Bobby Bhattacharjee

Affiliations:
  • University of Maryland, College Park, USA


According to our database1, Bobby Bhattacharjee authored at least 91 papers between 2001 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
CoVault: A Secure Analytics Platform.
CoRR, 2022

2020
Finding Safety in Numbers with Secure Allegation Escrows.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
enClosure: Group Communication via Encounter Closures.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Composing Abstractions using the null-Kernel.
Proceedings of the Workshop on Hot Topics in Operating Systems, 2019

TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions.
Proceedings of the Financial Cryptography and Data Security, 2019

2018
SATE: Robust and Private Allegation Escrows.
CoRR, 2018

Tensorized Spectrum Preserving Compression for Neural Networks.
CoRR, 2018

Internet anycast: performance, problems, & potential.
Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, 2018

SeCloak: ARM Trustzone-based Mobile Peripheral Control.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

Sonoloc: Scalable positioning of commodity mobile devices.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

2016
Dynamic Frequency Resource Allocation in Heterogeneous Cellular Networks.
IEEE Trans. Mob. Comput., 2016

Privacy-preserving microbiome analysis using secure computation.
Bioinform., 2016

Light-Weight Contexts: An OS Abstraction for Safety and Performance.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

Privacy Capsules: Preventing Information Leaks by Mobile Apps.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Demo: I-Pic: A Platform for Privacy-Compliant Image Capture.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

I-Pic: A Platform for Privacy-Compliant Image Capture.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

2015
Drowsy power management.
Proceedings of the 25th Symposium on Operating Systems Principles, 2015

Alibi Routing.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

2014
Brave New World: Privacy Risks for Mobile Users.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2014

SDDR: Light-Weight, Secure Mobile Encounters.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

EnCore: private, context-based communication for mobile social apps.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

2013
D-mystifying the D-root address change.
Proceedings of the 2013 Internet Measurement Conference, 2013

2012
Are all bits equal?: experimental study of IEEE 802.11 communication bit errors.
IEEE/ACM Trans. Netw., 2012

2011
IP geolocation in metropolitan areas.
Proceedings of the SIGMETRICS 2011, 2011

Decentralized, accurate, and low-cost network bandwidth prediction.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
A general framework for efficient geographic routing in wireless networks.
Comput. Networks, 2010

Brief Announcement: Decentralized Network Bandwidth Prediction.
Proceedings of the Distributed Computing, 24th International Symposium, 2010

Maranello: Practical Partial Packet Recovery for 802.11.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Don't love thy nearest neighbor.
Proceedings of the 9th international conference on Peer-to-peer systems, 2010

The effect of packet loss on redundancy elimination in cellular wireless networks.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

2009
What a mesh: understanding the design tradeoffs for streaming multicast.
SIGMETRICS Perform. Evaluation Rev., 2009

Persona: an online social network with user-defined privacy.
Proceedings of the ACM SIGCOMM 2009 Conference on Applications, 2009

Channel Access Throttling for Improving WLAN QoS.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Triangle Inequality and Routing Policy Violations in the Internet.
Proceedings of the Passive and Active Network Measurement, 10th International Conference, 2009

Symbiotic Relationships in Internet Routing Overlays.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

All Bits Are Not Equal - A Study of IEEE 802.11 Communication Bit Errors.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Fighting Spam with the NeighborhoodWatch DHT.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Triangle inequality variations in the internet.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

Channel Access Throttling for Overlapping BSS Management.
Proceedings of IEEE International Conference on Communications, 2009

Identifying Close Friends on the Internet.
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009

Systems-compatible incentives.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

2008
A unified framework for multipath routing for unicast and multicast traffic.
IEEE/ACM Trans. Netw., 2008

Efficient and Resilient Backbones for Multihop Wireless Networks.
IEEE Trans. Mob. Comput., 2008

A scalable key management and clustering scheme for wireless ad hoc and sensor networks.
Future Gener. Comput. Syst., 2008

Trade-offs in matching jobs and balancing load for distributed desktop grids.
Future Gener. Comput. Syst., 2008

Growth of the flickr social network.
Proceedings of the first Workshop on Online Social Networks, 2008

Bittorrent is an auction: analyzing and improving bittorrent's incentives.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Motivating participation in internet routing overlays.
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008

Matchmaking and implementation issues for a P2P desktop grid.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Integrating categorical resource types into a P2P desktop grid system.
Proceedings of the 9th IEEE/ACM International Conference on Grid Computing (Grid 2008), Tsukuba, Japan, September 29, 2008

2007
Efficient lookup on unstructured topologies.
IEEE J. Sel. Areas Commun., 2007

Accountability as a Service.
Proceedings of the 3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2007

Backbone construction in selfish wireless networks.
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007

SAAR: A Shared Control Plane for Overlay Multicast.
Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007

Creating a Robust Desktop Grid using Peer-to-Peer Services.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Measurement and analysis of online social networks.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007

Using content-addressable networks for load balancing in desktop grids.
Proceedings of the 16th International Symposium on High-Performance Distributed Computing (HPDC-16 2007), 2007

Distributed Ranked Search.
Proceedings of the High Performance Computing, 2007

Exploiting approximate transitivity of trust.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

2006
Resilient multicast using overlays.
IEEE/ACM Trans. Netw., 2006

Cooperative peer groups in NICE.
Comput. Networks, 2006

Measurement-based optimal routing on overlay architectures for unicast sessions.
Comput. Networks, 2006

OMNI: An efficient overlay multicast infrastructure for real-time applications.
Comput. Networks, 2006

Decentralized Message Ordering for Publish/Subscribe Systems.
Proceedings of the Middleware 2006, 2006

Fair File Swarming with FOX.
Proceedings of the 5th International workshop on Peer-To-Peer Systems, 2006

A scalable key management and clustering scheme for ad hoc networks.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

Measurement-Based Multipath Multicast.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Distributing Google.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

File System Support for Collaboration in theWide Area.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

Resource Discovery Techniques in Distributed Desktop Grid Environments.
Proceedings of the 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), 2006

Single-Path Routing of Time-varying Traffic.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
P<sup>5</sup>: A protocol for scalable anonymous communication.
J. Comput. Secur., 2005

Efficient geographic routing in multihop wireless networks.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

Differentiated traffic engineering for QoS provisioning.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Misbehaving TCP receivers can cause internet-wide congestion collapse.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Efficient peer location on the Internet.
Comput. Networks, 2004

Running on the bare metal with GeekOS.
Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education, 2004

Scalable resilient media streaming.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2004

Using Trust in Recommender Systems: An Experimental Analysis.
Proceedings of the Trust Management, Second International Conference, 2004

Hierarchical Routing with Soft-State Replicas in TerraDir.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Adaptive Replication in Peer-to-Peer Systems.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Multi-dimensional quorum sets for read-few write-many replica control protocols.
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004

2003
Deno: A Decentralized, Peer-to-Peer Object-Replication System for Weakly Connected Environments.
IEEE Trans. Computers, 2003

Efficient Peer-To-Peer Searches Using Result-Caching.
Proceedings of the Peer-to-Peer Systems II, Second International Workshop, 2003

On the use of flow migration for handling short-term overloads.
Proceedings of the Global Telecommunications Conference, 2003

2002
Scalable secure group communication over IP multicast.
IEEE J. Sel. Areas Commun., 2002

P5: A Protocol for Scalable Anonymous Communication.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Scalable application layer multicast.
Proceedings of the ACM SIGCOMM 2002 Conference on Applications, 2002

Are Virtualized Overlay Networks Too Much of a Good Thing?
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002

Scalable peer finding on the Internet.
Proceedings of the Global Telecommunications Conference, 2002

2001
Finding Close Friends on the Internet.
Proceedings of the 9th International Conference on Network Protocols (ICNP 2001), 2001


  Loading...