Simon S. Lam
#40,674
Most Influential Person Now
American computer scientist
Simon S. Lam's AcademicInfluence.com Rankings
Simon S. Lamcomputer-science Degrees
Computer Science
#2331
World Rank
#2429
Historical Rank
#1039
USA Rank
Database
#3872
World Rank
#4028
Historical Rank
#662
USA Rank
Download Badge
Computer Science
Simon S. Lam's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Mathematics University of California, Berkeley
Similar Degrees You Can Earn
Why Is Simon S. Lam Influential?
(Suggest an Edit or Addition)According to Wikipedia, Simon S. Lam is an American computer scientist. He retired in 2018 from The University of Texas at Austin as Professor Emeritus and Regents' Chair Emeritus in Computer Science #1. He made seminal and important contributions to transport layer security, packet network verification, as well as network protocol design, verification, and performance analysis.
Simon S. Lam's Published Works
Published Works
- Secure group communications using key graphs (1998) (1093)
- Secure group communications using key graphs (2000) (1006)
- Packet Switching in a Multiaccess Broadcast Channel: Performance Evaluation (1975) (547)
- General AIMD congestion control (2000) (411)
- Digital signatures for flows and multicasts (1998) (405)
- A semantic model for authentication protocols (1993) (335)
- Batch rekeying for secure group communications (2001) (275)
- A Carrier Sense Multiple Access Protocol for Local Networks (1979) (250)
- Protocol Verification via Projections (1984) (240)
- Determining end-to-end delay bounds in heterogeneous networks (1995) (227)
- A lesson on authentication protocol design (1994) (182)
- Packet Switching in a Multiaccess Broadcast Channel: Dynamic Control Procedures (1975) (179)
- Reliable group rekeying: a performance analysis (2001) (174)
- Authentication for distributed systems (1997) (173)
- Authorizations in Distributed Systems: A New Approach (1993) (172)
- Transient behaviors of TCP-friendly congestion control protocols (2003) (171)
- Packet Broadcast Networks - A Performance Analysis of the R-ALOHA Protocol (1979) (161)
- An algorithm for lossless smoothing of MPEG video (1994) (152)
- Protocol Conversion (1988) (145)
- Queuing Networks with Population Size Constraints (1977) (136)
- Congestion Control of Store-and-Forward Networks by Input Buffer Limits - An Analysis (1979) (125)
- Packet-switching in a slotted satellite channel (1973) (124)
- Real-time verification of network properties using Atomic Predicates (2013) (120)
- Delay guarantee of virtual clock server (1995) (118)
- Delay Analysis of a Time Division Multiple Access (TDMA) Channel (1977) (117)
- S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks (2007) (109)
- Authorization in distributed systems: a formal approach (1992) (107)
- Protocol design for scalable and reliable group rekeying (2001) (103)
- Authentification for Distributed Systems (1992) (98)
- A tree convolution algorithm for the solution of queueing networks (1983) (93)
- Formal Methods for Protocol Conversion (1990) (85)
- Adaptive rate-controlled scheduling for multimedia applications (1997) (77)
- Store-and-Forward Buffer Requirements in a Packet Switching Network (1976) (72)
- Optimal partitioning of multicast receivers (2000) (72)
- A Relational Notation for State Transition Systems (1990) (69)
- Packet Switching In A Multi-Access Broadcast Channel With Application To Satellite Communication In A Computer Network (1974) (68)
- Designing a distributed authorization service (1998) (67)
- A Wavelet-Based Approach to Detect Shared Congestion (2008) (67)
- Geographic Routing in $d$-Dimensional Spaces With Guaranteed Delivery and Low Stretch (2011) (63)
- A discipline for constructing multiphase communication protocols (1985) (58)
- Multiple Access Protocols (1979) (56)
- Satellite Packet Communication - Multiple Access Protocols and Performance (1979) (56)
- Failure recovery for structured P2P networks: protocol design and performance evaluation (2004) (54)
- Optimal distribution tree for Internet streaming media (2003) (50)
- A wavelet-based approach to detect shared congestion (2004) (48)
- A Theory of Interfaces and Modules I-Composition Theorem (1994) (46)
- Adaptive rate-controlled scheduling for multimedia applications (1997) (46)
- Deriving a protocol converter: a top-down method (1989) (45)
- SmartTunnel: Achieving Reliability in the Internet (2007) (44)
- Burst scheduling: architecture and algorithm for switching packet video (1995) (44)
- Dynamic Scaling and Growth Behavior of Queuing Network Normalization Constants (1982) (44)
- An HDLC protocol specification and its verification using image protocols (1983) (43)
- Queueing network models of packet switching networks part 2: Networks with population size constraints (1982) (42)
- CYRF: a theory of window-based unicast congestion control (2002) (39)
- A framework for distributed authorization (1993) (38)
- S4: Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks (2010) (37)
- A lossless smoothing algorithm for compressed video (1996) (36)
- Verifying authentication protocols: methodology and example (1993) (35)
- Geographic routing in d-dimensional spaces with guaranteed delivery and low stretch (2013) (34)
- A stepwise refinement heuristic for protocol construction (1987) (32)
- Greedy Distance Vector Routing (2011) (30)
- Migrating sockets—end system support for networking with quality of service guarantees (1998) (29)
- Protocol Design for Dynamic Delaunay Triangulation (2007) (28)
- Efficient and accurate protocols for distributed delaunay triangulation under churn (2008) (28)
- Understanding Interfaces (1991) (28)
- Buffer Overflow in a Store-and-Forward Network Node (1976) (27)
- Queuing network models of packet switching networks part 1: Open networks (1982) (26)
- Group priority scheduling (1996) (26)
- SNP: An Interface for Secure Network Programming (1994) (26)
- Protocol conversion—correctness problems (1986) (25)
- Real-time block transfer under a link sharing hierarchy (1997) (24)
- Scalable Verification of Networks With Packet Transformers Using Atomic Predicates (2017) (24)
- Practical Network-Wide Packet Behavior Identification by AP Classifier (2017) (23)
- ROME: Routing on metropolitan-scale Ethernet (2012) (23)
- Neighbor table construction and update in a dynamic peer-to-peer network (2003) (22)
- Adaptors for protocol conversion (1990) (22)
- A Simple Derivation of the MVA and LBANC Algorithms from the Convolution Algorithm (1983) (22)
- Congestion Control of Packet Communication Networks by Input Buffer Limits—A Simulation Study (1981) (21)
- Internet Multicast Congestion Control: A Survey (2001) (19)
- Efficient Group Rekeying Using Application-Layer Multicast (2005) (19)
- Refinement and Projection of Relational Specifications (1990) (18)
- An exercise in deriving a protocol conversion (1987) (18)
- Correction to "Protocol Conversion" (1988) (17)
- Queueing Disciplines (2009) (17)
- A derivation of response time distributions for a multi-class feedback queueing systems (1981) (17)
- An exercise in constructing multi-phase communication protocols (1984) (17)
- Two Classes of Performance Bounds for Closed Queueing Networks (1987) (16)
- Scalable Clustering of Internet Paths by Shared Congestion (2006) (15)
- An Architecture towards Eecient Os Support for Distributed Multimedia (1996) (15)
- PAM-a noniterative approximate solution method for closed multichain queueing networks (1988) (15)
- Authorization in Distributed Systems: a New Approach 1 (1993) (15)
- Specifying modules to satisfy interfaces: A state transition system approach (1990) (14)
- On the Decidability of Livelock Detection in Networks of Communicating Finite State Machines (1984) (14)
- Modeling and analysis of flow controlled packet switching networks (1981) (13)
- An Extension of Moore's Result for Closed Queuing Networks (1977) (13)
- Eliminating Bottlenecks in Overlay Multicast (2005) (13)
- Group rekeying with limited unicast recovery (2003) (13)
- Time-dependent distributed systems: proving safety, liveness and real-time properties (1985) (13)
- Probabilistic region-based localization for wireless networks (2007) (12)
- Queueing network models of packet switching networks (1981) (12)
- Batch Updates of Key Trees (2000) (12)
- Failure recovery for structured p2p networks: Protocol design and performance under churn (2006) (12)
- PROSPEC: An Interactive Programming Environment for Designing and Verifying Communication Protocols (1988) (11)
- Greedy Routing by Network Distance Embedding (2016) (11)
- Burst Scheduling Networks (1997) (11)
- Time-Dependent Communication Protocols (1984) (11)
- On Time-Dependent Communication Protocols and Their Projections (1982) (11)
- Operating System Techniques for Distributed Multimedia (1996) (11)
- Two Problems of TCP AIMD Congestion Control (2000) (10)
- VERIFICATION OF COMMUNICATION PROTOCOLS VIA PROTOCOL PROJECTIONS. (1982) (10)
- Livelock Detection in Networks of Communicating Finite State Machines (1984) (10)
- Applying a theory of modules and interfaces to security verification (1991) (10)
- Construction of Network Protocols by Stepwise Refinement (1989) (10)
- SATELLITE MULTIACCESS SCHEMES FOR DATA TRAFFIC. (1977) (10)
- Burst Scheduling Networks: Flow Specification and Performance Guarantees (1995) (10)
- Design, verification and implementation of an authentication protocol (1994) (10)
- Migrating Sockets for networking with quality of service guarantees (1997) (10)
- Modeling and Verification of Real-Time Protocols for Broadcast Networks (1987) (9)
- Analysis of Binomial Congestion Control (2000) (9)
- Practical network-wide packet behavior identification by AP classifier (2015) (8)
- Architecture toward efficient OS support for distributed multimedia (1996) (8)
- 'Authentication' revisited (correction and addendum to 'Authentication' for distributed systems, Jan. 92, 39-52) (1992) (8)
- A Scalable and Resilient Layer-2 Network With Ethernet Compatibility (2016) (8)
- A Tree Convolution Algorithm for Queueing Networks (1981) (7)
- Modeling, analysis, and optimal routing of flow-controlled communication networks (1987) (7)
- Optimal routing in networks with flow-controlled virtual channels (1982) (7)
- Silk: A Resilient Routing Fabric for Peer-to-Peer Networks (2003) (7)
- Back to the future part 4: the internet (2004) (7)
- An Illustration of Protocol Projections (1982) (7)
- Genetic Algorithm with Pigeon-Hole Coding Scheme for Solving Sequencing Problems (1996) (7)
- HartFi: an energy-efficient localization system (2011) (7)
- A Secure Group Key Management Protocol Communication Lower Bound (2000) (7)
- Collaborative Verification of Forward and Reverse Reachability in the Internet Data Plane (2014) (7)
- PROTOCOL PROJECTIONS: A METHOD FOR ANALYZING COMMUNICATION PROTOCOLS. (1981) (6)
- An efficient adaptive search algorithm for scheduling real-time traffic (1996) (6)
- A Composition Theorem for Layered Systems (1991) (6)
- A Theory of Interfaces and Modules (1994) (6)
- Principles of communication and networking protocols : tutorial (1984) (6)
- On Constructing Multi-Phase Communication Protocols (1984) (5)
- Specification of Real-Time Broadcast Networks (1991) (5)
- SmartTunnel : A Multipath Approach to Achieving Reliability in the Internet (2006) (4)
- Geographic routing in d-dimensional spaces with guaranteed delivery and low stretch (2011) (4)
- An HDLC Protocol and Its Verification Using Image Protocols (1982) (4)
- Specification and Verification of Time-Dependant Communication Protocols (1984) (4)
- A Secure Group Key Management Communication Lower Bound (2000) (4)
- Keystone: A Group Key Management Service (2000) (4)
- Admission control and loss management for an application-level statistical service (1997) (4)
- Geographic Routing with Low Stretch in d-dimensional Spaces ∗ (2010) (3)
- Operating system support for distributed multimedia (1998) (3)
- A Packet Network Architecture for Local Interconnection (1980) (3)
- Consistency-preserving neighbor table optimization for P2P networks (2004) (3)
- A Study of the CSMA Protocol in Local Networks (1979) (3)
- An Analysis of the Tree Convolution Algorithm (1981) (3)
- End system support for networking with quality of service guarantees (1997) (3)
- Application of wavelet denoising to the detection of shared congestion in overlay multimedia networks (2004) (3)
- Response time distributions for a multi-class queue with feedback (1980) (2)
- Specification and verification of an HDLC protocol with arm connection management and full-duplex data transfer (1983) (2)
- An efficient network architecture motivated by application-level QoS (1997) (2)
- Internet Multicast Congestion Control : A Survey Y (2000) (2)
- A Radius Geocast Routing Protocol (2008) (2)
- Specification and verification of collusion-free broadcast networks (1988) (2)
- Efficient and Accurate Delaunay Triangulation Protocols under Churn ∗ (2007) (2)
- ON PROTOCOLS FOR SATELLITE PACKET SWITCHING. (2)
- Neighbor Table Construction and Update for Resilient Hypercube Routing in P 2 P Networks (2007) (2)
- Construction of Sliding Window Protocols (1986) (2)
- Specifying an Implementation to Satisfy Interface Specifications: A StateTransition Approach (1988) (1)
- INTERACTIVE VERIFICATION AND CONSTRUCTION OF COMMUNICATION PROTOCOLS IN PROSPEC. (1986) (1)
- Designing an Authorization Service (1994) (1)
- Data Link Control Protocols (1980) (1)
- Authentication and authorization in distributed systems (1994) (1)
- Congestion Control Techniques for Packet Networks (1980) (1)
- An Experimental Study of the Congestion Control of Packet CommunicationNetworks (1980) (1)
- Model-driven optimization of multihop wireless networks (2008) (1)
- Towards scalable and reliable group key management (2001) (1)
- Building and maintaining overlay networks for bandwidth-demanding applications (2005) (1)
- Applications of Projections to a Structured Model of Communication Protocols (1982) (1)
- Adaptive FEC for Reliable Multicast (2001) (1)
- Behavior of the normalization constant and a scaling technique for product-form queueing networks (1980) (1)
- Network security services for flows and multicasts (1999) (1)
- Back to the future part 4: the internet (2004) (1)
- An analysis of the tree convolution algorithm for queueing networks (1981) (1)
- Proceedings of the symposium on Communications Architectures & Protocols (1983) (0)
- Satellite repeater for radio lobe switching of channels and sub-channels (1996) (0)
- 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS (2002) (0)
- Designing a resilient routing infrastructure for peer-to-peer networks (2005) (0)
- Is TCP-Friendly Congestion Control Viable (NOT AVAILABLE) (2000) (0)
- Protocol conversion - correctness problems (1986) (0)
- ANALYSIS OF THE RESERVATION-ALOHA PROTOCOL FOR SATELLITE PACKET SWITCHING. (2017) (0)
- Computer data communication: Packet switching in a slotted satellite channel (1973) (0)
- A wireless routing protocol in d-dimensional spaces (2009) (0)
- De sign, Verification and Implement at ion of an Authentication Protocol* (1994) (0)
- The Bookshelf (1985) (0)
- On multihop wireless network management: measurement, modeling and control (2007) (0)
This paper list is powered by the following services:
Other Resources About Simon S. Lam
What Schools Are Affiliated With Simon S. Lam?
Simon S. Lam is affiliated with the following schools: