Year |
Citation |
Score |
2006 |
Wang AIA, Kuenning G, Reiher P, Popek G. The Conquest file system: Better performance through a disk/persistent-RAM hybrid design Acm Transactions On Storage. 2: 309-348. DOI: 10.1145/1168910.1168914 |
0.598 |
|
2004 |
Li J, Reiher PL, Popek GJ. Resilient self-organizing overlay networks for security update delivery Ieee Journal On Selected Areas in Communications. 22: 189-202. DOI: 10.1109/Jsac.2003.818808 |
0.641 |
|
2004 |
Ratner D, Reiher P, Popek GJ. Roam: A scalable replication system for mobility Mobile Networks and Applications. 9: 537-544. DOI: 10.1023/B:Mone.0000034707.26695.E8 |
0.677 |
|
2002 |
Kuenning GH, Ma W, Reiher P, Popek GJ. Simplifying automated hoarding methods Proceedings of the International Workshop On Modeling, Analysis and Simulation of Wireless and Mobile Systems. 15-21. |
0.613 |
|
2001 |
Ekenstam T, Matheny C, Reiher P, Popek GJ. The Bengal Database Replication System Distributed and Parallel Databases. 9: 187-210. DOI: 10.1023/A:1019266628724 |
0.686 |
|
2001 |
Ratner D, Reiher P, Popek GJ, Kuenning GH. Replication requirements in mobile environments Mobile Networks and Applications. 6: 525-533. DOI: 10.1023/A:1011862121702 |
0.666 |
|
2001 |
Wang AIA, Reiher P, Popek GJ. The conquest file system - Life after disks Proceedings of the Workshop On Hot Topics in Operating Systems - Hotos. 186. |
0.587 |
|
2000 |
Yarvis M, Reiher P, Popek GJ. A reliability model for distributed adaptation 2000 Ieee 3rd Conference On Open Architectures and Network Programming Proceedings, Openarch 2000. 88-97. DOI: 10.1109/OPNARC.2000.828136 |
0.639 |
|
2000 |
Badrinath B, Fox A, Kleinrock L, Popek G, Reiher P, Satyanarayanan M. Conceptual framework for network and client adaptation Mobile Networks and Applications. 5: 221-231. DOI: 10.1023/A:1019168830964 |
0.632 |
|
1999 |
Ratner DH, Reiher PL, Popek GJ, Guy RG. Peer replication with selective control Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1748: 169-181. DOI: 10.1007/3-540-46669-X_15 |
0.648 |
|
1998 |
Rudenko A, Reiher P, Popek GJ, Kuenning GH. Saving portable computer battery power through remote process execution Mobile Computing and Communications Review. 2: 19-26. DOI: 10.1145/584007.584008 |
0.58 |
|
1998 |
Page TW, Guy RG, Heidemann JS, Ratner DH, Reiher PL, Goel A, Kuenning GH, Popek GJ. Perspectives on optimistically replicated, peer-to-peer filing Software - Practice and Experience. 28: 155-180. DOI: 10.1002/(Sici)1097-024X(199802)28:2<155::Aid-Spe155>3.0.Co;2-5 |
0.657 |
|
1998 |
Kuenning GH, Bagrodia R, Guy RG, Popek GJ, Reiher P, Wang AI. Measuring the quality of service of optimistic replication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1543: 319-320. |
0.557 |
|
1997 |
Kuenning GH, Reiher P, Popek GJ. Experience with an automated hoarding system Personal and Ubiquitous Computing. 1: 145-155. DOI: 10.1007/Bf01299649 |
0.616 |
|
1997 |
Kuenning GH, Popek GJ. Automated Hoarding for Mobile Computers Operating Systems Review (Acm). 31: 264-275. |
0.311 |
|
1994 |
Heidemann JS, Popek GJ. File-System Development with Stackable Layers Acm Transactions On Computer Systems (Tocs). 12: 58-89. DOI: 10.1145/174613.174616 |
0.552 |
|
1986 |
Sheltzer AB, Popek GJ. Internet Locus: Extending Transparency to an Internet Environment Ieee Transactions On Software Engineering. 1067-1075. DOI: 10.1109/Tse.1986.6312996 |
0.408 |
|
1983 |
Parker DS, Popek GJ, Stoughton A, Walker BJ, Walton E, Chow JM, Edwards D, Kline C, Rudisin G, Kiser S. Detection of Mutual Inconsistency in Distributed Systems Ieee Transactions On Software Engineering. 240-247. DOI: 10.1109/Tse.1983.236733 |
0.413 |
|
1980 |
Wlker BJ, Kemmerer RA, Popek GJ. SPECIFICATION AND VERIFICATION OF UCLA UNIX SECURITY KERNEL Communications of the Acm. 23: 118-131. DOI: 10.1145/358818.358825 |
0.615 |
|
1980 |
Manasce DA, Popek GJ, Muntz RR. LOCKING PROTOCOL FOR RESOURCE COORDINATION IN DISTRIBUTED DATABASES Acm Transactions On Database Systems. 5: 103-138. DOI: 10.1145/320141.320143 |
0.373 |
|
1979 |
Popek GJ, Kline CS. Encryption and Secure Computer Networks Acm Computing Surveys (Csur). 11: 331-356. DOI: 10.1145/356789.356794 |
0.386 |
|
1978 |
Popek GJ, Farber DA. A Model for Verification of Data Security in Operating Systems Communications of the Acm. 21: 737-749. DOI: 10.1145/359588.359597 |
0.375 |
|
1975 |
Popek GJ, Kline CS. A verifiable protection system Acm Sigplan Notices. 10: 294-304. DOI: 10.1145/390016.808451 |
0.392 |
|
1974 |
Popek GJ, Goldberg RP. Formal Requirements for Virtualizable Third Generation Architectures Communications of the Acm. 17: 412-421. DOI: 10.1145/361011.361073 |
0.333 |
|
1974 |
Popek GJ. Protection Structures Computer. 7: 22-33. DOI: 10.1109/Mc.1974.6323580 |
0.347 |
|
Show low-probability matches. |