default search action
Andreas Haeberlen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c68]Andreas Haeberlen, Linh Thi Xuan Phan, Morgan McGuire:
Metaverse as a Service: Megascale Social 3D on the Cloud. SoCC 2023: 298-307 - [c67]Elizabeth Margolin, Karan Newatia, Tao Luo, Edo Roth, Andreas Haeberlen:
Arboretum: A Planner for Large-Scale Federated Analytics with Differential Privacy. SOSP 2023: 451-465 - 2021
- [c66]Neeraj Gandhi, Edo Roth, Brian Sandler, Andreas Haeberlen, Linh Thi Xuan Phan:
REBOUND: defending distributed systems against attacks with bounded-time recovery. EuroSys 2021: 523-539 - [c65]Robert Gifford, Neeraj Gandhi, Linh Thi Xuan Phan, Andreas Haeberlen:
DNA: Dynamic Resource Allocation for Soft Real-Time Multicore Systems. RTAS 2021: 196-209 - [c64]Edo Roth, Andreas Haeberlen:
Do Not Overpay for Fault Tolerance! RTAS 2021: 374-386 - [c63]Edo Roth, Karan Newatia, Yiping Ma, Ke Zhong, Sebastian Angel, Andreas Haeberlen:
Mycelium: Large-Scale Distributed Graph Queries with Differential Privacy. SOSP 2021: 327-343 - 2020
- [j9]Hengchu Zhang, Edo Roth, Andreas Haeberlen, Benjamin C. Pierce, Aaron Roth:
Testing differential privacy with dual interpreters. Proc. ACM Program. Lang. 4(OOPSLA): 165:1-165:26 (2020) - [c62]Edo Roth, Hengchu Zhang, Andreas Haeberlen, Benjamin C. Pierce:
Orchard: Differentially Private Analytics at Scale. OSDI 2020: 1065-1081 - [c61]Neeraj Gandhi, Edo Roth, Robert Gifford, Linh Thi Xuan Phan, Andreas Haeberlen:
Bounded-time recovery for distributed real-time systems. RTAS 2020: 110-123 - [i4]Hengchu Zhang, Edo Roth, Andreas Haeberlen, Benjamin C. Pierce, Aaron Roth:
Testing Differential Privacy with Dual Interpreters. CoRR abs/2010.04126 (2020)
2010 – 2019
- 2019
- [j8]Gilles Barthe, Christos Dimitrakakis, Marco Gaboardi, Andreas Haeberlen, Aaron Roth, Aleksandra B. Slavkovic:
Program for TPDP 2016. J. Priv. Confidentiality 9(1) (2019) - [j7]Hengchu Zhang, Edo Roth, Andreas Haeberlen, Benjamin C. Pierce, Aaron Roth:
Fuzzi: a three-level logic for differential privacy. Proc. ACM Program. Lang. 3(ICFP): 93:1-93:28 (2019) - [c60]Tian Yang, Robert Gifford, Andreas Haeberlen, Linh Thi Xuan Phan:
The Synchronous Data Center. HotOS 2019: 142-148 - [c59]Edo Roth, Daniel Noble, Brett Hemenway Falk, Andreas Haeberlen:
Honeycrisp: large-scale differentially private aggregation without a trusted core. SOSP 2019: 196-210 - [i3]Hengchu Zhang, Edo Roth, Andreas Haeberlen, Benjamin C. Pierce, Aaron Roth:
Fuzzi: A Three-Level Logic for Differential Privacy. CoRR abs/1905.12594 (2019) - 2018
- [j6]Ang Chen, Chen Chen, Lay Kuan Loh, Yang Wu, Andreas Haeberlen, Limin Jia, Boon Thau Loo, Wenchao Zhou:
Data Center Diagnostics with Network Provenance. IEEE Data Eng. Bull. 41(1): 74-85 (2018) - [c58]Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Bob DiMaiolo, Jingyu Qian, Chirag Shah, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou:
DeDoS: Defusing DoS with Dispersion Oriented Software. ACSAC 2018: 712-722 - [c57]Min Xu, Antonis Papadimitriou, Ariel Feldman, Andreas Haeberlen:
Using Differential Privacy to Efficiently Mitigate Side Channels in Distributed Analytics. EuroSec@EuroSys 2018: 4:1-4:6 - 2017
- [j5]Daniel Winograd-Cort, Andreas Haeberlen, Aaron Roth, Benjamin C. Pierce:
A framework for adaptive differential privacy. Proc. ACM Program. Lang. 1(ICFP): 10:1-10:29 (2017) - [c56]Ang Chen, Yang Wu, Andreas Haeberlen, Boon Thau Loo, Wenchao Zhou:
Data Provenance at Internet Scale: Architecture, Experiences, and the Road Ahead. CIDR 2017 - [c55]Ang Chen, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
One Primitive to Diagnose Them All: Architectural Support for Internet Diagnostics. EuroSys 2017: 374-388 - [c54]Antonis Papadimitriou, Arjun Narayan, Andreas Haeberlen:
DStress: Efficient Differentially Private Computations on Distributed Data. EuroSys 2017: 560-574 - [c53]Yang Wu, Ang Chen, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
Automated Bug Removal for Software-Defined Networks. NSDI 2017: 719-733 - [c52]Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Nik Sultana, Bowen Wang, Jingyu Qian, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou:
A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers. SIGCOMM Posters and Demos 2017: 71-73 - 2016
- [j4]Mingchen Zhao, Wenchao Zhou, Alexander J. T. Gurney, Andreas Haeberlen, Micah Sherr, Boon Thau Loo:
Private and Verifiable Interdomain Routing Decisions. IEEE/ACM Trans. Netw. 24(2): 1011-1024 (2016) - [c51]Hung Nguyen, Bipeen Acharya, Radoslav Ivanov, Andreas Haeberlen, Linh T. X. Phan, Oleg Sokolsky, Jesse Walker, James Weimer, William Hanson III, Insup Lee:
Cloud-Based Secure Logger for Medical Devices. CHASE 2016: 89-94 - [c50]Ang Chen, Akshay Sriraman, Tavish Vaidya, Yuankai Zhang, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou:
Dispersing Asymmetric DDoS Attacks with SplitStack. HotNets 2016: 197-203 - [c49]Antonis Papadimitriou, Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Andreas Haeberlen, Harmeet Singh, Abhishek Modi, Saikrishna Badrinarayanan:
Big Data Analytics over Encrypted Datasets with Seabed. OSDI 2016: 587-602 - [c48]Ang Chen, Yang Wu, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
The Good, the Bad, and the Differences: Better Network Diagnostics with Differential Provenance. SIGCOMM 2016: 115-128 - 2015
- [c47]Arjun Narayan, Ariel Feldman, Antonis Papadimitriou, Andreas Haeberlen:
Verifiable differential privacy. EuroSys 2015: 28:1-28:14 - [c46]Ang Chen, Yang Wu, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
Differential Provenance: Better Network Diagnostics with Reference Events. HotNets 2015: 25:1-25:7 - [c45]Yang Wu, Ang Chen, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
Automated Network Repair with Meta Provenance. HotNets 2015: 26:1-26:7 - [c44]Ang Chen, Hanjun Xiao, Andreas Haeberlen, Linh Thi Xuan Phan:
Fault Tolerance and the Five-Second Rule. HotOS 2015 - 2014
- [j3]Tom Anderson, Ken Birman, Robert M. Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William H. Lehr, Boon Thau Loo, David Mazières, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo:
A brief overview of the NEBULA future internet architecture. Comput. Commun. Rev. 44(3): 81-86 (2014) - [c43]Justin Hsu, Marco Gaboardi, Andreas Haeberlen, Sanjeev Khanna, Arjun Narayan, Benjamin C. Pierce, Aaron Roth:
Differential Privacy: An Economic Method for Choosing Epsilon. CSF 2014: 398-410 - [c42]Arjun Narayan, Antonis Papadimitriou, Andreas Haeberlen:
Compute Globally, Act Locally: Protecting Federated Systems from Systemic Threats. HotDep 2014 - [c41]Ang Chen, W. Brad Moore, Hanjun Xiao, Andreas Haeberlen, Linh Thi Xuan Phan, Micah Sherr, Wenchao Zhou:
Detecting Covert Timing Channels with Time-Deterministic Replay. OSDI 2014: 541-554 - [c40]Yang Wu, Mingchen Zhao, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
Diagnosing missing events in distributed systems with negative provenance. SIGCOMM 2014: 383-394 - [i2]Justin Hsu, Marco Gaboardi, Andreas Haeberlen, Sanjeev Khanna, Arjun Narayan, Benjamin C. Pierce, Aaron Roth:
Differential Privacy: An Economic Method for Choosing Epsilon. CoRR abs/1402.3329 (2014) - 2013
- [c39]Tom Anderson, Ken Birman, Robert M. Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William H. Lehr, Boon Thau Loo, David Mazières, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo:
The NEBULA Future Internet Architecture. Future Internet Assembly 2013: 16-26 - [c38]Antonis Papadimitriou, Mingchen Zhao, Andreas Haeberlen:
Towards privacy-preserving fault detection. HotDep 2013: 6:1-6:5 - [c37]Yang Wu, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
Answering why-not queries in software-defined networks with negative provenance. HotNets 2013: 3:1-3:7 - [c36]Loris D'Antoni, Marco Gaboardi, Emilio Jesús Gallego Arias, Andreas Haeberlen, Benjamin C. Pierce:
Sensitivity analysis using type-based constraints. FPCDSL@ICFP 2013: 43-50 - [c35]Mingchen Zhao, Paarijaat Aditya, Ang Chen, Yin Lin, Andreas Haeberlen, Peter Druschel, Bruce M. Maggs, Bill Wishon, Miroslav Ponec:
Peer-assisted content distribution in Akamai netsession. Internet Measurement Conference 2013: 31-42 - [c34]Marco Gaboardi, Andreas Haeberlen, Justin Hsu, Arjun Narayan, Benjamin C. Pierce:
Linear dependent types for differential privacy. POPL 2013: 357-370 - [c33]Jian Chang, Peter Gebhard, Andreas Haeberlen, Zachary G. Ives, Insup Lee, Oleg Sokolsky, Krishna K. Venkatasubramanian:
TrustForge: Flexible access control for collaborative crowd-sourced environment. PST 2013: 291-300 - 2012
- [j2]Wenchao Zhou, Suyog Mapara, Yiqing Ren, Yang Li, Andreas Haeberlen, Zachary G. Ives, Boon Thau Loo, Micah Sherr:
Distributed Time-aware Provenance. Proc. VLDB Endow. 6(2): 49-60 (2012) - [c32]Paarijaat Aditya, Mingchen Zhao, Yin Lin, Andreas Haeberlen, Peter Druschel, Bruce M. Maggs, Bill Wishon:
Reliable Client Accounting for P2P-Infrastructure Hybrids. NSDI 2012: 99-112 - [c31]Arjun Narayan, Andreas Haeberlen:
DJoin: Differentially Private Join Queries over Distributed Databases. OSDI 2012: 149-162 - [c30]Mingchen Zhao, Wenchao Zhou, Alexander J. T. Gurney, Andreas Haeberlen, Micah Sherr, Boon Thau Loo:
Private and verifiable interdomain routing decisions. SIGCOMM 2012: 383-394 - [c29]Zachary G. Ives, Andreas Haeberlen, Tao Feng, Wolfgang Gatterbauer:
Querying Provenance for Ranking and Recommending. TaPP 2012 - 2011
- [c28]Andreas Haeberlen, Mootaz Elnozahy:
Seventh workshop on hot topics in system dependability (HotDep'11). DSN Workshops 2011: 164 - [c27]Andreas Haeberlen, Mootaz Elnozahy:
Seventh workshop on hot topics in system dependability (HotDep'11). DSN 2011: 592 - [c26]Alexander J. T. Gurney, Andreas Haeberlen, Wenchao Zhou, Micah Sherr, Boon Thau Loo:
Having your cake and eating it too: routing security with privacy protections. HotNets 2011: 15 - [c25]Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, Andreas Haeberlen, Zachary G. Ives, Boon Thau Loo, Micah Sherr:
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems. SIGMOD Conference 2011: 1323-1326 - [c24]Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, Micah Sherr:
Secure network provenance. SOSP 2011: 295-310 - [c23]Wenchao Zhou, Ling Ding, Andreas Haeberlen, Zachary G. Ives, Boon Thau Loo:
TAP: Time-aware Provenance for Distributed Systems. TaPP 2011 - [c22]Adam J. Aviv, Andreas Haeberlen:
Challenges in Experimenting with Botnet Detection Systems. CSET 2011 - [c21]Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan:
Differential Privacy Under Fire. USENIX Security Symposium 2011 - 2010
- [j1]Andreas Haeberlen:
A case for the accountable cloud. ACM SIGOPS Oper. Syst. Rev. 44(2): 52-57 (2010) - [c20]Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas Haeberlen, Benjamin C. Pierce, Jonathan M. Smith:
Differential privacy for collaborative security. EUROSEC 2010: 1-7 - [c19]Andreas Haeberlen, Paarijaat Aditya, Rodrigo Rodrigues, Peter Druschel:
Accountable Virtual Machines. OSDI 2010: 119-134
2000 – 2009
- 2009
- [c18]Michael Backes, Peter Druschel, Andreas Haeberlen, Dominique Unruh:
CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable. NDSS 2009 - [c17]Andreas Haeberlen, Ioannis C. Avramopoulos, Jennifer Rexford, Peter Druschel:
NetReview: Detecting When Interdomain Routing Goes Wrong. NSDI 2009: 437-452 - [c16]Andreas Haeberlen, Petr Kuznetsov:
The Fault Detection Problem. OPODIS 2009: 99-114 - 2008
- [c15]Andreas Haeberlen, Rodrigo Rodrigues, P. Krishna Gummadi, Peter Druschel:
Pretty Good Packet Authentication. HotDep 2008 - [c14]Marcel Dischinger, Alan Mislove, Andreas Haeberlen, P. Krishna Gummadi:
Detecting bittorrent blocking. Internet Measurement Conference 2008: 3-8 - [c13]Marcel Dischinger, Andreas Haeberlen, Ivan Beschastnikh, P. Krishna Gummadi, Stefan Saroiu:
Satellitelab: adding heterogeneity to planetary-scale network testbeds. SIGCOMM 2008: 315-326 - 2007
- [c12]Marcel Dischinger, Andreas Haeberlen, P. Krishna Gummadi, Stefan Saroiu:
Characterizing residential broadband networks. Internet Measurement Conference 2007: 43-56 - [c11]Andreas Haeberlen, Petr Kouznetsov, Peter Druschel:
PeerReview: practical accountability for distributed systems. SOSP 2007: 175-188 - 2006
- [c10]Alan Mislove, Ansley Post, Andreas Haeberlen, Peter Druschel:
Experiences in building and operating ePOST, a reliable peer-to-peer application. EuroSys 2006: 147-159 - [c9]Andreas Haeberlen, Petr Kouznetsov, Peter Druschel:
The Case for Byzantine Fault Detection. HotDep 2006 - [c8]Andreas Haeberlen, Marcel Dischinger, P. Krishna Gummadi, Stefan Saroiu:
Monarch: a tool to emulate transport protocol flowsover the internet at large. Internet Measurement Conference 2006: 105-118 - [c7]Andreas Haeberlen, Alan Mislove, Ansley Post, Peter Druschel:
Fallacies in Evaluating Decentralized Systems. IPTPS 2006 - [c6]Emil Sit, Andreas Haeberlen, Frank Dabek, Byung-Gon Chun, Hakim Weatherspoon, Robert Tappan Morris, M. Frans Kaashoek, John Kubiatowicz:
Proactive Replication for Data Durability. IPTPS 2006 - [c5]Byung-Gon Chun, Frank Dabek, Andreas Haeberlen, Emil Sit, Hakim Weatherspoon, M. Frans Kaashoek, John Kubiatowicz, Robert Tappan Morris:
Efficient Replica Maintenance for Distributed Storage Systems. NSDI 2006 - [i1]Peter Druschel, Andreas Haeberlen, Petr Kouznetsov:
Abstracting out Byzantine Behavior. From Security to Dependability 2006 - 2005
- [c4]Andreas Haeberlen, Alan Mislove, Peter Druschel:
Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures. NSDI 2005 - [p1]Alan Mislove, Andreas Haeberlen, Ansley Post, Peter Druschel:
ePOST. Peer-to-Peer Systems and Applications 2005: 171-192 - 2004
- [c3]Andreas Haeberlen, Eliot Flannery, Andrew M. Ladd, Algis Rudys, Dan S. Wallach, Lydia E. Kavraki:
Practical robust localization over large-scale 802.11 wireless networks. MobiCom 2004: 70-84 - 2003
- [c2]Andreas Haeberlen, Kevin Elphinstone:
User-Level Management of Kernel Memory. Asia-Pacific Computer Systems Architecture Conference 2003: 277-289 - 2000
- [c1]Andreas Haeberlen, Jochen Liedtke, Yoonho Park, Lars Reuther, Volkmar Uhlig:
Stub-Code Performance Is Becoming Important. WIESS 2000: 31-38
Coauthor Index
aka: Linh Thi Xuan Phan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint