Princeton University
|
Princeton Engineering
Academics
Course Schedule
Course Catalog
Graduate Program
Undergraduate Programs
Interdisciplinary Programs
Research
Research Areas
Research Projects
Public Lectures and Colloquia
Technical Reports
People
Faculty
Researchers
Technical Staff
Administrative Staff
Graduate Students
Undergraduate Students
Alumni/ae
Connect
Collaborations
Industrial Affiliates
Libraries
Jobs
About
Contact Us
News and Events
Department Information
Visit Us
Home
::
Research
::
Technical Reports
::
Felten, Edward W.
Technical Reports
Display by Author:
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
| U |
V
|
W
|
X
|
Y
|
Z
Search by
Report Title
Author
Year
TR Number
for:
30 matches found for
Felten, Edward W.
:
Felten, Edward W.
Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer
, TR-437-93, November 1993
Application-Controlled File Caching Policies
, TR-445-94, February 1994
Implementation and Performance of Application-Controlled File Caching
, TR-462-94, June 1994
A Study of Integrated Prefetching and Caching Strategies
, TR-479-94, December 1994
Implementation and Performance of Integrated Application-Controlled Caching, Prefetching and Disk Scheduling
, TR-493-95, July 1995
Design and Implementation of NX Message Passing Using SHRIMP Virtual Memory Mapped Communication
, TR-507-96, January 1996
Contention and Queueing in an Experimental Multicomputer: Analytical and Simulation-based Results
, TR-508-96, January 1996
Early Experience with Message-Passing on the SHRIMP Multicomputer
, TR-510-96, January 1996
Fast RPC on the SHRIMP Virtual Memory Mapped Network Interface
, TR-512-96, March 1996
Stream Sockets on SHRIMP
, TR-513-96, February 1996
Improving Release-Consistent Shared Virtual Memory using Automatic Update
, TR-518-96, March 1996
Simplifying Distributed File Systems Using a Shared Logical Disk
, TR-524-96, October 1996
Reducing Waiting Costs in User-Level Communication
, TR-525-96, September 1996
Mobile Network Objects
, TR-534-96, October 1996
Web Spoofing: An Internet Con Game
, TR-540-96, December 1996
Extensible Security Architectures for Java
, TR-546-97, April 1997
Java Security: Web Browsers and Beyond
, TR-566-97, February 1997
A Java Filter
, TR-567-97, December 1997
Software Support for Virtual Memory-Mapped Communication
, TR-571-96, April 1996
Protected, User-level DMA for the SHRIMP Network Interface
, TR-572-95, December 1995
Mechanisms for Secure Modular Programming in Java
, TR-603-99, July 1999
Design, Analysis, Implementation and Performance of An Archipelagic File System
, TR-610-99, October 1999
Technological Access Control Interferes with Noninfringing Scholarship
, TR-617-00, February 2000
Query Affinity in Internet Applications
, TR-621-00, December 2000
Models for Security Policies in Proof-Carrying Code
, TR-636-01, March 2001
A Proof-Carrying Authorization System
, TR-638-01, April 2001
Reading Between the Lines: Lessons from the SDMI Challenge
, TR-657-02, July 2002
Scan-Based Scheduling and Layout in a Reliable Write-Optimized File System
, TR-661-02, August 2002
Secure, Private Proofs of Location
, TR-667-03, January 2003
Puzzle Outsourcing for IP-Level DoS Resistance
, TR-700-04, May 2004