default search action
Phil Kearns
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2007
- [j9]Robert M. Marmorstein, Phil Kearns:
Debugging a Firewall Policy with Policy Mapping. login Usenix Mag. 32(1) (2007) - [c27]Robert M. Marmorstein, Phil Kearns:
Assisted Firewall Policy Repair Using Examples and History. LISA 2007: 27-37 - 2006
- [j8]Tracy Camp, Phil Kearns:
Fast batched data transfer with flush channels: A performance analysis. J. Parallel Distributed Comput. 66(6): 780-795 (2006) - [j7]Sharon Simmons, Dennis Edwards, Phil Kearns:
Communication analysis of distributed programs. Sci. Program. 14(2): 151-170 (2006) - [c26]Robert M. Marmorstein, Phil Kearns:
Firewall Analysis with Policy-based Host Classification. LISA 2006: 41-51 - 2005
- [c25]Robert M. Marmorstein, Phil Kearns:
An Open Source Solution for Testing NAT'd and Nested iptables Firewalls. LISA 2005: 103-112 - [c24]James Deverick, Phil Kearns:
Towards a Deep-Packet-Filter Toolkit for Securing Legacy Resources. LISA 2005: 237-248 - [c23]Robert M. Marmorstein, Phil Kearns:
A Tool for Automated iptables Firewall Analysis. USENIX ATC, FREENIX Track 2005: 71-81 - 2004
- [j6]Dennis Edwards, Sharon Simmons, Phil Kearns:
Graphical Limits of Concurrency. Neural Parallel Sci. Comput. 12(2): 219-232 (2004) - [c22]Serge E. Hallyn, Phil Kearns:
Modular Construction of DTE Policies. USENIX ATC, FREENIX Track 2004: 81-91 - 2003
- [c21]Robert Matthews, Phil Kearns:
On-Line Rollback in Log-Structured File Systems. CAINE 2003: 11-16 - [c20]Jeffrey Dobbelaere, Phil Kearns, Jean Mayo:
The Advantages of Real Time in TORA. CAINE 2003: 225-229 - 2002
- [c19]Natasha Jarymowycz, Phil Kearns:
Valid Debugging for Distributed Shared Memory. PDPTA 2002: 624-630 - 2001
- [c18]Serge E. Hallyn, Phil Kearns:
Tools to Administer Domain and Type Enforcement. LISA 2001: 151-156 - 2000
- [c17]Serge E. Hallyn, Phil Kearns:
Domain and Type Enforcement for Linux. Annual Linux Showcase & Conference 2000
1990 – 1999
- 1999
- [c16]Jean Mayo, Phil Kearns:
Distributed Deadlock Detection and Resolution Based on Hardware Clocks. ICDCS 1999: 208-215 - [c15]Jean Mayo, Phil Kearns:
A secure unrestricted advanced systems laboratory. SIGCSE 1999: 165-169 - 1998
- [c14]Jean Mayo, Phil Kearns:
A secure networked laboratory for kernel programming. ITiCSE 1998: 175-177 - 1995
- [c13]Anna Brunström, Phil Kearns:
A User Level Implementation of Flush Channels. Parallel and Distributed Computing and Systems 1995: 125-128 - [c12]Jean Mayo, Phil Kearns:
Efficient Distributed Termination Detection with Roughly Synchronized Clocks. Parallel and Distributed Computing and Systems 1995: 305-307 - [c11]Sharon Simmons, Phil Kearns:
A Causal Assert Statement for Distributed Systems. Parallel and Distributed Computing and Systems 1995: 495-498 - [c10]Jean Mayo, Phil Kearns:
Global predicates in rough real time. SPDP 1995: 17-24 - 1994
- [j5]Jean Mayo, Phil Kearns:
Distributed Termination Detection with Roughly Synchronized Clocks. Inf. Process. Lett. 52(2): 105-108 (1994) - [c9]Dennis Edwards, Phil Kearns:
DTVS: a distributed trace visualization system. SPDP 1994: 281-288 - 1993
- [j4]William S. Lloyd, Phil Kearns:
Tracing the execution of distributed programs. J. Syst. Softw. 21(3): 201-214 (1993) - [j3]Tracy Camp, Phil Kearns, Mohan Ahuja:
Proof Rules for Flush Channels. IEEE Trans. Software Eng. 19(4): 366-378 (1993) - [c8]S. L. Peterson, Phil Kearns:
Rollback Based on Vector Time. SRDS 1993: 68-77 - 1992
- [c7]Phil Kearns, Tracy Camp, Mohan Ahuja:
An Implementation of Flush Channels Based on a Verification Methodology. ICDCS 1992: 336-343 - 1991
- [c6]William S. Lloyd, Phil Kearns:
Using tracing to direct our reasoning about distributed programs. ICDCS 1991: 552-559 - 1990
- [c5]William S. Lloyd, Phil Kearns:
Bounding Sequence Numbers in Distributed Systems: a General Approach. ICDCS 1990: 312-319 - [c4]Phil Kearns, Jeffery E. Payne:
Time-based performance evaluation of protocols for distributed systems: an alternative to message counting. WSC 1990: 441-445
1980 – 1989
- 1989
- [c3]Phil Kearns, B. Koodalattupuram:
Immediate ordered service in distributed systems. ICDCS 1989: 611-618 - 1988
- [j2]Phil Kearns:
A Correct and Unrestrictive Implementation of General Semaphores. ACM SIGOPS Oper. Syst. Rev. 22(4): 46-48 (1988) - 1987
- [c2]Phil Kearns, Chris Cipriani, Mitzi Freeman:
CCAL: An interpreted language for experimentation in concurrent control. PLDI 1987: 283-291 - 1986
- [c1]Madalene Spezialetti, Phil Kearns:
Efficient Distributed Snapshots. ICDCS 1986: 382-388 - 1985
- [j1]Jean R. S. Blair, Phil Kearns, Mary Lou Soffa:
An optimistic implementation of the stack-heap. J. Syst. Softw. 5(3): 193-202 (1985)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint