The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David Wetherall: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. David Wetherall
    Active network vision and reality: lessions form a capsule-based system. [Citation Graph (1, 0)][DBLP]
    SOSP, 1999, pp:64-79 [Conf]
  2. Michael W. Hicks, Jonathan T. Moore, David Wetherall, Scott Nettles
    Experiences with Capsule-Based Active Networking. [Citation Graph (0, 0)][DBLP]
    DANCE, 2002, pp:16-24 [Conf]
  3. David L. Tennenhouse, David Wetherall
    Towards an Active Network Architecture. [Citation Graph (0, 0)][DBLP]
    DANCE, 2002, pp:2-15 [Conf]
  4. David Wetherall
    Active Network Vision and Reality: Lessons from a Capsule-Based System. [Citation Graph (0, 0)][DBLP]
    DANCE, 2002, pp:25-0 [Conf]
  5. Parveen Patel, David Wetherall, Jay Lepreau, Andrew Whitaker
    TCP Meets Mobile Code. [Citation Graph (0, 0)][DBLP]
    HotOS, 2003, pp:31-36 [Conf]
  6. Robert Grimm, Janet Davis, Ben Hendrickson, Eric Lemar, Adam MacBeth, Steven Swanson, Thomas E. Anderson, Brian N. Bershad, Gaetano Borriello, Steven D. Gribble, David Wetherall
    Systems Directions for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    HotOS, 2001, pp:147-151 [Conf]
  7. David L. Tennenhouse, Joel F. Adam, David Carver, Henry H. Houh, Michael Ismert, Christopher Lindblad, William F. Stasior, David Wetherall, David R. Bacher, Theresa Chang
    A Software-Oriented Approach to the Design of Media Processing Environments. [Citation Graph (0, 0)][DBLP]
    ICMCS, 1994, pp:435-444 [Conf]
  8. David Ely, Neil Spring, David Wetherall, Stefan Savage, Thomas E. Anderson
    Robust Congestion Signaling. [Citation Graph (0, 0)][DBLP]
    ICNP, 2001, pp:332-341 [Conf]
  9. Ratul Mahajan, Sally Floyd, David Wetherall
    Controlling High-Bandwidth Flows at the Congested Router. [Citation Graph (0, 0)][DBLP]
    ICNP, 2001, pp:192-201 [Conf]
  10. Ethan Katz-Bassett, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas E. Anderson, Yatin Chawathe
    Towards IP geolocation using delay and topology measurements. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:71-84 [Conf]
  11. Ratul Mahajan, Neil T. Spring, David Wetherall, Thomas E. Anderson
    Inferring link weights using end-to-end measurements. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2002, pp:231-236 [Conf]
  12. Ulana Legedza, David Wetherall, John V. Guttag
    Improving the Performance of Distributed Applications Using Active Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1998, pp:590-599 [Conf]
  13. Christopher Lindblad, David Wetherall, David L. Tennenhouse
    The VuSystem: A Programming System for Visual Processing of Digital Video. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 1994, pp:307-314 [Conf]
  14. Vanu G. Bose, David Wetherall, John V. Guttag
    Next Century Challenges: RadioActive Networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 1999, pp:242-248 [Conf]
  15. Anthony J. Nicholson, Yatin Chawathe, Mike Y. Chen, Brian D. Noble, David Wetherall
    Improved access point selection. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2006, pp:233-245 [Conf]
  16. P. Krishna Gummadi, Harsha V. Madhyastha, Steven D. Gribble, Henry M. Levy, David Wetherall
    Improving the Reliability of Internet Paths with One-hop Source Routing. [Citation Graph (0, 0)][DBLP]
    OSDI, 2004, pp:183-198 [Conf]
  17. Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan
    Analyzing the MAC-level behavior of wireless networks in the wild. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:75-86 [Conf]
  18. Ratul Mahajan, David Wetherall, Thomas E. Anderson
    Understanding BGP misconfiguration. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2002, pp:3-16 [Conf]
  19. Charles Reis, Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan
    Measurement-based models of delivery and interference in static wireless networks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:51-62 [Conf]
  20. Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson
    Practical network support for IP traceback. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2000, pp:295-306 [Conf]
  21. Neil T. Spring, Ratul Mahajan, David Wetherall
    Measuring ISP topologies with rocketfuel. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2002, pp:133-145 [Conf]
  22. Neil T. Spring, David Wetherall
    A protocol-independent technique for eliminating redundant network traffic. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2000, pp:87-95 [Conf]
  23. Xiaowei Yang, David Wetherall
    Source selectable path diversity via routing deflections. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:159-170 [Conf]
  24. Xiaowei Yang, David Wetherall, Thomas E. Anderson
    A DoS-limiting network architecture. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2005, pp:241-252 [Conf]
  25. Robert Grimm, Thomas E. Anderson, Brian N. Bershad, David Wetherall
    A system architecture for pervasive computing. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 2000, pp:177-182 [Conf]
  26. Ratul Mahajan, Neil T. Spring, David Wetherall, Thomas E. Anderson
    User-level internet path diagnosis. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:106-119 [Conf]
  27. Parveen Patel, Andrew Whitaker, David Wetherall, Jay Lepreau, Tim Stack
    Upgrading transport protocols using untrusted mobile code. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:1-14 [Conf]
  28. David Ely, Stefan Savage, David Wetherall
    Alpine: A User-Level Infrastructure for Network Protocol Development. [Citation Graph (0, 0)][DBLP]
    USITS, 2001, pp:- [Conf]
  29. Sushant Jain, Ratul Mahajan, David Wetherall
    A Study of the Performance Potential of DHT-based Overlays. [Citation Graph (0, 0)][DBLP]
    USENIX Symposium on Internet Technologies and Systems, 2003, pp:- [Conf]
  30. Neil T. Spring, David Wetherall, Thomas E. Anderson
    Scriptroute: A Public Internet Measurement Facility. [Citation Graph (0, 0)][DBLP]
    USENIX Symposium on Internet Technologies and Systems, 2003, pp:- [Conf]
  31. Thomas E. Anderson, Timothy Roscoe, David Wetherall
    Preventing Internet denial-of-service with capabilities. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:39-44 [Journal]
  32. Thomas E. Anderson, Scott Shenker, Ion Stoica, David Wetherall
    Design guidelines for robust Internet protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:125-130 [Journal]
  33. Neil T. Spring, David Wetherall, Thomas E. Anderson
    Reverse engineering the Internet. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:3-8 [Journal]
  34. David Wetherall
    10 Networking Papers: readings for protocol design. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2006, v:36, n:3, pp:77-78 [Journal]
  35. Andrew T. Campbell, David Wetherall, Raj Yavatkar
    Programmable Networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2002, v:38, n:3, pp:273-275 [Journal]
  36. David Wetherall, John V. Guttag, David L. Tennenhouse
    ANTS: Network Services Without the Red Tape. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1999, v:32, n:4, pp:42-48 [Journal]
  37. Joseph M. Hellerstein, Vern Paxson, Larry L. Peterson, Timothy Roscoe, Scott Shenker, David Wetherall
    The Network Oracle. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 2005, v:28, n:1, pp:3-10 [Journal]
  38. Christopher Lindblad, David Wetherall, William F. Stasior, Joel F. Adam, Henry H. Houh, Michael Ismert, David R. Bacher, Brent M. Phillips, David L. Tennenhouse
    ViewStation Applications: Implications for Network Traffic. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1995, v:13, n:5, pp:768-778 [Journal]
  39. David L. Tennenhouse, Joel F. Adam, David Carver, Henry H. Houh, Michael Ismert, Christopher Lindblad, William F. Stasior, David Wetherall, David R. Bacher, Theresa Chang
    The ViewStation: A Software-Intensive Approach to Media Processing and Distribution. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 1995, v:3, n:3, pp:104-115 [Journal]
  40. Robert Grimm, Janet Davis, Eric Lemar, Adam MacBeth, Steven Swanson, Thomas E. Anderson, Brian N. Bershad, Gaetano Borriello, Steven D. Gribble, David Wetherall
    System support for pervasive applications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2004, v:22, n:4, pp:421-486 [Journal]
  41. Neil T. Spring, Ratul Mahajan, David Wetherall, Thomas E. Anderson
    Measuring ISP topologies with rocketfuel. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:1, pp:2-16 [Journal]
  42. Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson
    Network support for IP traceback. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2001, v:9, n:3, pp:226-237 [Journal]
  43. Ratul Mahajan, David Wetherall, Thomas E. Anderson
    Mutually Controlled Routing with Independent ISPs. [Citation Graph (0, 0)][DBLP]
    NSDI, 2007, pp:- [Conf]
  44. Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan
    Sustaining Cooperation in Multi-hop Wireless Networks. [Citation Graph (0, 0)][DBLP]
    NSDI, 2005, pp:- [Conf]
  45. Ratul Mahajan, David Wetherall, Thomas E. Anderson
    Negotiation-Based Routing Between Neighboring ISPs. [Citation Graph (0, 0)][DBLP]
    NSDI, 2005, pp:- [Conf]
  46. Ramakrishna Gummadi, David Wetherall, Ben Greenstein, Srinivasan Seshan
    Understanding and mitigating the impact of RF interference on 802.11 networks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:385-396 [Conf]
  47. David L. Tennenhouse, David Wetherall
    Towards an active network architecture. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2007, v:37, n:5, pp:81-94 [Journal]

  48. Privacy oracle: a system for finding application leaks with black box differential testing. [Citation Graph (, )][DBLP]


  49. "When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use. [Citation Graph (, )][DBLP]


  50. Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era. [Citation Graph (, )][DBLP]


  51. Recognizing daily activities with RFID-based sensors. [Citation Graph (, )][DBLP]


  52. 802.11 user fingerprinting. [Citation Graph (, )][DBLP]


  53. Taking the sting out of carrier sense: interference cancellation for wireless LANs. [Citation Graph (, )][DBLP]


  54. An empirical study of UHF RFID performance. [Citation Graph (, )][DBLP]


  55. Improving wireless privacy with an identifier-free link layer protocol. [Citation Graph (, )][DBLP]


  56. Studying Black Holes in the Internet with Hubble. [Citation Graph (, )][DBLP]


  57. Passport: Secure and Adoptable Source Authentication. [Citation Graph (, )][DBLP]


  58. Reducing Network Energy Consumption via Sleeping and Rate-Adaptation. [Citation Graph (, )][DBLP]


  59. Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries. [Citation Graph (, )][DBLP]


  60. Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default. [Citation Graph (, )][DBLP]


  61. RFID sensor networks with the intel WISP. [Citation Graph (, )][DBLP]


  62. Predictable 802.11 packet delivery from wireless channel measurements. [Citation Graph (, )][DBLP]


  63. SafeGuard: safe forwarding during route changes. [Citation Graph (, )][DBLP]


  64. TCP congestion control with a misbehaving receiver. [Citation Graph (, )][DBLP]


  65. 802.11 with multiple antennas for dummies. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002