David Wetherall

Orcid: 0000-0002-3069-9081

Affiliations:
  • University of Washington, Seattle, Washington, USA


According to our database1, David Wetherall authored at least 121 papers between 1994 and 2023.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2013, "For contributions to the design of flexible, robust, and secure networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Improving Network Availability with Protective ReRoute.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

Fathom: Understanding Datacenter Application Network Performance.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

2022
PLB: congestion signals are simple and effective for network load balancing.
Proceedings of the SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22, 2022

2020
Swift: Delay is Simple and Effective for Congestion Control in the Datacenter.
Proceedings of the SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, 2020

2019
Retrospective on "towards an active network architecture".
Comput. Commun. Rev., 2019

2016
MetaSync: Coordinating Storage across Multiple File Synchronization Services.
IEEE Internet Comput., 2016

Speeding up Web Page Loads with Shandian.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

2015
MobileHub: No Programmer Effort for Power Efficiency with Sensor Hub.
GetMobile Mob. Comput. Commun., 2015

MetaSync: File Synchronization Across Multiple Untrusted Storage Services.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

TIMELY: RTT-based Congestion Control for the Datacenter.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Enhancing mobile apps to use sensor hubs without programmer effort.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

2014
The Emergence of RF-Powered Computing.
Computer, 2014

Brahmastra: Driving Apps to Test the Security of Third-Party Components.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Wi-fi backscatter: internet connectivity for RF-powered devices.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

How Speedy is SPDY?
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

GlimpseData: towards continuous vision-based personal analytics.
Proceedings of the 2014 Workshop on Physical Analytics, 2014

How Much Can We Micro-Cache Web Pages?
Proceedings of the 2014 Internet Measurement Conference, 2014

From Cells to Streets: Estimating Mobile Paths with Cellular-Side Data.
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014

2013
Hybrid analog-digital backscatter platform for high data rate, battery-free sensing.
Proceedings of the IEEE Topical Conference on Wireless Sensors and Sensor Networks, 2013

Accelerating the mobile web with selective offloading.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013

Ambient backscatter: wireless communication out of thin air.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Expressive privacy control with pseudonyms.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Demystifying Page Load Performance with WProf.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

Staying online while mobile: the hidden costs.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

2012
ShareMeNot: Balancing Privacy and Functionality of Third-Party Social Widgets.
login Usenix Mag., 2012

Guest Editorial: Special Section on Outstanding Papers from MobiSys 2011.
IEEE Trans. Mob. Comput., 2012

Detecting and Defending Against Third-Party Tracking on the Web.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

A Conundrum of Permissions: Installing Applications on an Android Smartphone.
Proceedings of the Financial Cryptography and Data Security, 2012

FindAll: a local search engine for mobile phones.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

Short paper: enhancing mobile application permissions with runtime feedback and constraints.
Proceedings of the SPSM'12, 2012

2011
TaintEraser: protecting sensitive data leaks using application-level taint tracking.
ACM SIGOPS Oper. Syst. Rev., 2011

Tool release: gathering 802.11n traces with channel state information.
Comput. Commun. Rev., 2011

Advancing the state of home networking.
Commun. ACM, 2011

Sensor tricorder: what does that sensor know about me?
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Measuring and predicting web login safety.
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011

Augmenting data center networks with multi-gigabit wireless links.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Dewdrop: An Energy-Aware Runtime for Computational RFID.
Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation, 2011

Odessa: enabling interactive perception applications on mobile devices.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Privacy Revelations for Web and Mobile Apps.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

These aren't the droids you're looking for: retrofitting android to protect data from imperious applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Computer networks, 5th Edition.
Pearson, ISBN: 0132553171, 2011

2010
RFID: From Supply Chains to Sensor Nets.
Proc. IEEE, 2010

802.11 with multiple antennas for dummies.
Comput. Commun. Rev., 2010

A "Gen 2" RFID monitor based on the USRP.
Comput. Commun. Rev., 2010

Toward trustworthy mobile sensing.
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010

Predictable 802.11 packet delivery from wireless channel measurements.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

2009
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries.
Proceedings of the Pervasive Computing, 7th International Conference, 2009

Recognizing daily activities with RFID-based sensors.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

SafeGuard: safe forwarding during route changes.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009

"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
TVA: a DoS-limiting network architecture.
IEEE/ACM Trans. Netw., 2008

RFID sensor networks with the intel WISP.
Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, 2008

Reducing Network Energy Consumption via Sleeping and Rate-Adaptation.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

Passport: Secure and Adoptable Source Authentication.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

Studying Black Holes in the Internet with Hubble.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

Improving wireless privacy with an identifier-free link layer protocol.
Proceedings of the 6th International Conference on Mobile Systems, 2008

Taking the sting out of carrier sense: interference cancellation for wireless LANs.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

An empirical study of UHF RFID performance.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

Revisiting Smart Dust with RFID Sensor Networks.
Proceedings of the 7th ACM Workshop on Hot Topics in Networks, 2008

Privacy oracle: a system for finding application leaks with black box differential testing.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Towards an active network architecture.
Comput. Commun. Rev., 2007

Understanding and mitigating the impact of RF interference on 802.11 networks.
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

Mutually Controlled Routing with Independent ISPs.
Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007

802.11 user fingerprinting.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007

Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

Tryst: The Case for Confidential Service Discovery.
Proceedings of the 6th ACM Workshop on Hot Topics in Networks, 2007

Interference Cancellation: Better Receivers for a New Wireless MAC.
Proceedings of the 6th ACM Workshop on Hot Topics in Networks, 2007

2006
10 Networking Papers: readings for protocol design.
Comput. Commun. Rev., 2006

Efficient and Secure Source Authentication with Packet Passports.
Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2006

Source selectable path diversity via routing deflections.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

Measurement-based models of delivery and interference in static wireless networks.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

Analyzing the MAC-level behavior of wireless networks in the wild.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

Improved access point selection.
Proceedings of the 4th International Conference on Mobile Systems, 2006

Towards IP geolocation using delay and topology measurements.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

2005
The Network Oracle.
IEEE Data Eng. Bull., 2005

A DoS-limiting network architecture.
Proceedings of the ACM SIGCOMM 2005 Conference on Applications, 2005

Measurement-based characterization of 802.11 in a hotspot setting.
Proceedings of the 2005 ACM SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis, 2005

Negotiation-Based Routing Between Neighboring ISPs.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

Sustaining Cooperation in Multi-hop Wireless Networks.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

2004
Measuring ISP topologies with rocketfuel.
IEEE/ACM Trans. Netw., 2004

System support for pervasive applications.
ACM Trans. Comput. Syst., 2004

Reverse engineering the Internet.
Comput. Commun. Rev., 2004

Preventing Internet denial-of-service with capabilities.
Comput. Commun. Rev., 2004

Improving the Reliability of Internet Paths with One-hop Source Routing.
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004

2003
Robust Explicit Congestion Notification (ECN) Signaling with Nonces.
RFC, June, 2003

Design guidelines for robust Internet protocols.
Comput. Commun. Rev., 2003

Scriptroute: A Public Internet Measurement Facility.
Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems, 2003

A Study of the Performance Potential of DHT-based Overlays.
Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems, 2003

Upgrading transport protocols using untrusted mobile code.
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, 2003

User-level internet path diagnosis.
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, 2003

TCP Meets Mobile Code.
Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, 2003

2002
Programmable Networks.
Comput. Networks, 2002

Measuring ISP topologies with rocketfuel.
Proceedings of the ACM SIGCOMM 2002 Conference on Applications, 2002

Understanding BGP misconfiguration.
Proceedings of the ACM SIGCOMM 2002 Conference on Applications, 2002

Inferring link weights using end-to-end measurements.
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002

Active Network Vision and Reality: Lessons from a Capsule-Based System.
Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), 2002

Experiences with Capsule-Based Active Networking.
Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), 2002

2001
Network support for IP traceback.
IEEE/ACM Trans. Netw., 2001

Alpine: A User-Level Infrastructure for Network Protocol Development.
Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems, 2001

Controlling High-Bandwidth Flows at the Congested Router.
Proceedings of the 9th International Conference on Network Protocols (ICNP 2001), 2001

Robust Congestion Signaling.
Proceedings of the 9th International Conference on Network Protocols (ICNP 2001), 2001

Systems Directions for Pervasive Computing.
Proceedings of HotOS-VIII: 8th Workshop on Hot Topics in Operating Systems, 2001

2000
A system architecture for pervasive computing.
Proceedings of the 9th ACM SIGOPS European Workshop, 2000

A protocol-independent technique for eliminating redundant network traffic.
Proceedings of the ACM SIGCOMM 2000 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 28, 2000

Practical network support for IP traceback.
Proceedings of the ACM SIGCOMM 2000 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 28, 2000

1999
ANTS: Network Services Without the Red Tape.
Computer, 1999

TCP congestion control with a misbehaving receiver.
Comput. Commun. Rev., 1999

Active network vision and reality: lessions form a capsule-based system.
Proceedings of the 17th ACM Symposium on Operating System Principles, 1999

Next Century Challenges: RadioActive Networks.
Proceedings of the MOBICOM '99, 1999

1998
Service introduction in an active network.
PhD thesis, 1998

Introducing new Internet services: why and how.
IEEE Netw., 1998

Increasing Effective Link Bandwidth by Supressing Replicated Data.
Proceedings of the 1998 USENIX Annual Technical Conference, 1998

Improving the Performance of Distributed Applications Using Active Networks.
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

1997
A survey of active network research.
IEEE Commun. Mag., 1997

1995
The ViewStation: A Software-Intensive Approach to Media Processing and Distribution.
Multim. Syst., 1995

ViewStation Applications: Implications for Network Traffic.
IEEE J. Sel. Areas Commun., 1995

Extending Tcl for Dynamic Object-Oriented Programming.
Proceedings of the USENIX Third Annual Tcl/Tk Workshop, 1995

1994
The VuSystem: A Programming System for Visual Processing of Digital Video.
Proceedings of the Second ACM International Conference on Multimedia '94, 1994

A Software-Oriented Approach to the Design of Media Processing Environments.
Proceedings of the International Conference on Multimedia Computing and Systems, 1994

ViewStation Applications: Intelligent Video Processing Over a Broadband Local Area Network.
Proceedings of the USENIX 1994 High-Speed Networking Symposium, 1994


  Loading...