skip to content

Department of Computer Science and Technology

 

2009

  • Falaki, H. and Keshav, S., 2009. Trace-based analysis of Wi-Fi scanning strategies ACM SIGMOBILE Mobile Computing and Communications Review, v. 13
    Doi: 10.1145/1558590.1558606
  • 2008

  • Zaharia, M. and Keshav, S., 2008. Gossip-based search selection in hybrid peer-to-peer networks Concurrency and Computation: Practice and Experience, v. 20
    Doi: 10.1002/cpe.1188
  • Keshav, S., 2008. Session details: Wireless II ACM SIGCOMM Computer Communication Review, v. 38
    Doi: 10.1145/3262944
  • Ahmed, N., Ismail, U., Keshav, S. and Papagiannaki, K., 2008. Online estimation of RF interference Proceedings of 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08,
    Doi: 10.1145/1544012.1544016
  • Oliver, EA. and Keshav, S., 2008. Design principles for opportunistic communication in constrained computing environments Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM,
    Doi: 10.1145/1410064.1410071
  • Crowcroft, J., McKeown, N. and Keshav, S., 2008. Scaling internet research publication processes to internet scale Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems, WOWCS 2008,
  • Shuckburgh, E., 2008. Survival of the human race
  • Rahman, SU., Hengartner, U., Ismail, U. and Keshav, S., 2008. Practical security for rural Internet kiosks Proceedings of the ACM SIGCOMM 2008 Conference on Computer Communications -2nd ACM SIGCOMM Workshop on Networked Systems for Developing Regions, NSDR'08,
    Doi: 10.1145/1397705.1397710
  • Sharp, R., Madhavapeddy, A., Want, R. and Pering, T., 2008. Enhancing web browsing security on public terminals using mobile composition. MobiSys,
  • 2007

  • Guo, S. and Keshav, S., 2007. Fair and efficient scheduling in data ferrying networks Proceedings of 2007 ACM CoNEXT Conference - 3rd International Conference on Emerging Networking EXperiments and Technologies, CoNEXT,
    Doi: 10.1145/1364654.1364671
  • Guo, S., Falaki, MH., Oliver, EA., Rahman, SU., Seth, A., Zaharia, MA., Ismail, U. and Keshav, S., 2007. Design and Implementation of the KioskNet System 2007 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES AND DEVELOPMENT (ICTD),
  • Haynes, PH., Poet, DA. and Shuckburgh, EF., 2007. Transport and mixing in kinematic and dynamically consistent flows J ATMOS SCI, v. 64
    Doi: 10.1175/JAS4030.1
  • Toye, E., Sharp, R., Madhavapeddy, A., Scott, D., Upton, E. and Blackwell, A., 2007. Interacting with mobile services: an evaluation of camera-phones and visual tags PERS UBIQUIT COMPUT, v. 11
    Doi: 10.1007/s00779-006-0064-9
  • Karsten, M., Keshav, S., Prasad, S. and Beg, M., 2007. An axiomatic basis for communication Computer Communication Review, v. 37
    Doi: 10.1145/1282427.1282405
  • Madhavapeddy, A., Ho, A., Deegan, T., Scott, DJ. and Sohan, R., 2007. Melange: creating a "functional" internet. EuroSys,
  • Guo, S., Falaki, MH., Oliver, EA., Rahman, SU., Seth, A., Zaharia, MA. and Keshav, S., 2007. Very low-cost internet access using KioskNet Computer Communication Review, v. 37
    Doi: 10.1145/1290168.1290181
  • Karsten, M., Keshav, S., Prasad, S. and Beg, M., 2007. An axiomatic basis for communication ACM SIGCOMM 2007: Conference on Computer Communications,
    Doi: 10.1145/1282380.1282405
  • Guo, S., Falaki, MH., Oliver, EA., Rahman, SU., Seth, A., Zaharia, MA., Ismail, U. and Keshav, S., 2007. Design and implementation of the kiosknet system 2007 International Conference on Information and Communication Technologies and Development, ICTD 2007,
    Doi: 10.1109/ICTD.2007.4937417
  • Hadaller, D., Keshav, S., Brecht, T. and Agarwal, S., 2007. Vehicular opportunistic communication under the microscope MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services,
    Doi: 10.1145/1247660.1247685
  • Ahmed, N., Shrivastava, V., Mishra, A., Banerjee, S., Keshav, S. and Papagiannaki, K., 2007. Interference mitigation in enterprise wlans through speculative scheduling Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM,
    Doi: 10.1145/1287853.1287900