David J. Wetherall
#144,100
Most Influential Person Now
David J. Wetherall's AcademicInfluence.com Rankings
David J. Wetherallcomputer-science Degrees
Computer Science
#7108
World Rank
#7486
Historical Rank
Database
#4163
World Rank
#4330
Historical Rank

Download Badge
Computer Science
David J. Wetherall's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is David J. Wetherall Influential?
(Suggest an Edit or Addition)David J. Wetherall's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A survey of active network research (1997) (1606)
- Measuring ISP topologies with Rocketfuel (2004) (1484)
- Practical network support for IP traceback (2000) (1419)
- Tool release: gathering 802.11n traces with channel state information (2011) (1203)
- Ambient backscatter: wireless communication out of thin air (2013) (1079)
- Measuring ISP topologies with rocketfuel (2002) (936)
- Towards an active network architecture (1996) (866)
- Network support for IP traceback (2001) (753)
- ANTS: a toolkit for building and dynamically deploying network protocols (1998) (741)
- Reducing Network Energy Consumption via Sleeping and Rate-Adaptation (2008) (738)
- Predictable 802.11 packet delivery from wireless channel measurements (2010) (714)
- These aren't the droids you're looking for: retrofitting android to protect data from imperious applications (2011) (704)
- Understanding BGP misconfiguration (2002) (623)
- TIMELY: RTT-based Congestion Control for the Datacenter (2015) (513)
- Detecting and Defending Against Third-Party Tracking on the Web (2012) (427)
- A DoS-limiting network architecture (2005) (402)
- Measurement-based models of delivery and interference in static wireless networks (2006) (400)
- Controlling high-bandwidth flows at the congested router (2001) (399)
- A protocol-independent technique for eliminating redundant network traffic (2000) (390)
- Odessa: enabling interactive perception applications on mobile devices (2011) (378)
- A Conundrum of Permissions: Installing Applications on an Android Smartphone (2012) (367)
- Augmenting data center networks with multi-gigabit wireless links (2011) (362)
- Towards IP geolocation using delay and topology measurements (2006) (351)
- Improving the Reliability of Internet Paths with One-hop Source Routing (2004) (345)
- Recognizing daily activities with RFID-based sensors (2009) (332)
- Wi-fi backscatter (2014) (325)
- Preventing Internet denial-of-service with capabilities (2004) (324)
- Taking the sting out of carrier sense: interference cancellation for wireless LANs (2008) (320)
- TCP congestion control with a misbehaving receiver (1999) (289)
- Understanding and mitigating the impact of RF interference on 802.11 networks (2007) (284)
- Wi-fi backscatter: internet connectivity for RF-powered devices (2015) (280)
- Demystifying Page Load Performance with WProf (2013) (269)
- Improved access point selection (2006) (253)
- Inferring link weights using end-to-end measurements (2002) (253)
- 802.11 user fingerprinting (2007) (236)
- Source selectable path diversity via routing deflections (2006) (231)
- Analyzing the MAC-level behavior of wireless networks in the wild (2006) (219)
- Scriptroute: A Public Internet Measurement Facility (2003) (211)
- Measurement-based characterization of 802.11 in a hotspot setting (2005) (209)
- Demystifying 802.11n power consumption (2010) (206)
- User-level internet path diagnosis (2003) (191)
- Toward trustworthy mobile sensing (2010) (185)
- How Speedy is SPDY? (2014) (182)
- An empirical study of UHF RFID performance (2008) (179)
- Active network vision and reality: lessons from a capsule-based system (2002) (174)
- TaintEraser: protecting sensitive data leaks using application-level taint tracking (2011) (173)
- Studying Black Holes in the Internet with Hubble (2008) (166)
- Active network vision and reality: lessions from a capsule-based system (1999) (165)
- Improving wireless privacy with an identifier-free link layer protocol (2008) (161)
- Passport: Secure and Adoptable Source Authentication (2008) (159)
- TVA: A DoS-Limiting Network Architecture (2008) (155)
- Computer networks, 5th Edition (2011) (150)
- Introducing new Internet services: why and how (1998) (146)
- Sustaining cooperation in multi-hop wireless networks (2005) (145)
- Wirelessly-Charged UHF Tags for Sensor Data Collection (2008) (139)
- Improving the performance of distributed applications using active networks (1998) (138)
- The ACTIVE IP option (1996) (137)
- Dewdrop: An Energy-Aware Runtime for Computational RFID (2011) (134)
- A system architecture for pervasive computing (2000) (133)
- Swift: Delay is Simple and Effective for Congestion Control in the Datacenter (2020) (128)
- Speeding up Web Page Loads with Shandian (2016) (126)
- Active network encapsulation protocol (anep) (1997) (122)
- The Emergence of RF-Powered Computing (2014) (113)
- Brahmastra: Driving Apps to Test the Security of Third-Party Components (2014) (112)
- A software radio-based UHF RFID reader for PHY/MAC experimentation (2011) (110)
- Revisiting Smart Dust with RFID Sensor Networks (2008) (109)
- Negotiation-based routing between neighboring ISPs (2005) (99)
- Privacy oracle: a system for finding application leaks with black box differential testing (2008) (99)
- Robust Explicit Congestion Notification (ECN) Signaling with Nonces (2003) (93)
- Extending Tcl for Dynamic Object-Oriented Programming (1995) (93)
- "When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use (2009) (93)
- Programming for Pervasive Computing Environments (2001) (93)
- Alpine: A User-Level Infrastructure for Network Protocol Development (2001) (92)
- RFID: From Supply Chains to Sensor Nets (2010) (89)
- Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries (2009) (87)
- Experiences applying game theory to system design (2004) (85)
- 802.11 with multiple antennas for dummies (2010) (83)
- Systems directions for pervasive computing (2001) (82)
- RFID sensor networks with the Intel WISP (2008) (80)
- A Wakeup Call for Internet Monitoring Systems : The Case for Distributed Triggers (2004) (79)
- Efficient and Secure Source Authentication with Packet Passports (2006) (70)
- Forwarding without loops in Icarus (2002) (69)
- The VuSystem: a programming system for visual processing of digital video (1994) (68)
- Short paper: enhancing mobile application permissions with runtime feedback and constraints (2012) (66)
- Service introduction in an active network (1998) (63)
- A Study of the Performance Potential of DHT-based Overlays (2003) (61)
- Upgrading transport protocols using untrusted mobile code (2003) (61)
- How to Resolve IP Aliases (2008) (60)
- Advancing the state of home networking (2011) (58)
- From Cells to Streets: Estimating Mobile Paths with Cellular-Side Data (2014) (55)
- Mutually Controlled Routing with Independent ISPs (2007) (53)
- A Study of Third-Party Tracking by Mobile Apps in the Wild (2012) (53)
- Interference Cancellation: Better Receivers for a New Wireless MAC (2007) (52)
- Robust congestion signaling (2001) (52)
- ANTS: Network Services Without the Red Tape (1999) (50)
- Reverse engineering the Internet (2004) (48)
- Staying online while mobile: the hidden costs (2013) (46)
- A "Gen 2" RFID monitor based on the USRP (2010) (45)
- Demystifying 802 . 11 n Power Consumption (2010) (44)
- Reducing Network Energy Consumption via Rate- Adaptation and Sleeping (2007) (43)
- A software-oriented approach to the design of media processing environments (1994) (42)
- Privacy Revelations for Web and Mobile Apps (2011) (41)
- Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default (2009) (40)
- Privacy Scope: A Precise Information Flow Tracking System For Finding Application Leaks (2009) (38)
- Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era (2007) (38)
- Increasing Effective Link Bandwidth by Supressing Replicated Data (1998) (38)
- Enhancing mobile apps to use sensor hubs without programmer effort (2015) (38)
- Towards Coordinated Interdomain Traffic Engineering (2004) (37)
- SafeGuard: safe forwarding during route changes (2009) (35)
- Computer Networks -5/E. (2010) (35)
- Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 25-29, 2003, Karlsruhe, Germany (2003) (34)
- MetaSync: File Synchronization Across Multiple Untrusted Storage Services (2015) (34)
- Scriptroute: a facility for distributed internet measurement (2003) (32)
- A Flexible Software Radio Transceiver for UHF RFID Experimentation : UW TR : UW-CSE-09-1002 (2009) (31)
- Design guidelines for robust Internet protocols (2003) (30)
- Expressive privacy control with pseudonyms (2013) (27)
- Next century challenges: RadioActive networks (1999) (26)
- Accelerating the mobile web with selective offloading (2013) (26)
- How Much Can We Micro-Cache Web Pages? (2014) (24)
- Tryst: The Case for Confidential Service Discovery (2007) (23)
- GlimpseData: towards continuous vision-based personal analytics (2014) (20)
- ViewStation Applications: Implications for Network Traffic (1995) (20)
- Backscatter Protocols and Energy-Efficient Computing for RF-Powered Devices (2012) (19)
- Active network vision and reality (1999) (17)
- Proceedings of the ACM SIGCOMM 2008 conference on Data communication (2008) (17)
- FindAll: a local search engine for mobile phones (2012) (15)
- Experiences with capsule-based active networking (2002) (13)
- Practical and efficient internet routing with competing interests (2005) (12)
- TCP Meets Mobile Code (2003) (12)
- The Network Oracle (2005) (12)
- Studying Blackholes in the Internet with Hubble (2007) (11)
- An interactive programming system for media computation (1994) (11)
- Two Antennas are Better than One : A Measurement Study of 802 . 11 n (2009) (10)
- Interdomain Routing with Negotiation (2004) (10)
- Efficient discovery of network topology and routing policy in the internet (2004) (9)
- Active pages: Intelligent nodes on the World Wide Web (1994) (9)
- MetaSync: Coordinating Storage across Multiple File Synchronization Services (2016) (9)
- Demonstration : RFID Sensor Networks with the Intel WISP (2008) (8)
- ViewStation Applications: Intelligent Video Processing Over a Broadband Local Area Network (1994) (7)
- Programmable Networks (2001) (7)
- Robust ECN Signaling with Nonces (2002) (7)
- Proceedings of the 9th international conference on Mobile systems, applications, and services (2011) (7)
- Sensor tricorder: what does that sensor know about me? (2011) (7)
- System-Level Programming Abstractions for Ubiquitous Computing (2001) (6)
- Encouraging Cooperation in Multi-Hop Wireless Networks (2004) (6)
- ShareMeNot: Balancing Privacy and Functionality of Third-Party Social Widgets (2012) (5)
- Measuring and predicting web login safety (2011) (4)
- Improving Power Efficiency Using Sensor Hubs Without ReCoding Mobile Apps (2013) (4)
- Retrospective on "towards an active network architecture" (2019) (4)
- Efficiently Running Continuous Monitoring Applications on Mobile Devices using Sensor Hubs (2013) (4)
- The ViewStation: a software-intensive approach to media processing and distribution (1995) (3)
- PLB: congestion signals are simple and effective for network load balancing (2022) (3)
- WISP Monitoring and Debugging (2013) (3)
- Before building the network or its components, first understand the home and the behavior of its human inhabitants. (2011) (2)
- Implementing the Gen 2 MAC on the Intel-UW WISP (2013) (2)
- Design Principles for a Robust Network Infrastructure (2002) (2)
- Study on Congestion Avoidance in MANET (2011) (2)
- Proceedings of the ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008 (2008) (2)
- Model-based Network Congestion Control (2019) (2)
- Towards More Robust Internet Protocols (1)
- Scalable Self-Organizing Overlays (2017) (1)
- RFID: From Supply Chains to Sensor Nets A programmable wireless identification and sensing device is powered through energy harvesting and a software-defined RFID reader provides the means to investigate optimization approaches for RFID systems. (2010) (1)
- HotBots ’ 07 : FirstWorkshop on Hot Topics in Understanding Botnets (1)
- RENDEZVOUS: Self-Organizing Services in an Active Network (2004) (1)
- A Comparison of Large-S ale Overlay Management Te hniques (2002) (1)
- Improving client throughput with multi-hop relaying in wireless mesh networks (2008) (1)
- Session details: Network behavior (2002) (0)
- MobileHub: No Programmer Effort for Power Efficiency with Sensor Hub (2016) (0)
- Session details: Position papers (2003) (0)
- Rapid and Efficient Detection of Distributed Anomalous Aggregates (0)
- The Future of Crypto: Getting from Here to Guarantees (2014) (0)
- Enforceable Network Protocols (2004) (0)
- USENIX Association Proceedings of USITS ’ 03 : 4 th USENIX Symposium on Internet Technologies and Systems (1992) (0)
- Configuration Challenges for Smart Spaces (1998) (0)
- Guest Editorial: Special Section on Outstanding Papers from MobiSys 2011 (2012) (0)
- Session details: Security & privacy (2007) (0)
- Session details: Routing (2007) (0)
- Hot nets-I: Workshop summary (2003) (0)
- Quantifying and Preventing Privacy Threats in Wireless Link Layer Protocols (2007) (0)
- Program Committee Chairs' Message (2003) (0)
- An Interactive Programming System for Media (1994) (0)
- Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, W-MUST@SIGCOMM 2011, Toronto, Ontario, Canada, August 19, 2011 (2011) (0)
- Session details: Routing 1 (2006) (0)
- Session details: Systems and applications for cellular networks (2010) (0)
- The ViewStation project (demonstration): computer-participative media applications (1994) (0)
- Experience with a Capsule-based Active Network (1999) (0)
- 10 Networking Papers: readings for protocol design (2006) (0)
- Hot nets-I (2003) (0)
- Loop-Free Forwarding during Routing Transitions via Cost-Carrying Packets (2008) (0)
- Decoupling Connectivity from Routing (0)
- Session details: Security II (2008) (0)
- Session 1: Position Papers (2003) (0)
- Welcome from the PC chairs (2011) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With David J. Wetherall?
David J. Wetherall is affiliated with the following schools: