Brad Karp

Affiliations:
  • University College London, London, UK


According to our database1, Brad Karp authored at least 33 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Execution integrity without implicit trust of system software.
Proceedings of the 4th Workshop on System Software for Trusted Execution, 2019

2018
On low-latency-capable topologies, and their impact on the design of intra-domain routing.
Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, 2018

2017
Low-Latency Routing on Mesh-Like Backbones.
Proceedings of the 16th ACM Workshop on Hot Topics in Networks, Palo Alto, CA, USA, 2017

2015
On the Synergy between Nulling and Power Allocation in OFDM Systems.
Proceedings of the 2015 Workshop on Wireless of the Students, 2015

COPA: cooperative power allocation for interfering wireless networks.
Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, 2015

2014
HACK: Hierarchical ACKs for Efficient Wireless Medium Utilization.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

Protecting Users by Confining JavaScript with COWL.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

FUBAR: Flow Utility Based Routing.
Proceedings of the 13th ACM Workshop on Hot Topics in Networks, 2014

2013
LOUP: The Principles and Practice of Intra-Domain Route Dissemination.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

Toward Principled Browser Security.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

2012
LOUP: who's afraid of the big bad loop?
Proceedings of the 11th ACM Workshop on Hot Topics in Networks, 2012

2010
Structuring Protocol Implementations to Protect Sensitive Data.
Proceedings of the 19th USENIX Security Symposium, 2010

Cone of silence: adaptively nulling interferers in wireless networks.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

2008
Wedge: Splitting Applications into Reduced-Privilege Compartments.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

2006
Lazy cross-link removal for geographic routing.
Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, 2006

Paragraph: Thwarting Signature Learning by Training Maliciously.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

RE: Reliable Email.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

2005
Polygraph: Automatically Generating Signatures for Polymorphic Worms.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

OpenDHT: a public DHT service and its uses.
Proceedings of the ACM SIGCOMM 2005 Conference on Applications, 2005

Geographic Routing Made Practical.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

On the pitfalls of geographic face routing.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2005

2004
Autograph: Toward Automated, Distributed Worm Signature Detection.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Practical and robust geographic routing in wireless networks.
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, 2004

Spurring Adoption of DHTs with OpenHash, a Public DHT Service.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2003
IrisNet: An Architecture for a Worldwide Sensor Web.
IEEE Pervasive Comput., 2003

Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table.
Mob. Networks Appl., 2003

Data-centric storage in sensornets.
Comput. Commun. Rev., 2003

IrisNet: An Architecture for Internet-scale Sensing Services.
Proceedings of 29th International Conference on Very Large Data Bases, 2003

Opportunistic Use of Content Addressable Storage for Distributed File Systems.
Proceedings of the General Track: 2003 USENIX Annual Technical Conference, 2003

RR-TCP: A Reordering-Robust TCP with DSACK.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

2002
GHT: a geographic hash table for data-centric storage.
Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, 2002

2000
GPSR: greedy perimeter stateless routing for wireless networks.
Proceedings of the MOBICOM 2000, 2000

1994
Secure Short-Cut Routing for Mobile IP.
Proceedings of the USENIX Summer 1994 Technical Conference, 1994


  Loading...