Wetherall

Results: 62



#Item
21

Systems Directions for Pervasive Computing Robert Grimm, Janet Davis, Ben Hendrickson, Eric Lemar, Adam MacBeth, Steven Swanson, Tom Anderson, Brian Bershad, Gaetano Borriello, Steven Gribble, David Wetherall University

Add to Reading List

Source URL: djw.cs.washington.edu

Language: English - Date: 2002-05-10 17:26:01
    22

    Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, and David Wetherall University of California, San Diego and University of Washington Abstract. To

    Add to Reading List

    Source URL: djw.cs.washington.edu

    Language: English - Date: 2009-11-09 17:10:53
      23

      17th ACM Symposium on Operating Systems Principles (SOSP ’99) Published as Operating Systems Review 34(5):64–79, DecActive network vision and reality: lessons from a capsule-based system David Wetherall

      Add to Reading List

      Source URL: djw.cs.washington.edu

      Language: English - Date: 2002-11-01 15:17:52
        24

        Reverse Engineering the Internet Neil Spring, David Wetherall, and Thomas Anderson Department of Computer Science and Engineering, University of Washington ficient network measurement techniques make this possible. For e

        Add to Reading List

        Source URL: djw.cs.washington.edu

        Language: English - Date: 2003-11-02 23:48:09
          25

          Understanding BGP Misconfiguration Ratul Mahajan David Wetherall Tom Anderson

          Add to Reading List

          Source URL: djw.cs.washington.edu

          Language: English - Date: 2003-01-10 15:18:51
            26Computing / Software / World Wide Web / Network architecture / Internet protocols / Hypertext Transfer Protocol / SPDY / Web development / HTTP/2 / Amazon Silk / Push technology / Internet Explorer 11

            How Speedy is SPDY? Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy, and David Wetherall, University of Washington https://www.usenix.org/conference/nsdi14/technical-sessions/wang This paper is included in

            Add to Reading List

            Source URL: www.usenix.org

            Language: English
            27

            SafeGuard: Safe Forwarding during Route Changes Ang Li Xiaowei Yang David Wetherall

            Add to Reading List

            Source URL: djw.cs.washington.edu

            Language: English - Date: 2009-11-09 17:15:48
              28

              A Wakeup Call for Internet Monitoring Systems: The Case for Distributed Triggers Ankur Jain†,∗ , Joseph M. Hellerstein‡,∗ , Sylvia Ratnasamy∗ , David Wetherall† † University of Washington

              Add to Reading List

              Source URL: djw.cs.washington.edu

              Language: English - Date: 2005-02-11 22:37:09
                29

                Inferring Link Weights using End-to-End Measurements Ratul Mahajan Neil Spring David Wetherall

                Add to Reading List

                Source URL: djw.cs.washington.edu

                Language: English - Date: 2003-01-10 15:17:52
                  30

                  Expressive Privacy Control with Pseudonyms Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter Thomas Anderson, Arvind Krishnamurthy, David Wetherall University of Washington {syhan, vincent, qp, simpeter, tom, arvind, dj

                  Add to Reading List

                  Source URL: homes.cs.washington.edu

                  Language: English - Date: 2013-06-25 18:48:39
                    UPDATE