Klaus Wehrle

According to our database1, Klaus Wehrle authored at least 234 papers between 2000 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
The Dagstuhl beginners guide to reproducibility for experimental networking research.
Computer Communication Review, 2019

DeePCCI: Deep Learning-based Passive Congestion Control Identification.
Proceedings of the 2019 Workshop on Network Meets AI & ML, 2019

Optimizing Data Plane Programs for the Network.
Proceedings of the ACM SIGCOMM 2019 Workshop on Networking and Programming Languages, 2019

Towards an Infrastructure Enabling the Internet of Production.
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019

Dispute Resolution for Smart Contract-based Two-Party Protocols.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Enabling Wireless Network Support for Gain Scheduled Control.
Proceedings of the 2nd International Workshop on Edge Systems, Analytics and Networking, 2019

A performance perspective on web optimized protocol stacks: TCP+TLS+HTTP/2 vs. QUIC.
Proceedings of the Applied Networking Research Workshop, 2019

2018
Finite Blocklength Performance of Cooperative Multi-Terminal Wireless Industrial Networks.
IEEE Trans. Vehicular Technology, 2018

On Automated Memoization in the Field of Simulation Parameter Studies.
ACM Trans. Model. Comput. Simul., 2018

Secure and anonymous decentralized Bitcoin mixing.
Future Generation Comp. Syst., 2018

Practical Evaluation of Cooperative Communication for Ultra-Reliability and Low-Latency.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

Application-Agnostic Offloading of Datagram Processing.
Proceedings of the 30th International Teletraffic Congress, 2018

Towards In-Network Industrial Feedback Control.
Proceedings of the 2018 Morning Workshop on In-Network Computing, 2018

Circuit Switched VM Networks for Zero-Copy IO.
Proceedings of the 2018 Afternoon Workshop on Kernel Bypassing Networks, 2018

Secure Low Latency Communication for Constrained Industrial IoT Scenarios.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

PARTI: a multi-interval theory solver for symbolic execution.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Demo abstract: Towards in-network processing for low-latency industrial control.
Proceedings of the IEEE INFOCOM 2018, 2018

Thwarting Unwanted Blockchain Content Insertion.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

Giving Customers Control Over Their Data: Integrating a Policy Language into the Cloud.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

Smart Contract-Based Car Insurance Policies.
Proceedings of the IEEE Globecom Workshops, 2018

SPLIT: Smart Protocol Loading for the IoT.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018

A new solution for the Energy Packet-based Dispatching using power/signal dual modulation.
Proceedings of the Ninth International Conference on Future Energy Systems, 2018

Towards Benchmark Optimization by Automated Equivalence Detection.
Proceedings of the Workshop on Benchmarking Cyber-Physical Networks and Systems, 2018

Is the web ready for HTTP/2 server push?
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, 2018

Interoperability-Guided Testing of QUIC Implementations using Symbolic Execution.
Proceedings of the Workshop on the Evolution, 2018

Symbolic Liveness Analysis of Real-World Software.
Proceedings of the Computer Aided Verification - 30th International Conference, 2018

SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Towards In-Network Security for Smart Homes.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A survey on the evolution of privacy enforcement on smartphones and the road ahead.
Pervasive and Mobile Computing, 2017

Analysis of Fingerprinting Techniques for Tor Hidden Services.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

TraceMixer: Privacy-preserving crowd-sensing sans trusted third party.
Proceedings of the 13th Annual Conference on Wireless On-demand Network Systems and Services, 2017

Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

SymPerf: Predicting Network Function Performance.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

Resource and Execution Control for Mobile Offloadee Devices.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Encrypting data to pervasive contexts.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications, 2017

Code-transparent Discrete Event Simulation for Time-accurate Wireless Prototyping.
Proceedings of the 2017 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, 2017

CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Demo: a realistic use-case for wireless industrial automation and control.
Proceedings of the 2017 International Conference on Networked Systems, 2017

Floating-point symbolic execution: a case study in n-version programming.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Practical Data Compliance for Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data.
Proceedings of the 47. Jahrestagung der Gesellschaft für Informatik, 2017

Automated memoization: Automatically identifying memoization units in simulation parameter studies.
Proceedings of the 21st IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2017

Privacy-Preserving HMM Forward Computation.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

Dynamic algorithm selection for the logic of tasks in IoT stream processing systems.
Proceedings of the 13th International Conference on Network and Service Management, 2017

2016
Parallel Expanded Event Simulation of Tightly Coupled Systems.
ACM Trans. Model. Comput. Simul., 2016

A comprehensive approach to privacy in the cloud-based Internet of Things.
Future Generation Comp. Syst., 2016

Network Latency Control in Data Centres (Dagstuhl Seminar 16281).
Dagstuhl Reports, 2016

CPPL: Compact Privacy Policy Language.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

Performance analysis of cooperative ARQ systems for wireless industrial networks.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

Maintaining integrity and reputation in content offloading.
Proceedings of the 12th Annual Conference on Wireless On-demand Network Systems and Services, 2016

Automated Memoization for Parameter Studies Implemented in Impure Languages.
Proceedings of the 2016 annual ACM Conference on SIGSIM Principles of Advanced Discrete Simulation, 2016

STEAN: A storage and transformation engine for advanced networking context.
Proceedings of the 2016 IFIP Networking Conference, 2016

Website Fingerprinting at Internet Scale.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

ReMP TCP: Low latency multipath TCP.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

EEG-based automatic emotion recognition: Feature extraction, selection and classification methods.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

Towards Transparent Information on Individual Cloud Service Usage.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

POSTER: Fingerprinting Tor Hidden Services.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Modular remote reprogramming of sensor nodes.
IJSNet, 2015

Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Santa: Faster Packet Delivery for Commonly Wished Replies.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Enabling ubiquitous interaction with smart things.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Towards Bringing EEG Research and Diagnostics out of the Lab.
Proceedings of the pHealth 2015, 2015

Psychologist in a Pocket: Towards Depression Screening on Mobile Phones.
Proceedings of the pHealth 2015, 2015

Analyzing Data Dependencies for Increased Parallelism in Discrete Event Simulation.
Proceedings of the 3rd ACM Conference on SIGSIM-Principles of Advanced Discrete Simulation, London, United Kingdom, June 10, 2015

Data Dependency based Parallel Simulation of Wireless Networks.
Proceedings of the 18th ACM International Conference on Modeling, 2015

Collaborative On-demand Wi-Fi sharing.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Protocol virtualization through dynamic network stacks.
Proceedings of the 2015 International Conference and Workshops on Networked Systems, 2015

Channel Coding versus Cooperative ARQ: Reducing Outage Probability in Ultra-Low Latency Wireless Communications.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

If You Can't Take the Heat: Temperature Effects on Low-Power Wireless Networks and How to Mitigate Them.
Proceedings of the Wireless Sensor Networks - 12th European Conference, 2015

Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper).
Proceedings of the Data Privacy Management, and Security Assurance, 2015

CoinParty: Secure Multi-Party Mixing of Bitcoins.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Bandwidth-Optimized Secure Two-Party Computation of Minima.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

2014
Privacy in the Internet of Things: threats and challenges.
Security and Communication Networks, 2014

Probabilistic location-free addressing in wireless networks.
J. Network and Computer Applications, 2014

Harnessing cross-layer-design.
Ad Hoc Networks, 2014

CA-Fi: Ubiquitous mobile wireless networking without 802.11 overhead and restrictions.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Pervasive content-centric wireless networking.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Machine learning-based jamming detection for IEEE 802.11: Design and experimental evaluation.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Large-scale network simulation: leveraging the strengths of modern SMP-based compute clusters.
Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques, 2014

Delegation-based authentication and authorization for the IP-based Internet of Things.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Analyzing Metropolitan-Area Networking within Public Transportation Systems for Smart City Applications.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Facilitating direct and ubiquitous mobile computer vision.
Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, 2014

Demo: Ubiquitous interaction with smart objects.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Opportunistic interaction in the challenged internet of things.
Proceedings of the 9th ACM MobiCom workshop on Challenged networks, 2014

A framework for remote automation, configuration, and monitoring of real-world experiments.
Proceedings of the 9th ACM international workshop on Wireless network testbeds, 2014

A wireless application overlay for ubiquitous mobile multimedia sensing and interaction.
Proceedings of the Multimedia Systems Conference 2014, 2014

High-Performance, Energy-Efficient Mobile Wireless Networking in 802.11 Infrastructure Mode.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Piccett: Protocol-independent classification of corrupted error-tolerant traffic.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of Things.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

SCSlib: Transparently Accessing Protected Sensor Data in the Cloud.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

Graph-based redundancy removal approach for multiple cross-layer interactions.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

A Trust Point-based Security Architecture for Sensor Data in the Cloud.
Proceedings of the Trusted Cloud Computing, 2014

SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators.
Proceedings of the Trusted Cloud Computing, 2014

2013
"And Then, the Weekend Started": Story of a WSN Deployment on a Construction Site.
J. Sensor and Actuator Networks, 2013

Portable wireless-networking protocol evaluation.
J. Network and Computer Applications, 2013

Accurate map-based indoor navigation on the mobile.
J. Location Based Services, 2013

Maintaining User Control While Storing and Processing Sensor Data in the Cloud.
IJGHPC, 2013

Cooperative security in distributed networks.
Computer Communications, 2013

A blueprint for switching between secure routing protocols in wireless multihop networks.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Fuzzy logical coordinates and location services for scalable addressing in wireless networks.
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013

A heuristic header error recovery scheme for RTP.
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013

6LoWPAN fragmentation attacks and mitigation mechanisms.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Slimfit - A HIP DEX compression layer for the IP-based Internet of Things.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

The Cloud Needs Cross-Layer Data Handling Annotations.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Opening the loops - Towards semantic, information-centric networking in the Internet of Things.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

Interest-based cloud-facilitated opportunistic networking.
Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks, 2013

Bit error distribution and mutation patterns of corrupted packets in low-power wireless networks.
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, 2013

Fingerprinting channel dynamics in indoor low-power wireless networks.
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, 2013

4th international workshop on software engineering for sensor network applications (SESENA 2013).
Proceedings of the 35th International Conference on Software Engineering, 2013

Tailoring end-to-end IP security protocols to the Internet of Things.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Standards-based end-to-end IP security for the Internet of Things.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Towards Data Handling Requirements-Aware Cloud Computing.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Gossipmule: Improving association decisions via opportunistic recommendations.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

Demo: Improving associations in IEEE 802.11 WLANs.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Exploiting the Burstiness of Intermediate-Quality Wireless Links.
IJDSN, 2012

CRAWLER: An experimentation platform for system monitoring and cross-layer-coordination.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Can P2P swarm loading improve the robustness of 6LoWPAN data transfer?
Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services, 2012

SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Building a modular BitTorrent model for ns-3.
Proceedings of the International ICST Conference on Simulation Tools and Techniques, 2012

Know thy simulation model: analyzing event interactions for probabilistic synchronization in parallel simulations.
Proceedings of the International ICST Conference on Simulation Tools and Techniques, 2012

FANTASY: fully automatic network emulation architecture with cross-layer support.
Proceedings of the International ICST Conference on Simulation Tools and Techniques, 2012

A receiver-based 802.11 rate adaptation scheme with On-Demand Feedback.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Multi-level Parallelism for Time- and Cost-Efficient Parallel Discrete Event Simulation on GPUs.
Proceedings of the 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation, 2012

An Adaptive Codec Switching Scheme for SIP-Based VoIP.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2012

Gossipmule: scanning and disseminating information between stations in cooperative WLANs.
Proceedings of the third ACM international workshop on Mobile Opportunistic Networks, 2012

On-demand content-centric wireless networking.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

DHT-based localized service discovery in wireless mesh networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Hidden Markov model-based 3D path-matching using raytracing-generated Wi-Fi models.
Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation, 2012

Indoor navigation on wheels (and on foot) using smartphones.
Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation, 2012

Symbolic System Time in Distributed Systems Testing.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Integration testing of protocol implementations using symbolic distributed execution.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Mesh-DHT: A locality-based distributed look-up structure for Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2012

A Cloud design for user-controlled storage and processing of sensor data.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
Security Challenges in the IP-based Internet of Things.
Wireless Personal Communications, 2011

WiSec 2011 demo: PISA-SA - security and mobility in a collaborative muni-fi.
Mobile Computing and Communications Review, 2011

Sensor network security for pervasive e-health.
Security and Communication Networks, 2011

Device driver-enabled wireless network emulation.
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, 2011

Runtime efficient event scheduling in multi-threaded network simulation.
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, 2011

SliceTime: A Platform for Scalable and Accurate Network Emulation.
Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation, 2011

Establishing mobile ad-hoc networks in 802.11 infrastructure mode.
Proceedings of the 6th ACM workshop on Challenged networks, 2011

Establishing mobile ad-hoc networks in 802.11 infrastructure mode.
Proceedings of the 6th ACM International Workshop on Wireless Network Testbeds, 2011

TinyWiFi: making network protocol evaluation portable across multiple phy-link layers.
Proceedings of the 6th ACM International Workshop on Wireless Network Testbeds, 2011

Predicting Runtime Performance Bounds of Expanded Parallel Discrete Event Simulations.
Proceedings of the MASCOTS 2011, 2011

Cooperative Wi-Fi-sharing: Encouraging fair play.
Proceedings of the ITU Kaleidoscope 2011: The Fully Networked Human?, 2011

Efficient online estimation of bursty wireless links.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Probabilistic addressing: Stable addresses in unstable wireless networks.
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011

FootPath: Accurate map-based indoor navigation using smartphones.
Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation, 2011

Scalable Symbolic Execution of Distributed Systems.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

GeoDTN: Geographic Routing in Disruption Tolerant Networks.
Proceedings of the Global Communications Conference, 2011

Refector: heuristic header error recovery for error-tolerant transmissions.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

2010
Integrating symbolic execution with sensornet simulation for efficient bug finding.
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010

TinyOS meets wireless mesh networks.
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010

Modular context-aware access control for medical sensor networks.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Brief announcement: distributed trust management and revocation.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Efficient and context-aware access control for pervasive medical sensor networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

BurrowView - seeing the world through the eyes of rats.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Collaborative municipal Wi-Fi networks - challenges and opportunities.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Expanding the Event Horizon in Parallelized Network Simulations.
Proceedings of the MASCOTS 2010, 2010

KleeNet: discovering insidious interaction bugs in wireless sensor networks before deployment.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

RatMote: a sensor platform for animal habitat monitoring.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

Statistical vector based point-to-point routing in wireless networks.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

PiSA-SA: Municipal Wi-Fi Based on Wi-Fi Sharing.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Towards Network Centric Development of Embedded Systems.
Proceedings of IEEE International Conference on Communications, 2010

Dynamic TinyOS: Modular and Transparent Incremental Code-Updates for Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

Promoting Power to a First Class Metric in Network Simulations.
Proceedings of the ARCS '10, 2010

2009
Time accurate integration of software prototypes with event-based network simulations.
SIGMETRICS Performance Evaluation Review, 2009

Modeling Execution Time and Energy Consumption in Sensor Node Simulation.
Praxis der Informationsverarbeitung und Kommunikation, 2009

ProMoX: A protocol stack monitoring framework.
ECEASST, 2009

A virtual platform for network experimentation.
Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures, 2009

Bursty traffic over bursty links.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

Brief announcement: lightweight key agreement and digital certificates for wireless sensor networks.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

Security for pervasive healthcare.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

Security for pervasive medical sensor networks.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

SimBetAge: Utilizing temporal changes in social networks for delay/disconnection tolerant networking.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

Horizon - Exploiting timing information for parallel network simulation.
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009

A Performance Comparison of Recent Network Simulators.
Proceedings of IEEE International Conference on Communications, 2009

End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace.
Proceedings of IEEE International Conference on Communications, 2009

2008
Synchronized network emulation: matching prototypes with complex simulations.
SIGMETRICS Performance Evaluation Review, 2008

Clustering players for load balancing in virtual worlds.
IJAMC, 2008

KleeNet: automatic bug hunting in sensor network applications.
Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, 2008

Range queries and load balancing in a hierarchically structured P2P system.
Proceedings of the LCN 2008, 2008

ADAPT: A Semantics-Oriented Protocol Architecture.
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008

When Timing Matters: Enabling Time Accurate and Scalable Simulation of Sensor Network Applications.
Proceedings of the 7th International Conference on Information Processing in Sensor Networks, 2008

Secure Wi-Fi sharing at global scales.
Proceedings of the 2008 International Conference on Telecommunications, 2008

ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

2007
Peer-to-Peer Systems (Peer-to-Peer-Systeme).
it - Information Technology, 2007

MHT: Eine mobilitätsbewusste verteilte Hash-Tabelle (MHT: A Mobility-aware Distributed Hash Table).
it - Information Technology, 2007

PISA: P2P Wi-Fi Internet Sharing Architecture.
Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007

Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks.
Proceedings of the Global Communications Conference, 2007

Cooperative security in distributed sensor networks.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

2006
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Towards Scalable Mobility in Distributed Hash Tables.
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006

OCALA: An Architecture for Supporting Legacy Applications over Overlays.
Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI 2006), 2006

A churn and mobility resistant approach for DHTs.
Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking, 2006

Cerco: Supporting Range Queries with a Hierarchically Structured Peer-to-Peer System.
Proceedings of the LCN 2006, 2006

06131 Abstracts Collection -- Peer-to -Peer -Systems and -Applications.
Proceedings of the Peer-to-Peer-Systems and -Applications, 26.03. - 29.03.2006, 2006

06131 Executive Summary -- Peer-to-Peer-Systems and -Applications.
Proceedings of the Peer-to-Peer-Systems and -Applications, 26.03. - 29.03.2006, 2006

2005
Enabling Detailed Modeling and Analysis of Sensor Networks.
Praxis der Informationsverarbeitung und Kommunikation, 2005

Introduction.
Proceedings of the Peer-to-Peer Systems and Applications, 2005

Distributed Hash Tables.
Proceedings of the Peer-to-Peer Systems and Applications, 2005

What Is This "Peer-to-Peer" About?
Proceedings of the Peer-to-Peer Systems and Applications, 2005

Reliability and Load Balancing in Distributed Hash Tables.
Proceedings of the Peer-to-Peer Systems and Applications, 2005

T-DHT: Topology-based Distributed Hash Tables.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005

Peer-to-Peer in Mobile Environments.
Proceedings of the Peer-to-Peer Systems and Applications, 2005

Selected DHT Algorithms.
Proceedings of the Peer-to-Peer Systems and Applications, 2005

Framework for evaluation of networked mobile games.
Proceedings of the 4th Workshop on Network and System Support for Games, 2005

Überbrückung von Heterogenitäten im Internet aud der Basis von Indirektion.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

Peer-to-Peer-Systeme und -Anwendungen.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

Dienstgüte in strukturierten hierarchischen Overlay Netzwerken.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

On the Distribution of Nodes in Distributed Hash Tables.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

Spontaneous Windows File Sharing via Virtual Groups.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

Bridging today's Internet Heterogeneity with a Content-oriented Approach.
Proceedings of the Service Management and Self-Organization in IP-based Networks, 2005

IP-QoS: Scalable and Flexible Quality-of-Service with Differentiated Services.
Proceedings of the Industrial Information Technology Handbook, 2005

2004
IP Multicast in Differentiated Services (DS) Networks.
RFC, April, 2004

Peer-to-Peer-Networking & -Computing - Aktuelles Schlagwort.
Informatik Spektrum, 2004

Support for service composition in i3.
Proceedings of the 12th ACM International Conference on Multimedia, 2004

A Thermal-Dissipation-Based Approach for Balancing Data Load in Distributed Hash Tables.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

Reliability of data in structured peer-to-peer systems.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004

Comparison of Load Balancing Algorithms for Structured Peer-to-Peer Systems.
Proceedings of the INFORMATIK 2004, 2004

On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios.
Proceedings of the INFORMATIK 2004, 2004

2003
A Lower Effort Per-Domain Behavior (PDB) for Differentiated Services.
RFC, December, 2003

Ansätze für eine Web-basierte Initiierung qualitätsbasierter Kommunikationsdienste.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2003

Alternative traffic conditioning mechanisms for the virtual wire per-domain behavior.
Proceedings of IEEE International Conference on Communications, 2003

2002
Flexible und skalierbare Dienstgütemechanismen für das Internet der nächsten Generation.
PhD thesis, 2002

DiffServ-basierte Dienstgüte im Internet der nächsten Generation.
Praxis der Informationsverarbeitung und Kommunikation, 2002

2001
Towards Better Support of Transaction Oriented Communication in Differentiated Services Networks.
Proceedings of the Quality of Future Internet Services, 2001

Improving the Performance of TCP on Guaranteed Bandwidth Connections.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2001

An Open Architecture for Evaluating Arbitrary Quality of Service Mechanisms in Software Routers.
Proceedings of the Networking, 2001

Group Communication in Differentiated Services Networks.
Proceedings of the First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), 2001

2000
Elements of an Open Framework for Pricing in the Future Internet.
Proceedings of the Quality of Future Internet Services, 2000

DiffServ in the Web: Different Approaches for Enabling Better Services in the Worl Wide Web.
Proceedings of the NETWORKING 2000, 2000


  Loading...