Wetherall

Results: 62



#Item
21Systems Directions for Pervasive Computing Robert Grimm, Janet Davis, Ben Hendrickson, Eric Lemar, Adam MacBeth, Steven Swanson, Tom Anderson, Brian Bershad, Gaetano Borriello, Steven Gribble, David Wetherall University

Systems Directions for Pervasive Computing Robert Grimm, Janet Davis, Ben Hendrickson, Eric Lemar, Adam MacBeth, Steven Swanson, Tom Anderson, Brian Bershad, Gaetano Borriello, Steven Gribble, David Wetherall University

Add to Reading List

Source URL: djw.cs.washington.edu

Language: English - Date: 2002-05-10 17:26:01
    22Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, and David Wetherall University of California, San Diego and University of Washington  Abstract. To

    Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, and David Wetherall University of California, San Diego and University of Washington Abstract. To

    Add to Reading List

    Source URL: djw.cs.washington.edu

    Language: English - Date: 2009-11-09 17:10:53
      2317th ACM Symposium on Operating Systems Principles (SOSP ’99) Published as Operating Systems Review 34(5):64–79, DecActive network vision and reality: lessons from a capsule-based system David Wetherall

      17th ACM Symposium on Operating Systems Principles (SOSP ’99) Published as Operating Systems Review 34(5):64–79, DecActive network vision and reality: lessons from a capsule-based system David Wetherall

      Add to Reading List

      Source URL: djw.cs.washington.edu

      Language: English - Date: 2002-11-01 15:17:52
        24Reverse Engineering the Internet Neil Spring, David Wetherall, and Thomas Anderson Department of Computer Science and Engineering, University of Washington ficient network measurement techniques make this possible. For e

        Reverse Engineering the Internet Neil Spring, David Wetherall, and Thomas Anderson Department of Computer Science and Engineering, University of Washington ficient network measurement techniques make this possible. For e

        Add to Reading List

        Source URL: djw.cs.washington.edu

        Language: English - Date: 2003-11-02 23:48:09
          25Understanding BGP Misconfiguration Ratul Mahajan David Wetherall  Tom Anderson

          Understanding BGP Misconfiguration Ratul Mahajan David Wetherall Tom Anderson

          Add to Reading List

          Source URL: djw.cs.washington.edu

          Language: English - Date: 2003-01-10 15:18:51
            26How Speedy is SPDY? Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy, and David Wetherall, University of Washington https://www.usenix.org/conference/nsdi14/technical-sessions/wang  This paper is included in

            How Speedy is SPDY? Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy, and David Wetherall, University of Washington https://www.usenix.org/conference/nsdi14/technical-sessions/wang This paper is included in

            Add to Reading List

            Source URL: www.usenix.org

            Language: English
            27SafeGuard: Safe Forwarding during Route Changes Ang Li Xiaowei Yang  David Wetherall

            SafeGuard: Safe Forwarding during Route Changes Ang Li Xiaowei Yang David Wetherall

            Add to Reading List

            Source URL: djw.cs.washington.edu

            Language: English - Date: 2009-11-09 17:15:48
              28A Wakeup Call for Internet Monitoring Systems: The Case for Distributed Triggers Ankur Jain†,∗ , Joseph M. Hellerstein‡,∗ , Sylvia Ratnasamy∗ , David Wetherall† † University  of Washington

              A Wakeup Call for Internet Monitoring Systems: The Case for Distributed Triggers Ankur Jain†,∗ , Joseph M. Hellerstein‡,∗ , Sylvia Ratnasamy∗ , David Wetherall† † University of Washington

              Add to Reading List

              Source URL: djw.cs.washington.edu

              Language: English - Date: 2005-02-11 22:37:09
                29Inferring Link Weights using End-to-End Measurements Ratul Mahajan Neil Spring  David Wetherall

                Inferring Link Weights using End-to-End Measurements Ratul Mahajan Neil Spring David Wetherall

                Add to Reading List

                Source URL: djw.cs.washington.edu

                Language: English - Date: 2003-01-10 15:17:52
                  30Expressive Privacy Control with Pseudonyms Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter Thomas Anderson, Arvind Krishnamurthy, David Wetherall University of Washington  {syhan, vincent, qp, simpeter, tom, arvind, dj

                  Expressive Privacy Control with Pseudonyms Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter Thomas Anderson, Arvind Krishnamurthy, David Wetherall University of Washington {syhan, vincent, qp, simpeter, tom, arvind, dj

                  Add to Reading List

                  Source URL: homes.cs.washington.edu

                  Language: English - Date: 2013-06-25 18:48:39