Emilia Rosti

According to our database1, Emilia Rosti authored at least 28 papers between 1993 and 2003.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2003
E-vote and Pki's: a Need, a Bliss or a Curse?
Proceedings of the Secure Electronic Voting, 2003

A quantitative study of Public Key Infrastructures.
Comput. Secur., 2003

S-ARP: a Secure Address Resolution Protocol.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

How to unwittingly sign non-repudiable documents with Java applications.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Models of Parallel Applications with Large Computation and I/O Requirements.
IEEE Trans. Software Eng., 2002

Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues.
Mob. Networks Appl., 2002

Internet Voting: Do people accept it? Do they trust it?
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Voice over IPsec: Analysis and Solutions.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
AngeL: a tool to disarm computer systems.
Proceedings of the New Security Paradigms Workshop 2001, 2001

Secure pebblenets.
Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2001

2000
Disarming offense to facilitate defense.
Proceedings of the 2000 Workshop on New Security Paradigms, 2000

Xaba: Exact, Approximate, and Asymptotic Solvers for Multi-class Closed Queueing Networks.
Proceedings of the Computer Performance Evaluation: Modelling Techniques and Tools, 2000

Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Scheduling issues in high-performance computing.
SIGMETRICS Perform. Evaluation Rev., 1999

Performance evaluation of parallel systems.
Parallel Comput., 1999

Adding Availability to Log Services of Untrusted Machines.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Processor Saving Scheduling Policies for Multiprocessor Systems.
IEEE Trans. Computers, 1998

A methodology for the evaluation of multiprocessor non-preemptive allocation policies.
J. Syst. Archit., 1998

The Impact of I/O on Program Behavior and Parallel Scheduling.
Proceedings of the 1998 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, 1998

A Tool for Pro-active Defense Against the Buffer Overrun Attack.
Proceedings of the Computer Security, 1998

1997
Queueing Network Models with Two Classes of Customers.
Proceedings of the MASCOTS 1997, 1997

1995
Thread Placement on the Intel Paragon: Modeling and Experimentation.
Proceedings of the MASCOTS '95, 1995

Analysis of Non-Work-Conserving Processor Partitioning Policies.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 1995

Performance Gains from Leaving Idle Processors in Multiprocessor Systems.
Proceedings of the 1995 International Conference on Parallel Processing, 1995

Modeling speedup of SPMD applications on the Intel Paragon: a case study.
Proceedings of the High-Performance Computing and Networking, 1995

1994
Robust Partitioning Policies of Multiprocessor Systems.
Perform. Evaluation, 1994

Workload Characterization For Performance Engineering Of Parallel Applications.
Proceedings of the Second Euromicro Workshop on Parallel and Distributed Processing, 1994

1993
The KSR1: Experimentation and Modeling of Poststore.
Proceedings of the 1993 ACM SIGMETRICS conference on Measurement and modeling of computer systems, 1993


  Loading...