default search action
William H. Sanders
Person information
- affiliation: University of Illinois, Urbana-Champain, IL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j60]William G. Temple, Yue Wu, Carmen Cheh, Yuan Li, Binbin Chen, Zbigniew T. Kalbarczyk, William H. Sanders, David M. Nicol:
CyberSAGE: The cyber security argument graph evaluation tool. Empir. Softw. Eng. 28(1): 18 (2023) - 2021
- [j59]Giulio Masetti, Silvano Chiaradonna, Felicita Di Giandomenico, William H. Sanders, Brett Feddersen:
Extending the Möbius Modeling Environment with the Advanced Replication Operator. SIGMETRICS Perform. Evaluation Rev. 48(4): 62-67 (2021) - [c186]Michael J. Rausch, William H. Sanders:
Evaluating the Effectiveness of Metamodeling in Emulating Quantitative Models. QEST 2021: 127-145 - [c185]Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Adam Bates, William H. Sanders, Hamed Okhravi:
Causal Analysis for Software-Defined Networking Attacks. USENIX Security Symposium 2021: 3183-3200 - 2020
- [j58]Carmen Cheh, Binbin Chen, William G. Temple, William H. Sanders:
Modeling Adversarial Physical Movement in a Railway Station: Classification and Metrics. ACM Trans. Cyber Phys. Syst. 4(1): 11:1-11:25 (2020) - [c184]Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Steven R. Gomez, Adam Bates, William H. Sanders, Hamed Okhravi:
Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking. NDSS 2020 - [c183]Benjamin E. Ujcich, Adam Bates, William H. Sanders:
Provenance for Intent-Based Networking. NetSoft 2020: 195-199 - [c182]Michael J. Rausch, William H. Sanders:
Sensitivity Analysis and Uncertainty Quantification of State-Based Discrete-Event Simulation Models Through a Stacked Ensemble of Metamodels. QEST 2020: 276-293 - [c181]Atul Bohara, Jordi Ros-Giralt, Ghada Elbez, Alfonso Valdes, Klara Nahrstedt, William H. Sanders:
ED4GAP: Efficient Detection for GOOSE-Based Poisoning Attacks on IEC 61850 Substations. SmartGridComm 2020: 1-7 - [c180]Michael J. Rausch, William H. Sanders:
Stacked Metamodels for Sensitivity Analysis and Uncertainty Quantification of AMI Models. SmartGridComm 2020: 1-7
2010 – 2019
- 2019
- [j57]Carmen Cheh, Uttam Thakore, Ahmed M. Fawaz, Binbin Chen, William G. Temple, William H. Sanders:
Data-driven Model-based Detection of Malicious Insiders via Physical Access Logs. ACM Trans. Model. Comput. Simul. 29(4): 26:1-26:25 (2019) - [c179]Mohammad A. Noureddine, Amanda Hsu, Matthew Caesar, Fadi A. Zaraket, William H. Sanders:
P4AIG: Circuit-Level Verification of P4 Programs. DSN (Supplements) 2019: 21-22 - [c178]Mohammad A. Noureddine, Ahmed M. Fawaz, Amanda Hsu, Cody Guldner, Sameer Vijay, Tamer Basar, William H. Sanders:
Revisiting Client Puzzles for State Exhaustion Attacks Resilience. DSN 2019: 617-629 - [c177]Carmen Cheh, Uttam Thakore, Binbin Chen, William G. Temple, William H. Sanders:
Leveraging Physical Access Logs to Identify Tailgating: Limitations and Solutions. EDCC 2019: 127-132 - [c176]Uttam Thakore, Harigovind V. Ramasamy, William H. Sanders:
Coordinated Analysis of Heterogeneous Monitor Data in Enterprise Clouds for Incident Response. ISSRE Workshops 2019: 53-58 - [c175]Benjamin E. Ujcich, William H. Sanders:
Data Protection Intents for Software-Defined Networking. NetSoft 2019: 271-275 - 2018
- [j56]Varun Badrinath Krishna, Ziping Wu, Vaidehi V. Ambardekar, Richard Macwan, William H. Sanders:
Cyberattacks on Primary Frequency Response Mechanisms in Power Grids. Computer 51(11): 37-45 (2018) - [j55]Varun Badrinath Krishna, Carl A. Gunter, William H. Sanders:
Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and DER Fraud. IEEE J. Sel. Top. Signal Process. 12(4): 790-805 (2018) - [c174]Benjamin E. Ujcich, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates, William H. Sanders, Cristina Nita-Rotaru, Hamed Okhravi:
Cross-App Poisoning in Software-Defined Networking. CCS 2018: 648-663 - [c173]Ahmed M. Fawaz, Mohammad A. Noureddine, William H. Sanders:
POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy. DSN 2018: 514-525 - [c172]Giulio Masetti, Silvano Chiaradonna, Felicita Di Giandomenico, Brett Feddersen, William H. Sanders:
An Efficient Strategy for Model Composition in the Möbius Modeling Environment. EDCC 2018: 116-119 - [c171]Ken Keefe, Brett Feddersen, Michael J. Rausch, Ronald Joseph Wright, William H. Sanders:
An Ontology Framework for Generating Discrete-Event Stochastic Models. EPEW 2018: 173-189 - [c170]Uttam Thakore, Ahmed M. Fawaz, William H. Sanders:
Detecting monitor compromise using evidential reasoning: poster. HotSoS 2018: 16:1 - [c169]Benjamin E. Ujcich, Adam Bates, William H. Sanders:
A Provenance Model for the European Union General Data Protection Regulation. IPAW 2018: 45-57 - [c168]Carmen Cheh, Ahmed M. Fawaz, Mohammad A. Noureddine, Binbin Chen, William G. Temple, William H. Sanders:
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems. PRDC 2018: 125-134 - [c167]Michael J. Rausch, Ahmed M. Fawaz, Ken Keefe, William H. Sanders:
Modeling Humans: A General Agent Model for the Evaluation of Security. QEST 2018: 373-388 - [c166]Michael J. Rausch, Varun Badrinath Krishna, Peng Gu, Rupak Chandra, Brett Feddersen, Ahmed M. Fawaz, William H. Sanders:
Peer-to-peer Detection of DoS Attacks on City-Scale IoT Mesh Networks. SmartGridComm 2018: 1-6 - [i4]Mohammad A. Noureddine, Ahmed M. Fawaz, Tamer Basar, William H. Sanders:
Revisiting Client Puzzles for State Exhaustion Attacks Resilience. CoRR abs/1807.11892 (2018) - 2017
- [c165]Carmen Cheh, Ken Keefe, Brett Feddersen, Binbin Chen, William G. Temple, William H. Sanders:
Developing Models for Physical Attacks in Cyber-Physical Systems. CPS-SPC@CCS 2017: 49-55 - [c164]Michael J. Rausch, Ken Keefe, Brett Feddersen, William H. Sanders:
Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options. CRITIS 2017: 156-167 - [c163]Varun Badrinath Krishna, Michael J. Rausch, Benjamin E. Ujcich, Indranil Gupta, William H. Sanders:
REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor Networks. DSN 2017: 321-332 - [c162]Benjamin E. Ujcich, Uttam Thakore, William H. Sanders:
ATTAIN: An Attack Injection Framework for Software-Defined Networking. DSN 2017: 567-578 - [c161]Ahmed M. Fawaz, William H. Sanders:
Learning Process Behavioral Baselines for Anomaly Detection. PRDC 2017: 145-154 - [c160]William G. Temple, Bao Anh N. Tran, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders:
On Train Automatic Stop Control Using Balises: Attacks and a Software-Only Countermeasure. PRDC 2017: 274-283 - [c159]Mohammad A. Noureddine, Andrew Marturano, Ken Keefe, Masooda N. Bashir, William H. Sanders:
Accounting for the Human User in Predictive Security Models. PRDC 2017: 329-338 - [c158]Carmen Cheh, Binbin Chen, William G. Temple, William H. Sanders:
Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs. QEST 2017: 275-291 - [c157]Atul Bohara, Mohammad A. Noureddine, Ahmed M. Fawaz, William H. Sanders:
An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement. SRDS 2017: 224-233 - [i3]Ahmed M. Fawaz, Mohammad A. Noureddine, William H. Sanders:
PowerAlert: An Integrity Checker using Power Measurement. CoRR abs/1702.02907 (2017) - 2016
- [j54]Ken Keefe, William H. Sanders:
Reliability Analysis with Dynamic Reliability Block Diagrams in the Möbius Modeling Tool. EAI Endorsed Trans. Security Safety 3(10): e3 (2016) - [j53]Ahmed M. Fawaz, Robin Berthier, William H. Sanders:
A Response Cost Model for Advanced Metering Infrastructures. IEEE Trans. Smart Grid 7(2): 543-553 (2016) - [c156]Ronald Joseph Wright, Ken Keefe, Brett Feddersen, William H. Sanders:
A Case Study Assessing the Effects of Cyber Attacks on a River Zonal Dispatcher. CRITIS 2016: 252-264 - [c155]Xinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer, David M. Nicol:
The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment. GraMSec@CSF 2016: 39-61 - [c154]Uttam Thakore, Gabriel A. Weaver, William H. Sanders:
A Quantitative Methodology for Security Monitor Deployment. DSN 2016: 1-12 - [c153]Varun Badrinath Krishna, Kiryung Lee, Gabriel A. Weaver, Ravishankar K. Iyer, William H. Sanders:
F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids. DSN 2016: 407-418 - [c152]Mohammad A. Noureddine, Ahmed M. Fawaz, William H. Sanders, Tamer Basar:
A Game-Theoretic Approach to Respond to Attacker Lateral Movement. GameSec 2016: 294-313 - [c151]Atul Bohara, Uttam Thakore, William H. Sanders:
Intrusion detection in enterprise systems by combining and clustering diverse monitor data. HotSoS 2016: 7-16 - [c150]Michael J. Rausch, Brett Feddersen, Ken Keefe, William H. Sanders:
A Comparison of Different Intrusion Detection Approaches in an Advanced Metering Infrastructure Network Using ADVISE. QEST 2016: 279-294 - [c149]Ahmed M. Fawaz, Atul Bohara, Carmen Cheh, William H. Sanders:
Lateral Movement Detection Using Distributed Data Fusion. SRDS 2016: 21-30 - 2015
- [j52]Saman A. Zonouz, Robin Berthier, Himanshu Khurana, William H. Sanders, Tim Yardley:
Seclius: An Information Flow-Based, Consequence-Centric Security Metric. IEEE Trans. Parallel Distributed Syst. 26(2): 562-573 (2015) - [c148]Varun Badrinath Krishna, Ravishankar K. Iyer, William H. Sanders:
ARIMA-Based Modeling and Validation of Consumption Readings in Power Grids. CRITIS 2015: 199-210 - [c147]Mohammad A. Noureddine, Ken Keefe, William H. Sanders, Masooda N. Bashir:
Quantitative security metrics with human in the loop. HotSoS 2015: 21:1-21:2 - [c146]Carmen Cheh, Gabriel A. Weaver, William H. Sanders:
Cyber-Physical Topology Language: Definition, Operations, and Application. PRDC 2015: 60-69 - [c145]Sumeet Jauhar, Binbin Chen, William G. Temple, Xinshu Dong, Zbigniew T. Kalbarczyk, William H. Sanders, David M. Nicol:
Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios. PRDC 2015: 319-324 - [c144]Varun Badrinath Krishna, Gabriel A. Weaver, William H. Sanders:
PCA-Based Method for Detecting Integrity Attacks on Advanced Metering Infrastructure. QEST 2015: 70-85 - [c143]Binbin Chen, Christoph Schmittner, Zhendong Ma, William G. Temple, Xinshu Dong, Douglas L. Jones, William H. Sanders:
Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective. SAFECOMP Workshops 2015: 277-290 - 2014
- [j51]William H. Sanders:
Quantitative Security Metrics: Unattainable Holy Grail or a Vital Breakthrough within Our Reach? IEEE Secur. Priv. 12(2): 67-69 (2014) - [j50]Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley:
RRE: A Game-Theoretic Intrusion Response and Recovery Engine. IEEE Trans. Parallel Distributed Syst. 25(2): 395-406 (2014) - [j49]Saman A. Zonouz, Charles M. Davis, Katherine R. Davis, Robin Berthier, Rakesh B. Bobba, William H. Sanders:
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures. IEEE Trans. Smart Grid 5(1): 3-13 (2014) - [j48]Alvaro A. Cárdenas, Robin Berthier, Rakesh B. Bobba, Jun Ho Huh, Jorjeta G. Jetcheva, David Grochocki, William H. Sanders:
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures. IEEE Trans. Smart Grid 5(2): 906-915 (2014) - [c142]Alefiya Hussain, Ted Faber, Robert Braden, Terry V. Benzel, Tim Yardley, Jeremy Jones, David M. Nicol, William H. Sanders, Thomas W. Edgar, Thomas E. Carroll, David O. Manz, Laura Tinnel:
Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical Systems. DCOSS 2014: 358-360 - [c141]Nils Ole Tippenhauer, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, William H. Sanders:
Automatic Generation of Security Argument Graphs. PRDC 2014: 33-42 - [e3]Gethin Norman, William H. Sanders:
Quantitative Evaluation of Systems - 11th International Conference, QEST 2014, Florence, Italy, September 8-10, 2014. Proceedings. Lecture Notes in Computer Science 8657, Springer 2014, ISBN 978-3-319-10695-3 [contents] - [i2]Nils Ole Tippenhauer, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, William H. Sanders:
Automatic Generation of Security Argument Graphs. CoRR abs/1405.7475 (2014) - [i1]Erika Ábrahám, Alberto Avritzer, Anne Remke, William H. Sanders:
Randomized Timed and Hybrid Models for Critical Infrastructures (Dagstuhl Seminar 14031). Dagstuhl Reports 4(1): 36-82 (2014) - 2013
- [j47]Saman A. Zonouz, Amir Houmansadr, Robin Berthier, Nikita Borisov, William H. Sanders:
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones. Comput. Secur. 37: 215-227 (2013) - [c140]Gabriel A. Weaver, Carmen Cheh, Edmond Rogers, William H. Sanders, Dennis Gammel:
Toward a cyber-physical topology language: applications to NERC CIP audit. SEGS@CCS 2013: 93-104 - [c139]Michael D. Ford, Ken Keefe, Elizabeth LeMay, William H. Sanders, Carol Muehrcke:
Implementing the ADVISE security modeling formalism in Möbius. DSN 2013: 1-8 - [c138]Sobir Bazarbayev, Matti A. Hiltunen, Kaustubh R. Joshi, William H. Sanders, Richard D. Schlichting:
PSCloud: a durable context-aware personal storage cloud. HotDep 2013: 9:1-9:6 - [c137]Sobir Bazarbayev, Matti A. Hiltunen, Kaustubh R. Joshi, William H. Sanders, Richard D. Schlichting:
Content-Based Scheduling of Virtual Machines (VMs) in the Cloud. ICDCS 2013: 93-101 - [c136]Timothy M. Yardley, Robin Berthier, David M. Nicol, William H. Sanders:
Smart grid protocol testing through cyber-physical testbeds. ISGT 2013: 1-6 - [c135]Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole Tippenhauer, An Hoa Vu, David K. Y. Yau:
Go with the flow: toward workflow-oriented security assessment. NSPW 2013: 65-76 - [c134]Ken Keefe, William H. Sanders:
Möbius Shell: A Command-Line Interface for Möbius. QEST 2013: 282-285 - [c133]William Niemira, Rakesh B. Bobba, Peter W. Sauer, William H. Sanders:
Malicious data detection in state estimation leveraging system losses & estimation of perturbed parameters. SmartGridComm 2013: 402-407 - [c132]Robin Berthier, Jorjeta G. Jetcheva, Daisuke Mashima, Jun Ho Huh, David Grochocki, Rakesh B. Bobba, Alvaro A. Cárdenas, William H. Sanders:
Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures. SmartGridComm 2013: 450-455 - [c131]Muhammad Salman Malik, Robin Berthier, Rakesh B. Bobba, Roy H. Campbell, William H. Sanders:
Formal design of communication checkers for ICCP using UPPAAL. SmartGridComm 2013: 486-491 - [c130]Uttam Thakore, Gabriel A. Weaver, William H. Sanders:
An Actor-centric, Asset-Based Monitor Deployment Model for Cloud Computing. UCC 2013: 311-312 - 2012
- [j46]Saman A. Zonouz, Katherine M. Rogers, Robin Berthier, Rakeshbabu Bobba, William H. Sanders, Thomas J. Overbye:
SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures. IEEE Trans. Smart Grid 3(4): 1790-1799 (2012) - [c129]Eric Rozier, William H. Sanders:
A framework for efficient evaluation of the fault tolerance of deduplicated storage systems. DSN 2012: 1-12 - [c128]Jing Zhang, Robin Berthier, Will Rhee, Michael D. Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders:
Safeguarding academic accounts and resources with the University Credential Abuse Auditing System. DSN 2012: 1-8 - [c127]Ryan M. Lefever, Vikram S. Adve, William H. Sanders:
A Mirrored Data Structures Approach to Diverse Partial Memory Replication. EDCC 2012: 61-72 - [c126]William H. Sanders:
Building resilient infrastructures for smart energy systems (abstract). ISGT 2012: 1 - [c125]William H. Sanders:
TCIPG: Trustworthy cyber infrastructure for the power grid overview. ISGT 2012: 1-2 - [c124]William H. Sanders:
Assuring the trustworthiness of the smarter electric grid. NCA 2012 - [c123]Michael D. Ford, Peter Buchholz, William H. Sanders:
State-Based Analysis in ADVISE. QEST 2012: 148-157 - [c122]Ahmed M. Fawaz, Robin Berthier, William H. Sanders:
Cost modeling of response actions for automated response and recovery in AMI. SmartGridComm 2012: 348-353 - [c121]David Grochocki, Jun Ho Huh, Robin Berthier, Rakesh Bobba, William H. Sanders, Alvaro A. Cárdenas, Jorjeta G. Jetcheva:
AMI threats, intrusion detection requirements and deployment recommendations. SmartGridComm 2012: 395-400 - [c120]Jing Zhang, Robin Berthier, Will Rhee, Michael D. Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders:
Learning from Early Attempts to Measure Information Security Performance. CSET 2012 - [c119]William H. Sanders:
Assuring the trustworthiness of the smarter electric grid. ICPE 2012: 19-20 - 2011
- [j45]Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. Sanders:
Using CPU gradients for performance-aware energy conservation in multitier systems. Sustain. Comput. Informatics Syst. 1(2): 113-133 (2011) - [j44]Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders, Richard D. Schlichting:
Probabilistic Model-Driven Recovery in Distributed Systems. IEEE Trans. Dependable Secur. Comput. 8(6): 913-928 (2011) - [j43]Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. Sanders:
Using link gradients to predict the impact of network latency on multitier applications. IEEE/ACM Trans. Netw. 19(3): 855-868 (2011) - [c118]Saman A. Zonouz, Aashish Sharma, HariGovind V. Ramasamy, Zbigniew T. Kalbarczyk, Birgit Pfitzmann, Kevin P. McAuliffe, Ravishankar K. Iyer, William H. Sanders, Eric Cope:
Managing business health in the presence of malicious attacks. DSN Workshops 2011: 9-14 - [c117]Robin Berthier, William H. Sanders:
Specification-Based Intrusion Detection for Advanced Metering Infrastructures. PRDC 2011: 184-193 - [c116]Elizabeth LeMay, Michael D. Ford, Ken Keefe, William H. Sanders, Carol Muehrcke:
Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE). QEST 2011: 191-200 - [c115]Douglas Eskins, William H. Sanders:
The Multiple-Asymmetric-Utility System Model: A Framework for Modeling Cyber-Human Systems. QEST 2011: 233-242 - [c114]Saman A. Zonouz, Kaustubh R. Joshi, William H. Sanders:
FloGuard: Cost-Aware Systemwide Intrusion Defense via Online Forensics and On-Demand IDS Deployment. SAFECOMP 2011: 338-354 - [c113]Eric Rozier, William H. Sanders, Pin Zhou, NagaPramod Mandagere, Sandeep Uttamchandani, Mark L. Yakushev:
Modeling the Fault Tolerance Consequences of Deduplication. SRDS 2011: 75-84 - 2010
- [j42]Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. Sanders:
Blackbox prediction of the impact of DVFS on end-to-end performance of multitier systems. SIGMETRICS Perform. Evaluation Rev. 37(4): 59-63 (2010) - [j41]Shravan Gaonkar, Kimberly Keeton, Arif Merchant, William H. Sanders:
Designing Dependable Storage Solutions for Shared Application Environments. IEEE Trans. Dependable Secur. Comput. 7(4): 366-380 (2010) - [c112]Ryan M. Lefever, Vikram S. Adve, William H. Sanders:
Diverse Partial Memory Replication. DSN 2010: 71-80 - [c111]Ann T. Tai, Kam S. Tso, William H. Sanders:
Diversity-inspired clustering for self-healing MANETs: Motivation, protocol, and performability evaluation. DSN 2010: 547-556 - [c110]Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. Sanders:
CPU gradients: Performance-aware energy conservation in multitier systems. Green Computing Conference 2010: 15-29 - [c109]David M. Nicol, William H. Sanders, Mouna Seri, Sankalp Singh:
Experiences Validating the Access Policy Tool in Industrial Settings. HICSS 2010: 1-8 - [c108]William H. Sanders:
Quantitative Evaluation of Security Metrics. QEST 2010: 306 - [c107]Saman A. Zonouz, Kaustubh R. Joshi, William H. Sanders:
Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment. SafeConfig 2010: 71-74
2000 – 2009
- 2009
- [j40]Shravan Gaonkar, Ken Keefe, Ruth Lamprecht, Eric Rozier, Peter Kemper, William H. Sanders:
Performance and dependability modeling with Möbius. SIGMETRICS Perform. Evaluation Rev. 36(4): 16-21 (2009) - [c106]Tod Courtney, Shravan Gaonkar, Ken Keefe, Eric Rozier, William H. Sanders:
Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models. DSN 2009: 353-358 - [c105]Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley:
RRE: A game-theoretic intrusion Response and Recovery Engine. DSN 2009: 439-448 - [c104]Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders, Richard D. Schlichting:
Link Gradients: Predicting the Impact of Network Latency on Multitier Applications. INFOCOM 2009: 2258-2266 - [c103]Ken Keefe, Quincy Mitchell, Eric Rozier, William H. Sanders:
Remote Job Management in the Mobius Modeling Framework. QEST 2009: 209-210 - [c102]Shravan Gaonkar, William H. Sanders:
G-SSASC: Simultaneous Simulation of System Models with bounded Hazard Rates. WSC 2009: 663-673 - 2008
- [j39]David M. Nicol, William H. Sanders, Sankalp Singh, Mouna Seri:
Usable Global Network Access Policy for Process Control Systems. IEEE Secur. Priv. 6(6): 30-36 (2008) - [j38]HariGovind V. Ramasamy, Prashant Pandey, Michel Cukier, William H. Sanders:
Experiences with building an intrusion-tolerant group communication system. Softw. Pract. Exp. 38(6): 639-666 (2008) - [c101]Shravan Gaonkar, Eric Rozier, Anthony Tong, William H. Sanders:
Scaling file systems to support petascale clusters: A dependability analysis to support informed design choices. DSN 2008: 386-391 - [c100]Ann T. Tai, Kam S. Tso, William H. Sanders:
A recurrence-relation-based reward model for performability evaluation of embedded systems. DSN 2008: 532-541 - [c99]Saman A. Zonouz, William H. Sanders:
A Kalman-Based Coordination for Hierarchical State Estimation: Agorithm and Analysis. HICSS 2008: 187 - [c98]Elizabeth Van Ruitenbeek, William H. Sanders:
Modeling Peer-to-Peer Botnets. QEST 2008: 307-316 - 2007
- [j37]Jean Peccoud, Tod Courtney, William H. Sanders:
Möbius: an integrated discrete-event modeling environment. Bioinform. 23(24): 3412-3414 (2007) - [j36]HariGovind V. Ramasamy, Adnan Agbaria, William H. Sanders:
A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution. IEEE Trans. Dependable Secur. Comput. 4(1): 1-17 (2007) - [j35]W. Douglas Obal II, Michael G. McQuinn, William H. Sanders:
Detecting and Exploiting Symmetry in Discrete-State Markov Models. IEEE Trans. Reliab. 56(4): 643-654 (2007) - [c97]Elizabeth Van Ruitenbeek, Tod Courtney, William H. Sanders, Fabrice Stevens:
Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms. DSN 2007: 790-800 - [c96]Robert K. Cunningham, Steven Cheung, Martin W. Fong, Ulf Lindqvist, David M. Nicol, Ronald Pawlowski, Eric Robinson, William H. Sanders, Sankalp Singh, Alfonso Valdes, Bradley Woodworth, Michael Zhivich:
Securing Current and Future Process Control Systems. Critical Infrastructure Protection 2007: 99-115 - [c95]HariGovind V. Ramasamy, Mouna Seri, William H. Sanders:
The coBFIT toolkit. PODC 2007: 350-351 - [c94]Michael G. McQuinn, Peter Kemper, William H. Sanders:
Dependability Analysis with Markov Chains: How Symmetries Improve Symbolic Computations. QEST 2007: 151-160 - [c93]Tod Courtney, Shravan Gaonkar, Michael G. McQuinn, Eric Rozier, William H. Sanders, Patrick G. Webster:
Design of Experiments within the Mobius Modeling Environment. QEST 2007: 161-162 - [c92]David M. Nicol, Steve Hanna, Frank Stratton, William H. Sanders:
Modeling and analysis of worm defense using stochastic activity networks. SpringSim (3) 2007: 349-355 - 2006
- [j34]Mark Griffith, Tod Courtney, Jean Peccoud, William H. Sanders:
Dynamic partitioning for hybrid simulation of the bistable HIV-1 transactivation network. Bioinform. 22(22): 2782-2789 (2006) - [j33]Peter Kemper, William H. Sanders:
Modelling techniques and tools for computer performance evaluation. Perform. Evaluation 63(6): 521-523 (2006) - [j32]Partha P. Pal, Paul Rubel, Michael Atighetchi, Franklin Webber, William H. Sanders, Mouna Seri, HariGovind V. Ramasamy, James Lyons, Tod Courtney, Adnan Agbaria, Michel Cukier, Jeanna M. Gossett, Idit Keidar:
An architecture for adaptive intrusion-tolerant applications. Softw. Pract. Exp. 36(11-12): 1331-1354 (2006) - [c91]Michael Ihde, William H. Sanders:
Barbarians in the Gate: An Experimental Validation of NIC-based Distributed Firewall Performance and Flood Tolerance. DSN 2006: 209-216 - [c90]Shravan Gaonkar, Kimberly Keeton, Arif Merchant, William H. Sanders:
Designing dependable storage solutions for shared application environments. DSN 2006: 371-382 - [c89]Kaustubh R. Joshi, William H. Sanders, Matti A. Hiltunen, Richard D. Schlichting:
Automatic Recovery Using Bounded Partially Observable Markov Decision Processes. DSN 2006: 445-456 - [c88]Vinh Vi Lam, William H. Sanders, Peter Buchholz:
A Component-Level Path Composition Approach for Efficient Transient Analysis of Large CTMCs. DSN 2006: 485-494 - [c87]W. Douglas Obal II, Michael G. McQuinn, William H. Sanders:
Detecting and Exploiting Symmetry in Discrete-state Markov Models. PRDC 2006: 26-38 - [c86]Tod Courtney, Shravan Gaonkar, Mark Griffith, Vinh Vi Lam, Michael G. McQuinn, Eric Rozier, William H. Sanders:
Data Analysis and Visualization within the Möbius Modeling Environment. QEST 2006: 137-138 - [c85]David Daly, Peter Buchholz, William H. Sanders:
Bound-Preserving Composition for Markov Reward Models. QEST 2006: 243-252 - [c84]Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo, William H. Sanders:
Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available. SRDS 2006: 71-82 - 2005
- [j31]Sankalp Singh, Adnan Agbaria, Fabrice Stevens, Tod Courtney, John F. Meyer, William H. Sanders, Partha P. Pal:
Validation of a survivable Publish-Subscribe System. Int. J. Comput. 4(2): 77-94 (2005) - [c83]Ann T. Tai, Kam S. Tso, William H. Sanders, Savio N. Chau:
A Performability-Oriented Software Rejuvenation Framework for Distributed Applications. DSN 2005: 570-579 - [c82]Salem Derisavi, Peter Kemper, William H. Sanders:
Lumping Matrix Diagram Representations of Markov Models. DSN 2005: 742-751 - [c81]Adnan Agbaria, William H. Sanders:
Application-Driven Coordination-Free Distributed Checkpointing. ICDCS 2005: 177-186 - [c80]Vikram S. Adve, Adnan Agbaria, Matti A. Hiltunen, Ravishankar K. Iyer, Kaustubh R. Joshi, Zbigniew Kalbarczyk, Ryan M. Lefever, Raymond Plante, William H. Sanders, Richard D. Schlichting:
A Compiler-Enabled Model- and Measurement-Driven Adaptation Environment for Dependability and Performance. IPDPS 2005 - [c79]William H. Sanders:
Probabilistic Validation of Computer System Survivability. LADC 2005: 1 - [c78]HariGovind V. Ramasamy, Adnan Agbaria, William H. Sanders:
Parsimony-Based Approach for Obtaining Resource-Efficient and Trustworthy Execution. LADC 2005: 206-225 - [c77]Shravan Gaonkar, William H. Sanders:
Simultaneous Simulation of Alternative System Configurations. PRDC 2005: 41-48 - [c76]Eleftheria Athanasopoulou, Purvesh Thakker, William H. Sanders:
Evaluating the Dependability of a LEO Satellite Network for Scientific Applications. QEST 2005: 95-104 - [c75]Tod Courtney, Salem Derisavi, Shravan Gaonkar, Mark Griffith, Vinh Vi Lam, Michael G. McQuinn, Eric Rozier, William H. Sanders:
The Mobius Modeling Environment: Recent Extensions - 2005. QEST 2005: 259-260 - [c74]Kaustubh R. Joshi, William H. Sanders, Matti A. Hiltunen, Richard D. Schlichting:
Automatic Model-Driven Recovery in Distributed Systems. SRDS 2005: 25-38 - [c73]Vinh Vi Lam, Peter Buchholz, William H. Sanders:
A component-level path-based simulation approach for efficient analysis of large Markov models. WSC 2005: 584-590 - 2004
- [j30]Ann T. Tai, William H. Sanders, Leon Alkalai, Savio N. Chau, Kam S. Tso:
Performability analysis of guarded-operation duration: a translation approach for reward model solutions. Perform. Evaluation 56(1-4): 249-276 (2004) - [j29]David M. Nicol, William H. Sanders, Kishor S. Trivedi:
Model-Based Evaluation: From Dependability to Security. IEEE Trans. Dependable Secur. Comput. 1(1): 48-65 (2004) - [j28]Ramesh Chandra, Ryan M. Lefever, Kaustubh R. Joshi, Michel Cukier, William H. Sanders:
A Global-State-Triggered Fault Injector for Distributed System Evaluation. IEEE Trans. Parallel Distributed Syst. 15(7): 593-605 (2004) - [c72]William H. Sanders:
Stochastic Methods for Dependability, Performability, and Security Evaluation. ICATPN 2004: 97 - [c71]Ann T. Tai, Kam S. Tso, William H. Sanders:
Cluster-Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network Applications. DSN 2004: 805- - [c70]HariGovind V. Ramasamy, Adnan Agbaria, William H. Sanders:
CoBFIT: A Component-Based Framework for Intrusion Tolerance. EUROMICRO 2004: 591-600 - [c69]Ravishankar K. Iyer, William H. Sanders, Janak H. Patel, Zbigniew Kalbarczyk:
The evolution of dependable computing at the University of Illinois. IFIP Congress Topical Sessions 2004: 135-164 - [c68]Adnan Agbaria, William H. Sanders:
Distributed Snapshots for Mobile Computing Systems. PerCom 2004: 177-186 - [c67]Anil Sharma, Jason R. Martin, Nitin Anand, Michel Cukier, William H. Sanders:
Ferret: A Host Vulnerability Checking Tool. PRDC 2004: 389-394 - [c66]Peter Buchholz, William H. Sanders:
Approximate Computation of Transient Results for Large Markov Chains. QEST 2004: 126-135 - [c65]Vinh Vi Lam, Peter Buchholz, William H. Sanders:
A Structured Path-Based Approach for Computing Transient Rewards of Large CTMCs. QEST 2004: 136-145 - [c64]Tod Courtney, David Daly, Salem Derisavi, Shravan Gaonkar, Mark Griffith, Vinh Vi Lam, William H. Sanders:
The Möbius Modeling Environment: Recent Developments. QEST 2004: 328-329 - [c63]Fabrice Stevens, Tod Courtney, Sankalp Singh, Adnan Agbaria, John F. Meyer, William H. Sanders, Partha P. Pal:
Model-Based Validation of an Intrusion-Tolerant Information System. SRDS 2004: 184-194 - [c62]Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. Sanders, Adnan Agbaria:
Online model-based adaptation for optimizing performance and dependability. WOSS 2004: 85-89 - 2003
- [j27]Salem Derisavi, Holger Hermanns, William H. Sanders:
Optimal state-space lumping in Markov chains. Inf. Process. Lett. 87(6): 309-315 (2003) - [j26]Salem Derisavi, Peter Kemper, William H. Sanders, Tod Courtney:
The Möbius state-level abstract functional interface. Perform. Evaluation 54(2): 105-128 (2003) - [j25]Jennifer Ren, David E. Bakken, Tod Courtney, Michel Cukier, David A. Karr, Paul Rubel, Chetan Sabnis, William H. Sanders, Richard E. Schantz, Mouna Seri:
AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects. IEEE Trans. Computers 52(1): 31-50 (2003) - [j24]Sudha Krishnamurthy, William H. Sanders, Michel Cukier:
An Adaptive Quality of Service Aware Middleware for Replicated Services. IEEE Trans. Parallel Distributed Syst. 14(11): 1112-1125 (2003) - [c61]Ann T. Tai, Kam S. Tso, William H. Sanders:
Protecting Distributed Software Upgrades that Involve Message-Passing Interface Changes. COMPSAC 2003: 385-390 - [c60]Sankalp Singh, Michel Cukier, William H. Sanders:
Probabilistic Validation of an Intrusion-Tolerant Replication System. DSN 2003: 615-624 - [c59]Ann T. Tai, Kam S. Tso, Leon Alkalai, Savio N. Chau, William H. Sanders:
Opportunity-Adaptive QoS Enhancement in Satellite Constellations: A Case Study. DSN 2003: 655-664 - [c58]Henrik C. Bohnenkamp, Tod Courtney, David Daly, Salem Derisavi, Holger Hermanns, Joost-Pieter Katoen, Ric Klaren, Vinh Vi Lam, William H. Sanders:
On Integrating the MÖBIUS and MODEST Modeling Tools. DSN 2003: 671 - [c57]Vishu Gupta, Vinh Vi Lam, HariGovind V. Ramasamy, William H. Sanders, Sankalp Singh:
Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures. LADC 2003: 81-101 - [c56]Ryan M. Lefever, Michel Cukier, William H. Sanders:
An Experimental Evaluation of Correlated Network Partitions in the Coda Distributed File System. SRDS 2003: 273-282 - [e2]Peter Kemper, William H. Sanders:
Computer Performance Evaluations, Modelling Techniques and Tools. 13th International Conference, TOOLS 2003, Urbana, IL, USA, September 2-5, 2003, Proceedings. Lecture Notes in Computer Science 2794, Springer 2003, ISBN 3-540-40814-2 [contents] - [e1]Bill Cheng, Satish K. Tripathi, Jennifer Rexford, William H. Sanders:
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS 2003, June 9-14, 2003, San Diego, CA, USA. ACM 2003, ISBN 1-58113-664-1 [contents] - 2002
- [j23]Ann T. Tai, Kam S. Tso, Leon Alkalai, Savio N. Chau, William H. Sanders:
Low-Cost Error Containment and Recovery for Onboard Guarded Software Upgrading and Beyond. IEEE Trans. Computers 51(2): 121-137 (2002) - [j22]Daniel D. Deavours, Graham Clark, Tod Courtney, David Daly, Salem Derisavi, Jay M. Doyle, William H. Sanders, Patrick G. Webster:
The Möbius Framework and Its Implementation. IEEE Trans. Software Eng. 28(10): 956-969 (2002) - [c55]Salem Derisavi, Peter Kemper, William H. Sanders, Tod Courtney:
The Möbius State-Level Abstract Functional Interface. Computer Performance Evaluation / TOOLS 2002: 31-50 - [c54]Sudha Krishnamurthy, William H. Sanders, Michel Cukier:
An Adaptive Framework for Tunable Consistency and Timeliness Using Replication. DSN 2002: 17-26 - [c53]HariGovind V. Ramasamy, Prashant Pandey, James Lyons, Michel Cukier, William H. Sanders:
Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems. DSN 2002: 229-238 - [c52]Ann T. Tai, William H. Sanders, Leon Alkalai, Savio N. Chau, Kam S. Tso:
Performability Analysis of Guarded-Operation Duration: A Successive Model-Translation Approach. DSN 2002: 561-570 - [c51]David Daly, Gautam Kar, William H. Sanders:
Modeling of Service-Level Agreements for Composed Services. DSOM 2002: 4-15 - [c50]Kaustubh R. Joshi, Michel Cukier, William H. Sanders:
Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol. EDCC 2002: 140-158 - [c49]William H. Sanders, Constantine D. Polychronopoulos, Thomas S. Huang, Tod Courtney, David Daly, Daniel D. Deavours, Salem Derisavi:
Overview: An Integrated Framework for Performance Engineering and Resource-Aware Compilation. IPDPS 2002 - [c48]HariGovind V. Ramasamy, Michel Cukier, William H. Sanders:
Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System. PRDC 2002: 9-18 - [c47]Jennifer Ren, Paul Rubel, Mouna Seri, Michel Cukier, William H. Sanders, Tod Courtney:
Passive Replication Schemes in Aqua. PRDC 2002: 125-130 - [c46]Sudha Krishnamurthy, William H. Sanders, Michel Cukier:
Performance Evaluation of a Probabilistic Replica Selection Algorithm. WORDS 2002: 119-130 - 2001
- [j21]Ann T. Tai, Kam S. Tso, Leon Alkalai, Savio N. Chau, William H. Sanders:
On the effectiveness of a message-driven confidence-driven protocol for guarded software upgrading. Perform. Evaluation 44(1-4): 211-236 (2001) - [j20]W. Douglas Obal II, William H. Sanders:
Measure-adaptive state-space construction. Perform. Evaluation 44(1-4): 237-258 (2001) - [j19]Jennifer Ren, Michel Cukier, William H. Sanders:
An Adaptive Algorithm for Tolerating Value Faults and Crash Failures. IEEE Trans. Parallel Distributed Syst. 12(2): 173-192 (2001) - [c45]David Daly, William H. Sanders:
A Connection Formalism for the Solution of Large and Stiff Models. Annual Simulation Symposium 2001: 258-265 - [c44]Sudha Krishnamurthy, William H. Sanders, Michel Cukier:
A Dynamic Replica Selection Algorithm for Tolerating Timing Faults. DSN 2001: 107-116 - [c43]William H. Sanders:
Business Meeting: IEEE Technical Committee on Fault Tolerance. DSN 2001 - [c42]Ann T. Tai, Kam S. Tso, Leon Alkalai, Savio N. Chau, William H. Sanders:
Synergistic Coordination between Software and Hardware Fault Tolerance Techniques. DSN 2001: 369-378 - [c41]Ann T. Tai, Kam S. Tso, William H. Sanders, Leon Alkalai, Savio N. Chau:
Low-Cost Flexible Software Fault Tolerance for Distributed Computing. ISSRE 2001: 148-159 - [c40]Graham Clark, William H. Sanders:
Implementing a Stochastic Process Algebra within the Möbius Modeling Framework. PAPM-PROBMIV 2001: 200-216 - [c39]Daniel D. Deavours, William H. Sanders:
The Möbius Execution Policy. PNPM 2001: 135-144 - [c38]Graham Clark, Tod Courtney, David Daly, Daniel D. Deavours, Salem Derisavi, Jay M. Doyle, William H. Sanders, Patrick G. Webster:
The Möbius Modeling Tool. PNPM 2001: 241-250 - [c37]Daniel D. Deavours, William H. Sanders:
Möbius: Framework and Atomic Models. PNPM 2001: 251-260 - 2000
- [c36]David Daly, Daniel D. Deavours, Jay M. Doyle, Patrick G. Webster, William H. Sanders:
Möbius: An Extensible Tool for Performance and Dependability Modeling. Computer Performance Evaluation / TOOLS 2000: 332-336 - [c35]Ramesh Chandra, Ryan M. Lefever, Michel Cukier, William H. Sanders:
Loki: A State-Driven Fault Injector for Distributed Systems. DSN 2000: 237-242 - [c34]William H. Sanders, John F. Meyer:
Stochastic Activity Networks: Formal Definitions and Concepts. European Educational Forum: School on Formal Methods and Performance Analysis 2000: 315-343 - [c33]Kam S. Tso, Ann T. Tai, Leon Alkalai, Savio N. Chau, William H. Sanders:
GSU middleware architecture design. HASE 2000: 212-215 - [c32]Ann T. Tai, Kam S. Tso, Leon Alkalai, Savio N. Chau, William H. Sanders:
On Low-Cost Error Containment and Recovery Methods for Guarded Software Upgrading. ICDCS 2000: 548-555 - [c31]Ramesh Chandra, Michel Cukier, Ryan M. Lefever, William H. Sanders:
Dynamic Node Management and Measure Estimation in a State-Driven Fault Injector. SRDS 2000: 248-257
1990 – 1999
- 1999
- [j18]W. Douglas Obal II, William H. Sanders:
State-Space Support for Path-Based Reward Variables. Perform. Evaluation 35(3-4): 233-251 (1999) - [j17]Catherine Meadows, William H. Sanders:
Guest Editorial: Introduction to the Special Section - Dependable Computing for Critical Applications (DCCA-6). IEEE Trans. Software Eng. 25(5): 601-602 (1999) - [c30]Jennifer Ren, Michel Cukier, Paul Rubel, William H. Sanders, David E. Bakken, David A. Karr:
Building Dependable Distributed Applications Using AQUA. HASE 1999: 189-196 - [c29]William H. Sanders:
Integrated frameworks for multi-level and multi-formalism modeling. PNPM 1999: 2-9 - [c28]Daniel D. Deavours, William H. Sanders:
An efficient well-specified check. PNPM 1999: 124-133 - [c27]Michel Cukier, Ramesh Chandra, David Henke, Jessica Pistole, William H. Sanders:
Fault Injection based on a Partial View of the Global State of a Distributed System. SRDS 1999: 168-177 - 1998
- [j16]Daniel D. Deavours, William H. Sanders:
An Efficient Disk-Based Tool for Solving Large Markov Models. Perform. Evaluation 33(1): 67-84 (1998) - [j15]Latha A. Kant, William H. Sanders:
Performance Analysis of the Knockout Switch Under Bursty Traffic Based on a Stochastic Activity Network Model. Simul. 70(1): 19-33 (1998) - [j14]Daniel D. Deavours, William H. Sanders:
"On-the-Fly'' Solution Techniques for Stochastic Petri Nets and Extensions. IEEE Trans. Software Eng. 24(10): 889-902 (1998) - [c26]Michel Cukier, Jennifer Ren, Chetan Sabnis, David Henke, Jessica Pistole, William H. Sanders, David E. Bakken, Mark E. Berman, David A. Karr, Richard E. Schantz:
AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects. SRDS 1998: 245-253 - 1997
- [c25]Daniel D. Deavours, William H. Sanders:
An Efficient Disk-Based Tool for Solving Very Large Markov Models. Computer Performance Evaluation 1997: 58-71 - [c24]Daniel D. Deavours, William H. Sanders:
"On-the-fly" solution techniques for stochastic Petri nets and extensions. PNPM 1997: 132-141 - [c23]Harpreet S. Duggal, Michel Cukier, William H. Sanders:
Probabilistic Verification of a Synchronous Round-Based Consensus Protocol. SRDS 1997: 165-174 - 1996
- [j13]Luai M. Malhis, William H. Sanders, Richard D. Schlichting:
Numerical performability evaluation of a group multicast protocol. Distributed Syst. Eng. 3(1): 39-52 (1996) - [j12]Luai M. Malhis, William H. Sanders:
An Efficient Two-Stage Iterative Method for the Steady-State Analysis of Markov Regenerative Stochastic Petri Net Models. Perform. Evaluation 27/28(4): 583-601 (1996) - [j11]Muhammad A. Qureshi, William H. Sanders, Aad P. A. van Moorsel, Reinhard German:
Algorithms for the Generation of State-Level Representations of Stochastic Activity Networks with General Reward Structures. IEEE Trans. Software Eng. 22(9): 603-614 (1996) - [c22]Aad P. A. van Moorsel, Latha A. Kant, William H. Sanders:
Computation of the Asymptotic Bias and Variance for Simulation of Markov Reward Models. Annual Simulation Symposium 1996: 173-182 - [c21]Reinhard German, Aad P. A. van Moorsel, Muhammad A. Qureshi, William H. Sanders:
Expected Impulsive Rewards in Markov Regenerative Stochastic Petri Nets. Application and Theory of Petri Nets 1996: 172-191 - [c20]Muhammad A. Qureshi, William H. Sanders:
A New Methodology for Calculating Distributions of Reward Accumulated During a Finite Interval. FTCS 1996: 116-125 - [c19]Wilkey Richardson, Mary L. Bailey, William H. Sanders:
Using ZPL to Develop a Parallel Chaos Router Simulator. WSC 1996: 809-816 - 1995
- [j10]William H. Sanders, W. Douglas Obal II, Muhammad A. Qureshi, F. K. Widjanarko:
The UltraSAN Modeling Environment. Perform. Evaluation 24(1-2): 89-115 (1995) - [c18]Latha A. Kant, William H. Sanders:
Loss process analysis of the knockout switch using stochastic activity networks. ICCCN 1995: 344 - [c17]Muhammad A. Qureshi, William H. Sanders:
The Effect of Workload on the Performance and Availability of Voting Algorithms. MASCOTS 1995: 217-224 - [c16]Luai M. Malhis, William H. Sanders, Richard D. Schlichting:
Numerical evaluation of a group-oriented multicast protocol using stochastic activity networks. PNPM 1995: 63-72 - [c15]Muhammad A. Qureshi, William H. Sanders, Aad P. A. van Moorsel, Reinhard German:
Algorithms for the generation of state-level representations of stochastic activity networks with general reward structures. PNPM 1995: 180-190 - [c14]Daniel D. Deavours, W. Douglas Obal II, Muhammad A. Qureshi, William H. Sanders, Aad P. A. van Moorsel:
UltraSAN version 3 overview. PNPM 1995: 216-217 - 1994
- [j9]Muhammad A. Qureshi, William H. Sanders:
Reward Model Solution Methods with Impulse and Rate Rewards: An Algorithm and Numerical Results. Perform. Evaluation 20(4): 413-436 (1994) - [j8]W. Douglas Obal II, William H. Sanders:
Importance Sampling Simulation in UltraSAN. Simul. 62(2): 98-111 (1994) - [c13]W. Douglas Obal II, William H. Sanders:
An Environment for Importance Sampling Based on Stochastic Activity Networks. SRDS 1994: 64-73 - 1993
- [j7]Bernard P. Zeigler, William H. Sanders:
Frameworks for evaluating discrete event dynamic systems. Discret. Event Dyn. Syst. 3(2-3): 113-118 (1993) - [j6]William H. Sanders, Roberto S. Freire:
Efficient simulation of hierarchical stochastic activity network models. Discret. Event Dyn. Syst. 3(2-3): 271-299 (1993) - [j5]William H. Sanders, Latha A. Kant, Abhijit S. Kudrimoti:
A modular method for evaluating the performance of picture archiving and communication systems. J. Digit. Imaging 6(3): 172-193 (1993) - [j4]William H. Sanders, Ralph Martinez, Yasser H. Alsafadi, Jiseung Nam:
Performance evaluation of a picture archiving and communication network using stochastic activity networks. IEEE Trans. Medical Imaging 12(1): 19-29 (1993) - [c12]William H. Sanders, W. Douglas Obal II:
Dependability Evaluation Using UltraSAN. FTCS 1993: 674-679 - 1992
- [j3]William H. Sanders, Luai M. Malhis:
Dependability Evaluation Using Composed SAN-Based Reward Models. J. Parallel Distributed Comput. 15(3): 238-254 (1992) - [c11]Abhijit S. Kudrimoti, William H. Sanders:
A modular method for evaluating the performance of picture archiving and communication systems. CBMS 1992: 44-53 - [c10]William H. Sanders:
Recently asked questions (RAQS). SIGUCCS 1992: 205-207 - 1991
- [j2]William H. Sanders, John F. Meyer:
Reduced Base Model Construction Methods for Stochastic Activity Networks. IEEE J. Sel. Areas Commun. 9(1): 25-36 (1991) - [j1]Joseph A. Couvillion, Roberto S. Freire, Ron Johnson, W. Douglas Obal II, Muhammad A. Qureshi, Manish Rai, William H. Sanders, Janet E. Tvedt:
Performability Modeling with UltraSAN. IEEE Softw. 8(5): 69-80 (1991) - [c9]Joseph A. Couvillion, Roberto S. Freire, Ron Johnson, W. Douglas Obal II, Muhammad A. Qureshi, Manish Rai, William H. Sanders, Janet E. Tvedt:
Performability Modeling with UltraSAN. PNPM 1991: 290-299 - [c8]Kevin H. Prodromides, William H. Sanders:
Performability Evaluation of CASMA/CD and CASMA/DCR Protocols under Transient Fault Conditions. SRDS 1991: 166-176
1980 – 1989
- 1989
- [c7]John F. Meyer, K. H. Muralidhar, William H. Sanders:
Performability of a token bus network under transient fault conditions. FTCS 1989: 175-182 - [c6]William H. Sanders, John F. Meyer:
Reduced Base Model Construction Methods for Stochastic Activity Networks. PNPM 1989: 74-84 - [c5]Joanne Bechta Dugan, Dan C. Marinescu, Giovanni Chiola, Yoshio Sugasawa, William H. Sanders, Gianfranco Ciardo:
Panel: Applications of Performance Petri Nets. PNPM 1989: 164 - 1988
- [b1]William H. Sanders:
Construction and solution of performability models based on stochastic activity networks. University of Michigan, USA, 1988 - 1987
- [c4]William H. Sanders, John F. Meyer:
Performance Variable Driven Construction Methods for Stochastic Activity Networks. Computer Performance and Reliability 1987: 383-398 - [c3]William H. Sanders, John F. Meyer:
Performability Evaluation of Distributed Systems Using Stochastic Activity Networks. PNPM 1987: 111-125 - 1986
- [c2]William H. Sanders, John F. Meyer:
METASAN: A Performability Evaluation Tool Based on Stochastic Acitivity Networks. FJCC 1986: 807-816 - 1985
- [c1]John F. Meyer, Ali Movaghar, William H. Sanders:
Stochastic Activity Networks: Structure, Behavior, and Application. PNPM 1985: 106-115
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint