default search action
Nayeem Islam
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j17]Elisa Bertino, Nayeem Islam:
Botnets and Internet of Things Security. Computer 50(2): 76-79 (2017) - [j16]Nayeem Islam, Saumitra Das, Yin Chen:
On-Device Mobile Phone Security Exploits Machine Learning. IEEE Pervasive Comput. 16(2): 92-96 (2017) - 2014
- [j15]Nayeem Islam, Roy Want:
Smartphones: Past, Present, and Future. IEEE Pervasive Comput. 13(4): 89-92 (2014)
2000 – 2009
- 2007
- [j14]Ajay Chander, David Espinosa, Nayeem Islam, Peter Lee, George C. Necula:
Enforcing resource bounds via static verification of dynamic checks. ACM Trans. Program. Lang. Syst. 29(5): 28 (2007) - [c26]Dachuan Yu, Ajay Chander, Nayeem Islam, Igor Serikov:
JavaScript instrumentation for browser security. POPL 2007: 237-249 - 2006
- [c25]Dachuan Yu, Nayeem Islam:
A Typed Assembly Language for Confidentiality. ESOP 2006: 162-179 - [r1]Nayeem Islam, Manuel Román, Dong Zhou:
Middleware Support for Autonomous Cellphones. The Handbook of Mobile Middleware 2006: 1137-1168 - 2005
- [j13]Manuel Román, Nayeem Islam, Shahid Shoaib:
A wireless Web for creating and sharing personal content through handsets. IEEE Pervasive Comput. 4(2): 67-73 (2005) - [c24]Ajay Chander, David Espinosa, Nayeem Islam, Peter Lee, George C. Necula:
JVer: A Java Verifier. CAV 2005: 144-147 - [c23]Jun Sun, Wanghong Yuan, Mahesh Kallahalla, Nayeem Islam:
HAIL: a language for easy and correct device access. EMSOFT 2005: 1-9 - [c22]Ajay Chander, David Espinosa, Nayeem Islam, Peter Lee, George C. Necula:
Enforcing Resource Bounds via Static Verification of Dynamic Checks. ESOP 2005: 311-325 - 2004
- [j12]Nayeem Islam:
From Smart to Autonomous Phones. IEEE Pervasive Comput. 3(3): 102-104 (2004) - [c21]Manuel Román, Nayeem Islam:
Dynamically Programmable and Reconfigurable Middleware Services. Middleware 2004: 372-396 - [c20]Nayeem Islam, Dong Zhou, Shahid Shoaib, Ali Ismael, Sajithkumar Kizhakkiniyil:
AOE: A Mobile Operating Environment for Web-Based Applications. SAINT 2004: 15-24 - [c19]Dong Zhou, Nayeem Islam, Ali Ismael:
Flexible on-device service object replication with replets. WWW 2004: 131-142 - 2003
- [j11]Nayeem Islam, Mohamed E. Fayad:
Toward ubiquitous acceptance of ubiquitous computing. Commun. ACM 46(2): 89-92 (2003) - 2002
- [c18]Henry Song, Hao-Hua Chu, Nayeem Islam, Shoji Kurakake, Masaji Katagiri:
Browser State Repository Service. Pervasive 2002: 253-266
1990 – 1999
- 1999
- [j10]Trent Jaeger, Atul Prakash, Jochen Liedtke, Nayeem Islam:
Flexible Control of Downloaded Executable Content. ACM Trans. Inf. Syst. Secur. 2(2): 177-228 (1999) - [c17]James Beck, Alain Gefflaut, Nayeem Islam:
MOCA: A Service Framework for Mobile Computing Devices. MobiDE 1999: 62-68 - 1998
- [c16]Trent Jaeger, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park, Nayeem Islam:
Security architecture for component-based operating systems. ACM SIGOPS European Workshop 1998: 222-228 - [c15]Jochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, Yoonho Park:
An unconventional proposal: using the x86 architecture as the ubiquitous virtual standard architecture. ACM SIGOPS European Workshop 1998: 237-241 - [c14]Jochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, Yoonho Park:
Irreproducible benchmarks might be sometimes helpful. ACM SIGOPS European Workshop 1998: 242-246 - [c13]Jochen Liedtke, Vsevolod Panteleenko, Trent Jaeger, Nayeem Islam:
High-Performance Caching With The Lava Hit-Server. USENIX ATC 1998 - [c12]Trent Jaeger, Jochen Liedtke, Nayeem Islam:
Operating System Protection for Fine-Grained Programs. USENIX Security Symposium 1998 - 1997
- [j9]Nayeem Islam:
Customizing System Software Using OO Frameworks. Computer 30(2): 69-78 (1997) - [j8]Nayeem Islam:
Customized Message Passing. J. Parallel Distributed Comput. 41(2): 205-224 (1997) - [j7]Nayeem Islam, Rangachari Anand, Trent Jaeger, Josyula R. Rao:
A Flexible Security System for Using Internet Content. IEEE Softw. 14(5): 52-59 (1997) - [c11]Jochen Liedtke, Kevin Elphinstone, Sebastian Schönberg, Hermann Härtig, Gernot Heiser, Nayeem Islam, Trent Jaeger:
Achieved IPC Performance. Workshop on Hot Topics in Operating Systems 1997: 28-31 - [c10]Jochen Liedtke, Nayeem Islam, Trent Jaeger:
Preventing Denial-of-Service Attacks on a µ-Kernel for WebOSes. Workshop on Hot Topics in Operating Systems 1997: 73-79 - [c9]Nayeem Islam, Andreas L. Prodromidis, Mark S. Squillante, Ajei S. Gopal, Liana L. Fong:
Extensible Resource Management for Cluster Computing. ICDCS 1997: 561-568 - [c8]Nayeem Islam, Andreas L. Prodromidis, Mark S. Squillante, Ajei S. Gopal, Liana L. Fong:
Extensible Resource Scheduling for Parallel Scientific Applications. PP 1997 - [c7]Trent Jaeger, Frederique Giraud, Nayeem Islam, Jochen Liedtke:
A role-based access control model for protection domain derivation and management. ACM Workshop on Role-Based Access Control 1997: 95-106 - [c6]Rangachari Anand, Nayeem Islam, Trent Jaeger, Josyula R. Rao:
A Flexible Security Model for Using Internet Content. SRDS 1997: 89-96 - 1996
- [b1]Nayeem Islam:
Distributed objects - methodologies for customizing systems software. IEEE 1996, ISBN 978-0-8186-7193-7, pp. I-XXII, 1-206 - [j6]Nayeem Islam, Roy H. Campbell:
Latest Developments in Operating Systems (Introduction to the Special Section). Commun. ACM 39(9): 38-40 (1996) - [j5]Nayeem Islam, Murthy V. Devarakonda:
An Essential Design Pattern for Fault-Tolerant Distributed State Sharing. Commun. ACM 39(10): 65-74 (1996) - [c5]Nayeem Islam, Amitabh Dave, Roy H. Campbell:
Communication Compilation for Unreliable Networks. ICDCS 1996: 188-195 - [c4]Nayeem Islam, Andreas L. Prodromidis, Mark S. Squillante:
Dynamic Partitioning in Different Distributed-Memory Environments. JSSPP 1996: 244-270 - 1995
- [c3]Nayeem Islam, Roy H. Campbell:
Techniques for Global Optimization of Message Passing Communication on Unreliable Networks. ICDCS 1995: 246-253 - 1994
- [c2]Amitabh Dave, Nayeem Islam, Roy H. Campbell:
A low-latency scalable locking algorithm for shared memory multiprocessors. SPDP 1994: 10-17 - 1993
- [j4]Roy H. Campbell, Nayeem Islam, David Raila, Peter Madany:
Designing and Implementing Choices: An Object-Oriented System in C++. Commun. ACM 36(9): 117-126 (1993) - [j3]Roy H. Campbell, Nayeem Islam:
A Technique for Documenting the Framework of an Object-Oriented System. Comput. Syst. 6(4): 363-389 (1993) - [c1]Nayeem Islam, Roy H. Campbell:
Uniform Co-Scheduling Using Object-Oriented Design Techniques. Decentralized and Distributed Systems 1993: 317-328 - 1992
- [j2]Roy H. Campbell, Nayeem Islam, Peter Madany:
Choices, Frameworks and Refinement. Comput. Syst. 5(3): 217-257 (1992) - [j1]Nayeem Islam, Roy H. Campbell:
Design Considerations for Shared Memory Multiprocessor Message Systems. IEEE Trans. Parallel Distributed Syst. 3(6): 702-711 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint