Biblio

Export 105 results:
Sort by: Author Title Type [ Year  (Desc)]
2009
Peloton: Coordinated Resource Management for Sensor Networks, Waterman, Jason, Challen Geoffrey Werner, and Welsh Matt , 12th Workshop on Hot Topics in Operating Systems (HotOS-XII) (2009), May, (2009)
The Case for Browser Provenance, Margo, Daniel, and Seltzer Margo , 1st Workshop on the Theory and Practice of Provenance (TaPP'09), February 2009, (2009)
Causality-Based Versioning, Muniswamy-Reddy, Kiran-Kumar, and Holland David A. , 7th USENIX Conference on File and Storage Technologies (FAST '09), February 2009, (2009)
Making a Cloud Provenance-Aware, Muniswamy-Reddy, Kiran-Kumar, Macko Peter, and Seltzer Margo , 1st Workshop on the Theory and Practice of Provenance (TaPP'09), February 2009, (2009)
2008
Flask: Staged Functional Programming for Sensor Networks, Mainland, Geoffrey, Morrisett Greg, and Welsh Matt , 13th ACM SIGPLAN International Conference on Functional Programming (ICFP 2008), September, (2008)
An Architecture for Extensible Wireless LANs, Murty, Rohan, Padhye Jitendra, Wolman Alec, and Welsh Matt , Proc. Seventh ACM Workshop on Hot Topics in Networks (HotNets-VII), October, (2008)
Resource Aware Programming in the Pixie OS, Lorincz, Konrad, Chen Bor-rong, Waterman Jason, Werner-Allen Geoff, and Welsh Matt , 6th ACM Conference on Embedded Networked Sensor Systems (SenSys'08), November, (2008)
Choosing a Data Model and Query Language for Provenance, Holland, David A., Braun Uri, Maclean Diana, Muniswamy-Reddy Kiran-Kumar, and Seltzer Margo , Proceedings of the 2nd International Provenance and Annotation Workshop, June 2008, Salt Lake City, Utah, (2008)
LiveNet: Using Passive Monitoring to Reconstruct Sensor Network Dynamics, Chen, Bor-rong, Peterson Geoffrey, Mainland Geoff, and Welsh Matt , 4th IEEE/ACM International Conference on Distributed Computing in Sensor Systems (DCOSS 2008), June, (2008)
Securing Provenance, Braun, Uri, Shinnar Avraham, and Seltzer Margo , Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (HotSec), July 2008, San Jose, California, (2008)
Designing High Performance Enterprise Wi-Fi Networks, Murty, Rohan, Padhye Jitendra, Wolman Alec, and Zill Brian , 5th USENIX/ACM Symposium on Networked Design and Implementation (NSDI'08), April, (2008)
PASSing the provenance challenge, Holland, David A., Seltzer Margo, Braun Uri, and Muniswamy-Reddy Kiran-Kumar , Concurrency and Control: Practice and Experience, Volume 20, (2008)
2007
A Utility-Based Approach to Bandwidth Allocation and Link Scheduling in Wireless Networks, Ma, Qicheng, Parkes David C., and Welsh Matt , First International Workshop on Agent Technology for Sensor Networks (ATSN-07), May, (2007)
Can a File System Virtualize Processors?, Stein, Lex, Holland David A., Seltzer Margo, and Zhang Zheng , First EuroSys Workshop on Virtualization for High-Performance Computing, March 2007, (2007) Abstract
Participatory User Centered Design Techniques for a Large Scale Ad-Hoc Health Information System, Gao, Tia, Massey Tammara, Selavo Leo, Welsh Matt, and Sarrafzadeh Majid , First International Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments (HealthNet'07), June, (2007)