Center for Information Technology Policy

Filter
Conference contribution

Search results

  • 2015

    Examining how the great firewall discovers hidden circumvention servers

    Ensafi, R., Fifield, D., Winter, P., Feamster, N., Weaver, N. & Paxson, V., Oct 28 2015, IMC 2015 - Proceedings of the 2015 ACM Internet Measurement Conference. Association for Computing Machinery, p. 445-458 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    55 Scopus citations
  • Exploiting temporal dynamics in Sybil defenses

    Liu, C., Gao, P., Wright, M. & Mittal, P., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 805-816 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • Implicit authentication for smartphone security

    Lee, W. H. & Lee, R. B., 2015, 1st International Conference on Information Systems Security and Privacy, ICISSP 2015. Camp, O., Aïmeur, E., Weippl, E. & Bidan, C. (eds.). Springer Verlag, p. 160-176 17 p. (Communications in Computer and Information Science; vol. 576).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Kinetic: Verifiable dynamic network control

    Kim, H., Reich, J., Gupta, A., Shahbaz, M., Feamster, N. & Clark, R., 2015, Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2015. USENIX, p. 59-72 14 p. (Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    104 Scopus citations
  • Last-level cache side-channel attacks are practical

    Liu, F., Yarom, Y., Ge, Q., Heiser, G. & Lee, R. B., Jul 17 2015, Proceedings - 2015 IEEE Symposium on Security and Privacy, SP 2015. Institute of Electrical and Electronics Engineers Inc., p. 605-622 18 p. 7163050. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2015-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    614 Scopus citations
  • Measuring broadband access network performance in Pakistan: A comparative study

    Awan, M. F., Ahmad, T., Qaisar, S., Feamster, N. & Sundaresan, S., Dec 24 2015, Proceedings of the 40th Annual IEEE Conference on Local Computer Networks, LCN 2015. Kanhere, S., Cherkaoui, S. & Tolle, J. (eds.). IEEE Computer Society, p. 595-602 8 p. 7365903. (Proceedings - Conference on Local Computer Networks, LCN; vol. 2015-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Measuring the performance of user traffic in home wireless networks

    Sundaresan, S., Feamster, N. & Teixeira, R., 2015, Passive and Active Measurement - 16th International Conference, PAM 2015, Proceedings. Liu, Y. & Mirkovic, J. (eds.). Springer Verlag, p. 305-317 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8995).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Monitoring internet censorship with UBICA

    Aceto, G., Botta, A., Pescapè, A., Feamster, N., Faheem Awan, M., Ahmad, T. & Qaisar, S., 2015, Traffic Monitoring and Analysis - 7th International Workshop, TMA 2015, Proceedings. Barlet-Ros, P., Bonaventure, O. & Steiner, M. (eds.). Springer Verlag, p. 143-157 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9053).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Multi-sensor authentication to improve smartphone security

    Lee, W. H. & Lee, R. B., 2015, ICISSP 2015 - 1st International Conference on Information Systems Security and Privacy, Proceedings. Camp, O., Weippl, E., Bidan, C. & Aimeur, E. (eds.). SciTePress, p. 270-280 11 p. (ICISSP 2015 - 1st International Conference on Information Systems Security and Privacy, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    77 Scopus citations
  • NetAssay: Providing new monitoring primitives for network operators

    Donovan, S. & Feamster, N., Feb 25 2015, Proceedings of the SIGCOMM Chicago 2014 and the Best of the Co-located Workshops. Papagiannaki, K. (ed.). 4 ed. Association for Computing Machinery, Vol. 44. p. 345-346 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Programming slick network functions

    Anwer, B., Benson, T., Feamster, N. & Levin, D., Jun 17 2015, Symposium on Software Defined Networking (SDN) Research, SOSR 2015. Association for Computing Machinery, Inc, 2774998. (Symposium on Software Defined Networking (SDN) Research, SOSR 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    58 Scopus citations
  • Quantifying the effects of circuitous routes on the latency of intra-africa internet traffic: A study of research and education networks

    Chavula, J., Feamster, N., Bagula, A. & Suleman, H., Jan 1 2015, e-Infrastructure and e-Services for Developing Countries - 6th International Conference, AFRICOMM 2014, Revised Selected Papers. Sansa-Otim, J., Nungu, A. & Pehrson, B. (eds.). Springer Verlag, p. 64-73 10 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 147).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • Random Fill Cache Architecture

    Liu, F. & Lee, R. B-L., Jan 15 2015, Proceedings - 47th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2014. January ed. IEEE Computer Society, p. 203-215 13 p. 7011389. (Proceedings of the Annual International Symposium on Microarchitecture, MICRO; vol. 2015-January, no. January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    105 Scopus citations
  • Raptor: Routing attacks on privacy in tor

    Sun, Y., Edmundson, A., Vanbever, L., Li, O., Rexford, J., Chiang, M. & Mittal, P., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 271-286 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Raptor: Routing attacks on privacy in tor

    Sun, Y., Edmundson, A., Vanbever, L., Li, O., Rexford, J., Chiang, M. & Mittal, P., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 271-286 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    113 Scopus citations
  • Ravana: Controller fault-tolerance in software-defined networking

    Katta, N., Zhang, H., Freedman, M. J. & Rexford, J. L., Jun 17 2015, Symposium on Software Defined Networking (SDN) Research, SOSR 2015. Association for Computing Machinery, Inc, 2774996. (Symposium on Software Defined Networking (SDN) Research, SOSR 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    95 Scopus citations
  • Revenue maximization and ex-post budget constraints

    Daskalakis, C., Devanur, N. R. & Weinberg, S. M., Jun 15 2015, EC 2015 - Proceedings of the 2015 ACM Conference on Economics and Computation. Association for Computing Machinery, Inc, p. 433-448 16 p. (EC 2015 - Proceedings of the 2015 ACM Conference on Economics and Computation).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Scalable programmable inbound traffic engineering

    Sun, P., Vanbever, L. & Rexford, J. L., Jun 17 2015, Symposium on Software Defined Networking (SDN) Research, SOSR 2015. Association for Computing Machinery, Inc, 2775063. (Symposium on Software Defined Networking (SDN) Research, SOSR 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization

    Ji, S., Li, W., Mittal, P., Hu, X. & Beyah, R., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 303-318 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization

    Ji, S., Li, W., Mittal, P., Hu, X. & Beyah, R., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 303-318 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    83 Scopus citations
  • Simple auctions with simple strategies

    Devanur, N., Morgenstern, J., Syrgkanis, V. & Weinberg, S. M., Jun 15 2015, EC 2015 - Proceedings of the 2015 ACM Conference on Economics and Computation. Association for Computing Machinery, Inc, p. 305-322 18 p. (EC 2015 - Proceedings of the 2015 ACM Conference on Economics and Computation).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Simple mechanisms for a subadditive buyer and applications to revenue monotonicity

    Rubinstein, A. & Weinberg, S. M., Jun 15 2015, EC 2015 - Proceedings of the 2015 ACM Conference on Economics and Computation. Association for Computing Machinery, Inc, p. 377-394 18 p. (EC 2015 - Proceedings of the 2015 ACM Conference on Economics and Computation).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    55 Scopus citations
  • SoK: Research perspectives and challenges for bitcoin and cryptocurrencies

    Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A. & Felten, E. W., Jul 17 2015, Proceedings - 2015 IEEE Symposium on Security and Privacy, SP 2015. Institute of Electrical and Electronics Engineers Inc., p. 104-121 18 p. 7163021. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2015-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    629 Scopus citations
  • The case for an intermediate representation for programmable data planes

    Shahbaz, M. & Feamster, N., Jun 17 2015, Symposium on Software Defined Networking (SDN) Research, SOSR 2015. Association for Computing Machinery, Inc, 2775000. (Symposium on Software Defined Networking (SDN) Research, SOSR 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • The future of programming languages and programmers (Panel)

    Fraser, S., Bak, L., DeLine, R., Feamster, N., Kuper, L., Lopes, C. & Wu, P., Oct 25 2015, SPLASH Companion 2015 - Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity. Eugster, P. & Aldrich, J. (eds.). Association for Computing Machinery, Inc, p. 63-66 4 p. (SPLASH Companion 2015 - Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • TopicCheck: Interactive alignment for assessing topic model stability

    Chuang, J., Roberts, M. E., Stewart, B. M., Weiss, R., Tingley, D., Grimmer, J. & Heer, J., 2015, NAACL HLT 2015 - 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Proceedings of the Conference. Association for Computational Linguistics (ACL), p. 175-184 10 p. (NAACL HLT 2015 - 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Proceedings of the Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • UCap: An internet data management tool for the home

    Chetty, M., Kim, H., Sundaresan, S., Burnett, S., Feamster, N. G. & Edwards, W. K., Apr 18 2015, CHI 2015 - Proceedings of the 33rd Annual CHI Conference on Human Factors in Computing Systems: Crossings. Association for Computing Machinery, p. 3093-3102 10 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2015-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • Verified correctness and security of OpenSSL HMAC

    Beringer, L., Petcher, A., Ye, K. Q. & Appel, A. W., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 207-221 15 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    73 Scopus citations
  • 2014

    #CHIMoney: Financial interactions, digital cash, capital exchange and mobile money

    Kaye, J., Brown, B., Vertesi, J., Perry, M. & Ferreira, J., 2014, CHI EA 2014: One of a ChiNd - Extended Abstracts, 32nd Annual ACM Conference on Human Factors in Computing Systems. Association for Computing Machinery, p. 111-114 4 p. (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Scopus citations
  • Adaptive delay-tolerant scheduling for efficient cellular and WiFi usage

    Yetim, O. B. & Martonosi, M. R., Oct 8 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, WoWMoM 2014. Institute of Electrical and Electronics Engineers Inc., 6918945. (Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, WoWMoM 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Aggregation and degradation in Jetstream: Streaming analytics in the wide area

    Rabkin, A., Arye, M., Sen, S., Pai, V. S. & Freedman, M. J., Jan 1 2014, Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2014. USENIX Association, p. 275-288 14 p. (Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    117 Scopus citations
  • An assertion language for debugging SDN applications

    Beckett, R., Zou, X. K., Zhang, S., Malik, S., Rexford, J. L. & Walker, D. P., 2014, HotSDN 2014 - Proceedings of the ACM SIGCOMM 2014 Workshop on Hot Topics in Software Defined Networking. Association for Computing Machinery, p. 91-96 6 p. (HotSDN 2014 - Proceedings of the ACM SIGCOMM 2014 Workshop on Hot Topics in Software Defined Networking).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    42 Scopus citations
  • Anonymity on QuickSand: Using BGP to compromise tor

    Vanbever, L., Li, O., Rexford, J. L. & Mittal, P., Oct 27 2014, Proceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets 2014. Association for Computing Machinery, 2673869. (Proceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • Automated detection and fingerprinting of censorship block pages

    Jones, B., Lee, T. W., Feamster, N. & Gill, P., Nov 5 2014, IMC 2014 - Proceedings of the 2014 ACM. Association for Computing Machinery, p. 299-304 6 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations
  • Automating isolation and least privilege in web services

    Blankstein, A. & Freedman, M. J., Nov 13 2014, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., p. 133-148 16 p. 6956561. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    15 Scopus citations
  • Characterizing the performance effect of trials and rotations in applications that use Quantum Phase Estimation

    Patil, S., Javadiabhari, A., Chiang, C. F., Heckey, J., Martonosi, M. R. & Chong, F. T., Dec 11 2014, IISWC 2014 - IEEE International Symposium on Workload Characterization. Institute of Electrical and Electronics Engineers Inc., p. 181-190 10 p. 6983057. (IISWC 2014 - IEEE International Symposium on Workload Characterization).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Compiling path queries in software-defined networks

    Narayana, S., Rexford, J. L. & Walker, D. P., 2014, HotSDN 2014 - Proceedings of the ACM SIGCOMM 2014 Workshop on Hot Topics in Software Defined Networking. Association for Computing Machinery, p. 181-186 6 p. (HotSDN 2014 - Proceedings of the ACM SIGCOMM 2014 Workshop on Hot Topics in Software Defined Networking).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Scopus citations
  • Compositional network mobility

    Zave, P. & Rexford, J. L., 2014, Verified Software: Theories, Tools, Experiments - 5th International Conference, VSTTE 2013, Revised Selected Papers. Cohen, E., Rybalchenko, A. & Rybalchenko, A. (eds.). Springer Verlag, p. 68-87 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8164).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Cyber defenses for physical attacks and insider threats in cloud computing

    Szefer, J., Jamkhedkar, P., Perez-Botero, D. & Lee, R. B., Jun 4 2014, ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, Inc, p. 519-524 6 p. (ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Deniable liaisons

    Narain, A., Feamster, N. & Snoeren, A. C., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 525-536 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Scopus citations
  • Dynamic scheduling of network updates

    Jin, X., Liu, H. H., Gandhi, R., Kandula, S., Mahajan, R., Zhang, M., Rexford, J. L. & Wattenhofer, R., 2014, SIGCOMM 2014 - Proceedings of the 2014 ACM Conference on Special Interest Group on Data Communication. Association for Computing Machinery, p. 539-550 12 p. (SIGCOMM 2014 - Proceedings of the 2014 ACM Conference on Special Interest Group on Data Communication).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    217 Scopus citations
  • Exposing inconsistent web search results with bobble

    Xing, X., Meng, W., Doozan, D., Feamster, N., Lee, W. & Snoeren, A. C., 2014, Passive and Active Measurement - 15th International Conference, PAM 2014, Proceedings. Springer Verlag, p. 131-140 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8362 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • FlowQoS: QoS for the rest of us

    Seddiki, M. S., Shahbaz, M., Donovan, S., Grover, S., Park, M., Feamster, N. & Song, Y. Q., 2014, HotSDN 2014 - Proceedings of the ACM SIGCOMM 2014 Workshop on Hot Topics in Software Defined Networking. Association for Computing Machinery, p. 207-208 2 p. (HotSDN 2014 - Proceedings of the ACM SIGCOMM 2014 Workshop on Hot Topics in Software Defined Networking).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    73 Scopus citations
  • HotChips security tutorial

    Lee, R. B., Chandra, V., Van Doorn, L. & Durham, D., May 25 2014, 2014 IEEE Hot Chips 26 Symposium, HCS 2014. Institute of Electrical and Electronics Engineers Inc., 7478794. (2014 IEEE Hot Chips 26 Symposium, HCS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Incremental update for a compositional SDN hypervisor

    Jin, X., Rexford, J. L. & Walker, D. P., 2014, HotSDN 2014 - Proceedings of the ACM SIGCOMM 2014 Workshop on Hot Topics in Software Defined Networking. Association for Computing Machinery, p. 187-192 6 p. (HotSDN 2014 - Proceedings of the ACM SIGCOMM 2014 Workshop on Hot Topics in Software Defined Networking).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Intentional network monitoring: Finding the needle without capturing the haystack

    Donovan, S. & Feamster, N., Oct 27 2014, Proceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets 2014. Association for Computing Machinery, 2673872. (Proceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    17 Scopus citations
  • Locating throughput bottlenecks in home networks

    Sundaresan, S., Feamster, N. & Teixeira, R., 2014, SIGCOMM 2014 - Proceedings of the 2014 ACM Conference on Special Interest Group on Data Communication. Association for Computing Machinery, p. 351-352 2 p. (SIGCOMM 2014 - Proceedings of the 2014 ACM Conference on Special Interest Group on Data Communication).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Mixcoin: Anonymity for bitcoin with accountable mixes

    Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J. A. & Felten, E. W., 2014, Financial Cryptography and Data Security - 18th International Conference, FC 2014, Revised Selected Papers. Safavi-Naini, R. & Christin, N. (eds.). Springer Verlag, p. 486-504 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8437).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    248 Scopus citations
  • MRPB: Memory request prioritization for massively parallel processors

    Jia, W., Shaw, K. A. & Martonosi, M. R., Jan 1 2014, 20th IEEE International Symposium on High Performance Computer Architecture, HPCA 2014. IEEE Computer Society, p. 272-283 12 p. 6835938. (Proceedings - International Symposium on High-Performance Computer Architecture).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    126 Scopus citations
  • Optimal collaborative access point association in wireless networks

    Karimi, O. B., Liu, J. & Rexford, J. L., Jan 1 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 1141-1149 9 p. 6848045. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    45 Scopus citations