|
Search the dblp DataBase
Brad Karp:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker
On the pitfalls of geographic face routing. [Citation Graph (0, 0)][DBLP] DIALM-POMC, 2005, pp:34-43 [Conf]
- Ming Zhang, Brad Karp, Sally Floyd, Larry L. Peterson
RR-TCP: A Reordering-Robust TCP with DSACK. [Citation Graph (0, 0)][DBLP] ICNP, 2003, pp:95-106 [Conf]
- Brad Karp, Sylvia Ratnasamy, Sean C. Rhea, Scott Shenker
Spurring Adoption of DHTs with OpenHash, a Public DHT Service. [Citation Graph (0, 0)][DBLP] IPTPS, 2004, pp:195-205 [Conf]
- Brad Karp, H. T. Kung
GPSR: greedy perimeter stateless routing for wireless networks. [Citation Graph (0, 0)][DBLP] MOBICOM, 2000, pp:243-254 [Conf]
- Sylvia Ratnasamy, Brad Karp, Li Yin, Fang Yu, Deborah Estrin, Ramesh Govindan, Scott Shenker
GHT: a geographic hash table for data-centric storage. [Citation Graph (0, 0)][DBLP] WSNA, 2002, pp:78-87 [Conf]
- James Newsome, Brad Karp, Dawn Xiaodong Song
Paragraph: Thwarting Signature Learning by Training Maliciously. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:81-105 [Conf]
- Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker
Practical and robust geographic routing in wireless networks. [Citation Graph (0, 0)][DBLP] SenSys, 2004, pp:295-296 [Conf]
- Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker
Lazy cross-link removal for geographic routing. [Citation Graph (0, 0)][DBLP] SenSys, 2006, pp:112-124 [Conf]
- Sean C. Rhea, Brighten Godfrey, Brad Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, Harlan Yu
OpenDHT: a public DHT service and its uses. [Citation Graph (0, 0)][DBLP] SIGCOMM, 2005, pp:73-84 [Conf]
- James Newsome, Brad Karp, Dawn Xiaodong Song
Polygraph: Automatically Generating Signatures for Polymorphic Worms. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2005, pp:226-241 [Conf]
- Trevor Blackwell, Kee Chan, Koling Chang, Thomas Charuhas, James Gwertzman, Brad Karp, H. T. Kung, David Li, Dong Lin, Robert Morris, Rob Polansky, Diane Tang, Cliff Young, John Zao
Secure Short-Cut Routing for Mobile IP. [Citation Graph (0, 0)][DBLP] USENIX Summer, 1994, pp:305-316 [Conf]
- Niraj Tolia, Michael Kozuch, Mahadev Satyanarayanan, Brad Karp, Thomas C. Bressoud, Adrian Perrig
Opportunistic Use of Content Addressable Storage for Distributed File Systems. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, General Track, 2003, pp:127-140 [Conf]
- Hyang-Ah Kim, Brad Karp
Autograph: Toward Automated, Distributed Worm Signature Detection. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2004, pp:271-286 [Conf]
- Suman Nath, Amol Deshpande, Yan Ke, Phillip B. Gibbons, Brad Karp, Srinivasan Seshan
IrisNet: An Architecture for Internet-scale Sensing Services. [Citation Graph (0, 0)][DBLP] VLDB, 2003, pp:1137-1140 [Conf]
- Scott Shenker, Sylvia Ratnasamy, Brad Karp, Ramesh Govindan, Deborah Estrin
Data-centric storage in sensornets. [Citation Graph (0, 0)][DBLP] Computer Communication Review, 2003, v:33, n:1, pp:137-142 [Journal]
- Sylvia Ratnasamy, Brad Karp, Scott Shenker, Deborah Estrin, Ramesh Govindan, Li Yin, Fang Yu
Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table. [Citation Graph (0, 0)][DBLP] MONET, 2003, v:8, n:4, pp:427-442 [Journal]
- Scott Garriss, Michael Kaminsky, Michael J. Freedman, Brad Karp, David Mazières, Haifeng Yu
RE: Reliable Email. [Citation Graph (0, 0)][DBLP] NSDI, 2006, pp:- [Conf]
- Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker
Geographic Routing Made Practical. [Citation Graph (0, 0)][DBLP] NSDI, 2005, pp:- [Conf]
Wedge: Splitting Applications into Reduced-Privilege Compartments. [Citation Graph (, )][DBLP]
Cone of silence: adaptively nulling interferers in wireless networks. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.303secs
|