Difference between revisions of "Publications 2005-2009"

From ARL Wiki
Jump to navigationJump to search
(Added RTAS09 Partial Program Admission paper)
 
Line 55: Line 55:
  
 
* [http://www.arl.wustl.edu/~cgw1/pubs/onl_sigcomm2009.pdf The Open Network Laboratory], by Charlie Wiseman, Jonathan Turner, and Patrick Crowley. Extended Abstract.  In ''Proceedings of ACM SIGCOMM'', 8/2009.
 
* [http://www.arl.wustl.edu/~cgw1/pubs/onl_sigcomm2009.pdf The Open Network Laboratory], by Charlie Wiseman, Jonathan Turner, and Patrick Crowley. Extended Abstract.  In ''Proceedings of ACM SIGCOMM'', 8/2009.
 +
 +
* [http://www.arl.wustl.edu/~mlw2/pubs/ppa_rtas2009.pdf Partial Program Admission], by Mike Wilson, Ron Cytron, and Jonathan Turner. In ''Proceedings of the 2009 15th IEEE Real-Time and Embedded Technology and Applications Symposium'', 5/2009.
  
 
* [http://www.arl.wustl.edu/~mbecchi/files/becchi_conext2008.pdf Extending Finite Automata to Efficiently Match Perl-Compatible Regular Expressions], by Michela Becchi and Patrick Crowley.  In ''Proceedings of CoNEXT'', 12/2008.
 
* [http://www.arl.wustl.edu/~mbecchi/files/becchi_conext2008.pdf Extending Finite Automata to Efficiently Match Perl-Compatible Regular Expressions], by Michela Becchi and Patrick Crowley.  In ''Proceedings of CoNEXT'', 12/2008.

Latest revision as of 21:20, 18 December 2009

Dissertations and Theses

Journal Articles

Conference Papers

  • The Open Network Laboratory, by Charlie Wiseman, Jonathan Turner, and Patrick Crowley. Extended Abstract. In Proceedings of ACM SIGCOMM, 8/2009.
  • Partial Program Admission, by Mike Wilson, Ron Cytron, and Jonathan Turner. In Proceedings of the 2009 15th IEEE Real-Time and Embedded Technology and Applications Symposium, 5/2009.
  • The Open Network Laboratory, by John DeHart, Fred Kuhns, Jyoti Parwatikar, Jonathan Turner, Charlie Wiseman, and Ken Wong, Proceedings of SIGCSE, 3/2006.
  • Multi-pattern Signature Matching for Hardware Network Intrusion Detection Systems, by Haoyu Song, and John Lockwood, Proceedings of Globecom, 11/2005.
  • Protecting TFRC from a Selfish Receiver, by Manfred Georg and Sergey Gorinsky. Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services (ICAS/ICNS 2005), 10/2005.
  • Transformation Algorithms for Data Streams, by John W. Lockwood, Stephen G. Eick, Doyle J. Weishar, Ron Loui, James Moscola, Chip Kastner, Andrew Levine, Mike Attig. IEEE Aerospace Conference, Big Sky, Montana, 3/2005.

Patents

Technical Reports