Practical robust localization over large-scale 802.11 wireless networks A Haeberlen, E Flannery, AM Ladd, A Rudys, DS Wallach, LE Kavraki Proceedings of the 10th annual international conference on Mobile computing …, 2004 | 1007 | 2004 |
PeerReview: Practical accountability for distributed systems A Haeberlen, P Kouznetsov, P Druschel ACM SIGOPS operating systems review 41 (6), 175-188, 2007 | 567 | 2007 |
Characterizing residential broadband networks M Dischinger, A Haeberlen, KP Gummadi, S Saroiu Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 43-56, 2007 | 463 | 2007 |
Efficient Replica Maintenance for Distributed Storage Systems. BG Chun, F Dabek, A Haeberlen, E Sit, H Weatherspoon, MF Kaashoek, ... NSDI 6, 4-4, 2006 | 398 | 2006 |
Glacier: Highly durable, decentralized storage despite massive correlated failures A Haeberlen, A Mislove, P Druschel Proceedings of the 2nd conference on Symposium on Networked Systems Design …, 2005 | 388 | 2005 |
Differential privacy: An economic method for choosing epsilon J Hsu, M Gaboardi, A Haeberlen, S Khanna, A Narayan, BC Pierce, ... 2014 IEEE 27th Computer Security Foundations Symposium, 398-410, 2014 | 387 | 2014 |
Differential privacy under fire A Haeberlen, BC Pierce, A Narayan 20th USENIX Security Symposium (USENIX Security 11), 2011 | 297 | 2011 |
A case for the accountable cloud A Haeberlen ACM SIGOPS Operating Systems Review 44 (2), 52-57, 2010 | 249 | 2010 |
Linear dependent types for differential privacy M Gaboardi, A Haeberlen, J Hsu, A Narayan, BC Pierce Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2013 | 229 | 2013 |
Secure network provenance W Zhou, Q Fei, A Narayan, A Haeberlen, BT Loo, M Sherr Proceedings of the twenty-third ACM symposium on operating systems …, 2011 | 177 | 2011 |
Big data analytics over encrypted datasets with seabed A Papadimitriou, R Bhagwan, N Chandran, R Ramjee, A Haeberlen, ... 12th USENIX symposium on operating systems design and implementation (OSDI …, 2016 | 176 | 2016 |
Accountable virtual machines A Haeberlen, P Aditya, R Rodrigues, P Druschel 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010 | 163 | 2010 |
{DJoin}: Differentially private join queries over distributed databases A Narayan, A Haeberlen 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2012 | 158 | 2012 |
Detecting bittorrent blocking M Dischinger, A Mislove, A Haeberlen, KP Gummadi Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, 3-8, 2008 | 153 | 2008 |
Peer-assisted content distribution in akamai netsession M Zhao, P Aditya, A Chen, Y Lin, A Haeberlen, P Druschel, B Maggs, ... Proceedings of the 2013 conference on Internet measurement conference, 31-42, 2013 | 131 | 2013 |
Proactive Replication for Data Durability. E Sit, A Haeberlen, F Dabek, BG Chun, H Weatherspoon, RT Morris, ... IPTPS, 2006 | 128 | 2006 |
The Case for Byzantine Fault Detection. A Haeberlen, P Kouznetsov, P Druschel HotDep, 2006 | 113 | 2006 |
Let SDN be your eyes: Secure forensics in data center networks A Bates, K Butler, A Haeberlen, M Sherr, W Zhou Proceedings of the NDSS workshop on security of emerging network …, 2014 | 102 | 2014 |
Challenges in experimenting with botnet detection systems AJ Aviv, A Haeberlen 4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011 | 101 | 2011 |
Diagnosing missing events in distributed systems with negative provenance Y Wu, M Zhao, A Haeberlen, W Zhou, BT Loo ACM SIGCOMM Computer Communication Review 44 (4), 383-394, 2014 | 97 | 2014 |