default search action
Carl H. Hauser
Person information
- affiliation: Xerox
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j8]David Anderson, Theo Gkountouvas, Ming Meng, Ken Birman, Anjan Bose, Carl Hauser, Eugene Litvinov, Xiaochuan Luo, Qiang Zhang:
GridCloud: Infrastructure for Cloud-Based Wide Area Monitoring of Bulk Electric Power Grids. IEEE Trans. Smart Grid 10(2): 2170-2179 (2019) - 2018
- [j7]Helen N. Catanese, Carl Hauser, Assefaw Hadish Gebremedhin:
Evaluation of native and transfer students' success in a computer science course. Inroads 9(2): 53-57 (2018) - 2017
- [j6]Loucas Papadakis, Carl Hauser:
Experimental and computational appraisal of the shape accuracy of a thin-walled virole aero-engine casing manufactured by means of laser metal deposition. Prod. Eng. 11(4-5): 389-399 (2017) - 2016
- [j5]Yujue Wang, Thoshitha T. Gamage, Carl H. Hauser:
Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication. IEEE Trans. Smart Grid 7(2): 807-816 (2016) - [c33]Yujue Wang, Carl H. Hauser, Yiming Wu:
Quantifying Uncertainties of Security and QoS for Design of Power Grid Communications Systems. HICSS 2016: 2566-2575 - 2014
- [p1]Thoshitha T. Gamage, David Anderson, David E. Bakken, Kenneth P. Birman, Anjan Bose, Carl Hauser, Ketan Maheshwari, Robbert van Renesse:
Mission-Critical Cloud Computing for Critical Infrastructures. Smart Grids 2014: 1-16 - 2013
- [c32]Kelsey Cairns, Thoshitha T. Gamage, Carl Hauser:
Efficient targeted key subset retrieval in fractal hash sequences. CCS 2013: 1273-1284 - [c31]Kamyab Karimi, Carl Hauser:
Internet Unite-and-Conquer architecture. ICITST 2013: 219-230 - [c30]Kelsey Cairns, Carl Hauser, Thoshitha T. Gamage:
Flexible data authentication evaluated for the smart grid. SmartGridComm 2013: 492-497 - 2012
- [c29]Carl H. Hauser, Thanigainathan Manivannan, David E. Bakken:
Evaluating Multicast Message Authentication Protocols for Use in Wide Area Power Grid Data Delivery Services. HICSS 2012: 2151-2158 - [c28]Carl H. Hauser:
Trust research to address uncertainty in security for the smart grid. ISGT 2012: 1-2 - 2011
- [j4]David E. Bakken, Anjan Bose, Carl H. Hauser, David E. Whitehead, Gregary C. Zweigle:
Smart Generation and Transmission With Coherent, Real-Time Data. Proc. IEEE 99(6): 928-951 (2011) - [c27]K. Harald Gjermundrød, Carl Hauser, David E. Bakken:
Scalable Wide-Area Multicast with Temporal Rate Filtering Distribution Framework. CIT 2011: 1-8 - [c26]Yuko Murayama, Carl Hauser, Yasuhiro Fujihara, Dai Nishioka, Atushi Inoue:
The Comparison Study between the US and Japan on the Sense of Security, Anshin, with Non-Computer-Science Students. HICSS 2011: 1-9 - [c25]Yujue Wang, Carl Hauser:
An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making. Critical Infrastructure Protection 2011: 125-135 - 2010
- [j3]Rasika Chakravarthy, Carl H. Hauser, David E. Bakken:
Long-lived authentication protocols for process control systems. Int. J. Crit. Infrastructure Prot. 3(3-4): 174-181 (2010) - [c24]Erlend S. Viddal, David E. Bakken, K. Harald Gjermundrød, Carl H. Hauser:
Wide-Area Actuator RPC over GridStat with Timeliness, Redundancy, and Safety. CISIS 2010: 17-24 - [c23]Daniel Germanus, Ioanna Dionysiou, K. Harald Gjermundrød, Abdelmajid Khelil, Neeraj Suri, David E. Bakken, Carl Hauser:
Leveraging the next-generation power grid: Data sharing and associated partnerships. ISGT Europe 2010: 1-8
2000 – 2009
- 2009
- [c22]Erik Solum, Carl Hauser, Rasika Chakravarthy, David E. Bakken:
Modular over-the-wire configurable security for long-lived critical infrastructure monitoring systems. DEBS 2009 - [c21]Yuko Murayama, Yasuhiro Fujihara, Dai Nishioka, Carl H. Hauser, Atushi Inoue:
Anshin as Emotional Trust: A Comparison Study between U.S. and Japanese Non-computer-science Students. SAINT 2009: 161-164 - 2008
- [j2]Carl H. Hauser, David E. Bakken, Ioanna Dionysiou, K. Harald Gjermundrød, Venkata S. Irava, Joel Helkey, Anjan Bose:
Security, trust, and QoS in next-generation control and communication for large power systems. Int. J. Crit. Infrastructures 4(1/2): 3-16 (2008) - [c20]Ioanna Dionysiou, David E. Bakken, Carl H. Hauser, Deborah A. Frincke:
Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities. SECRYPT 2008: 546-553 - 2007
- [c19]Yuko Murayama, Natsuko Hikage, Yasuhiro Fujihara, Carl Hauser:
The Structure of the Sense of Security, Anshin. CRITIS 2007: 83-93 - [c18]Ioanna Dionysiou, Deborah A. Frincke, David E. Bakken, Carl Hauser:
An Approach to Trust Management Challenges for Critical Infrastructures. CRITIS 2007: 173-184 - [c17]Carl Hauser:
Minitrack: Cyber Security. HICSS 2007: 114 - [c16]Wei Fu, Carl Hauser:
Modeling Real-time Garbage Collection Cost. RTCSA 2007: 217-225 - [c15]Natsuko Hikage, Yuko Murayama, Carl Hauser:
Exploratory survey on an Evaluation Model for a Sense of Security. SEC 2007: 121-132 - 2006
- [c14]Ryan A. Johnston, Carl H. Hauser, K. Harald Gjermundrød, David E. Bakken:
Distributing Time-Synchronous Phasor Measurement Data Using the GridStat Communication Infrastructure. HICSS 2006 - [c13]Yuko Murayama, Natsuko Hikage, Carl Hauser, Basabi Chakraborty, Norihisa Segawa:
An Anshin Model for the Evaluation of the Sense of Security. HICSS 2006 - 2005
- [c12]Venkata S. Irava, Carl H. Hauser:
Survivable low-cost low-delay multicast trees. GLOBECOM 2005: 6 - [c11]Ovidiu Valentin Drugan, Ioanna Dionysiou, David E. Bakken, Thomas Plagemann, Carl H. Hauser, Deborah A. Frincke:
On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management. ISAS 2005: 149-163 - [c10]Wei Fu, Carl Hauser:
A Real-Time Garbage Collection Framework for Embedded Systems. SCOPES 2005: 20-26 - 2004
- [c9]Carl H. Hauser, David B. Benson:
On the Practicality and Desirability of Highly-concurrent, Mostly-functional Programming. ACSD 2004: 115-124
1990 – 1999
- 1995
- [c8]Douglas B. Terry, Marvin Theimer, Karin Petersen, Alan J. Demers, Mike Spreitzer, Carl Hauser:
Managing Update Conflicts in Bayou, a Weakly Connected Replicated Storage System. SOSP 1995: 172-183 - 1994
- [c7]Carl H. Hauser:
Speeding Up UNIX Login by Caching the Initial Environment. LISA 1994 - 1993
- [c6]Carl Hauser, Christian Jacobi, Marvin Theimer, Brent B. Welch, Mark D. Weiser:
Using Threads in Interactive Systems: A Case Study. SOSP 1993: 94-105
1980 – 1989
- 1989
- [c5]Russell R. Atkinson, Alan J. Demers, Carl Hauser, Christian Jacobi, Peter Kessler, Mark D. Weiser:
Experiences Creating a Portable Cedar. PLDI 1989: 322-329 - [c4]Mark D. Weiser, Alan J. Demers, Carl Hauser:
The Portable Common Runtime Approach to Interoperability. SOSP 1989: 114-122 - 1988
- [j1]Alan J. Demers, Daniel H. Greene, Carl Hauser, Wes Irish, John Larson, Scott Shenker, Howard E. Sturgis, Daniel C. Swinehart, Douglas B. Terry:
Epidemic Algorithms for Replicated Database Maintenance. ACM SIGOPS Oper. Syst. Rev. 22(1): 8-32 (1988) - 1987
- [c3]Alan J. Demers, Daniel H. Greene, Carl Hauser, Wes Irish, John Larson, Scott Shenker, Howard E. Sturgis, Daniel C. Swinehart, Douglas B. Terry:
Epidemic Algorithms for Replicated Database Maintenance. PODC 1987: 1-12 - 1983
- [c2]Mohammed Olumi, Gio Wiederhold, Carl Hauser, Peter Lucas, James W. Mehl:
Software Project Databases. Databases for Business and Office Applications 1983: 124-134 - 1982
- [c1]Sten Andler, I. Ding, Kapali P. Eswaran, Carl Hauser, Won Kim, James W. Mehl, R. Williams:
System D: A Distributed System for Availability. VLDB 1982: 33-44 - 1980
- [b1]Carl Hauser:
Specification and Verification of Communication in Parallel Systems. Cornell University, USA, 1980
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint