The ViewStation: a software-intensive approach to media processing and distribution

David L. Tennenhouse , Joel Adam , David Carver , Henry Houh
Multimedia Systems 3 ( 3) 104 -115

15
1995
Enhancing mobile apps to use sensor hubs without programmer effort

Haichen Shen , Aruna Balasubramanian , Anthony LaMarca , David Wetherall
ubiquitous computing 227 -238

49
2015
From Cells to Streets: Estimating Mobile Paths with Cellular-Side Data

Ilias Leontiadis , Antonio Lima , Haewoon Kwak , Rade Stanojevic
conference on emerging network experiment and technology 121 -132

45
2014
Improved access point selection

Anthony J. Nicholson , Yatin Chawathe , Mike Y. Chen , Brian D. Noble
Proceedings of the 4th international conference on Mobile systems, applications and services - MobiSys 2006 233 -245

218
2006
A system architecture for pervasive computing

Robert Grimm , Tom Anderson , Brian Bershad , David Wetherall
acm sigops european workshop 177 -182

129
2000
Experiences applying game theory to system design

Ratul Mahajan , Maya Rodrig , David Wetherall , John Zahorjan
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems - PINS '04 183 -190

110
2004
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use

Benjamin M. Greenstein , Louis LeGrand , Pauline Powledge , David Wetherall
human factors in computing systems 1993 -2002

74
2009
Programmable Networks

A.T. Campbell , David Wetherall , Raj Yavatkar
Computer Networks 38 ( 3) 273 -275

2002
10 networking papers: Readings for protocol design

David Wetherall
ACM SIGCOMM Computer Communication Review 36 ( 3) 77 -78

80
2006
PLB: congestion signals are simple and effective for network load balancing

Mubashir Adnan Qureshi , Yuchung Cheng , Qianwen Yin , Qiaobin Fu
Smpte Journal 207 -218

2022
Privacy oracle: a system for finding application leaks with black box differential testing

Jaeyeon Jung , Anmol Sheth , Ben Greenstein , David Wetherall
Smpte Journal 279 -288

117
2008
These aren't the droids you're looking for: retrofitting android to protect data from imperious applications

Peter Hornyack , Seungyeop Han , Jaeyeon Jung , Stuart Schechter
Smpte Journal 639 -652

339
2011
Enhancing Mobility Apps To Use Sensor Hubs Without Programmer Effort

Haichen Shen , Aruna Balasubramanian , Eric Yuan , Anthony LaMarca
Smpte Journal

Efficiently running continuous monitoring applications on mobile devices using sensor hubs

Aruna Balasubramanian , Anthony LaMarca , David Wetherall
University of Washington Technical Report 11 -02

7
2013
TaintEraser: Protecting sensitive data leaks using application-level taint tracking

David Zhu , Jaeyeon Jung , Dawn Song , Tadayoshi Kohno
ACM SIGOPS Operating Systems Review 45 ( 1) 142 -154

223
2011
Privacy scope: A precise information flow tracking system for finding application leaks

Yu Zhu , Jaeyeon Jung , Dawn Song , Tadayoshi Kohno
University of California, Berkeley

64
2009
A wakeup call for internet monitoring systems: The case for distributed triggers

Ankur Jain , Joseph M Hellerstein , Sylvia Ratnasamy , David Wetherall
Proceedings of HotNets-III 1 -6

94
2004
How to resolve IP aliases

Neil Spring , Mira Dontcheva , Maya Rodrig , David Wetherall
Technical report, Univ. of Washington 4 -5

87
2004
Odessa: enabling interactive perception applications on mobile devices

Moo-Ryong Ra , Anmol Sheth , Lily Mummert , Padmanabhan Pillai
43 -56

489
2011
Taking the Mystery Out of Sensing Devices in the Home

Jaeyeon Jung , Anmol Sheth , Sunny Consolvo , Ben Greenstein
May 18

1
2010