default search action
Brad Karp
Person information
- affiliation: University College London, London, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i1]Wenchen Han, Shay Vargaftik, Michael Mitzenmacher, Brad Karp, Ran Ben Basat:
Beyond Throughput and Compression Ratios: Towards High End-to-end Utility of Gradient Compression. CoRR abs/2407.01378 (2024)
2010 – 2019
- 2019
- [c30]Ahmed Awad, Brad Karp:
Execution integrity without implicit trust of system software. SysTEX@SOSP 2019: 5:1-5:6 - 2018
- [c29]Nikola Gvozdiev, Stefano Vissicchio, Brad Karp, Mark Handley:
On low-latency-capable topologies, and their impact on the design of intra-domain routing. SIGCOMM 2018: 88-102 - 2017
- [c28]Nikola Gvozdiev, Stefano Vissicchio, Brad Karp, Mark Handley:
Low-Latency Routing on Mesh-Like Backbones. HotNets 2017: 136-142 - [e3]Sujata Banerjee, Brad Karp, Michael Walfish:
Proceedings of the 16th ACM Workshop on Hot Topics in Networks, Palo Alto, CA, USA, HotNets 2017, November 30 - December 01, 2017. ACM 2017, ISBN 978-1-4503-5569-8 [contents] - 2015
- [c27]Georgios Nikolaidis, Mark Handley, Kyle Jamieson, Brad Karp:
COPA: cooperative power allocation for interfering wireless networks. CoNEXT 2015: 18:1-18:13 - [c26]Georgios Nikolaidis, Mark Handley, Kyle Jamieson, Brad Karp:
On the Synergy between Nulling and Power Allocation in OFDM Systems. S3@MobiCom 2015: 41-43 - [e2]Steve Uhlig, Olaf Maennel, Brad Karp, Jitendra Padhye:
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2015, London, United Kingdom, August 17-21, 2015. ACM 2015, ISBN 978-1-4503-3542-3 [contents] - 2014
- [c25]Nikola Gvozdiev, Brad Karp, Mark Handley:
FUBAR: Flow Utility Based Routing. HotNets 2014: 12:1-12:7 - [c24]Deian Stefan, Edward Z. Yang, Petr Marchenko, Alejandro Russo, David Herman, Brad Karp, David Mazières:
Protecting Users by Confining JavaScript with COWL. OSDI 2014: 131-146 - [c23]Lynne Salameh, Astrit Zhushi, Mark Handley, Kyle Jamieson, Brad Karp:
HACK: Hierarchical ACKs for Efficient Wireless Medium Utilization. USENIX ATC 2014: 359-370 - 2013
- [c22]Edward Z. Yang, Deian Stefan, John C. Mitchell, David Mazières, Petr Marchenko, Brad Karp:
Toward Principled Browser Security. HotOS 2013 - [c21]Nikola Gvozdiev, Brad Karp, Mark Handley:
LOUP: The Principles and Practice of Intra-Domain Route Dissemination. NSDI 2013: 413-426 - 2012
- [c20]Nikola Gvozdiev, Brad Karp, Mark Handley:
LOUP: who's afraid of the big bad loop? HotNets 2012: 19-24 - 2010
- [c19]Georgios Nikolaidis, Astrit Zhushi, Kyle Jamieson, Brad Karp:
Cone of silence: adaptively nulling interferers in wireless networks. SIGCOMM 2010: 433-434 - [c18]Petr Marchenko, Brad Karp:
Structuring Protocol Implementations to Protect Sensitive Data. USENIX Security Symposium 2010: 47-62
2000 – 2009
- 2008
- [c17]Andrea Bittau, Petr Marchenko, Mark Handley, Brad Karp:
Wedge: Splitting Applications into Reduced-Privilege Compartments. NSDI 2008: 309-322 - 2006
- [c16]Scott Garriss, Michael Kaminsky, Michael J. Freedman, Brad Karp, David Mazières, Haifeng Yu:
RE: Reliable Email. NSDI 2006 - [c15]James Newsome, Brad Karp, Dawn Xiaodong Song:
Paragraph: Thwarting Signature Learning by Training Maliciously. RAID 2006: 81-105 - [c14]Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker:
Lazy cross-link removal for geographic routing. SenSys 2006: 112-124 - 2005
- [c13]Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker:
On the pitfalls of geographic face routing. DIALM-POMC 2005: 34-43 - [c12]Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker:
Geographic Routing Made Practical. NSDI 2005 - [c11]Sean C. Rhea, Brighten Godfrey, Brad Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, Harlan Yu:
OpenDHT: a public DHT service and its uses. SIGCOMM 2005: 73-84 - [c10]James Newsome, Brad Karp, Dawn Xiaodong Song:
Polygraph: Automatically Generating Signatures for Polymorphic Worms. S&P 2005: 226-241 - [e1]Brad Karp, Vivek S. Pai:
Second USENIX Workshop on Real, Large Distributed Systems, WORLDS'05, San Francisco, CA, USA, December 13, 2005. USENIX Association 2005 [contents] - 2004
- [c9]Brad Karp, Sylvia Ratnasamy, Sean C. Rhea, Scott Shenker:
Spurring Adoption of DHTs with OpenHash, a Public DHT Service. IPTPS 2004: 195-205 - [c8]Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker:
Practical and robust geographic routing in wireless networks. SenSys 2004: 295-296 - [c7]Hyang-Ah Kim, Brad Karp:
Autograph: Toward Automated, Distributed Worm Signature Detection. USENIX Security Symposium 2004: 271-286 - 2003
- [j3]Scott Shenker, Sylvia Ratnasamy, Brad Karp, Ramesh Govindan, Deborah Estrin:
Data-centric storage in sensornets. Comput. Commun. Rev. 33(1): 137-142 (2003) - [j2]Sylvia Ratnasamy, Brad Karp, Scott Shenker, Deborah Estrin, Ramesh Govindan, Li Yin, Fang Yu:
Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table. Mob. Networks Appl. 8(4): 427-442 (2003) - [j1]Phillip B. Gibbons, Brad Karp, Yan Ke, Suman Nath, Srinivasan Seshan:
IrisNet: An Architecture for a Worldwide Sensor Web. IEEE Pervasive Comput. 2(4): 22-33 (2003) - [c6]Ming Zhang, Brad Karp, Sally Floyd, Larry L. Peterson:
RR-TCP: A Reordering-Robust TCP with DSACK. ICNP 2003: 95-106 - [c5]Niraj Tolia, Michael Kozuch, Mahadev Satyanarayanan, Brad Karp, Thomas C. Bressoud, Adrian Perrig:
Opportunistic Use of Content Addressable Storage for Distributed File Systems. USENIX ATC, General Track 2003: 127-140 - [c4]Suman Nath, Amol Deshpande, Yan Ke, Phillip B. Gibbons, Brad Karp, Srinivasan Seshan:
IrisNet: An Architecture for Internet-scale Sensing Services. VLDB 2003: 1137-1140 - 2002
- [c3]Sylvia Ratnasamy, Brad Karp, Li Yin, Fang Yu, Deborah Estrin, Ramesh Govindan, Scott Shenker:
GHT: a geographic hash table for data-centric storage. WSNA 2002: 78-87 - 2000
- [c2]Brad Karp, H. T. Kung:
GPSR: greedy perimeter stateless routing for wireless networks. MobiCom 2000: 243-254
1990 – 1999
- 1994
- [c1]Trevor Blackwell, Kee Chan, Koling Chang, Thomas Charuhas, James Gwertzman, Brad Karp, H. T. Kung, David Li, Dong Lin, Robert Tappan Morris, Rob Polansky, Diane Tang, Cliff Young, John Zao:
Secure Short-Cut Routing for Mobile IP. USENIX Summer 1994: 305-316
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-11 00:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint