• Publications
  • Influence
Practical robust localization over large-scale 802.11 wireless networks
TLDR
We demonstrate a system built using probabilistic techniques that allows for remarkably accurate localization across our entire office building using nothing more than the built-in signal intensity meter supplied by standard 802.11 cards. Expand
  • 762
  • 68
  • PDF
PeerReview: practical accountability for distributed systems
TLDR
We describe PeerReview, a system that provides accountability in distributed systems that provides Byzantine faults whose effects are observed by a correct node are eventually detected and irrefutably linked to a faulty node. Expand
  • 377
  • 50
  • PDF
Characterizing residential broadband networks
TLDR
A large and rapidly growing proportion of users connect to the Internet via residential broadband networks such as Digital Subscriber Lines (DSL) and cable. Expand
  • 373
  • 20
  • PDF
Efficient Replica Maintenance for Distributed Storage Systems
TLDR
This paper considers replication strategies for storage systems that aggregate the disks of many nodes spread over the Internet. Expand
  • 308
  • 19
  • PDF
A case for the accountable cloud
TLDR
In this paper, we propose that the cloud should be made accountable to both the customer and the provider. Expand
  • 184
  • 18
  • PDF
Glacier: highly durable, decentralized storage despite massive correlated failures
TLDR
We describe Glacier, a distributed storage system that relies on massive redundancy to mask the effect of large-scale correlated failures. Expand
  • 302
  • 13
  • PDF
Big Data Analytics over Encrypted Datasets with Seabed
TLDR
We introduce a novel, additively symmetric homomorphic encryption scheme called Splayed ASHE, or SPLASHE, that enables efficient analytics over large encrypted datasets. Expand
  • 75
  • 12
  • PDF
Linear dependent types for differential privacy
TLDR
We present DFuzz, an extension of Fuzz with a combination of linear indexed types and lightweight dependent types. Expand
  • 163
  • 11
  • PDF
Differential Privacy: An Economic Method for Choosing Epsilon
TLDR
We propose a simple model that expresses this balance as formulas over a handful of parameters, and we use our model to choose ε on a series of simple statistical studies. Expand
  • 174
  • 11
  • PDF
Secure network provenance
TLDR
This paper introduces secure network provenance (SNP), a novel technique that enables networked systems to explain to their operators why they are in a certain state -- e.g., why a suspicious routing table entry is present on a certain router. Expand
  • 133
  • 10
  • PDF
...
1
2
3
4
5
...