Measuring ISP topologies with Rocketfuel
- N. Spring, Ratul Mahajan, D. Wetherall
- Computer ScienceIEEE/ACM Transactions on Networking
- 2004
New Internet mapping techniques that have enabled us to measure router-level ISP topologies are presented, finding that these maps are substantially more complete than those of earlier Internet mapping efforts.
Tool release: gathering 802.11n traces with channel state information
- D. Halperin, Wenjun Hu, Anmol Sheth, D. Wetherall
- Computer ScienceCCRV
- 22 January 2011
The measurement setup comprises the customized versions of Intel's close-source firmware and open-source iwlwifi wireless driver, userspace tools to enable these measurements, access point functionality for controlling both ends of the link, and Matlab scripts for data analysis.
Ambient backscatter: wireless communication out of thin air
- Vincent Liu, A. Parks, V. Talla, Shyamnath Gollakota, D. Wetherall, Joshua R. Smith
- Computer ScienceConference on Applications, Technologies…
- 12 August 2013
The design of a communication system that enables two devices to communicate using ambient RF as the only source of power is presented, enabling ubiquitous communication where devices can communicate among themselves at unprecedented scales and in locations that were previously inaccessible.
Practical network support for IP traceback
- S. Savage, D. Wetherall, Anna R. Karlin, T. Anderson
- Computer ScienceConference on Applications, Technologies…
- 28 August 2000
A general purpose traceback mechanism based on probabilistic packet marking in the network that allows a victim to identify the network path(s) traversed by attack traffic without requiring interactive operational support from Internet Service Providers (ISPs).
Predictable 802.11 packet delivery from wireless channel measurements
- D. Halperin, Wenjun Hu, Anmol Sheth, D. Wetherall
- Computer ScienceConference on Applications, Technologies…
- 16 August 2010
It is shown that, for the first time, wireless packet delivery can be accurately predicted for commodity 802.11 NICs from only the channel measurements that they provide, and the rate prediction is as good as the best rate adaptation algorithms for 802.
Measuring ISP topologies with rocketfuel
- N. Spring, Ratul Mahajan, D. Wetherall, T. Anderson
- Computer ScienceTNET
- 1 October 2002
New Internet mapping techniques that have enabled us to measure router-level ISP topologies are presented, finding that these maps are substantially more complete than those of earlier Internet mapping efforts.
Network support for IP traceback
- S. Savage, D. Wetherall, Anna R. Karlin, T. Anderson
- Computer ScienceTNET
- 1 June 2001
A general purpose traceback mechanism based on probabilistic packet marking in the network that allows a victim to identify the network path(s) traversed by attack traffic without requiring interactive operational support from Internet Service Providers (ISPs).
TIMELY: RTT-based Congestion Control for the Datacenter
TIMELY is the first delay-based congestion control protocol for use in the datacenter, and it achieves its results despite having an order of magnitude fewer RTT signals than earlier delay- based schemes such as Vegas.
These aren't the droids you're looking for: retrofitting android to protect data from imperious applications
- Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart E. Schechter, D. Wetherall
- Computer ScienceConference on Computer and Communications…
- 17 October 2011
Two privacy controls for Android smartphones that empower users to run permission-hungry applications while protecting private data from being exfiltrated are examined, finding that they can successfully reduce the effective permissions of the application without causing side effects for 66% of the tested applications.
A survey of active network research
- D. Tennenhouse, Jonathan M. Smith, W. Sincoskie, D. Wetherall, G. Minden
- Computer ScienceIEEE Communications Magazine
- 1997
It is illustrated how the routers of an IP network could be augmented to perform such customized processing on the datagrams flowing through them, and these active routers could also interoperate with legacy routers, which transparently forwarddatagrams in the traditional manner.
...
...