Papers Written by John Heidemann

A list of papers written or co-written by John Heidemann is below, sorted by subject. This page includes only primary papers and omits some technical reports and papers that have been superseded. To see everything, go to the comprehensive, chronological list of papers (in reverse order of publication). For a less terse description of what I've done, check out my research.

The subjects (with links in this page):

Denial-of-service and network security

Thatte10a
Gautam Thatte, Urbashi Mitra, and John Heidemann. Parametric Methods for Anomaly Detection in Aggregate Traffic. ACM/IEEE Transactions on Networking, 19 (2 ), pp. 512-525, August, 2010. (Appeared in print April 2011). <http://dx.doi.org/10.1109/TNET.2010.2070845>, <http://www.isi.edu/~johnh/PAPERS/Thatte10a.html>.

Wilcox10a
Chris Wilcox, Christos Papadopoulos, and John Heidemann. Correlating Spam Activity with IP Address Characteristics. In Proceedings of the IEEE Global Internet Symposium, p. to appear. San Diego, California, USA, IEEE. March, 2010. <http://www.isi.edu/~johnh/PAPERS/Wilcox10a.html>.

Hussain06a
Alefiya Hussain, John Heidemann, and Christos Papadopoulos. Identification of Repeated Denial of Service Attacks. In Proceedings of the IEEE Infocom, p. to appear. Barcelona, Spain, IEEE. April, 2006. <http://www.isi.edu/~johnh/PAPERS/Hussain06a.html>.

Chen04a
Xuan Chen and John Heidemann. Detecting Early Worm Propagation through Packet Matching. Technical Report ISI-TR-2004-585, USC/Information Sciences Institute, February, 2004. <http://www.isi.edu/~johnh/PAPERS/Chen04a.html>.

Hussain04b
Alefiya Hussain, John Heidemann, and Christos Papadopoulos. Distinguishing between Single and Multi-source Attacks using Signal Processing. Computer Networks, 46 (4 ), pp. 479-503, November, 2004. This paper is an expanded version of ``A Framework for Classifying Denial of Service Attacks''. <http://www.isi.edu/~johnh/PAPERS/Hussain04b.html>.

Hussain03c
Alefiya Hussain, John Heidemann, and Christos Papadopoulos. Identification of Repeated DoS Attacks using Network Traffic Forensics. Technical Report ISI-TR-2003-577b, USC/Information Sciences Institute, August, 2003. Originally released August 2003, updated June 2004. <http://www.isi.edu/~johnh/PAPERS/Hussain03c.html>.

Hussain03b
Alefiya Hussain, John Heidemann, and Christos Papadopoulos. A Framework for Classifying Denial of Service Attacks. In Proceedings of the ACM SIGCOMM Conference, pp. 99-110. Karlsruhe, Germany, ACM. August, 2003. <http://www.isi.edu/~johnh/PAPERS/Hussain03b.html>.

Hussain03a
Alefiya Hussain, John Heidemann, and Christos Papadopoulos. A Framework for Classifying Denial of Service Attacks-extended. Technical Report ISI-TR-2003-569b, USC/Information Sciences Institute, June, 2003. (Original TR, February 2003, updated June 2003). <http://www.isi.edu/~johnh/PAPERS/Hussain03a.html>.

Spectral analysis of network traffic

See also Denial-of-service and network security.

Bartlett11a
Genevieve Bartlett, John Heidemann, and Christos Papadopoulos. Low-Rate, Flow-Level Periodicity Detection. In Proceedings of the 14th IEEE Global Internet Symposium, pp. 804-809. Shanghai, China, IEEE. April, 2011. <http://dx.doi.org/10.1109/INFCOMW.2011.5928922>, <http://www.isi.edu/~johnh/PAPERS/Bartlett11a.html>.

Bartlett09a
Genevieve Bartlett, John Heidemann, and Christos Papadopoulos. Using Low-Rate Flow Periodicities for Anomaly Detection: Extended. Technical Report ISI-TR-2009-661, USC/Information Sciences Institute, August, 2009. <http://www.isi.edu/~johnh/PAPERS/Bartlett09a.html>.

He09a
Xinming He, Christos Papadopoulos, John Heidemann, Urbashi Mitra, and Usman Riaz. Remote Detection of Bottleneck Links Using Spectral and Statistical Methods. Computer Networks, 53 (3 ), pp. 279-298, February, 2009. <doi: 10.1016/j.comnet.2008.10.001>, <http://www.isi.edu/~johnh/PAPERS/He09a.html>.

Thatte08a
Gautam Thatte, Urbashi Mitra, and John Heidemann. Detection of Low-Rate Attacks in Computer Networks. In Proceedings of the 11th IEEE Global Internet Symposium, pp. 1-6. Phoenix, Arizona, USA, IEEE. April, 2008. <doi:10.1109/INFOCOM.2008.4544638>, <http://www.isi.edu/~johnh/PAPERS/Thatte08a.html>.

Mitra06a
Urbashi Mitra, John Heidemann Antonio Ortega, and Christos Papadopoulos. Detecting and Identifying Malware: A New Signal Processing Goal. IEEE Signal Processing Magazine, 23 (5 ), pp. 107-111, September, 2006. <http://www.isi.edu/~johnh/PAPERS/Mitra06a.html>.

He05a
Xinming He, Christos Papadopoulos, John Heidemann, Urbashi Mitra, Usman Riaz, and Alefiya Hussain. Spectral Analysis of Bottleneck Traffic. Technical Report USC-CSD-TR-05-854, University of Southern California Computer Science Department, May, 2005. <http://www.isi.edu/~johnh/PAPERS/He05a.html>.

Sinha05a
Rishi Sinha, Christos Papadopoulos, and John Heidemann. Fingerprinting Internet Paths using Packet Pair Dispersion. Technical Report 06-876, University of Southern California Computer Science Department, February, 2005. <http://www.isi.edu/~johnh/PAPERS/Sinha05a.html>.

He04a
Xinming He, Christos Papadopoulos, John Heidemann, and Alefiya Hussain. Spectral Characteristics of Saturated Links. Technical Report USC-CSD-TR-827, University of Southern California Computer Science Department, June, 2004. submitted for review. <http://www.isi.edu/~johnh/PAPERS/He04a.html>.

Service and Traffic Detection and Classification

See also Denial-of-service and network security.

Calder13a
Matt Calder, Xun Fan, Zi Hu, Ethan Katz-Bassett, John Heidemann, and Ramesh Govindan. Mapping the Expansion of Google's Serving Infrastructure. In Proceedings of the ACM Internet Measurement Conference, p. to appear. Barcelona, Spain, ACM. October, 2013. <http://www.isi.edu/~johnh/PAPERS/Calder13a.html>.

Heidemann13f
John Heidemann. Evaluating Anycast in the Domain Name System. Presentation at DNS-OARC Meeting. May, 2013. <http://www.isi.edu/~johnh/PAPERS/Heidemann13f.html>.

Fan13a
Xun Fan, John Heidemann, and Ramesh Govindan. Evaluating Anycast in the Domain Name System. In Proceedings of the IEEE Infocom, p. to appear. Turin, Italy, IEEE. April, 2013. <http://www.isi.edu/~johnh/PAPERS/Fan13a.html>.

Bartlett07d
Genevieve Bartlett, John Heidemann, and Christos Papadopoulos. Understanding Passive and Active Service Discovery. In Proceedings of the ACM Internet Measurement Conference, p. 55--60. San Diego, California, USA, ACM. October, 2007. <http://www.isi.edu/~johnh/PAPERS/Bartlett07d.html>.

Bartlett07c
Genevieve Bartlett, John Heidemann, Christos Papadopoulos, and James Pepin. Estimating P2P Traffic Volume at USC. Technical Report ISI-TR-2007-645, USC/Information Sciences Institute, June, 2007. <http://www.isi.edu/~johnh/PAPERS/Bartlett07c.html>.

Bartlett07b
Genevieve Bartlett, John Heidemann, and Christos Papadopoulos. Understanding Passive and Active Service Discovery (extended). Technical Report ISI-TR-2007-642, USC/Information Sciences Institute, May, 2007. To appear, ACM Internet Measurement Conference 2007. <http://www.isi.edu/~johnh/PAPERS/Bartlett07b.html>.

Bartlett07a
Genevieve Bartlett, John Heidemann, and Christos Papadopoulos. Inherent Behaviors for On-line Detection of Peer-to-Peer File Sharing. In Proceedings of the 10th IEEE Global Internet, Anchorage, Alaska, USA, IEEE. May, 2007. An extended version of this paper is available as ISI-TR-2006-627. <http://www.isi.edu/~johnh/PAPERS/Bartlett07a.html>.

Bartlett06a
Genevieve Bartlett, John Heidemann, and Christos Papadopoulos. Inherent Behaviors for On-line Detection of Peer-to-Peer File Sharing (extended). Technical Report ISI-TR-2006-627, USC/Information Sciences Institute, December, 2006. <http://www.isi.edu/~johnh/PAPERS/Bartlett06a.html>.

Traffic Modeling and Data Collection

Heidemann14b
John Heidemann. Sharing Network Data: Bright Gray Days Ahead. Keynote talk at Passive and Active Measurements Conference. March, 2014. <http://www.isi.edu/~johnh/PAPERS/Heidemann14b.html>.

Quan10a
Lin Quan and John Heidemann. On the Characteristics and Reasons of Long-lived Internet Flows. In Proceedings of the ACM Internet Measurement Conference, p. 444--450. Melbourne, Australia, ACM. November, 2010. <http://www.isi.edu/~johnh/PAPERS/Quan10a.html>.

Heidemann09a
John Heidemann and Christos Papadopoulos. Uses and Challenges for Network Datasets. In Proceedings of the IEEE Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH), p. to appear. Washington, DC, USA, IEEE. March, 2009. <http://www.isi.edu/~johnh/PAPERS/Heidemann09a.html>.

Heidemann09b
John Heidemann. USC/LANDER Passive and Active Data Collection. Lightning talk at CAIDA AIMS Workshop. February, 2009. <http://www.isi.edu/~johnh/PAPERS/Heidemann09b.html>.

Sinha07a
Rishi Sinha, Christos Papadopoulos, and John Heidemann. Internet Packet Size Distributions: Some Observations. Technical Report ISI-TR-2007-643, USC/Information Sciences Institute, May, 2007. Originally released October 2005 as web page http://netweb.usc.edu/ rsinha/pkt-sizes/. <http://www.isi.edu/~johnh/PAPERS/Sinha07a.html>.

Lan06a
Kun-chan Lan and John Heidemann. A Measurement Study of Correlation of Internet Flow Characteristics. Computer Networks, 50 (1 ), pp. 46-62, January, 2006. <http://www.isi.edu/~johnh/PAPERS/Lan06a.html>.

Lan05a
Kun-chan Lan and John Heidemann. On the feasibility of utilizing correlations between user populations for traffic inference. In Proceedings of the 30th IEEE International Conference on Local Computer Networks, pp. 132-139. Sydney, Australia, IEEE. November, 2005. <http://www.isi.edu/~johnh/PAPERS/Lan05a.html>.

Hussain05b
Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin, John Heidemann, Christos Papadopoulos, and Joseph Bannister. Experiences with a Continuous Network Tracing Infrastructure. In Proceedings of the ACM SIGCOMM MineNet Workshop , pp. 185-190. Philadelphia, PA, USA, ACM. August, 2005. <http://www.isi.edu/~johnh/PAPERS/Hussain05b.html>.

Lan03b
Kun-chan Lan and John Heidemann. A Tool for RApid Model Parametrization and its Applications. In Proceedings of the Workshop on Models, Methods and Tools for Reproducible Network Research (MoMeTools), p. to appear. Karlsruhe, Germany, ACM. August, 2003. <http://www.isi.edu/~johnh/PAPERS/Lan03b.html>.

Kamath02a
Purushotham Kamath, Kun-chan Lan, John Heidemann, Joe Bannister, and Joe Touch. Generation of High Bandwidth Network Traffic Traces. In Proceedings of the International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 401-410. Fort Worth, Texas, USA, USC/Information Sciences Institute, IEEE. October, 2002. <http://www.isi.edu/~johnh/PAPERS/Kamath02a.html>.

Lan02c
Kun-Chan Lan and John Heidemann. Rapid model parameterization from traffic measurement. ACM Transactions on Modeling and Computer Simulations, 12 (3 ), pp. 201-229, July, 2002. <http://www.isi.edu/~johnh/PAPERS/Lan02c.html>.

Lan01a
Kun-chan Lan and John Heidemann. Structural Modeling of RealAudio Traffic. Technical Report ISI-TR-544, USC/Information Sciences Institute, September, 2001. <http://www.isi.edu/~johnh/PAPERS/Lan01a.html>.

Mena00a
Art Mena and John Heidemann. An Empirical Study of Real Audio Traffic. In Proceedings of the IEEE Infocom, p. 101-110. Tel-Aviv, Israel, IEEE. March, 2000. <http://www.isi.edu/~johnh/PAPERS/Mena00a.html>.

Internet Routing and Reliability

Quan14c
Lin Quan, John Heidemann, and Yuri Pradkin. When the Internet Sleeps: Correlating Diurnal Networks With External Factors. In Proceedings of the ACM Internet Measurement Conference, p. to appear. Vancouver, BC, Canada, ACM. November, 2014. <http://www.isi.edu/~johnh/PAPERS/Quan14b.html>.

Heidemann14e
John Heidemann. Internet Populations (Good and Bad): Measurement, Estimation, and Correlation. Presentation at ICERM Workshop on Cybersecurity. Providence, Rhode Island. October, 2014. <http://www.isi.edu/~johnh/PAPERS/Heidemann14e.html>.

Quan14b
Lin Quan, John Heidemann, and Yuri Pradkin. When the Internet Sleeps: Correlating Diurnal Networks With External Factors (extended). Technical Report ISI-TR-2014-691b, USC/Information Sciences Institute, May, 2014. (updated August 2014). <http://www.isi.edu/~johnh/PAPERS/Quan14b.html>.

Hu14b
Zi Hu, Liang Zhu, Calvin Ardi, Ethan Katz-Bassett, Harsha V. Madhyastha, John Heidemann, and Minlan Yu. The Need for End-to-End Evaluation of Cloud Availability. In Proceedings of the Passive and Active Measurement Workshop, pp. 119-130. Marina del Rey, California, USA, Springer. March, 2014. <doi:10.1007/978-3-319-04918-2_12>, <http://www.isi.edu/~johnh/PAPERS/Hu14b.html>.

Heidemann14a
John Heidemann. Broadening Network Performance: The Edge and Outages. Presentation at the Second perfSONAR NSF Workshop. February, 2014. <http://www.isi.edu/~johnh/PAPERS/Heidemann14a.html>.

Cai13c
Xue Cai, John Heidemann, and Walter Willinger. A Holistic Framework for Bridging Regional Threats to User QoE. Technical Report ISI-TR-2013-687, USC/Information Sciences Institute, December, 2013. <http://www.isi.edu/~johnh/PAPERS/Cai13c.html>.

Quan13c
Lin Quan, John Heidemann, and Yuri Pradkin. Trinocular: Understanding Internet Reliability Through Adaptive Probing. In Proceedings of the ACM SIGCOMM Conference , p. to appear. Hong Kong, China, ACM. August, 2013. <http://www.isi.edu/~johnh/PAPERS/Quan13c.html>.

Heidemann13b
John Heidemann. Active Probing of Edge Networks: Outages During Hurricane Sandy. Talk given at NANOG57 as part of panel hosted by James Cowie. February, 2013. <http://www.isi.edu/~johnh/PAPERS/Heidemann13b.html>.

Heidemann13d
John Heidemann. Active Probing of Edge Networks: Hurricane Sandy and Beyond. Talk given at FCC Workshop on Network Resiliency. February, 2013. <http://www.isi.edu/~johnh/PAPERS/Heidemann13d.html>.
Heidemann13c
John Heidemann. Third-Party Measurement of Network Outages in Hurricane Sandy. In Proceedings of the FCC Workshop on Network Resiliency, Brooklyn, New York, USA, February, 2013. <http://www.isi.edu/~johnh/PAPERS/Heidemann13d.html>.

Heidemann13e
John Heidemann. Long-term Data Collection and Analysis of Outages at the Edge. Talk given at CAIDA Workshop on Active Internet Measurement Systems. February, 2013. <http://www.isi.edu/~johnh/PAPERS/Heidemann13e.html>.

Quan13a
Lin Quan, John Heidemann, and Yuri Pradkin. Poster Abstract: Towards Active Measurements of Edge Network Outages. In Proceedings of the Passive and Active Measurement Workshop, p. to appear. Hong Kong, China, Springer. March, 2013. <http://www.isi.edu/~johnh/PAPERS/Quan13a.html>.

Heidemann12d
John Heidemann, Lin Quan, and Yuri Pradkin. A Preliminary Analysis of Network Outages During Hurricane Sandy. Technical Report ISI-TR-2008-685b, USC/Information Sciences Institute, November, 2012. (Updated Feb. 2013.) <http://www.isi.edu/~johnh/PAPERS/Heidemann12d.html>.

Quan12a
Lin Quan, John Heidemann, and Yuri Pradkin. Detecting Internet Outages with Precise Active Probing (extended). Technical Report ISI-TR-2012-678b, USC/Information Sciences Institute, February, 2012. Updated May 2012; TR-678 superceeds ISI-TR-2011-672. <http://www.isi.edu/~johnh/PAPERS/Quan12a.html>.

Quan11a
Lin Quan and John Heidemann. Detecting Internet Outages with Active Probing (extended). Technical Report ISI-TR-2011-672, USC/Information Sciences Institute, May, 2010. <http://www.isi.edu/~johnh/PAPERS/Quan11a.html>.

Chang04b
Di-Fa Chang, Ramesh Govindan, and John Heidemann. Locating BGP Missing Routes Using Multiple Perspectives. In ACM SIGCOMM Workshop Network Troubleshooting, pp. 301-306. Portland, Oregon, USA, ACM. September, 2004. <http://www.isi.edu/~johnh/PAPERS/Chang04b.html>.

Chang03a
Di-Fa Chang, Ramesh Govindan, and John Heidemann. The Temporal and Topological Characteristics of BGP Path Changes. In Proceedings of the International Conference on Network Protocols, pp. 190-199. Atlanta, Georgia, USA, IEEE. November, 2003. <http://www.isi.edu/~johnh/PAPERS/Chang03a.html>.

Chang02a
Di-Fa Chang, Ramesh Govindan, and John Heidemann. An Empirical Study of Router Response to Large BGP Routing Table Load. In Proceedings of the ACM SIGCOMM Internet Measurement Workshop, pp. 203-208. Marseilles, France, USC/Information Sciences Institute, ACM. November, 2002. <http://www.isi.edu/~johnh/PAPERS/Chang02a.html>.

General Networking

Dutta05a
Debojyoti Dutta, Abhimanyu Das, Ashish Goel, Ahmed Helmy, and John Heidemann. Low State Fairness: Lower Bounds and Practical Enforcement. In Proceedings of the IEEE Infocom, p. to appear. Miami, Florida, USA, IEEE. March, 2005. <http://www.isi.edu/~johnh/PAPERS/Dutta05a.html>.

Dutta03a
Debojyoti Dutta, Ashish Goel, and John Heidemann. Oblivious AQM and Nash Equilibria. In Proceedings of the IEEE Infocom, pp. 106-113. San Francisco, California, USA, IEEE. March, 2003. <http://www.isi.edu/~johnh/PAPERS/Dutta03a.html>.

Dutta02c
Debojyoti Dutta, Ashish Goel, and John Heidemann. Oblivious AQM and Nash Equilibria (abstract for SIGCOMM Poster). ACM Computer Communication Review, 32 (3 ), p. 20, July, 2002. For full paper, see USC-CS-TR-764, July 2002. <http://www.isi.edu/~johnh/PAPERS/Dutta02c.html>.

Dutta02b
Debojyoti Dutta, Ashish Goel, and John Heidemann. Oblivious AQM and Nash Equilibria. Technical Report 02-764, University of Southern California Computer Science Department, July, 2002. <http://www.isi.edu/~johnh/PAPERS/Dutta02b.html>.

Allman00a
M. Allman, S. Dawkins, D. Glover, J. Griner, D. Tran, T. Henderson, J. Heidemann, J. Touch, H. Kruse, S. Ostermann, K. Scott, and J. Semke. Ongoing TCP Research Related to Satellites. RFC2760, Internet Request For Comments, February, 2000. <http://www.isi.edu/~johnh/PAPERS/Allman00a.html>.

Analysis of the Domain-Name System

Zhu14b
Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin, and Nikita Somaiya. T-DNS: Connection-Oriented DNS to Improve Privacy and Security (extended). Technical Report ISI-TR-2014-693, USC/Information Sciences Institute, June, 2014. <http://www.isi.edu/~johnh/PAPERS/Zhu14b.html>.

Heidemann14c
John Heidemann. T-DNS: Connection-Oriented DNS to Improve Privacy and Security. Presentation at the Spring DNS-OARC Meeting. May, 2014. This talk is about the technical report ISI-TR-2014-688, joint work with Liang Zhu, Zi Hu, duane Wessels, Allison Mankin, and Nikita Somaiya. <http://www.isi.edu/~johnh/PAPERS/Heidemann14c.html>.

Heidemann12c
John Heidemann. Broadening DNS Research: beyond just DNS anonymization (work in progress). Talk at ISC/CAIDA Data Collaboration Workshop. October, 2012. <http://www.isi.edu/~johnh/PAPERS/Heidemann12c.html>.

World-Wide Web

Ardi14a
Calvin Ardi and John Heidemann. Web-scale Content Reuse Detection (extended). Technical Report ISI-TR-2014-692, USC/Information Sciences Institute, June, 2014. <http://www.isi.edu/~johnh/PAPERS/Ardi14a.html>.

Chen05a
Xuan Chen and John Heidemann. Flash Crowd Mitigation via Adaptive Admission Control Based on Application-Level Observation. ACM Transactions on Internet Technology, 5 (3 ), pp. 532-562, August, 2005. <http://www.isi.edu/~johnh/PAPERS/Chen05a.html>.

Chen03a
Xuan Chen and John Heidemann. Preferential Treatment for Short Flows to Reduce Web Latency. Computer Networks, 41 (6 ), pp. 779-794, April, 2003. <http://www.isi.edu/~johnh/PAPERS/Chen03a.html>.

Eggert00a
Lars Eggert, John Heidemann, and Joe Touch. Effects of Ensemble-TCP. ACM Computer Communication Review, 30 (1), pp. 15-29, January, 2000. <http://www.isi.edu/~johnh/PAPERS/Eggert00a.html>.

Eggert99a
Lars Eggert and John Heidemann. Application-level Differentiated Services for Web Servers. World-Wide Web Journal, 2 (3), pp. 133-142, August, 1999. <http://www.isi.edu/~johnh/PAPERS/Eggert99a.html>.

Heidemann98g
John Heidemann and Vikram Visweswaraiah. Automatic Selection of Nearby Web Servers. Technical Report 98-688, University of Southern California, December, 1998.

Heidemann98f
John Heidemann and Wenhui Zhao. Multi-way Rendezvous in the Web. Technical Report 98-687, University of Southern California, December, 1998. Submitted for publication.

Touch98d
Joe Touch, John Heidemann, and Katia Obraczka. Analysis of HTTP Performance. Research Report 98-463, USC/Information Sciences Institute, August, 1998. A revised version of a web page made public in June 1996.

Heidemann97b
John Heidemann, Katia Obraczka, and Joe Touch. Modeling the Performance of HTTP Over Several Transport Protocols. ACM/IEEE Transactions on Networking, 5 5, 616-630, October, 1997.

Visweswaraiah97b
Vikram Visweswaraiah and John Heidemann. Improving Restart of Idle TCP Connections. Technical Report 97-661, University of Southern California, November, 1997.

Heidemann97a
John Heidemann. Performance Interactions Between P-HTTP and TCP Implementations. ACM Computer Communication Review, 27 2, 65-73, April, 1997. Draft versions were available in 1996 as [Heidemann96b].

Heidemann96a
John Heidemann, Katia Obraczka, and Joe Touch. Modeling the Performance of HTTP Over Several Transport Protocols. To appear, IEEE/ACM Transactions on Networking. Originally announced November 1996. Draft as of June 1997.

Networking Education

Papadopoulos02a
Christos Papadopoulos and John Heidemann. Using Ns in the Classroom and Lab. In Proceedings of the ACM SIGCOMM Workshop on Computer Networking: Curriculum Designs and Educational Challenges, pp. 45-46. Pittsburgh, PA, USA, ACM. August, 2002. <http://www.isi.edu/~johnh/PAPERS/Papadopoulos02a.html>.

General sensor nets and embedded nets

Paradiso08a
Joseph A. Paradiso, John Heidemann, and Thomas G. Zimmerman. Hacking is Pervasive. IEEE Pervasive Computing Magazine, 7 (3 ), pp. 13-15, July, 2008. (Special issue guest editors). <http://www.isi.edu/~johnh/PAPERS/Paradiso08a.html>.

Heidemann07b
John Heidemann. Sensornets and the Next Big Thing. Keynote talk at the European Conference on Wireless Sensor Networks. January, 2007. <http://www.isi.edu/~johnh/PAPERS/Heidemann07b.html>.

Heidemann06d
John Heidemann. Sensornet Research Opportunities in GENI and FIND, Invited talk at IEEE MASS. October, 2006. <http://www.isi.edu/~johnh/PAPERS/Heidemann06d.html>.

Ganesan05a
Deepak Ganesan, Ben Greenstein, Deborah Estrin, John heidemann, and Ramesh Govindan. Multiresolution storage and search in sensor networks. ACM Transactions on Storage, 1 (3 ), pp. 277-315, August, 2005. <http://www.isi.edu/~johnh/PAPERS/Ganesan05a.html>.

Heidemann05a
John Heidemann and Wei Ye. Energy Conservation in Sensor Networks at the Link and Network Layers. In Wireless Sensor Networks: A Systems Perspective, Nirupama Bulusu and Sanjay Jha, editors, pp. 75-86. Artech House, Inc.. 2005. Chapter 6. <http://www.isi.edu/~johnh/PAPERS/Heidemann05a.html>.

Heidemann04c
John Heidemann and Wei Ye. Energy Conservation in Sensor Networks at the Link and Network Layers. Technical Report ISI-TR-2004-599, USC/Information Sciences Institute, 2004. book chapter to appear in Wireless Sensor Networks: A Systems Perspective, Nirupama Bulusu and Sanjay Jha (editors), Artech House, 2005. <http://www.isi.edu/~johnh/PAPERS/Heidemann04c.html>.

Heidemann05c
John Heidemann and Ramesh Govindan. Embedded Sensor Networks. In Handbook of Networked and Embedded Control Systems, D. Hristu-Varsakelis and W.S. Levine, editors, pp. 721-738. Springer Verlag. 2005. <http://www.isi.edu/~johnh/PAPERS/Heidemann05c.html>.

Conner05a
W. Steven Conner, John Heidemann, Lakshman Krishnamurthy, Xi Wang, and Mark Yarvis. Workplace Applications of Sensor Networks. In Wireless Sensor Networks: A Systems Perspective, Nirupama Bulusu and Sanjay Jha, editors, pp. 289-307. Artech House, Inc.. 2005. Chapter 19. <http://www.isi.edu/~johnh/PAPERS/Conner05a.html>.

Heidemann04a
John Heidemann and Ramesh Govindan. An Overview of Embedded Sensor Networks. Technical Report ISI-TR-2004-594, USC/Information Sciences Institute, November, 2004. <http://www.isi.edu/~johnh/PAPERS/Heidemann04a.html>.

Conner04a
W. Steven Conner, John Heidemann, Lakshman Krishnamurthy, Xi Wang, and Mark Yarvis. Workplace Applications of Sensor Networks. Technical Report ISI-TR-2004-591, USC/Information Sciences Institute, July, 2004. To appear as a chapter in Wireless Sensor Networks: A Systems Perspective, Nirupama Bulusu and Sanjay Jha, editors; Artech House, publisher (2004).. <http://www.isi.edu/~johnh/PAPERS/Conner04a.html>.

Ganesan03a
Deepak Ganesan, Ben Greenstein, Denis Perelyubskiy, Deborah Estrin, and John Heidemann. An Evaluation of Multi-resolution Storage for Sensor Networks. In Proceedings of the ACM SenSys Conference, pp. 89-102. Los Angeles, California, USA, ACM. November, 2003. <http://www.isi.edu/~johnh/PAPERS/Ganesan03a.html>.

Krishnamachari03a
Bhaskar Krishnamachari and John Heidemann. Application-specific Modeling of Information Routing in Sensor Networks. Technical Report ISI-TR-576, USC/Information Sciences Institute, August, 2003. <http://www.isi.edu/~johnh/PAPERS/Krishnamachari03a.html>.

Rahimi03a
Mohammad Rahimi, Hardik Shah, Gaurav Sukhatme, John Heidemann, and Deborah Estrin. Studying the Feasibility of Energy Harvesting in a Mobile Sensor Network. In Proceedings of the IEEE International Conference on Robotics and Automation, pp. 19-24. Taipai, Taiwan, IEEE. May, 2003. <http://www.isi.edu/~johnh/PAPERS/Rahimi03a.html>.

Ganesan02c
Deepak Ganesan, Deborah Estrin, and John Heidemann. DIMENSIONS: Why do we need a new Data Handling architecture for Sensor Networks? In Proceedings of the ACM Workshop on Hot Topics in Networks, pp. 143-148. Princeton, NJ, USA, ACM. October, 2002. <http://www.isi.edu/~johnh/PAPERS/Ganesan02c.html>.

Estrin00a
Deborah Estrin, Ramesh Govindan, and John Heidemann. Embedding the Internet. Communications of the ACM, 43 (5 ), pp. 39-41, May, 2000. (special issue guest editors). <http://www.isi.edu/~johnh/PAPERS/Estrin00a.html>.

Estrin99e
Deborah Estrin, Ramesh Govindan, John Heidemann, and Satish Kumar. Next Century Challenges: Scalable Coordination in Sensor Networks. In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, pp. 263-270. Seattle, Washington, USA, ACM. August, 1999. <http://www.isi.edu/~johnh/PAPERS/Estrin99e.html>.

Heidemann98d
John Heidemann, Ramesh Govindan, and Deborah Estrin. Configuration Challenges for Smart Spaces. In Proceedings of the DARPA/NIST Smart Spaces Workshop, Gaithersburg, Maryland, USA, USC/Information Sciences Institute, Defense Advanced Research Projects Agency. July, 1998.

Data Sharing in Sensornets

Park11a
Unkyu Park and John Heidemann. Data Muling with Mobile Phones for Sensornets. In Proceedings of the 9th ACM SenSys Conference , p. 162-175. Seattle, Washington, USA, ACM. November, 2011. <http://www.isi.edu/~johnh/PAPERS/Park11a.html>.

Park09a
Unkyu Park and John Heidemann. Low-latency Synchronization of Loosely-coupled Sensornet Republishing. Technical Report ISI-TR-2009-660b, USC/Information Sciences Institute, April, 2009. updated June 2010. <http://www.isi.edu/~johnh/PAPERS/Park09a.html>.

Park08b
Unkyu Park and John Heidemann. Provenance in Sensornet Republishing. In Proceedings of the 2nd International Provenance and Annotation Workshop , pp. 208-292. Salt Lake City, Utah, USA, Springer-Verlag. June, 2008. <http://www.isi.edu/~johnh/PAPERS/Park08b.html>.

Heidemann07d
John Heidemann. Data-Centric Networking as an ``Information Layer''. Lightning Talk at NSF FIND PI meeting. November, 2007. <http://www.isi.edu/~johnh/PAPERS/Heidemann07d.html>.

Reddy07a
Sasank Reddy, Gong Chen, Brian Fulkerson, Sung Jin Kim, Unkyu Park, Nathan Yau, Junghoo Cho, and John Heidemann Mark Hansen. Sensor-Internet Share and Search--Enabling Collaboration of Citizen Scientists. In Proceedings of the ACM Workshop on Data Sharing and Interoperability on the World-wide Sensor Web, pp. 11-16. Cambridge, Mass., USA, ACM. April, 2007. <http://www.isi.edu/~johnh/PAPERS/Reddy07a.html>.

Data Fusion in Sensornets

Zhang13b
Chengjie Zhang and John Heidemann. Reducing False Alarms with Multi-modal Sensing for Pipeline Blockage (extended). Technical Report ISI-TR-2013-686, USC/Information Sciences Institute, June, 2013. <http://www.isi.edu/~johnh/PAPERS/Zhang13b.html>.

Zhang11c
Chengjie Zhang and John Heidemann. Evaluating Signature Matching in a Multi-Sensor Vehicle Classification System (extended) . Technical Report ISI-TR-2011-675, USC/Information Sciences Institute, November, 2011. <http://www.isi.edu/~johnh/PAPERS/Zhang11c.html>.

Heidemann05d
John Heidemann, Fabio Silva, Xi Wang, Genevieve Giuliano, and Mengzhao Hu. SURE-SE: Sensors for Unplanned Roadway Events--Simulation and Evaluation: Final Report. METRANS Project 05-08 final report, USC/Information Sciences Institute, May, 2005. finalized July 2007; typographic corrections April 2008. <http://www.isi.edu/~johnh/PAPERS/Heidemann05d.html>.

Park06a
Unkyu Park, Fabio Silva, Mengzhao Hou, John Heidemann, Genevieve Guiliano, Xi Wang, and Nikhil Prashar. Single- and Multi-Sensor Techniques to Improve Accuracy of Urban Vehicle Classification. Technical Report ISI-TR-2006-614, USC/Information Sciences Institute, April, 2006. <http://www.isi.edu/~johnh/PAPERS/Park06a.html>.

Policy and privacy issues in sensor networks

Rajgarhia04a
Abhishek Rajgarhia, Fred Stann, and John Heidemann. Privacy-Sensitive Monitoring With a Mix of IR Sensors and Cameras. In Proceedings of the Second International Workshop on Sensor and Actor Network Protocols and Applications, pp. 21-29. Boston, Massachusetts, USA, ACM. August, 2004. <http://www.isi.edu/~johnh/PAPERS/Rajgarhia04a.html>.

Understanding wireless propagation

Son07b
Dongjin Son, John Heidemann, and Bhaskar Krishnamachari. Towards Concurrent Communication in Wireless Networks. Technical Report ISI-TR-2007-648, USC/Information Sciences Institute, July, 2007. <http://www.isi.edu/~johnh/PAPERS/Son07b.html>.

Son07a
Dongjin Son, Bhaskar Krishnamachari, and John Heidemann. Evaluating the Importance of Concurrent Packet Communication in Wireless Networks. Technical Report ISI-TR-639, USC/Information Sciences Institute, April, 2007. <http://www.isi.edu/~johnh/PAPERS/Son07a.html>.

Murtaza07a
Muhammad Zaki Murtaza, John Heidemann, and Fred Stann. Studying the Spatial Correlation of Loss Patterns Among Communicating Wireless Sensor Nodes. Technical Report ISI-TR-2007-626, USC/Information Sciences Institute, March, 2007. This technical report is a public release of a USC/CSD directed research report done August, 2005.. <http://www.isi.edu/~johnh/PAPERS/Murtaza07a.html>.

Son06a
Dongjin Son, Bhaskar Krishnamachari, and John Heidemann. Experimental Analysis of Concurrent Packet Transmissions in Wireless Sensor Networks. In Proceedings of the Fourth ACM SenSys Conference , pp. 237-249. Boulder, Colorado, USA, ACM. November, 2006. <http://www.isi.edu/~johnh/PAPERS/Son06a.html>.

Localization and location-aware computing

Wang04c
Xi Wang, Fabio Silva, and John Heidemann. Infrastructureless Location Aware Configuration for Sensor Networks. In Workshop on Mobile Computing Systems and Applications, pp. 174-183. English Lake District, United Kingdom, IEEE. December, 2004. <http://www.isi.edu/~johnh/PAPERS/Wang04c.html>.

Wang04d
Xi Wang, Fabio Silva, and John Heidemann. Demo Abstract: Follow-Me Application--Active Visitor Guidance System. In Proceedings of the 2nd ACM SenSys Conference , Baltimore, Maryland, USA, ACM. November, 2004. <http://www.isi.edu/~johnh/PAPERS/Wang04d.html>.

Bulusu04a
Nirupama Bulusu, John Heidemann, Deborah Estrin, and Tommy Tran. Self-configuring localization systems: Design and Experimental Evaluation. ACM Transactions on Embedded Computing Systems, 3 (1 ), pp. 24-60, February, 2004. <http://www.isi.edu/~johnh/PAPERS/Bulusu04a.html>.

Bulusu02a
Nirupama Bulusu, Vladimir Bychkovskiy, Deborah Estrin, and John Heidemann. Scalable, Ad Hoc Deployable, RF-Based Localization. In Proceedings of the Grace Hopper Celebration of Women in Computing, p. to appear. Vancouver, British Columbia, Canada, Institute for Women and Technology. October, 2002. <http://www.isi.edu/~johnh/PAPERS/Bulusu02a.html>.

Bulusu02c
Nirupama Bulusu, John Heidemann, Deborah Estrin, and Tommy Tran. Self-Configuring Localization Systems: Design and Experimental Evaluation. Technical Report 8, University of California, Los Angeles, Center for Embedded Networked Computing, September, 2002. Accepted to appear, ACM TOCS. <http://www.isi.edu/~johnh/PAPERS/Bulusu02c.html>.

Bulusu01d
Nirupama Bulusu, Deborah Estrin, and John Heidemann. Tradeoffs in Location Support Systems: The Case for Quality-Expressive Location Models for Applications. In Proceedings of the Ubicomp Workshop on Location Modeling, pp. 7-12. Atlanta, Georgia, USA, September, 2001. <http://www.isi.edu/~johnh/PAPERS/Bulusu01d.html>.

Heidemann01d
John Heidemann and Nirupama Bulusu. Using Geospatial Information in Sensor Networks. In Proceedings of the Workshop on Intersections between Geospatial Information and Information Technology, Arlington, VA, USA, National Research Council. October, 2001. <http://www.isi.edu/~johnh/PAPERS/Heidemann01d.html>.

Bulusu01c
Nirupama Bulusu, Deborah Estrin, Lewis Girod, and John Heidemann. Scalable Coordination for Wireless Sensor Networks: Self-Configuring Localization Systems. In Proceedings of the 6th IEEE International Symposium on Communication Theory and Application, p. to appear. St. Martin's College, Ambleside, Cumbria, UK, USC/Information Sciences Institute, IEEE. July, 2001. <http://www.isi.edu/~johnh/PAPERS/Bulusu01c.html>.

Bulusu01a
Nirupama Bulusu, John Heidemann, and Deborah Estrin. Adaptive Beacon Placement. In Proceedings of the 21st International Conference on Distributed Computing Systems, pp. 489-498. Phoenix, AZ, April, 2001. <http://www.isi.edu/~johnh/PAPERS/Bulusu01a.html>.

Bulusu00a
Nirupama Bulusu, John Heidemann, and Deborah Estrin. GPS-less Low Cost Outdoor Localization For Very Small Devices. IEEE Personal Communications Magazine, 7 (5 ), pp. 28-34, October, 2000. <http://www.isi.edu/~johnh/PAPERS/Bulusu00a.html>.

Heidemann00b
John Heidemann and Dhaval Shah. Location-Aware Scheduling With Minimal Infrastructure. In USENIX Conference Proceedings, pp. 131-138. San Diego, CA, USC/Information Sciences Institute, USENIX. June, 2000. <http://www.isi.edu/~johnh/PAPERS/Heidemann00b.html>.

Data dissemination, routing, and transport protocols in sensor networks

Stann06b
Fred Stann, John Heidemann, Rajesh Shroff, and Muhammad Zaki Murtaza. RBP: Robust Broadcast Propagation in Wireless Networks. In Proceedings of the Fourth ACM SenSys Conference , pp. 85-98. Boulder, Colorado, USA, ACM. November, 2006. <http://www.isi.edu/~johnh/PAPERS/Stann06b.html>.

Stathopoulos06b
Thanos Stathopoulos, Lewis Girod, John Heidemann, Deborah Estrin, and Karen Weeks. Centralized Routing for Resource-Constrained Wireless Sensor Networks (SYS 5). Poster presented at CENS 2006 Research Review. October, 2006. <http://repositories.cdlib.org/cens/Posters/284/>.

Stathopoulos05a
Thanos Stathopoulos, Lewis Girod, John Heidemann, and Deborah Estrin. Mote Herding for Tiered Wireless Sensor Networks. Technical Report 58, University of California, Los Angeles, Center for Embedded Networked Computing, December, 2005. <http://repositories.cdlib.org/cgi/viewcontent.cgi?article=2018&context=cens>.

Gnawali05a
Omprakash Gnawali, Ramesh Govindan, and John Heidemann. Implementing a Sensor Database System using a Generic Data Dissemination Mechanism. IEEE Data Engineering Bulletin, 28 (1 ), pp. 70-75, March, 2005. <http://www.isi.edu/~johnh/PAPERS/Gnawali05a.html>.

Stann05a
Fred Stann and John Heidemann. BARD: Bayesian-Assisted Resource Discovery In Sensor Networks. In Proceedings of the IEEE Infocom, pp. 866-877. Miami, Florida, USA, IEEE. March, 2005. <http://www.isi.edu/~johnh/PAPERS/Stann05a.html>.

Stathopoulos04a
Thanos Stathopoulos, Rahul Kapur, Deborah Estrin, John Heidemann, and Lixia Zhang. Application-Based Collision Avoidance in Wireless Sensor Networks. In Proceedings of the 29th IEEE International Conference on Local Computer Networks, pp. 506-514. Tampa, Florida, USA, IEEE. November, 2004. <http://www.isi.edu/~johnh/PAPERS/Stathopoulos04a.html>.

Silva05a
Fabio Silva, John Heidemann, Ramesh Govindan, and Deborah Estrin. Directed Diffusion. In Frontiers in Distributed Sensor Networks, S. S. Iyengar and R. R. Brooks, editors, pp. 573-596. Boca Raton, Florida, USA, CRC Press, Inc.. October, 2003. <http://www.isi.edu/~johnh/PAPERS/Silva04b.html>.

Krishnamachari04a
Bhaskar Krishnamachari and John Heidemann. Application-specific Modeling of Information Routing in Sensor Networks. In Proceedings of the IEEE International on Performance, Computing, and Communications Conference, pp. 717-722. Phoenix, Arizona, USA, IEEE. April, 2004. <http://www.isi.edu/~johnh/PAPERS/Krishnamachari04a.html>.

Silva04a
Fabio Silva, John Heidemann, Ramesh Govindan, and Deborah Estrin. Directed Diffusion. Technical Report ISI-TR-2004-586, USC/Information Sciences Institute, January, 2004. To appear in Frontiers in Distributed Sensor Networks, S. S. Iyengar and R. R. Brooks, eds.. <http://www.isi.edu/~johnh/PAPERS/Silva04a.html>.

Heidemann03b
John Heidemann, Fabio Silva, and Deborah Estrin. Matching Data Dissemination Algorithms to Application Requirements. In Proceedings of the ACM SenSys Conference, pp. 218-229. Los Angeles, California, USA, ACM. November, 2003. <http://www.isi.edu/~johnh/PAPERS/Heidemann03b.html>.

Stathopoulos03b
Thanos Stathopoulos, John Heidemann, and Deborah Estrin. A Remote Code Update Mechanism for Wireless Sensor Networks. Technical Report CENS-TR-30, University of California, Los Angeles, Center for Embedded Networked Computing, November, 2003. <http://www.isi.edu/~johnh/PAPERS/Stathopoulos03b.html>.

Stann03a
Fred Stann and John Heidemann. RMST: Reliable Data Transport in Sensor Networks. In Proceedings of the First International Workshop on Sensor Net Protocols and Applications, pp. 102-112. Anchorage, Alaska, USA, IEEE. April, 2003. <http://www.isi.edu/~johnh/PAPERS/Stann03a.html>.

Intanagonwiwat03a
Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann, and Fabio Silva. Directed Diffusion for Wireless Sensor Networking. ACM/IEEE Transactions on Networking, 11 (1 ), pp. 2-16, February, 2002. <http://www.isi.edu/~johnh/PAPERS/Intanagonwiwat03a.html>.

Silva02a
Fabio Silva, John Heidemann, and Ramesh Govindan. Network Routing Application Programmer's Interface (API) and Walk Through 9.0.1. USC/Information Sciences Institute, December, 2002. <http://www.isi.edu/~johnh/PAPERS/Silva02a.html>.

Heidemann02a
John Heidemann, Fabio Silva, Yan Yu, Deborah Estrin, and Padmaparma Haldar. Diffusion Filters as a Flexible Architecture for Event Notification in Wireless Sensor Networks. Technical Report ISI-TR-556, USC/Information Sciences Institute, April, 2002. <http://www.isi.edu/~johnh/PAPERS/Heidemann02a.html>.

Intanagonwiwat02a
Chalermek Intanagonwiwat, Deborah Estrin, Ramesh Govindan, and John Heidemann. Impact of Network Density on Data Aggregation in Wireless Sensor Networks. In Proceedings of the 22nd International Conference on Distributed Computing Systems, p. to appear. Vienna, Austria, IEEE. July, 2002. See UCLA CSD TR-01-750 for an expanded version of this paper.. <http://www.isi.edu/~johnh/PAPERS/Intanagonwiwat02a.html>.

Intanagonwiwat01b
Chalermek Intanagonwiwat, Deborah Estrin, Ramesh Govindan, and John Heidemann. Impact of Network Density on Data Aggregation in Wireless Sensor Networks. Technical Report 01-750, University of Southern California Computer Science Department, November, 2001. <http://www.isi.edu/~johnh/PAPERS/Intanagonwiwat01b.html>.

Heidemann01c
John Heidemann, Fabio Silva, Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, and Deepak Ganesan. Building Efficient Wireless Sensor Networks with Low-Level Naming. In Proceedings of the Symposium on Operating Systems Principles, pp. 146-159. Chateau Lake Louise, Banff, Alberta, Canada, ACM. October, 2001. <http://www.isi.edu/~johnh/PAPERS/Heidemann01c.html>.

MAC and topology-control protocols for sensor networks

See also MAC protocols for high-latency, underwater sensor networks.

Syed13a
Affan A. Syed, John Heidemann, and Wei Ye. Tones for Real: Managing Multipath in Underwater Acoustic Wakeup. ACM Transactions on Sensor Networks, 9 (3 ), pp. 27:1-27:24, August, 2013. <http://dx.doi.org/http://dx.doi.org/10.1145/2422966.2422984>, <http://www.isi.edu/~johnh/PAPERS/Syed13a.html>.

Goodney10a
Andrew Goodney, Young Cho, John Heidemann, and John Wroclawski. An Underwater Communication and Sensing Testbed in Marina del Rey (Poster Abstract). In Proceedings of the Fifth ACM International Workshop on UnderWater Networks (WUWNet) , p. to appear. Woods Hole, Massachusetts, USA, ACM. September, 2010. <http://www.isi.edu/~johnh/PAPERS/Goodney10a.html>.

Li08a
Yuan Li, Wei Ye, John Heidemann, and Rohit Kulkarni. Design and Evaluation of Network Reconfiguration Protocols for Mostly-Off Sensor Networks. Ad Hoc Networks Journal, 6 (8 ), pp. 1301-1315, November, 2008. to appear, sometime in 2008. <doi:10.1016/j.adhoc.2007.11.009>, <http://www.isi.edu/~johnh/PAPERS/Li08a.html>.

Stathopoulos07a
Thanos Stathopoulos, Martin Lukac, Dustin McIntire, John Heidemann, Deborah Estrin, and William J. Kaiser. End-to-end Routing for Dual-Radio Sensor Networks. In Proceedings of the IEEE Infocom, p. to appear. Anchorage, Alaska, USA, IEEE. May, 2007. <http://www.isi.edu/~johnh/PAPERS/Stathopoulos07a.html>.

McHenry07a
Tyler McHenry and John Heidemann. MAC Stability in Sensor Networks at High Network Densities. Technical Report ISI-TR-2007-628, USC/Information Sciences Institute, January, 2007. <http://www.isi.edu/~johnh/PAPERS/McHenry07a.html>.

Ye06a
Wei Ye, Fabio Silva, and John Heidemann. Ultra-Low Duty Cycle MAC with Scheduled Channel Polling. In Proceedings of the Fourth ACM SenSys Conference , pp. 321-333. Boulder, Colorado, USA, ACM. November, 2006. <http://www.isi.edu/~johnh/PAPERS/Ye06a.html>.

Li06a
Yuan Li, Wei Ye, and John Heidemann. Energy Efficient Network Reconfiguration for Mostly-Off Sensor Networks. In Proceedings of the Third IEEE Conference on Sensor and Adhoc Communication and Networks , pp. 527-535. Reston, Virginia, USA, IEEE. September, 2006. <http://www.isi.edu/~johnh/PAPERS/Li06a.html>.

Ye05a
Wei Ye and John Heidemann. Ultra-Low Duty Cycle MAC with Scheduled Channel Polling. Technical Report ISI-TR-2005-604b, USC/Information Sciences Institute. Originally released July, 2005; updated April 2006. <http://www.isi.edu/~johnh/PAPERS/Ye05a.html>.

Ahn05a
Jong-Suk Ahn, Seung-Wook Hong, and John Heidemann. An Adaptive FEC Code Control Algorithm for Mobile Wireless Sensor Networks. Journal of Communications and Networks, 7 (4 ), pp. 489-499, 2005. to appear. <http://www.isi.edu/~johnh/PAPERS/Ahn05a.html>.

Li05a
Yuan Li, Wei Ye, and John Heidemann. Energy and Latency Control in Low Duty Cycle MAC Protocols. In Proceedings of the IEEE Wireless Communications and Networking Conference, New Orleans, LA, USA, March, 2005. <http://www.isi.edu/~johnh/PAPERS/Li05a.html>.

Gnawali04a
Omprakash Gnawali, Mark Yarvis, John Heidemann, and Ramesh Govindan. Interaction of Retransmission, Blacklisting, and Routing Metrics for Reliability in Sensor Network Routing. In Proceedings of the First IEEE Conference on Sensor and Adhoc Communication and Networks , pp. 34-43. Santa Clara, California, USA, IEEE. October, 2004. <http://www.isi.edu/~johnh/PAPERS/Gnawali04a.html>.

Son04a
Dongjin Son, Bhaskar Krishnamachari, and John Heidemann. Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks. In Proceedings of the First IEEE Conference on Sensor and Adhoc Communication and Networks , pp. 289-298. Santa Clara, California, USA, IEEE. October, 2004. <http://www.isi.edu/~johnh/PAPERS/Son04a.html>.

Ye04b
Wei Ye, John Heidemann, and Deborah Estrin. Medium Access Control with Coordinated, Adaptive Sleeping for Wireless Sensor Networks. ACM/IEEE Transactions on Networking, 12 (3 ), pp. 493-506, June, 2004. A preprint of this paper was available as ISI-TR-2003-567. <http://www.isi.edu/~johnh/PAPERS/Ye04b.html>.

Ye04a
Wei Ye and John Heidemann. Medium Access Control in Wireless Sensor Networks. In Wireless Sensor Networks, C. S. Raghavendra, Krishna Sivalingam, Ty Znati, editor, pp. 73-92. Kluwer Academic Publishers. 2004. Chapter 4. <http://www.isi.edu/~johnh/PAPERS/Ye04a.html>.

Li03d
Yuan Li, Wei Ye, and John Heidemann. Demonstration of Schedule and Latency Control in S-MAC. Technical Report ISI-TR-581, USC/Information Sciences Institute, November, 2003. <http://www.isi.edu/~johnh/PAPERS/Li03d.html>.

Ye03c
Wei Ye and John Heidemann. Medium Access Control in Wireless Sensor Networks . Technical Report ISI-TR-580, USC/Information Sciences Institute, October, 2003. To appear as a chapter in Wireless Sensor Networks, Taieb Znati, Krishna M. Sivalingam and Cauligi Raghavendra (eds.), Kluwer Academic Publishers. <http://www.isi.edu/~johnh/PAPERS/Ye03c.html>.

Xu03a
Ya Xu, Solomon Bien, Yutaka Mori, John Heidemann, and Deborah Estrin. Topology Control Protocols to Conserve Energy in Wireless Ad Hoc Networks. Technical Report 6, University of California, Los Angeles, Center for Embedded Networked Computing, January, 2003. submitted for publication. <http://www.isi.edu/~johnh/PAPERS/Xu03a.html>.

Ye02a
Wei Ye, John Heidemann, and Deborah Estrin. An Energy-Efficient MAC protocol for Wireless Sensor Networks. In Proceedings of the IEEE Infocom, pp. 1567-1576. New York, NY, USA, USC/Information Sciences Institute, IEEE. June, 2002. <http://www.isi.edu/~johnh/PAPERS/Ye02a.html>.

Ye02b
Wei Ye, John Heidemann, and Deborah Estrin. A Flexible and Reliable Radio Communication Stack on Motes. Technical Report ISI-TR-565, USC/Information Sciences Institute, September, 2002. <http://www.isi.edu/~johnh/PAPERS/Ye02b.html>.

Xu01a
Ya Xu, John Heidemann, and Deborah Estrin. Geography-informed Energy Conservation for Ad Hoc Routing. In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, pp. 70-84. Rome, Italy, ACM. July, 2001. <http://www.isi.edu/~johnh/PAPERS/Xu01a.html>.

Coffin01a
Dan Coffin, Dan Van Hook, Ramesh Govindan, John Heidemann, and Fabio Silva. Network Routing Application Programmer's Interface (API) and Walk Through 8.0. Technical Report 01-741, USC/ISI, March, 2001. <http://www.isi.edu/~johnh/PAPERS/Coffin01a.html>.

Xu00a
Ya Xu, John Heidemann, and Deborah Estrin. Adaptive Energy-Conserving Routing for Multihop Ad Hoc Networks. Research Report527, USC/Information Sciences Institute, October, 2000. <http://www.isi.edu/~johnh/PAPERS/Xu00a.html>.

High Latency and Underwater Sensor Networks

Heidemann12a
John Heidemann, Milica Stojanovic, and Michele Zorzi. Underwater Sensor Networks: Applications, Advances, and Challenges. Philosophical Transactions of the Royal Society-A, 370 (1958 ), pp. 158-175, January, 2012. <doi:10.1098/rsta.2011.0214>, <http://www.isi.edu/~johnh/PAPERS/Heidemann12a.html>.

Syed10a
Affan A. Syed and John Heidemann. Contention Analysis of MAC Protocols that Count. In Proceedings of the Fifth ACM International Workshop on UnderWater Networks (WUWNet) , p. to appear. Woods Hole, Massachusetts, USA, ACM. September, 2010. <http://www.isi.edu/~johnh/PAPERS/Syed10a.html>.

Ahn10a
Joon Ahn, Affan Syed, Bhaskar Krishnamachari, and John Heidemann. Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks. Ad Hoc Networks Journal, 9 (5 ), pp. 752-766, July, 2010. (Published on-line September, 2010.). <doi:10.1016/j.adhoc.2010.09.007>, <http://www.isi.edu/~johnh/PAPERS/Ahn10a.html>.

Ahn10b
Joon Ahn, Affan Syed, Bhaskar Krishnamachari, and John Heidemann. Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks. Technical Report ISI-TR-2010-668, USC/Information Sciences Institute, September, 2010. This technical report is a draft preprint of a paper to appear in Elsevier Ad Hoc Networks Journal. Please access and cite that version if possible. <http://www.isi.edu/~johnh/PAPERS/Ahn10b.html>.

Syed08b
Affan A. Syed, Wei Ye, and John Heidemann. Comparison and Evaluation of the T-Lohi MAC for Underwater Acoustic Sensor Networks. IEEE Journal of Selected Areas in Communication, 26 (12 ), pp. 1731-1743, December, 2008. <doi:10.1109/JSAC.2008.081212>, <http://www.isi.edu/~johnh/PAPERS/Syed08b.html>.

Heidemann08d
John Heidemann, Urbashi Mitra, James Preisig, Milica Stojanovic, and Michele Zorzi. Guest Editorial: Underwater Wireless Communication Networks. IEEE Journal of Selected Areas in Communication, 26 (9 ), pp. 1617-1619, December, 2008. <doi:10.1109/JSAC.2008.4686798>, <http://www.isi.edu/~johnh/PAPERS/Heidemann08d.html>.

Khan08a
Muhammad Omar Khan, Affan A. Syed, John Heidemann, Wei Ye, and Jack Wills. Demo Abstract: Bringing Sensor Networks Underwater with Low-Power Acoustic Communications. In Proceedings of the Sixth ACM SenSys Conference , pp. 379-380. Raleigh, North Carolina, USA, ACM. November, 2008. <http://www.isi.edu/~johnh/PAPERS/Khan08a.html>.

Syed08c
Affan A. Syed, Muhammad Omar Khan, John Heidemann, Jack Wills, and Wei Ye. Demo Abstract: A Sensornet-inspired Underwater Acoustic Modem for Wake-up and Data. In ACM International Workshop on UnderWater Networks (WUWNet) , San Francisco, CA, USA, ACM. September, 2008. <http://www.isi.edu/~johnh/PAPERS/Syed08c.html>.

Syed08a
Affan A. Syed, Wei Ye, and John Heidemann. T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks. In Proceedings of the IEEE Infocom, p. to appear. Phoenix, Arizona, USA, IEEE. April, 2008. <http://www.isi.edu/~johnh/PAPERS/Syed08a.html>.

Syed07b
Affan Syed, Wei Ye, Bhaskar Krishnamachari, and John Heidemann. Understanding Spatio-Temporal Uncertainty in Medium Access with ALOHA Protocols. In Proceedings of the Second ACM International Workshop on UnderWater Networks (WUWNet) , pp. 41-48. Montréal, Quebec, Canada, ACM. September, 2007. <http://doi.acm.org/10.1145/1287812.1287822>. <http://www.isi.edu/~johnh/PAPERS/Syed07b.html>.

Syed07a
Affan A. Syed, Wei Ye, and John Heidemann. T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks. Technical Report ISI-TR-638b, USC/Information Sciences Institute, April, 2007. Technical report originally released April 2007, updated July 2007. <http://www.isi.edu/~johnh/PAPERS/Syed07a.html>.

Syed06c
Affan A. Syed, Wei Ye, and John Heidemann. Medium Access for Underwater Acoustic Sensor Networks (Extended Abstract for Work-in-Progress Poster). Technical Report USC/Information Sciences Institute, October, 2006. <http://www.isi.edu/~johnh/PAPERS/Syed06c.html>.

Heidemann07a
John Heidemann, Wei Ye, and Jack Wills. Underwater Networking Research at USC/ISI. In Proceedings of the Undersea Distributed Networked Systems Conference, Newport, Rhode Island, USA, February, 2007. <http://www.isi.edu/~johnh/PAPERS/Heidemann07a.html>.

Wills06a
Jack Wills, Wei Ye, and John Heidemann. Low-Power Acoustic Modem for Dense Underwater Sensor Networks. In Proceedings of the First ACM International Workshop on UnderWater Networks (WUWNet) , pp. 79-85. Los Angeles, California, USA, ACM. September, 2006. <http://www.isi.edu/~johnh/PAPERS/Wills06a.html>.

Syed06a
Affan Syed and John Heidemann. Time Synchronization for High Latency Acoustic Networks. In Proceedings of the IEEE Infocom, p. to appear. Barcelona, Spain, IEEE. April, 2006. <http://www.isi.edu/~johnh/PAPERS/Syed06a.html>.

Heidemann06a
John Heidemann, Wei Ye, Jack Wills, Affan Syed, and Yuan Li. Research Challenges and Applications for Underwater Sensor Networking. In Proceedings of the IEEE Wireless Communications and Networking Conference, pp. 228-235. Las Vegas, Nevada, USA, IEEE. April, 2006. <http://www.isi.edu/~johnh/PAPERS/Heidemann06a.html>.

Energy Conservation and Management

(Energy conservation and management, not related to more specific topics like MAC or data dissemination.)

Syed10b
Affan A. Syed, Young Cho, and John Heidemann. Demo Abstract: Energy Transference for Sensornets. In Proceedings of the 8th ACM SenSys Conference , p. to appear. Zurich, Switzerland, ACM. November, 2010. <http://www.isi.edu/~johnh/PAPERS/Syed10b.html>.

Sensornet Applications and SCADA Systems

Zhang11a
Chengjie Zhang, Affan Syed, Young H. Cho, and John Heidemann. Steam-Powered Sensing. In Proceedings of the 9th ACM SenSys Conference , p. 204-217. Seattle, Washington, USA, ACM. November, 2011. <http://www.isi.edu/~johnh/PAPERS/Zhang11a.html>.

Yoon09a
SunHee Yoon, Wei Ye, John Heidemann, Brian Littlefield, and Cyrus Shahabi. SWATS: Wireless Sensor Networks for Steamflood and Waterflood Pipeline Monitoring. IEEE Network Magazine, 2009. accepted in 2009 to appear in 2010 or later. <http://www.isi.edu/~johnh/PAPERS/Yoon09a.html>.

Heidemann06e
John Heidemann and Wei Ye. Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability, and Security. In Proceedings of the National Workshop on Beyond SCADA: Networked Embedded Control for Cyber Physical Systems, Pittsburgh, PA, USA, November, 2006. (Position Paper). <http://www.isi.edu/~johnh/PAPERS/Heidemann06e.html>.

Ye06c
Wei Ye and John Heidemann. Enabling Interoperability and Extensibility of Future SCADA Systems. In Proceedings of the National Workshop on Beyond SCADA: Networked Embedded Control for Cyber Physical Systems, Pittsburgh, PA, USA, November, 2006. (Position Paper). <http://www.isi.edu/~johnh/PAPERS/Ye06c.html>.

Farkas06a
Keith I. Farkas, John Heidemann, and Liviu Iftode. Intelligent Transportation and Pervasive Computing. IEEE Pervasive Computing Magazine, 5 (4 ), pp. 18-19, October, 2006. (Special issue guest editors). <http://csdl.computer.org/comp/mags/pc/2006/04/b4018.pdf>.

Topology and Address Space Modeling

Quan13b
Lin Quan, John Heidemann, and Yuri Pradkin. Visualizing Sparse Internet Events: Network Outages and Route Changes. Computing, p. to appear, January, 2013. <doi:10.1007/s00607-013-0283-7>, <http://www.isi.edu/~johnh/PAPERS/Quan13b.html>.

Heidemann13a
John Heidemann and Walter Willinger. Internet Visualization. Computing, p. to appear, 2013. (Editorial discussing the First ACM Workshop on Internet Visualization). <doi:10.1007/s00607-013-0284-6>, <http://www.isi.edu/~johnh/PAPERS/Heidemann13a.html>.

Quan12b
Lin Quan, John Heidemann, and Yuri Pradkin. Visualizing Sparse Internet Events: Network Outages and Route Changes. In Proceedings of the First ACM Workshop on Internet Visualization, p. to appear. Boston, Mass., USA, Springer. November, 2012. <http://www.isi.edu/~johnh/PAPERS/Quan12b.html>.

Hu12a
Zi Hu and John Heidemann. Towards Geolocation of Millions of IP Addresses. In Proceedings of the ACM Internet Measurement Conference, pp. 123-130. Boston, MA, USA, ACM. 2012. <http://dx.doi.org/10.1145/2398776.2398790>, <http://www.isi.edu/~johnh/PAPERS/Hu12a.html>.

Cai12b
Xue Cai, John Heidemann, Balachander Krishnamurthy, and Walter Willinger. An Organization-Level View of the Internet and its Implications (Extended). Technical Report ISI-TR-2009-679, USC/Information Sciences Institute, June, 2012. <http://www.isi.edu/~johnh/PAPERS/Cai12b.html>.

Fan10a
Xun Fan and John Heidemann. Selecting Representative IP Addresses for Internet Topology Studies. In Proceedings of the ACM Internet Measurement Conference, p. 411-423. Melbourne, Australia, ACM. November, 2010. <http://www.isi.edu/~johnh/PAPERS/Fan10a.html>.

Cai10c
Xue Cai, John Heidemann, Balachander Krishnamurthy, and Walter Willinger. Towards an AS-to-Organization Map. In Proceedings of the ACM Internet Measurement Conference, pp. 199-205. Melbourne, Australia, ACM. November, 2010. <http://dx.doi.org/10.1145/1879141.1879166>, <http://www.isi.edu/~johnh/PAPERS/Cai10c.html>.

Cai10a
Xue Cai and John Heidemann. Understanding Block-level Address Usage in the Visible Internet. In Proceedings of the ACM SIGCOMM Conference , p. to appear. New Delhi, India, ACM. August, 2010. <http://www.isi.edu/~johnh/PAPERS/Cai10a.html>.

Cai10b
Xue Cai and John Heidemann. Understanding Block-level Address Usage in the Visible Internet (extended). Technical Report ISI-TR-2009-665, USC/Information Sciences Institute, June, 2010. This technical report extends the SIGCOMM 2010 paper with three appendices with supporting details. <http://www.isi.edu/~johnh/PAPERS/Cai10b.html>.

Heidemann10a
John Heidemann. Mapping the Internet to Assist Cyber-Defense. Invited talk at Spring Electronic Crimes Task Force Meeting. May, 2010. <http://www.isi.edu/~johnh/PAPERS/Heidemann10a.html>.

Cai09b
Xue Cai and John Heidemann. Understanding Address Usage in the Visible Internet. Technical Report ISI-TR-2009-656, USC/Information Sciences Institute, February, 2009. <http://www.isi.edu/~johnh/PAPERS/Cai09b.html>.

Heidemann08c
John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, and Joseph Bannister. Census and Survey of the Visible Internet. In Proceedings of the ACM Internet Measurement Conference, p. 169-182. Vouliagmeni, Greece, ACM. October, 2008. <http://www.isi.edu/~johnh/PAPERS/Heidemann08c.html>.

Cai08a
Xue Cai and John Heidemann. Active Probing to Classify Internet Address Blocks (poster abstract). In Proceedings of the ACM SIGCOMM Conference , p. to appear. Seattle, Washington, USA, ACM. August, 2008. (The poster abstract and poster are also available as ISI-TR-2008-653.). <http://www.isi.edu/~johnh/PAPERS/Cai08a.html>.

Heidemann08a
John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, and Joseph Bannister. Census and Survey of the Visible Internet (extended). Technical Report ISI-TR-2008-649b, USC/Information Sciences Institute, February, 2008. Updated August, 2008. <http://www.isi.edu/~johnh/PAPERS/Heidemann08a.html>.

Heidemann07c
John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, and Joseph Bannister. Exploring Visible Internet Hosts through Census and Survey. Technical Report ISI-TR-2007-640, USC/Information Sciences Institute, May, 2007. <http://www.isi.edu/~johnh/PAPERS/Heidemann07c.html>.

Network Simulation

Hussain13a
Alefiya Hussain, Yuri Pradkin, and John Heidemann. Replay of Malicious Traffic in Network Testbeds. In Proceedings of the 13th IEEE Conference on Technologies for Homeland Security (HST), p. (to appear). Waltham, Massachusetts, USA, IEEE. November, 2013. <http://www.isi.edu/~johnh/PAPERS/Hussain13a.html>.

Hussain04a
Alefiya Hussain, Aman Kapoor, and John Heidemann. The Effect of Detail on Ethernet Simulation. In Proceedings of the ACM Workshop on Parallel and Distributed Simulation, pp. 97-104. Kufstein, Austria, ACM. May, 2004. <http://www.isi.edu/~johnh/PAPERS/Hussain04a.html>.

Dutta02d
Debojyoti Dutta, Ashish Goel, and John Heidemann. Faster Network Design with Scenario Pre-filtering. In Proceedings of the International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 237-246. Fort Worth, Texas, USA, USC/Information Sciences Institute, IEEE. October, 2002. <http://www.isi.edu/~johnh/PAPERS/Dutta02d.html>.

Papadopoulos02a
Christos Papadopoulos and John Heidemann. Using Ns in the Classroom and Lab. In Proceedings of the ACM SIGCOMM Workshop on Computer Networking: Curriculum Designs and Educational Challenges, pp. 45-46. Pittsburgh, PA, USA, ACM. August, 2002. <http://www.isi.edu/~johnh/PAPERS/Papadopoulos02a.html>.

Ye01a
Wei Ye, Richard T. Vaughyan, Gaurav S. Sukhatme, John Heidemann, Deborah Estrin, and Maja J. Mataric. Evaluating Control Strategies for Wireless-Networked Robots Using an Integrated Robot and Network Simulation. In Proceedings of the IEEE International Conference on Robotics and Automation, pp. 2941-2947. Seoul, Korea, USC/Information Sciences Institute, IEEE. May, 2001. <http://www.isi.edu/~johnh/PAPERS/Ye01a.html>.

Heidemann01f
John Heidemann, Kevin Mills, and Sri Kumar. Expanding Confidence in Network Simulation. IEEE Network Magazine, 15 (5 ), pp. 58-63, Sept./Oct., 2001. <http://www.isi.edu/~johnh/PAPERS/Heidemann01f.html>.

Huang01b
Polly Huang and John Heidemann. Minimizing Routing State for Light-Weight Network Simulation. In Proceedings of the International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, p. to appear. Cincinnati, Ohio, USA, IEEE. August, 2001. <http://www.isi.edu/~johnh/PAPERS/Huang01b.html>.

Estrin00b
Deborah Estrin, Mark Handley, John Heidemann, Steven McCanne, Ya Xu, and Haobo Yu. Network Visualization with the Nam, VINT Network Animator. IEEE Computer, 33 (11), pp. 63-68, November, 2000. <http://www.isi.edu/~johnh/PAPERS/Estrin00b.html>.

Heidemann01a
John Heidemann, Nirupama Bulusu, Jeremy Elson, Chalermek Intanagonwiwat, Kun-chan Lan, Ya Xu, Wei Ye, Deborah Estrin, and Ramesh Govindan. Effects of Detail in Wireless Network Simulation. In Proceedings of the SCS Multiconference on Distributed Simulation, pp. 3-11. Phoenix, Arizona, USA, USC/Information Sciences Institute, Society for Computer Simulation. January, 2001. <http://www.isi.edu/~johnh/PAPERS/Heidemann01a.html>.

Huang01a
Polly Huang and John Heidemann. Capturing TCP Burstiness in Light-weight Simulations. In Proceedings of the SCS Conference on Communication Networks and Distributed Systems Modeling and Simulation, p. to appear. Phoenix, Arizona, USA, USC/Information Sciences Institute, Society for Computer Simulation. January, 2001. <http://www.isi.edu/~johnh/PAPERS/Huang01a.html>.

Breslau00a
Lee Breslau, Deborah Estrin, Kevin Fall, Sally Floyd, John Heidemann, Ahmed Helmy, Polly Huang, Steven McCanne, Kannan Varadhan, Ya Xu, and Haobo Yu. Advances in Network Simulation. IEEE Computer, 33 (5 ), pp. 59-67, May, 2000. Expanded version available as USC TR 99-702b at http://www.isi.edu/ johnh/PAPERS/Bajaj99a.html. <http://www.isi.edu/~johnh/PAPERS/Breslau00a.html>.

Huang98a
Polly Huang, Deborah Estrin, and John Heidemann. Enabling Large-scale simulations: selective abstraction approach to the study of multicast protocols. In Proceedings of the International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Montreal, Canada, IEEE. July, 1998. to appear.

File-system Stacking

Heidemann95e
John Shelby Heidemann. Stackable Design of File Systems. Technical Report CSD-950032, University of California, Los Angeles, September, 1995.

Heidemann95a
John Shelby Heidemann. Stackable Design of File Systems. Ph.D. dissertation, University of California, Los Angeles, 1995.

Heidemann95c
John Heidemann and Gerald Popek. Performance of Cache Coherence in Stackable Filing. In Proceedings of the 15th Symposium on Operating Systems Principles. ACM, December 1995.

Heidemann94a
John S. Heidemann and Gerald J. Popek. File-system development with stackable layers. In ACM Transactions on Computer Systems, 12(1):58-89, 1994. An early version is available as UCLA technical report CSD-930019.

Heidemann91a
John S. Heidemann. Stackable layers: an architecture for file system development. Master's thesis, University of California, Los Angeles, July 1991. Available as UCLA technical report CSD-910056.

Heidemann91c
John S. Heidemann. Stackable Layers: an Architecture for File System Development. Technical Report CSD-910056, University of California, Los Angeles, July, 1991. Master's Thesis.

Optimistic Replication

Page98a
T. W. Page, R. G. Guy, J. S. Heidemann, D. Ratner, P. Reiher, A. Goel, G. H. Kuenning, and G. J. Popek. Perspectives on Optimistically Replicated Peer-to-Peer Filing. Software--Practice and Experience, 28 2, 155-180, February, 1998.

Heidemann95d
John Heidemann, Ashvin Goel, and Gerald Popek. Defining and Measuring Conflicts in Optimistic Replication. Technical Report UCLA-CSD-950033, University of California, Los Angeles, September, 1995.

Reiher94a
Peter Reiher, John S. Heidemann, David Ratner, Gregory Skinner, and Gerald J. Popek. Resolving file conflicts in the Ficus file system. In USENIX Conference Proceedings, pages 183-195. USENIX, June 1994.

Heidemann92a
John S. Heidemann, Thomas W. Page, Jr., Richard G. Guy, and Gerald J. Popek. Primarily disconnected operation: Experiences with Ficus. In Proceedings of the Second Workshop on Management of Replicated Data. IEEE, November 1992.

Page91b
Thomas W. Page, Jr., Richard G. Guy, Gerald J. Popek, John S. Heidemann, Wai Mak, and Dieter Rothmeier. Management of replicated volume location data in the Ficus replicated file system. In USENIX Conference Proceedings. USENIX, June 1991.

Popek90a
Gerald J. Popek, Richard G. Guy, Thomas W. Page, Jr., and John S. Heidemann. Replication in Ficus distributed file systems. In Proceedings of the Workshop on Management of Replicated Data, pages 20-25. IEEE, November 1990.

Guy90d
Richard G. Guy, Thomas W. Page, Jr., John S. Heidemann, and Gerald J. Popek. Name transparency in very large scale distributed file systems. In Second IEEE Workshop on Experimental Distributed Systems, October 1990.

Guy90b
Richard G. Guy, John S. Heidemann, Wai Mak, Thomas W. Page, Jr., Gerald J. Popek, and Dieter Rothmeier. Implementation of the Ficus replicated file system. In USENIX Conference Proceedings, pages 63-71. USENIX, June 1990.

Other Subjects

Heidemann01b
John Heidemann. Getting the Light Out. Photo Electronic Imaging, 44 (1 ), pp. 30-32, January, 2001. <http://www.isi.edu/~johnh/PAPERS/Heidemann01b.html>.

Gillett90a
Will Gillett and John Heidemann. DNA Mapping Algorithms: The DNA Simulator. Technical Report WUCS-90-37, University of Washington in St. Louis, October, 1990.

Miller86a
L. D. Miller, M. Unverferth, D. Williss, and J. Heidemann. A Microcomputer Based Geographic Information System to Provide Input to Site Specific Decision Processes. In Proceedings of the Geographic Information Systems for Environmental Protection, pp. 123-162. Las Vegas, Nevada, USA, Environmental Research Center, University of Nevada, Las Vegas. January, 1986. <http://www.isi.edu/~johnh/PAPERS/Miller86a.html>.