default search action
Ben Greenstein
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c33]Byungjin Jun, Fabián E. Bustamante, Ben Greenstein, Ian Clelland:
Reining in mobile web performance with document and permission policies. HotMobile 2022: 95-101 - 2021
- [i1]Byungjin Jun, Fabian E. Bustamante, Ben Greenstein, Ian Clelland:
Reining in Mobile Web Performance with Document and Permission Policies. CoRR abs/2111.09960 (2021)
2010 – 2019
- 2018
- [c32]Ben Greenstein:
Session details: We are the Engineers: Mobile Systems and Networking. MobiCom 2018 - [c31]Ben Greenstein:
Delivering the Mobile Web to the Next Billion Users. HotMobile 2018: 99 - 2017
- [e1]Kobus van der Merwe, Ben Greenstein, Kannan Srinivasan:
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, MobiCom 2017, Snowbird, UT, USA, October 16 - 20, 2017. ACM 2017, ISBN 978-1-4503-4916-1 [contents] - 2015
- [c30]Victor Agababov, Michael Buettner, Victor Chudnovsky, Mark Cogan, Ben Greenstein, Shane McDaniel, Michael Piatek, Colin Scott, Matt Welsh, Bolian Yin:
Flywheel: Google's Data Compression Proxy for the Mobile Web. NSDI 2015: 367-380 - 2013
- [c29]Matthew Kay, Kyle Rector, Sunny Consolvo, Ben Greenstein, Jacob O. Wobbrock, Nathaniel F. Watson, Julie A. Kientz:
PVT-touch: Adapting a reaction time test for touchscreen devices. PervasiveHealth 2013: 248-251 - 2012
- [c28]Jared S. Bauer, Sunny Consolvo, Benjamin Greenstein, Jonathan W. Schooler, Eric Wu, Nathaniel F. Watson, Julie A. Kientz:
ShutEye: encouraging awareness of healthy sleep recommendations with a mobile, peripheral display. CHI 2012: 1401-1410 - [c27]Matthew Kay, Eun Kyoung Choe, Jesse Shepherd, Benjamin Greenstein, Nathaniel F. Watson, Sunny Consolvo, Julie A. Kientz:
Lullaby: a capture & access system for understanding the sleep environment. UbiComp 2012: 226-234 - 2011
- [c26]David Wetherall, David R. Choffnes, Ben Greenstein, Seungyeop Han, Peter Hornyack, Jaeyeon Jung, Stuart E. Schechter, Xiao Sophia Wang:
Privacy Revelations for Web and Mobile Apps. HotOS 2011 - [c25]Michael Buettner, Benjamin Greenstein, David Wetherall:
Dewdrop: An Energy-Aware Runtime for Computational RFID. NSDI 2011 - [c24]Xiao Sophia Wang, David R. Choffnes, Patrick Gage Kelley, Ben Greenstein, David Wetherall:
Measuring and predicting web login safety. W-MUST@SIGCOMM 2011: 55-60 - [c23]Ben Greenstein, Brent Longstaff:
FollowMe: enhancing mobile applications with open infrastructure sensing. HotMobile 2011: 105-110 - 2010
- [j4]Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Damon McCoy, Srinivasan Seshan:
Wifi-Reports: Improving Wireless Network Selection with Collaboration. IEEE Trans. Mob. Comput. 9(12): 1713-1731 (2010) - [j3]Jeongyeup Paek, Ben Greenstein, Omprakash Gnawali, Ki-Young Jang, August Joki, Marcos Augusto M. Vieira, John Hicks, Deborah Estrin, Ramesh Govindan, Eddie Kohler:
The Tenet architecture for tiered sensor networks. ACM Trans. Sens. Networks 6(4): 34:1-34:44 (2010) - [c22]Sunny Consolvo, Jaeyeon Jung, Ben Greenstein, Pauline S. Powledge, Gabriel Maganis, Daniel Avrahami:
The Wi-Fi privacy ticker: improving awareness & control of personal information exposure on Wi-Fi. UbiComp 2010: 321-330
2000 – 2009
- 2009
- [c21]Predrag V. Klasnja, Sunny Consolvo, Jaeyeon Jung, Benjamin Greenstein, Louis LeGrand, Pauline S. Powledge, David Wetherall:
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use. CHI 2009: 1993-2002 - [c20]Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Damon McCoy, Srinivasan Seshan:
Wifi-reports: improving wireless network selection with collaboration. MobiSys 2009: 123-136 - [c19]Kevin S. Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas C. Sicker:
Physical Layer Attacks on Unlinkability in Wireless LANs. Privacy Enhancing Technologies 2009: 108-127 - [c18]Kevin S. Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas C. Sicker:
Performing traffic analysis on a wireless identifier-free link layer. Richard Tapia Celebration of Diversity in Computing Conference 2009: 18-23 - 2008
- [c17]Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, Tadayoshi Kohno:
Privacy oracle: a system for finding application leaks with black box differential testing. CCS 2008: 279-288 - [c16]Michael Buettner, Ben Greenstein, Alanson P. Sample, Joshua R. Smith, David Wetherall:
Revisiting Smart Dust with RFID Sensor Networks. HotNets 2008: 37-42 - [c15]Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall:
Improving wireless privacy with an identifier-free link layer protocol. MobiSys 2008: 40-53 - [c14]Michael Buettner, Richa Prasad, Alanson P. Sample, Daniel J. Yeager, Ben Greenstein, Joshua R. Smith, David Wetherall:
RFID sensor networks with the intel WISP. SenSys 2008: 393-394 - 2007
- [c13]Jeffrey Pang, Ben Greenstein, Srinivasan Seshan, David Wetherall:
Tryst: The Case for Confidential Service Discovery. HotNets 2007 - [c12]Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang, Mike Y. Chen, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall:
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era. HotOS 2007 - [c11]Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, David Wetherall:
802.11 user fingerprinting. MobiCom 2007: 99-110 - [c10]Ramakrishna Gummadi, David Wetherall, Ben Greenstein, Srinivasan Seshan:
Understanding and mitigating the impact of RF interference on 802.11 networks. SIGCOMM 2007: 385-396 - 2006
- [c9]Omprakash Gnawali, Ki-Young Jang, Jeongyeup Paek, Marcos Augusto M. Vieira, Ramesh Govindan, Ben Greenstein, August Joki, Deborah Estrin, Eddie Kohler:
The tenet architecture for tiered sensor networks. SenSys 2006: 153-166 - [c8]Ben Greenstein, Christopher Mar, Alex Pesterev, Shahin Farshchi, Eddie Kohler, Jack W. Judy, Deborah Estrin:
Capturing high-frequency phenomena using a bandwidth-limited sensor network. SenSys 2006: 279-292 - 2005
- [j2]Deepak Ganesan, Ben Greenstein, Deborah Estrin, John S. Heidemann, Ramesh Govindan:
Multiresolution storage and search in sensor networks. ACM Trans. Storage 1(3): 277-315 (2005) - 2004
- [c7]Tom Schoellhammer, Eric Osterweil, Ben Greenstein, Mike Wimbrow, Deborah Estrin:
Lightweight Temporal Compression of Microclimate Datasets. LCN 2004: 516-524 - [c6]Ben Greenstein, Eddie Kohler, David E. Culler, Deborah Estrin:
Distributed Techniques for Area Computation in Sensor Networks. LCN 2004: 533-541 - [c5]Ben Greenstein, Eddie Kohler, Deborah Estrin:
A sensor network application construction kit (SNACK). SenSys 2004: 69-80 - 2003
- [j1]Benjamin Greenstein, Sylvia Ratnasamy, Scott Shenker, Ramesh Govindan, Deborah Estrin:
DIFS: a distributed index for features in sensor networks. Ad Hoc Networks 1(2-3): 333-349 (2003) - [c4]Deepak Ganesan, Ben Greenstein, Denis Perelyubskiy, Deborah Estrin, John S. Heidemann:
An evaluation of multi-resolution storage for sensor networks. SenSys 2003: 89-102 - 2002
- [c3]Zhenghua Fu, Benjamin Greenstein, Xiaoqiao Meng, Songwu Lu:
Design and Implementation of a TCP-Friendly Transport Protocol for Ad Hoc Wireless Networks. ICNP 2002: 216-225 - 2001
- [c2]Paul C. Castro, Benjamin Greenstein, Richard R. Muntz, Parviz Kermani, Chatschik Bisdikian, Maria Papadopouli:
Locating application data across service discovery domains. MobiCom 2001: 28-42
1990 – 1999
- 1999
- [c1]Phillip T. Conrad, Ben Greenstein:
Teaching Network Performance Measurements Using Java. PDPTA 1999: 74-80
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint