Thomas J. Giuli

According to our database1, Thomas J. Giuli authored at least 24 papers between 2000 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Reprint of "Prioritized gossip in vehicular networks".
Ad Hoc Networks, 2014

The future is cloudy: Reflecting prediction error in mobile applications.
Proceedings of the 6th International Conference on Mobile Computing, 2014

2013
Prioritized gossip in vehicular networks.
Ad Hoc Networks, 2013

AMC: verifying user interface properties for vehicular applications.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

2012
Informed mobile prefetching.
Proceedings of the 10th International Conference on Mobile Systems, 2012

2011
Data Modeling and Optimization for Wireless Drive-Through Applications.
IEEE Trans. Intell. Transp. Syst., 2011

Evaluating vehicular ad hoc networks for group applications.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

2010
Intentional networking: opportunistic exploitation of mobile network diversity.
Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, 2010

2009
The case for intentional networking.
Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, 2009

2006
The Last Inch at 70 Miles Per Hour.
IEEE Pervasive Comput., 2006

A fresh look at the reliability of long-term digital storage.
Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, 2006

The Case for Modeling Security, Privacy, Usability and Reliability (SPUR) in Automotive Software.
Proceedings of the Model-Driven Development of Reliable Automotive Services, 2006

2005
Preventing attacks in peer-to-peer document preservation systems.
PhD thesis, 2005

The LOCKSS peer-to-peer digital preservation system.
ACM Trans. Comput. Syst., 2005

Attrition Defenses for a Peer-to-Peer Digital Preservation System.
Proceedings of the 2005 USENIX Annual Technical Conference, 2005

2004
Notes On The Design Of An Internet Adversary
CoRR, 2004

Impeding attrition attacks in P2P systems.
Proceedings of the 11st ACM SIGOPS European Workshop, 2004

2 P2P or Not 2 P2P?
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2003
Preserving Peer Replicas By Rate-Limited Sampled Voting in LOCKSS
CoRR, 2003

Preserving peer replicas by rate-limited sampled voting.
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, 2003

2002
Narses: A Scalable Flow-Based Network Simulator
CoRR, 2002

Towards a Distributed Platform for Resource-Constrained Devices.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

2001
Enabling the Long-Term Archival of Signed Documents through Time Stamping
CoRR, 2001

2000
Mitigating routing misbehavior in mobile ad hoc networks.
Proceedings of the MOBICOM 2000, 2000


  Loading...