Center for Information Technology Policy (CITP)

Filter
Conference contribution

Search results

  • 2009

    Building a fast, virtualized data plane with programmable hardware

    Anwer, M. B. & Feamster, N., Aug 17 2009, SIGCOMM 2009 - Proceedings of the 2009 SIGCOMM Conference and Co-Located Workshops, VISA 2009. Association for Computing Machinery, Inc, p. 1-8 8 p. (SIGCOMM 2009 - Proceedings of the 2009 SIGCOMM Conference and Co-Located Workshops, VISA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Scopus citations
  • Characterizing the TLB behavior of emerging parallelworkloads on chip multiprocessors

    Bhattacharjee, A. & Martonosi, M. R., 2009, Proceedings - 2009 18th International Conference on Parallel Architectures and Compilation Techniques, PACT 2009. p. 29-40 12 p. 5260572. (Parallel Architectures and Compilation Techniques - Conference Proceedings, PACT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    76 Scopus citations
  • Characterizing VLAN-induced sharing in a campus network

    Tariq, M. B., Mansy, A., Feamster, N. & Ammar, M., 2009, IMC 2009 - Proceedings of the 2009 ACM SIGCOMM Internet Measurement Conference. p. 116-121 6 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Comparing multilateral and bilateral exchange models for content distribution

    Aperjis, C., Freedman, M. J. & Johari, R., 2009, Proceedings - 2009 IEEE Information Theory Workshop on Networking and Information Theory, ITW 2009. p. 145-146 2 p. 5158559. (Proceedings - 2009 IEEE Information Theory Workshop on Networking and Information Theory, ITW 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Cooperative content distribution and traffic engineering in an ISP network

    Jiang, W., Rui, Z. S., Rexford, J. L. & Chiang, M., 2009, SIGMETRICS/Performance'09 - Proceedings of the 11th International Joint Conference on Measurement and Modeling of Computer Systems. 1 ed. p. 239-250 12 p. 1555377. (SIGMETRICS/Performance'09 - Proceedings of the 11th International Joint Conference on Measurement and Modeling of Computer Systems; vol. 37, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    156 Scopus citations
  • Detecting network neutrality violations with causal inference

    Tariq, M. B., Motiwala, M., Feamster, N. & Ammar, M., 2009, CoNEXT'09 - Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technologies. p. 289-300 12 p. (CoNEXT'09 - Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    66 Scopus citations
  • Dynamics of online scam hosting infrastructure

    Konte, M., Feamster, N. & Jung, J., 2009, Passive and Active Network Measurement - 10th International Conference, PAM 2009, Proceedings. p. 219-228 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5448).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    33 Scopus citations
  • Fingerprinting blank paper using commodity scanners

    Clarkson, W., Weyrich, T., Finkelstein, A., Heninger, N., Halderman, J. A. & Felten, E. W., 2009, 2009 30th IEEE Symposium on Security and Privacy. p. 301-314 14 p. 5207652. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    87 Scopus citations
  • Hardware-assisted application-level access control

    Chen, Y. Y. & Lee, R. B., 2009, Information Security - 12th International Conference, ISC 2009, Proceedings. p. 363-378 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5735 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Hardware mechanisms for memory authentication: A survey of existing techniques and engines

    Elbaz, R., Champagne, D., Gebotys, C., Lee, R. B., Potlapally, N. & Torres, L., 2009, Transactions on Computational Science IV: Special Issue on Security in Computing. p. 1-22 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    72 Scopus citations
  • Impact of prefix-match changes on IP reachability

    Zhu, Y., Rexford, J. L., Sen, S. & Shaikh, A., 2009, IMC 2009 - Proceedings of the 2009 ACM SIGCOMM Internet Measurement Conference. p. 235-241 7 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Incrementally-deployable security for interdomain routing

    Rexford, J. L. & Feigenbaum, J., 2009, Proceedings - Cybersecurity Applications and Technology Conference for Homeland Security, CATCH 2009. p. 130-134 5 p. 4804435. (Proceedings - Cybersecurity Applications and Technology Conference for Homeland Security, CATCH 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Scopus citations
  • Measurement methods for fast and accurate blackhole identification with binary tomography

    Cunha, Í., Teixeira, R., Feamster, N. & Diot, C., 2009, IMC 2009 - Proceedings of the 2009 ACM SIGCOMM Internet Measurement Conference. p. 254-266 13 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Scopus citations
  • Multi-path key establishment against REM attacks in wireless ad hoc networks

    Lan, T., Lee, R. & Chiang, M., 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5426213. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • Multipath protocol for delay-sensitive traffic

    Javed, U., Suchara, M., He, J. & Rexford, J. L., 2009, 1st International Conference on Communication Systems and Networks and Workshops, COMSNETS 2009. 4808885. (1st International Conference on Communication Systems and Networks and Workshops, COMSNETS 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    35 Scopus citations
  • Neighbor-specific BGP: More flexible routing policies while improving global stability

    Wang, Y., Schapira, M. & Rexford, J. L., 2009, SIGMETRICS/Performance'09 - Proceedings of the 11th International Joint Conference on Measurement and Modeling of Computer Systems. 1 ed. p. 217-228 12 p. 1555375. (SIGMETRICS/Performance'09 - Proceedings of the 11th International Joint Conference on Measurement and Modeling of Computer Systems; vol. 37, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • Netreview: Detecting when interdomain routing goes wrong

    Haeberlen, A., Avramopoulos, I., Rexford, J. & Druschel, P., 2009, Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2009. USENIX Association, p. 437-452 16 p. (Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    49 Scopus citations
  • Resonance: Dynamic access control for enterprise networks

    Nayak, A., Reimers, A., Feamster, N. & Clark, R., 2009, Proceedings of the 1st ACM Workshop on Research on Enterprise Networking, WREN '09, Co-located with the 2009 SIGCOMM Conference, SIGCOMM'09. p. 11-18 8 p. (Computer Communication Review).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    109 Scopus citations
  • Revisiting route caching: The world should be flat

    Kim, C., Caesar, M., Gerber, A. & Rexford, J. L., 2009, Passive and Active Network Measurement - 10th International Conference, PAM 2009, Proceedings. p. 3-12 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5448).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    51 Scopus citations
  • Securing the dissemination of emergency response data with an integrated hardware-software architecture

    Levin, T. E., Dwoskin, J. S., Bhaskara, G., Nguyen, T. D., Clark, P. C., Lee, R. B., Irvine, C. E. & Benzel, T. V., 2009, Trusted Computing - Second International Conference, Trust 2009, Proceedings. p. 133-152 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5471 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Thread criticality predictors for dynamic performance, power, and resource management in chip multiprocessors

    Bhattacharjee, A. & Martonosi, M. R., 2009, ISCA 2009 - 36th Annual International Symposium on Computer Architecture, Conference Proceedings. p. 290-301 12 p. (Proceedings - International Symposium on Computer Architecture).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    138 Scopus citations
  • Tuning instruction customisation for reconfigurable system-on-chip

    Ho, C. H., Luk, W., Szefer, J. M. & Lee, R. B., 2009, Proceedings - IEEE International SOC Conference, SOCC 2009. p. 61-64 4 p. 5398096. (Proceedings - IEEE International SOC Conference, SOCC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Virtually eliminating router bugs

    Keller, E., Yu, M., Caesar, M. & Rexford, J. L., 2009, CoNEXT'09 - Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technologies. p. 13-24 12 p. (CoNEXT'09 - Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    22 Scopus citations
  • 2008

    Accelerating the Whirlpool Hash Function using parallel table lookup and fast cyclical permutation

    Hilewitz, Y., Yin, Y. L. & Lee, R. B., 2008, Fast Software Encryption - 15th International Workshop, FSE 2008, Revised Selected Papers. p. 173-188 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5086 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Scopus citations
  • A novel cache architecture with enhanced performance and security

    Wang, Z. & Lee, R. B., 2008, 2008 Proceedings of the 41st Annual IEEE/ACM International Symposium on Microarchitecture, MICRO-41. 2008 PROCEEDINGS ed. p. 83-93 11 p. 4771781. (Proceedings of the Annual International Symposium on Microarchitecture, MICRO; no. 2008 PROCEEDINGS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    206 Scopus citations
  • Authenticated out-of-band communication over social links

    Ramachandran, A. & Feamster, N., 2008, Proceedings of the ACM SIGCOMM 2008 Conference on Computer Communications -1st Workshop on Online Social Networks, WOSP'08. p. 61-66 6 p. (Proceedings of the ACM SIGCOMM 2008 Conference on Computer Communications -1st Workshop on Online Social Networks, WOSP'08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Bit matrix multiplication in commodity processors

    Hilewitz, Y., Lauradoux, C. & Lee, R. B., 2008, ASAP08, Conference Proceedings - IEEE 19th International Conference on Application-Specific Systems, Architectures and Processors. p. 7-12 6 p. 4580146. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Building bug-tolerant routers with virtualization

    Caesar, M. & Rexford, J. L., 2008, SIGCOMM 2008 Conference and the Co-located Workshops - PRESTO'08: Proceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow. p. 51-56 6 p. (SIGCOMM 2008 Conference and the Co-located Workshops - PRESTO'08: Proceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    14 Scopus citations
  • Can great research be taught? independent research with cross-disciplinary thinking and broader impact

    Feamster, N. & Gray, A., 2008, SIGCSE'08 - Proceedings of the 39th ACM Technical Symposium on Computer Science Education. p. 471-475 5 p. (SIGCSE'08 - Proceedings of the 39th ACM Technical Symposium on Computer Science Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Characterizing and improving the performance of Intel Threading Building Blocks

    Contreras, G. & Martonosi, M. R., 2008, 2008 IEEE International Symposium on Workload Characterization, IISWC'08. p. 57-66 10 p. 4636091. (2008 IEEE International Symposium on Workload Characterization, IISWC'08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    80 Scopus citations
  • Cooperative content distribution and traffic engineering

    Jiang, W., Zhang-Shen, R., Rexford, J. L. & Chiang, M., 2008, SIGCOMM 2008 Conference and the Co-located Workshops - Proceedings of the 3rd International Workshop on Economics of Networked Systems, NetEcon'08. p. 7-12 6 p. (SIGCOMM 2008 Conference and the Co-located Workshops - Proceedings of the 3rd International Workshop on Economics of Networked Systems, NetEcon'08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    10 Scopus citations
  • Coping with outside-the-box attacks

    Felten, E. W., 2008, Computer Aided Verification - 20th International Conference, CAV 2008, Proceedings. p. 3-4 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5123 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • DaVinci: Dynamically adaptive virtual networks for a customized internet

    He, J., Zhang-Shen, R., Li, Y., Lee, C. Y., Rexford, J. L. & Chiang, M., 2008, Proceedings of 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08. 15. (Proceedings of 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    123 Scopus citations
  • Distinguishing persistent failures from transient losses

    Cunha, Í., Teixeira, R., Feamster, N. & Diot, C., 2008, Proceedings of 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08. 50. (Proceedings of 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient IP-address lookup with a shared forwarding table for multiple virtual routers

    Fu, J. & Rexford, J. L., 2008, Proceedings of 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08. 21. (Proceedings of 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    53 Scopus citations
  • Fast monitoring of traffic subpopulations

    Ramachandran, A., Seetharaman, S., Feamster, N. & Vazirani, V., 2008, IMC'08: Proceedings of the 2008 ACM SIGCOMM Internet Measurement Conference. p. 257-270 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    52 Scopus citations
  • Fighting spam, phishing, and online scams at the network level

    Feamster, N., 2008, Proceedings of the 4th Asian Internet Engineering Conference, AINTEC 2008. p. 39-40 2 p. (Proceedings of the 4th Asian Internet Engineering Conference, AINTEC 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Forward-secure content distribution to reconfigurable hardware

    Champagne, D., Elbaz, R., Gebotys, C., Torres, L. & Lee, R. B., 2008, Proceedings - 2008 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2008. p. 450-455 6 p. 4731836. (Proceedings - 2008 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Full-system chip multiprocessor power evaluations using FPGA-based emulation

    Bhattacharjee, A., Contreras, G. & Martonosi, M. R., 2008, ISLPED'08: Proceedings of the 2008 International Symposium on Low Power Electronics and Design. p. 335-340 6 p. (Proceedings of the International Symposium on Low Power Electronics and Design).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations
  • How bad is suboptimal rate allocation?

    Lan, T., Lin, X., Chiang, M. & Lee, R., 2008, INFOCOM 2008: 27th IEEE Communications Society Conference on Computer Communications. p. 951-959 9 p. 4509668. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Link-state routing with hop-by-hop forwarding can achieve optimal traffic engineering

    Xu, D., Chiang, M. & Rexford, J. L., 2008, INFOCOM 2008: 27th IEEE Communications Society Conference on Computer Communications. p. 1139-1147 9 p. 4509689. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    41 Scopus citations
  • LOCALE: Collaborative localization estimation for sparse mobile sensor networks

    Zhang, P. & Martonosi, M., 2008, Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008. p. 195-206 12 p. 4505474. (Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    61 Scopus citations
  • Location-based trust for mobile user-generated content: Applications, challenges and implementations

    Lenders, V., Koukoumidis, E., Zhang, P. & Martonosi, M. R., 2008, HotMobile 2008: 9th Workshop on Mobile Computing Systems and Applications. p. 60-64 5 p. (HotMobile 2008: 9th Workshop on Mobile Computing Systems and Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    82 Scopus citations
  • MINT: A market for INternet transit

    Valancius, V., Feamster, N., Johari, R. & Vazirani, V., 2008, Proceedings of 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08. 70. (Proceedings of 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • Oracle semantics for concurrent separation logic

    Hobor, A., Appel, A. W. & Nardelli, F. Z., 2008, Programming Languages and Systems - 17th European Symposium on Programming, ESOP 2008 - Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Proceedings. p. 353-367 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4960 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    84 Scopus citations
  • Path-quality monitoring in the presence of adversaries

    Goldberg, S., Xiao, D., Tromer, E., Barak, B. & Rexford, J. L., 2008, SIGMETRICS'08: Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. 1 SPECIAL ISSUE ed. p. 193-204 12 p. (SIGMETRICS'08: Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems; vol. 36, no. 1 SPECIAL ISSUE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    62 Scopus citations
  • Peer-assisted content distribution with prices

    Aperjis, C., Freedman, M. J. & Johari, R., 2008, Proceedings of 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08. 17. (Proceedings of 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    37 Scopus citations
  • Performance bounds for Peer-assisted live streaming

    Liu, S., Zhang-Shen, R., Jiang, W., Rexford, J. L. & Chiang, M., 2008, SIGMETRICS'08: Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. 1 SPECIAL ISSUE ed. p. 313-324 12 p. (SIGMETRICS'08: Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems; vol. 36, no. 1 SPECIAL ISSUE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    142 Scopus citations
  • Photo-based authentication using social networks

    Yardi, S., Feamster, N. & Bruckman, A., 2008, Proceedings of the ACM SIGCOMM 2008 Conference on Computer Communications -1st Workshop on Online Social Networks, WOSP'08. p. 55-59 5 p. (Proceedings of the ACM SIGCOMM 2008 Conference on Computer Communications -1st Workshop on Online Social Networks, WOSP'08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Scopus citations
  • Potential for collaborative caching and prefetching in largely-disconnected villages

    Isaacman, S. & Martonosi, M. R., 2008, MobiCom'08 Co-Located Workshops - Proceedings of the 2008 ACM Workshop on Wireless Networks and Systems for Developing Regions, WiNS-DR'08. p. 23-29 7 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations