Steve R. White

According to our database1, Steve R. White authored at least 20 papers between 1974 and 2007.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2007
Prospects for simplifying ITSM-based management through self-managing resources.
IBM Syst. J., 2007

2006
Autonomic computing: Architectural approach and prototype.
Integr. Comput. Aided Eng., 2006

Biologically-Inspired Design: Getting It Wrong and Getting It Right.
Proceedings of the Biologically Inspired Cooperative Computing, 2006

2004
An Architectural Approach to Autonomic Computing.
Proceedings of the 1st International Conference on Autonomic Computing (ICAC 2004), 2004

Unity: Experiences with a Prototype Autonomic Computing System.
Proceedings of the 1st International Conference on Autonomic Computing (ICAC 2004), 2004

A Multi-Agent Systems Approach to Autonomic Computing.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

2003
Merry Christma: An Early Network Worm.
IEEE Secur. Priv., 2003

Security in an autonomic computing environment.
IBM Syst. J., 2003

2000
Trading accuracy for speed in parallel simulated annealing with simultaneous moves.
Parallel Comput., 2000

1998
Emergent Behavior in Information Economies.
Proceedings of the Third International Conference on Multiagent Systems, 1998

Dynamics of an Information-Filtering Economy.
Proceedings of the Cooperative Information Agents II, 1998

1995
Biologically Inspired Defenses Against Computer Viruses.
Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 1995

1993
Measuring and modeling computer virus prevalence.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

1992
Directed-Graph Epidemiological Models of Computer viruses.
Proceedings of the Computation: The Micro and the Macro View, 1992

1991
Directed-Graph Epidemiological Models of Computer Viruses.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

1990
ABYSS: An Architecture for Software Protection.
IEEE Trans. Software Eng., 1990

An evaluation system for the physical security of computing systems.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1989
Covert Distributed Processing with Computer Viruses.
Proceedings of the Advances in Cryptology, 1989

1987
ABYSS: A Trusted Architecture for Software Protection.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

1974
CHECKR: an efficient table-driven facility for input record data validation.
Proceedings of the 1974 ACM Annual Conference, 1974


  Loading...