Andrew Newell

According to our database1, Andrew Newell authored at least 19 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimizing Resource Allocation in Hyperscale Datacenters: Scalability, Usability, and Experiences.
Proceedings of the 18th USENIX Symposium on Operating Systems Design and Implementation, 2024

2023
IOCost: Block Input-Output Control for Containers in Datacenters.
IEEE Micro, 2023

2022
IOCost: block IO control for containers in datacenters.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

2021
RAS: Continuously Optimized Region-Wide Datacenter Resource Allocation.
Proceedings of the SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, 2021

2019
Taiji: managing global user traffic for large-scale internet services at the edge.
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 2019

2016
Practical Intrusion-Tolerant Networks.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Optimizing distributed actor systems for dynamic interactive services.
Proceedings of the Eleventh European Conference on Computer Systems, 2016

2015
Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes.
IEEE Trans. Dependable Secur. Comput., 2015

2014
Achieving resilient networks with diversity and network coding
PhD thesis, 2014

Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols.
ACM Comput. Surv., 2014

On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
On the practicality of cryptographic defences against pollution attacks in wireless network coding.
ACM Comput. Surv., 2013

2012
Entropy attacks and countermeasures in wireless network coding.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Split Null Keys: A null space based defense for pollution attacks in wireless network coding.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

2011
Distributed collaborative camera actuation for redundant data elimination in wireless multimedia sensor networks.
Ad Hoc Networks, 2011

2010
Providing multi-perspective event coverage in wireless multimedia sensor networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

2009
Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks.
Comput. Commun., 2009

Self-Actuation of Camera Sensors for Redundant Data Elimination in Wireless Multimedia Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009


  Loading...