default search action
John S. Heidemann
Person information
- affiliation: University of Southern California, Information Sciences Institute, Los Angeles, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Giovane C. M. Moura, Marco Davids, Caspar Schutijser, Cristian Hesselman, John S. Heidemann, Georgios Smaragdakis:
Deep Dive into NTP Pool's Popularity and Mapping. Proc. ACM Meas. Anal. Comput. Syst. 8(1): 15:1-15:30 (2024) - [c116]Basileal Imana, Aleksandra Korolova, John S. Heidemann:
Auditing for Racial Discrimination in the Delivery of Education Ads. FAccT 2024: 2348-2361 - [c115]A. S. M. Rizvi, Tingshan Huang, Rasit Mete Esrefoglu, John S. Heidemann:
Anycast Polarization in the Wild. PAM (2) 2024: 104-131 - [c114]Guillermo Baltra, Xiao Song, John S. Heidemann:
Ebb and Flow: Implications of ISP Address Dynamics. PAM (2) 2024: 132-149 - [c113]Giovane C. M. Moura, Marco Davids, Caspar Schutijser, Cristian Hesselman, John S. Heidemann, Georgios Smaragdakis:
Deep Dive into NTP Pool's Popularity and Mapping. SIGMETRICS/Performance (Abstracts) 2024: 9-10 - [i16]Basileal Imana, Aleksandra Korolova, John S. Heidemann:
Auditing for Racial Discrimination in the Delivery of Education Ads. CoRR abs/2406.00591 (2024) - [i15]Guillermo Baltra, Tarang Saluja, Yuri Pradkin, John S. Heidemann:
Reasoning About Internet Connectivity. CoRR abs/2407.14427 (2024) - [i14]Basileal Imana, Aleksandra Korolova, John S. Heidemann:
Auditing for Bias in Ad Delivery Using Inferred Demographic Attributes. CoRR abs/2410.23394 (2024) - 2023
- [j48]A. S. M. Rizvi, Jelena Mirkovic, John S. Heidemann, Wesley Hardaker, Robert Story:
Defending Root DNS Servers against DDoS Using Layered Defenses (Extended). Ad Hoc Networks 151: 103259 (2023) - [j47]Giovane C. M. Moura, John S. Heidemann:
Vulnerability Disclosure Considered Stressful. Comput. Commun. Rev. 53(2): 2-10 (2023) - [j46]Basileal Imana, Aleksandra Korolova, John S. Heidemann:
Having your Privacy Cake and Eating it Too: Platform-supported Auditing of Social Media Algorithms for Public Interest. Proc. ACM Hum. Comput. Interact. 7(CSCW1): 1-33 (2023) - [c112]A. S. M. Rizvi, Jelena Mirkovic, John S. Heidemann, Wesley Hardaker, Robert Story:
Defending Root DNS Servers Against DDoS Using Layered Defenses. COMSNETS 2023: 513-521 - [c111]Xiao Song, Guillermo Baltra, John S. Heidemann:
Inferring Changes in Daily Human Activity from Internet Response. IMC 2023: 627-644 - 2022
- [c110]Tarang Saluja, John S. Heidemann, Yuri Pradkin:
Differences in Monitoring the DNS Root Over IPv4 and IPv6. BDCAT 2022: 194-203 - [c109]Asma Enayet, John S. Heidemann:
Internet outage detection using passive analysis. IMC 2022: 772-773 - [c108]Giovane C. M. Moura, John S. Heidemann, Wes Hardaker, Pithayuth Charnsethikul, Jeroen Bulten, João M. Ceron, Cristian Hesselman:
Old but Gold: Prospecting TCP to Engineer and Live Monitor DNS Anycast. PAM 2022: 264-292 - [c107]A. S. M. Rizvi, Leandro M. Bertholdo, João M. Ceron, John S. Heidemann:
Anycast Agility: Network Playbooks to Fight DDoS. USENIX Security Symposium 2022: 4201-4218 - [i13]Basileal Imana, Aleksandra Korolova, John S. Heidemann:
Having your Privacy Cake and Eating it Too: Platform-supported Auditing of Social Media Algorithms for Public Interest. CoRR abs/2207.08773 (2022) - [i12]A. S. M. Rizvi, Jelena Mirkovic, John S. Heidemann, Wesley Hardaker, Robert Story:
Defending Root DNS Servers Against DDoS Using Layered Defenses. CoRR abs/2209.07491 (2022) - [i11]Asma Enayet, John S. Heidemann:
Internet Outage Detection using Passive Analysis (Poster Abstract and Poster). CoRR abs/2209.13767 (2022) - [i10]Giovane C. M. Moura, Wes Hardaker, John S. Heidemann, Marco Davids:
Considerations for Large Authoritative DNS Server Operators. RFC 9199: 1-17 (2022) - 2021
- [j45]kc claffy, David D. Clark, John S. Heidemann, Fabian E. Bustamante, Mattijs Jonker, Aaron Schulman, Ellen Zegura:
Workshop on Overcoming Measurement Barriers to Internet Research (WOMBIR 2021) final report. Comput. Commun. Rev. 51(3): 33-40 (2021) - [j44]Abdul Qadeer, John S. Heidemann:
Plumb: Efficient stream processing of multi-user pipelines. Softw. Pract. Exp. 51(2): 385-408 (2021) - [c106]Abdul Qadeer, John S. Heidemann:
Efficient Processing of Streaming Data using Multiple Abstractions. CLOUD 2021: 157-167 - [c105]Basileal Imana, Aleksandra Korolova, John S. Heidemann:
Institutional privacy risks in sharing DNS data. ANRW 2021: 69-75 - [c104]Erica Stutz, Yuri Pradkin, Xiao Song, John S. Heidemann:
Visualizing Internet Measurements of Covid-19 Work-from-Home. IEEE BigData 2021: 5633-5638 - [c103]Giovane C. M. Moura, Sebastian Castro, John S. Heidemann, Wes Hardaker:
TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS. Internet Measurement Conference 2021: 398-418 - [c102]Thomas Koch, Ethan Katz-Bassett, John S. Heidemann, Matt Calder, Calvin Ardi, Ke Li:
Anycast In context: a tale of two systems. SIGCOMM 2021: 398-417 - [c101]Basileal Imana, Aleksandra Korolova, John S. Heidemann:
Auditing for Discrimination in Algorithms Delivering Job Ads. WWW 2021: 3767-3778 - [i9]Xiao Song, John S. Heidemann:
Measuring the Internet during Covid-19 to Evaluate Work-from-Home. CoRR abs/2102.07433 (2021) - [i8]Basileal Imana, Aleksandra Korolova, John S. Heidemann:
Auditing for Discrimination in Algorithms Delivering Job Ads. CoRR abs/2104.04502 (2021) - [i7]A. S. M. Rizvi, John S. Heidemann:
Chhoyhopper: A Moving Target Defense with IPv6. CoRR abs/2105.13592 (2021) - [i6]Guillermo Baltra, John S. Heidemann:
What Is The Internet? (Considering Partial Connectivity). CoRR abs/2107.11439 (2021) - 2020
- [j43]Hang Guo, John S. Heidemann:
Detecting IoT Devices in the Internet. IEEE/ACM Trans. Netw. 28(5): 2323-2336 (2020) - [c100]Guillermo Baltra, John S. Heidemann:
Improving Coverage of Internet Outage Detection in Sparse Blocks. PAM 2020: 19-36 - [c99]Lan Wei, Marcel Flores, Harkeerat Bedi, John S. Heidemann:
Bidirectional Anycast/Unicast Probing (BAUP): Optimizing CDN Anycast. TMA 2020 - [i5]A. S. M. Rizvi, João M. Ceron, Leandro M. Bertholdo, John S. Heidemann:
Anycast Agility: Adaptive Routing to Manage DDoS. CoRR abs/2006.14058 (2020) - [i4]Lan Wei, John S. Heidemann:
Whac-A-Mole: Six Years of DNS Spoofing. CoRR abs/2011.12978 (2020)
2010 – 2019
- 2019
- [j42]Calvin Ardi, John S. Heidemann:
Precise Detection of Content Reuse in the Web. Comput. Commun. Rev. 49(2): 9-24 (2019) - [c98]Ryan Bogutz, Yuri Pradkin, John S. Heidemann:
Identifying Important Internet Outages. IEEE BigData 2019: 3002-3007 - [c97]Giovane C. M. Moura, John S. Heidemann, Ricardo de Oliveira Schmidt, Wes Hardaker:
Cache Me If You Can: Effects of DNS Time-to-Live. Internet Measurement Conference 2019: 101-115 - [i3]Hang Guo, Xun Fan, Anh Cao, Geoff Outhred, John S. Heidemann:
Peek Inside the Closed World: Evaluating Autoencoder-Based Detection of DDoS to Cloud. CoRR abs/1912.05590 (2019) - 2018
- [j41]Lan Wei, John S. Heidemann:
Does Anycast Hang Up on You (UDP and TCP)? IEEE Trans. Netw. Serv. Manag. 15(2): 707-717 (2018) - [c96]Abdul Qadeer, John S. Heidemann:
Plumb: Efficient Processing of Multi-User Pipelines. SoCC 2018: 519 - [c95]Giovane C. M. Moura, John S. Heidemann, Moritz Müller, Ricardo de Oliveira Schmidt, Marco Davids:
When the Dike Breaks: Dissecting DNS Defenses During DDoS. Internet Measurement Conference 2018: 8-21 - [c94]Liang Zhu, John S. Heidemann:
LDplayer: DNS Experimentation at Scale. Internet Measurement Conference 2018: 119-132 - [c93]Kensuke Fukuda, John S. Heidemann:
Who Knocks at the IPv6 Door?: Detecting IPv6 Scanning. Internet Measurement Conference 2018: 231-237 - [c92]Hang Guo, John S. Heidemann:
Detecting ICMP Rate Limiting in the Internet. PAM 2018: 3-17 - [c91]Calvin Ardi, John S. Heidemann:
Leveraging Controlled Information Sharing for Botnet Activity Detection. WTMC@SIGCOMM 2018: 14-20 - [c90]Hang Guo, John S. Heidemann:
IP-Based IoT Device Detection. IoT S&P@SIGCOMM 2018: 36-42 - [c89]Calvin Ardi, John S. Heidemann, Gina Fisk, Mike Fisk, Christos Papadopoulos:
Poster: Towards a Collaborative and Retrospective Understanding of Security Events with Retro-Future. SIGCOMM Posters and Demos 2018: 72-74 - 2017
- [j40]Kensuke Fukuda, John S. Heidemann, Abdul Qadeer:
Detecting Malicious Activity With DNS Backscatter Over Time. IEEE/ACM Trans. Netw. 25(5): 3203-3218 (2017) - [c88]Wouter B. de Vries, Ricardo de Oliveira Schmidt, Wes Hardaker, John S. Heidemann, Pieter-Tjerk de Boer, Aiko Pras:
Broad and load-aware anycast mapping with verfploeter. Internet Measurement Conference 2017: 477-488 - [c87]Moritz Müller, Giovane C. M. Moura, Ricardo de Oliveira Schmidt, John S. Heidemann:
Recursives in the wild: engineering authoritative DNS servers. Internet Measurement Conference 2017: 489-495 - [c86]Ricardo de Oliveira Schmidt, John S. Heidemann, Jan Harm Kuipers:
Anycast Latency: How Many Sites Are Enough? PAM 2017: 188-200 - [c85]Liang Zhu, John S. Heidemann:
LDplayer: DNS Experimentation at Scale. SIGCOMM Posters and Demos 2017: 60-62 - [c84]Jelena Mirkovic, Genevieve Bartlett, John S. Heidemann, Hao Shi, Xiyue Deng:
Do you see me now? Sparsity in passive observations of address liveness. TMA 2017: 1-9 - [c83]Lan Wei, John S. Heidemann:
Does anycast hang up on you? TMA 2017: 1-9 - 2016
- [c82]Giovane C. M. Moura, Ricardo de Oliveira Schmidt, John S. Heidemann, Wouter B. de Vries, Moritz Müller, Lan Wei, Cristian Hesselman:
Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event. Internet Measurement Conference 2016: 255-270 - [c81]Manaf Gharaibeh, Han Zhang, Christos Papadopoulos, John S. Heidemann:
Assessing co-locality of IP blocks. INFOCOM Workshops 2016: 503-508 - [c80]Liang Zhu, Johanna Amann, John S. Heidemann:
Measuring the Latency and Pervasiveness of TLS Certificate Revocation. PAM 2016: 16-29 - [e4]Phillipa Gill, John S. Heidemann, John W. Byers, Ramesh Govindan:
Proceedings of the 2016 ACM on Internet Measurement Conference, IMC 2016, Santa Monica, CA, USA, November 14-16, 2016. ACM 2016, ISBN 978-1-4503-4526-2 [contents] - [i2]Zi Hu, Liang Zhu, John S. Heidemann, Allison Mankin, Duane Wessels, Paul E. Hoffman:
Specification for DNS over Transport Layer Security (TLS). RFC 7858: 1-19 (2016) - 2015
- [c79]Kensuke Fukuda, John S. Heidemann:
Detecting Malicious Activity with DNS Backscatter. Internet Measurement Conference 2015: 197-210 - [c78]Liang Zhu, Zi Hu, John S. Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya:
Connection-Oriented DNS to Improve Privacy and Security. IEEE Symposium on Security and Privacy 2015: 171-186 - [c77]Gina Fisk, Calvin Ardi, Neale Pickett, John S. Heidemann, Mike Fisk, Christos Papadopoulos:
Privacy Principles for Sharing Cyber Security Data. IEEE Symposium on Security and Privacy Workshops 2015: 193-197 - [c76]Xun Fan, Ethan Katz-Bassett, John S. Heidemann:
Assessing Affinity Between Users and CDN Sites. TMA 2015: 95-110 - [c75]Liang Zhu, Duane Wessels, Allison Mankin, John S. Heidemann:
Measuring DANE TLSA Deployment. TMA 2015: 219-232 - 2014
- [j39]John S. Heidemann, Walter Willinger:
Internet visualization. Computing 96(1): 1-2 (2014) - [j38]Lin Quan, John S. Heidemann, Yuri Pradkin:
Visualizing sparse internet events: network outages and route changes. Computing 96(1): 39-51 (2014) - [c74]Lin Quan, John S. Heidemann, Yuri Pradkin:
When the internet sleeps: correlating diurnal networks with external factors. Internet Measurement Conference 2014: 87-100 - [c73]Chengjie Zhang, John S. Heidemann:
Accurate Pipeline Blockage Detection with Low-Cost Multi-modal Sensing. MASS 2014: 172-180 - [c72]Zi Hu, Liang Zhu, Calvin Ardi, Ethan Katz-Bassett, Harsha V. Madhyastha, John S. Heidemann, Minlan Yu:
The Need for End-to-End Evaluation of Cloud Availability. PAM 2014: 119-130 - [c71]Liang Zhu, Zi Hu, John S. Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya:
T-DNS: connection-oriented DNS to improve privacy and security (poster abstract). SIGCOMM 2014: 379-380 - [e3]Ethan Katz-Bassett, John S. Heidemann, Brighten Godfrey, Anja Feldmann:
Proceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets-XIII, Los Angeles, CA, USA, October 27-28, 2014. ACM 2014, ISBN 978-1-4503-3256-9 [contents] - 2013
- [j37]Affan A. Syed, John S. Heidemann, Wei Ye:
Tones for real: Managing multipath in underwater acoustic wakeup. ACM Trans. Sens. Networks 9(2): 27:1-27:24 (2013) - [c70]Matt Calder, Xun Fan, Zi Hu, Ethan Katz-Bassett, John S. Heidemann, Ramesh Govindan:
Mapping the expansion of Google's serving infrastructure. Internet Measurement Conference 2013: 313-326 - [c69]Xun Fan, John S. Heidemann, Ramesh Govindan:
Evaluating anycast in the domain name system. INFOCOM 2013: 1681-1689 - [c68]Lin Quan, John S. Heidemann, Yuri Pradkin:
Towards Active Measurements of Edge Network Outages. PAM 2013: 276-279 - [c67]Lin Quan, John S. Heidemann, Yuri Pradkin:
Trinocular: understanding internet reliability through adaptive probing. SIGCOMM 2013: 255-266 - 2012
- [c66]Zi Hu, John S. Heidemann, Yuri Pradkin:
Towards geolocation of millions of IP addresses. Internet Measurement Conference 2012: 123-130 - 2011
- [j36]Joon Ahn, Affan A. Syed, Bhaskar Krishnamachari, John S. Heidemann:
Design and analysis of a propagation delay tolerant ALOHA protocol for underwater networks. Ad Hoc Networks 9(5): 752-766 (2011) - [j35]Sunhee Yoon, Wei Ye, John S. Heidemann, B. Littlefield, Cyrus Shahabi:
SWATS: Wireless sensor networks for steamflood and waterflood pipeline monitoring. IEEE Netw. 25(1): 50-56 (2011) - [j34]Gautam Thatte, Urbashi Mitra, John S. Heidemann:
Parametric methods for anomaly detection in aggregate traffic. IEEE/ACM Trans. Netw. 19(2): 512-525 (2011) - [c65]Unkyu Park, John S. Heidemann:
Data muling with mobile phones for sensornets. SenSys 2011: 162-175 - [c64]Chengjie Zhang, Affan A. Syed, Young Cho, John S. Heidemann:
Steam-powered sensing. SenSys 2011: 204-217 - 2010
- [c63]Xue Cai, John S. Heidemann, Balachander Krishnamurthy, Walter Willinger:
Towards an AS-to-organization map. Internet Measurement Conference 2010: 199-205 - [c62]Xun Fan, John S. Heidemann:
Selecting representative IP addresses for internet topology studies. Internet Measurement Conference 2010: 411-423 - [c61]Lin Quan, John S. Heidemann:
On the characteristics and reasons of long-lived internet flows. Internet Measurement Conference 2010: 444-450 - [c60]Affan A. Syed, John S. Heidemann, Wei Ye:
Tones for Real: Managing Multipath in Underwater Acoustic Wakeup. SECON 2010: 1-3 - [c59]Affan A. Syed, Young Cho, John S. Heidemann:
Energy transference for sensornets. SenSys 2010: 397-398 - [c58]Xue Cai, John S. Heidemann:
Understanding block-level address usage in the visible internet. SIGCOMM 2010: 99-110 - [c57]Affan A. Syed, John S. Heidemann:
Contention analysis of MAC protocols that count. WUWNet 2010: 2
2000 – 2009
- 2009
- [j33]Xinming He, Christos Papadopoulos, John S. Heidemann, Urbashi Mitra, Usman Riaz:
Remote detection of bottleneck links using spectral and statistical methods. Comput. Networks 53(3): 279-298 (2009) - [e2]James C. Preisig, Curt Schurgers, John S. Heidemann, Peter Corke:
Proceedings of the Fourth ACM International Workshop on UnderWater Networks, WUWNet 2009, Berkeley, CA, USA, November 3, 2009. ACM 2009, ISBN 978-1-60558-821-6 [contents] - 2008
- [j32]Yuan Li, Wei Ye, John S. Heidemann, Rohit Kulkarni:
Design and evaluation of network reconfiguration protocols for mostly-off sensor networks. Ad Hoc Networks 6(8): 1301-1315 (2008) - [j31]John S. Heidemann, Urbashi Mitra, James C. Preisig, Milica Stojanovic, Michele Zorzi:
Guest Editorial - Underwater Wireless Communication Networks. IEEE J. Sel. Areas Commun. 26(9): 1617-1619 (2008) - [j30]Affan A. Syed, Wei Ye, John S. Heidemann:
Comparison and Evaluation of the T-Lohi MAC for Underwater Acoustic Sensor Networks. IEEE J. Sel. Areas Commun. 26(9): 1731-1743 (2008) - [j29]Joseph A. Paradiso, John S. Heidemann, Thomas G. Zimmerman:
Hacking Is Pervasive. IEEE Pervasive Comput. 7(3): 13-15 (2008) - [c56]John S. Heidemann, Yuri Pryadkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, Joseph A. Bannister:
Census and survey of the visible internet. Internet Measurement Conference 2008: 169-182 - [c55]Affan A. Syed, Wei Ye, John S. Heidemann:
T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks. INFOCOM 2008: 231-235 - [c54]Unkyu Park, John S. Heidemann:
Provenance in Sensornet Republishing. IPAW 2008: 280-292 - [c53]Muhammad Omar Khan, Affan A. Syed, Wei Ye, John S. Heidemann, Jack Wills:
Bringing sensor networks underwater with low-power acoustic communications. SenSys 2008: 379-380 - 2007
- [c52]Genevieve Bartlett, John S. Heidemann, Christos Papadopoulos:
Understanding passive and active service discovery. Internet Measurement Conference 2007: 57-70 - [c51]Thanos Stathopoulos, Martin Lukac, Dustin McIntire, John S. Heidemann, Deborah Estrin, William J. Kaiser:
End-to-End Routing for Dual-Radio Sensor Networks. INFOCOM 2007: 2252-2260 - [c50]Affan A. Syed, Wei Ye, John S. Heidemann, Bhaskar Krishnamachari:
Understanding spatio-temporal uncertainty in medium access with ALOHA protocols. Underwater Networks 2007: 41-48 - 2006
- [j28]Kun-Chan Lan, John S. Heidemann:
A measurement study of correlations of Internet flow characteristics. Comput. Networks 50(1): 46-62 (2006) - [j27]Keith I. Farkas, John S. Heidemann, Liviu Iftode:
Guest Editors' Introduction: Intelligent Transportation and Pervasive Computing. IEEE Pervasive Comput. 5(4): 18-19 (2006) - [j26]Keith I. Farkas, John S. Heidemann, Liviu Iftode, Timo Kosch, Markus Strassberger, Kenneth P. Laberteaux, Lorenzo Caminiti, Derek Caveney, Hideki Hada:
Vehicular Communication. IEEE Pervasive Comput. 5(4): 55-62 (2006) - [j25]Urbashi Mitra, Antonio Ortega, John S. Heidemann, Christos Papadopoulos:
Detecting and identifying malware: a new signal processing goal. IEEE Signal Process. Mag. 23(5): 107-111 (2006) - [c49]Alefiya Hussain, John S. Heidemann, Christos Papadopoulos:
Identification of Repeated Denial of Service Attacks. INFOCOM 2006 - [c48]Affan A. Syed, John S. Heidemann:
Time Synchronization for High Latency Acoustic Networks. INFOCOM 2006 - [c47]Jack Wills, Wei Ye, John S. Heidemann:
Low-power acoustic modem for dense underwater sensor networks. Underwater Networks 2006: 79-85 - [c46]Yuan Li, Wei Ye, John S. Heidemann:
Energy Efficient Network Reconfiguration for Mostly-Off Sensor Networks. SECON 2006: 527-535 - [c45]Fred Stann, John S. Heidemann, Rajesh Shroff, Muhammad Zaki Murtaza:
RBP: robust broadcast propagation in wireless networks. SenSys 2006: 85-98 - [c44]Dongjin Son, Bhaskar Krishnamachari, John S. Heidemann:
Experimental study of concurrent transmission in wireless sensor networks. SenSys 2006: 237-250 - [c43]Wei Ye, Fabio Silva, John S. Heidemann:
Ultra-low duty cycle MAC with scheduled channel polling. SenSys 2006: 321-334 - [c42]John S. Heidemann, Wei Ye, Jack Wills, Affan A. Syed, Yuan Li:
Research challenges and applications for underwater sensor networking. WCNC 2006: 228-235 - [e1]Andrew T. Campbell, Philippe Bonnet, John S. Heidemann:
Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, SenSys 2006, Boulder, Colorado, USA, October 31 - November 3, 2006. ACM 2006, ISBN 1-59593-343-3 [contents] - 2005
- [j24]Omprakash Gnawali, Ramesh Govindan, John S. Heidemann:
Implementing a Sensor Database System using a Generic Data Dissemination Mechanism. IEEE Data Eng. Bull. 28(1): 70-75 (2005) - [j23]Jong-Suk Ahn, Seung-Wook Hong, John S. Heidemann:
An adaptive FEC code control algorithm for mobile wireless sensor networks. J. Commun. Networks 7(4): 489-498 (2005) - [j22]Xuan Chen, John S. Heidemann:
Flash crowd mitigation via adaptive admission control based on application-level observations. ACM Trans. Internet Techn. 5(3): 532-569 (2005) - [j21]Deepak Ganesan, Ben Greenstein, Deborah Estrin, John S. Heidemann, Ramesh Govindan:
Multiresolution storage and search in sensor networks. ACM Trans. Storage 1(3): 277-315 (2005) - [c41]Fred Stann, John S. Heidemann:
BARD: Bayesian-assisted resource discovery in sensor networks. INFOCOM 2005: 866-877 - [c40]Abhimanyu Das, Debojyoti Dutta, Ahmed Helmy, Ashish Goel, John S. Heidemann:
Low-state fairness: lower bounds and practical enforcement. INFOCOM 2005: 2436-2446 - [c39]Kun-Chan Lan, John S. Heidemann:
On the feasibility of utilizing correlations between user populations for traffic inference. LCN 2005: 132-139 - [c38]Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin, John S. Heidemann, Christos Papadopoulos, Joseph A. Bannister:
Experiences with a continuous network tracing infrastructure. MineNet 2005: 185-190 - [c37]Yuan Li, Wei Ye, John S. Heidemann:
Energy and latency control in low duty cycle MAC protocols. WCNC 2005: 676-682 - [p1]John S. Heidemann, Ramesh Govindan:
Embedded Sensor Networks. Handbook of Networked and Embedded Control Systems 2005: 721-739 - 2004
- [j20]Alefiya Hussain, John S. Heidemann, Christos Papadopoulos:
Distinguishing between single and multi-source attacks using signal processing. Comput. Networks 46(4): 479-503 (2004) - [j19]Nirupama Bulusu, John S. Heidemann, Deborah Estrin, Tommy Tran:
Self-configuring localization systems: Design and Experimental Evaluation. ACM Trans. Embed. Comput. Syst. 3(1): 24-60 (2004) - [j18]Wei Ye, John S. Heidemann, Deborah Estrin:
Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Trans. Netw. 12(3): 493-506 (2004) - [c36]Debojyoti Dutta, Ashish Goel, John S. Heidemann:
Towards Protocol Equilibrium with Oblivious Routers. INFOCOM 2004: 2017-2025 - [c35]Bhaskar Krishnamachari, John S. Heidemann:
Application-specific modelling of information routing in wireless sensor networks. IPCCC 2004: 717-722 - [c34]Thanos Stathopoulos, Rahul Kapur, Deborah Estrin, John S. Heidemann, Lixia Zhang:
Application-Based Collision Avoidance in Wireless Sensor Networks. LCN 2004: 506-514 - [c33]Alefiya Hussain, Aman Kapoor, John S. Heidemann:
The Effect of Detail on Ethernet Simulation. PADS 2004: 97-104 - [c32]Omprakash Gnawali, Mark Yarvis, John S. Heidemann, Ramesh Govindan:
Interaction of retransmission, blacklisting, and routing metrics for reliability in sensor network routing. SECON 2004: 34-43 - [c31]Dongjin Son, Bhaskar Krishnamachari, John S. Heidemann:
Experimental study of the effects of transmission power control and blacklisting in wireless sensor networks. SECON 2004: 289-298 - [c30]Xi Wang, Fabio Silva, John S. Heidemann:
Follow-me application: active visitor guidance system. SenSys 2004: 316 - [c29]Di-Fa Chang, Ramesh Govindan, John S. Heidemann:
Locating BGP missing routes using multiple perspectives. NetT@SIGCOMM 2004: 301-306 - [c28]Xi Wang, Fabio Silva, John S. Heidemann:
Infrastructureless Location Aware Configuration for Sensor Networks. WMCSA 2004: 174-183 - 2003
- [j17]Deepak Ganesan, Deborah Estrin, John S. Heidemann:
Dimensions: why do we need a new data handling architecture for sensor networks? Comput. Commun. Rev. 33(1): 143-148 (2003) - [j16]Xuan Chen, John S. Heidemann:
Preferential treatment for short flows to reduce web latency. Comput. Networks 41(6): 779-794 (2003) - [j15]Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, John S. Heidemann, Fabio Silva:
Directed diffusion for wireless sensor networking. IEEE/ACM Trans. Netw. 11(1): 2-16 (2003) - [c27]Di-Fa Chang, Ramesh Govindan, John S. Heidemann:
The Temporal and Topological Characteristics of BGP Path Changes. ICNP 2003: 190-199 - [c26]Mohammad H. Rahimi, Hardik Shah, Gaurav S. Sukhatme, John S. Heidemann, Deborah Estrin:
Studying the Feasibility of Energy Harvesting in a Mobile Sensor Network. ICRA 2003: 19-24 - [c25]Debojyoti Dutta, Ashish Goel, John S. Heidemann:
Oblivious AQM and Nash Equilibria. INFOCOM 2003: 106-113 - [c24]Kun-Chan Lan, John S. Heidemann:
A tool for RApid model parameterization and its applications. MoMeTools@SIGCOMM 2003: 76-86 - [c23]Deepak Ganesan, Ben Greenstein, Denis Perelyubskiy, Deborah Estrin, John S. Heidemann:
An evaluation of multi-resolution storage for sensor networks. SenSys 2003: 89-102 - [c22]John S. Heidemann, Fabio Silva, Deborah Estrin:
Matching data dissemination algorithms to application requirements. SenSys 2003: 218-229 - [c21]Alefiya Hussain, John S. Heidemann, Christos Papadopoulos:
A framework for classifying denial of service attacks. SIGCOMM 2003: 99-110 - 2002
- [j14]Debojyoti Dutta, Ashish Goel, John S. Heidemann:
Oblivious AQM and nash equilibria. Comput. Commun. Rev. 32(3): 20 (2002) - [j13]Kun-Chan Lan, John S. Heidemann:
Rapid model parameterization from traffic measurements. ACM Trans. Model. Comput. Simul. 12(3): 201-229 (2002) - [c20]Chalermek Intanagonwiwat, Deborah Estrin, Ramesh Govindan, John S. Heidemann:
Impact of Network Density on Data Aggregation in Wireless Sensor Networks. ICDCS 2002: 457-458 - [c19]Di-Fa Chang, Ramesh Govindan, John S. Heidemann:
An empirical study of router response to large BGP routing table load. Internet Measurement Workshop 2002: 203-208 - [c18]Wei Ye, John S. Heidemann, Deborah Estrin:
An Energy-Efficient MAC Protocol for Wireless Sensor Networks. INFOCOM 2002: 1567-1576 - [c17]Debojyoti Dutta, Ashish Goel, John S. Heidemann:
Faster Network Design with Scenario Pre-Filtering. MASCOTS 2002: 237-246 - [c16]Purushotham Kamath, Kun-Chan Lan, John S. Heidemann, Joseph A. Bannister, Joseph D. Touch:
Generation of High Bandwidth Network Traffic Traces. MASCOTS 2002: 401- - 2001
- [j12]John S. Heidemann, Kevin Mills, Srikanta Kumar:
Expanding confidence in network simulations. IEEE Netw. 15(5): 58-63 (2001) - [c15]Nirupama Bulusu, Deborah Estrin, John S. Heidemann:
Adaptive Beacon Placement. ICDCS 2001: 489-498 - [c14]Wei Ye, Richard T. Vaughan, Gaurav S. Sukhatme, John S. Heidemann:
Evaluating Control Strategies for Wireless-Networked Robots Using an Integrated Robot and Network Simulation. ICRA 2001: 2941-2947 - [c13]Polly Huang, John S. Heidemann:
Minimizing Routing State for Light-Weight Network Simulation. MASCOTS 2001: 108-116 - [c12]Ya Xu, John S. Heidemann, Deborah Estrin:
Geography-informed energy conservation for Ad Hoc routing. MobiCom 2001: 70-84 - [c11]John S. Heidemann, Fabio Silva, Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, Deepak Ganesan:
Building Efficient Wireless Sensor Networks with Low-Level Naming. SOSP 2001: 146-159 - 2000
- [j11]Deborah Estrin, Ramesh Govindan, John S. Heidemann:
Embedding the Internet: Introduction. Commun. ACM 43(5): 38-41 (2000) - [j10]Lars Eggert, John S. Heidemann, Joseph D. Touch:
Effects of ensemble-TCP. Comput. Commun. Rev. 30(1): 15-29 (2000) - [j9]Lee Breslau, Deborah Estrin, Kevin R. Fall, Sally Floyd, John S. Heidemann, Ahmed Helmy, Polly Huang, Steven McCanne, Kannan Varadhan, Ya Xu, Haobo Yu:
Advances in Network Simulation. Computer 33(5): 59-67 (2000) - [j8]Deborah Estrin, Mark Handley, John S. Heidemann, Steven McCanne, Ya Xu, Haobo Yu:
Network Visualization with Nam, the VINT Network Animator. Computer 33(11): 63-68 (2000) - [j7]Nirupama Bulusu, John S. Heidemann, Deborah Estrin:
GPS-less low-cost outdoor localization for very small devices. IEEE Wirel. Commun. 7(5): 28-34 (2000) - [c10]Art Mena, John S. Heidemann:
An Empirical Study of Internet Audio Traffic. INFOCOM 2000: 101-110 - [c9]John S. Heidemann, Dhaval Shah:
Location-Aware Scheduling with Minimal Infrastructure. USENIX ATC, General Track 2000: 131-138 - [i1]Mark Allman, Spencer Dawkins, Daniel R. Glover, Jim Griner, Diepchi Tran, Thomas R. Henderson, John S. Heidemann, Joe Touch, Hans Kruse, Shawn Ostermann, Keith Scott, Jeffrey Semke:
Ongoing TCP Research Related to Satellites. RFC 2760: 1-46 (2000)
1990 – 1999
- 1999
- [j6]Lars Eggert, John S. Heidemann:
Application-Level Differentiated Services for Web Servers. World Wide Web 2(3): 133-142 (1999) - [c8]Deborah Estrin, Ramesh Govindan, John S. Heidemann, Satish Kumar:
Next Century Challenges: Scalable Coordination in Sensor Networks. MobiCom 1999: 263-270 - 1998
- [j5]Thomas W. Page Jr., Richard G. Guy, John S. Heidemann, David Ratner, Peter L. Reiher, Ashish Goel, Geoffrey H. Kuenning, Gerald J. Popek:
Perspectives on Optimistically Replicated, Peer-to-Peer Filing. Softw. Pract. Exp. 28(2): 155-180 (1998) - [c7]Polly Huang, Deborah Estrin, John S. Heidemann:
Enabling Large-Scale Simulations: Selective Abstraction Approach to the Study of Multicast Protocols. MASCOTS 1998: 241-248 - 1997
- [j4]John S. Heidemann:
Performance interactions between P-HTTP and TCP implementations. Comput. Commun. Rev. 27(2): 65-73 (1997) - [j3]John S. Heidemann, Katia Obraczka, Joseph D. Touch:
Modeling the performance of HTTP over several transport protocols. IEEE/ACM Trans. Netw. 5(5): 616-630 (1997) - 1995
- [c6]John S. Heidemann, Gerald J. Popek:
Performance of Cache Coherence in Stackable Filing. SOSP 1995: 127-142 - 1994
- [j2]John S. Heidemann, Gerald J. Popek:
File-System Development with Stackable Layers. ACM Trans. Comput. Syst. 12(1): 58-89 (1994) - [c5]Peter L. Reiher, John S. Heidemann, David Ratner, Gregory Skinner, Gerald J. Popek:
Resolving File Conflicts in the Ficus File System. USENIX Summer 1994: 183-195 - 1992
- [j1]Richard G. Guy, John S. Heidemann, Thomas W. Page Jr., Gerald J. Popek:
The Ficus Replicated File System (Abstract). ACM SIGOPS Oper. Syst. Rev. 26(2): 26 (1992) - [c4]John S. Heidemann, Thomas W. Page Jr., Richard G. Guy, Gerald J. Popek:
Primarily Disconnected Operation: Experiences with Ficus. Workshop on the Management of Replicated Data 1992: 2-5 - 1991
- [c3]Thomas W. Page Jr., Richard G. Guy, John S. Heidemann, Gerald J. Popek, Wai Mak, Dieter Rothmeier:
Management of Replicated Volume Location Data in the Ficus Replicated File System. USENIX Summer 1991: 17-30 - 1990
- [c2]Richard G. Guy, John S. Heidemann, Wai-Kei Mak, Thomas W. Page Jr., Gerald J. Popek, Dieter Rothmeier:
Implementation of the Ficus Replicated File System. USENIX Summer 1990: 63-72 - [c1]Gerald J. Popek, Richard G. Guy, Thomas W. Page Jr., John S. Heidemann:
Replication in Ficus Distributed File Systems. Workshop on the Management of Replicated Data 1990: 5-10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 01:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint