Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks K Akkaya, A Newell Computer Communications 32 (7-10), 1233-1244, 2009 | 155 | 2009 |
Plagiarizing smartphone applications: attack strategies and defense techniques R Potharaju, A Newell, C Nita-Rotaru, X Zhang Engineering Secure Software and Systems: 4th International Symposium, ESSoS …, 2012 | 134 | 2012 |
Real-time visual feedback for user positioning with respect to a camera and a display A Bud, A Newell, J Palmer US Patent 9,412,169, 2016 | 127* | 2016 |
On the practicality of integrity attacks on document-level sentiment analysis A Newell, R Potharaju, L Xiang, C Nita-Rotaru Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014 | 65 | 2014 |
Distributed collaborative camera actuation for redundant data elimination in wireless multimedia sensor networks A Newell, K Akkaya Ad Hoc Networks 9 (4), 514-527, 2011 | 61 | 2011 |
Taiji: managing global user traffic for large-scale internet services at the edge D Chou, T Xu, K Veeraraghavan, A Newell, S Margulis, L Xiao, PM Ruiz, ... Proceedings of the 27th ACM symposium on operating systems principles, 430-446, 2019 | 41 | 2019 |
Increasing network resiliency by optimally assigning diverse variants to routing nodes A Newell, D Obenshain, T Tantillo, C Nita-Rotaru, Y Amir IEEE Transactions on Dependable and Secure Computing 12 (6), 602-614, 2014 | 40 | 2014 |
Node-capture resilient key establishment in sensor networks: Design space and new protocols A Newell, H Yao, A Ryker, T Ho, C Nita-Rotaru ACM Computing Surveys (CSUR) 47 (2), 1-34, 2014 | 34 | 2014 |
RAS: continuously optimized region-wide datacenter resource allocation A Newell, D Skarlatos, J Fan, P Kumar, M Khutornenko, M Pundir, ... Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles …, 2021 | 31 | 2021 |
Optimizing distributed actor systems for dynamic interactive services A Newell, G Kliot, I Menache, A Gopalan, S Akiyama, M Silberstein Proceedings of the Eleventh European Conference on Computer Systems, 1-15, 2016 | 29 | 2016 |
Practical intrusion-tolerant networks D Obenshain, T Tantillo, A Babay, J Schultz, A Newell, ME Hoque, Y Amir, ... 2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016 | 28 | 2016 |
Entropy attacks and countermeasures in wireless network coding AJ Newell, R Curtmola, C Nita-Rotaru Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 25 | 2012 |
Providing multi-perspective event coverage in wireless multimedia sensor networks A Newell, K Akkaya, E Yildiz IEEE Local Computer Network Conference, 464-471, 2010 | 22 | 2010 |
Split null keys: A null space based defense for pollution attacks in wireless network coding A Newell, C Nita-Rotaru 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2012 | 19 | 2012 |
Self-actuation of camera sensors for redundant data elimination in wireless multimedia sensor networks A Newell, K Akkaya 2009 IEEE International Conference on Communications, 1-5, 2009 | 17 | 2009 |
A stitch in time: the needlework of aging women in antebellum America AE Newell Ohio University Press, 2014 | 16 | 2014 |
On the practicality of cryptographic defences against pollution attacks in wireless network coding A Newell, J Dong, C Nita-Rotaru ACM Computing Surveys (CSUR) 45 (3), 1-26, 2013 | 15 | 2013 |
IOCost: block IO control for containers in datacenters T Heo, D Schatzberg, A Newell, S Liu, S Dhakshinamurthy, I Narayanan, ... Proceedings of the 27th ACM International Conference on Architectural …, 2022 | 13 | 2022 |
Biometric methods for online user authentication A Bud, A Newell US Patent 10,951,613, 2021 | 12 | 2021 |
" Tattered to Pieces": Amy Fiske's Sampler and the Changing Roles of Women in Antebellum New England AE Newell na, 1750 | 10 | 1750 |