default search action
David Wetherall
Person information
- affiliation: University of Washington, Seattle, Washington, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c90]Mubashir Adnan Qureshi, Junhua Yan, Yuchung Cheng, Soheil Hassas Yeganeh, Yousuk Seung, Neal Cardwell, Willem de Bruijn, Van Jacobson, Jasleen Kaur, David Wetherall, Amin Vahdat:
Fathom: Understanding Datacenter Application Network Performance. SIGCOMM 2023: 394-405 - [c89]David Wetherall, Abdul Kabbani, Van Jacobson, Jim Winget, Yuchung Cheng, Charles B. Morrey III, Uma Moravapalle, Phillipa Gill, Steven Knight, Amin Vahdat:
Improving Network Availability with Protective ReRoute. SIGCOMM 2023: 684-695 - 2022
- [c88]Mubashir Adnan Qureshi, Yuchung Cheng, Qianwen Yin, Qiaobin Fu, Gautam Kumar, Masoud Moshref, Junhua Yan, Van Jacobson, David Wetherall, Abdul Kabbani:
PLB: congestion signals are simple and effective for network load balancing. SIGCOMM 2022: 207-218 - 2020
- [c87]Gautam Kumar, Nandita Dukkipati, Keon Jang, Hassan M. G. Wassel, Xian Wu, Behnam Montazeri, Yaogong Wang, Kevin Springborn, Christopher Alfeld, Michael Ryan, David Wetherall, Amin Vahdat:
Swift: Delay is Simple and Effective for Congestion Control in the Datacenter. SIGCOMM 2020: 514-528
2010 – 2019
- 2019
- [j30]David Wetherall, David L. Tennenhouse:
Retrospective on "towards an active network architecture". Comput. Commun. Rev. 49(5): 86-89 (2019) - 2016
- [j29]Seungyeop Han, Haichen Shen, Taesoo Kim, Arvind Krishnamurthy, Thomas E. Anderson, David Wetherall:
MetaSync: Coordinating Storage across Multiple File Synchronization Services. IEEE Internet Comput. 20(3): 36-44 (2016) - [c86]Xiao Sophia Wang, Arvind Krishnamurthy, David Wetherall:
Speeding up Web Page Loads with Shandian. NSDI 2016: 109-122 - 2015
- [j28]Haichen Shen, David Wetherall, Aruna Balasubramanian, Anthony LaMarca:
MobileHub: No Programmer Effort for Power Efficiency with Sensor Hub. GetMobile Mob. Comput. Commun. 19(4): 9-12 (2015) - [c85]Haichen Shen, Aruna Balasubramanian, Anthony LaMarca, David Wetherall:
Enhancing mobile apps to use sensor hubs without programmer effort. UbiComp 2015: 227-238 - [c84]Radhika Mittal, Vinh The Lam, Nandita Dukkipati, Emily R. Blem, Hassan M. G. Wassel, Monia Ghobadi, Amin Vahdat, Yaogong Wang, David Wetherall, David Zats:
TIMELY: RTT-based Congestion Control for the Datacenter. SIGCOMM 2015: 537-550 - [c83]Seungyeop Han, Haichen Shen, Taesoo Kim, Arvind Krishnamurthy, Thomas E. Anderson, David Wetherall:
MetaSync: File Synchronization Across Multiple Untrusted Storage Services. USENIX ATC 2015: 83-95 - 2014
- [j27]Shyamnath Gollakota, Matthew S. Reynolds, Joshua R. Smith, David Wetherall:
The Emergence of RF-Powered Computing. Computer 47(1): 32-39 (2014) - [c82]Ilias Leontiadis, Antonio Lima, Haewoon Kwak, Rade Stanojevic, David Wetherall, Konstantina Papagiannaki:
From Cells to Streets: Estimating Mobile Paths with Cellular-Side Data. CoNEXT 2014: 121-132 - [c81]Xiao Sophia Wang, Arvind Krishnamurthy, David Wetherall:
How Much Can We Micro-Cache Web Pages? Internet Measurement Conference 2014: 249-256 - [c80]Seungyeop Han, Rajalakshmi Nandakumar, Matthai Philipose, Arvind Krishnamurthy, David Wetherall:
GlimpseData: towards continuous vision-based personal analytics. WPA@MobiSys 2014: 31-36 - [c79]Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy, David Wetherall:
How Speedy is SPDY? NSDI 2014: 387-399 - [c78]Bryce Kellogg, Aaron N. Parks, Shyamnath Gollakota, Joshua R. Smith, David Wetherall:
Wi-fi backscatter: internet connectivity for RF-powered devices. SIGCOMM 2014: 607-618 - [c77]Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang, David Wetherall:
Brahmastra: Driving Apps to Test the Security of Third-Party Components. USENIX Security Symposium 2014: 1021-1036 - 2013
- [c76]Andrius Aucinas, Narseo Vallina-Rodriguez, Yan Grunenberger, Vijay Erramilli, Konstantina Papagiannaki, Jon Crowcroft, David Wetherall:
Staying online while mobile: the hidden costs. CoNEXT 2013: 315-320 - [c75]Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy, David Wetherall:
Demystifying Page Load Performance with WProf. NSDI 2013: 473-485 - [c74]Vincent Liu, Aaron N. Parks, Vamsi Talla, Shyamnath Gollakota, David Wetherall, Joshua R. Smith:
Ambient backscatter: wireless communication out of thin air. SIGCOMM 2013: 39-50 - [c73]Xiao Sophia Wang, Haichen Shen, David Wetherall:
Accelerating the mobile web with selective offloading. MCC@SIGCOMM 2013: 45-50 - [c72]Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter, Thomas E. Anderson, Arvind Krishnamurthy, David Wetherall:
Expressive privacy control with pseudonyms. SIGCOMM 2013: 291-302 - [c71]Vamsi Talla, Michael Buettner, David Wetherall, Joshua R. Smith:
Hybrid analog-digital backscatter platform for high data rate, battery-free sensing. WiSNet 2013: 1-3 - 2012
- [j26]Marco Gruteser, David Wetherall:
Guest Editorial: Special Section on Outstanding Papers from MobiSys 2011. IEEE Trans. Mob. Comput. 11(5): 705-706 (2012) - [j25]Franziska Roesner, Christopher Rovillos, Tadayoshi Kohno, David Wetherall:
ShareMeNot: Balancing Privacy and Functionality of Third-Party Social Widgets. login Usenix Mag. 37(4) (2012) - [c70]Jaeyeon Jung, Seungyeop Han, David Wetherall:
Short paper: enhancing mobile application permissions with runtime feedback and constraints. SPSM@CCS 2012: 45-50 - [c69]Aruna Balasubramanian, Niranjan Balasubramanian, Samuel J. Huston, Donald Metzler, David Wetherall:
FindAll: a local search engine for mobile phones. CoNEXT 2012: 277-288 - [c68]Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman M. Sadeh, David Wetherall:
A Conundrum of Permissions: Installing Applications on an Android Smartphone. Financial Cryptography Workshops 2012: 68-79 - [c67]Franziska Roesner, Tadayoshi Kohno, David Wetherall:
Detecting and Defending Against Third-Party Tracking on the Web. NSDI 2012: 155-168 - 2011
- [b2]Andrew S. Tanenbaum, David Wetherall:
Computer networks, 5th Edition. Pearson 2011, ISBN 0132553171, pp. 1-951 - [j24]W. Keith Edwards, Rebecca E. Grinter, Ratul Mahajan, David Wetherall:
Advancing the state of home networking. Commun. ACM 54(6): 62-71 (2011) - [j23]Daniel Halperin, Wenjun Hu, Anmol Sheth, David Wetherall:
Tool release: gathering 802.11n traces with channel state information. Comput. Commun. Rev. 41(1): 53 (2011) - [j22]David (Yu) Zhu, Jaeyeon Jung, Dawn Song, Tadayoshi Kohno, David Wetherall:
TaintEraser: protecting sensitive data leaks using application-level taint tracking. ACM SIGOPS Oper. Syst. Rev. 45(1): 142-154 (2011) - [c66]Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart E. Schechter, David Wetherall:
These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. CCS 2011: 639-652 - [c65]David Wetherall, David R. Choffnes, Ben Greenstein, Seungyeop Han, Peter Hornyack, Jaeyeon Jung, Stuart E. Schechter, Xiao Sophia Wang:
Privacy Revelations for Web and Mobile Apps. HotOS 2011 - [c64]Moo-Ryong Ra, Anmol Sheth, Lily B. Mummert, Padmanabhan Pillai, David Wetherall, Ramesh Govindan:
Odessa: enabling interactive perception applications on mobile devices. MobiSys 2011: 43-56 - [c63]Michael Buettner, Benjamin Greenstein, David Wetherall:
Dewdrop: An Energy-Aware Runtime for Computational RFID. NSDI 2011 - [c62]Daniel Halperin, Srikanth Kandula, Jitendra Padhye, Paramvir Bahl, David Wetherall:
Augmenting data center networks with multi-gigabit wireless links. SIGCOMM 2011: 38-49 - [c61]Xiao Sophia Wang, David R. Choffnes, Patrick Gage Kelley, Ben Greenstein, David Wetherall:
Measuring and predicting web login safety. W-MUST@SIGCOMM 2011: 55-60 - [c60]Gabriel Maganis, Jaeyeon Jung, Tadayoshi Kohno, Anmol Sheth, David Wetherall:
Sensor tricorder: what does that sensor know about me? HotMobile 2011: 98-103 - [e5]Ashok K. Agrawala, Mark D. Corner, David Wetherall:
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys 2011), Bethesda, MD, USA, June 28 - July 01, 2011. ACM 2011, ISBN 978-1-4503-0643-0 [contents] - [e4]Nina Taft, David Wetherall:
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, W-MUST@SIGCOMM 2011, Toronto, Ontario, Canada, August 19, 2011. ACM 2011, ISBN 978-1-4503-0800-7 [contents] - 2010
- [j21]Daniel Halperin, Wenjun Hu, Anmol Sheth, David Wetherall:
802.11 with multiple antennas for dummies. Comput. Commun. Rev. 40(1): 19-25 (2010) - [j20]Michael Buettner, David Wetherall:
A "Gen 2" RFID monitor based on the USRP. Comput. Commun. Rev. 40(3): 41-47 (2010) - [j19]Sumit Roy, Vikram Jandhyala, Joshua R. Smith, David Wetherall, Brian P. Otis, Ritochit Chakraborty, Michael Buettner, Daniel J. Yeager, You-Chang Ko, Alanson P. Sample:
RFID: From Supply Chains to Sensor Nets. Proc. IEEE 98(9): 1583-1592 (2010) - [c59]Daniel Halperin, Wenjun Hu, Anmol Sheth, David Wetherall:
Predictable 802.11 packet delivery from wireless channel measurements. SIGCOMM 2010: 159-170 - [c58]Peter Gilbert, Landon P. Cox, Jaeyeon Jung, David Wetherall:
Toward trustworthy mobile sensing. HotMobile 2010: 31-36
2000 – 2009
- 2009
- [c57]Predrag V. Klasnja, Sunny Consolvo, Jaeyeon Jung, Benjamin Greenstein, Louis LeGrand, Pauline S. Powledge, David Wetherall:
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use. CHI 2009: 1993-2002 - [c56]Ang Li, Xiaowei Yang, David Wetherall:
SafeGuard: safe forwarding during route changes. CoNEXT 2009: 301-312 - [c55]Michael Buettner, Richa Prasad, Matthai Philipose, David Wetherall:
Recognizing daily activities with RFID-based sensors. UbiComp 2009: 51-60 - [c54]Anmol Sheth, Srinivasan Seshan, David Wetherall:
Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries. Pervasive 2009: 274-290 - [c53]Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, David Wetherall:
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default. Privacy Enhancing Technologies 2009: 143-163 - 2008
- [j18]Xiaowei Yang, David Wetherall, Thomas E. Anderson:
TVA: a DoS-limiting network architecture. IEEE/ACM Trans. Netw. 16(6): 1267-1280 (2008) - [c52]Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, Tadayoshi Kohno:
Privacy oracle: a system for finding application leaks with black box differential testing. CCS 2008: 279-288 - [c51]Michael Buettner, Ben Greenstein, Alanson P. Sample, Joshua R. Smith, David Wetherall:
Revisiting Smart Dust with RFID Sensor Networks. HotNets 2008: 37-42 - [c50]Michael Buettner, David Wetherall:
An empirical study of UHF RFID performance. MobiCom 2008: 223-234 - [c49]Daniel Halperin, Thomas E. Anderson, David Wetherall:
Taking the sting out of carrier sense: interference cancellation for wireless LANs. MobiCom 2008: 339-350 - [c48]Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall:
Improving wireless privacy with an identifier-free link layer protocol. MobiSys 2008: 40-53 - [c47]Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas E. Anderson:
Studying Black Holes in the Internet with Hubble. NSDI 2008: 247-262 - [c46]Sergiu Nedevschi, Lucian Popa, Gianluca Iannaccone, Sylvia Ratnasamy, David Wetherall:
Reducing Network Energy Consumption via Sleeping and Rate-Adaptation. NSDI 2008: 323-336 - [c45]Xin Liu, Ang Li, Xiaowei Yang, David Wetherall:
Passport: Secure and Adoptable Source Authentication. NSDI 2008: 365-376 - [c44]Michael Buettner, Richa Prasad, Alanson P. Sample, Daniel J. Yeager, Ben Greenstein, Joshua R. Smith, David Wetherall:
RFID sensor networks with the intel WISP. SenSys 2008: 393-394 - [e3]Victor Bahl, David Wetherall, Stefan Savage, Ion Stoica:
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008. ACM 2008, ISBN 978-1-60558-175-0 [contents] - 2007
- [j17]David L. Tennenhouse, David Wetherall:
Towards an active network architecture. Comput. Commun. Rev. 37(5): 81-94 (2007) - [c43]Daniel Halperin, M. Josie Ammer, Thomas E. Anderson, David Wetherall:
Interference Cancellation: Better Receivers for a New Wireless MAC. HotNets 2007 - [c42]Jeffrey Pang, Ben Greenstein, Srinivasan Seshan, David Wetherall:
Tryst: The Case for Confidential Service Discovery. HotNets 2007 - [c41]Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang, Mike Y. Chen, Tadayoshi Kohno, Srinivasan Seshan, David Wetherall:
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era. HotOS 2007 - [c40]Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, David Wetherall:
802.11 user fingerprinting. MobiCom 2007: 99-110 - [c39]Ratul Mahajan, David Wetherall, Thomas E. Anderson:
Mutually Controlled Routing with Independent ISPs. NSDI 2007 - [c38]Ramakrishna Gummadi, David Wetherall, Ben Greenstein, Srinivasan Seshan:
Understanding and mitigating the impact of RF interference on 802.11 networks. SIGCOMM 2007: 385-396 - 2006
- [j16]David Wetherall:
10 Networking Papers: readings for protocol design. Comput. Commun. Rev. 36(3): 77-78 (2006) - [c37]Ethan Katz-Bassett, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas E. Anderson, Yatin Chawathe:
Towards IP geolocation using delay and topology measurements. Internet Measurement Conference 2006: 71-84 - [c36]Anthony J. Nicholson, Yatin Chawathe, Mike Y. Chen, Brian D. Noble, David Wetherall:
Improved access point selection. MobiSys 2006: 233-245 - [c35]Charles Reis, Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan:
Measurement-based models of delivery and interference in static wireless networks. SIGCOMM 2006: 51-62 - [c34]Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan:
Analyzing the MAC-level behavior of wireless networks in the wild. SIGCOMM 2006: 75-86 - [c33]Xiaowei Yang, David Wetherall:
Source selectable path diversity via routing deflections. SIGCOMM 2006: 159-170 - [c32]Xin Liu, Xiaowei Yang, David Wetherall, Thomas E. Anderson:
Efficient and Secure Source Authentication with Packet Passports. SRUTI 2006 - 2005
- [j15]Joseph M. Hellerstein, Vern Paxson, Larry L. Peterson, Timothy Roscoe, Scott Shenker, David Wetherall:
The Network Oracle. IEEE Data Eng. Bull. 28(1): 3-10 (2005) - [c31]Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan:
Sustaining Cooperation in Multi-hop Wireless Networks. NSDI 2005 - [c30]Ratul Mahajan, David Wetherall, Thomas E. Anderson:
Negotiation-Based Routing Between Neighboring ISPs. NSDI 2005 - [c29]Maya Rodrig, Charles Reis, Ratul Mahajan, David Wetherall, John Zahorjan:
Measurement-based characterization of 802.11 in a hotspot setting. E-WIND@SIGCOMM 2005: 5-10 - [c28]Xiaowei Yang, David Wetherall, Thomas E. Anderson:
A DoS-limiting network architecture. SIGCOMM 2005: 241-252 - [e2]Amin Vahdat, David Wetherall:
2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), May 2-4, 2005, Boston, Massachusetts, USA, Proceedings. USENIX 2005 [contents] - 2004
- [j14]Neil T. Spring, David Wetherall, Thomas E. Anderson:
Reverse engineering the Internet. Comput. Commun. Rev. 34(1): 3-8 (2004) - [j13]Thomas E. Anderson, Timothy Roscoe, David Wetherall:
Preventing Internet denial-of-service with capabilities. Comput. Commun. Rev. 34(1): 39-44 (2004) - [j12]Robert Grimm, Janet Davis, Eric Lemar, Adam MacBeth, Steven Swanson, Thomas E. Anderson, Brian N. Bershad, Gaetano Borriello, Steven D. Gribble, David Wetherall:
System support for pervasive applications. ACM Trans. Comput. Syst. 22(4): 421-486 (2004) - [j11]Neil T. Spring, Ratul Mahajan, David Wetherall, Thomas E. Anderson:
Measuring ISP topologies with rocketfuel. IEEE/ACM Trans. Netw. 12(1): 2-16 (2004) - [c27]P. Krishna Gummadi, Harsha V. Madhyastha, Steven D. Gribble, Henry M. Levy, David Wetherall:
Improving the Reliability of Internet Paths with One-hop Source Routing. OSDI 2004: 183-198 - 2003
- [j10]Thomas E. Anderson, Scott Shenker, Ion Stoica, David Wetherall:
Design guidelines for robust Internet protocols. Comput. Commun. Rev. 33(1): 125-130 (2003) - [c26]Parveen Patel, David Wetherall, Jay Lepreau, Andrew Whitaker:
TCP Meets Mobile Code. HotOS 2003: 31-36 - [c25]Parveen Patel, Andrew Whitaker, David Wetherall, Jay Lepreau, Tim Stack:
Upgrading transport protocols using untrusted mobile code. SOSP 2003: 1-14 - [c24]Ratul Mahajan, Neil T. Spring, David Wetherall, Thomas E. Anderson:
User-level internet path diagnosis. SOSP 2003: 106-119 - [c23]Sushant Jain, Ratul Mahajan, David Wetherall:
A Study of the Performance Potential of DHT-based Overlays. USENIX Symposium on Internet Technologies and Systems 2003 - [c22]Neil T. Spring, David Wetherall, Thomas E. Anderson:
Scriptroute: A Public Internet Measurement Facility. USENIX Symposium on Internet Technologies and Systems 2003 - [e1]Anja Feldmann, Martina Zitterbart, Jon Crowcroft, David Wetherall:
Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 25-29, 2003, Karlsruhe, Germany. ACM 2003, ISBN 1-58113-735-4 [contents] - [i1]Neil Spring, David Wetherall, David Ely:
Robust Explicit Congestion Notification (ECN) Signaling with Nonces. RFC 3540: 1-13 (2003) - 2002
- [j9]Andrew T. Campbell, David Wetherall, Raj Yavatkar:
Programmable Networks. Comput. Networks 38(3): 273-275 (2002) - [c21]David L. Tennenhouse, David Wetherall:
Towards an Active Network Architecture. DANCE 2002: 2-15 - [c20]Michael W. Hicks, Jonathan T. Moore, David Wetherall, Scott Nettles:
Experiences with Capsule-Based Active Networking. DANCE 2002: 16-24 - [c19]David Wetherall:
Active Network Vision and Reality: Lessons from a Capsule-Based System. DANCE 2002: 25- - [c18]Ratul Mahajan, Neil T. Spring, David Wetherall, Thomas E. Anderson:
Inferring link weights using end-to-end measurements. Internet Measurement Workshop 2002: 231-236 - [c17]Ratul Mahajan, David Wetherall, Thomas E. Anderson:
Understanding BGP misconfiguration. SIGCOMM 2002: 3-16 - [c16]Neil T. Spring, Ratul Mahajan, David Wetherall:
Measuring ISP topologies with rocketfuel. SIGCOMM 2002: 133-145 - 2001
- [j8]Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson:
Network support for IP traceback. IEEE/ACM Trans. Netw. 9(3): 226-237 (2001) - [c15]Robert Grimm, Janet Davis, Ben Hendrickson, Eric Lemar, Adam MacBeth, Steven Swanson, Thomas E. Anderson, Brian N. Bershad, Gaetano Borriello, Steven D. Gribble, David Wetherall:
Systems Directions for Pervasive Computing. HotOS 2001: 147-151 - [c14]Ratul Mahajan, Sally Floyd, David Wetherall:
Controlling High-Bandwidth Flows at the Congested Router. ICNP 2001: 192-201 - [c13]David Ely, Neil Spring, David Wetherall, Stefan Savage, Thomas E. Anderson:
Robust Congestion Signaling. ICNP 2001: 332-341 - [c12]David Ely, Stefan Savage, David Wetherall:
Alpine: A User-Level Infrastructure for Network Protocol Development. USITS 2001 - 2000
- [c11]Neil T. Spring, David Wetherall:
A protocol-independent technique for eliminating redundant network traffic. SIGCOMM 2000: 87-95 - [c10]Stefan Savage, David Wetherall, Anna R. Karlin, Thomas E. Anderson:
Practical network support for IP traceback. SIGCOMM 2000: 295-306 - [c9]Robert Grimm, Thomas E. Anderson, Brian N. Bershad, David Wetherall:
A system architecture for pervasive computing. ACM SIGOPS European Workshop 2000: 177-182
1990 – 1999
- 1999
- [j7]Stefan Savage, Neal Cardwell, David Wetherall, Thomas E. Anderson:
TCP congestion control with a misbehaving receiver. Comput. Commun. Rev. 29(5): 71-78 (1999) - [j6]David Wetherall, John V. Guttag, David L. Tennenhouse:
ANTS: Network Services Without the Red Tape. Computer 32(4): 42-48 (1999) - [c8]Vanu G. Bose, David Wetherall, John V. Guttag:
Next Century Challenges: RadioActive Networks. MobiCom 1999: 242-248 - [c7]