David Kotz

Orcid: 0000-0001-7411-2783

Affiliations:
  • Dartmouth College, Hanover, USA


According to our database1, David Kotz authored at least 195 papers between 1989 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2020, "For contributions to the security, privacy, and usability of mobile systems".

IEEE Fellow

IEEE Fellow 2009, "For contributions to parallel and distributed systems and wireless networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Challenges and opportunities in onboarding smart-home devices.
Proceedings of the 25th International Workshop on Mobile Computing Systems and Applications, 2024

Smart Use of Smart Devices in Your Home: A Smart Home Security and Privacy Workshop for the General Public.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

2023
Detecting Receptivity for mHealth Interventions.
GetMobile Mob. Comput. Commun., June, 2023

Evaluating the practical range of harmonic radar to detect smart electronics.
Proceedings of the IEEE Military Communications Conference, 2023

2022
Analog Gated Recurrent Unit Neural Network for Detecting Chewing Events.
IEEE Trans. Biomed. Circuits Syst., December, 2022

Detecting the Presence of Electronic Devices in Smart Homes Using Harmonic Radar Technology.
Remote. Sens., 2022

Evaluating voice-assistant commands for dementia detection.
Comput. Speech Lang., 2022

Analog Gated Recurrent Neural Network for Detecting Chewing Events.
CoRR, 2022

Eating detection with a head-mounted video camera.
Proceedings of the 10th IEEE International Conference on Healthcare Informatics, 2022

Amanuensis: provenance, privacy, and permission in TEE-enabled blockchain data systems.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

2021
<i>VibeRing</i>: Using vibrations from a smart ring as an out-of-band channel for sharing secret keys.
Pervasive Mob. Comput., 2021

Amanuensis: Information provenance for health-data systems.
Inf. Process. Manag., 2021

Detecting Receptivity for mHealth Interventions in the Natural Environment.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

When Do Drivers Interact with In-Vehicle Well-being Interventions?: An Exploratory Analysis of a Longitudinal Study on Public Roads.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Introduction to the Special Issue on the Wearable Technologies for Smart Health, Part 2.
ACM Trans. Comput. Heal., 2021

Recurring verification of interaction authenticity within bluetooth networks.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Mining social interactionsin connection traces of a campus wi-fi network.
Proceedings of the SIGCOMM '21: ACM SIGCOMM 2021 Conference, 2021

2020
Securely Connecting Wearables to Ambient Displays with User Intent.
IEEE Trans. Dependable Secur. Comput., 2020

Evaluating the Reproducibility of Physiological Stress Detection Models.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Continuous Detection of Physiological Stress with Commodity Hardware.
ACM Trans. Comput. Heal., 2020

Introduction to the Special Issue on the Wearable Technologies for Smart Health.
ACM Trans. Comput. Heal., 2020

Longitudinal analysis of a campus Wi-Fi network.
Comput. Networks, 2020

Automatic Learning coupled with Interpretability: MBDA in Action.
Proceedings of the 4th Network Traffic Measurement and Analysis Conference, 2020

Measuring children's eating behavior with a wearable device.
Proceedings of the 8th IEEE International Conference on Healthcare Informatics, 2020

2019
Exploring the State-of-Receptivity for mHealth Interventions.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Networkmetrics unraveled: MBDA in Action.
CoRR, 2019

CloseTalker: Secure, Short-Range Ad Hoc Wireless Communication.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Proximity Detection with Single-Antenna IoT Devices.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

Experience: Design, Development and Evaluation of a Wearable Device for mHealth Applications.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

Blockchain in Health Data Systems: A Survey.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

Using vibrations from a SmartRing as an out-of-band channel for sharing secret keys.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

Amulet: an open-source wrist-worn platform for mHealth research and education.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

2018
NoCloud: Exploring Network Disconnection through On-Device Data Analysis.
IEEE Pervasive Comput., 2018

SAW: Wristband-based Authentication for Desktop Computers.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Vocal Resonance: Using Internal Body Voice for Wearable Authentication.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Auracle: Detecting Eating Episodes with an Ear-mounted Sensor.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Application Memory Isolation on Ultra-Low-Power MCUs.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Poster: Proximity Detection with Single-Antenna IoT Devices.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

BASTION-SGX: bluetooth and architectural support for trusted I/O on SGX.
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, 2018

The Case for a Commodity Hardware Solution for Stress Detection.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

Detection and Monitoring of Repetitions Using an mHealth-Enabled Resistance Band.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

An ultra-low resource wearable EDA sensor using wavelet compression.
Proceedings of the 15th IEEE International Conference on Wearable and Implantable Body Sensor Networks, 2018

GeriActive: Wearable app for monitoring and encouraging physical activity among older adults.
Proceedings of the 15th IEEE International Conference on Wearable and Implantable Body Sensor Networks, 2018

2017
SPICE: Secure Proximity-based Infrastructure for Close Encounters.
Proceedings of the First ACM Workshop on Mobile Crowdsensing Systems and Applications, 2017

Challenges to ensuring human safety throughout the life-cycle of Smart Environments.
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 2017

ActivityAware: An app for real-time daily activity level monitoring on the Amulet wrist-worn device.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

ENACT: Encounter-based Architecture for Contact Tracing.
Proceedings of the 4th International on Workshop on Physical Analytics, 2017

Toward Accurate and Efficient Feature Selection for Speaker Recognition on Wearables.
Proceedings of the 2017 Workshop on Wearable Systems and Applications, 2017

Poster: Vocal Resonance as a Passive Biometric.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

AuthoRing: Wearable User-presence Authentication.
Proceedings of the 2017 Workshop on Wearable Systems and Applications, 2017

Challenges and Opportunities in Wearable Systems.
Proceedings of the 2017 Workshop on Wearable Systems and Applications, 2017

Poster: Memory Protection in Ultra-Low-Power Multi-Application Wearables.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Toward a Wearable Sensor for Eating Detection.
Proceedings of the 2017 Workshop on Wearable Systems and Applications, 2017

Poster: Auracle: A Wearable Device for Detecting and Monitoring Eating Behavior.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Secure Information Transfer Between Nearby Wireless Devices.
Proceedings of the 9th ACM Workshop on Wireless of the Students, 2017

Safety and Security in the Internet of Things.
Proceedings of the 9th ACM Workshop on Wireless of the Students, 2017

LightTouch: Securely connecting wearables to ambient displays with user intent.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Investigating contextual cues as indicators for EMA delivery.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

2016
Datasets for Mobile, Wearable and IOT Research.
GetMobile Mob. Comput. Commun., 2016

Privacy and Security in Mobile Health: A Research Agenda.
Computer, 2016

The Amulet Wearable Platform: Demo Abstract.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

Amulet: An Energy-Efficient, Multi-Application Wearable Platform.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

Demo: Wanda, Securely Introducing Mobile Devices.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Wanda: Securely introducing mobile devices.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Location Privacy for Mobile Crowd Sensing through Population Mapping.
Sensors, 2015

Data Citation Practices in the CRAWDAD Wireless Network Data Archive.
D Lib Mag., 2015

Security for mobile and cloud frontiers in healthcare.
Commun. ACM, 2015

2014
From MAP to DIST: The Evolution of a Large-Scale WLAN Monitoring System.
IEEE Trans. Mob. Comput., 2014

Hide-n-Sense: Preserving Privacy Efficiently in Wireless mHealth.
Mob. Networks Appl., 2014

ZEBRA: Zero-Effort Bilateral Recurring Authentication.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Amulet: a secure architecture for mHealth applications for low-power wearable devices.
Proceedings of the 1st Workshop on Mobile Medical Applications, 2014

Poster: Balancing disclosure and utility of personal information.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Poster: Enabling computational jewelry for mHealth applications.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

A wearable system that knows who wears it.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Assessing blood-pressure measurement in tablet-based mHealth apps.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

2013
Securing Information Technology in Healthcare.
IEEE Secur. Priv., 2013

Analysis of a Wi-Fi Hotspot Network.
Proceedings of the International Workshop on Wireless Traffic Measurements and Modeling, 2013

Provenance framework for mHealth.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

2012
Recognizing whether sensors are on the same body.
Pervasive Mob. Comput., 2012

Privacy in mobile technology for personal healthcare.
ACM Comput. Surv., 2012

Understanding sharing preferences and behavior for mHealth devices.
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

An amulet for trustworthy wearable mHealth.
Proceedings of the 2012 Workshop on Mobile Computing Systems and Applications, 2012

Who Wears Me? Bioimpedance as a Passive Biometric.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

A provenance framework for mHealth.
Proceedings of the Second ACM Workshop on Mobile Systems, 2012

Plug-n-trust: practical trusted sensing for mhealth.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Effects of network trace sampling methods on privacy and utility metrics.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

2011
AnonySense: A system for anonymous opportunistic sensing.
Pervasive Mob. Comput., 2011

Identifying Unusual Days.
J. Comput. Sci. Eng., 2011

Adapt-lite: privacy-aware, secure, and efficient mhealth sensing.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Short paper: the NetSANI framework for analysis and fine-tuning of network trace sanitization.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Social network analysis plugin (SNAP) for mesh networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Exposing Privacy Concerns in mHealth.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Adaptive Security and Privacy for mHealth Sensing.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Poster: practical trusted computing for mhealth sensing.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Privacy analysis of user association logs in a large-scale wireless LAN.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A threat taxonomy for mHealth privacy.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

2010
On the reliability of wireless fingerprinting using clock skews.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Saluki: A high-performance Wi-Fi sniffing program.
Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2010), May 31, 2010

A correlation attack against user mobility privacy in a large-scale WLAN network.
Proceedings of the 2010 ACM workshop on Wireless of the students, 2010

Experimental validation of analytical performance models for IEEE 802.11 networks.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

2009
Dartmouth Internet Security Testbed (DIST): Building a Campus-wide Wireless Testbed.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

DEAMON: Energy-efficient Sensor Monitoring.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

MPCS: Mobile-phone based patient compliance system for chronic illness care.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

Activity-aware ECG-based patient authentication for remote health monitoring.
Proceedings of the 11th International Conference on Multimodal Interfaces, 2009

2008
Map: a scalable monitoring system for dependable 802.11 wireless networks.
IEEE Wirel. Commun., 2008

Data-centric middleware for context-aware pervasive computing.
Pervasive Mob. Comput., 2008

Group-aware stream filtering for bandwidth-efficient data dissemination.
Int. J. Parallel Emergent Distributed Syst., 2008

Mesh-Mon: A multi-radio mesh monitoring and management system.
Comput. Commun., 2008

The changing usage of a mature campus-wide wireless network.
Comput. Networks, 2008

CRAWDAD workshop 2007.
Comput. Commun. Rev., 2008

Active behavioral fingerprinting of wireless devices.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

AnonySense: Opportunistic and Privacy-Preserving Context Collection.
Proceedings of the Pervasive Computing, 2008

Refocusing in 802.11 Wireless Measurement.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

Anonysense: privacy-aware people-centric sensing.
Proceedings of the 6th International Conference on Mobile Systems, 2008

Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Localized Bridging Centrality for Distributed Network Analysis.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Event dissemination via group-aware stream filtering.
Proceedings of the Second International Conference on Distributed Event-Based Systems, 2008

2007
Experimental Evaluation of Wireless Simulation Assumptions.
Simul., 2007

Periodic properties of user mobility and access-point popularity.
Pers. Ubiquitous Comput., 2007

Privacy in Location-Aware Computing Environments.
IEEE Pervasive Comput., 2007

Virtual Walls: Protecting Digital Privacy in Pervasive Environments.
Proceedings of the Pervasive Computing, 2007

Evaluating opportunistic routing protocols with large realistic contact traces.
Proceedings of the Second Workshop on Challenged Networks, CHANTS 2007, Montréal, Québec, 2007

Coordinated Sampling to Improve the Efficiency of Wireless Network Monitoring.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Group-aware Stream Filtering.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

2006
Naming and Discovery in Mobile Systems.
Proceedings of the Handbook of Mobile Middleware., 2006

Evaluating Next-Cell Predictors with Extensive Wi-Fi Mobility Data.
IEEE Trans. Mob. Comput., 2006

Bandwidth reservation using WLAN handoff prediction.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2006

Improving Data Access for Computational Grid Applications.
Clust. Comput., 2006

CRAWDAD: a community resource for archiving wireless data at Dartmouth.
Comput. Commun. Rev., 2006

Scalability in a Secure Distributed Proof System.
Proceedings of the Pervasive Computing, 2006

Risks of Using AP Locations Discovered Through War Driving.
Proceedings of the Pervasive Computing, 2006

On Improving Wireless Broadcast Reliability of Sensor Networks Using Erasure Codes.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Predictability of WLAN Mobility and Its Effects on Bandwidth Provisioning.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Extracting a Mobility Model from Real User Traces.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Analysis of a Campus-Wide Wireless Network.
Wirel. Networks, 2005

Empirical Validation of Wireless Models in Simulations of Ad Hoc Routing Protocols.
Simul., 2005

CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth.
IEEE Pervasive Comput., 2005

Secure context-sensitive authorization.
Pervasive Mob. Comput., 2005

Policy-Driven Data Dissemination for Context-Aware Applications.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

Classifying the Mobility of Users and the Popularity of Access Points.
Proceedings of the Location- and Context-Awareness, First International Workshop, 2005

2004
The Kerf Toolkit for Intrusion Analysis.
IEEE Secur. Priv., 2004

Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols.
Proceedings of the 18th Workshop on Parallel and Distributed Simulation, 2004

Outdoor experimental comparison of four ad hoc routing algorithms.
Proceedings of the 7th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2004

Design and Implementation of a Large-Scale Context Fusion Network.
Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), 2004

Dependency Management in Distributed Settings.
Proceedings of the 1st International Conference on Autonomic Computing (ICAC 2004), 2004

2003
Evaluating location predictors with extensive Wi-Fi mobility data.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

Computational Markets to Regulate Mobile-Agent Systems.
Auton. Agents Multi Agent Syst., 2003

Context-Sensitive Resource Discovery.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

2002
D'Agents: Applications and performance of a mobile-agent system.
Softw. Pract. Exp., 2002

Message from the Chair, Novemver 2001.
ACM SIGOPS Oper. Syst. Rev., 2002

Performance Analysis of Mobile Agents for Filtering Data Streams on Wireless Networks.
Mob. Networks Appl., 2002

Armada: a parallel I/O framework for computational grids.
Future Gener. Comput. Syst., 2002

Mobile Agents: Future Directions for Mobile Agent Research.
IEEE Distributed Syst. Online, 2002

Context Aggregation and Dissemination in Ubiquitous Computing Systems.
Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), 2002

Toward Interoperability of Mobile-Agent Systems.
Proceedings of the Mobile Agents, 6th International Conference, 2002

2001
Special Issue: High Performance Agent Systems.
Concurr. Comput. Pract. Exp., 2001

Mobile-Agent versus Client/Server Performance: Scalability in an Information-Retrieval Task.
Proceedings of the Mobile Agents, 5th International Conference, 2001

Armada: A Parallel File System for Computational Grids.
Proceedings of the First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), 2001

A Market-Based Model for Resource Allocation in Agent Systems.
Proceedings of the Coordination of Internet Agents: Models, Technologies, and Applications, 2001

2000
End-to-End Authorization.
Proceedings of the 4th Symposium on Operating System Design and Implementation (OSDI 2000), 2000

Performance analysis of mobile agents for filtering data streams on wireless networks.
Proceedings of the 3rd International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2000

A Formal Semantics for SPKI.
Proceedings of the Computer Security, 2000

A game-theoretic formulation of multi-agent resource allocation.
Proceedings of the Fourth International Conference on Autonomous Agents, 2000

1999
Mobile Agents and the Future of the Internet.
ACM SIGOPS Oper. Syst. Rev., 1999

1998
D'Agents: Security in a Multiple-Language, Mobile-Agent System.
Proceedings of the Mobile Agents and Security, 1998

Market-Based Resource Control for Mobile Agents.
Proceedings of the Second International Conference on Autonomous Agents, 1998

1997
Disk-Directed I/O for MIMD Multiprocessors.
ACM Trans. Comput. Syst., 1997

The Galley Parallel File System.
Parallel Comput., 1997

Transportable Information Agents.
J. Intell. Inf. Syst., 1997

AGENT TCL: Targeting the Needs of Mobile Computers.
IEEE Internet Comput., 1997

1996
File-Access Characteristics of Parallel Scientific Workloads.
IEEE Trans. Parallel Distributed Syst., 1996

Flexibility and Performance of Parallel File Systems.
ACM SIGOPS Oper. Syst. Rev., 1996

The Expected Lifetime of Single-Address-Space Operating Systems.
Comput. Syst., 1996

Large-Scale File Systems with the Flexibility of Databases.
ACM Comput. Surv., 1996

Transportable agents support worldwide applications.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

ENWRICH a Compute-Processor Write Caching Scheme for Parallel File Systems.
Proceedings of the Fourth Workshop on I/O in Parallel and Distributed Systems, 1996

Performance of the Gallery Parallel File System.
Proceedings of the Fourth Workshop on I/O in Parallel and Distributed Systems, 1996

Low-Level Interfaces for High-Level Parallel I/O.
Proceedings of the Input/Output in Parallel and Distributed Computer Systems., 1996

Introduction to Multiprocessor I/O Architecture.
Proceedings of the Input/Output in Parallel and Distributed Computer Systems., 1996

1995
Parallel I/O: Getting ready for prime time.
IEEE Concurr., 1995

File-system workload on a scientific multiprocessor.
IEEE Parallel Distributed Technol. Syst. Appl., 1995

A Data-Parallel Programming Library for Education (DAPPLE).
Comput. Sci. Educ., 1995

Expanding the potential for disk-directed I/O.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995

Characterizing parallel file-access patterns on a large-scale multiprocessor.
Proceedings of IPPS '95, 1995

Different Approaches to Parallel Computing Education.
Proceedings of IPPS '95, 1995

Disk-Directed I/O for an Out-of-Core Computation.
Proceedings of the 4th International Symposium on High Performance Distributed Computing (HPDC '95), 1995

1994
Dynamic file-access characteristics of a production parallel scientific workload.
Proceedings of the Proceedings Supercomputing '94, 1994

1993
Caching and Writeback Policies in Parallel File Systems.
J. Parallel Distributed Comput., 1993

Practical Prefetching Techniques for Multiprocessor File Systems.
Distributed Parallel Databases, 1993

The internet programming contest: a report and philosophy.
Proceedings of the 24th SIGCSE Technical Symposium on Computer Science Education, 1993

Multiprocessor File System Interfaces.
Proceedings of the 2nd International Conference on Parallel and Distributed Information Systems (PDIS 1993), 1993

1991
Practical Prefetching Techniques for Parallel File Systems.
Proceedings of the First International Conference on Parallel and Distributed Information Systems (PDIS 1991), 1991

1990
Prefetching in File Systems for MIMD Multiprocessors.
IEEE Trans. Parallel Distributed Syst., 1990

1989
Evaluation of concurrent pools.
Proceedings of the 9th International Conference on Distributed Computing Systems, 1989


  Loading...