default search action
Nancy D. Griffeth
Person information
- affiliation: City University of New York
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j16]Nancy D. Griffeth, Naralys Batista, Terri Applewhite-Grosso, Gianluca Arianna, Ravnit Bhatia, Faiza Boukerche, Nicholas Crispi, Neno Fuller, Piotr Gauza, Lyle Kingsbury, Kamil Krynski, Alina Levine, Rui Yan Ma, Jennifer Nam, Eitan Pearl, Alessandro Rosa, Stephanie Salarbux, Dylan Sun:
An Undergraduate Research Experience Studying Ras and Ras Mutants. IEEE Trans. Educ. 59(2): 91-97 (2016) - 2015
- [c27]Terri Applewhite-Grosso, Nancy Davis Griffeth, Elisa Lannon, Uchenna Unachukwu, Stephen Redenti, Naralys Batista:
A multi-scale, physics engine-based simulation of cellular migration. WSC 2015: 1230-1239 - 2011
- [c26]Jiang Wu, Nancy D. Griffeth, Calvin C. Newport, Nancy A. Lynch:
Engineering the Virtual Node Layer for Reactive MANET Routing. NCA 2011: 131-138
2000 – 2009
- 2009
- [c25]Jiang Wu, Nancy D. Griffeth, Nancy A. Lynch, Calvin C. Newport, Ralph E. Droms:
Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET. NCA 2009: 12-19 - 2007
- [c24]Rui Fan, Ralph E. Droms, Nancy D. Griffeth, Nancy A. Lynch:
The DHCP Failover Protocol: A Formal Perspective. FORTE 2007: 211-226 - 2006
- [c23]Nancy D. Griffeth, Yuri Cantor, Constantinos Djouvas:
Testing a Network by Inferring Representative State Machines from Network Traces. ICSEA 2006: 31 - [c22]Constantinos Djouvas, Nancy D. Griffeth, Nancy A. Lynch:
Testing Self-Similar Networks. MBT 2006: 67-82 - 2005
- [c21]Nancy D. Griffeth, Constantinos Djouvas:
Experimental Method for Testing Networks. Software Engineering Research and Practice 2005: 935-941 - 2004
- [j15]Ruibing Hao, David Lee, Rakesh K. Sinha, Nancy D. Griffeth:
Integrated system interoperability testing with applications to VoIP. IEEE/ACM Trans. Netw. 12(5): 823-836 (2004) - 2000
- [j14]L. G. Bouma, Nancy D. Griffeth, Kristofer Kimbler:
Feature Interations in Telecommunications Systems. Comput. Networks 32(4): 383-387 (2000) - [j13]Nancy D. Griffeth, Ralph Blumenthal, Jean-Charles Grégoire, Tadashi Ohta:
A feature interaction benchmark for the first feature interaction detection contest. Comput. Networks 32(4): 389-418 (2000) - [j12]Nancy D. Griffeth, Ralph Blumenthal, Jean-Charles Grégoire, Tadashi Ohta:
Feature interaction detection contest of the Fifth International Workshop on Feature Interactions. Comput. Networks 32(4): 487-510 (2000) - [c20]Nancy D. Griffeth, Ruibing Hao, David Lee, Rakesh K. Sinha:
Integrated System Interoperability Testing with Applications to VOIP. FORTE 2000: 69-84 - [c19]Nancy D. Griffeth, Ruibing Hao, David Lee, Rakesh K. Sinha:
Interoperability testing of VoIP systems. GLOBECOM 2000: 1565-1570
1990 – 1999
- 1998
- [c18]Alfred V. Aho, Sean Gallagher, Nancy D. Griffeth, Cynthia Schell, Deborah Swayne:
SCF3/Sculptor with Chisel: Requirements Engineering for Communications Services. FIW 1998: 45-63 - [c17]Nancy D. Griffeth, Ralph Blumenthal, Jean-Charles Grégoire, Tadashi Ohta:
Feature Interaction Detetion Contest. FIW 1998: 327-359 - 1996
- [c16]Nancy D. Griffeth:
Making a Simple Interface Complex: Tnteractions among Telephone Features. CHI Conference Companion 1996: 244-245 - 1995
- [c15]Alfred V. Aho, Nancy D. Griffeth:
Feature Interactions in the Global Information Infrastructure (Panel). SIGSOFT FSE 1995: 2-4 - 1994
- [j11]John A. Miller, Nancy D. Griffeth:
Performance of Time Warp Protocols for Transaction Management in Object Oriented Systems. Int. J. Comput. Simul. 4(3) (1994) - [c14]E. Jane Cameron, Nancy D. Griffeth, Yow-Jian Lin, Margaret E. Nilson, William K. Schnure, Hugo Velthuijsen:
A feature interaction benchmark for IN and beyond. FIW 1994: 1-23 - [c13]Nancy D. Griffeth, Hugo Velthuijsen:
The negotiating agents approach to runtime feature interaction resolution. FIW 1994: 217-235 - 1993
- [j10]Mauricio Arango, Lisa Bahler, Peter Bates, Munir Cochinwala, David Cohrs, Robert Fish, Gita Gopal, Nancy D. Griffeth, Gary E. Herman, Takako M. Hickey, Kuo Chi Lee, Will E. Leland, Carlyn Lowery, Victor Mak, John F. Patterson, Lillian Ruston, Mark Segal, R. C. Sekar, Mario P. Vecchi, Abel Weinrib, Sze-Ying Wuu:
The Touring Machine System. Commun. ACM 36(1): 68-77 (1993) - [j9]E. Jane Cameron, Nancy D. Griffeth, Yow-Jian Lin, Margaret E. Nilson, William K. Schnure, Hugo Velthuijsen:
A feature-interaction benchmark for IN and beyond. IEEE Commun. Mag. 31(3): 64-69 (1993) - [j8]Nancy D. Griffeth, Yow-Jian Lin:
Extending Telecommunications Systems: The Feature-Interaction Promlem - Guest Editors' Introduction. Computer 26(8): 14-18 (1993) - [c12]Nancy D. Griffeth, Hugo Velthuijsen:
Reasoning about Goals to Resolve Conflicts. ICICIS 1993: 197-204 - 1992
- [j7]Mauricio Arango, Peter Bates, Gita Gopal, Nancy D. Griffeth, Gary E. Herman, Takako M. Hickey, Will E. Leland, Victor Mak, Lillian Ruston, Mark Segal, Mario P. Vecchi, Abel Weinrib, Sze-Ying Wuu:
Touring machine: a software infrastructure to support multimedia communications. Comput. Commun. Rev. 22(3): 53-54 (1992) - [j6]Michael J. Fischer, Nancy D. Griffeth, Leonidas J. Guibas, Nancy A. Lynch:
Optimal Placement of Identical Resources in a Tree. Inf. Comput. 96(1): 1-54 (1992) - [c11]Mauricio Arango, Peter Bates, Robert Fish, Gita Gopal, Nancy D. Griffeth, Gary E. Herman, Takako M. Hickey, Will E. Leland, Carlyn Lowery, Victor Mak, John F. Patterson, Lillian Ruston, Mark Segal, Mario P. Vecchi, Abel Weinrib, Sze-Ying Wuu:
Touring Machine: A Software Platform for Distributed Multimedia Applications. ULPAA 1992: 3-15 - 1991
- [j5]Gita Gopal, Nancy D. Griffeth:
Software Fault Tolerance in Telecommunications Systems. ACM SIGOPS Oper. Syst. Rev. 25(2): 112-116 (1991) - [c10]John A. Miller, Nancy D. Griffeth:
Performance modeling of database and simulation protocols: design choices for query driven simulation. Annual Simulation Symposium 1991: 205-216 - [c9]Gita Gopal, Nancy D. Griffeth, Abel Weinrib:
Distributed Implementation of Real-Time Resource Counters. INFOCOM 1991: 415-425 - 1990
- [c8]Nancy D. Griffeth, Abel Weinrib:
Scalability of a Distributed Real-Time Resource Counter. RTSS 1990: 51-59 - [c7]Gita Gopal, Nancy D. Griffeth:
Software fault tolerance in telecommunications systems. ACM SIGOPS European Workshop 1990
1980 – 1989
- 1986
- [j4]Nancy A. Lynch, Nancy D. Griffeth, Michael J. Fischer, Leonidas J. Guibas:
Probabilistic Analysis of a Network Resource Allocation Algorithm. Inf. Control. 68(1-3): 47-85 (1986) - [c6]J. Eliot B. Moss, Nancy D. Griffeth, Marc H. Graham:
Abstraction in Recovery Management. SIGMOD Conference 1986: 72-83 - 1985
- [j3]Nancy D. Griffeth:
Reducing the Cost of Recovery from Transaction Failure. IEEE Database Eng. Bull. 8(2): 91-98 (1985) - [j2]Nancy D. Griffeth, John A. Miller:
Performance Modeling of Database Recovery Protocols. IEEE Trans. Software Eng. 11(6): 564-572 (1985) - 1984
- [c5]Nancy D. Griffeth, Magdi M. A. Morsi:
Simulation of Concurrency Control and Recovery Protocols for Distributed Database Systems. INFOCOM 1984: 200-209 - [c4]Marc H. Graham, Nancy D. Griffeth, Barbara Smith-Thomas:
Reliable Scheduling of Database Transactions for Unreliable Systems. PODS 1984: 300-310 - [c3]Nancy D. Griffeth, John A. Miller:
Performance Modeling of Database Recovery Protocols. Symposium on Reliability in Distributed Software and Database Systems 1984: 75-83 - 1982
- [j1]Michael J. Fischer, Nancy D. Griffeth, Nancy A. Lynch:
Global States of a Distributed System. IEEE Trans. Software Eng. 8(3): 198-202 (1982) - 1981
- [c2]Michael J. Fischer, Leonidas J. Guibas, Nancy D. Griffeth, Nancy A. Lynch:
Optimal Placement of Identical Resources in a Distributed Network. ICDCS 1981: 324-336
1970 – 1979
- 1978
- [c1]Nancy D. Griffeth:
Nonprocedural Query Processing for Databases with Access Paths. SIGMOD Conference 1978: 160-168
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint