets in VANETs. VNC 2019: 1-7 - [c78]Mevlut Turker Garip, Peter L. Reiher, Mario Gerla:
RIoT: A Rapid Exploit Delivery Mechanism against IoT Devices Using Vehicular Botnets. VTC Fall 2019: 1-6 - 2018
- [c77]Mevlut Turker Garip, Peter L. Reiher, Mario Gerla:
BOTVEILLANCE: A Vehicular Botnet Surveillance Attack against Pseudonymous Systems in VANETs. WMNC 2018: 53-60 - [c76]Lumin Shi, Mingwei Zhang, Jun Li, Peter L. Reiher:
PathFinder: Capturing DDoS Traffic Footprints on the Internet. Networking 2018: 10-18 - 2017
- [c75]Jelena Mirkovic, Erik Kline, Peter L. Reiher:
RESECT: Self-Learning Traffic Filters for IP Spoofing Defense. ACSAC 2017: 474-485 - [c74]Mevlut Turker Garip, Paul Hyungmin Kim, Peter L. Reiher, Mario Gerla:
INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks. CCNC 2017: 1-6 - 2016
- [c73]Peter A. H. Peterson, Peter L. Reiher:
Datacomp: Locally Independent Adaptive Compression for Real-World Systems. ICDCS 2016: 211-220 - [c72]Mevlut Turker Garip, Peter L. Reiher, Mario Gerla:
Ghost: Concealing vehicular botnet communication in the VANET control channel. IWCMC 2016: 1-6 - 2015
- [c71]Mevlut Turker Garip, Mehmet Emre Gursoy, Peter L. Reiher, Mario Gerla:
Scalable reactive vehicle-to-vehicle congestion avoidance mechanism. CCNC 2015: 943-948 - [c70]Michael Mitchell, Ratnesh Patidar, Manik Saini, Parteek Singh, An-I Wang, Peter L. Reiher:
Mobile usage patterns and privacy implications. PerCom Workshops 2015: 457-462 - [c69]Michael Mitchell, An-I Andy Wang, Peter L. Reiher:
Cashtags: Protecting the Input and Display of Sensitive Data. USENIX Security Symposium 2015: 961-976 - 2014
- [c68]Vahab Pournaghshband, David Meyer, Michael Holyland, Majid Sarrafzadeh, Peter L. Reiher:
Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices. CSE 2014: 758-763 - [c67]Vahab Pournaghshband, Alexander Afanasyev, Peter L. Reiher:
End-to-end detection of compression of traffic flows by intermediaries. NOMS 2014: 1-8 - [c66]Jun Li, Skyler Berg, Mingwei Zhang, Peter L. Reiher, Tao Wei:
Drawbridge: software-defined DDoS-resistant traffic engineering. SIGCOMM 2014: 591-592 - 2013
- [c65]Adam Cozzette, Kathryn Lingel, Steve Matsumoto, Oliver Ortlieb, Jandria Alexander, Joseph Betser, Luke Florer, Geoff Kuenning, John Nilles, Peter L. Reiher:
Improving the security of Android inter-component communication. IM 2013: 808-811 - 2012
- [c64]Aaron Fujimoto, Peter Peterson, Peter L. Reiher:
Comparing the Power of Full Disk Encryption Alternatives. IGCC 2012: 1-6 - [c63]Charles Fleming, Peter Peterson, Erik Kline, Peter L. Reiher:
Data Tethers: Preventing information leakage by enforcing environmental data access policies. ICC 2012: 835-840 - [c62]Vahab Pournaghshband, Leonard Kleinrock, Peter L. Reiher, Alexander Afanasyev:
Controlling applications by managing network characteristics. ICC 2012: 1085-1090 - [c61]Michael Gray, Peter Peterson, Peter L. Reiher:
Scaling Down Off-the-Shelf Data Compression: Backwards-Compatible Fine-Grain Mixing. ICDCS 2012: 112-121 - [c60]Vahab Pournaghshband, Majid Sarrafzadeh, Peter L. Reiher:
Securing Legacy Mobile Medical Devices. MobiHealth 2012: 163-172 - 2011
- [j23]Joseph D. Touch, Ilia Baldine, Rudra Dutta, Gregory G. Finn, Bryan Ford, Scott Jordan, Daniel Massey, Abraham Matta, Christos Papadopoulos, Peter L. Reiher, George N. Rouskas:
A Dynamic Recursive Unified Internet Design (DRUID). Comput. Networks 55(4): 919-935 (2011) - [c59]Erik Kline, Alexander Afanasyev, Peter L. Reiher:
Shield: DoS filtering using traffic deflecting. ICNP 2011: 37-42 - [c58]Peter Peterson, Digvijay Singh, William J. Kaiser, Peter L. Reiher:
Investigating Energy and Security Trade-offs in the Classroom with the Atom LEAP Testbed. CSET 2011 - 2010
- [j22]Alexander Afanasyev, N. Tilley, Peter L. Reiher, Leonard Kleinrock:
Host-to-Host Congestion Control for TCP. IEEE Commun. Surv. Tutorials 12(3): 304-342 (2010) - [c57]Peter Peterson, Peter L. Reiher:
Security Exercises for the Online Classroom with DETER. CSET 2010
2000 – 2009
- 2009
- [j21]Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas:
Accurately Measuring Denial of Service in Simulation and Testbed Experiments. IEEE Trans. Dependable Secur. Comput. 6(2): 81-95 (2009) - [c56]Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Peter L. Reiher:
RAD: Reflector Attack Defense Using Message Authentication Codes. ACSAC 2009: 269-278 - [c55]Erik Kline, Peter L. Reiher:
Securing data through avoidance routing. NSPW 2009: 115-124 - [c54]Venkatraman Ramakrishna, Peter L. Reiher, Leonard Kleinrock:
Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments. PerCom 2009: 1-10 - 2008
- [j20]Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter L. Reiher, Lixia Zhang:
Learning the valid incoming direction of IP packets. Comput. Networks 52(2): 399-417 (2008) - [j19]Jelena Mirkovic, Peter L. Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, Michael Berg, Robert Jung:
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise. IEEE Trans. Computers 57(8): 1098-1112 (2008) - [c53]Kevin Eustice, Venkatraman Ramakrishna, Nam T. Nguyen, Peter L. Reiher:
The Smart Party: A Personalized Location-Aware Multimedia Experience. CCNC 2008: 873-877 - [c52]Tim Dasilva, Kevin Eustice, Peter L. Reiher:
Johnny Appleseed: wardriving to reduce interference in chaotic wireless deployments. MSWiM 2008: 122-131 - [c51]Kevin Eustice, A. M. Jourabchi, J. Stoops, Peter L. Reiher:
Improving User Satisfaction in a Ubiquitous Computing Application. WiMob 2008: 496-501 - [c50]Peter L. Reiher, John Zimmerman, Kevin Eustice:
Message from the SAUCE Workshop Organizing Technical Co-chairs. WiMob 2008 - 2007
- [j18]An-I Andy Wang, Geoff Kuenning, Peter L. Reiher:
Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication. Simul. 83(8): 551-569 (2007) - [j17]Charles Weddle, Mathew Oldham, Jin Qian, An-I Andy Wang, Peter L. Reiher, Geoffrey H. Kuenning:
PARAID: A gear-shifting power-aware RAID. ACM Trans. Storage 3(3): 13:1-13:33 (2007) - [c49]Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab:
Towards user-centric metrics for denial-of-service measurement. Experimental Computer Science 2007: 8 - [c48]Charles Weddle, Mathew Oldham, Jin Qian, An-I Andy Wang, Peter L. Reiher, Geoff Kuenning:
PARAID: A Gear-Shifting Power-Aware RAID. FAST 2007: 245-260 - [c47]Kevin Eustice, Venkatraman Ramakrishna, Alison Walker, Matthew Schnaider, Nam T. Nguyen, Peter L. Reiher:
nan0sphere: Location-Driven Fiction for Groups of Users. HCI (3) 2007: 852-861 - [c46]Matt Beaumont-Gay, Kevin Eustice, Peter L. Reiher:
Information protection via environmental data tethers. NSPW 2007: 67-73 - [c45]Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Wei-Min Yao, Peter L. Reiher, Stephen Schwab, Roshan K. Thomas:
When is service really denied?: a user-centric dos metric. SIGMETRICS 2007: 357-358 - [c44]Venkatraman Ramakrishna, Kevin Eustice, Peter L. Reiher:
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios. SOCA 2007: 180-190 - [c43]Jelena Mirkovic, Songjie Wei, Alefiya Hussain, Brett Wilson, Roshan K. Thomas, Stephen Schwab, Sonia Fahmy, Roman Chertov, Peter L. Reiher:
DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed. TRIDENTCOM 2007: 1-7 - [c42]Jelena Mirkovic, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas:
Automating DDoS Experimentation. DETER 2007 - 2006
- [j16]Venkatraman Ramakrishna, Max Robinson, Kevin Eustice, Peter L. Reiher:
An Active Self-Optimizing Multiplayer Gaming Architecture. Clust. Comput. 9(2): 201-215 (2006) - [j15]An-I Andy Wang, Geoffrey H. Kuenning, Peter L. Reiher, Gerald J. Popek:
The Conquest file system: Better performance through a disk/persistent-RAM hybrid design. ACM Trans. Storage 2(3): 309-348 (2006) - [c41]George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson:
A Framework for a Collaborative DDoS Defense. ACSAC 2006: 33-42 - [c40]Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko:
Measuring denial Of service. QoP 2006: 53-58 - 2005
- [j14]Jelena Mirkovic, Peter L. Reiher:
D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks. IEEE Trans. Dependable Secur. Comput. 2(3): 216-232 (2005) - [c39]Everett Anderson, Kevin Eustice, Shane Markstrum, Mark H. Hansen, Peter L. Reiher:
Mobile Contagion: Simulation of Infection and Defense. PADS 2005: 80-87 - [c38]Jun Li, Toby Ehrenkranz, Geoffrey H. Kuenning, Peter L. Reiher:
Simulation and Analysis on the Resiliency and Efficiency of Malnets. PADS 2005: 262-269 - [c37]An-I Wang, Peter L. Reiher, Geoffrey H. Kuenning:
Introducing permuted states for analyzing conflict rates in optimistic replication. SIGMETRICS 2005: 376-377 - [e1]Margaret H. Dunham, Birgitta König-Ries, Evaggelia Pitoura, Peter L. Reiher, Can Türker:
Mobile Information Management, 24.-29. October 2004. Dagstuhl Seminar Proceedings 04441, IBFI, Schloss Dagstuhl, Germany 2005 [contents] - 2004
- [j13]Jelena Mirkovic, Peter L. Reiher:
A taxonomy of DDoS attack and DDoS defense mechanisms. Comput. Commun. Rev. 34(2): 39-53 (2004) - [j12]Jun Li, Peter L. Reiher, Gerald J. Popek:
Resilient self-organizing overlay networks for security update delivery. IEEE J. Sel. Areas Commun. 22(1): 189-202 (2004) - [j11]David Ratner, Peter L. Reiher, Gerald J. Popek:
Roam: A Scalable Replication System for Mobility. Mob. Networks Appl. 9(5): 537-544 (2004) - [j10]Nam T. Nguyen, An-I Andy Wang, Peter L. Reiher, Geoffrey H. Kuenning:
Electric-field-based routing: a reliable framework for routing in MANETs. ACM SIGMOBILE Mob. Comput. Commun. Rev. 8(2): 35-49 (2004) - [i4]Joos-Hendrik Böse, Stefan Böttcher, Le Gruenwald, Pedro José Marrón, Philipp Obreiter, Evaggelia Pitoura, Peter L. Reiher, Kai-Uwe Sattler, Frank Seliger:
04441 Working Group - Some Open Aspects of Mobile Ad-hoc NETwork, Peer-to-Peer, and Self-organizing Systems. Mobile Information Management 2004 - [i3]Joos-Hendrik Böse, Stefan Böttcher, Le Gruenwald, Evaggelia Pitoura, Peter L. Reiher, George Samaras, Thomas Schwarz, Can Türker:
04441 Working Group - Research Issues in Mobile Transactions. Mobile Information Management 2004 - [i2]Margaret H. Dunham, Birgitta König-Ries, Evaggelia Pitoura, Peter L. Reiher, Can Türker:
04441 Executive Summary - Mobile Information Management. Mobile Information Management 2004 - [i1]Margaret H. Dunham, Birgitta König-Ries, Evaggelia Pitoura, Peter L. Reiher, Can Türker:
04441 Abstracts Collection - Mobile Information Management. Mobile Information Management 2004 - 2003
- [c36]Max Robinson, Jelena Mirkovic, B. Scott Michel, Matthew Schnaider, Peter L. Reiher:
DefCOM: Defensive Cooperative Overlay Mesh. DISCEX (2) 2003: 101-102 - [c35]Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenning:
Detecting Insider Threats by Monitoring System Call Activity. IAW 2003: 45-52 - [c34]Venkatraman Ramakrishna, Max Robinson, Kevin Eustice, Peter L. Reiher:
An Active Self-Optimizing Multiplayer Gaming Architecture. Active Middleware Services 2003: 32-41 - [c33]Alexey Rudenko, Peter L. Reiher:
Adaptation Planning for Active Networks. IWAN 2003: 252-265 - [c32]Kevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald J. Popek, Venkatraman Ramakrishna, Peter L. Reiher:
Enabling Secure Ubiquitous Interactions. Middleware Workshops 2003: 76-80 - [c31]Jelena Mirkovic, Gregory Prier, Peter L. Reiher:
Source-End DDoS Defense. NCA 2003: 171-178 - [c30]Jelena Mirkovic, Max Robinson, Peter L. Reiher:
Alliance formation for DDoS defense. NSPW 2003: 11-18 - [c29]Kevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald J. Popek, Venkatraman Ramakrishna, Peter L. Reiher:
Securing nomads: the case for quarantine, examination, and decontamination. NSPW 2003: 123-128 - 2002
- [b1]Jun Li, Peter L. Reiher, Gerald J. Popek:
Disseminating Security Updates at Internet Scale. Advances in Information Security 8, Springer 2002, pp. 1-144 - [j9]Jun Li, Mark Yarvis, Peter L. Reiher:
Securing distributed adaptation. Comput. Networks 38(3): 347-371 (2002) - [j8]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Ouri Wolfson:
Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems. SIGMOD Rec. 31(2): 73-79 (2002) - [c28]Vincent Ferreria, Alexey Rudenko, Kevin Eustice, Richard G. Guy, Venkatraman Ramakrishna, Peter L. Reiher:
Panda: Middleware to Provide the Benefits of Active Networks to Legacy Applications. DANCE 2002: 319-332 - [c27]An-I Wang, Peter L. Reiher, Rajive L. Bagrodia, Geoffrey H. Kuenning:
Understanding the Behavior of the Conflict-Rate Metric in Optimistic Peer Replication. DEXA Workshops 2002: 757-764 - [c26]Jelena Mirkovic, Gregory Prier, Peter L. Reiher:
Attacking DDoS at the Source. ICNP 2002: 312-321 - [c25]Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Reiher, Lixia Zhang:
SAVE: Source Address Validity Enforcement Protocol. INFOCOM 2002: 1557-1566 - [c24]Geoffrey H. Kuenning, Wilkie Ma, Peter L. Reiher, Gerald J. Popek:
Simplifying automated hoarding methods. MSWiM 2002: 15-21 - [c23]An-I Wang, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning:
Conquest: Better Performance Through a Disk/Persistent-RAM Hybrid File System. USENIX ATC, General Track 2002: 15-28 - 2001
- [j7]Todd Ekenstam, Charles Matheny, Peter L. Reiher, Gerald J. Popek:
The Bengal Database Replication System. Distributed Parallel Databases 9(3): 187-210 (2001) - [j6]David Ratner, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning:
Replication Requirements in Mobile Environments. Mob. Networks Appl. 6(6): 525-533 (2001) - [c22]B. Scott Michel, Peter L. Reiher:
Peer-through-Peer Communication for Information Logistics. GI Jahrestagung (1) 2001: 248-256 - [c21]An-I Wang, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning:
The Conquest File System's Life after Disks. HotOS 2001: 186 - [c20]Peter L. Reiher, Kevin Eustice, Kai-Min Sung:
Adapting Encrypted Data Streams in Open Architectures. Active Middleware Services 2001: 45-50 - [c19]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Alexander L. Wolf, Ouri Wolfson:
Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona. Infrastructure for Mobile and Wireless Systems 2001: 1-37 - 2000
- [j5]B. R. Badrinath, Armando Fox, Leonard Kleinrock, Gerald J. Popek, Peter L. Reiher, Mahadev Satyanarayanan:
A conceptual framework for network and client adaptation. Mob. Networks Appl. 5(4): 221-231 (2000) - [c18]B. Scott Michel, Konstantinos Nikoloudakis, Peter L. Reiher, Lixia Zhang:
URL Forwarding and Compression in Adaptive Web Caching. INFOCOM 2000: 670-678
1990 – 1999
- 1999
- [c17]David Ratner, Peter L. Reiher, Gerald J. Popek:
Roam: A Scalable Replication System for Mobile Computing. DEXA Workshop 1999: 96-104 - [c16]Mark Yarvis, Peter L. Reiher, Gerald J. Popek:
Conductor: A Framework for Distributed Adaptation. Workshop on Hot Topics in Operating Systems 1999: 44-51 - [c15]Mitchell Tsai, Peter L. Reiher, Gerald J. Popek:
Command Management System for Next-Generation User Input. Workshop on Hot Topics in Operating Systems 1999: 179-184 - [c14]An-I Wang, Peter L. Reiher, Rajive L. Bagrodia:
A simulation evaluation of optimistic replicated filing in mobile environments. IPCCC 1999: 43-51 - [c13]David Ratner, Peter L. Reiher, Gerald J. Popek, Richard G. Guy:
Peer Replication with Selective Control. MDA 1999: 169-181 - [c12]Jun Li, Peter L. Reiher, Gerald J. Popek:
Securing information transmission by redundancy. NSPW 1999: 112-117 - [c11]Alexey Rudenko, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning:
The Remote Processing Framework for Portable Computer Power Saving. SAC 1999: 365-372 - 1998
- [j4]Alexey Rudenko, Peter L. Reiher, Gerald J. Popek, Geoffrey H. Kuenning:
Saving portable computer battery power through remote process execution. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2(1): 19-26 (1998) - [j3]Thomas W. Page Jr., Richard G. Guy, John S. Heidemann, David Ratner, Peter L. Reiher, Ashish Goel, Geoffrey H. Kuenning, Gerald J. Popek:
Perspectives on Optimistically Replicated, Peer-to-Peer Filing. Softw. Pract. Exp. 28(2): 155-180 (1998) - [c10]Geoffrey H. Kuenning, Rajive L. Bagrodia, Richard G. Guy, Gerald J. Popek, Peter L. Reiher, An-I Wang:
Measuring the Quality of Service of Optimistic Replication. ECOOP Workshops 1998: 319-320 - [c9]Richard G. Guy, Peter L. Reiher, David Ratner, Michial A. Gunter, Wilkie Ma, Gerald J. Popek:
Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication. ER Workshops 1998: 254-265 - 1997
- [j2]Geoffrey H. Kuenning, Peter L. Reiher, Gerald J. Popek:
Experience with an Automated Hoarding System. Pers. Ubiquitous Comput. 1(3): 145-155 (1997) - 1994
- [c8]Peter L. Reiher, John S. Heidemann, David Ratner, Gregory Skinner, Gerald J. Popek:
Resolving File Conflicts in the Ficus File System. USENIX Summer 1994: 183-195 - [c7]Geoffrey H. Kuenning, Gerald J. Popek, Peter L. Reiher:
An Analysis of Trace Data for Predictive File Caching in Mobile Computing. USENIX Summer 1994: 291-303 - 1991
- [c6]David R. Jefferson, Peter L. Reiher:
Supercritical speedup. Annual Simulation Symposium 1991: 159-168 - 1990
- [c5]Peter L. Reiher:
Parallel simulation using the time warp operating system. WSC 1990: 38-45 - [c4]Matthew T. Presley, Peter L. Reiher, Steven F. Bellenot:
A time warp implementation of Sharks World. WSC 1990: 199-203
1980 – 1989
- 1989
- [j1]Frederick Wieland, L. Hayley, A. Feinberg, Mike Di Loreto, Leo Blume, J. Ruffles, Peter L. Reiher, Brian Beckman, Phil Hontalas, Steve Bellenot, David R. Jefferson:
The Performance of a Distributed Combat Simulation with the Time Warp Operating System. Concurr. Pract. Exp. 1(1): 35-50 (1989) - [c3]Peter L. Reiher, Frederick Wieland, David R. Jefferson:
Limitation of optimism in the time warp operating system. WSC 1989: 765-770 - 1988
- [c2]David R. Jefferson, Brian Beckman, Leo Blume, M. Diloreto, Phil Hontalas, Peter L. Reiher, Kathy Sturdevant, Jack Tupman, John J. Wedel, Frederick Wieland, Herb Younger:
The status of the time warp operating system. C³P 1988: 738-744 - 1987
- [c1]Peter L. Reiher, Gerald J. Popek:
Locus Naming in a Large Scale Environment. Kommunikation in Verteilten Systemen 1987: 167-177
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint