Andrew Newell
Cited by
Cited by
Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks
K Akkaya, A Newell
Computer Communications 32 (7-10), 1233-1244, 2009
Plagiarizing smartphone applications: attack strategies and defense techniques
R Potharaju, A Newell, C Nita-Rotaru, X Zhang
Engineering Secure Software and Systems: 4th International Symposium, ESSoS …, 2012
Real-time visual feedback for user positioning with respect to a camera and a display
A Bud, A Newell, J Palmer
US Patent 9,412,169, 2016
On the practicality of integrity attacks on document-level sentiment analysis
A Newell, R Potharaju, L Xiang, C Nita-Rotaru
Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014
Distributed collaborative camera actuation for redundant data elimination in wireless multimedia sensor networks
A Newell, K Akkaya
Ad Hoc Networks 9 (4), 514-527, 2011
Increasing network resiliency by optimally assigning diverse variants to routing nodes
A Newell, D Obenshain, T Tantillo, C Nita-Rotaru, Y Amir
IEEE Transactions on Dependable and Secure Computing 12 (6), 602-614, 2014
Taiji: managing global user traffic for large-scale internet services at the edge
D Chou, T Xu, K Veeraraghavan, A Newell, S Margulis, L Xiao, PM Ruiz, ...
Proceedings of the 27th ACM symposium on operating systems principles, 430-446, 2019
Node-capture resilient key establishment in sensor networks: Design space and new protocols
A Newell, H Yao, A Ryker, T Ho, C Nita-Rotaru
ACM Computing Surveys (CSUR) 47 (2), 1-34, 2014
Optimizing distributed actor systems for dynamic interactive services
A Newell, G Kliot, I Menache, A Gopalan, S Akiyama, M Silberstein
Proceedings of the Eleventh European Conference on Computer Systems, 1-15, 2016
Practical intrusion-tolerant networks
D Obenshain, T Tantillo, A Babay, J Schultz, A Newell, ME Hoque, Y Amir, ...
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
RAS: continuously optimized region-wide datacenter resource allocation
A Newell, D Skarlatos, J Fan, P Kumar, M Khutornenko, M Pundir, ...
Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles …, 2021
Entropy attacks and countermeasures in wireless network coding
AJ Newell, R Curtmola, C Nita-Rotaru
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
Providing multi-perspective event coverage in wireless multimedia sensor networks
A Newell, K Akkaya, E Yildiz
IEEE Local Computer Network Conference, 464-471, 2010
Split null keys: A null space based defense for pollution attacks in wireless network coding
A Newell, C Nita-Rotaru
2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2012
Self-actuation of camera sensors for redundant data elimination in wireless multimedia sensor networks
A Newell, K Akkaya
2009 IEEE International Conference on Communications, 1-5, 2009
A stitch in time: the needlework of aging women in antebellum America
AE Newell
Ohio University Press, 2014
On the practicality of cryptographic defences against pollution attacks in wireless network coding
A Newell, J Dong, C Nita-Rotaru
ACM Computing Surveys (CSUR) 45 (3), 1-26, 2013
IOCost: block IO control for containers in datacenters
T Heo, D Schatzberg, A Newell, S Liu, S Dhakshinamurthy, I Narayanan, ...
Proceedings of the 27th ACM International Conference on Architectural …, 2022
Biometric methods for online user authentication
A Bud, A Newell
US Patent 10,951,613, 2021
" Tattered to Pieces": Amy Fiske's Sampler and the Changing Roles of Women in Antebellum New England
AE Newell
na, 1750
The system can't perform the operation now. Try again later.
Articles 1–20