The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Brad Karp: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker
    On the pitfalls of geographic face routing. [Citation Graph (0, 0)][DBLP]
    DIALM-POMC, 2005, pp:34-43 [Conf]
  2. Ming Zhang, Brad Karp, Sally Floyd, Larry L. Peterson
    RR-TCP: A Reordering-Robust TCP with DSACK. [Citation Graph (0, 0)][DBLP]
    ICNP, 2003, pp:95-106 [Conf]
  3. Brad Karp, Sylvia Ratnasamy, Sean C. Rhea, Scott Shenker
    Spurring Adoption of DHTs with OpenHash, a Public DHT Service. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2004, pp:195-205 [Conf]
  4. Brad Karp, H. T. Kung
    GPSR: greedy perimeter stateless routing for wireless networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2000, pp:243-254 [Conf]
  5. Sylvia Ratnasamy, Brad Karp, Li Yin, Fang Yu, Deborah Estrin, Ramesh Govindan, Scott Shenker
    GHT: a geographic hash table for data-centric storage. [Citation Graph (0, 0)][DBLP]
    WSNA, 2002, pp:78-87 [Conf]
  6. James Newsome, Brad Karp, Dawn Xiaodong Song
    Paragraph: Thwarting Signature Learning by Training Maliciously. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:81-105 [Conf]
  7. Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker
    Practical and robust geographic routing in wireless networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2004, pp:295-296 [Conf]
  8. Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker
    Lazy cross-link removal for geographic routing. [Citation Graph (0, 0)][DBLP]
    SenSys, 2006, pp:112-124 [Conf]
  9. Sean C. Rhea, Brighten Godfrey, Brad Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, Harlan Yu
    OpenDHT: a public DHT service and its uses. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2005, pp:73-84 [Conf]
  10. James Newsome, Brad Karp, Dawn Xiaodong Song
    Polygraph: Automatically Generating Signatures for Polymorphic Worms. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:226-241 [Conf]
  11. Trevor Blackwell, Kee Chan, Koling Chang, Thomas Charuhas, James Gwertzman, Brad Karp, H. T. Kung, David Li, Dong Lin, Robert Morris, Rob Polansky, Diane Tang, Cliff Young, John Zao
    Secure Short-Cut Routing for Mobile IP. [Citation Graph (0, 0)][DBLP]
    USENIX Summer, 1994, pp:305-316 [Conf]
  12. Niraj Tolia, Michael Kozuch, Mahadev Satyanarayanan, Brad Karp, Thomas C. Bressoud, Adrian Perrig
    Opportunistic Use of Content Addressable Storage for Distributed File Systems. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2003, pp:127-140 [Conf]
  13. Hyang-Ah Kim, Brad Karp
    Autograph: Toward Automated, Distributed Worm Signature Detection. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:271-286 [Conf]
  14. Suman Nath, Amol Deshpande, Yan Ke, Phillip B. Gibbons, Brad Karp, Srinivasan Seshan
    IrisNet: An Architecture for Internet-scale Sensing Services. [Citation Graph (0, 0)][DBLP]
    VLDB, 2003, pp:1137-1140 [Conf]
  15. Scott Shenker, Sylvia Ratnasamy, Brad Karp, Ramesh Govindan, Deborah Estrin
    Data-centric storage in sensornets. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:137-142 [Journal]
  16. Sylvia Ratnasamy, Brad Karp, Scott Shenker, Deborah Estrin, Ramesh Govindan, Li Yin, Fang Yu
    Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table. [Citation Graph (0, 0)][DBLP]
    MONET, 2003, v:8, n:4, pp:427-442 [Journal]
  17. Scott Garriss, Michael Kaminsky, Michael J. Freedman, Brad Karp, David Mazières, Haifeng Yu
    RE: Reliable Email. [Citation Graph (0, 0)][DBLP]
    NSDI, 2006, pp:- [Conf]
  18. Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker
    Geographic Routing Made Practical. [Citation Graph (0, 0)][DBLP]
    NSDI, 2005, pp:- [Conf]

  19. Wedge: Splitting Applications into Reduced-Privilege Compartments. [Citation Graph (, )][DBLP]


  20. Cone of silence: adaptively nulling interferers in wireless networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.303secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002