default search action
David Wetherall
Person information
- affiliation: University of Washington, Seattle, Washington, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c90]Mubashir Adnan Qureshi, Junhua Yan, Yuchung Cheng, Soheil Hassas Yeganeh, Yousuk Seung, Neal Cardwell, Willem de Bruijn, Van Jacobson, Jasleen Kaur, David Wetherall, Amin Vahdat:
Fathom: Understanding Datacenter Application Network Performance. SIGCOMM 2023: 394-405 - [c89]David Wetherall, Abdul Kabbani, Van Jacobson, Jim Winget, Yuchung Cheng, Charles B. Morrey III, Uma Moravapalle, Phillipa Gill, Steven Knight, Amin Vahdat:
Improving Network Availability with Protective ReRoute. SIGCOMM 2023: 684-695 - 2022
- [c88]Mubashir Adnan Qureshi, Yuchung Cheng, Qianwen Yin, Qiaobin Fu, Gautam Kumar, Masoud Moshref, Junhua Yan, Van Jacobson, David Wetherall, Abdul Kabbani:
PLB: congestion signals are simple and effective for network load balancing. SIGCOMM 2022: 207-218 - 2020
- [c87]Gautam Kumar, Nandita Dukkipati, Keon Jang, Hassan M. G. Wassel, Xian Wu, Behnam Montazeri, Yaogong Wang, Kevin Springborn, Christopher Alfeld, Michael Ryan, David Wetherall, Amin Vahdat:
Swift: Delay is Simple and Effective for Congestion Control in the Datacenter. SIGCOMM 2020: 514-528
2010 – 2019
- 2019
- [j30]David Wetherall, David L. Tennenhouse:
Retrospective on "towards an active network architecture". Comput. Commun. Rev. 49(5): 86-89 (2019) - 2016
- [j29]Seungyeop Han, Haichen Shen, Taesoo Kim, Arvind Krishnamurthy, Thomas E. Anderson, David Wetherall:
MetaSync: Coordinating Storage across Multiple File Synchronization Services. IEEE Internet Comput. 20(3): 36-44 (2016) - [c86]Xiao Sophia Wang, Arvind Krishnamurthy, David Wetherall:
Speeding up Web Page Loads with Shandian. NSDI 2016: 109-122 - 2015
- [j28]Haichen Shen, David Wetherall, Aruna Balasubramanian, Anthony LaMarca:
MobileHub: No Programmer Effort for Power Efficiency with Sensor Hub. GetMobile Mob. Comput. Commun. 19(4): 9-12 (2015) - [c85]Haichen Shen, Aruna Balasubramanian, Anthony LaMarca, David Wetherall:
Enhancing mobile apps to use sensor hubs without programmer effort. UbiComp 2015: 227-238 - [c84]Radhika Mittal, Vinh The Lam, Nandita Dukkipati, Emily R. Blem, Hassan M. G. Wassel, Monia Ghobadi, Amin Vahdat, Yaogong Wang, David Wetherall, David Zats:
TIMELY: RTT-based Congestion Control for the Datacenter. SIGCOMM 2015: 537-550 - [c83]Seungyeop Han, Haichen Shen, Taesoo Kim, Arvind Krishnamurthy, Thomas E. Anderson, David Wetherall:
MetaSync: File Synchronization Across Multiple Untrusted Storage Services. USENIX ATC 2015: 83-95 - 2014
- [j27]Shyamnath Gollakota, Matthew S. Reynolds, Joshua R. Smith, David Wetherall:
The Emergence of RF-Powered Computing. Computer 47(1): 32-39 (2014) - [c82]Ilias Leontiadis, Antonio Lima, Haewoon Kwak, Rade Stanojevic, David Wetherall, Konstantina Papagiannaki:
From Cells to Streets: Estimating Mobile Paths with Cellular-Side Data. CoNEXT 2014: 121-132 - [c81]Xiao Sophia Wang, Arvind Krishnamurthy, David Wetherall:
How Much Can We Micro-Cache Web Pages? Internet Measurement Conference 2014: 249-256 - [c80]Seungyeop Han, Rajalakshmi Nandakumar, Matthai Philipose, Arvind Krishnamurthy, David Wetherall:
GlimpseData: towards continuous vision-based personal analytics. WPA@MobiSys 2014: 31-36 - [c79]Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy, David Wetherall:
How Speedy is SPDY? NSDI 2014: 387-399 - [c78]Bryce Kellogg, Aaron N. Parks, Shyamnath Gollakota, Joshua R. Smith, David Wetherall:
Wi-fi backscatter: internet connectivity for RF-powered devices. SIGCOMM 2014: 607-618 - [c77]Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang, David Wetherall:
Brahmastra: Driving Apps to Test the Security of Third-Party Components. USENIX Security Symposium 2014: 1021-1036 - 2013
- [c76]Andrius Aucinas, Narseo Vallina-Rodriguez, Yan Grunenberger, Vijay Erramilli, Konstantina Papagiannaki, Jon Crowcroft, David Wetherall:
Staying online while mobile: the hidden costs. CoNEXT 2013: 315-320 - [c75]Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy, David Wetherall:
Demystifying Page Load Performance with WProf. NSDI 2013: 473-485 - [c74]Vincent Liu, Aaron N. Parks, Vamsi Talla, Shyamnath Gollakota, David Wetherall, Joshua R. Smith:
Ambient backscatter: wireless communication out of thin air. SIGCOMM 2013: 39-50 - [c73]Xiao Sophia Wang, Haichen Shen, David Wetherall:
Accelerating the mobile web with selective offloading. MCC@SIGCOMM 2013: 45-50 - [c72]Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter, Thomas E. Anderson, Arvind Krishnamurthy, David Wetherall:
Expressive privacy control with pseudonyms. SIGCOMM 2013: 291-302 - [c71]Vamsi Talla, Michael Buettner, David Wetherall, Joshua R. Smith:
Hybrid analog-digital backscatter platform for high data rate, battery-free sensing. WiSNet 2013: 1-3 - 2012
- [j26]Marco Gruteser, David Wetherall:
Guest Editorial: Special Section on Outstanding Papers from MobiSys 2011. IEEE Trans. Mob. Comput. 11(5): 705-706 (2012) - [j25]Franziska Roesner, Christopher Rovillos, Tadayoshi Kohno, David Wetherall:
ShareMeNot: Balancing Privacy and Functionality of Third-Party Social Widgets. login Usenix Mag. 37(4) (2012) - [c70]Jaeyeon Jung, Seungyeop Han, David Wetherall:
Short paper: enhancing mobile application permissions with runtime feedback and constraints. SPSM@CCS 2012: 45-50 - [c69]Aruna Balasubramanian, Niranjan Balasubramanian, Samuel J. Huston, Donald Metzler, David Wetherall:
FindAll: a local search engine for mobile phones. CoNEXT 2012: 277-288 - [c68]Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman M. Sadeh, David Wetherall:
A Conundrum of Permissions: Installing Applications on an Android Smartphone. Financial Cryptography Workshops 2012: 68-79 - [c67]Franziska Roesner, Tadayoshi Kohno, David Wetherall:
Detecting and Defending Against Third-Party Tracking on the Web. NSDI 2012: 155-168 - 2011
- [b2]Andrew S. Tanenbaum, David Wetherall:
Computer networks, 5th Edition. Pearson 2011, ISBN 0132553171, pp. 1-951 - [j24]W. Keith Edwards, Rebecca E. Grinter, Ratul Mahajan, David Wetherall:
Advancing the state of home networking. Commun. ACM 54(6): 62-71 (2011) - [j23]Daniel Halperin, Wenjun Hu, Anmol Sheth, David Wetherall:
Tool release: gathering 802.11n traces with channel state information. Comput. Commun. Rev. 41(1): 53 (2011) - [j22]David (Yu) Zhu, Jaeyeon Jung, Dawn Song, Tadayoshi Kohno, David Wetherall:
TaintEraser: protecting sensitive data leaks using application-level taint tracking. ACM SIGOPS Oper. Syst. Rev. 45(1): 142-154 (2011) - [c66]Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart E. Schechter, David Wetherall:
These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. CCS 2011: 639-652 - [c65]David Wetherall, David R. Choffnes, Ben Greenstein, Seungyeop Han, Peter Hornyack, Jaeyeon Jung, Stuart E. Schechter, Xiao Sophia Wang:
Privacy Revelations for Web and Mobile Apps. HotOS 2011 - [c64]Moo-Ryong Ra, Anmol Sheth, Lily B. Mummert, Padmanabhan Pillai, David Wetherall, Ramesh Govindan:
Odessa: enabling interactive perception applications on mobile devices. MobiSys 2011: 43-56 - [c63]Michael Buettner, Benjamin Greenstein, David Wetherall:
Dewdrop: An Energy-Aware Runtime for Computational RFID. NSDI 2011 - [c62]Daniel Halperin, Srikanth Kandula, Jitendra Padhye, Paramvir Bahl, David Wetherall:
Augmenting data center networks with multi-gigabit wireless links. SIGCOMM 2011: 38-49 - [c61]Xiao Sophia Wang, David R. Choffnes, Patrick Gage Kelley, Ben Greenstein, David Wetherall:
Measuring and predicting web login safety. W-MUST@SIGCOMM 2011: 55-60 - [c60]Gabriel Maganis, Jaeyeon Jung, Tadayoshi Kohno, Anmol Sheth, David Wetherall:
Sensor tricorder: what does that sensor know about me? HotMobile 2011: 98-103 - [e5]Ashok K. Agrawala, Mark D. Corner, David Wetherall:
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys 2011), Bethesda, MD, USA, June 28 - July 01, 2011. ACM 2011, ISBN 978-1-4503-0643-0 [contents] - [e4]Nina Taft, David Wetherall:
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, W-MUST@SIGCOMM 2011, Toronto, Ontario, Canada, August 19, 2011. ACM 2011, ISBN 978-1-4503-0800-7 [contents] - 2010
- [j21]Daniel Halperin, Wenjun Hu, Anmol Sheth, David Wetherall:
802.11 with multiple antennas for dummies. Comput. Commun. Rev. 40(1): 19-25 (2010) - [j20]Michael Buettner, David Wetherall:
A "Gen 2" RFID monitor based on the USRP. Comput. Commun. Rev. 40(3): 41-47 (2010) - [j19]Sumit Roy, Vikram Jandhyala, Joshua R. Smith, David Wetherall, Brian P. Otis, Ritochit Chakraborty, Michael Buettner, Daniel J. Yeager, You-Chang Ko, Alanson P. Sample:
RFID: From Supply Chains to Sensor Nets. Proc. IEEE 98(9): 1583-1592 (2010) - [c59]Daniel Halperin, Wenjun Hu, Anmol Sheth, David Wetherall:
Predictable 802.11 packet delivery from wireless channel measurements. SIGCOMM 2010: 159-170 - [c58]Peter Gilbert, Landon P. Cox, Jaeyeon Jung, David Wetherall:
Toward trustworthy mobile sensing. HotMobile 2010: 31-36
2000 – 2009
- 2009
- [c57]Predrag V. Klasnja, Sunny Consolvo, Jaeyeon Jung, Benjamin Greenstein, Louis LeGrand, Pauline S. Powledge, David Wetherall:
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use. CHI 2009: 1993-2002 - [c56]Ang Li, Xiaowei Yang, David Wetherall:
SafeGuard: safe forwarding during route changes. CoNEXT 2009: 301-312 - [c55]Michael Buettner, Richa Prasad, Matthai Philipose, David Wetherall:
Recognizing daily activities with RFID-based sensors. UbiComp 2009: 51-60 - [c54]Anmol Sheth, Srinivasan Seshan, David Wetherall:
Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries. Pervasive 2009: 274-290 - [c53]Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, David Wetherall:
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default. Privacy Enhancing Technologies 2009: 143-163 - 2008
- [j18]Xiaowei Yang, David Wetherall, Thomas E. Anderson:
TVA: a DoS-limiting network architecture. IEEE/ACM Trans. Netw. 16(6): 1267-1280 (2008) - [c52]Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, Tadayoshi Kohno:
Privacy oracle: a system for finding application leaks with black box differential testing. CCS 2008: 279-288 - [c51]Michael Buettner, Ben Greenstein, Alanson P. Sample, Joshua R. Smith, David Wetherall:
Revisiting Smart Dust with RFID Sensor Networks. HotNets 2008: 37-42 - [c50]Michael Buettner, David Wetherall:
An empirical study of UHF RFID performance. MobiCom 2008: 223-234 - [c49]Daniel Halperin, Thomas E. Anderson, David Wetherall:
Taking the sting out of carrier sense: interference cancellation for wireless LANs. MobiCom 2008: 339-350 - [c48]Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall:
Improving wireless privacy with an identifier-free link layer protocol. MobiSys 2008: 40-53 - [c47]Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas E. Anderson:
Studying Black Holes in the Internet with Hubble. NSDI 2008: 247-262 - [c46]Sergiu Nedevschi, Lucian Popa, Gianluca Iannaccone, Sylvia Ratnasamy, David Wetherall:
Reducing Network Energy Consumption via Sleeping and Rate-Adaptation. NSDI 2008: 323-336 - [c45]Xin Liu, Ang Li, Xiaowei Yang, David Wetherall:
Passport: Secure and Adoptable Source Authentication. NSDI 2008: 365-376 - [c44]Michael Buettner, Richa Prasad, Alanson P. Sample, Daniel J. Yeager, Ben Greenstein, Joshua R. Smith, David Wetherall:
RFID sensor networks with the intel WISP. SenSys 2008: 393-394 - [e3]Victor Bahl, David Wetherall, Stefan Savage, Ion Stoica:
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008. ACM 2008, ISBN 978-1-60558-175-0 [contents] - 2007
- [j17]David L. Tennenhouse, David Wetherall:
Towards an active network architecture. Comput. Commun. Rev. 37(5): 81-94 (2007) - [c43]Daniel Halperin, M. Josie Ammer, Thomas E. Anderson, David Wetherall:
Interference Cancellation: Better Receivers for a New Wireless MAC. HotNets 2007 - [c42]Jeffrey Pang, Ben Greenstein, Srinivasan Seshan, David Wetherall:
Tryst: The Case for Confidential Service Discovery. HotNets 2007 - [c41]Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang, Mike Y. Chen, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall:
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era. HotOS 2007 - [c40]Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, David Wetherall:
802.11 user fingerprinting. MobiCom 2007: 99-110 - [c39]Ratul Mahajan, David Wetherall, Thomas E. Anderson:
Mutually Controlled Routing with Independent ISPs. NSDI 2007 - [c38]Ramakrishna Gummadi, David Wetherall, Ben Greenstein, Srinivasan Seshan:
Understanding and mitigating the impact of RF interference on 802.11 networks. SIGCOMM 2007: 385-396 - 2006
- [j16]David Wetherall:
10 Networking Papers: readings for protocol design. Comput. Commun. Rev. 36(3): 77-78 (2006) - [c37]Ethan Katz-Bassett, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas E. Anderson, Yatin Chawathe:
Towards IP geolocation using delay and topology measurements. Internet Measurement Conference 2006: 71-84 - [c36]Anthony J. Nicholson, Yatin Chawathe, Mike Y. Chen, Brian D. Noble, David Wetherall:
Improved access point selection. MobiSys 2006: 233-245 - [c35]Charles Reis, Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan:
Measurement-based models of delivery and interference in static wireless networks. SIGCOMM 2006: 51-62 - [c34]Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan:
Analyzing the MAC-level behavior of wireless networks in the wild. SIGCOMM 2006: 75-86 - [c33]Xiaowei Yang, David Wetherall:
Source selectable path diversity via routing deflections. SIGCOMM 2006: 159-170 - [c32]Xin Liu, Xiaowei Yang, David Wetherall, Thomas E. Anderson:
Efficient and Secure Source Authentication with Packet Passports. SRUTI 2006 - 2005
- [j15]Joseph M. Hellerstein, Vern Paxson, Larry L. Peterson, Timothy Roscoe, Scott Shenker, David Wetherall:
The Network Oracle. IEEE Data Eng. Bull. 28(1): 3-10 (2005) - [c31]Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan:
Sustaining Cooperation in Multi-hop Wireless Networks. NSDI 2005 - [c30]Ratul Mahajan, David Wetherall, Thomas E. Anderson:
Negotiation-Based Routing Between Neighboring ISPs. NSDI 2005 - [c29]Maya Rodrig, Charles Reis, Ratul Mahajan, David Wetherall, John Zahorjan:
Measurement-based characterization of 802.11 in a hotspot setting. E-WIND@SIGCOMM 2005: 5-10 - [c28]Xiaowei Yang, David Wetherall, Thomas E. Anderson:
A DoS-limiting network architecture. SIGCOMM 2005: 241-252 - [e2]Amin Vahdat, David Wetherall:
2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), May 2-4, 2005, Boston, Massachusetts, USA, Proceedings. USENIX 2005 [contents] - 2004
- [j14]Neil T. Spring, David Wetherall, Thomas E. Anderson:
Reverse engineering the Internet. Comput. Commun. Rev. 34(1): 3-8 (2004) - [j13]Thomas E. Anderson, Timothy Roscoe, David Wetherall:
Preventing Internet denial-of-service with capabilities. Comput. Commun. Rev. 34(1): 39-44 (2004) - [j12]Robert Grimm, Janet Davis, Eric Lemar, Adam MacBeth, Steven Swanson, Thomas E. Anderson, Brian N. Bershad, Gaetano Borriello, Steven D. Gribble, David Wetherall:
System support for pervasive applications. ACM Trans. Comput. Syst. 22(4): 421-486 (2004) - [j11]Neil T. Spring, Ratul Mahajan, David Wetherall, Thomas E. Anderson:
Measuring ISP topologies with rocketfuel. IEEE/ACM Trans. Netw. 12(1): 2-16 (2004) - [c27]P. Krishna Gummadi, Harsha V. Madhyastha, Steven D. Gribble, Henry M. Levy, David Wetherall:
Improving the Reliability of Internet Paths with One-hop Source Routing. OSDI 2004: 183-198 - 2003
- [j10]Thomas E. Anderson, Scott Shenker, Ion Stoica, David Wetherall:
Design guidelines for robust Internet protocols. Comput. Commun. Rev. 33(1): 125-130 (2003) - [c26]Parveen Patel, David Wetherall, Jay Lepreau, Andrew Whitaker:
TCP Meets Mobile Code. HotOS 2003: 31-36 - [c25]Parveen Patel, Andrew Whitaker, David Wetherall, Jay Lepreau, Tim Stack:
Upgrading transport protocols using untrusted mobile code. SOSP 2003: 1-14 - [c24]Ratul Mahajan, Neil T. Spring, David Wetherall, Thomas E. Anderson:
User-level internet path diagnosis. SOSP 2003: 106-119 - [c23]Sushant Jain, Ratul Mahajan, David Wetherall:
A Study of the Performance Potential of DHT-based Overlays. USENIX Symposium on Internet Technologies and Systems 2003 - [c22]Neil T. Spring, David Wetherall, Thomas E. Anderson:
Scriptroute: A Public Internet Measurement Facility. USENIX Symposium on Internet Technologies and Systems 2003 - [e1]Anja Feldmann, Martina Zitterbart, Jon Crowcroft, David Wetherall:
Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 25-29, 2003, Karlsruhe, Germany. ACM 2003, ISBN 1-58113-735-4 [contents] - [i1]Neil Spring, David Wetherall, David Ely:
Robust Explicit Congestion Notification (ECN) Signaling with Nonces. RFC 3540: 1-13 (2003) - 2002
- [j9]Andrew T. Campbell, David Wetherall, Raj Yavatkar:
Programmable Networks. Comput. Networks 38(3): 273-275 (2002) - [c21]David L. Tennenhouse, David Wetherall:
Towards an Active Network Architecture. DANCE 2002: 2-15 - [c20]Michael W. Hicks, Jonathan T. Moore, David Wetherall, Scott Nettles:
Experiences with Capsule-Based Active Networking. DANCE 2002: 16-24 - [c19]David Wetherall:
Active Network Vision and Reality: Lessons from a Capsule-Based System. DANCE 2002: 25- - [c18]Ratul Mahajan, Neil T. Spring, David Wetherall, Thomas E. Anderson:
Inferring link weights using end-to-end measurements. Internet Measurement Workshop 2002: 231-236 - [c17]Ratul Mahajan, David Wetherall, Thomas E. Anderson:
Understanding BGP misconfiguration. SIGCOMM 2002: 3-16 - [c16]Neil T. Spring, Ratul Mahajan, David Wetherall:
Measuring ISP topologies with rocketfuel. SIGCOMM 2002: 133-145 - 2001
- [j8]Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson:
Network support for IP traceback. IEEE/ACM Trans. Netw. 9(3): 226-237 (2001) - [c15]Robert Grimm, Janet Davis, Ben Hendrickson, Eric Lemar, Adam MacBeth, Steven Swanson, Thomas E. Anderson, Brian N. Bershad, Gaetano Borriello, Steven D. Gribble, David Wetherall:
Systems Directions for Pervasive Computing. HotOS 2001: 147-151 - [c14]Ratul Mahajan, Sally Floyd, David Wetherall:
Controlling High-Bandwidth Flows at the Congested Router. ICNP 2001: 192-201 - [c13]David Ely, Neil Spring, David Wetherall, Stefan Savage, Thomas E. Anderson:
Robust Congestion Signaling. ICNP 2001: 332-341 - [c12]David Ely, Stefan Savage, David Wetherall:
Alpine: A User-Level Infrastructure for Network Protocol Development. USITS 2001 - 2000
- [c11]Neil T. Spring, David Wetherall:
A protocol-independent technique for eliminating redundant network traffic. SIGCOMM 2000: 87-95 - [c10]Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson:
Practical network support for IP traceback. SIGCOMM 2000: 295-306 - [c9]Robert Grimm, Thomas E. Anderson, Brian N. Bershad, David Wetherall:
A system architecture for pervasive computing. ACM SIGOPS European Workshop 2000: 177-182
1990 – 1999
- 1999
- [j7]Stefan Savage, Neal Cardwell, David Wetherall, Thomas E. Anderson:
TCP congestion control with a misbehaving receiver. Comput. Commun. Rev. 29(5): 71-78 (1999) - [j6]David Wetherall, John V. Guttag, David L. Tennenhouse:
ANTS: Network Services Without the Red Tape. Computer 32(4): 42-48 (1999) - [c8]Vanu G. Bose, David Wetherall, John V. Guttag:
Next Century Challenges: RadioActive Networks. MobiCom 1999: 242-248 - [c7]David Wetherall:
Active network vision and reality: lessions form a capsule-based system. SOSP 1999: 64-79 - 1998
- [b1]David Wetherall:
Service introduction in an active network. Massachusetts Institute of Technology, Cambridge, MA, USA, 1998 - [j5]David Wetherall, D. Legedza, John V. Guttag:
Introducing new Internet services: why and how. IEEE Netw. 12(3): 12-19 (1998) - [c6]Ulana Legedza, David Wetherall, John V. Guttag:
Improving the Performance of Distributed Applications Using Active Networks. INFOCOM 1998: 590-599 - [c5]Jonathan R. Santos, David Wetherall:
Increasing Effective Link Bandwidth by Supressing Replicated Data. USENIX ATC 1998 - 1997
- [j4]David L. Tennenhouse, Jonathan M. Smith, W. David Sincoskie, David Wetherall, Gary J. Minden:
A survey of active network research. IEEE Commun. Mag. 35(1): 80-86 (1997) - 1996
- [j3]David L. Tennenhouse, David Wetherall:
Towards an active network architecture. Comput. Commun. Rev. 26(2): 5-17 (1996) - 1995
- [j2]Christopher Lindblad, David Wetherall, William F. Stasior, Joel F. Adam, Henry H. Houh, Michael Ismert, David R. Bacher, Brent M. Phillips, David L. Tennenhouse:
ViewStation Applications: Implications for Network Traffic. IEEE J. Sel. Areas Commun. 13(5): 768-778 (1995) - [j1]David L. Tennenhouse, Joel F. Adam, David Carver, Henry H. Houh, Michael Ismert, Christopher Lindblad, William F. Stasior, David Wetherall, David R. Bacher, Theresa Chang:
The ViewStation: A Software-Intensive Approach to Media Processing and Distribution. Multim. Syst. 3(3): 104-115 (1995) - [c4]David Wetherall:
Extending Tcl for Dynamic Object-Oriented Programming. Tcl/Tk Workshop 1995 - 1994
- [c3]Christopher Lindblad, David Wetherall, William F. Stasior, Joel F. Adam, Henry H. Houh, Michael Ismert, David R. Bacher, Brent M. Phillips, David L. Tennenhouse:
ViewStation Applications: Intelligent Video Processing Over a Broadband Local Area Network. USENIX High-Speed Networking Symposium 1994 - [c2]David L. Tennenhouse, Joel F. Adam, David Carver, Henry H. Houh, Michael Ismert, Christopher Lindblad, William F. Stasior, David Wetherall, David R. Bacher, Theresa Chang:
A Software-Oriented Approach to the Design of Media Processing Environments. ICMCS 1994: 435-444 - [c1]Christopher Lindblad, David Wetherall, David L. Tennenhouse:
The VuSystem: A Programming System for Visual Processing of Digital Video. ACM Multimedia 1994: 307-314
Coauthor Index
aka: Benjamin Greenstein
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 23:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint