John Dunagan

According to our database1, John Dunagan authored at least 24 papers between 2001 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
BLR-D: applying bilinear logistic regression to factored diagnosis problems.
ACM SIGOPS Oper. Syst. Rev., 2011

Smoothed analysis of condition numbers and complexity implications for linear programming.
Math. Program., 2011

Active Graph Reachability Reduction for Network Security and Software Engineering.
Proceedings of the IJCAI 2011, 2011

2010
Stout: An Adaptive Interface to Scalable Cloud Storage.
Proceedings of the 2010 USENIX Annual Technical Conference, 2010

Volley: Automated Data Placement for Geo-Distributed Cloud Services.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Centrifuge: Integrated Lease Management and Partitioning for Cloud Services.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

2009
Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs.
Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, 2009

2008
A simple polynomial-time rescaling algorithm for solving linear programs.
Math. Program., 2008

Characterizing Botnets from Email Spam Records.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

2007
BrowserShield: Vulnerability-driven filtering of dynamic HTML.
ACM Trans. Web, 2007

Iteratively constructing preconditioners via the conjugate gradient method.
Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 2007

Generic Application-Level Protocol Analyzer and its Language.
Proceedings of the Network and Distributed System Security Symposium, 2007

2006
Finding diversity in remote code injection exploits.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

2005
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities.
Proceedings of the Network and Distributed System Security Symposium, 2005

2004
Strider: a black-box, state-based approach to change and configuration management and support.
Sci. Comput. Program., 2004

Optimal outlier removal in high-dimensional spaces.
J. Comput. Syst. Sci., 2004

FUSE: Lightweight Guaranteed Distributed Failure Notification.
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004

SSCH: slotted seeded channel hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks.
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, 2004

Experience Talk: FDR: A Flight Data Recorder Using Black-BoxAnalysis of Persistent State Changes for Managing Change and Configuration.
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004

Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests.
Proceedings of the 1st International Conference on Autonomic Computing (ICAC 2004), 2004

2003
Smoothed Analysis of Interior-Point Algorithms: Condition Number
CoRR, 2003

2002
Smoothed analysis of the perceptron algorithm for linear programming.
Proceedings of the Thirteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2002

2001
Optimal outlier removal in high-dimensional.
Proceedings of the Proceedings on 33rd Annual ACM Symposium on Theory of Computing, 2001

On Euclidean Embeddings and Bandwidth Minimization.
Proceedings of the Approximation, 2001


  Loading...