Year |
Citation |
Score |
2016 |
Kwak D, Liu R, Kim D, Nath B, Iftode L. Seeing Is Believing: Sharing Real-Time Visual Traffic Information via Vehicular Clouds Ieee Access. 4: 3617-3631. DOI: 10.1109/Access.2016.2569585 |
0.363 |
|
2013 |
Smaldone S, Gilbert B, Harkes J, Iftode L, Satyanarayanan M. Optimizing storage performance for VM-based mobile computing Acm Transactions On Computer Systems. 31. DOI: 10.1145/2465346.2465348 |
0.686 |
|
2013 |
Kinebuchi Y, Butt S, Ganapathy V, Iftode L, Nakajima T. Monitoring integrity using limited local memory Ieee Transactions On Information Forensics and Security. 8: 1230-1242. DOI: 10.1109/Tifs.2013.2266095 |
0.401 |
|
2012 |
Datta A, Dikaiakos MD, Haridi S, Iftode L. Infrastructures for online social networking services Ieee Internet Computing. 16: 10-12. DOI: 10.1109/Mic.2012.53 |
0.403 |
|
2011 |
Baliga A, Ganapathy V, Iftode L. Detecting kernel-level rootkits using data structure invariants Ieee Transactions On Dependable and Secure Computing. 8: 670-684. DOI: 10.1109/Tdsc.2010.38 |
0.645 |
|
2011 |
Xu G, Borcea C, Iftode L. A policy enforcing mechanism for trusted ad hoc networks Ieee Transactions On Dependable and Secure Computing. 8: 321-326. DOI: 10.1109/Tdsc.2010.11 |
0.72 |
|
2010 |
Bickford J, O'Hare R, Baliga A, Ganapathy V, Iftode L. Rootkits on smart phones: Attacks, implications and opportunities Hotmobile 2010: the 11th Workshop On Mobile Computing Systems and Applications. 49-53. DOI: 10.1145/1734583.1734596 |
0.674 |
|
2009 |
Baliga A, Kamat P, Ganapathy V, Iftode L. Identifying systemic threats to kernel data: Attacks and defense techniques Advanced Operating Systems and Kernel Applications: Techniques and Technologies. 46-70. DOI: 10.4018/978-1-60566-850-5.ch003 |
0.66 |
|
2009 |
Smaldone S, Ganapathy V, Iftode L. Working set-based access control for network file systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 207-216. DOI: 10.1145/1542207.1542241 |
0.301 |
|
2008 |
Baliga A, Ganapathy V, Iftode L. Automatic inference and enforcement of kernel data structure invariants Proceedings - Annual Computer Security Applications Conference, Acsac. 77-86. DOI: 10.1109/ACSAC.2008.29 |
0.629 |
|
2008 |
Baliga A, Iftode L, Chen X. Automated containment of rootkits attacks Computers and Security. 27: 323-334. DOI: 10.1016/J.Cose.2008.06.003 |
0.668 |
|
2008 |
Pathak V, Iftode L, Yao D. Improving email trustworthiness through social-group key authentication 5th Conference On Email and Anti-Spam, Ceas 2008. |
0.569 |
|
2007 |
Riva O, Nadeem T, Borcea C, Iftode L. Context-aware migratory services in ad hoc networks Ieee Transactions On Mobile Computing. 6: 1313-1328. DOI: 10.1109/Tmc.2007.1053 |
0.757 |
|
2007 |
Baliga A, Kamat P, Iftode L. Lurking in the shadows: Identifying systemic threats to kernel data (short paper) Proceedings - Ieee Symposium On Security and Privacy. 246-251. DOI: 10.1109/SP.2007.25 |
0.663 |
|
2007 |
Bohra A, Iftode L. Improving network processing concurrency using TCPServers Proceedings - 6th Ieee International Symposium On Network Computing and Applications, Nca 2007. 213-220. DOI: 10.1109/NCA.2007.31 |
0.609 |
|
2007 |
Bohra A, Smaldone S, Iftode L. FRAC: Implementing role-based access control for network file systems Proceedings - 6th Ieee International Symposium On Network Computing and Applications, Nca 2007. 95-102. DOI: 10.1109/NCA.2007.25 |
0.659 |
|
2007 |
Dikaiakos MD, Florides A, Nadeem T, Iftode L. Location-aware services over vehicular ad-hoc networks using car-to-car communication Ieee Journal On Selected Areas in Communications. 25: 1590-1602. DOI: 10.1109/Jsac.2007.071008 |
0.475 |
|
2007 |
Smaldone S, Bohra A, Iftode L. File wall: A firewall for network file systems Proceedings - Dasc 2007: Third Ieee International Symposium On Dependable, Autonomic and Secure Computing. 153-162. DOI: 10.1109/ISDASC.2007.4351400 |
0.644 |
|
2007 |
Ravi N, Iftode L. Outdoor distributed computing with split smart messages Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4322: 161-183. |
0.575 |
|
2006 |
Picconi F, Ravi N, Gruteser M, Iftode L. Probabilistic validation of aggregated data in vehicular ad-hoc networks Vanet - Proceedings of the Third Acm International Workshop On Vehicular Ad Hoc Networks. 2006: 76-85. DOI: 10.1145/1161064.1161077 |
0.327 |
|
2006 |
Gang X, Borcea C, Iftode L. Satem: Trusted service code execution across transactions Proceedings of the Ieee Symposium On Reliable Distributed Systems. 321-334. DOI: 10.1109/SRDS.2006.42 |
0.358 |
|
2006 |
Ravi N, Gruteser M, Iftode L. Non-inference: An information flow control model for location-based services 2006 3rd Annual International Conference On Mobile and Ubiquitous Systems, Mobiquitous - Workshops. DOI: 10.1109/MOBIQW.2006.361739 |
0.538 |
|
2006 |
Pathak V, Iftode L. Byzantine fault tolerant public key authentication in peer-to-peer systems Computer Networks. 50: 580-597. DOI: 10.1016/J.Comnet.2005.07.007 |
0.563 |
|
2005 |
Ravi N, Stern P, Desai N, Iftode L. Accessing ubiquitous services using smart phones Proceedings - Third Ieee International Conference On Pervasive Computing and Communications, Percom 2005. 2005: 383-393. DOI: 10.1109/PERCOM.2005.6 |
0.603 |
|
2005 |
Sultan F, Bohra A, Smaldone S, Pan Y, Gallard P, Neamtiu I, Iftode L. Recovering internet service sessions from operating system failures Ieee Internet Computing. 9: 17-27. DOI: 10.1109/Mic.2005.45 |
0.662 |
|
2005 |
Zhou P, Nadeem T, Kang P, Borcea C, Iftode L. EZCab: A cab booking application using short-range wireless communication Proceedings - Third Ieee International Conference On Pervasive Computing and Communications, Percom 2005. 2005: 27-40. |
0.317 |
|
2005 |
Iftode L, Baliga A, Bohra A, Smaldone S, Sultan F. Defending network-centric systems using backdoors Collection of Technical Papers - Infotech At Aerospace: Advancing Contemporary Aerospace Technologies and Their Integration. 3: 1746-1752. |
0.745 |
|
2004 |
Ni Y, Kremer U, Iftode L. A programming language for ad-hoc networks of mobile devices Acm International Conference Proceeding Series. 81. DOI: 10.1145/1066650.1066662 |
0.312 |
|
2004 |
Nadeem T, Dashtinezhad S, Liao C, Iftode L. TrafficView: traffic data dissemination using car-to-car communication Mobile Computing and Communications Review. 8: 6-19. DOI: 10.1145/1031483.1031487 |
0.306 |
|
2004 |
Ravi N, Borcea C, Kang P, Iftode L. Portable smart messages for ubiquitous java-enabled devices Proceedings of Mobiquitous 2004 - 1st Annual International Conference On Mobile and Ubiquitous Systems: Networking and Services. 412-421. DOI: 10.1109/MOBIQ.2004.1331748 |
0.335 |
|
2004 |
Kang P, Borcea C, Xu G, Saxena A, Kremer U, Iftode L. Smart messages: A distributed computing platform for networks of embedded systems Computer Journal. 47: 475-494. DOI: 10.1093/Comjnl/47.4.475 |
0.733 |
|
2004 |
Xu G, Iftode L. Locality driven key management architecture for mobile ad-hoc networks 2004 Ieee International Conference On Mobile Ad-Hoc and Sensor Systems. 436-446. |
0.351 |
|
2004 |
Ni Y, Kremer U, Iftode L. Spatial views: Space-aware programming for networks of embedded systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2958: 258-272. |
0.315 |
|
2003 |
Youssef M, Elsayed T, Hussein M, Nadeem T, Youssef A, Iftode L. Instance-based networking: a communication paradigm for mobile applications Mobile Computing and Communications Review. 7: 66-67. DOI: 10.1145/965732.965748 |
0.377 |
|
2003 |
Xu G, Borcea C, Iftode L. Toward a security architecture for smart messages: Challenges, solutions, and open issues Proceedings - 23rd International Conference On Distributed Computing Systems Workshops, Icdcsw 2003. 454-460. DOI: 10.1109/ICDCSW.2003.1203594 |
0.337 |
|
2003 |
Sultan F, Bohra A, Iftode L. Service continuations: An operating system mechanism for dynamic migration of Internet service sessions Proceedings of the Ieee Symposium On Reliable Distributed Systems. 177-186. |
0.712 |
|
2002 |
Sultan F, Nguyen TD, Iftode L. Lazy garbage collection of recovery state for fault-tolerant distributed shared memory Ieee Transactions On Parallel and Distributed Systems. 13: 1085-1098. DOI: 10.1109/Tpds.2002.1019857 |
0.61 |
|
2002 |
Borcea C, Iyer D, Kang P, Saxena A, Iftode L. Cooperative computing for distributed embedded systems Proceedings - International Conference On Distributed Computing Systems. 227-236. |
0.311 |
|
2002 |
Sultan F, Srinivasan K, Iyer D, Iftode L. Migratory TCP: Connection migration for service continuity in the internet Proceedings - International Conference On Distributed Computing Systems. 469-470. |
0.595 |
|
2001 |
Phatak SH, Esakki V, Badrinath BR, Iftode L. Web&: An architecture for non-interactive Web Proceedings - 2nd Ieee Workshop On Internet Applications, Wiapp 2001. 104-112. DOI: 10.1109/WIAPP.2001.941877 |
0.368 |
|
2001 |
Sultan F, Srinivasan K, Iftode L. Transport layer support for highly-available network services Proceedings of the Workshop On Hot Topics in Operating Systems - Hotos. 182. |
0.58 |
|
2001 |
Stanley-Marbell P, Borcea C, Nagaraja K, Iftode L. Smart messages: A system architecture for large networks of embedded systems Proceedings of the Workshop On Hot Topics in Operating Systems - Hotos. 181. |
0.306 |
|
1998 |
Iftode L, Singh JP, Li K. Scope Consistency: A Bridge between Release Consistency and Entry Consistency Theory of Computing Systems \/ Mathematical Systems Theory. 31: 451-473. DOI: 10.1007/S002240000097 |
0.387 |
|
1995 |
Cáceres R, Iftode L. Improving the Performance of Reliable Transport Protocols in Mobile Computing Environments Ieee Journal On Selected Areas in Communications. 13: 850-857. DOI: 10.1109/49.391749 |
0.395 |
|
Show low-probability matches. |