Publications

Found 9 results
Author Title [ Type(Desc)] Year
Filters: Author is Volker Roth  [Clear All Filters]
Conference Paper
Roth, V. (2002).  Empowering mobile software agents. Proceedings 6th IEEE Mobile Agents Conference.
Roth, V., & Arnold M.. (2002).  Improved Key Management for Digital Watermark Monitoring. Proceedings of SPIE.
Subramanian, L., Roth V., Stoica I., Shenker S. J., & Katz R. H. (2004).  Listen and Whisper: Security Mechanisms for BGP. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 127-140.
Pinsdorf, U.., & Roth V. (2002).  Mobile Agent Interoperability Patterns and Practice. Proceedings Ninth Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems.
Zagordi, O., Töpfer A., Prabhakaran S., Roth V., Halperin E., & Beerenwinkel N. (2012).  Probabilistic Inference of Viral Quasispecies Subject to Recombination. 342-354.
Subramanian, L., Katz R. H., Roth V., Shenker S. J., & Stoica I. (2005).  Reliable Broadcast in Unknown Fixed-Identity Networks. Proceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC 2005). 342-351.
Binder, W.., & Roth V. (2002).  Secure Mobile Agent Systems Using Java - Where Are We Heading?. Proceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS).