M. Dennis Mickunas

According to our database1, M. Dennis Mickunas authored at least 34 papers between 1973 and 2006.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2006
Context and Location-Aware Encryption for Pervasive Computing Environments.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

2005
Design, implementation, and performance of an automatic configuration service for distributed component systems.
Softw. Pract. Exp., 2005

Olympus: A High-Level Programming Model for Pervasive Computing Environments.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

Mobile Gaia: a middleware for ad-hoc pervasive computing.
Proceedings of the 2nd IEEE Consumer Communications and Networking Conference, 2005

2004
MiddleWhere: A Middleware for Location Awareness in Ubiquitous Computing Applications.
Proceedings of the Middleware 2004, 2004

2003
Active security support for active networks.
IEEE Trans. Syst. Man Cybern. Part C, 2003

Use of ontologies in a pervasive computing environment.
Knowl. Eng. Rev., 2003

Cerberus: A Context-Aware Security Scheme for Smart Spaces.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

Dynamic personal roles for ubiquitous computing.
Proceedings of the Companion of the 18th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2003

Definition of a User Environment in a Ubiquitous System.
Proceedings of the On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE, 2003

2002
A lightweight reconfigurable security mechanism for 3G/4G mobile devices.
IEEE Wirel. Commun., 2002

Towards Security and Privacy for Pervasive Computing.
Proceedings of the Software Security -- Theories and Systems, 2002

Security as services in active networks.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002

Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

Developing Dynamic Security Policies.
Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), 2002

2001
Wearable Security Services.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

Dynamic Resource Management and Automatic Configuration of Distributed Component Systems.
Proceedings of the 6th USENIX Conference on Object-Oriented Technologies and Systems, January 29, 2001

An Adaptive Data Object Service for Pervasive Computing Environments.
Proceedings of the 6th USENIX Conference on Object-Oriented Technologies and Systems, January 29, 2001

2000
Secure Dynamic Reconfiguration of Scalable CORBA Systems with Mobile Agents.
Proceedings of the Agent Systems, 2000

Management of Environments in 2K.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems, 2000

Secure Information Flow in Mobile Bootstrapping Process.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

Flexible Secure Multicasting in Active Networks.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

IRBAC 2000: Secure Interoperability Using Dynamic Role Translation.
Proceedings of the International Conference on Internet Computing, 2000

2K: A Distributed Operating System for Dynamic Heterogeneous Environments.
Proceedings of the Ninth IEEE International Symposium on High Performance Distributed Computing, 2000

Secure Smart Homes using Jini and UIUC SESAME.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1984
The Delay/Re-Read Protocol for Concurrency Control in Databases.
Proceedings of the First International Conference on Data Engineering, 1984

1978
Automatic Error Recovery for LR Parsers.
Commun. ACM, 1978

Parallel Compilation In A Multiprocessor Environment (Extended Abstract).
Proceedings of the Proceedings 1978 ACM Annual Conference, 1978

1976
Transforming LR(k) Grammars to LR(1), SLR(1), and (1, 1) Bounded Right-Context Grammars.
J. ACM, 1976

On the Complete Covering Problem for LR(k)Grammars.
J. ACM, 1976

A new approach to teaching a first course in compiler construction.
Proceedings of the ACM SIGCSE-SIGCUE technical symposium on Computer science and education, 1976

1973
Techniques for compressing bounded-context acceptors
PhD thesis, 1973

On the Ability to Cover LR(k) Grammars with LR(1), SLR(1), and (1,1) Bounded-Context Grammars
Proceedings of the 14th Annual Symposium on Switching and Automata Theory, 1973


  Loading...