Miranda Mowbray

Orcid: 0000-0003-2080-7242

Affiliations:
  • Hewlett Packard Enterprise Labs, Bristol, UK


According to our database1, Miranda Mowbray authored at least 38 papers between 1992 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2014
Finding Domain-Generation Algorithms by Looking at Length Distribution.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

2013
Mechanisms for Protecting Sensitive Information in Cloud Computing.
Comput. Syst. Sci. Eng., 2013

Efficient Submatch Extraction for Practical Regular Expressions.
Proceedings of the Language and Automata Theory and Applications, 2013

2012
Enhancing privacy in cloud computing via policy-based obfuscation.
J. Supercomput., 2012

Business-driven short-term management of a hybrid IT infrastructure.
J. Parallel Distributed Comput., 2012

Protecting Personal Information in Cloud Computing.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012, 2012

2011
TrustCloud: A Framework for Accountability and Trust in Cloud Computing.
Proceedings of the World Congress on Services, 2011

Evaluating the impact of planning long-term contracts on the management of a hybrid IT infrastructure.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Efficient Prevention of Credit Card Leakage from Enterprise Networks.
Proceedings of the Communications and Multimedia Security, 2011

2010
The Twittering Machine.
Proceedings of the WEBIST 2010, 2010

Assessing the Value of Contributions in Tagging Systems.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

2009
A client-based privacy manager for cloud computing.
Proceedings of the 4th International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2009), 2009

A Privacy Manager for Cloud Computing.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

2008
Dominator-tree analysis for distributed authorization.
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008

2007
Automatic grid assembly by promoting collaboration in peer-to-peer grids.
J. Parallel Distributed Comput., 2007

How web community organisation can help grid computing.
Int. J. Web Based Communities, 2007

Electing the Doge of Venice: Analysis of a 13th Century Protocol.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

Resource-efficient software delivery using volunteer assistance.
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007

2006
Labs of the World, Unite!!!
J. Grid Comput., 2006

Gifting technologies: A BitTorrent case study.
First Monday, 2006

Impact of peer incentives on the dissemination of polluted content.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

A Reciprocation-Based Economy for Multiple Services in Peer-to-Peer Grids.
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006

Distributed Authorization Using Delegation with Acyclic Paths.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

2005
Influences on cooperation in BitTorrent communities.
Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, 2005

2004
Email Prioritization: Reducing Delays on Legitimate Mail Caused by Junk Mail.
Proceedings of the General Track: 2004 USENIX Annual Technical Conference, June 27, 2004

Scheduling in Bag-of-Task Grids: The PAUÁ Case.
Proceedings of the 16th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2004), 2004

Discouraging Free Riding in a Peer-to-Peer CPU-Sharing Grid.
Proceedings of the 13th International Symposium on High-Performance Distributed Computing (HPDC-13 2004), 2004

When can an autonomous reputation scheme discourage free-riding in a peer-to-peer system?
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004

2001
Philosophically Based Limitations to Freedom of Speech in Virtual Communities.
Inf. Syst. Frontiers, 2001

2000
Book Reviews.
First Monday, 2000

1999
Cookies, Gift-Giving, and the Internet.
First Monday, 1999

1998
Finding cyclic redundancy check polynomials for multilevel systems.
IEEE Trans. Commun., 1998

Capacity reservation for multimedia traffic.
Distributed Syst. Eng., 1998

New Families of Semi-Regular Relative Difference Sets.
Des. Codes Cryptogr., 1998

1997
Structured Transition Systems with Parametric Observations: Observational Congruences and Minimal Realizations.
Math. Struct. Comput. Sci., 1997

1993
Barker Arrays II: ODD Numer of Elements.
SIAM J. Discret. Math., 1993

1992
Finitary Logics for Some CCS Observational Bisimulations.
Inf. Process. Lett., 1992

Causal Security.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992


  Loading...