Next:
Publications
Previous:
Research Grants
Up:
Vita
Home: Simon S. Lam
- Atomic Predicates for Transformers (2015) and AP Verifier
(2013), tools for scalable verification of packet network properties based
upon our atomic predicates idea (publications;
software downloads:
networks without packet transformers,
networks with packet transformers). This work has been re-implemented by
Google for verifying its virtual private clouds.
- COVE (2014), a tool based upon formal methods for automating the exchange of
reachability information in the Internet data plane between networks (publication)
- ROME (2012), architecture and protocols (host discovery, routing, and multicast) for a
scalable and resilient layer-2 network (publication)
- ACE (2008), protocols for a dynamic set of p2p nodes to construct
and maintain a distributed Delaunay triangulation for greedy routing in
a d-dimensional Euclidean space (publication)
- Silk (2004), a resilient, scalable routing fabric for p2p networks
that use hypercube routing (technical report)
- Keystone (1999), a scalable group key management service based upon
the key tree idea
(publication)
- FlowSign (1999), efficient digital signature service for packet
flows and multicasts
(publication)
- Secure
Network Programming (SNP) (1993), the first secure sockets layer for Internet applications
(more info);
winner of 2004 ACM Software
System Award
- PROSPEC (1985), one of the earliest tools for interactive protocol
specification and verification with a graphical user interface
(publication)