default search action
Andrew Newell
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2014
- [b1]Andrew Newell:
Achieving resilient networks with diversity and network coding. Purdue University, USA, 2014
Journal Articles
- 2023
- [j6]Tejun Heo, Dan Schatzberg, Andrew Newell, Song Liu, Saravanan Dhakshinamurthy, Iyswarya Narayanan, Josef Bacik, Chris Mason, Chunqiang Tang, Dimitrios Skarlatos:
IOCost: Block Input-Output Control for Containers in Datacenters. IEEE Micro 43(4): 80-87 (2023) - 2015
- [j5]Andrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir:
Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes. IEEE Trans. Dependable Secur. Comput. 12(6): 602-614 (2015) - 2014
- [j4]Andrew Newell, Hongyi Yao, Alex Ryker, Tracey Ho, Cristina Nita-Rotaru:
Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols. ACM Comput. Surv. 47(2): 24:1-24:34 (2014) - 2013
- [j3]Andrew Newell, Jing Dong, Cristina Nita-Rotaru:
On the practicality of cryptographic defences against pollution attacks in wireless network coding. ACM Comput. Surv. 45(3): 39:1-39:26 (2013) - 2011
- [j2]Andrew Newell, Kemal Akkaya:
Distributed collaborative camera actuation for redundant data elimination in wireless multimedia sensor networks. Ad Hoc Networks 9(4): 514-527 (2011) - 2009
- [j1]Kemal Akkaya, Andrew Newell:
Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks. Comput. Commun. 32(7-10): 1233-1244 (2009)
Conference and Workshop Papers
- 2024
- [c13]Neeraj Kumar, Pol Mauri Ruiz, Vijay Menon, Igor Kabiljo, Mayank Pundir, Andrew Newell, Daniel Lee, Liyuan Wang, Chunqiang Tang:
Optimizing Resource Allocation in Hyperscale Datacenters: Scalability, Usability, and Experiences. OSDI 2024: 507-528 - 2022
- [c12]Tejun Heo, Dan Schatzberg, Andrew Newell, Song Liu, Saravanan Dhakshinamurthy, Iyswarya Narayanan, Josef Bacik, Chris Mason, Chunqiang Tang, Dimitrios Skarlatos:
IOCost: block IO control for containers in datacenters. ASPLOS 2022: 595-608 - 2021
- [c11]Andrew Newell, Dimitrios Skarlatos, Jingyuan Fan, Pavan Kumar, Maxim Khutornenko, Mayank Pundir, Yirui Zhang, Mingjun Zhang, Yuanlai Liu, Linh Le, Brendon Daugherty, Apurva Samudra, Prashasti Baid, James Kneeland, Igor Kabiljo, Dmitry Shchukin, Andre Rodrigues, Scott Michelson, Ben Christensen, Kaushik Veeraraghavan, Chunqiang Tang:
RAS: Continuously Optimized Region-Wide Datacenter Resource Allocation. SOSP 2021: 505-520 - 2019
- [c10]David Chou, Tianyin Xu, Kaushik Veeraraghavan, Andrew Newell, Sonia Margulis, Lin Xiao, Pol Mauri Ruiz, Justin Meza, Kiryong Ha, Shruti Padmanabha, Kevin Cole, Dmitri Perelman:
Taiji: managing global user traffic for large-scale internet services at the edge. SOSP 2019: 430-446 - 2016
- [c9]Andrew Newell, Gabriel Kliot, Ishai Menache, Aditya Gopalan, Soramichi Akiyama, Mark Silberstein:
Optimizing distributed actor systems for dynamic interactive services. EuroSys 2016: 38:1-38:15 - [c8]Daniel Obenshain, Thomas Tantillo, Amy Babay, John L. Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, Cristina Nita-Rotaru:
Practical Intrusion-Tolerant Networks. ICDCS 2016: 45-56 - 2014
- [c7]Andrew Newell, Rahul Potharaju, Luojie Xiang, Cristina Nita-Rotaru:
On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis. AISec@CCS 2014: 83-93 - 2013
- [c6]Andrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir:
Increasing network resiliency by optimally assigning diverse variants to routing nodes. DSN 2013: 1-12 - 2012
- [c5]Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, Xiangyu Zhang:
Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques. ESSoS 2012: 106-120 - [c4]Andrew Newell, Cristina Nita-Rotaru:
Split Null Keys: A null space based defense for pollution attacks in wireless network coding. SECON 2012: 479-487 - [c3]Andrew Newell, Reza Curtmola, Cristina Nita-Rotaru:
Entropy attacks and countermeasures in wireless network coding. WISEC 2012: 185-196 - 2010
- [c2]Andrew Newell, Kemal Akkaya, Enes Yildiz:
Providing multi-perspective event coverage in wireless multimedia sensor networks. LCN 2010: 464-471 - 2009
- [c1]Andrew Newell, Kemal Akkaya:
Self-Actuation of Camera Sensors for Redundant Data Elimination in Wireless Multimedia Sensor Networks. ICC 2009: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-28 21:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint