Search the dblp DataBase
John S. Heidemann :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Richard G. Guy , John S. Heidemann , Wai-Kei Mak , Thomas W. Page Jr. , Gerald J. Popek , Dieter Rothmeier Implementation of the Ficus Replicated File System. [Citation Graph (4, 0)][DBLP ] USENIX Summer, 1990, pp:63-72 [Conf ] Peter L. Reiher , John S. Heidemann , David Ratner , Gregory Skinner , Gerald J. Popek Resolving File Conflicts in the Ficus File System. [Citation Graph (1, 0)][DBLP ] USENIX Summer, 1994, pp:183-195 [Conf ] Gerald J. Popek , Richard G. Guy , Thomas W. Page Jr. , John S. Heidemann Replication in Ficus Distributed File Systems. [Citation Graph (1, 0)][DBLP ] Workshop on the Management of Replicated Data, 1990, pp:5-10 [Conf ] Thomas W. Page Jr. , Richard G. Guy , John S. Heidemann , David Ratner , Peter L. Reiher , Ashish Goel , Geoffrey H. Kuenning , Gerald J. Popek Perspectives on Optimistically Replicated, Peer-to-Peer Filing. [Citation Graph (1, 0)][DBLP ] Softw., Pract. Exper., 1998, v:28, n:2, pp:155-180 [Journal ] Nirupama Bulusu , Deborah Estrin , John S. Heidemann Adaptive Beacon Placement. [Citation Graph (0, 0)][DBLP ] ICDCS, 2001, pp:489-498 [Conf ] Chalermek Intanagonwiwat , Deborah Estrin , Ramesh Govindan , John S. Heidemann Impact of Network Density on Data Aggregation in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICDCS, 2002, pp:457-458 [Conf ] Di-Fa Chang , Ramesh Govindan , John S. Heidemann The Temporal and Topological Characteristics of BGP Path Changes. [Citation Graph (0, 0)][DBLP ] ICNP, 2003, pp:190-199 [Conf ] Mohammad H. Rahimi , Hardik Shah , Gaurav S. Sukhatme , John S. Heidemann , Deborah Estrin Studying the Feasibility of Energy Harvesting in a Mobile Sensor Network. [Citation Graph (0, 0)][DBLP ] ICRA, 2003, pp:19-24 [Conf ] Wei Ye , Richard T. Vaughan , Gaurav S. Sukhatme , John S. Heidemann Evaluating Control Strategies for Wireless-Networked Robots Using an Integrated Robot and Network Simulation. [Citation Graph (0, 0)][DBLP ] ICRA, 2001, pp:2941-2947 [Conf ] Di-Fa Chang , Ramesh Govindan , John S. Heidemann An empirical study of router response to large BGP routing table load. [Citation Graph (0, 0)][DBLP ] Internet Measurement Workshop, 2002, pp:203-208 [Conf ] Abhimanyu Das , Debojyoti Dutta , Ahmed Helmy , Ashish Goel , John S. Heidemann Low-state fairness: lower bounds and practical enforcement. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:2436-2446 [Conf ] Debojyoti Dutta , Ashish Goel , John S. Heidemann Oblivious AQM and Nash Equilibria. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] Debojyoti Dutta , Ashish Goel , John S. Heidemann Towards Protocol Equilibrium with Oblivious Routers. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2004, pp:- [Conf ] Art Mena , John S. Heidemann An Empirical Study of Internet Audio Traffic. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2000, pp:101-110 [Conf ] Fred Stann , John S. Heidemann BARD: Bayesian-assisted resource discovery in sensor networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:866-877 [Conf ] Wei Ye , John S. Heidemann , Deborah Estrin An Energy-Efficient MAC Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2002, pp:- [Conf ] Kun-Chan Lan , John S. Heidemann On the feasibility of utilizing correlations between user populations for traffic inference. [Citation Graph (0, 0)][DBLP ] LCN, 2005, pp:132-139 [Conf ] Thanos Stathopoulos , Rahul Kapur , Deborah Estrin , John S. Heidemann , Lixia Zhang Application-Based Collision Avoidance in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] LCN, 2004, pp:506-514 [Conf ] Debojyoti Dutta , Ashish Goel , John S. Heidemann Faster Network Design with Scenario Pre-Filtering. [Citation Graph (0, 0)][DBLP ] MASCOTS, 2002, pp:237-246 [Conf ] Polly Huang , Deborah Estrin , John S. Heidemann Enabling Large-Scale Simulations: Selective Abstraction Approach to the Study of Multicast Protocols. [Citation Graph (0, 0)][DBLP ] MASCOTS, 1998, pp:241-248 [Conf ] Polly Huang , John S. Heidemann Minimizing Routing State for Light-Weight Network Simulation. [Citation Graph (0, 0)][DBLP ] MASCOTS, 2001, pp:108-116 [Conf ] Purushotham Kamath , Kun-Chan Lan , John S. Heidemann , Joseph A. Bannister , Joseph D. Touch Generation of High Bandwidth Network Traffic Traces. [Citation Graph (0, 0)][DBLP ] MASCOTS, 2002, pp:401-0 [Conf ] Deborah Estrin , Ramesh Govindan , John S. Heidemann , Satish Kumar Next Century Challenges: Scalable Coordination in Sensor Networks. [Citation Graph (0, 0)][DBLP ] MOBICOM, 1999, pp:263-270 [Conf ] Ya Xu , John S. Heidemann , Deborah Estrin Geography-informed energy conservation for Ad Hoc routing. [Citation Graph (0, 0)][DBLP ] MOBICOM, 2001, pp:70-84 [Conf ] Alefiya Hussain , Aman Kapoor , John S. Heidemann The Effect of Detail on Ethernet Simulation. [Citation Graph (0, 0)][DBLP ] PADS, 2004, pp:97-104 [Conf ] John S. Heidemann , Fabio Silva , Deborah Estrin Matching data dissemination algorithms to application requirements. [Citation Graph (0, 0)][DBLP ] SenSys, 2003, pp:218-229 [Conf ] Deepak Ganesan , Ben Greenstein , Denis Perelyubskiy , Deborah Estrin , John S. Heidemann An evaluation of multi-resolution storage for sensor networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2003, pp:89-102 [Conf ] Xi Wang , Fabio Silva , John S. Heidemann Follow-me application: active visitor guidance system. [Citation Graph (0, 0)][DBLP ] SenSys, 2004, pp:316- [Conf ] Fred Stann , John S. Heidemann , Rajesh Shroff , Muhammad Zaki Murtaza RBP: robust broadcast propagation in wireless networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2006, pp:85-98 [Conf ] Dongjin Son , Bhaskar Krishnamachari , John S. Heidemann Experimental study of concurrent transmission in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2006, pp:237-250 [Conf ] Wei Ye , Fabio Silva , John S. Heidemann Ultra-low duty cycle MAC with scheduled channel polling. [Citation Graph (0, 0)][DBLP ] SenSys, 2006, pp:321-334 [Conf ] Alefiya Hussain , John S. Heidemann , Christos Papadopoulos A framework for classifying denial of service attacks. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2003, pp:99-110 [Conf ] John S. Heidemann , Gerald J. Popek Performance of Cache Coherence in Stackable Filing. [Citation Graph (0, 0)][DBLP ] SOSP, 1995, pp:127-142 [Conf ] John S. Heidemann , Fabio Silva , Chalermek Intanagonwiwat , Ramesh Govindan , Deborah Estrin , Deepak Ganesan Building Efficient Wireless Sensor Networks with Low-Level Naming. [Citation Graph (0, 0)][DBLP ] SOSP, 2001, pp:146-159 [Conf ] John S. Heidemann , Dhaval Shah Location-Aware Scheduling with Minimal Infrastructure. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2000, pp:131-138 [Conf ] Thomas W. Page Jr. , Richard G. Guy , John S. Heidemann , Gerald J. Popek , Wai Mak , Dieter Rothmeier Management of Replicated Volume Location Data in the Ficus Replicated File System. [Citation Graph (0, 0)][DBLP ] USENIX Summer, 1991, pp:17-30 [Conf ] Xi Wang , Fabio Silva , John S. Heidemann Infrastructureless Location Aware Configuration for Sensor Networks. [Citation Graph (0, 0)][DBLP ] WMCSA, 2004, pp:174-183 [Conf ] John S. Heidemann , Thomas W. Page Jr. , Richard G. Guy , Gerald J. Popek Primarily Disconnected Operation: Experiences with Ficus. [Citation Graph (0, 0)][DBLP ] Workshop on the Management of Replicated Data, 1992, pp:2-5 [Conf ] Deborah Estrin , Ramesh Govindan , John S. Heidemann Embedding the Internet: Introduction. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:5, pp:38-41 [Journal ] Debojyoti Dutta , Ashish Goel , John S. Heidemann Oblivious AQM and nash equilibria. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:3, pp:20- [Journal ] Deepak Ganesan , Deborah Estrin , John S. Heidemann Dimensions: why do we need a new data handling architecture for sensor networks? [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2003, v:33, n:1, pp:143-148 [Journal ] Xuan Chen , John S. Heidemann Preferential treatment for short flows to reduce web latency. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2003, v:41, n:6, pp:779-794 [Journal ] Alefiya Hussain , John S. Heidemann , Christos Papadopoulos Distinguishing between single and multi-source attacks using signal processing. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:46, n:4, pp:479-503 [Journal ] Kun-Chan Lan , John S. Heidemann A measurement study of correlations of Internet flow characteristics. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2006, v:50, n:1, pp:46-62 [Journal ] Lee Breslau , Deborah Estrin , Kevin R. Fall , Sally Floyd , John S. Heidemann , Ahmed Helmy , Polly Huang , Steven McCanne , Kannan Varadhan , Ya Xu , Haobo Yu Advances in Network Simulation. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2000, v:33, n:5, pp:59-67 [Journal ] Deborah Estrin , Mark Handley , John S. Heidemann , Steven McCanne , Ya Xu , Haobo Yu Network Visualization with Nam, the VINT Network Animator. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2000, v:33, n:11, pp:63-68 [Journal ] Omprakash Gnawali , Ramesh Govindan , John S. Heidemann Implementing a Sensor Database System using a Generic Data Dissemination Mechanism. [Citation Graph (0, 0)][DBLP ] IEEE Data Eng. Bull., 2005, v:28, n:1, pp:70-75 [Journal ] Richard G. Guy , John S. Heidemann , Thomas W. Page Jr. , Gerald J. Popek The Ficus Replicated File System (Abstract). [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1992, v:26, n:2, pp:26- [Journal ] Nirupama Bulusu , John S. Heidemann , Deborah Estrin , Tommy Tran Self-configuring localization systems: Design and Experimental Evaluation. [Citation Graph (0, 0)][DBLP ] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:1, pp:24-60 [Journal ] John S. Heidemann , Gerald J. Popek File-System Development with Stackable Layers. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 1994, v:12, n:1, pp:58-89 [Journal ] Xuan Chen , John S. Heidemann Flash crowd mitigation via adaptive admission control based on application-level observations. [Citation Graph (0, 0)][DBLP ] ACM Trans. Internet Techn., 2005, v:5, n:3, pp:532-569 [Journal ] Kun-Chan Lan , John S. Heidemann Rapid model parameterization from traffic measurements. [Citation Graph (0, 0)][DBLP ] ACM Trans. Model. Comput. Simul., 2002, v:12, n:3, pp:201-229 [Journal ] John S. Heidemann , Katia Obraczka , Joseph D. Touch Modeling the performance of HTTP over several transport protocols. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1997, v:5, n:5, pp:616-630 [Journal ] Chalermek Intanagonwiwat , Ramesh Govindan , Deborah Estrin , John S. Heidemann , Fabio Silva Directed diffusion for wireless sensor networking. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2003, v:11, n:1, pp:2-16 [Journal ] Wei Ye , John S. Heidemann , Deborah Estrin Medium access control with coordinated adaptive sleeping for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2004, v:12, n:3, pp:493-506 [Journal ] Deepak Ganesan , Ben Greenstein , Deborah Estrin , John S. Heidemann , Ramesh Govindan Multiresolution storage and search in sensor networks. [Citation Graph (0, 0)][DBLP ] TOS, 2005, v:1, n:3, pp:277-315 [Journal ] Lars Eggert , John S. Heidemann Application-Level Differentiated Services for Web Servers. [Citation Graph (0, 0)][DBLP ] World Wide Web, 1999, v:2, n:3, pp:133-142 [Journal ] Thanos Stathopoulos , Martin Lukac , Dustin McIntire , John S. Heidemann , Deborah Estrin , William J. Kaiser End-to-End Routing for Dual-Radio Sensor Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:2252-2260 [Conf ] Affan A. Syed , John S. Heidemann Time Synchronization for High Latency Acoustic Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] A. Hussain , J. Heidemann , C. Papadopoulos Identification of Repeated Denial of Service Attacks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Understanding passive and active service discovery. [Citation Graph (, )][DBLP ] Census and survey of the visible internet. [Citation Graph (, )][DBLP ] T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks. [Citation Graph (, )][DBLP ] Understanding spatio-temporal uncertainty in medium access with ALOHA protocols. [Citation Graph (, )][DBLP ] Low-power acoustic modem for dense underwater sensor networks. [Citation Graph (, )][DBLP ] Bringing sensor networks underwater with low-power acoustic communications. [Citation Graph (, )][DBLP ] Provenance in Sensornet Republishing. [Citation Graph (, )][DBLP ] Experiences with a continuous network tracing infrastructure. [Citation Graph (, )][DBLP ] Design and evaluation of network reconfiguration protocols for mostly-off sensor networks. [Citation Graph (, )][DBLP ] Effects of ensemble-TCP. [Citation Graph (, )][DBLP ] Remote detection of bottleneck links using spectral and statistical methods. [Citation Graph (, )][DBLP ] Search in 0.036secs, Finished in 0.042secs