David Kotz

According to our database1, David Kotz authored at least 181 papers between 1989 and 2019.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2009, "For contributions to parallel and distributed systems and wireless networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Networkmetrics unraveled: MBDA in Action.
CoRR, 2019

CloseTalker: Secure, Short-Range Ad Hoc Wireless Communication.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Proximity Detection with Single-Antenna IoT Devices.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

Using vibrations from a SmartRing as an out-of-band channel for sharing secret keys.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

Amulet: an open-source wrist-worn platform for mHealth research and education.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

2018
NoCloud: Exploring Network Disconnection through On-Device Data Analysis.
IEEE Pervasive Computing, 2018

SAW: Wristband-based Authentication for Desktop Computers.
IMWUT, 2018

Vocal Resonance: Using Internal Body Voice for Wearable Authentication.
IMWUT, 2018

Auracle: Detecting Eating Episodes with an Ear-mounted Sensor.
IMWUT, 2018

Application Memory Isolation on Ultra-Low-Power MCUs.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Poster: Proximity Detection with Single-Antenna IoT Devices.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

BASTION-SGX: bluetooth and architectural support for trusted I/O on SGX.
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, 2018

The Case for a Commodity Hardware Solution for Stress Detection.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

Detection and Monitoring of Repetitions Using an mHealth-Enabled Resistance Band.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

An ultra-low resource wearable EDA sensor using wavelet compression.
Proceedings of the 15th IEEE International Conference on Wearable and Implantable Body Sensor Networks, 2018

GeriActive: Wearable app for monitoring and encouraging physical activity among older adults.
Proceedings of the 15th IEEE International Conference on Wearable and Implantable Body Sensor Networks, 2018

2017
SPICE: Secure Proximity-based Infrastructure for Close Encounters.
Proceedings of the First ACM Workshop on Mobile Crowdsensing Systems and Applications, 2017

Challenges to ensuring human safety throughout the life-cycle of Smart Environments.
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 2017

ActivityAware: An app for real-time daily activity level monitoring on the Amulet wrist-worn device.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

ENACT: Encounter-based Architecture for Contact Tracing.
Proceedings of the 4th International on Workshop on Physical Analytics, 2017

Toward Accurate and Efficient Feature Selection for Speaker Recognition on Wearables.
Proceedings of the 2017 Workshop on Wearable Systems and Applications, 2017

Poster: Vocal Resonance as a Passive Biometric.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

AuthoRing: Wearable User-presence Authentication.
Proceedings of the 2017 Workshop on Wearable Systems and Applications, 2017

Challenges and Opportunities in Wearable Systems.
Proceedings of the 2017 Workshop on Wearable Systems and Applications, 2017

Poster: Memory Protection in Ultra-Low-Power Multi-Application Wearables.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Toward a Wearable Sensor for Eating Detection.
Proceedings of the 2017 Workshop on Wearable Systems and Applications, 2017

Poster: Auracle: A Wearable Device for Detecting and Monitoring Eating Behavior.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Secure Information Transfer Between Nearby Wireless Devices.
Proceedings of the 9th ACM Workshop on Wireless of the Students, 2017

Safety and Security in the Internet of Things.
Proceedings of the 9th ACM Workshop on Wireless of the Students, 2017

LightTouch: Securely connecting wearables to ambient displays with user intent.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Investigating contextual cues as indicators for EMA delivery.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

2016
Datasets for Mobile, Wearable and IOT Research.
GetMobile, 2016

Privacy and Security in Mobile Health: A Research Agenda.
IEEE Computer, 2016

The Amulet Wearable Platform: Demo Abstract.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

Amulet: An Energy-Efficient, Multi-Application Wearable Platform.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

Demo: Wanda, Securely Introducing Mobile Devices.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Wanda: Securely introducing mobile devices.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Location Privacy for Mobile Crowd Sensing through Population Mapping.
Sensors, 2015

Data Citation Practices in the CRAWDAD Wireless Network Data Archive.
D-Lib Mag., 2015

Security for mobile and cloud frontiers in healthcare.
Commun. ACM, 2015

2014
From MAP to DIST: The Evolution of a Large-Scale WLAN Monitoring System.
IEEE Trans. Mob. Comput., 2014

Hide-n-Sense: Preserving Privacy Efficiently in Wireless mHealth.
MONET, 2014

ZEBRA: Zero-Effort Bilateral Recurring Authentication.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Amulet: a secure architecture for mHealth applications for low-power wearable devices.
Proceedings of the 1st Workshop on Mobile Medical Applications, 2014

Poster: Balancing disclosure and utility of personal information.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Poster: Enabling computational jewelry for mHealth applications.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

A wearable system that knows who wears it.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Assessing blood-pressure measurement in tablet-based mHealth apps.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

2013
Securing Information Technology in Healthcare.
IEEE Security & Privacy, 2013

Analysis of a Wi-Fi Hotspot Network.
Proceedings of the International Workshop on Wireless Traffic Measurements and Modeling, 2013

Provenance framework for mHealth.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

2012
Recognizing whether sensors are on the same body.
Pervasive and Mobile Computing, 2012

Privacy in mobile technology for personal healthcare.
ACM Comput. Surv., 2012

Understanding sharing preferences and behavior for mHealth devices.
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

An amulet for trustworthy wearable mHealth.
Proceedings of the 2012 Workshop on Mobile Computing Systems and Applications, 2012

Who Wears Me? Bioimpedance as a Passive Biometric.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

Plug-n-trust: practical trusted sensing for mhealth.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Effects of network trace sampling methods on privacy and utility metrics.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

2011
AnonySense: A system for anonymous opportunistic sensing.
Pervasive and Mobile Computing, 2011

Identifying Unusual Days.
JCSE, 2011

Adapt-lite: privacy-aware, secure, and efficient mhealth sensing.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Short paper: the NetSANI framework for analysis and fine-tuning of network trace sanitization.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Social network analysis plugin (SNAP) for mesh networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Exposing Privacy Concerns in mHealth.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Adaptive Security and Privacy for mHealth Sensing.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Recognizing Whether Sensors Are on the Same Body.
Proceedings of the Pervasive Computing - 9th International Conference, 2011

Poster: practical trusted computing for mhealth sensing.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Privacy analysis of user association logs in a large-scale wireless LAN.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A threat taxonomy for mHealth privacy.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

2010
On the reliability of wireless fingerprinting using clock skews.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Saluki: A high-performance Wi-Fi sniffing program.
Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2010), May 31, 2010

A correlation attack against user mobility privacy in a large-scale WLAN network.
Proceedings of the 2010 ACM workshop on Wireless of the students, 2010

Experimental validation of analytical performance models for IEEE 802.11 networks.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

2009
Dartmouth Internet Security Testbed (DIST): Building a Campus-wide Wireless Testbed.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

DEAMON: Energy-efficient Sensor Monitoring.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

MPCS: Mobile-phone based patient compliance system for chronic illness care.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

Activity-aware ECG-based patient authentication for remote health monitoring.
Proceedings of the 11th International Conference on Multimodal Interfaces, 2009

2008
Map: a scalable monitoring system for dependable 802.11 wireless networks.
IEEE Wireless Commun., 2008

Data-centric middleware for context-aware pervasive computing.
Pervasive and Mobile Computing, 2008

Group-aware stream filtering for bandwidth-efficient data dissemination.
IJPEDS, 2008

Mesh-Mon: A multi-radio mesh monitoring and management system.
Computer Communications, 2008

The changing usage of a mature campus-wide wireless network.
Computer Networks, 2008

CRAWDAD workshop 2007.
Computer Communication Review, 2008

Active behavioral fingerprinting of wireless devices.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

AnonySense: Opportunistic and Privacy-Preserving Context Collection.
Proceedings of the Pervasive Computing, 2008

Refocusing in 802.11 Wireless Measurement.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

Anonysense: privacy-aware people-centric sensing.
Proceedings of the 6th International Conference on Mobile Systems, 2008

Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Localized Bridging Centrality for Distributed Network Analysis.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Event dissemination via group-aware stream filtering.
Proceedings of the Second International Conference on Distributed Event-Based Systems, 2008

2007
Experimental Evaluation of Wireless Simulation Assumptions.
Simulation, 2007

Periodic properties of user mobility and access-point popularity.
Personal and Ubiquitous Computing, 2007

Privacy in Location-Aware Computing Environments.
IEEE Pervasive Computing, 2007

Virtual Walls: Protecting Digital Privacy in Pervasive Environments.
Proceedings of the Pervasive Computing, 2007

Evaluating opportunistic routing protocols with large realistic contact traces.
Proceedings of the Second Workshop on Challenged Networks, CHANTS 2007, Montréal, Québec, 2007

Coordinated Sampling to Improve the Efficiency of Wireless Network Monitoring.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Group-aware Stream Filtering.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

2006
Naming and Discovery in Mobile Systems.
Proceedings of the Handbook of Mobile Middleware., 2006

Evaluating Next-Cell Predictors with Extensive Wi-Fi Mobility Data.
IEEE Trans. Mob. Comput., 2006

Bandwidth reservation using WLAN handoff prediction.
Mobile Computing and Communications Review, 2006

Improving Data Access for Computational Grid Applications.
Cluster Computing, 2006

CRAWDAD: a community resource for archiving wireless data at Dartmouth.
Computer Communication Review, 2006

Scalability in a Secure Distributed Proof System.
Proceedings of the Pervasive Computing, 2006

Risks of Using AP Locations Discovered Through War Driving.
Proceedings of the Pervasive Computing, 2006

On Improving Wireless Broadcast Reliability of Sensor Networks Using Erasure Codes.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Predictability of WLAN Mobility and Its Effects on Bandwidth Provisioning.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Extracting a Mobility Model from Real User Traces.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Analysis of a Campus-Wide Wireless Network.
Wireless Networks, 2005

Empirical Validation of Wireless Models in Simulations of Ad Hoc Routing Protocols.
Simulation, 2005

CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth.
IEEE Pervasive Computing, 2005

Secure context-sensitive authorization.
Pervasive and Mobile Computing, 2005

Secure Context-Sensitive Authorization.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

Policy-Driven Data Dissemination for Context-Aware Applications.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

Classifying the Mobility of Users and the Popularity of Access Points.
Proceedings of the Location- and Context-Awareness, First International Workshop, 2005

2004
The Kerf Toolkit for Intrusion Analysis.
IEEE Security & Privacy, 2004

Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols.
Proceedings of the 18th Workshop on Parallel and Distributed Simulation, 2004

Experimental evaluation of wireless simulation assumptions.
Proceedings of the 7th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2004

Outdoor experimental comparison of four ad hoc routing algorithms.
Proceedings of the 7th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2004

Design and Implementation of a Large-Scale Context Fusion Network.
Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), 2004

The changing usage of a mature campus-wide wireless network.
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, 2004

Evaluating location predictors with extensive Wi-Fi mobility data.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Dependency Management in Distributed Settings.
Proceedings of the 1st International Conference on Autonomic Computing (ICAC 2004), 2004

2003
Evaluating location predictors with extensive Wi-Fi mobility data.
Mobile Computing and Communications Review, 2003

Computational Markets to Regulate Mobile-Agent Systems.
Autonomous Agents and Multi-Agent Systems, 2003

Context-Sensitive Resource Discovery.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

The Kerf toolkit for intrusion analysis.
Proceedings of the IEEE Systems, 2003

2002
D'Agents: Applications and performance of a mobile-agent system.
Softw., Pract. Exper., 2002

Message from the Chair, Novemver 2001.
Operating Systems Review, 2002

Performance Analysis of Mobile Agents for Filtering Data Streams on Wireless Networks.
MONET, 2002

Armada: a parallel I/O framework for computational grids.
Future Generation Comp. Syst., 2002

Mobile Agents: Future Directions for Mobile Agent Research.
IEEE Distributed Systems Online, 2002

Context Aggregation and Dissemination in Ubiquitous Computing Systems.
Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), 2002

Analysis of a campus-wide wireless network.
Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, 2002

Toward Interoperability of Mobile-Agent Systems.
Proceedings of the Mobile Agents, 6th International Conference, 2002

2001
Special Issue: High Performance Agent Systems.
Concurrency and Computation: Practice and Experience, 2001

Mobile-Agent versus Client/Server Performance: Scalability in an Information-Retrieval Task.
Proceedings of the Mobile Agents, 5th International Conference, 2001

Armada: A Parallel File System for Computational Grids.
Proceedings of the First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), 2001

A Market-Based Model for Resource Allocation in Agent Systems.
Proceedings of the Coordination of Internet Agents: Models, Technologies, and Applications, 2001

2000
End-to-End Authorization.
Proceedings of the 4th Symposium on Operating System Design and Implementation (OSDI 2000), 2000

Performance analysis of mobile agents for filtering data streams on wireless networks.
Proceedings of the 3rd International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2000

A Formal Semantics for SPKI.
Proceedings of the Computer Security, 2000

A game-theoretic formulation of multi-agent resource allocation.
Proceedings of the Fourth International Conference on Autonomous Agents, 2000

1999
Mobile Agents and the Future of the Internet.
Operating Systems Review, 1999

1998
D'Agents: Security in a Multiple-Language, Mobile-Agent System.
Proceedings of the Mobile Agents and Security, 1998

Market-Based Resource Control for Mobile Agents.
Proceedings of the Second International Conference on Autonomous Agents, 1998

1997
Disk-Directed I/O for MIMD Multiprocessors.
ACM Trans. Comput. Syst., 1997

The Galley Parallel File System.
Parallel Computing, 1997

Transportable Information Agents.
J. Intell. Inf. Syst., 1997

AGENT TCL: Targeting the Needs of Mobile Computers.
IEEE Internet Computing, 1997

Transportable Information Agents.
Proceedings of the First International Conference on Autonomous Agents, 1997

1996
File-Access Characteristics of Parallel Scientific Workloads.
IEEE Trans. Parallel Distrib. Syst., 1996

Flexibility and Performance of Parallel File Systems.
Operating Systems Review, 1996

The Expected Lifetime of Single-Address-Space Operating Systems.
Computing Systems, 1996

Large-Scale File Systems with the Flexibility of Databases.
ACM Comput. Surv., 1996

Transportable agents support worldwide applications.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

ENWRICH a Compute-Processor Write Caching Scheme for Parallel File Systems.
Proceedings of the Fourth Workshop on I/O in Parallel and Distributed Systems, 1996

Performance of the Gallery Parallel File System.
Proceedings of the Fourth Workshop on I/O in Parallel and Distributed Systems, 1996

The Galley Parallel File System.
Proceedings of the 10th international conference on Supercomputing, 1996

Flexibility and Performance of Parallel File Systems.
Proceedings of the Parallel Computation, 1996

Low-Level Interfaces for High-Level Parallel I/O.
Proceedings of the Input/Output in Parallel and Distributed Computer Systems., 1996

Introduction to Multiprocessor I/O Architecture.
Proceedings of the Input/Output in Parallel and Distributed Computer Systems., 1996

1995
File-system workload on a scientific multiprocessor.
IEEE P&DT, 1995

A Data-Parallel Programming Library for Education (DAPPLE).
Computer Science Education, 1995

Expanding the potential for disk-directed I/O.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995

A data-parallel programming library for education (DAPPLE).
Proceedings of the 26th SIGCSE Technical Symposium on Computer Science Education, 1995

Characterizing parallel file-access patterns on a large-scale multiprocessor.
Proceedings of IPPS '95, 1995

Different Approaches to Parallel Computing Education.
Proceedings of IPPS '95, 1995

Disk-Directed I/O for an Out-of-Core Computation.
Proceedings of the 4th International Symposium on High Performance Distributed Computing (HPDC '95), 1995

1994
The Expected Lifetime of "Single-Address-Space" Operating Systems.
Proceedings of the 1994 ACM SIGMETRICS conference on Measurement and modeling of computer systems, 1994

Dynamic file-access characteristics of a production parallel scientific workload.
Proceedings of the Proceedings Supercomputing '94, 1994

Disk-directed I/O for MIMD Multiprocessors.
Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI), 1994

1993
Caching and Writeback Policies in Parallel File Systems.
J. Parallel Distrib. Comput., 1993

Practical Prefetching Techniques for Multiprocessor File Systems.
Distributed and Parallel Databases, 1993

The internet programming contest: a report and philosophy.
Proceedings of the 24th SIGCSE Technical Symposium on Computer Science Education, 1993

Multiprocessor File System Interfaces.
Proceedings of the 2nd International Conference on Parallel and Distributed Information Systems (PDIS 1993), 1993

1991
Caching and writeback policies in parallel file systems.
Proceedings of the Third IEEE Symposium on Parallel and Distributed Processing, 1991

Practical Prefetching Techniques for Parallel File Systems.
Proceedings of the First International Conference on Parallel and Distributed Information Systems (PDIS 1991), 1991

1990
Prefetching in File Systems for MIMD Multiprocessors.
IEEE Trans. Parallel Distrib. Syst., 1990

1989
Prefetching in File Systems for MIMD Multiprocessors.
Proceedings of the International Conference on Parallel Processing, 1989

Evaluation of concurrent pools.
Proceedings of the 9th International Conference on Distributed Computing Systems, 1989


  Loading...