2006
Context and Location-Aware Encryption for Pervasive Computing Environments.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
2005
Design, implementation, and performance of an automatic configuration service for distributed component systems.
Softw. Pract. Exp., 2005
Olympus: A High-Level Programming Model for Pervasive Computing Environments.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005
Mobile Gaia: a middleware for ad-hoc pervasive computing.
Proceedings of the 2nd IEEE Consumer Communications and Networking Conference, 2005
2004
MiddleWhere: A Middleware for Location Awareness in Ubiquitous Computing Applications.
Proceedings of the Middleware 2004, 2004
2003
Active security support for active networks.
IEEE Trans. Syst. Man Cybern. Part C, 2003
Use of ontologies in a pervasive computing environment.
Knowl. Eng. Rev., 2003
Cerberus: A Context-Aware Security Scheme for Smart Spaces.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003
Dynamic personal roles for ubiquitous computing.
Proceedings of the Companion of the 18th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2003
Definition of a User Environment in a Ubiquitous System.
Proceedings of the On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE, 2003
2002
A lightweight reconfigurable security mechanism for 3G/4G mobile devices.
IEEE Wirel. Commun., 2002
Towards Security and Privacy for Pervasive Computing.
Proceedings of the Software Security -- Theories and Systems, 2002
Security as services in active networks.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002
Developing Dynamic Security Policies.
Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), 2002
2001
Wearable Security Services.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001
Dynamic Resource Management and Automatic Configuration of Distributed Component Systems.
Proceedings of the 6th USENIX Conference on Object-Oriented Technologies and Systems, January 29, 2001
An Adaptive Data Object Service for Pervasive Computing Environments.
Proceedings of the 6th USENIX Conference on Object-Oriented Technologies and Systems, January 29, 2001
2000
Secure Dynamic Reconfiguration of Scalable CORBA Systems with Mobile Agents.
Proceedings of the Agent Systems, 2000
Management of Environments in 2K.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems, 2000
Secure Information Flow in Mobile Bootstrapping Process.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000
Flexible Secure Multicasting in Active Networks.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000
IRBAC 2000: Secure Interoperability Using Dynamic Role Translation.
Proceedings of the International Conference on Internet Computing, 2000
2K: A Distributed Operating System for Dynamic Heterogeneous Environments.
Proceedings of the Ninth IEEE International Symposium on High Performance Distributed Computing, 2000
Secure Smart Homes using Jini and UIUC SESAME.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1984
The Delay/Re-Read Protocol for Concurrency Control in Databases.
Proceedings of the First International Conference on Data Engineering, 1984
1978
Automatic Error Recovery for LR Parsers.
Commun. ACM, 1978
Parallel Compilation In A Multiprocessor Environment (Extended Abstract).
Proceedings of the Proceedings 1978 ACM Annual Conference, 1978
1976
Transforming LR(k) Grammars to LR(1), SLR(1), and (1, 1) Bounded Right-Context Grammars.
J. ACM, 1976
On the Complete Covering Problem for LR(k)Grammars.
J. ACM, 1976
A new approach to teaching a first course in compiler construction.
Proceedings of the ACM SIGCSE-SIGCUE technical symposium on Computer science and education, 1976
1973
Techniques for compressing bounded-context acceptors
PhD thesis, 1973
On the Ability to Cover LR(k) Grammars with LR(1), SLR(1), and (1,1) Bounded-Context Grammars
Proceedings of the 14th Annual Symposium on Switching and Automata Theory, 1973