Center for Information Technology Policy (CITP)

Filter
Conference contribution

Search results

  • 2006

    Transport layer approaches for improving idle energy in challenged sensor networks

    Wang, Y., Want, C. Y., Martonosi, M. R. & Peh, L. S., 2006, Proceedings of ACM SIGCOMM 2006 - Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. p. 253-260 8 p. (Proceedings of ACM SIGCOMM 2006 - Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    10 Scopus citations
  • Using forgetful routing to control BGP table size

    Karpilovsky, E. & Rexford, J. L., 2006, Proceedings of CoNEXT'06 - 2nd Conference on Future Networking Technologies. 2. (Proceedings of CoNEXT'06 - 2nd Conference on Future Networking Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • 2005

    A distributed reputation approach to cooperative internet routing protection

    Yu, H., Rexford, J. L. & Felten, E. W., 2005, 2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols. p. 73-78 6 p. 1532057. (2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    33 Scopus citations
  • A dynamic compilation framework for controlling microprocessor energy and performance

    Wu, Q., Reddi, V. J., Wu, Y., Lee, J., Connors, D., Brooks, D., Martonosi, M. R. & Clark, D. W., 2005, MICRO-38: Proceedings of the 38th Annual IEEE/ACM International Symposium on Microarchitecture. p. 271-282 12 p. 1540966. (Proceedings of the Annual International Symposium on Microarchitecture, MICRO).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    139 Scopus citations
  • Correctness properties for internet routing

    Feamster, N. & Balakrishnan, H., 2005, 43rd Annual Allerton Conference on Communication, Control and Computing 2005. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 1279-1288 10 p. (43rd Annual Allerton Conference on Communication, Control and Computing 2005; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Detecting recurrent phase behavior under real-system variability

    Isci, C. & Martonosi, M. R., 2005, Proceedings of the 2005 IEEE International Symposium on Workload Characterization, IISWC-2005. p. 13-23 11 p. 1525997. (Proceedings of the 2005 IEEE International Symposium on Workload Characterization, IISWC-2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Efficient behavior-driven runtime dynamic voltage scaling policies

    Xie, F., Martonosi, M. & Malik, S., 2005, CODES+ISSS 2005 - International Conference on Hardware/Software Codesign and Systems Synthesis. Association for Computing Machinery, p. 105-110 6 p. (CODES+ISSS 2005 - International Conference on Hardware/Software Codesign and System Synthesis).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Erasure-coding based routing for opportunistic networks

    Wang, Y., Jain, S., Martonosi, M. R. & Fall, K., 2005, Proceedings of the ACM SIGCOMM 2005 Workshop on Delay-Tolerant Networking, WDTN 2005. p. 229-236 8 p. (Proceedings of the ACM SIGCOMM 2005 Workshop on Delay-Tolerant Networking, WDTN 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    158 Scopus citations
  • Erasure-coding based routing for opportunistic networks

    Wang, Y., Jain, S., Martonosi, M. R. & Fall, K., 2005, Proceedings of ACM SIGCOMM 2005 Workshops: Conference on Computer Communications. p. 229-236 8 p. (Proceedings of ACM SIGCOMM 2005 Workshops: Conference on Computer Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    174 Scopus citations
  • Fast parallel table lookups to accelerate symmetric-key cryptography

    Fiskiran, A. M. & Lee, R. B., 2005, Proceedings ITCC 2005 - International Conference on Information Technology: Coding and Computing. Selvaraj, H. & Srimani, P. K. (eds.). p. 526-531 6 p. (International Conference on Information Technology: Coding and Computing, ITCC; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Learning-based anomaly detection in BGP updates

    Zhang, J., Rexford, J. L. & Feigenbaum, J., 2005, Proceedings of ACM SIGCOMM 2005 Workshops: Conference on Computer Communications. Association for Computing Machinery, p. 219-220 2 p. (Proceedings of ACM SIGCOMM 2005 Workshops: Conference on Computer Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    44 Scopus citations
  • New constructive approach to covert channel modeling and channel capacity estimation

    Wang, Z. & Lee, R. B., 2005, Information Security - 8th International Conference, ISC 2005, Proceedings. Springer Verlag, p. 498-505 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3650 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • On-chip lookup tables for fast symmetric-key encryption

    Fiskiran, A. M. & Lee, R. B., 2005, Proceedings - 16th International Conference on Application-Specific Systems, Architectures, and Processors. p. 356-363 8 p. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    37 Scopus citations
  • On static reachability analysis of IP networks

    Xie, G. G., Zhan, J., Maltz, D. A., Zhang, H., Greenberg, A., Hjalmtysson, G. & Rexford, J. L., 2005, Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Makki, K. & Knightly, E. (eds.). p. 2170-2183 14 p. (Proceedings - IEEE INFOCOM; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    179 Scopus citations
  • Processor architecture for trustworthy computers

    Lee, R. B., 2005, Advances in Computer Systems Architecture - 10th Asia-Pacific Conference, ACSAC 2005, Proceedings. Springer Verlag, p. 1-2 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3740 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • TIE breaking: Tunable interdomain egress selection

    Teixeira, R., Griffin, T. G., Resende, M. G. C. & Rexford, J. L., 2005, CoNEXT 2005 - Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology. p. 93-104 12 p. (CoNEXT 2005 - Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    20 Scopus citations
  • Voltage and frequency control with adaptive reaction time in multiple-clock-domain processors

    Wu, Q., Juang, P., Martonosi, M. R. & Clark, D. W., 2005, Proceedings - 11th International Symposium on High-Performance Computer Architecture, HPCA-11 2005. p. 178-189 12 p. (Proceedings - International Symposium on High-Performance Computer Architecture).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    56 Scopus citations
  • 2004

    A measurement framework for pin-pointing routing changes

    Teixeira, R. & Rexford, J. L., 2004, Proceedings of the ACM SIGCOMM 2004 Workshops. Association for Computing Machinery, p. 313-318 6 p. (Proceedings of the ACM SIGCOMM 2004 Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    63 Scopus citations
  • BorderGuard: Detecting cold potatoes from peers

    Feamster, N., Mao, Z. M. & Rexford, J., 2004, Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004. p. 213-218 6 p. (Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • Construction of a semantic model for a typed assembly language

    Tan, G., Appel, A. W., Swadi, K. N. & Wu, D., 2004, Verification, Model Checking, and Abstract Interpretation - 5th International Conference, VMCAI 2004, Proceedings. Steffen, B. & Levi, G. (eds.). Springer Verlag, p. 30-43 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2937).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Formal online methods for voltage/frequency control in multiple clock domain microprocessors

    Wu, Q., Juang, P., Martonosi, M. R. & Clark, D. W., 2004, 11th International Conference on Architectural Support for Programming, Languages and Operating Systems, ASPLOS XI. Association for Computing Machinery, p. 248-259 12 p. (11th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    82 Scopus citations
  • Hardware design experiences in ZebraNet

    Zhang, P., Sadler, C. M., Lyon, S. A. & Martonosi, M. R., 2004, SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems. Association for Computing Machinery, p. 227-238 12 p. (SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    361 Scopus citations
  • Implementing software on resource-constrained mobile sensors: Experiences with Impala and ZebraNet

    Liu, T., Sadler, C. M., Zhang, P. & Martonosi, M. R., 2004, MobiSys 2004 - Second International Conference on Mobile Systems, Applications and Services. p. 256-269 14 p. (MobiSys 2004 - Second International Conference on Mobile Systems, Applications and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    154 Scopus citations
  • Location diversity in anonymity networks

    Feamster, N. & Dingledine, R., 2004, WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society. Association for Computing Machinery, p. 66-76 11 p. (WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    70 Scopus citations
  • On permutation operations in cipher design

    Lee, R. B., Shi, Z. J., Yin, Y. L., Rivest, R. L. & Robshaw, M. J. B., 2004, International Conference on Information Technology: Coding Computing, ITCC 2004. Srimani, P. K., Abraham, A., Cannataro, M., Domingo-Ferrer, J. & Hashemi, R. (eds.). p. 569-577 9 p. (International Conference on Information Technology: Coding Computing, ITCC; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    25 Scopus citations
  • PLX FP: An efficient floating-point instruction set for 3D graphics

    Yang, X. & Lee, R. B., 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME). p. 137-140 4 p. (2004 IEEE International Conference on Multimedia and Expo (ICME); vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Privacy management for portable recording devices

    Halderman, J. A., Waters, B. & Felten, E. W., 2004, WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society. Association for Computing Machinery (ACM), p. 16-24 9 p. (WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations
  • Runtime Execution Monitoring (REM) to detect and prevent malicious code execution

    Fiskiran, A. M. & Lee, R. B., 2004, Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors, ICCD 2004. p. 452-457 6 p. (Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    45 Scopus citations
  • Spectral analysis for characterizing program power and performance

    Joseph, R., Martonosi, M. & Hu, Z., 2004, 2004 IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS. p. 151-160 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • The case for separating routing from routers

    Feamster, N. G., Balakrishnan, H., Rexford, J. L., Shaikh, A. & Van Der Merwe, J., 2004, Proceedings of the ACM SIGCOMM 2004 Workshops. Association for Computing Machinery, p. 5-12 8 p. (Proceedings of the ACM SIGCOMM 2004 Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    196 Scopus citations
  • 2003

    Access control on the Web using proof-carrying authorization

    Bauer, L., Schneider, M. A., Felten, E. W. & Appel, A. W., 2003, Proceedings - DARPA Information Survivability Conference and Exposition, DISCEX 2003. Institute of Electrical and Electronics Engineers Inc., p. 117-119 3 p. 1194942. (Proceedings - DARPA Information Survivability Conference and Exposition, DISCEX 2003; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Adding 3D graphics support to PLX

    Yang, X. & Lee, R., 2003, Proceedings, ITRE 2003 - International Conference on Information Technology: Research and Education. p. 40-44 5 p. 1270568. (Proceedings, ITRE 2003 - International Conference on Information Technology: Research and Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Scopus citations
  • A processor architecture defense against buffer overflow attacks

    McGregor, J. P., Karig, D. K., Shi, Z. & Lee, R. B., 2003, Proceedings, ITRE 2003 - International Conference on Information Technology: Research and Education. p. 243-250 8 p. 1270612. (Proceedings, ITRE 2003 - International Conference on Information Technology: Research and Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    51 Scopus citations
  • Arbitrary bit permutations in one or two cycles

    Shi, Z., Yang, X. & Lee, R. B., 2003, Proceedings - IEEE International Conference on Application-Specific Systems, Architectures, and Processors, ASAP 2003. Deprettere, E., Bhattacharyya, S., Thiele, L., Cavallaro, J. & Darte, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 237-247 11 p. 1212847. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    25 Scopus citations
  • Control techniques to eliminate voltage emergencies in high performance processors

    Joseph, R., Brooks, D. & Martonosi, M., 2003, Proceedings - 9th International Symposium on High-Performance Computer Architecture, HPCA 2003. IEEE Computer Society, p. 79-90 12 p. 1183526. (Proceedings - International Symposium on High-Performance Computer Architecture; vol. 12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    113 Scopus citations
  • Foundational proof-carrying code

    Appel, A. W., 2003, Foundations of Intrusion Tolerant Systems, OASIS 2003. Lala, J. H. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 25-34 10 p. 1264926. (Foundations of Intrusion Tolerant Systems, OASIS 2003).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • Foundational Proof Checkers with Small Witnesses

    Wu, D., Appel, A. W. & Stump, A., 2003, Proceedings of the Fifth ACM SIGPLAN Conference on Principle and Practice of Declarative Programming, (PPDP 03). Association for Computing Machinery, p. 264-274 11 p. (Proceedings of the ACM SIGPLAN Conference on Principles and Practice of Declarative Programming; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    31 Scopus citations
  • Measuring the effects of Internet path faults on reactive routing

    Feamster, N., Andersen, D. G., Balakrishnan, H. & Kaashoek, M. F., Jun 2003, Performance Evaluation Review. 1 ed. p. 126-137 12 p. (Performance Evaluation Review; vol. 31, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    44 Scopus citations
  • Policy-Enforced Linking of Untrusted Components (Extended Abstract)

    Lee, E. & Appel, A. W., 2003, Proceedings of the Joint 9th European Software Engineering Conference (ESEC) and 11th SIGSOFT Symposium on the Foundations of Software Engineering (FSE-11). Inverardi, P. (ed.). p. 371-374 4 p. (Proceedings of the Joint European Software Engineering Conference (ESEC) and SIGSOFT Symposium on the Foundations of Software Engineering (FSE-11)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Runtime power monitoring in high-end processors: Methodology and empirical data

    Isci, C. & Martonosi, M. R., 2003, Proceedings - 36th International Symposium on Microarchitecture, MICRO 2003. IEEE Computer Society, p. 93-104 12 p. 1253186. (Proceedings of the Annual International Symposium on Microarchitecture, MICRO; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    441 Scopus citations
  • TCP: Tag correlating prefetchers

    Hu, Z., Martonosi, M. R. & Kaxiras, S., 2003, Proceedings - 9th International Symposium on High-Performance Computer Architecture, HPCA 2003. IEEE Computer Society, p. 317-326 10 p. 1183549. (Proceedings - International Symposium on High-Performance Computer Architecture; vol. 12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    66 Scopus citations
  • Towards a Logic for Wide-Area Internet Routing

    Feamster, N. & Balakrishnan, H., 2003, Proceedings of the ACM SIGCOMM Workshops. Association for Computing Machinery, p. 289-300 12 p. (Proceedings of the ACM SIGCOMM Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Using memory errors to attack a virtual machine

    Govindavajhala, S. & Appel, A. W., 2003, Proceedings - 2003 Symposium on Security and Privacy, SP 2003. Institute of Electrical and Electronics Engineers Inc., p. 154-165 12 p. 1199334. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Scopus citations
  • 2002

    A general and flexible access-control system for the web

    Bauer, L., Schneider, M. A. & Felten, E. W., 2002, Proceedings of the 11th USENIX Security Symposium. USENIX Association, (Proceedings of the 11th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    61 Scopus citations
  • A reflective symmetry descriptor

    Kazhdan, M., Chazelle, B., Dobkin, D., Finkelstein, A. & Funkhouser, T., 2002, Computer Vision - 7th European Conference on Computer Vision, ECCV 2002, Proceedings. Heyden, A., Sparr, G., Nielsen, M. & Johansen, P. (eds.). Springer Verlag, p. 642-656 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2351).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    95 Scopus citations
  • BGP Routing Stability of Popular Destinations

    Rexford, J. L., Wang, J., Xiao, Z. & Zhang, Y., 2002, Proceedings of the 2nd Internet Measurement Workshop (IMW 2002). Association for Computing Machinery (ACM), p. 197-202 6 p. (Proceedings of the 2nd Internet Measurement Workshop (IMW 2002)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    205 Scopus citations
  • Informed consent in the Mozilla browser: Implementing value-sensitive design

    Friedman, B., Howe, D. C. & Felten, E., 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, HICSS 2002. Sprague, R. H. (ed.). IEEE Computer Society, p. 10-19 10 p. 994366. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2002-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    90 Scopus citations
  • PLX: A fully subword-parallel instruction set architecture for fast scalable multimedia processing

    Lee, R. B. & Murat Fiskiran, A., 2002, Proceedings - 2002 IEEE International Conference on Multimedia and Expo, ICME 2002. Institute of Electrical and Electronics Engineers Inc., p. 117-120 4 p. 1035526. (Proceedings - 2002 IEEE International Conference on Multimedia and Expo, ICME 2002; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    23 Scopus citations
  • Refining instruction set architecture for high-performance multimedia processing in constrained environments

    Lee, R. B., Fiskiran, A. M., Shi, Z. & Yang, X., 2002, Proceedings - IEEE International Conference on Application-Specific Systems, Architectures, and Processors, ASAP 2002. Schreiber, R., Bhattacharyya, S., Burgess, N. & Schulte, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 253-264 12 p. 1030724. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors; vol. 2002-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    10 Scopus citations
  • Topology inference from BGP routing dynamics

    Andersen, D. G., Feamster, N., Bauer, S. & Balakrishnan, H., 2002, Proceedings of the 2nd Internet Measurement Workshop (IMW 2002). Association for Computing Machinery (ACM), p. 243-248 6 p. (Proceedings of the 2nd Internet Measurement Workshop (IMW 2002)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    44 Scopus citations