dblp.uni-trier.dewww.uni-trier.de

Henry L. Owen Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2008
35EEYongpei Guan, Weilai Yang, Henry L. Owen, Douglas M. Blough: A pricing approach for bandwidth allocation in differentiated service networks. Computers & OR 35(12): 3769-3786 (2008)
2006
34EEGregory J. Conti, Kulsoom Abdullah, Julian B. Grizzard, John T. Stasko, John A. Copeland, Mustaque Ahamad, Henry L. Owen, Christopher P. Lee: Countering Security Information Overload through Alert and Packet Visualization. IEEE Computer Graphics and Applications 26(2): 60-70 (2006)
33EEJohn G. Levine, Julian B. Grizzard, Henry L. Owen: Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. IEEE Security & Privacy 4(1): 24-32 (2006)
2005
32EESven Krasser, Henry L. Owen, Joachim Sokol, Hans-Peter Huth, Jochen Grimminger: Adaptive Per-Flow Traffic Engineering Based on Probe Packet Measurements. CNSR 2005: 131-136
31EEWeilai Yang, Henry L. Owen, Douglas M. Blough: Determining Differentiated Services Network Pricing Through Auctions. ICN (1) 2005: 802-809
30EEHayriye Altunbasak, Sven Krasser, Henry L. Owen, Jochen Grimminger, Hans-Peter Huth, Joachim Sokol: Securing Layer 2 in Local Area Networks. ICN (2) 2005: 699-706
29EEGregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen: Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. VizSEC 2005: 10
2004
28EEJulian B. Grizzard, John G. Levine, Henry L. Owen: Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. ESORICS 2004: 369-384
27EEJohn G. Levine, Julian B. Grizzard, Henry L. Owen: A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. IWIA 2004: 107-128
26EEHayriye Altunbasak, Sven Krasser, Henry L. Owen, Joachim Sokol, Jochen Grimminger, Hans-Peter Huth: Addressing the Weak Link Between Layer 2 and Layer 3 in the Internet Architecture. LCN 2004: 417-418
25EEJulian B. Grizzard, Sven Krasser, Henry L. Owen, Gregory J. Conti, Eric R. Dodson: Towards an Approach for Automatically Repairing Compromised Network Systems. NCA 2004: 389-392
24EEDavid Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen: HoneyStat: Local Worm Detection Using Honeypots. RAID 2004: 39-58
23EEJohn G. Levine, Julian B. Grizzard, Henry L. Owen: Using Honeynets to Protect Large Enterprise Networks. IEEE Security & Privacy 2(6): 73-75 (2004)
22EEÖzgür Gürbüz, Henry L. Owen: Dynamic resource scheduling (DRS): a multimedia QoS framework for W-CDMA. Wireless Communications and Mobile Computing 4(5): 529-546 (2004)
2003
21 David A. Barlow, Vasos Vassiliou, Henry L. Owen: A Cryptographic Protocol to Protect MPLS Labels. IAW 2003: 237-242
20 Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. Owen: Wireless Intrusion Detection and Response. IAW 2003: 68-75
19 John G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver: The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. IAW 2003: 92-99
18EENicholas Athanasiades, Randal Abler, John G. Levine, Henry L. Owen, George F. Riley: Intrusion Detection Testing and Benchmarking Methodologies. IWIA 2003: 63-72
2002
17 David A. Barlow, Henry L. Owen, Vasos Vassiliou, Jochen Grimminger, Hans-Peter Huth, Joachim Sokol: Simulating Router-based Traffic-engineering in Radio Access Networks using NS-2. Communications, Internet, and Information Technology 2002: 136-141
16 Özgür Gürbüz, Henry L. Owen: Power Control Based QoS Provisioning for Multimedia in W-CDMA. Wireless Networks 8(1): 37-47 (2002)
2001
15EEMyung Choi, Henry L. Owen, Joachim Sokol: Packet-Size Based Queuing Algorithm for QoS Support. ICN (2) 2001: 137-147
14 Seong-Ho Jeong, Henry L. Owen, John A. Copeland, Joachim Sokol: QoS support for UDP/TCP based networks. Computer Communications 24(1): 64-77 (2001)
2000
13EESeong-Ho Jeong, Myung Choi, Randal Abler, Henry L. Owen, John A. Copeland, Joachim Sokol: QoS Support for Real-Time Applications Using the Integration of RSVP/Intserv and Diffserv: A Testbed Experiment. NETWORKING 2000: 458-469
1999
12EEBob Johnston, Henry L. Owen: SDH Digital Cross-Connect Traffic Generation Algorithm. MASCOTS 1999: 84-91
11EEPeter E. Sholander, Henry L. Owen: The impact of mapping wander on the performance of SDH AU-4 and TU-3 uniform pointer processors. Computer Networks 31(5): 457-473 (1999)
1998
10 John Spillane, Henry L. Owen: Temporal Partitioning for Partially-Reconfigurable-Field-Programmable Gate. IPPS/SPDP Workshops 1998: 37-42
1997
9 Dennis J. Pai, Henry L. Owen: An Algorithm for Bandwidth Management with Survivability Constraints in ATM Networks. ICC (1) 1997: 261-266
8 Jong-Il Park, Stephen B. Wicker, Henry L. Owen: Soft Output Equalization Techniques for pi/4-DQPSK Moblie Radio. ICC (3) 1997: 1503-1507
7 Peter E. Sholander, Chris Autry, Henry L. Owen: Mapping Wander in SONET/SDH Adaptive Threshold Modulation Pointer Processors. ICC (3) 1997: 1587-1591
1996
6EEHenry L. Owen: Ring-based bandwidth dimensioning in SDH networks. Computer Communications 19(2): 102-112 (1996)
1995
5 Peter E. Sholander, Henry L. Owen: Simulation Model for Analysis of Synchronous Digital Hierarchy Network Payload Jitter. MASCOTS 1995: 275-279
1994
4 Henry L. Owen: Synchronous Digital Hierarchy Network Modeling. MASCOTS 1994: 229-233
3 Henry L. Owen, Thomas M. Klett: Synchronous Digital Hierarchy Network Pointer Simulation. Computer Networks and ISDN Systems 26(5): 481-491 (1994)
1993
2 Henry L. Owen: VLSI Architecture for Switch-Level Simulation. MASCOTS 1993: 44-49
1EEHenry L. Owen, Thomas M. Klett: Synchronous Digital Hierarchy statistical simulation of pointer activity. Computer Communications 16(12): 759-766 (1993)

Coauthor Index

1Kulsoom Abdullah [34]
2Randal Abler [13] [18]
3Mustaque Ahamad [29] [34]
4Hayriye Altunbasak [26] [30]
5Nicholas Athanasiades [18]
6Chris Autry [7]
7David A. Barlow [17] [21]
8Douglas M. Blough [31] [35]
9Myung Choi [13] [15]
10Gregory J. Conti [25] [29] [34]
11Didier Contis [19]
12John A. Copeland [13] [14] [34]
13Brian Culver [19]
14David Dagon [24]
15Eric R. Dodson [25]
16Jochen Grimminger [17] [26] [30] [32]
17Julian B. Grizzard [23] [24] [25] [27] [28] [29] [33] [34]
18Guofei Gu [24]
19Yongpei Guan [35]
20Özgür Gürbüz [16] [22]
21Hans-Peter Huth [17] [26] [30] [32]
22Seong-Ho Jeong [13] [14]
23Bob Johnston [12]
24Thomas M. Klett [1] [3]
25Sven Krasser [25] [26] [30] [32]
26Richard LaBella [19]
27Christopher P. Lee [34]
28Wenke Lee [24]
29John G. Levine [18] [19] [20] [23] [24] [27] [28] [33]
30Yu-Xi Lim [20]
31Dennis J. Pai [9]
32Jong-Il Park [8]
33Xinzhou Qin [24]
34George F. Riley [18]
35Tim Schmoyer [20]
36Peter E. Sholander [5] [7] [11]
37Joachim Sokol [13] [14] [15] [17] [26] [30] [32]
38John Spillane [10]
39John T. Stasko [34]
40Vasos Vassiliou [17] [21]
41Stephen B. Wicker [8]
42Weilai Yang [31] [35]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)