Improving wireless privacy with an identifier-free link layer protocol

Ben Greenstein , Damon McCoy , Jeffrey Pang , Tadayoshi Kohno
Proceeding of the 6th international conference on Mobile systems, applications, and services - MobiSys '08 40 -53

124
2008
Upgrading transport protocols using untrusted mobile code

Parveen Patel , Andrew Whitaker , David Wetherall , Jay Lepreau
symposium on operating systems principles 37 ( 5) 1 -14

54
2003
Towards IP geolocation using delay and topology measurements

Ethan Katz-Bassett , John P. John , Arvind Krishnamurthy , David Wetherall
internet measurement conference 71 -84

262
2006
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default

Barath Raghavan , Tadayoshi Kohno , Alex C. Snoeren , David Wetherall
privacy enhancing technologies 143 -163

35
2009
Guest Editorial: Special Section on Outstanding Papers from MobiSys 2011

Marco Gruteser , David Wetherall
IEEE Transactions on Mobile Computing 11 ( 5) 705 -706

2012
RFID sensor networks with the intel WISP

Michael Buettner , Richa Prasad , Alanson Sample , Daniel Yeager
Proceedings of the 6th ACM conference on Embedded network sensor systems - SenSys '08 393 -394

95
2008
TIMELY: RTT-based Congestion Control for the Datacenter

Radhika Mittal , Vinh The Lam , Nandita Dukkipati , Emily Blem
acm special interest group on data communication 45 ( 4) 537 -550

469
2015
Understanding and mitigating the impact of RF interference on 802.11 networks

Ramakrishna Gummadi , David Wetherall , Ben Greenstein , Srinivasan Seshan
Computer Communication Review

70
2007
Tool release: gathering 802.11n traces with channel state information

Daniel Halperin , Wenjun Hu , Anmol Sheth , David Wetherall
acm special interest group on data communication 41 ( 1) 53 -53

1,473
2011
The ViewStation project (demonstration): computer-participative media applications

David Tennenhouse , Joel Adam , Chris Lindblad , William Stasior
acm multimedia 464

1994
802.11 with multiple antennas for dummies

Daniel Halperin , Wenjun Hu , Anmol Sheth , David Wetherall
ACM SIGCOMM Computer Communication Review 40 ( 1) 19 -25

128
2010
Staying online while mobile: the hidden costs

Andrius Aucinas , Narseo Vallina-Rodriguez , Yan Grunenberger , Vijay Erramilli
conference on emerging network experiment and technology 315 -320

41
2013
Expressive privacy control with pseudonyms

Seungyeop Han , Vincent Liu , Qifan Pu , Simon Peter
Computer Communication Review

4
2013
Recognizing daily activities with RFID-based sensors

Michael Buettner , Richa Prasad , Matthai Philipose , David Wetherall
ubiquitous computing 51 -60

392
2009
TCP congestion control with a misbehaving receiver

Stefan Savage , Neal Cardwell , David Wetherall , Tom Anderson
ACM SIGCOMM Computer Communication Review 29 ( 5) 71 -78

213
1999
GlimpseData: towards continuous vision-based personal analytics

Seungyeop Han , Rajalakshmi Nandakumar , Matthai Philipose , Arvind Krishnamurthy
workshop on physical analytics 31 -36

18
2014
Wi-fi backscatter: internet connectivity for RF-powered devices

Bryce Kellogg , Aaron Parks , Shyamnath Gollakota , Joshua R. Smith
acm special interest group on data communication 44 ( 4) 607 -618

651
2014
Toward trustworthy mobile sensing

Peter Gilbert , Landon P. Cox , Jaeyeon Jung , David Wetherall
workshop on mobile computing systems and applications 31 -36

144
2010
Analyzing the MAC-level behavior of wireless networks in the wild

Ratul Mahajan , Maya Rodrig , David Wetherall , John Zahorjan
acm special interest group on data communication 36 ( 4) 75 -86

173
2006
Implementing the Gen 2 MAC on the Intel-UW WISP

Michael Buettner , David Wetherall
Springer, New York, NY 143 -156

2
2013