Roy H. Campbell
#74,335
Most Influential Person Now
Philippine Education System
Roy H. Campbell's AcademicInfluence.com Rankings
Roy H. Campbelleducation Degrees
Education
#514
World Rank
#758
Historical Rank
Educational Technology
#8
World Rank
#8
Historical Rank
Roy H. Campbellcomputer-science Degrees
Computer Science
#2671
World Rank
#2794
Historical Rank
Machine Learning
#936
World Rank
#949
Historical Rank
Artificial Intelligence
#1123
World Rank
#1143
Historical Rank
Database
#1774
World Rank
#1859
Historical Rank
Download Badge
Education Computer Science
Roy H. Campbell's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
- Bachelors Electrical Engineering University of the Philippines
Similar Degrees You Can Earn
Why Is Roy H. Campbell Influential?
(Suggest an Edit or Addition)According to Wikipedia, Roy H. Campbell is a computer scientist and the Sohaib and Sara Abbasi Professor emeritus at University of Illinois at Urbana–Champaign and director of the Assured Cloud Computing University Center of Excellence. Campbell is best known for his work in operating systems, parallel computing, and multimedia on the internet.
Roy H. Campbell's Published Works
Published Works
- A Middleware Infrastructure for Active Spaces (2002) (1174)
- Big Data: Astronomical or Genomical? (2015) (1079)
- Gaia: A Middleware Infrastructure to Enable Active Spaces1 (2002) (562)
- Model-Based Reinforcement Learning for Atari (2019) (545)
- The specification of process synchronization by path expressions (1974) (502)
- ARIA: automatic resource inference and allocation for mapreduce environments (2011) (492)
- A Middleware for Context-Aware Agents in Ubiquitous Computing Environments (2003) (437)
- Stochastic Variational Video Prediction (2017) (437)
- Genome-wide Analyses Identify KIF5A as a Novel ALS Gene (2018) (414)
- Monitoring, Security, and Dynamic Configuration with the dynamicTAO Reflective ORB (2000) (403)
- The case for reflective middleware (2002) (400)
- Consistent and Durable Data Structures for Non-Volatile Byte-Addressable Memory (2011) (391)
- An infrastructure for context-awareness based on first order logic (2003) (369)
- Reasoning about Uncertain Contexts in Pervasive Computing Environments (2004) (365)
- Error recovery in asynchronous systems (1986) (239)
- Stateful Scalable Stream Processing at LinkedIn (2017) (225)
- Routing through the mist: privacy preserving communication in ubiquitous computing environments (2002) (212)
- MiddleWhere: A Middleware for Location Awareness in Ubiquitous Computing Applications (2004) (199)
- Designing and implementing Choices: an object-oriented system in C++ (1993) (199)
- Reflective Middleware: From Your Desk to Your Hand (2001) (198)
- Resource Provisioning Framework for MapReduce Jobs with Performance Goals (2011) (195)
- Towards Security and Privacy for Pervasive Computing (2002) (195)
- A fault-tolerant scheduling problem (1989) (189)
- Cerberus: a context-aware security scheme for smart spaces (2003) (186)
- Gaia: a middleware platform for active spaces (2002) (186)
- Open Cirrus: A Global Cloud Computing Testbed (2010) (180)
- Scaling Genetic Algorithms Using MapReduce (2009) (179)
- Gaia: enabling active spaces (2000) (176)
- Monitoring compliance of a software system with its high-level design models (1996) (176)
- R-Storm: Resource-Aware Scheduling in Storm (2015) (176)
- DARE: Adaptive Data Replication for Efficient Cluster Scheduling (2011) (169)
- A Parallel Implementation of K-Means Clustering on GPUs (2008) (157)
- Real-Time Video and Audio in the World Wide Web (1996) (157)
- Use of ontologies in a pervasive computing environment (2003) (152)
- Olympus: A High-Level Programming Model for Pervasive Computing Environments (2005) (144)
- 2K: a distributed operating system for dynamic heterogeneous environments (2000) (133)
- ConChat: A Context-Aware Chat Program (2002) (131)
- TicTac: Accelerating Distributed Deep Learning with Communication Scheduling (2018) (124)
- Access control for Active Spaces (2002) (124)
- Towards fault tolerance pervasive computing (2005) (119)
- A survey of peer-to-peer storage techniques for distributed file systems (2005) (118)
- Open Cirrus™ Cloud Computing Testbed: Federated Data Centers for Open Source Systems and Services Research (2009) (117)
- Choices (class hierarchical open interface for custom embedded systems) (1987) (114)
- Attack Directories, Not Caches: Side Channel Attacks in a Non-Inclusive World (2019) (112)
- Two Sides of a Coin: Optimizing the Schedule of MapReduce Jobs to Minimize Their Makespan and Improve Cluster Performance (2012) (108)
- Dependence management in component-based distributed systems (2000) (105)
- Context switch overheads for Linux on ARM platforms (2007) (104)
- Using graphics rendering contexts to enhance the real-time video coding for mobile cloud gaming (2011) (103)
- Advertising in a pervasive computing environment (2002) (103)
- Shared polygenic risk and causal inferences in amyotrophic lateral sclerosis (2019) (98)
- Analysis and prediction of unplanned intensive care unit readmission using recurrent neural networks with long short-term memory (2018) (95)
- World of Empowered IoT Users (2016) (93)
- NeuroChip, an updated version of the NeuroX genotyping platform to rapidly screen for variants associated with neurological diseases (2017) (92)
- Mobile Gaia: a middleware for ad-hoc pervasive computing (2005) (89)
- Choices, frameworks and refinement (1991) (88)
- Deadline-based workload management for MapReduce environments: Pieces of the performance puzzle (2012) (83)
- Building Applications for Ubiquitous Computing Environments (2002) (83)
- Dynamic Resource Management and Automatic Configuration of Distributed Component Systems (2001) (82)
- Play It Again, SimMR! (2011) (80)
- IRBAC 2000: Secure Interoperability Using Dynamic Role Translation (2000) (80)
- CuriOS: Improving Reliability through Operating System Structure (2008) (79)
- Security enhanced MPEG player (1996) (78)
- A flexible, privacy-preserving authentication framework for ubiquitous computing environments (2002) (76)
- Quarterware for middleware (1998) (74)
- The Design of a Multiprocessor Operating System (1987) (73)
- Autonomic pervasive computing based on planning (2004) (72)
- A lightweight reconfigurable security mechanism for 3G/4G mobile devices (2001) (71)
- Breaking the MapReduce stage barrier (2010) (71)
- Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan (2013) (70)
- Ontologies in a Pervasive Computing Environment (2003) (65)
- A Middleware-Based Application Framework for Active Space Applications (2003) (65)
- A storage-centric analysis of MapReduce workloads: File popularity, temporal locality and arrival patterns (2012) (65)
- Fast Generation for Convolutional Autoregressive Models (2017) (62)
- Reflective ORBs: Supporting Robust, Time-Critical Distribution (1997) (61)
- Gaia: A Development Infrastructure for Active Spaces (2001) (61)
- Towards a pervasive computing benchmark (2005) (60)
- Architecture-oriented visualization (1996) (59)
- Design and implementation of runtime reflection in communication middleware: the dynamicTAO case (1999) (59)
- An ECA-P policy-based framework for managing ubiquitous computing environments (2005) (59)
- SIMULATIONS OF A FAULT-TOLERANT DEADLINE MECHANISM. (1979) (58)
- Understanding and Simulating the IEC 61850 Standard (2008) (58)
- An application of a context-aware file system (2003) (57)
- KNOW Why your access was denied: regulating feedback for usable security (2004) (57)
- Atomic actions for fault-tolerance using CSP (1986) (56)
- Supporting Automatic Configuration of Component-Based Distributed Systems (1999) (56)
- 2K: A Reflective, Component-Based Operating System for Rapidly Changing Environments (1998) (56)
- MITHRA: Multiple data independent tasks on a heterogeneous resource architecture (2009) (55)
- LegORB and Ubiquitous CORBA (2000) (54)
- Cloaker: Hardware Supported Rootkit Concealment (2008) (54)
- GaiaOS: An Infrastructure for Active Spaces (2001) (53)
- Build your world and play in it: Interacting with surface particles on complex objects (2010) (53)
- A real-time remote rendering system for interactive mobile graphics (2012) (50)
- Seraphim: dynamic interoperable security architecture for active networks (2000) (48)
- iKernel: Isolating Buggy and Malicious Device Drivers Using Hardware Virtualization Support (2007) (47)
- Automatic configuration of component-based distributed systems (2000) (47)
- Secure smart homes using Jini and UIUC SESAME (2000) (46)
- /spl mu/Choices: an object-oriented multimedia operating system (1995) (46)
- Lightning: self-adaptive, energy-conserving, multi-zoned, commodity green cloud storage system (2010) (45)
- Mobile polymorphic applications in ubiquitous computing environments (2004) (44)
- HAL: Computer System for Scalable Deep Learning (2020) (44)
- APPLICATION MOBILITY IN ACTIVE SPACES (2002) (43)
- Application polymorphism for autonomic ubiquitous computing (2005) (43)
- Failure scenario as a service (FSaaS) for Hadoop clusters (2012) (42)
- A survey and comparison of end-system overlay multicast solutions suitable for network-centric warfare (2004) (42)
- Building a Self-Healing Operating System (2007) (41)
- Real-time remote rendering of 3D video for mobile devices (2009) (41)
- A context-aware data management system for ubiquitous computing applications (2003) (41)
- Automated and Adaptive Threshold Setting: Enabling Technology for Autonomy and Self-Management (2005) (40)
- A technique for documenting the framework of an object-oriented system (1992) (39)
- Choices: a parallel object-oriented operating system (1993) (38)
- Internet protocol traffic analysis with applications for ATM switch design (1993) (37)
- Provably Correct Pervasive Computing Environments (2008) (37)
- Developing a new digital forensics curriculum (2014) (37)
- Multiple design patterns for voice over IP (VoIP) security (2006) (36)
- The SAGA project: A system for software development (1984) (36)
- NoiseOut: A Simple Way to Prune Neural Networks (2016) (36)
- Using dynamic configuration to manage a scalable multimedia distribution system (2001) (35)
- PLEASE: Executable specifications for incremental software development (1989) (35)
- Path expressions : a technique for specifying process synchronization (1976) (35)
- Scalable optoelectronic ATM networks: the iPOINT fully functional testbed (1995) (35)
- Particle Dynamics (2011) (35)
- Dynamic application composition: customizing the behavior of an active space (2003) (35)
- BootJacker: compromising computers using forced restarts (2008) (34)
- Forenscope: a framework for live forensics (2010) (34)
- A Class Hierarchy for Building Stream-Oriented File Systems (1989) (33)
- Path Expressions in Pascal (1979) (33)
- Context and location-aware encryption for pervasive computing environments (2006) (33)
- Automatic security assessment of critical cyber-infrastructures (2008) (33)
- Real-time 3D video compression for tele-immersive environments (2006) (33)
- Integrating PDAs into Distributed Systems: 2K and PalmORB (1999) (33)
- A User-Centric, Resource-Aware, Context-Sensitive, Multi-Device Application Framework for Ubiquitous Computing Environments (2002) (33)
- Ambry: LinkedIn's Scalable Geo-Distributed Object Store (2016) (31)
- Object-oriented state machines: subclassing, composition, delegation, and genericity (1995) (31)
- Super spaces: a middleware for large-scale pervasive computing environments (2004) (30)
- Internet search engine freshness by Web server help (2001) (30)
- Gaia microserver: an extendable mobile middleware platform (2005) (30)
- A Policy-based Management Framework for Pervasive Systems using Axiomatized Rule-Actions (2005) (30)
- Zorro: zero-cost reactive failure recovery in distributed graph processing (2015) (29)
- Maintained and constructor attributes (1985) (29)
- Design, implementation, and performance of an automatic configuration service for distributed component systems (2005) (29)
- Fast dynamic process migration (1996) (29)
- Scaling eCGA model building via data-intensive computing (2010) (28)
- Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality (2017) (28)
- C++ and Operating Systems Performance: A Case Study (1990) (28)
- Dynamic access control: preserving safety and trust for network defense operations (2003) (27)
- Association of Variants in the SPTLC1 Gene With Juvenile Amyotrophic Lateral Sclerosis (2021) (27)
- ADP: automated diagnosis of performance pathologies using hardware events (2012) (27)
- The case for reflective middleware: building middleware that is flexible, reconfigurable, and yet simple to use (2002) (26)
- A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures (2004) (26)
- Particle Methods (2011) (25)
- Mediators: A Synchronization Mechanism (1986) (25)
- Metadata Traces and Workload Models for Evaluating Big Storage Systems (2012) (25)
- Denial-of-Service Threat to Hadoop/YARN Clusters with Multi-tenancy (2014) (25)
- A task execution framework for autonomic ubiquitous computing (2005) (24)
- Cloud Computing for the Power Grid: From Service Composition to Assured Clouds (2013) (24)
- Dynamic Agent-Based Security Architecture For Mobile Computers (1998) (24)
- An object-oriented model of software configuration management (1991) (24)
- Principles of Object-Oriented Operating System Design (1989) (23)
- What is the complexity of a distributed computing system? (2007) (23)
- Wearable security services (2001) (23)
- Atomic Actions in Concurrent Systems (1986) (22)
- Media Streaming Protocol: an adaptive protocol for the delivery of audio and video over the Internet (1999) (22)
- Automating the software development process (1988) (22)
- Supporting Dynamically Changing Authorizations in Pervasive Communication Systems (2005) (22)
- Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut (2005) (22)
- Path PASCAL user manual (1980) (22)
- Real-time parallel remote rendering for mobile devices using graphics processing units (2010) (22)
- Process management and exception handling in multiprocessor operating systems using object-oriented design techniques (1988) (22)
- FAULT TOLERANCE USING COMMUNICATING SEQUENTIAL PROCESSES. (1984) (21)
- Virtual memory and backing storage management in multiprocessor operating systems using object-oriented design techniques (1989) (21)
- Predicting onset, progression, and clinical subtypes of Parkinson disease using machine learning (2018) (21)
- When Huge Is Routine: Scaling Genetic Algorithms and Estimation of Distribution Algorithms via Data-Intensive Computing (2010) (20)
- An overview of path Pascal's design (1980) (20)
- Routing through the Mist : Design and Implementation (2002) (20)
- Multi-modality machine learning predicting Parkinson’s disease (2021) (19)
- A high-quality low-delay remote rendering system for 3D video (2010) (19)
- An agent based architecture for supporting application level security (2000) (19)
- Threat analysis of GNU software radio (2005) (19)
- Addenda and corrigenda (1977) (19)
- Introduction to special section on formal methods in pervasive computing (2012) (19)
- Design and performance of MPEG video streaming to palmtop computers (1999) (19)
- Experiences building an object-oriented system in C++ (1991) (19)
- Detecting Cyber Attacks On Nuclear Power Plants (2008) (18)
- Secure Dynamic Reconfiguration of Scalable CORBA Systems with Mobile Agents (2000) (18)
- Profiling and evaluating hardware choices for MapReduce environments: An application-aware approach (2014) (18)
- Parallel Ocean Program (POP) (2011) (18)
- A Middleware for Enabling Personal Ubiquitous Spaces (2004) (18)
- Generating request streams on Big Data using clustered renewal processes (2013) (18)
- Cloud Standards in Comparison: Are New Security Frameworks Improving Cloud Security? (2017) (18)
- A middleware for assured clouds (2012) (18)
- Communication Scheduling as a First-Class Citizen in Distributed Machine Learning Systems (2018) (17)
- Exploring Recovery from Operating System Lockups (2007) (17)
- Distributed security policy conformance (2011) (17)
- Supporting On-demand Elasticity in Distributed Graph Processing (2016) (17)
- Developing dynamic security policies (2002) (17)
- Using Generalized Query Tree to Cope with the Capture Effect in RFID Singulation (2009) (17)
- Ordering management actions in pervasive systems using specification-enhanced policies (2006) (16)
- Pulsa: non-blocking packet switching with shift-register rings (1990) (16)
- Evidence of log integrity in policy-based security monitoring (2012) (16)
- Budget constrained optimal security hardening of control networks for critical cyber-infrastructures (2009) (16)
- Decentralized User-Centric Access Control using PubSub over Blockchain (2017) (16)
- CryptVMI: a flexible and encrypted virtual machine introspection system in the cloud (2014) (16)
- A C++ Class Hierarchy for Building UNIX-like File Systems (1988) (16)
- Practical Fault Tolerant Software for Asynchronous Systems (1983) (16)
- SLO-driven right-sizing and resource provisioning of MapReduce jobs (2011) (16)
- A description of path expressions by Petri nets (1975) (15)
- A Detailed Description of Off++, a Distributed Adaptable Microkernel (1997) (15)
- Improving dependability by revisiting operating system design (2007) (15)
- APPLICATION OF THE FAULT-TOLERANT DEADLINE MECHANISM TO A SATELLITE ON-BOARD COMPUTER SYSTEM. (1980) (15)
- Towards SDN enabled network control delegation in clouds (2013) (15)
- Specifying concurrent systems with Δ-grammars (1989) (15)
- Considerations of Persistence and Security in Choices, an Object-Oriented Operating System (1990) (15)
- Phurti: Application and Network-Aware Flow Scheduling for Multi-tenant MapReduce Clusters (2016) (15)
- Design Considerations for Shared Memory Multiprocessor Message Systems (1992) (15)
- Going by the numbers : Learning and modeling COVID-19 disease dynamics (2020) (15)
- 4CeeD: Real-Time Data Acquisition and Analysis Framework for Material-Related Cyber-Physical Environments (2017) (15)
- Supporting Adaptive Application Mobility (2007) (15)
- Security Architecture in Gaia (2001) (15)
- Expanding education through active space collaboration (2004) (15)
- Active security support for active networks (2003) (15)
- IT Security and Privacy Standards in Comparison: Improving FedRAMP Authorization for Cloud Service Providers (2017) (14)
- PLEASE: A LANGUAGE FOR INCREMENTAL SOFTWARE DEVELOPMENT. (1987) (14)
- Exception Handling in the Choices Operating System (2006) (14)
- CRONets: Cloud-Routed Overlay Networks (2016) (14)
- Specification-Enhanced Policies for Automated Management of Changes in IT Systems (2006) (14)
- Distortion over latency: Novel metric for measuring interactive performance in remote rendering systems (2011) (13)
- Securing the node of an active network (2001) (13)
- Fine-grained, dynamic user customization of operating systems (1996) (13)
- A Map-Reduce Based Framework for Heterogeneous Processing Element Cluster Environments (2012) (13)
- SAGA: a system to automate the management of software production (1981) (13)
- Getting the most for your Megabit (1991) (12)
- ENCOMPASS: An environment for the incremental development of software (1989) (12)
- Inter-flow consistency: A novel SDN update abstraction for supporting inter-flow constraints (2015) (12)
- Characterizing Data Structures for Volatile Forensics (2011) (12)
- The iPOINT testbed for optoelectronic ATM networking (1993) (12)
- A statistical study on the impact of wireless signals' behavior on location estimation accuracy in 802.11 fingerprinting systems (2009) (12)
- Multi-aspect security configuration assessment (2009) (12)
- Composite Messages: a Structural Pattern for Communication between Components (1995) (12)
- Cross-Layer Quality Assessment of Scalable Video Services on Mobile Embedded Systems (2010) (11)
- Process Management and Exception Handling in Multiprocessor Operating Systems (1988) (11)
- What is the complexity of a distributed computing system?: Research Articles (2007) (11)
- Supporting the Software Development Process with Attributed NLC Graph Grammars (1986) (11)
- NetODESSA: Dynamic Policy Enforcement in Cloud Networks (2011) (11)
- A Model for Ubiquitous Applications (2001) (11)
- Detecting Attacks in Power Plant Interfacing Substations through Probabilistic Validation of Attack-Effect Bindings (2008) (11)
- System Support for Rapid Ubiquitous Computing Application Development and Evaluation (2003) (11)
- An early report on ENCOMPASS (1988) (11)
- The SAGA Approach to Automated Project Management (1986) (10)
- A fast degradation-free algorithm for DCT block extraction in the compressed domain (1999) (10)
- Scheduling, Isolation, and Cache Allocation: A Side-Channel Defense (2018) (10)
- Design conformance management of software systems: An architecture-oriented approach (1996) (10)
- PLEASE:Predictable Logic based ExecutAble SpeCifications (1986) (10)
- Mobile Learning Communities - Are We There Yet? (2010) (10)
- Formal semantics of a class of high-level primitives for coordinating concurrent processes (1975) (10)
- Tree-oriented interactive processng with an application to theorem-proving (1985) (10)
- A Simple yet Effective Method to Prune Dense Layers of Neural Networks (2017) (10)
- What is the Complexity of a Distributed System (2005) (10)
- Inter-Flow Consistency: Novel SDN Update Abstraction for Supporting Inter-Flow Constraints (2015) (10)
- Design, implementation, and performance of an automatic configuration service for distributed component systems: Research Articles (2005) (10)
- Automated Assessment Of Compliance With Security Best Practices (2008) (9)
- An Architecture for Tool Integration (1986) (9)
- The A-IRBAC 2000 Model: Administrative Interoperable Role-Based Access Control (2000) (9)
- ENCOMPASS: A SAGA BASED ENVIRONMENT FOR THE COMPOSITION OF PROGRAMS AND SPECIFICATIONS. (1986) (9)
- Supporting Tasks in a Programmable Smart Home (2005) (9)
- Clicky: User-centric Input for Active Spaces (2004) (9)
- The design and implementation of a context-aware file system for ubiquitous computing applications (2003) (9)
- Unified Object Bus: Providing Support for Dynamic Management of Heterogeneous Components (2001) (9)
- Using interpreted CompositeCalls to improve operating system services (2000) (9)
- Modeling Dynamic Adaptation of Distributed Systems (2000) (8)
- STRICT: a design language for strongly typed recursive integrated circuits (1985) (8)
- A Framework for Volatile Memory Forensics (8)
- Multi-organization Policy-Based Monitoring (2012) (8)
- A Novel Scheduling Framework Leveraging Hardware Cache Partitioning for Cache-Side-Channel Elimination in Clouds (2017) (8)
- Active Capability: a Uniied Security Model for Supporting Mobile, Dynamic and Application Speciic Delegation White Paper (1996) (8)
- A Case Study-based Cybersecurity Ethics Curriculum (2018) (8)
- Cloud security certifications: a comparison to improve cloud service provider security (2017) (8)
- Attack-resilient compliance monitoring for large distributed infrastructure systems (2011) (7)
- Techniques for global optimization of message passing communication on unreliable networks (1995) (7)
- Ushio: Analyzing News Media and Public Trends in Twitter (2015) (7)
- A framework for live forensics (2011) (7)
- Resource exchanger: a behavioral pattern for low-overhead concurrent resource management (1996) (7)
- GenoML: Automated Machine Learning for Genomics (2021) (7)
- Mobile Computing, Security and Delegation (1994) (7)
- View-dependent real-time 3d video compression for mobile devices (2008) (7)
- Incorporating “ Semantic Discovery ” into a Ubiquitous Computing Infrastructure (2003) (7)
- PIC: Partitioned Iterative Convergence for Clusters (2012) (7)
- Beyond Global Communications: The Active World (2005) (7)
- Security as services in active networks (2002) (7)
- Investigations of semantic interoperability in ubiquitous computing environments (2003) (7)
- Building a Dynamic Interoperable Security Architecture for Active Networks (2002) (7)
- Management of environments in 2K (2000) (7)
- Encompass: an environment for incremental software development using executable, logic-based specifications (1987) (7)
- Control Software for Virtual-Circuit Switches: Call Processing (1992) (7)
- PLUGGABLE ACTIVE SECURITY FOR ACTIVE NETWORKS (2004) (7)
- Practical applications of path pascal in systems programming (1979) (7)
- Synergy: A Middleware for Energy Conservation in Mobile Devices (2012) (7)
- Identifying and predicting amyotrophic lateral sclerosis clinical subgroups: a population-based machine-learning study. (2022) (7)
- Uniform Co-Scheduling Using Object-Oriented Design Techniques (1993) (6)
- Porting Choices to ARM Architecture Based Platforms (2007) (6)
- Seraphim: An Active Security Architecture for Active Networks (1999) (6)
- Metadata Workloads for Testing Big Storage Systems (2012) (6)
- Dynamic Reconfiguration of Scalable Internet Systems with Mobile Agents (1999) (6)
- A Managerial Approach to Advertising Measurement (1965) (6)
- Supporting Dynamic Reconfiguration in the dynamicTAO Reflective ORB (1999) (6)
- Dynamic Authorization Support in Large Distributed Systems (1999) (6)
- Policy-based pervasive systems management using specification-enhanced rules (2006) (6)
- M-TEEVE: real-time 3D video interaction and broadcasting framework for mobile devices (2009) (6)
- Choices, frameworks and refinement revisited (1992) (6)
- RECIPE: Requirements for an evolutionary computer-based information processing environment (1984) (6)
- Gaia mobility: extending active space boundaries to everyday devices (2004) (6)
- Automatic Configuration in the 2K Operating System (1999) (6)
- CryptVMI: Encrypted Virtual Machine Introspection in the Cloud (2014) (6)
- Storage-efficient data replica number computation for multi-level priority data in distributed storage systems (2013) (6)
- Automated Fingerprinting of Performance Pathologies Using Performance Monitoring Units ( PMUs ) (2011) (6)
- NETWORKING A LARGE NUMBER OF WORKSTATIONS USING UNIX UNITED. (1985) (6)
- Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall (2007) (5)
- Parallel Distributed Application Performance and Message Passing: A case study (1993) (5)
- VMDedup: Memory De-duplication in Hypervisor (2014) (5)
- Communication compilation for unreliable networks (1996) (5)
- Toward Scalable Machine Learning and Data Mining: the Bioinformatics Case (2017) (5)
- Development and Dissemination of a New Multidisciplinary Undergraduate Curriculum in Digital Forensics (2014) (5)
- Video and Audio: Organization and Retrieval in the WWW (1996) (5)
- ENCOMPASS (abstract): a SAGA based environment for the composition of programs and specifications (1986) (5)
- Sh@re: Negotiated audit in social networks (2009) (5)
- A survey and comparison of peer-to-peer group communication systems suitable for network-centric warfare (2005) (5)
- Routing with confidence: supporting discretionary routing requirements in policy based networks (2004) (5)
- An Adaptive Data Object Service for Pervasive Computing Environments (2001) (5)
- Learning the progression and clinical subtypes of Alzheimer's disease from longitudinal clinical data (2018) (5)
- Performance Modeling of Distributed Deep Neural Networks (2016) (5)
- Using deception to facilitate intrusion detection in nuclear power plants (2008) (5)
- Socializing in the Mist : Privacy in Digital Communities (4)
- Batching: A Design Pattern for Efficient and Flexible Client/Server Interaction (2009) (4)
- Managing pervasive systems using role-based obligation policies (2006) (4)
- The Professional Workstation Research Project (1986) (4)
- A Dynamic Priority-based Scheduling Method in Distributed Systems (1995) (4)
- Towards An Application Objective-Aware Network Interface (2020) (4)
- Distributed Access to Persistent Objects (1993) (4)
- Flexible Secure Multicasting in Active Networks (1999) (4)
- Choices, Frameworks and Renement 3 (1991) (4)
- Latest developments in operating systems (1996) (4)
- Theius: A Streaming Visualization Suite for Hadoop Clusters* (2013) (4)
- A security policy framework for eEnabled fleets and airports (2011) (4)
- A class Hierarchical, object-oriented approach to virtual memory management (1988) (4)
- Implementing Language Support in High-Level Languages (1984) (4)
- BRACELET: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments (2019) (4)
- Confidentiality of event data in policy-based monitoring (2012) (4)
- Semantic Discovery for Ubiquitous Computing (4)
- Parallel I/O Library (PIO) (2011) (4)
- Applying active space principles to active classrooms (2005) (4)
- Modeling insecurity: policy engineering for survivability (2003) (3)
- Reusable data flow diagrams (1992) (3)
- Self-Optimization of Task Execution in Pervasive Computing Environments (2005) (3)
- Routing with Confidence: A Model for Trustworthy Communication (2006) (3)
- An empirical study on the software integrity of virtual appliances: are you really getting what you paid for? (2013) (3)
- Redesigning Data Structures for Non-Volatile Byte-Addressable Memory (2010) (3)
- Detecting and Mitigating Denial-of-Service Attacks on Voice over IP Networks (2008) (3)
- Framework Design for End-to-End Optimization (1998) (3)
- Predicting Alzheimer’s disease progression trajectory and clinical subtypes using machine learning (2019) (3)
- Extending OMG Event Service for Integrating Distributed Multimedia Components (1997) (3)
- On the Role of Inter-Component Dependence in Supporting Automatic Reconfiguration (1998) (3)
- No Solution@@@Measuring the Sales and Profit Results of Advertising: A Managerial Approach (1972) (3)
- Definition of a User Environment in a Ubiquitous System (2003) (3)
- The Delay/Re-Read Protocol for concurrency control in databases (1984) (3)
- The Role of Users and Devices in Ubiquitous Data Access (2001) (3)
- Secure Information Flow in Mobile Bootstrapping Process (1999) (3)
- Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware (2007) (3)
- Automatic security assessment of control systems for critical cyber-infrastructures (2008) (3)
- A Multiprocessor Operating System Simulator (1988) (3)
- A Case for Nano-Kernels (1995) (3)
- Context switch overheads on mobile device platforms (2007) (3)
- Scalable Storage for Data-Intensive Computing (2011) (3)
- SAGA: A project to automate the management of software production systems (1985) (3)
- Designing and prototyping in GRADS (1988) (3)
- Distributed RFID Tag Storage Infrastructures Technical Report May 11 , 2009 (2009) (3)
- A Formal Security Model for Networked Control Systems (2009) (3)
- Classifying COVID-19 variants based on genetic sequences using deep learning models (2021) (3)
- An Architecture for Improving Web Search Engine Freshness (2000) (2)
- An integrated architecture for open distributed multimedia computing (1996) (2)
- Security Challenges of Reconfigurable Devices in the Power Grid (2007) (2)
- Scalable distribution of data across autonomous systems (2001) (2)
- tensorflow-tracing: A Performance Tuning Framework for Production (2019) (2)
- Parallel Random Access Machines (PRAM) (2011) (2)
- Identification and prediction of Parkinson’s disease subtypes and progression using machine learning in two cohorts (2022) (2)
- Caramel: Accelerating Decentralized Distributed Deep Learning with Computation Scheduling (2020) (2)
- Assured Cloud Computing (2018) (2)
- Fast Neural Network Training on General Purpose Computers (2011) (2)
- Recovering from Operating System Errors (2007) (2)
- Off++: The Network in a Box (2007) (2)
- 2K: A Dynamic, Component-Based Operating System for Rapidly Changing Environments (1998) (2)
- An Adaptable Distributed File Service (2000) (2)
- Compiling knowledge-based programs (1995) (2)
- Support for Mobility in Active Spaces † (2001) (2)
- ILLINET: a 32 Mbits/sec. local-area network (1981) (2)
- Reliable sender-initiated multicast for improved QoS (2000) (2)
- CouchFS: A High-Performance File System for Large Data Sets (2014) (2)
- A survey and comparison of distributed systems for group communications suitable for network-centric warfare (2006) (2)
- Object Orientation in Off++ A distributed adaptable Kernel (1999) (2)
- Plasma: Shared Memory Dynamic Allocation and Bank-Conflict-Free Access in GPUs (2012) (2)
- Consistent Multi-Cloud {AI} Lifecycle Management with Kubeflow (2019) (2)
- Reliable Multicast of bulk data: congestion, fairness and freshness issues (1999) (2)
- Toward Fabric: A middleware implementing high-level description languages on a Fabric-like network? (2016) (2)
- Operational Security Requirements for Large Collaborative Compute Infrastructures (2006) (2)
- A fast, flexible network interface framework (1996) (2)
- Active Interaction: Live Remote Interaction through Video Feeds (2005) (2)
- BRACELET: Hierarchical Edge-Cloud Microservice Infrastructure for Scientific Instruments’ Lifetime Connectivity (2018) (2)
- A low-latency scalable locking algorithm for shared memory multiprocessors (1994) (2)
- A Privacy Preserving Overlay for Active Spaces (2004) (1)
- Object-Oriented in Off++ - A Distributed Adaptable Microkernel (1999) (1)
- A Hypervisor for Embedded Computing (2007) (1)
- Unlinkability through Access Control: Respecting User-Privacy in Distributed Systems (2005) (1)
- Error recovery in assynchronous system (1986) (1)
- Cross-layer Quality Assessment of Wireless Video Transmission over Mobile Broadcast Networks (2009) (1)
- Multimedia network subsystem design (1999) (1)
- Limiting Data Exposure in Monitoring Multi-domain Policy Conformance (2013) (1)
- 2 K : A Distributed Operating Systemfor Dynami Heterogeneous Environments (1999) (1)
- Formal design of communication checkers for ICCP using UPPAAL (2013) (1)
- Dynamic, distributed, secure multicast in active networks (2000) (1)
- GREEN : A Practical Solution for Ensuring Fairness in a Best-Effort Network � (1)
- Customizable Object-Oriented Operating Systems (2007) (1)
- Efficient Signaling Algorithms for ATM Networks (1995) (1)
- Secure configuration for software defined radio (2008) (1)
- A Distributed Object-Oriented Application Framework for Ubiquitous Computing Environments (2002) (1)
- Tools and Methods for Hardening Communication Security of Energy Delivery Systems (2014) (1)
- Towards An Intent-Aware Network Interface for Cloud Applications (2019) (1)
- An automatic user study demo in indoor environments and its privacy implications (2009) (1)
- Utilizing Automated Robots to Recalibrate WiFi Fingerprint Maps for Indoor Location Estimation (2012) (1)
- An approach to operating system testing (1986) (1)
- Distributed Shared Memory on Loosely Coupled Systems (1996) (1)
- Robustness of Compliance to Infrastructure Security Policies (2011) (1)
- Scalability, Workloads, and Performance: Replication, Popularity, Modeling, and Geo-Distributed File Stores (2018) (1)
- A software architecture for user environments in ubiquitous systems (2005) (1)
- An implementation-independent threat model for group communications (2006) (1)
- The Design and Implementation of the Off++ and vOff++ Microkernels (1999) (1)
- Local Real-time Neural Networks-Based Learning for Tracking in an RFID Tag Field (2011) (1)
- A Model-Based Namespace Metadata Benchmark for HDFS (2014) (1)
- An integrated modular environment for SAGA (1986) (1)
- CLEMMA: the design of a practical configuration librarian (1988) (1)
- Towards a Grand Unified Framework for Mobile Objects (1998) (1)
- Detachable inspector/removable cout: a structural pattern for designing transparent layered services (1996) (1)
- Smart Home : A peek in the future (1)
- Simulation Framework and Performance Analysis of Multimedia Broadcasting Service over Wireless Networks (2009) (1)
- Clicky: Input in Pervasive Systems (2006) (1)
- 3D Audio Interface for Rich Mobile Web Experiences (2010) (1)
- Program Graphs (2011) (1)
- A case for validating remote application integrity for data processing systems (2012) (1)
- Guest Editors' Introduction: Special Issue on Management of Cloud Services (2014) (1)
- PFR DESIGN AND CONSTRUCTION: A PROGRESS STATEMENT. (1970) (1)
- Path Expressions (2011) (1)
- Object-Oriented State Machines: Subclassing, Composition, Delegation and Genericity (1995) (1)
- Genome-wide Analyses Id entify KIF 5 A as a Novel ALS Gene Highlights (2018) (0)
- A Metadata Workload Generator for Data-Intensive File Systems (2012) (0)
- 2nd International Conference on Big Data Analytics and Data Mining (2020) (0)
- A Cover Page Title: an Agent-based Architecture for Supporting Application Aware Security Administrative Point of Contact: Prototype of the Proposed Architecture Experiment Result from Its Application to Mobile Collaborative Environments in Fy97 Total Cost $562,446 (1997) (0)
- A first step towards call survivability in cellular networks (2005) (0)
- New America Cybersecurity Fellowship (2018) (0)
- Latest Developments in Operating Systems (Introduction to the Special Section). (1996) (0)
- Building a reliable operating system (2008) (0)
- Multimedia support in network protocol processing subsystems (1999) (0)
- Reication and Re Blockinection in C++: an Operating Systems Perspective (1992) (0)
- PerSys 2008 PC Co-chairs' Message (2008) (0)
- Proceedings of the 2019 USENIX Conference on Operational Machine Learning (2019) (0)
- Proceedings of the ACM/IFIP/USENIX 2007 International Conference on Middleware (2007) (0)
- Using OS Design Patterns to Provide Reliability and Security as-a-Service for VM-based Clouds (2017) (0)
- Context Switch Overheads on Mobile Device Platforms [ Context Switch Measurement Challenge ] (2007) (0)
- Security and Survivability: Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems (2008) (0)
- Special Thanks to IC's Reviewers (2003) (0)
- The Mist System ’ s Design Report (0)
- Resource Management: Performance Assuredness in Distributed Cloud Computing via Online Reconfigurations (2018) (0)
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics: Preface (2007) (0)
- Modeling insecurity: enabling recovery-oriented security with dynamic policies (2004) (0)
- The embedded operating system project (1984) (0)
- Large-scale reliable multicast of small messages (2001) (0)
- CadentFlow : An Application-Driven Network Abstraction for the Cloud (2018) (0)
- Trustworthy Services Built on Event-Based Probing for Layered Defense (2017) (0)
- Design and Performan e of MPEG Video Streamingto Palmtop (2000) (0)
- The design of an object-oriented operating system: a case study of choices (abstract) (1992) (0)
- Middleware 2007, ACM/IFIP/USENIX 8th International Middleware Conference, Newport Beach, CA, USA, November 26-30, 2007, Proceedings (2007) (0)
- TABLE OF CONTENTS MobiQuitous 2005 (2005) (0)
- itecture for Open (1996) (0)
- On The Importance of Execution Ordering in Graph-Based Distributed Machine Learning Systems (2018) (0)
- Parallel Prefix Algorithms (2011) (0)
- PERWARE 2011: 8th IEEE international workshop on middleware and system support for pervasive computing - Committees and welcome (2011) (0)
- Support for Mobile Augmented and Synthesized Worlds (2007) (0)
- S Tochastic V Ariational V Ideo P Rediction (2018) (0)
- Identification and prediction of ALS subgroups using machine learning (2021) (0)
- ENCOMPASS: A SAGA based environment for the compositon of programs and specifications, appendix A (1985) (0)
- Middleware support for pervasive computing workshop (PerWare 2008): Message from the workshop co-organizers (2008) (0)
- The design of an object-oriented operating system (abstract): a case study of choices (1992) (0)
- Keck Mid-IR Imaging of Luminous Infrared Galaxies: Starbursts & AGN (1997) (0)
- Where did my 256 GB go? A Measurement Analysis of Storage Consumption on Smart Mobile Devices (2021) (0)
- PP-11, A PATH PASCAL LANGUAGE SYSTEM FOR THE PDP-11. (2017) (0)
- C 2015 Fangzhou Yao Secure Framework for Virtualized Systems with Data Confidentiality Protection (2015) (0)
- Multi-modality machine learning predicting Parkinson’s disease (2022) (0)
- Ubiquitous Application Model (2001) (0)
- An Interprocess Communications Design for Migrating Objects (2007) (0)
- Compiling Knowledge-Based Programs (Abstract). (1995) (0)
- Dynamic application composition (2003) (0)
- T IC T AC : A CCELERATING D ISTRIBUTED D EEP L EARNING WITH C OMMUNICATION S CHEDULING A BSTRACT (2019) (0)
- Back in a Flash !-Fast Recovery using Non-Volatile Memory (2007) (0)
- PerSys 2006 PC Co-chairs' Message (2006) (0)
- Secure Reincarnation of Compromised Servers Using Xen Based Time-Forking Virtual Machines (2007) (0)
- Reducing Bandwidth and Disk Space Requirement for Filesystems In Mobile Computing (1999) (0)
- Workshop on middleware support for pervasive computing (PerWare '05): Message from the workshop Co-Chairs (2005) (0)
- Tree-oriented interactive processing with an application to theorem-proving, appendix E (1985) (0)
- The Pulsar Project for Very High Speed Computer Networking (2007) (0)
- Session management for accountability in distributed multimedia services (2009) (0)
- A Framework for Execution Environments in 2K (2000) (0)
- 2k : a Reeective, Component-based Operating System for Rapidly Changing Environments Supporting Adaptation (2007) (0)
- Identifying New COVID-19 Variants from Spike Proteins Using Novelty Detection (2022) (0)
- Desien Considerations for Shared (1992) (0)
- An activity-based framework for automated placement and configuration of multiple stereo cameras (2010) (0)
- Denying DDOS Attacks : A Case for Collective Bandwidth Agreements (2002) (0)
- guration of S alable CORBASystems with Mobile Agents ? (2007) (0)
- Tiny SESAME on the HP Jornada (2001) (0)
- 7th IEEE International Workshop on Middleware Support for Pervasive Computing (PerWare 2010): Message from the workshop chairs (2010) (0)
- Implementation and Evaluation of an Architecture for Web Search Engine Freshness (0)
- Workshop report—flexibility in system software (1994) (0)
- Application of Aligned-UMAP to longitudinal biomedical studies (2022) (0)
- Assessing software integrity of virtual appliances through software whitelists (2013) (0)
- Password Streaming for RFID Privacy (2008) (0)
- A deep learning approach to identify seizure-prone and normal patients from their EEG records (2022) (0)
- Workshop report - flexibility in system software (1994) (0)
- The Third International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology DCDV 2013 (2013) (0)
- Where did my 256 GB go? A Measurement Analysis of Storage Consumption on Smart Mobile Devices (2021) (0)
- Pentium (1995) (0)
- Conchat: a Context- Aware Chat Program the Context Model (0)
- PMS: What are you getting for your money (1978) (0)
- Nickel: An Historical Survey. (1964) (0)
- Workshop Summary--ICSE Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments (SEPCASE) (2007) (0)
- Plethora: a framework for converting generic applications to run in a ubiquitous environment (2005) (0)
- Parallel Operating System (2011) (0)
- Analysis and Performance Evaluation of Large Data S ets Using Hadoop (2014) (0)
- Competitive Algorithms for Asynchronous Update Propogation in Mobile Computing and for Search Engine Freshness (2000) (0)
- Multi-Aspect Security Assessment of Airport Computer Networks (2010) (0)
- Keynote Speech: 2K: An OS for the New Millennium (1999) (0)
- Summary and Future Work (2018) (0)
- Market Analysis of International Conference on Midwifery and Women's Health (2019) (0)
- The measurement of advertising results (1969) (0)
- 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2012, Chapel Hill, NC, USA, July 16-18, 2012 (2012) (0)
- Message from the Workshop Co-Organizers (2009) (0)
- PerSys 2007 PC Co-chairs' Message (2007) (0)
- An integrated modular environment for SAGA. [Software Automation, Generation and Administration] (1985) (0)
- Support for Mobile Augmented and Synthesized Worlds December 17 , 2007 (2008) (0)
- AYERS OF N EURAL N ETWORKS (2016) (0)
- Place-Transition Nets (2011) (0)
- ARIA (2011) (0)
- EOS: A project to investigate the design and construction of real-time distributed Embedded Operating Systems (1986) (0)
- ASSURED CLOUD COMPUTING UNIVERSITY CENTER OFEXCELLENCE (ACC UCOE) (2018) (0)
- A middleware for assured clouds (2011) (0)
- Accurate Sequence Alignment using Distributed Filtering on GPU Clusters (2011) (0)
- Providing a Web Interface for Active Spaces (2003) (0)
- Guest Editors' Introduction: Reflective Middleware (2001) (0)
- Were Microkernels a Good Idea That Did Not Work? Cs423 Nal Exam { Prof. Roy H. Campbell (1996) (0)
- Common models , patterns and best practices for pervasive systems design , implementation and evaluation (2007) (0)
- A Middleware for Active Spaces (2002) (0)
- A Middleware to Reduce the Complexity of Developing Ubiquitous Computing Systems (2005) (0)
- A project to investigate mechanisms and methodologies for the design and construction of communicating concurrent processes in real-time environments (1979) (0)
- Editorial (2011) (0)
- A Framework for Dynamically Configurable Multimedia Distribution (1999) (0)
- Assured Cloud Computing: The Odessa Monitoring System (2011) (0)
- Event Detection Using Phenomenon Models (2009) (0)
- Real Time Video and Audio in the World Wide WebZhigang (1995) (0)
- Joint Sensor: Security Test and Evaluation Embedded in a Production Network Sensor Cloud (2010) (0)
- An Exception Model for Policy-based Management using Specification-enhanced Policies (2006) (0)
This paper list is powered by the following services:
Other Resources About Roy H. Campbell
What Schools Are Affiliated With Roy H. Campbell?
Roy H. Campbell is affiliated with the following schools: