RENDEZVOUS: Self-Organizing Services in an Active Network

David J Wetherall , Thomas E Anderson , WASHINGTON UNIV SEATTLE DEPT OF COMPUTER SCIENCE AND ENGINEERING
Defense Technical Information Center

1
2004
Testi di riferimento

Alessio Plebe , Melchiorre Monaca , Andrew S Tanenbaum , David J Wetherall

A survey of active network research

David L Tennenhouse , Jonathan M Smith , W David Sincoskie , David J Wetherall
IEEE Communications Magazine 35 ( 1) 80 -86

1,353
1997
ªA Survey of Active Network Research, º IEEE Comm

David L Tennenhouse , Jonathan M Smith , W David Sincoskie , David J Wetherall
Magazine 35 ( 1) 80 -86

7
1997
Balancing privacy and functionality of third-party social widgets

FRANZISKA Roesner , CHRISTOPHER Rovillos , TADAYOSHI Kohno , DAVID Wetherall
USENIX Magazine

3
2012
Enforceable Network Protocols

Tom Anderson , David Wetherall PIs
Slide Presentation, DARPA FTN PI Meet 10

1
2002
2011
802.11 User Fingerprinting

Jeffrey Pang1 Ben Greenstein2 Ramakrishna Gummadi , Srinivasan Seshan1 David Wetherall

Dewdrop: an energy-aware runtime for computational RFID

David Wetherall , Michael Buettner , Ben Greenstein
networked systems design and implementation 197 -210

105
2011
How speedy is SPDY

David Wetherall , Arvind Krishnamurthy , Xiao Sophia Wang , Aruna Balasubramanian
networked systems design and implementation 387 -399

113
2014
Interference Cancellation: Better Receivers for a New Wireless MAC.

Daniel Halperin , David Wetherall , Thomas E. Anderson , M. Josie Ammer
HotNets

44
2007
Demystifying 802.11n power consumption

Daniel Halperin , David Wetherall , Anmol Sheth , Ben Greenstein
international conference on power aware computing and systems 1

294
2010
Towards Coordinated Interdomain Traffic Engineering

David Wetherall , Ratul Mahajan , Thomas Anderson
HotNets

30
2004
Reducing network energy consumption via sleeping and rate-adaptation

Sylvia Ratnasamy , Sergiu Nedevschi , David Wetherall , Lucian Popa
networked systems design and implementation 323 -336

923
2008
Alpine: a user-level infrastructure for network protocol development

David Wetherall , Stefan Savage , David Ely
usenix symposium on internet technologies and systems 15 -15

70
2001
Programming for Pervasive Computing Environments

Gaetano Borriello , Brian Bershad , Janet Davis , Steven Gribble

69
2001
Passport: secure and adoptable source authentication

David Wetherall , Xin Liu , Xiaowei Yang , Ang Li
networked systems design and implementation 365 -378

131
2008
The Network Oracle.

Vern Paxson , Scott Shenker , Timothy Roscoe , Joseph M. Hellerstein
IEEE Data(base) Engineering Bulletin 28 3 -10

9
2005
Brahmastra: driving apps to test the security of third-party components

Tanzirul Azim , Ravi Bhoraskar , David Wetherall , Jaeyeon Jung
usenix security symposium 1021 -1036

89
2014
Can Ferris Bueller still have his day off? protecting privacy in the wireless era

Ramakrishna Gummadi , David Wetherall , Jeffrey Pang , Srinivasan Seshan
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems 10

23
2007