Microsoft at ASPLOS 2024: Advancing hardware and software for high-scale, secure, and efficient modern applications
Publication Forepressure Transmission Control for Wireless Video Sensor Networks Chong Luo, Wei Pu, Chang Wen Chen, Jun Sun, Feng Wu 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks | June 2009 ISBN: 978-1-4244-2907-3
Publication Redundancy in Network Traffic: Findings and Implications Ashok Anand, Chitra Muthukrishnan, Aditya Akella, Ramachandran Ramjee Proceedings of ACM SIGMETRICS/Performance | June 2009 Project
Publication StrobeLight: Lightweight Availability Mapping and Anomaly Detection James Mickens, John (JD) Douceur, Bill Bolosky, Brian D. Noble Proceedings of USENIX Technical | June 2009
Publication A Case for Bufferless Routing in On-Chip Networks Thomas Moscibroda, Onur Mutlu ISCA 2009-36th International Symposium on Computer Architecture (ISCA) | June 2009
Publication A Survey of Incentive Mechanisms in Peer-to-Peer Systems Muntasir Raihan Rahman | June 2009 Published by University of Waterloo
Publication An Agile Radio Framework for Unmanaged Wireless Environments Zhou Wang, Ranveer Chandra, Thomas Moscibroda, Alain Gefflaut, Alexandre de Baynast, Victor Bahl MobiHoc ’09 Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, New Orleans, LA, USA | May 2009 ISBN: 978-1-60558-624-3 Pages 333-334. Accepted as demo.
Publication On Mechanism Design Without Payments for Throughput Maximization Thomas Moscibroda, Stefan Schmid INFOCOM 2009: 28th Annual IEEE Conference on Computer Communications, Rio de Janeiro, Brazil | May 2009
Publication Characterizing Podcast Services: Publishing, Usage, and Dissemination Milan Vojnovic, Alexandre Proutiere, Thomas Karagiannis, Dinan Gunawardena MSR-TR-2009-58 | May 2009
Publication Pretty-Bad-Proxy: An Overlooked Adversary in Browsers’ HTTPS Deployments Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang Proceedings of the IEEE Symposium on Security and Privacy (Oakland) | May 2009 Proceedings of the IEEE Symposium on Security and Privacy (Oakland)