The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

John S. Heidemann: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Richard G. Guy, John S. Heidemann, Wai-Kei Mak, Thomas W. Page Jr., Gerald J. Popek, Dieter Rothmeier
    Implementation of the Ficus Replicated File System. [Citation Graph (4, 0)][DBLP]
    USENIX Summer, 1990, pp:63-72 [Conf]
  2. Peter L. Reiher, John S. Heidemann, David Ratner, Gregory Skinner, Gerald J. Popek
    Resolving File Conflicts in the Ficus File System. [Citation Graph (1, 0)][DBLP]
    USENIX Summer, 1994, pp:183-195 [Conf]
  3. Gerald J. Popek, Richard G. Guy, Thomas W. Page Jr., John S. Heidemann
    Replication in Ficus Distributed File Systems. [Citation Graph (1, 0)][DBLP]
    Workshop on the Management of Replicated Data, 1990, pp:5-10 [Conf]
  4. Thomas W. Page Jr., Richard G. Guy, John S. Heidemann, David Ratner, Peter L. Reiher, Ashish Goel, Geoffrey H. Kuenning, Gerald J. Popek
    Perspectives on Optimistically Replicated, Peer-to-Peer Filing. [Citation Graph (1, 0)][DBLP]
    Softw., Pract. Exper., 1998, v:28, n:2, pp:155-180 [Journal]
  5. Nirupama Bulusu, Deborah Estrin, John S. Heidemann
    Adaptive Beacon Placement. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2001, pp:489-498 [Conf]
  6. Chalermek Intanagonwiwat, Deborah Estrin, Ramesh Govindan, John S. Heidemann
    Impact of Network Density on Data Aggregation in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:457-458 [Conf]
  7. Di-Fa Chang, Ramesh Govindan, John S. Heidemann
    The Temporal and Topological Characteristics of BGP Path Changes. [Citation Graph (0, 0)][DBLP]
    ICNP, 2003, pp:190-199 [Conf]
  8. Mohammad H. Rahimi, Hardik Shah, Gaurav S. Sukhatme, John S. Heidemann, Deborah Estrin
    Studying the Feasibility of Energy Harvesting in a Mobile Sensor Network. [Citation Graph (0, 0)][DBLP]
    ICRA, 2003, pp:19-24 [Conf]
  9. Wei Ye, Richard T. Vaughan, Gaurav S. Sukhatme, John S. Heidemann
    Evaluating Control Strategies for Wireless-Networked Robots Using an Integrated Robot and Network Simulation. [Citation Graph (0, 0)][DBLP]
    ICRA, 2001, pp:2941-2947 [Conf]
  10. Di-Fa Chang, Ramesh Govindan, John S. Heidemann
    An empirical study of router response to large BGP routing table load. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2002, pp:203-208 [Conf]
  11. Abhimanyu Das, Debojyoti Dutta, Ahmed Helmy, Ashish Goel, John S. Heidemann
    Low-state fairness: lower bounds and practical enforcement. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:2436-2446 [Conf]
  12. Debojyoti Dutta, Ashish Goel, John S. Heidemann
    Oblivious AQM and Nash Equilibria. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  13. Debojyoti Dutta, Ashish Goel, John S. Heidemann
    Towards Protocol Equilibrium with Oblivious Routers. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  14. Art Mena, John S. Heidemann
    An Empirical Study of Internet Audio Traffic. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:101-110 [Conf]
  15. Fred Stann, John S. Heidemann
    BARD: Bayesian-assisted resource discovery in sensor networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:866-877 [Conf]
  16. Wei Ye, John S. Heidemann, Deborah Estrin
    An Energy-Efficient MAC Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2002, pp:- [Conf]
  17. Kun-Chan Lan, John S. Heidemann
    On the feasibility of utilizing correlations between user populations for traffic inference. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:132-139 [Conf]
  18. Thanos Stathopoulos, Rahul Kapur, Deborah Estrin, John S. Heidemann, Lixia Zhang
    Application-Based Collision Avoidance in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2004, pp:506-514 [Conf]
  19. Debojyoti Dutta, Ashish Goel, John S. Heidemann
    Faster Network Design with Scenario Pre-Filtering. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2002, pp:237-246 [Conf]
  20. Polly Huang, Deborah Estrin, John S. Heidemann
    Enabling Large-Scale Simulations: Selective Abstraction Approach to the Study of Multicast Protocols. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1998, pp:241-248 [Conf]
  21. Polly Huang, John S. Heidemann
    Minimizing Routing State for Light-Weight Network Simulation. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2001, pp:108-116 [Conf]
  22. Purushotham Kamath, Kun-Chan Lan, John S. Heidemann, Joseph A. Bannister, Joseph D. Touch
    Generation of High Bandwidth Network Traffic Traces. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2002, pp:401-0 [Conf]
  23. Deborah Estrin, Ramesh Govindan, John S. Heidemann, Satish Kumar
    Next Century Challenges: Scalable Coordination in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 1999, pp:263-270 [Conf]
  24. Ya Xu, John S. Heidemann, Deborah Estrin
    Geography-informed energy conservation for Ad Hoc routing. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2001, pp:70-84 [Conf]
  25. Alefiya Hussain, Aman Kapoor, John S. Heidemann
    The Effect of Detail on Ethernet Simulation. [Citation Graph (0, 0)][DBLP]
    PADS, 2004, pp:97-104 [Conf]
  26. John S. Heidemann, Fabio Silva, Deborah Estrin
    Matching data dissemination algorithms to application requirements. [Citation Graph (0, 0)][DBLP]
    SenSys, 2003, pp:218-229 [Conf]
  27. Deepak Ganesan, Ben Greenstein, Denis Perelyubskiy, Deborah Estrin, John S. Heidemann
    An evaluation of multi-resolution storage for sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2003, pp:89-102 [Conf]
  28. Xi Wang, Fabio Silva, John S. Heidemann
    Follow-me application: active visitor guidance system. [Citation Graph (0, 0)][DBLP]
    SenSys, 2004, pp:316- [Conf]
  29. Fred Stann, John S. Heidemann, Rajesh Shroff, Muhammad Zaki Murtaza
    RBP: robust broadcast propagation in wireless networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2006, pp:85-98 [Conf]
  30. Dongjin Son, Bhaskar Krishnamachari, John S. Heidemann
    Experimental study of concurrent transmission in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2006, pp:237-250 [Conf]
  31. Wei Ye, Fabio Silva, John S. Heidemann
    Ultra-low duty cycle MAC with scheduled channel polling. [Citation Graph (0, 0)][DBLP]
    SenSys, 2006, pp:321-334 [Conf]
  32. Alefiya Hussain, John S. Heidemann, Christos Papadopoulos
    A framework for classifying denial of service attacks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2003, pp:99-110 [Conf]
  33. John S. Heidemann, Gerald J. Popek
    Performance of Cache Coherence in Stackable Filing. [Citation Graph (0, 0)][DBLP]
    SOSP, 1995, pp:127-142 [Conf]
  34. John S. Heidemann, Fabio Silva, Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, Deepak Ganesan
    Building Efficient Wireless Sensor Networks with Low-Level Naming. [Citation Graph (0, 0)][DBLP]
    SOSP, 2001, pp:146-159 [Conf]
  35. John S. Heidemann, Dhaval Shah
    Location-Aware Scheduling with Minimal Infrastructure. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2000, pp:131-138 [Conf]
  36. Thomas W. Page Jr., Richard G. Guy, John S. Heidemann, Gerald J. Popek, Wai Mak, Dieter Rothmeier
    Management of Replicated Volume Location Data in the Ficus Replicated File System. [Citation Graph (0, 0)][DBLP]
    USENIX Summer, 1991, pp:17-30 [Conf]
  37. Xi Wang, Fabio Silva, John S. Heidemann
    Infrastructureless Location Aware Configuration for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WMCSA, 2004, pp:174-183 [Conf]
  38. John S. Heidemann, Thomas W. Page Jr., Richard G. Guy, Gerald J. Popek
    Primarily Disconnected Operation: Experiences with Ficus. [Citation Graph (0, 0)][DBLP]
    Workshop on the Management of Replicated Data, 1992, pp:2-5 [Conf]
  39. Deborah Estrin, Ramesh Govindan, John S. Heidemann
    Embedding the Internet: Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:5, pp:38-41 [Journal]
  40. Debojyoti Dutta, Ashish Goel, John S. Heidemann
    Oblivious AQM and nash equilibria. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:3, pp:20- [Journal]
  41. Deepak Ganesan, Deborah Estrin, John S. Heidemann
    Dimensions: why do we need a new data handling architecture for sensor networks? [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:143-148 [Journal]
  42. Xuan Chen, John S. Heidemann
    Preferential treatment for short flows to reduce web latency. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:41, n:6, pp:779-794 [Journal]
  43. Alefiya Hussain, John S. Heidemann, Christos Papadopoulos
    Distinguishing between single and multi-source attacks using signal processing. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:46, n:4, pp:479-503 [Journal]
  44. Kun-Chan Lan, John S. Heidemann
    A measurement study of correlations of Internet flow characteristics. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:1, pp:46-62 [Journal]
  45. Lee Breslau, Deborah Estrin, Kevin R. Fall, Sally Floyd, John S. Heidemann, Ahmed Helmy, Polly Huang, Steven McCanne, Kannan Varadhan, Ya Xu, Haobo Yu
    Advances in Network Simulation. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:5, pp:59-67 [Journal]
  46. Deborah Estrin, Mark Handley, John S. Heidemann, Steven McCanne, Ya Xu, Haobo Yu
    Network Visualization with Nam, the VINT Network Animator. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:11, pp:63-68 [Journal]
  47. Omprakash Gnawali, Ramesh Govindan, John S. Heidemann
    Implementing a Sensor Database System using a Generic Data Dissemination Mechanism. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 2005, v:28, n:1, pp:70-75 [Journal]
  48. Richard G. Guy, John S. Heidemann, Thomas W. Page Jr., Gerald J. Popek
    The Ficus Replicated File System (Abstract). [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1992, v:26, n:2, pp:26- [Journal]
  49. Nirupama Bulusu, John S. Heidemann, Deborah Estrin, Tommy Tran
    Self-configuring localization systems: Design and Experimental Evaluation. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Embedded Comput. Syst., 2004, v:3, n:1, pp:24-60 [Journal]
  50. John S. Heidemann, Gerald J. Popek
    File-System Development with Stackable Layers. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1994, v:12, n:1, pp:58-89 [Journal]
  51. Xuan Chen, John S. Heidemann
    Flash crowd mitigation via adaptive admission control based on application-level observations. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2005, v:5, n:3, pp:532-569 [Journal]
  52. Kun-Chan Lan, John S. Heidemann
    Rapid model parameterization from traffic measurements. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Model. Comput. Simul., 2002, v:12, n:3, pp:201-229 [Journal]
  53. John S. Heidemann, Katia Obraczka, Joseph D. Touch
    Modeling the performance of HTTP over several transport protocols. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1997, v:5, n:5, pp:616-630 [Journal]
  54. Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, John S. Heidemann, Fabio Silva
    Directed diffusion for wireless sensor networking. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2003, v:11, n:1, pp:2-16 [Journal]
  55. Wei Ye, John S. Heidemann, Deborah Estrin
    Medium access control with coordinated adaptive sleeping for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:3, pp:493-506 [Journal]
  56. Deepak Ganesan, Ben Greenstein, Deborah Estrin, John S. Heidemann, Ramesh Govindan
    Multiresolution storage and search in sensor networks. [Citation Graph (0, 0)][DBLP]
    TOS, 2005, v:1, n:3, pp:277-315 [Journal]
  57. Lars Eggert, John S. Heidemann
    Application-Level Differentiated Services for Web Servers. [Citation Graph (0, 0)][DBLP]
    World Wide Web, 1999, v:2, n:3, pp:133-142 [Journal]
  58. Thanos Stathopoulos, Martin Lukac, Dustin McIntire, John S. Heidemann, Deborah Estrin, William J. Kaiser
    End-to-End Routing for Dual-Radio Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2252-2260 [Conf]
  59. Affan A. Syed, John S. Heidemann
    Time Synchronization for High Latency Acoustic Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  60. A. Hussain, J. Heidemann, C. Papadopoulos
    Identification of Repeated Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]

  61. Understanding passive and active service discovery. [Citation Graph (, )][DBLP]


  62. Census and survey of the visible internet. [Citation Graph (, )][DBLP]


  63. T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks. [Citation Graph (, )][DBLP]


  64. Understanding spatio-temporal uncertainty in medium access with ALOHA protocols. [Citation Graph (, )][DBLP]


  65. Low-power acoustic modem for dense underwater sensor networks. [Citation Graph (, )][DBLP]


  66. Bringing sensor networks underwater with low-power acoustic communications. [Citation Graph (, )][DBLP]


  67. Provenance in Sensornet Republishing. [Citation Graph (, )][DBLP]


  68. Experiences with a continuous network tracing infrastructure. [Citation Graph (, )][DBLP]


  69. Design and evaluation of network reconfiguration protocols for mostly-off sensor networks. [Citation Graph (, )][DBLP]


  70. Effects of ensemble-TCP. [Citation Graph (, )][DBLP]


  71. Remote detection of bottleneck links using spectral and statistical methods. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.454secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002