Peter Reiher - US grants
Affiliations: | Computer Science | University of California, Los Angeles, Los Angeles, CA |
Area:
file systems; network and computer security; distributed operating systems; ubiquitous computing; optimistic methods in computing; parallel discrete event simulationWe are testing a new system for linking grants to scientists.
The funding information displayed below comes from the NIH Research Portfolio Online Reporting Tools and the NSF Award Database.The grant data on this page is limited to grants awarded in the United States and is thus partial. It can nonetheless be used to understand how funding patterns influence mentorship networks and vice-versa, which has deep implications on how research is done.
You can help! If you notice any innacuracies, please sign in and mark grants as correct or incorrect matches.
High-probability grants
According to our matching algorithm, Peter Reiher is the likely recipient of the following grants.Years | Recipients | Code | Title / Keywords | Matching score |
---|---|---|---|---|
1998 — 2001 | Reiher, Peter | N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Improved Data Accesibility For Mobile Computers Through Predictive Methods @ University of California-Los Angeles This project will develop methods to give mobile computers timely access to changing data through improved data replication. When remote replicas of files stored on a mobile computer are updated, the system must balance data staleness against using scarce and expensive network bandwidth to fetch the new version. This research will investigate methods to automatically predict when files replicated on a portable computer should be reconcilied with remote replicas, which files are of most importance to reconcile, and which remote replica is likely to have the freshest data. The project will build on the success of the Seer predictive file hoarding system. The predictive methods developed will rely on information already kept for other purposes, plus a modest amount of newly gathered information. Simulation, analytic modeling, and measurement will be used to determine suitable methods. The project will produce a working prototype system. This research will improve the quality of data for portable computer users. It will be applicable to other types of data, such as database fragments or cached Web pages. |
1 |
1999 — 2003 | Zhang, Lixia (co-PI) [⬀] Reiher, Peter |
N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Practical Address Validation For the Internet @ University of California-Los Angeles This proposal is aimed at developing a general framework for source address validation across the Internet and investigating issues in realizing the source validation deployment. Result of this work will help in stopping malicious attacks such as denial of service' attack. The work includes enhancements to the current network routing protocols to provide necessary information for source validation, creating a prototype implementation of the source validation checking and deploy it on the CAIRN testbed. Through real implementation the performance of the new protocols will be investigated including how effectively source address validation supports diagnosis of flaws and attacks when it is only partially deployed. |
1 |
2001 — 2003 | Reiher, Peter | N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Improving Operating Systems by Replacing Hard Disks With Persistent Solid State Memory @ University of California-Los Angeles The use of persistent RAM in consumer products has increased its capacity and decreased its price. These trends suggest that typical computers could contain large quantities of this kind of memory in the near future. This project will investigate how to change operating system design for workstation and server machines to make best use of the availability of large quantities of persistent RAM. In particular, the project will investigate the use of persistent RAM for a machine's primary stable storage, replacing hard disks. The project will perform a test design and implementation to demonstrate the feasibility of the concept and to suggest possible advantages of the approach. This implementation will be performed on a Linux system augmented with 2 Gbytes or more of RAM that will serve as its primary storage device, with a hard disk used only for large files, such as video and audio data. The project will demonstrate advantages in speed and simplicity of the system. It will also point out interesting possibilities for improvements in operating system services made possible by the use of persistent RAM. |
1 |
2003 — 2007 | Chu, Wesley [⬀] Reiher, Peter |
N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Itr: Knowledge-Based Inference Techniques to Ensure the Security of Database Content @ University of California-Los Angeles The utility of databases could be much greater if they were generally accessible across a network. But such network-available databases face serious security challenges. Users can use inference techniques on information from multiple databases to obtain data that none of these databases would directly divulge. |
1 |
2004 — 2007 | Reiher, Peter | N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Collaborative Research: Defcom: Distributed Defense Against Ddos Attacks @ University of California-Los Angeles Collaborative Research: DefCOM - Distributed Defense against DDoS |
1 |
2004 — 2008 | Reiher, Peter | N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
@ University of California-Los Angeles National Science Foundation |
1 |
2004 — 2008 | Popek, Gerald (co-PI) [⬀] Kleinrock, Leonard [⬀] Reiher, Peter |
N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Itr - (Ase+Nhs) - (Dmc+Int+Soc): Panoply: Enabling Safe Ubiquitous Computing Environments @ University of California-Los Angeles Proposal number: CNS-0427748 |
1 |
2007 — 2010 | Reiher, Peter | N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Collaborative Research: Ct-Isg. Enabling Routers to Detect and Filter Spoofed Traffic @ University of California-Los Angeles 0716452 |
1 |
2007 — 2011 | Kleinrock, Leonard (co-PI) [⬀] Reiher, Peter |
N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Nbd: Controlling Applications by Managing Network Characteristics @ University of California-Los Angeles This project investigates using controlled degradation of local area network performance to control the types of applications that can run effectively on the network. Network administrators can use the techniques developed by the project to prevent undesirable applications (peer file sharing, network games, etc.) from being run on the network merely by adjusting network performance. For example, some network games can be made intolerable by varying jitter or live audio can be disrupted by high loss rates, without impacting applications like web browsing, remote file access, or email. This technique works even if you cannot log into computers connected to the network and it is much harder for users to evade. The project will build practical tools that allow network administrators to control their networks in this manner and provide insight into how to use those tools for common cases. A major challenge for this approach is to find fundamental required network conditions that control important applications such that no attempt by programmers or users to work with the applications in the face of those degraded conditions is likely to be fruitful. The project will also investigate analytic issues of network performance, in particular the use of derivatives and integrals of common network performance metrics like bandwidth and delay. |
1 |
2008 — 2011 | Reiher, Peter | N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Ct-Isg: Data Tethers - Preventing Sensitive Data From Loss and Theft @ University of California-Los Angeles The Data Tethers project is building an operating system that prevents loss of sensitive data when portable computers or storage devices are lost or stolen. Loss of such information is commonplace and often very |
1 |
2009 — 2011 | Reiher, Peter | N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Collaborative Research: Hands-On Exercises On Deter Testbed For Security Education @ University of California-Los Angeles Computer Science (31) |
1 |
2011 — 2014 | Kaiser, William (co-PI) [⬀] Reiher, Peter |
N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Csr:Small:Kalipers-Deep Energy Inspection of Operating System Components @ University of California-Los Angeles The electrical power used by all classes of computers is becoming of increasing importance. A major component of the cost of running large server operations is power, and, on the other end, the utility of laptops, palmtops, pads, and other portable devices is highly constrained by their batteries? capacity to power operations. |
1 |
2011 — 2014 | Reiher, Peter Sarrafzadeh, Majid [⬀] |
N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
Tc: Small: Protecting Wireless Medical Devices @ University of California-Los Angeles A mobile health monitoring system generates and monitors data related to a patient?s health using a wireless or wired channel. It may also control dosages of medicine or alter the behavior of medical devices to preserve a patient?s health. Such continuous monitoring and control gives mobile health monitoring systems the promise of improving health for lower costs than traditional methods. The security of mobile health monitoring systems is critical because of the importance of their tasks and the vulnerability of the devices and their operating environments. Such devices are sometimes used in hospitals or other health care facilities, but more often in patients? homes, offices, and other ordinary environments whose physical and cyber security cannot be controlled. The security of widely used mobile health monitoring devices is badly flawed. This danger will be addressed by adding security mechanisms to the overall system and environment in which mobile medical health devices operate. While less effective and efficient than designing such devices properly in the first place, there are reasonable low-cost solutions that can substantially improve the safety and security of such devices. |
1 |
2011 — 2016 | Reiher, Peter | N/AActivity Code Description: No activity code was retrieved: click on the grant title for more information |
@ University of California-Los Angeles Intellectual Merit: |
1 |