The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ben Greenstein: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ben Greenstein, Eddie Kohler, David E. Culler, Deborah Estrin
    Distributed Techniques for Area Computation in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2004, pp:533-541 [Conf]
  2. Tom Schoellhammer, Eric Osterweil, Ben Greenstein, Mike Wimbrow, Deborah Estrin
    Lightweight Temporal Compression of Microclimate Datasets. [Citation Graph (0, 0)][DBLP]
    LCN, 2004, pp:516-524 [Conf]
  3. Phillip T. Conrad, Ben Greenstein
    Teaching Network Performance Measurements Using Java. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1999, pp:74-80 [Conf]
  4. Deepak Ganesan, Ben Greenstein, Denis Perelyubskiy, Deborah Estrin, John S. Heidemann
    An evaluation of multi-resolution storage for sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2003, pp:89-102 [Conf]
  5. Ben Greenstein, Eddie Kohler, Deborah Estrin
    A sensor network application construction kit (SNACK). [Citation Graph (0, 0)][DBLP]
    SenSys, 2004, pp:69-80 [Conf]
  6. Ben Greenstein, Christopher Mar, Alex Pesterev, Shahin Farshchi, Eddie Kohler, Jack Judy, Deborah Estrin
    Capturing high-frequency phenomena using a bandwidth-limited sensor network. [Citation Graph (0, 0)][DBLP]
    SenSys, 2006, pp:279-292 [Conf]
  7. Omprakash Gnawali, Ki-Young Jang, Jeongyeup Paek, Marcos Vieira, Ramesh Govindan, Ben Greenstein, August Joki, Deborah Estrin, Eddie Kohler
    The tenet architecture for tiered sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2006, pp:153-166 [Conf]
  8. Deepak Ganesan, Ben Greenstein, Deborah Estrin, John S. Heidemann, Ramesh Govindan
    Multiresolution storage and search in sensor networks. [Citation Graph (0, 0)][DBLP]
    TOS, 2005, v:1, n:3, pp:277-315 [Journal]
  9. Ramakrishna Gummadi, David Wetherall, Ben Greenstein, Srinivasan Seshan
    Understanding and mitigating the impact of RF interference on 802.11 networks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:385-396 [Conf]

  10. Privacy oracle: a system for finding application leaks with black box differential testing. [Citation Graph (, )][DBLP]


  11. Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era. [Citation Graph (, )][DBLP]


  12. 802.11 user fingerprinting. [Citation Graph (, )][DBLP]


  13. Improving wireless privacy with an identifier-free link layer protocol. [Citation Graph (, )][DBLP]


  14. Wifi-reports: improving wireless network selection with collaboration. [Citation Graph (, )][DBLP]


  15. Physical Layer Attacks on Unlinkability in Wireless LANs. [Citation Graph (, )][DBLP]


  16. RFID sensor networks with the intel WISP. [Citation Graph (, )][DBLP]


  17. Performing traffic analysis on a wireless identifier-free link layer. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002