Papers Written by John Heidemann
A list of papers written or co-written by John Heidemann is below, sorted by subject. This page includes only primary papers and omits some technical reports and papers that have been superseded. To see everything, go to the comprehensive, chronological list of papers (in reverse order of publication). For a less terse description of what I've done, check out my research.
The subjects (with links in this page):
- Internet Protocols
- Denial-of-service and network security
- Spectral analysis of network traffic
- Topology and address space modeling
- Network simulation
- Service and Traffic Detection and Classification
- Traffic modeling and data collection
- Internet routing and Reliability
- Analysis of the Domain-Name System
- World-Wide Web
- Networking education
- Sensor Networks, Embedded Networking and Location-Aware Computing
- General sensor nets and embedded nets
- Data sharing in sensornets
- Data fusion in sensornets
- Policy and privacy issues in sensor networks
- Understanding wireless propagation
- Localization and location-aware computing
- Data dissemination, routing, and transport protocols in sensor networks
- MAC and topology-control protocols for sensor networks
- High latency and underwater sensor networks
- Energy Conservation and Management
- Applications of Sensornets and SCADA Systems
- Operating Systems
- Other Subjects
Denial-of-service and network security
- Thatte10a
- Gautam Thatte, Urbashi Mitra, and John Heidemann. Parametric Methods for Anomaly Detection in Aggregate Traffic. ACM/IEEE Transactions on Networking, 19 (2 ), pp. 512-525, August, 2010. (Appeared in print April 2011). <http://dx.doi.org/10.1109/TNET.2010.2070845>, <http://www.isi.edu/~johnh/PAPERS/Thatte10a.html>.
- Wilcox10a
- Chris Wilcox, Christos Papadopoulos, and John Heidemann. Correlating Spam Activity with IP Address Characteristics. In Proceedings of the IEEE Global Internet Symposium, p. to appear. San Diego, California, USA, IEEE. March, 2010. <http://www.isi.edu/~johnh/PAPERS/Wilcox10a.html>.
- Hussain06a
- Alefiya Hussain, John Heidemann, and Christos Papadopoulos. Identification of Repeated Denial of Service Attacks. In Proceedings of the IEEE Infocom, p. to appear. Barcelona, Spain, IEEE. April, 2006. <http://www.isi.edu/~johnh/PAPERS/Hussain06a.html>.
- Chen04a
- Xuan Chen and John Heidemann. Detecting Early Worm Propagation through Packet Matching. Technical Report ISI-TR-2004-585, USC/Information Sciences Institute, February, 2004. <http://www.isi.edu/~johnh/PAPERS/Chen04a.html>.
- Hussain04b
- Alefiya Hussain, John Heidemann, and Christos Papadopoulos. Distinguishing between Single and Multi-source Attacks using Signal Processing. Computer Networks, 46 (4 ), pp. 479-503, November, 2004. This paper is an expanded version of ``A Framework for Classifying Denial of Service Attacks''. <http://www.isi.edu/~johnh/PAPERS/Hussain04b.html>.
- Hussain03c
- Alefiya Hussain, John Heidemann, and Christos Papadopoulos. Identification of Repeated DoS Attacks using Network Traffic Forensics. Technical Report ISI-TR-2003-577b, USC/Information Sciences Institute, August, 2003. Originally released August 2003, updated June 2004. <http://www.isi.edu/~johnh/PAPERS/Hussain03c.html>.
- Hussain03b
- Alefiya Hussain, John Heidemann, and Christos Papadopoulos. A Framework for Classifying Denial of Service Attacks. In Proceedings of the ACM SIGCOMM Conference, pp. 99-110. Karlsruhe, Germany, ACM. August, 2003. <http://www.isi.edu/~johnh/PAPERS/Hussain03b.html>.
- Hussain03a
- Alefiya Hussain, John Heidemann, and Christos Papadopoulos. A Framework for Classifying Denial of Service Attacks-extended. Technical Report ISI-TR-2003-569b, USC/Information Sciences Institute, June, 2003. (Original TR, February 2003, updated June 2003). <http://www.isi.edu/~johnh/PAPERS/Hussain03a.html>.
Spectral analysis of network traffic
See also Denial-of-service and network security.
- Bartlett11a
- Genevieve Bartlett, John Heidemann, and Christos Papadopoulos. Low-Rate, Flow-Level Periodicity Detection. In Proceedings of the 14th IEEE Global Internet Symposium, pp. 804-809. Shanghai, China, IEEE. April, 2011. <http://dx.doi.org/10.1109/INFCOMW.2011.5928922>, <http://www.isi.edu/~johnh/PAPERS/Bartlett11a.html>.
- Bartlett09a
- Genevieve Bartlett, John Heidemann, and Christos Papadopoulos. Using Low-Rate Flow Periodicities for Anomaly Detection: Extended. Technical Report ISI-TR-2009-661, USC/Information Sciences Institute, August, 2009. <http://www.isi.edu/~johnh/PAPERS/Bartlett09a.html>.
- He09a
- Xinming He, Christos Papadopoulos, John Heidemann, Urbashi Mitra, and Usman Riaz. Remote Detection of Bottleneck Links Using Spectral and Statistical Methods. Computer Networks, 53 (3 ), pp. 279-298, February, 2009. <doi: 10.1016/j.comnet.2008.10.001>, <http://www.isi.edu/~johnh/PAPERS/He09a.html>.
- Thatte08a
- Gautam Thatte, Urbashi Mitra, and John Heidemann. Detection of Low-Rate Attacks in Computer Networks. In Proceedings of the 11th IEEE Global Internet Symposium, pp. 1-6. Phoenix, Arizona, USA, IEEE. April, 2008. <doi:10.1109/INFOCOM.2008.4544638>, <http://www.isi.edu/~johnh/PAPERS/Thatte08a.html>.
- Mitra06a
- Urbashi Mitra, John Heidemann Antonio Ortega, and Christos Papadopoulos. Detecting and Identifying Malware: A New Signal Processing Goal. IEEE Signal Processing Magazine, 23 (5 ), pp. 107-111, September, 2006. <http://www.isi.edu/~johnh/PAPERS/Mitra06a.html>.
- He05a
- Xinming He, Christos Papadopoulos, John Heidemann, Urbashi Mitra, Usman Riaz, and Alefiya Hussain. Spectral Analysis of Bottleneck Traffic. Technical Report USC-CSD-TR-05-854, University of Southern California Computer Science Department, May, 2005. <http://www.isi.edu/~johnh/PAPERS/He05a.html>.
- Sinha05a
- Rishi Sinha, Christos Papadopoulos, and John Heidemann. Fingerprinting Internet Paths using Packet Pair Dispersion. Technical Report 06-876, University of Southern California Computer Science Department, February, 2005. <http://www.isi.edu/~johnh/PAPERS/Sinha05a.html>.
- He04a
- Xinming He, Christos Papadopoulos, John Heidemann, and Alefiya Hussain. Spectral Characteristics of Saturated Links. Technical Report USC-CSD-TR-827, University of Southern California Computer Science Department, June, 2004. submitted for review. <http://www.isi.edu/~johnh/PAPERS/He04a.html>.
Service and Traffic Detection and Classification
See also Denial-of-service and network security.
- Calder13a
- Matt Calder, Xun Fan, Zi Hu, Ethan Katz-Bassett, John Heidemann, and Ramesh Govindan. Mapping the Expansion of Google's Serving Infrastructure. In Proceedings of the ACM Internet Measurement Conference, p. to appear. Barcelona, Spain, ACM. October, 2013. <http://www.isi.edu/~johnh/PAPERS/Calder13a.html>.
- Fan13a
- Xun Fan, John Heidemann, and Ramesh Govindan. Evaluating Anycast in the Domain Name System. In Proceedings of the IEEE Infocom, p. to appear. Turin, Italy, IEEE. April, 2013. <http://www.isi.edu/~johnh/PAPERS/Fan13a.html>.
- Bartlett07d
- Genevieve Bartlett, John Heidemann, and Christos Papadopoulos. Understanding Passive and Active Service Discovery. In Proceedings of the ACM Internet Measurement Conference, p. 55--60. San Diego, California, USA, ACM. October, 2007. <http://www.isi.edu/~johnh/PAPERS/Bartlett07d.html>.
- Bartlett07c
- Genevieve Bartlett, John Heidemann, Christos Papadopoulos, and James Pepin. Estimating P2P Traffic Volume at USC. Technical Report ISI-TR-2007-645, USC/Information Sciences Institute, June, 2007. <http://www.isi.edu/~johnh/PAPERS/Bartlett07c.html>.
- Bartlett07b
- Genevieve Bartlett, John Heidemann, and Christos Papadopoulos. Understanding Passive and Active Service Discovery (extended). Technical Report ISI-TR-2007-642, USC/Information Sciences Institute, May, 2007. To appear, ACM Internet Measurement Conference 2007. <http://www.isi.edu/~johnh/PAPERS/Bartlett07b.html>.
- Bartlett07a
- Genevieve Bartlett, John Heidemann, and Christos Papadopoulos. Inherent Behaviors for On-line Detection of Peer-to-Peer File Sharing. In Proceedings of the 10th IEEE Global Internet, Anchorage, Alaska, USA, IEEE. May, 2007. An extended version of this paper is available as ISI-TR-2006-627. <http://www.isi.edu/~johnh/PAPERS/Bartlett07a.html>.
- Bartlett06a
- Genevieve Bartlett, John Heidemann, and Christos Papadopoulos. Inherent Behaviors for On-line Detection of Peer-to-Peer File Sharing (extended). Technical Report ISI-TR-2006-627, USC/Information Sciences Institute, December, 2006. <http://www.isi.edu/~johnh/PAPERS/Bartlett06a.html>.
Traffic Modeling and Data Collection
- Heidemann09a
- John Heidemann and Christos Papadopoulos. Uses and Challenges for Network Datasets. In Proceedings of the IEEE Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH), p. to appear. Washington, DC, USA, IEEE. March, 2009. <http://www.isi.edu/~johnh/PAPERS/Heidemann09a.html>.
- Heidemann09b
- John Heidemann. USC/LANDER Passive and Active Data Collection. Lightning talk at CAIDA AIMS Workshop. February, 2009. <http://www.isi.edu/~johnh/PAPERS/Heidemann09b.html>.
- Sinha07a
- Rishi Sinha, Christos Papadopoulos, and John Heidemann. Internet Packet Size Distributions: Some Observations. Technical Report ISI-TR-2007-643, USC/Information Sciences Institute, May, 2007. Originally released October 2005 as web page http://netweb.usc.edu/ rsinha/pkt-sizes/. <http://www.isi.edu/~johnh/PAPERS/Sinha07a.html>.
- Lan06a
- Kun-chan Lan and John Heidemann. A Measurement Study of Correlation of Internet Flow Characteristics. Computer Networks, 50 (1 ), pp. 46-62, January, 2006. <http://www.isi.edu/~johnh/PAPERS/Lan06a.html>.
- Lan05a
- Kun-chan Lan and John Heidemann. On the feasibility of utilizing correlations between user populations for traffic inference. In Proceedings of the 30th IEEE International Conference on Local Computer Networks, pp. 132-139. Sydney, Australia, IEEE. November, 2005. <http://www.isi.edu/~johnh/PAPERS/Lan05a.html>.
- Hussain05b
- Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin, John Heidemann, Christos Papadopoulos, and Joseph Bannister. Experiences with a Continuous Network Tracing Infrastructure. In Proceedings of the ACM SIGCOMM MineNet Workshop , pp. 185-190. Philadelphia, PA, USA, ACM. August, 2005. <http://www.isi.edu/~johnh/PAPERS/Hussain05b.html>.
- Lan03b
- Kun-chan Lan and John Heidemann. A Tool for RApid Model Parametrization and its Applications. In Proceedings of the Workshop on Models, Methods and Tools for Reproducible Network Research (MoMeTools), p. to appear. Karlsruhe, Germany, ACM. August, 2003. <http://www.isi.edu/~johnh/PAPERS/Lan03b.html>.
- Kamath02a
- Purushotham Kamath, Kun-chan Lan, John Heidemann, Joe Bannister, and Joe Touch.
Generation of High Bandwidth Network Traffic Traces. In Proceedings of the International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 401-410.
Fort Worth, Texas, USA, USC/Information Sciences Institute, IEEE.
October, 2002.
<http://www.isi.edu/~johnh/PAPERS/Kamath02a.html>.
- Lan02c
- Kun-Chan Lan and John Heidemann. Rapid model parameterization from traffic measurement. ACM Transactions on Modeling and Computer Simulations, 12 (3 ), pp. 201-229, July, 2002. <http://www.isi.edu/~johnh/PAPERS/Lan02c.html>.
- Lan01a
- Kun-chan Lan and John Heidemann.
Structural Modeling of RealAudio Traffic. Technical Report ISI-TR-544, USC/Information Sciences Institute, September, 2001.
<http://www.isi.edu/~johnh/PAPERS/Lan01a.html>.
- Mena00a
- Art Mena and John Heidemann. An Empirical Study of Real Audio Traffic. In Proceedings of the IEEE Infocom, p. 101-110. Tel-Aviv, Israel, IEEE. March, 2000. <http://www.isi.edu/~johnh/PAPERS/Mena00a.html>.
Internet Routing and Reliability
- Quan13c
- Lin Quan, John Heidemann, and Yuri Pradkin. Trinocular: Understanding Internet Reliability Through Adaptive Probing. In Proceedings of the ACM SIGCOMM Conference , p. to appear. Hong Kong, China, ACM. August, 2013. <http://www.isi.edu/~johnh/PAPERS/Quan13c.html>.
- Heidemann13b
- John Heidemann. Active Probing of Edge Networks: Outages During Hurricane Sandy. Talk given at NANOG57 as part of panel hosted by James Cowie. February, 2013. <http://www.isi.edu/~johnh/PAPERS/Heidemann13b.html>.
- Heidemann13d
- John Heidemann. Active Probing of Edge Networks: Hurricane Sandy and Beyond. Talk given at FCC Workshop on Network Resiliency. February, 2013. <http://www.isi.edu/~johnh/PAPERS/Heidemann13d.html>.
- Heidemann13c
- John Heidemann. Third-Party Measurement of Network Outages in Hurricane Sandy. In Proceedings of the FCC Workshop on Network Resiliency, Brooklyn, New York, USA, February, 2013. <http://www.isi.edu/~johnh/PAPERS/Heidemann13d.html>.
- Heidemann13e
- John Heidemann. Long-term Data Collection and Analysis of Outages at the Edge. Talk given at CAIDA Workshop on Active Internet Measurement Systems. February, 2013. <http://www.isi.edu/~johnh/PAPERS/Heidemann13e.html>.
- Quan13a
- Lin Quan, John Heidemann, and Yuri Pradkin. Poster Abstract: Towards Active Measurements of Edge Network Outages. In Proceedings of the Passive and Active Measurement Workshop, p. to appear. Hong Kong, China, Springer. March, 2013. <http://www.isi.edu/~johnh/PAPERS/Quan13a.html>.
- Heidemann12d
- John Heidemann, Lin Quan, and Yuri Pradkin. A Preliminary Analysis of Network Outages During Hurricane Sandy. Technical Report ISI-TR-2008-685b, USC/Information Sciences Institute, November, 2012. (Updated Feb. 2013.) <http://www.isi.edu/~johnh/PAPERS/Heidemann12d.html>.
- Quan12a
- Lin Quan, John Heidemann, and Yuri Pradkin. Detecting Internet Outages with Precise Active Probing (extended). Technical Report ISI-TR-2012-678b, USC/Information Sciences Institute, February, 2012. Updated May 2012; TR-678 superceeds ISI-TR-2011-672. <http://www.isi.edu/~johnh/PAPERS/Quan12a.html>.
- Quan11a
- Lin Quan and John Heidemann. Detecting Internet Outages with Active Probing (extended). Technical Report ISI-TR-2011-672, USC/Information Sciences Institute, May, 2010. <http://www.isi.edu/~johnh/PAPERS/Quan11a.html>.
- Chang04b
- Di-Fa Chang, Ramesh Govindan, and John Heidemann. Locating BGP Missing Routes Using Multiple Perspectives. In ACM SIGCOMM Workshop Network Troubleshooting, pp. 301-306. Portland, Oregon, USA, ACM. September, 2004. <http://www.isi.edu/~johnh/PAPERS/Chang04b.html>.
- Chang03a
- Di-Fa Chang, Ramesh Govindan, and John Heidemann. The Temporal and Topological Characteristics of BGP Path Changes. In Proceedings of the International Conference on Network Protocols, pp. 190-199. Atlanta, Georgia, USA, IEEE. November, 2003. <http://www.isi.edu/~johnh/PAPERS/Chang03a.html>.
- Chang02a
- Di-Fa Chang, Ramesh Govindan, and John Heidemann. An Empirical Study of Router Response to Large BGP Routing Table Load. In Proceedings of the ACM SIGCOMM Internet Measurement Workshop, pp. 203-208. Marseilles, France, USC/Information Sciences Institute, ACM. November, 2002. <http://www.isi.edu/~johnh/PAPERS/Chang02a.html>.
General Networking
- Dutta05a
- Debojyoti Dutta, Abhimanyu Das, Ashish Goel, Ahmed Helmy, and John Heidemann. Low State Fairness: Lower Bounds and Practical Enforcement. In Proceedings of the IEEE Infocom, p. to appear. Miami, Florida, USA, IEEE. March, 2005. <http://www.isi.edu/~johnh/PAPERS/Dutta05a.html>.
- Dutta03a
- Debojyoti Dutta, Ashish Goel, and John Heidemann. Oblivious AQM and Nash Equilibria. In Proceedings of the IEEE Infocom, pp. 106-113. San Francisco, California, USA, IEEE. March, 2003. <http://www.isi.edu/~johnh/PAPERS/Dutta03a.html>.
- Dutta02c
- Debojyoti Dutta, Ashish Goel, and John Heidemann.
Oblivious AQM and Nash Equilibria (abstract for SIGCOMM Poster). ACM Computer Communication Review, 32 (3 ), p. 20, July, 2002.
For full paper, see USC-CS-TR-764, July 2002.
<http://www.isi.edu/~johnh/PAPERS/Dutta02c.html>.
- Dutta02b
- Debojyoti Dutta, Ashish Goel, and John Heidemann.
Oblivious AQM and Nash Equilibria. Technical Report 02-764, University of Southern California Computer Science Department, July, 2002.
<http://www.isi.edu/~johnh/PAPERS/Dutta02b.html>.
- Allman00a
- M. Allman, S. Dawkins, D. Glover, J. Griner, D. Tran, T. Henderson, J. Heidemann, J. Touch, H. Kruse, S. Ostermann, K. Scott, and J. Semke. Ongoing TCP Research Related to Satellites. RFC2760, Internet Request For Comments, February, 2000. <http://www.isi.edu/~johnh/PAPERS/Allman00a.html>.
Analysis of the Domain-Name System
- Heidemann12c
- John Heidemann. Broadening DNS Research: beyond just DNS anonymization (work in progress). Talk at ISC/CAIDA Data Collaboration Workshop. October, 2012. <http://www.isi.edu/~johnh/PAPERS/Heidemann12c.html>.
World-Wide Web
- Chen05a
- Xuan Chen and John Heidemann. Flash Crowd Mitigation via Adaptive Admission Control Based on Application-Level Observation. ACM Transactions on Internet Technology, 5 (3 ), pp. 532-562, August, 2005. <http://www.isi.edu/~johnh/PAPERS/Chen05a.html>.
- Chen03a
- Xuan Chen and John Heidemann. Preferential Treatment for Short Flows to Reduce Web Latency. Computer Networks, 41 (6 ), pp. 779-794, April, 2003. <http://www.isi.edu/~johnh/PAPERS/Chen03a.html>.
- Eggert00a
- Lars Eggert, John Heidemann, and Joe Touch.
Effects of Ensemble-TCP. ACM Computer Communication Review, 30 (1), pp. 15-29, January, 2000.
<http://www.isi.edu/~johnh/PAPERS/Eggert00a.html>.
- Eggert99a
- Lars Eggert and John Heidemann.
Application-level Differentiated Services for Web Servers. World-Wide Web Journal, 2 (3), pp. 133-142, August, 1999.
<http://www.isi.edu/~johnh/PAPERS/Eggert99a.html>.
- Heidemann98g
-
John Heidemann and Vikram Visweswaraiah.
Automatic Selection of Nearby Web Servers.
Technical Report 98-688, University of Southern California, December, 1998.
- Heidemann98f
- John Heidemann and Wenhui Zhao.
Multi-way Rendezvous in the Web.
Technical Report 98-687, University of Southern California, December, 1998.
Submitted for publication.
- Touch98d
- Joe Touch, John Heidemann, and Katia Obraczka.
Analysis of HTTP Performance.
Research Report 98-463, USC/Information Sciences Institute, August, 1998.
A revised version of a web page made public in June 1996.
- Heidemann97b
- John Heidemann, Katia Obraczka, and Joe Touch.
Modeling the Performance of HTTP Over Several Transport Protocols.
ACM/IEEE Transactions on Networking, 5 5, 616-630, October, 1997.
- Visweswaraiah97b
-
Vikram Visweswaraiah and John Heidemann.
Improving Restart of Idle TCP Connections.
Technical Report 97-661, University of Southern California, November, 1997.
- Heidemann97a
-
John Heidemann.
Performance Interactions Between P-HTTP and TCP Implementations.
ACM Computer Communication Review, 27 2, 65-73, April, 1997.
Draft versions were available in 1996 as [Heidemann96b].
- Heidemann96a
- John Heidemann, Katia Obraczka, and Joe Touch. Modeling the Performance of HTTP Over Several Transport Protocols. To appear, IEEE/ACM Transactions on Networking. Originally announced November 1996. Draft as of June 1997.
Networking Education
- Papadopoulos02a
- Christos Papadopoulos and John Heidemann. Using Ns in the Classroom and Lab. In Proceedings of the ACM SIGCOMM Workshop on Computer Networking: Curriculum Designs and Educational Challenges, pp. 45-46. Pittsburgh, PA, USA, ACM. August, 2002. <http://www.isi.edu/~johnh/PAPERS/Papadopoulos02a.html>.
General sensor nets and embedded nets
- Paradiso08a
- Joseph A. Paradiso, John Heidemann, and Thomas G. Zimmerman. Hacking is Pervasive. IEEE Pervasive Computing Magazine, 7 (3 ), pp. 13-15, July, 2008. (Special issue guest editors). <http://www.isi.edu/~johnh/PAPERS/Paradiso08a.html>.
- Heidemann07b
- John Heidemann. Sensornets and the Next Big Thing. Keynote talk at the European Conference on Wireless Sensor Networks. January, 2007. <http://www.isi.edu/~johnh/PAPERS/Heidemann07b.html>.
- Heidemann06d
- John Heidemann. Sensornet Research Opportunities in GENI and FIND, Invited talk at IEEE MASS. October, 2006. <http://www.isi.edu/~johnh/PAPERS/Heidemann06d.html>.
- Ganesan05a
- Deepak Ganesan, Ben Greenstein, Deborah Estrin, John heidemann, and Ramesh Govindan. Multiresolution storage and search in sensor networks. ACM Transactions on Storage, 1 (3 ), pp. 277-315, August, 2005. <http://www.isi.edu/~johnh/PAPERS/Ganesan05a.html>.
- Heidemann05a
- John Heidemann and Wei Ye. Energy Conservation in Sensor Networks at the Link and Network Layers. In Wireless Sensor Networks: A Systems Perspective, Nirupama Bulusu and Sanjay Jha, editors, pp. 75-86. Artech House, Inc.. 2005. Chapter 6. <http://www.isi.edu/~johnh/PAPERS/Heidemann05a.html>.
- Heidemann04c
- John Heidemann and Wei Ye. Energy Conservation in Sensor Networks at the Link and Network Layers. Technical Report ISI-TR-2004-599, USC/Information Sciences Institute, 2004. book chapter to appear in Wireless Sensor Networks: A Systems Perspective, Nirupama Bulusu and Sanjay Jha (editors), Artech House, 2005. <http://www.isi.edu/~johnh/PAPERS/Heidemann04c.html>.
- Heidemann05c
- John Heidemann and Ramesh Govindan. Embedded Sensor Networks. In Handbook of Networked and Embedded Control Systems, D. Hristu-Varsakelis and W.S. Levine, editors, pp. 721-738. Springer Verlag. 2005. <http://www.isi.edu/~johnh/PAPERS/Heidemann05c.html>.
- Conner05a
- W. Steven Conner, John Heidemann, Lakshman Krishnamurthy, Xi Wang, and Mark Yarvis. Workplace Applications of Sensor Networks. In Wireless Sensor Networks: A Systems Perspective, Nirupama Bulusu and Sanjay Jha, editors, pp. 289-307. Artech House, Inc.. 2005. Chapter 19. <http://www.isi.edu/~johnh/PAPERS/Conner05a.html>.
- Heidemann04a
- John Heidemann and Ramesh Govindan. An Overview of Embedded Sensor Networks. Technical Report ISI-TR-2004-594, USC/Information Sciences Institute, November, 2004. <http://www.isi.edu/~johnh/PAPERS/Heidemann04a.html>.
- Conner04a
- W. Steven Conner, John Heidemann, Lakshman Krishnamurthy, Xi Wang, and Mark Yarvis. Workplace Applications of Sensor Networks. Technical Report ISI-TR-2004-591, USC/Information Sciences Institute, July, 2004. To appear as a chapter in Wireless Sensor Networks: A Systems Perspective, Nirupama Bulusu and Sanjay Jha, editors; Artech House, publisher (2004).. <http://www.isi.edu/~johnh/PAPERS/Conner04a.html>.
- Ganesan03a
- Deepak Ganesan, Ben Greenstein, Denis Perelyubskiy, Deborah Estrin, and John Heidemann. An Evaluation of Multi-resolution Storage for Sensor Networks. In Proceedings of the ACM SenSys Conference, pp. 89-102. Los Angeles, California, USA, ACM. November, 2003. <http://www.isi.edu/~johnh/PAPERS/Ganesan03a.html>.
- Krishnamachari03a
- Bhaskar Krishnamachari and John Heidemann. Application-specific Modeling of Information Routing in Sensor Networks. Technical Report ISI-TR-576, USC/Information Sciences Institute, August, 2003. <http://www.isi.edu/~johnh/PAPERS/Krishnamachari03a.html>.
- Rahimi03a
- Mohammad Rahimi, Hardik Shah, Gaurav Sukhatme, John Heidemann, and Deborah Estrin. Studying the Feasibility of Energy Harvesting in a Mobile Sensor Network. In Proceedings of the IEEE International Conference on Robotics and Automation, pp. 19-24. Taipai, Taiwan, IEEE. May, 2003. <http://www.isi.edu/~johnh/PAPERS/Rahimi03a.html>.
- Ganesan02c
- Deepak Ganesan, Deborah Estrin, and John Heidemann. DIMENSIONS: Why do we need a new Data Handling architecture for Sensor Networks? In Proceedings of the ACM Workshop on Hot Topics in Networks, pp. 143-148. Princeton, NJ, USA, ACM. October, 2002. <http://www.isi.edu/~johnh/PAPERS/Ganesan02c.html>.
- Estrin00a
- Deborah Estrin, Ramesh Govindan, and John Heidemann.
Embedding the Internet. Communications of the ACM, 43 (5 ), pp. 39-41, May, 2000.
(special issue guest editors).
<http://www.isi.edu/~johnh/PAPERS/Estrin00a.html>.
- Estrin99e
- Deborah Estrin, Ramesh Govindan, John Heidemann, and Satish Kumar.
Next Century Challenges: Scalable Coordination in Sensor Networks. In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, pp. 263-270.
Seattle, Washington, USA, ACM.
August, 1999.
<http://www.isi.edu/~johnh/PAPERS/Estrin99e.html>.
- Heidemann98d
- John Heidemann, Ramesh Govindan, and Deborah Estrin. Configuration Challenges for Smart Spaces. In Proceedings of the DARPA/NIST Smart Spaces Workshop, Gaithersburg, Maryland, USA, USC/Information Sciences Institute, Defense Advanced Research Projects Agency. July, 1998.
Data Sharing in Sensornets
- Park11a
- Unkyu Park and John Heidemann. Data Muling with Mobile Phones for Sensornets. In Proceedings of the 9th ACM SenSys Conference , p. 162-175. Seattle, Washington, USA, ACM. November, 2011. <http://www.isi.edu/~johnh/PAPERS/Park11a.html>.
- Park09a
- Unkyu Park and John Heidemann. Low-latency Synchronization of Loosely-coupled Sensornet Republishing. Technical Report ISI-TR-2009-660b, USC/Information Sciences Institute, April, 2009. updated June 2010. <http://www.isi.edu/~johnh/PAPERS/Park09a.html>.
- Park08b
- Unkyu Park and John Heidemann. Provenance in Sensornet Republishing. In Proceedings of the 2nd International Provenance and Annotation Workshop , pp. 208-292. Salt Lake City, Utah, USA, Springer-Verlag. June, 2008. <http://www.isi.edu/~johnh/PAPERS/Park08b.html>.
- Heidemann07d
- John Heidemann. Data-Centric Networking as an ``Information Layer''. Lightning Talk at NSF FIND PI meeting. November, 2007. <http://www.isi.edu/~johnh/PAPERS/Heidemann07d.html>.
- Reddy07a
- Sasank Reddy, Gong Chen, Brian Fulkerson, Sung Jin Kim, Unkyu Park, Nathan Yau, Junghoo Cho, and John Heidemann Mark Hansen. Sensor-Internet Share and Search--Enabling Collaboration of Citizen Scientists. In Proceedings of the ACM Workshop on Data Sharing and Interoperability on the World-wide Sensor Web, pp. 11-16. Cambridge, Mass., USA, ACM. April, 2007. <http://www.isi.edu/~johnh/PAPERS/Reddy07a.html>.
Data Fusion in Sensornets
- Zhang13b
- Chengjie Zhang and John Heidemann. Reducing False Alarms with Multi-modal Sensing for Pipeline Blockage (extended). Technical Report ISI-TR-2013-686, USC/Information Sciences Institute, June, 2013. <http://www.isi.edu/~johnh/PAPERS/Zhang13b.html>.
- Zhang11c
- Chengjie Zhang and John Heidemann. Evaluating Signature Matching in a Multi-Sensor Vehicle Classification System (extended) . Technical Report ISI-TR-2011-675, USC/Information Sciences Institute, November, 2011. <http://www.isi.edu/~johnh/PAPERS/Zhang11c.html>.
- Heidemann05d
- John Heidemann, Fabio Silva, Xi Wang, Genevieve Giuliano, and Mengzhao Hu. SURE-SE: Sensors for Unplanned Roadway Events--Simulation and Evaluation: Final Report. METRANS Project 05-08 final report, USC/Information Sciences Institute, May, 2005. finalized July 2007; typographic corrections April 2008. <http://www.isi.edu/~johnh/PAPERS/Heidemann05d.html>.
- Park06a
- Unkyu Park, Fabio Silva, Mengzhao Hou, John Heidemann, Genevieve Guiliano, Xi Wang, and Nikhil Prashar. Single- and Multi-Sensor Techniques to Improve Accuracy of Urban Vehicle Classification. Technical Report ISI-TR-2006-614, USC/Information Sciences Institute, April, 2006. <http://www.isi.edu/~johnh/PAPERS/Park06a.html>.
Policy and privacy issues in sensor networks
- Rajgarhia04a
- Abhishek Rajgarhia, Fred Stann, and John Heidemann. Privacy-Sensitive Monitoring With a Mix of IR Sensors and Cameras. In Proceedings of the Second International Workshop on Sensor and Actor Network Protocols and Applications, pp. 21-29. Boston, Massachusetts, USA, ACM. August, 2004. <http://www.isi.edu/~johnh/PAPERS/Rajgarhia04a.html>.
Understanding wireless propagation
- Son07b
- Dongjin Son, John Heidemann, and Bhaskar Krishnamachari. Towards Concurrent Communication in Wireless Networks. Technical Report ISI-TR-2007-648, USC/Information Sciences Institute, July, 2007. <http://www.isi.edu/~johnh/PAPERS/Son07b.html>.
- Son07a
- Dongjin Son, Bhaskar Krishnamachari, and John Heidemann. Evaluating the Importance of Concurrent Packet Communication in Wireless Networks. Technical Report ISI-TR-639, USC/Information Sciences Institute, April, 2007. <http://www.isi.edu/~johnh/PAPERS/Son07a.html>.
- Murtaza07a
- Muhammad Zaki Murtaza, John Heidemann, and Fred Stann. Studying the Spatial Correlation of Loss Patterns Among Communicating Wireless Sensor Nodes. Technical Report ISI-TR-2007-626, USC/Information Sciences Institute, March, 2007. This technical report is a public release of a USC/CSD directed research report done August, 2005.. <http://www.isi.edu/~johnh/PAPERS/Murtaza07a.html>.
- Son06a
- Dongjin Son, Bhaskar Krishnamachari, and John Heidemann. Experimental Analysis of Concurrent Packet Transmissions in Wireless Sensor Networks. In Proceedings of the Fourth ACM SenSys Conference , pp. 237-249. Boulder, Colorado, USA, ACM. November, 2006. <http://www.isi.edu/~johnh/PAPERS/Son06a.html>.
Localization and location-aware computing
- Wang04c
- Xi Wang, Fabio Silva, and John Heidemann. Infrastructureless Location Aware Configuration for Sensor Networks. In Workshop on Mobile Computing Systems and Applications, pp. 174-183. English Lake District, United Kingdom, IEEE. December, 2004. <http://www.isi.edu/~johnh/PAPERS/Wang04c.html>.
- Wang04d
- Xi Wang, Fabio Silva, and John Heidemann. Demo Abstract: Follow-Me Application--Active Visitor Guidance System. In Proceedings of the 2nd ACM SenSys Conference , Baltimore, Maryland, USA, ACM. November, 2004. <http://www.isi.edu/~johnh/PAPERS/Wang04d.html>.
- Bulusu04a
- Nirupama Bulusu, John Heidemann, Deborah Estrin, and Tommy Tran. Self-configuring localization systems: Design and Experimental Evaluation. ACM Transactions on Embedded Computing Systems, 3 (1 ), pp. 24-60, February, 2004. <http://www.isi.edu/~johnh/PAPERS/Bulusu04a.html>.
- Bulusu02a
- Nirupama Bulusu, Vladimir Bychkovskiy, Deborah Estrin, and John Heidemann.
Scalable, Ad Hoc Deployable, RF-Based Localization. In Proceedings of the Grace Hopper Celebration of Women in Computing, p. to appear.
Vancouver, British Columbia, Canada, Institute for Women and Technology.
October, 2002.
<http://www.isi.edu/~johnh/PAPERS/Bulusu02a.html>.
- Bulusu02c
- Nirupama Bulusu, John Heidemann, Deborah Estrin, and Tommy Tran.
Self-Configuring Localization Systems: Design and Experimental Evaluation. Technical Report 8, University of California, Los Angeles, Center for Embedded Networked Computing, September, 2002.
Accepted to appear, ACM TOCS.
<http://www.isi.edu/~johnh/PAPERS/Bulusu02c.html>.
- Bulusu01d
- Nirupama Bulusu, Deborah Estrin, and John Heidemann.
Tradeoffs in Location Support Systems: The Case for Quality-Expressive Location Models for Applications. In Proceedings of the Ubicomp Workshop on Location Modeling, pp. 7-12.
Atlanta, Georgia, USA, September, 2001.
<http://www.isi.edu/~johnh/PAPERS/Bulusu01d.html>.
- Heidemann01d
- John Heidemann and Nirupama Bulusu.
Using Geospatial Information in Sensor Networks. In Proceedings of the Workshop on Intersections between Geospatial Information and Information Technology, Arlington, VA, USA, National Research Council.
October, 2001.
<http://www.isi.edu/~johnh/PAPERS/Heidemann01d.html>.
- Bulusu01c
- Nirupama Bulusu, Deborah Estrin, Lewis Girod, and John Heidemann.
Scalable Coordination for Wireless Sensor Networks: Self-Configuring Localization Systems. In Proceedings of the 6th IEEE International Symposium on Communication Theory and Application, p. to appear.
St. Martin's College, Ambleside, Cumbria, UK, USC/Information Sciences Institute, IEEE.
July, 2001.
<http://www.isi.edu/~johnh/PAPERS/Bulusu01c.html>.
- Bulusu01a
- Nirupama Bulusu, John Heidemann, and Deborah Estrin.
Adaptive Beacon Placement. In Proceedings of the 21st International Conference on Distributed Computing Systems, pp. 489-498.
Phoenix, AZ, April, 2001.
<http://www.isi.edu/~johnh/PAPERS/Bulusu01a.html>.
- Bulusu00a
- Nirupama Bulusu, John Heidemann, and Deborah Estrin.
GPS-less Low Cost Outdoor Localization For Very Small Devices. IEEE Personal Communications Magazine, 7 (5 ), pp. 28-34, October, 2000.
<http://www.isi.edu/~johnh/PAPERS/Bulusu00a.html>.
- Heidemann00b
- John Heidemann and Dhaval Shah. Location-Aware Scheduling With Minimal Infrastructure. In USENIX Conference Proceedings, pp. 131-138. San Diego, CA, USC/Information Sciences Institute, USENIX. June, 2000. <http://www.isi.edu/~johnh/PAPERS/Heidemann00b.html>.
Data dissemination, routing, and transport protocols in sensor networks
- Stann06b
- Fred Stann, John Heidemann, Rajesh Shroff, and Muhammad Zaki Murtaza. RBP: Robust Broadcast Propagation in Wireless Networks. In Proceedings of the Fourth ACM SenSys Conference , pp. 85-98. Boulder, Colorado, USA, ACM. November, 2006. <http://www.isi.edu/~johnh/PAPERS/Stann06b.html>.
- Stathopoulos06b
- Thanos Stathopoulos, Lewis Girod, John Heidemann, Deborah Estrin, and Karen Weeks. Centralized Routing for Resource-Constrained Wireless Sensor Networks (SYS 5). Poster presented at CENS 2006 Research Review. October, 2006. <http://repositories.cdlib.org/cens/Posters/284/>.
- Stathopoulos05a
- Thanos Stathopoulos, Lewis Girod, John Heidemann, and Deborah Estrin. Mote Herding for Tiered Wireless Sensor Networks. Technical Report 58, University of California, Los Angeles, Center for Embedded Networked Computing, December, 2005. <http://repositories.cdlib.org/cgi/viewcontent.cgi?article=2018&context=cens>.
- Gnawali05a
- Omprakash Gnawali, Ramesh Govindan, and John Heidemann. Implementing a Sensor Database System using a Generic Data Dissemination Mechanism. IEEE Data Engineering Bulletin, 28 (1 ), pp. 70-75, March, 2005. <http://www.isi.edu/~johnh/PAPERS/Gnawali05a.html>.
- Stann05a
- Fred Stann and John Heidemann. BARD: Bayesian-Assisted Resource Discovery In Sensor Networks. In Proceedings of the IEEE Infocom, pp. 866-877. Miami, Florida, USA, IEEE. March, 2005. <http://www.isi.edu/~johnh/PAPERS/Stann05a.html>.
- Stathopoulos04a
- Thanos Stathopoulos, Rahul Kapur, Deborah Estrin, John Heidemann, and Lixia Zhang. Application-Based Collision Avoidance in Wireless Sensor Networks. In Proceedings of the 29th IEEE International Conference on Local Computer Networks, pp. 506-514. Tampa, Florida, USA, IEEE. November, 2004. <http://www.isi.edu/~johnh/PAPERS/Stathopoulos04a.html>.
- Silva05a
- Fabio Silva, John Heidemann, Ramesh Govindan, and Deborah Estrin. Directed Diffusion. In Frontiers in Distributed Sensor Networks, S. S. Iyengar and R. R. Brooks, editors, pp. 573-596. Boca Raton, Florida, USA, CRC Press, Inc.. October, 2003. <http://www.isi.edu/~johnh/PAPERS/Silva04b.html>.
- Krishnamachari04a
- Bhaskar Krishnamachari and John Heidemann. Application-specific Modeling of Information Routing in Sensor Networks. In Proceedings of the IEEE International on Performance, Computing, and Communications Conference, pp. 717-722. Phoenix, Arizona, USA, IEEE. April, 2004. <http://www.isi.edu/~johnh/PAPERS/Krishnamachari04a.html>.
- Silva04a
- Fabio Silva, John Heidemann, Ramesh Govindan, and Deborah Estrin. Directed Diffusion. Technical Report ISI-TR-2004-586, USC/Information Sciences Institute, January, 2004. To appear in Frontiers in Distributed Sensor Networks, S. S. Iyengar and R. R. Brooks, eds.. <http://www.isi.edu/~johnh/PAPERS/Silva04a.html>.
- Heidemann03b
- John Heidemann, Fabio Silva, and Deborah Estrin. Matching Data Dissemination Algorithms to Application Requirements. In Proceedings of the ACM SenSys Conference, pp. 218-229. Los Angeles, California, USA, ACM. November, 2003. <http://www.isi.edu/~johnh/PAPERS/Heidemann03b.html>.
- Stathopoulos03b
- Thanos Stathopoulos, John Heidemann, and Deborah Estrin. A Remote Code Update Mechanism for Wireless Sensor Networks. Technical Report CENS-TR-30, University of California, Los Angeles, Center for Embedded Networked Computing, November, 2003. <http://www.isi.edu/~johnh/PAPERS/Stathopoulos03b.html>.
- Stann03a
- Fred Stann and John Heidemann. RMST: Reliable Data Transport in Sensor Networks. In Proceedings of the First International Workshop on Sensor Net Protocols and Applications, pp. 102-112. Anchorage, Alaska, USA, IEEE. April, 2003. <http://www.isi.edu/~johnh/PAPERS/Stann03a.html>.
- Intanagonwiwat03a
- Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann, and Fabio Silva.
Directed Diffusion for Wireless Sensor Networking. ACM/IEEE Transactions on Networking, 11 (1 ), pp. 2-16, February, 2002.
<http://www.isi.edu/~johnh/PAPERS/Intanagonwiwat03a.html>.
- Silva02a
- Fabio Silva, John Heidemann, and Ramesh Govindan.
Network Routing Application Programmer's Interface (API) and Walk Through 9.0.1. USC/Information Sciences Institute, December, 2002.
<http://www.isi.edu/~johnh/PAPERS/Silva02a.html>.
- Heidemann02a
- John Heidemann, Fabio Silva, Yan Yu, Deborah Estrin, and Padmaparma Haldar.
Diffusion Filters as a Flexible Architecture for Event Notification in Wireless Sensor Networks. Technical Report ISI-TR-556, USC/Information Sciences Institute, April, 2002.
<http://www.isi.edu/~johnh/PAPERS/Heidemann02a.html>.
- Intanagonwiwat02a
- Chalermek Intanagonwiwat, Deborah Estrin, Ramesh Govindan, and John Heidemann.
Impact of Network Density on Data Aggregation in Wireless Sensor Networks. In Proceedings of the 22nd International Conference on Distributed Computing Systems, p. to appear.
Vienna, Austria, IEEE.
July, 2002.
See UCLA CSD TR-01-750 for an expanded version of this paper..
<http://www.isi.edu/~johnh/PAPERS/Intanagonwiwat02a.html>.
- Intanagonwiwat01b
- Chalermek Intanagonwiwat, Deborah Estrin, Ramesh Govindan, and John Heidemann.
Impact of Network Density on Data Aggregation in Wireless Sensor Networks. Technical Report 01-750, University of Southern California Computer Science Department, November, 2001.
<http://www.isi.edu/~johnh/PAPERS/Intanagonwiwat01b.html>.
- Heidemann01c
- John Heidemann, Fabio Silva, Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, and Deepak Ganesan. Building Efficient Wireless Sensor Networks with Low-Level Naming. In Proceedings of the Symposium on Operating Systems Principles, pp. 146-159. Chateau Lake Louise, Banff, Alberta, Canada, ACM. October, 2001. <http://www.isi.edu/~johnh/PAPERS/Heidemann01c.html>.
MAC and topology-control protocols for sensor networks
See also MAC protocols for high-latency, underwater sensor networks.
- Syed13a
- Affan A. Syed, John Heidemann, and Wei Ye. Tones for Real: Managing Multipath in Underwater Acoustic Wakeup. ACM Transactions on Sensor Networks, 9 (3 ), pp. 27:1-27:24, August, 2013. <http://dx.doi.org/http://dx.doi.org/10.1145/2422966.2422984>, <http://www.isi.edu/~johnh/PAPERS/Syed13a.html>.
- Goodney10a
- Andrew Goodney, Young Cho, John Heidemann, and John Wroclawski. An Underwater Communication and Sensing Testbed in Marina del Rey (Poster Abstract). In Proceedings of the Fifth ACM International Workshop on UnderWater Networks (WUWNet) , p. to appear. Woods Hole, Massachusetts, USA, ACM. September, 2010. <http://www.isi.edu/~johnh/PAPERS/Goodney10a.html>.
- Li08a
- Yuan Li, Wei Ye, John Heidemann, and Rohit Kulkarni. Design and Evaluation of Network Reconfiguration Protocols for Mostly-Off Sensor Networks. Ad Hoc Networks Journal, 6 (8 ), pp. 1301-1315, November, 2008. to appear, sometime in 2008. <doi:10.1016/j.adhoc.2007.11.009>, <http://www.isi.edu/~johnh/PAPERS/Li08a.html>.
- Stathopoulos07a
- Thanos Stathopoulos, Martin Lukac, Dustin McIntire, John Heidemann, Deborah Estrin, and William J. Kaiser. End-to-end Routing for Dual-Radio Sensor Networks. In Proceedings of the IEEE Infocom, p. to appear. Anchorage, Alaska, USA, IEEE. May, 2007. <http://www.isi.edu/~johnh/PAPERS/Stathopoulos07a.html>.
- McHenry07a
- Tyler McHenry and John Heidemann. MAC Stability in Sensor Networks at High Network Densities. Technical Report ISI-TR-2007-628, USC/Information Sciences Institute, January, 2007. <http://www.isi.edu/~johnh/PAPERS/McHenry07a.html>.
- Ye06a
- Wei Ye, Fabio Silva, and John Heidemann. Ultra-Low Duty Cycle MAC with Scheduled Channel Polling. In Proceedings of the Fourth ACM SenSys Conference , pp. 321-333. Boulder, Colorado, USA, ACM. November, 2006. <http://www.isi.edu/~johnh/PAPERS/Ye06a.html>.
- Li06a
- Yuan Li, Wei Ye, and John Heidemann. Energy Efficient Network Reconfiguration for Mostly-Off Sensor Networks. In Proceedings of the Third IEEE Conference on Sensor and Adhoc Communication and Networks , pp. 527-535. Reston, Virginia, USA, IEEE. September, 2006. <http://www.isi.edu/~johnh/PAPERS/Li06a.html>.
- Ye05a
- Wei Ye and John Heidemann. Ultra-Low Duty Cycle MAC with Scheduled Channel Polling. Technical Report ISI-TR-2005-604b, USC/Information Sciences Institute. Originally released July, 2005; updated April 2006. <http://www.isi.edu/~johnh/PAPERS/Ye05a.html>.
- Ahn05a
- Jong-Suk Ahn, Seung-Wook Hong, and John Heidemann. An Adaptive FEC Code Control Algorithm for Mobile Wireless Sensor Networks. Journal of Communications and Networks, 7 (4 ), pp. 489-499, 2005. to appear. <http://www.isi.edu/~johnh/PAPERS/Ahn05a.html>.
- Li05a
- Yuan Li, Wei Ye, and John Heidemann. Energy and Latency Control in Low Duty Cycle MAC Protocols. In Proceedings of the IEEE Wireless Communications and Networking Conference, New Orleans, LA, USA, March, 2005. <http://www.isi.edu/~johnh/PAPERS/Li05a.html>.
- Gnawali04a
- Omprakash Gnawali, Mark Yarvis, John Heidemann, and Ramesh Govindan. Interaction of Retransmission, Blacklisting, and Routing Metrics for Reliability in Sensor Network Routing. In Proceedings of the First IEEE Conference on Sensor and Adhoc Communication and Networks , pp. 34-43. Santa Clara, California, USA, IEEE. October, 2004. <http://www.isi.edu/~johnh/PAPERS/Gnawali04a.html>.
- Son04a
- Dongjin Son, Bhaskar Krishnamachari, and John Heidemann. Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks. In Proceedings of the First IEEE Conference on Sensor and Adhoc Communication and Networks , pp. 289-298. Santa Clara, California, USA, IEEE. October, 2004. <http://www.isi.edu/~johnh/PAPERS/Son04a.html>.
- Ye04b
- Wei Ye, John Heidemann, and Deborah Estrin. Medium Access Control with Coordinated, Adaptive Sleeping for Wireless Sensor Networks. ACM/IEEE Transactions on Networking, 12 (3 ), pp. 493-506, June, 2004. A preprint of this paper was available as ISI-TR-2003-567. <http://www.isi.edu/~johnh/PAPERS/Ye04b.html>.
- Ye04a
- Wei Ye and John Heidemann. Medium Access Control in Wireless Sensor Networks. In Wireless Sensor Networks, C. S. Raghavendra, Krishna Sivalingam, Ty Znati, editor, pp. 73-92. Kluwer Academic Publishers. 2004. Chapter 4. <http://www.isi.edu/~johnh/PAPERS/Ye04a.html>.
- Li03d
- Yuan Li, Wei Ye, and John Heidemann. Demonstration of Schedule and Latency Control in S-MAC. Technical Report ISI-TR-581, USC/Information Sciences Institute, November, 2003. <http://www.isi.edu/~johnh/PAPERS/Li03d.html>.
- Ye03c
- Wei Ye and John Heidemann. Medium Access Control in Wireless Sensor Networks . Technical Report ISI-TR-580, USC/Information Sciences Institute, October, 2003. To appear as a chapter in Wireless Sensor Networks, Taieb Znati, Krishna M. Sivalingam and Cauligi Raghavendra (eds.), Kluwer Academic Publishers. <http://www.isi.edu/~johnh/PAPERS/Ye03c.html>.
- Xu03a
- Ya Xu, Solomon Bien, Yutaka Mori, John Heidemann, and Deborah Estrin.
Topology Control Protocols to Conserve Energy in Wireless Ad Hoc Networks. Technical Report 6, University of California, Los Angeles, Center for Embedded Networked Computing, January, 2003.
submitted for publication.
<http://www.isi.edu/~johnh/PAPERS/Xu03a.html>.
- Ye02a
- Wei Ye, John Heidemann, and Deborah Estrin.
An Energy-Efficient MAC protocol for Wireless Sensor Networks. In Proceedings of the IEEE Infocom, pp. 1567-1576.
New York, NY, USA, USC/Information Sciences Institute, IEEE.
June, 2002.
<http://www.isi.edu/~johnh/PAPERS/Ye02a.html>.
- Ye02b
- Wei Ye, John Heidemann, and Deborah Estrin.
A Flexible and Reliable Radio Communication Stack on Motes. Technical Report ISI-TR-565, USC/Information Sciences Institute, September, 2002.
<http://www.isi.edu/~johnh/PAPERS/Ye02b.html>.
- Xu01a
- Ya Xu, John Heidemann, and Deborah Estrin.
Geography-informed Energy Conservation for Ad Hoc Routing. In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, pp. 70-84.
Rome, Italy, ACM.
July, 2001.
<http://www.isi.edu/~johnh/PAPERS/Xu01a.html>.
- Coffin01a
- Dan Coffin, Dan Van Hook, Ramesh Govindan, John Heidemann, and Fabio Silva.
Network Routing Application Programmer's Interface (API) and Walk Through 8.0. Technical Report 01-741, USC/ISI, March, 2001.
<http://www.isi.edu/~johnh/PAPERS/Coffin01a.html>.
- Xu00a
- Ya Xu, John Heidemann, and Deborah Estrin. Adaptive Energy-Conserving Routing for Multihop Ad Hoc Networks. Research Report527, USC/Information Sciences Institute, October, 2000. <http://www.isi.edu/~johnh/PAPERS/Xu00a.html>.
High Latency and Underwater Sensor Networks
- Heidemann12a
- John Heidemann, Milica Stojanovic, and Michele Zorzi. Underwater Sensor Networks: Applications, Advances, and Challenges. Philosophical Transactions of the Royal Society-A, 370 (1958 ), pp. 158-175, January, 2012. <doi:10.1098/rsta.2011.0214>, <http://www.isi.edu/~johnh/PAPERS/Heidemann12a.html>.
- Syed10a
- Affan A. Syed and John Heidemann. Contention Analysis of MAC Protocols that Count. In Proceedings of the Fifth ACM International Workshop on UnderWater Networks (WUWNet) , p. to appear. Woods Hole, Massachusetts, USA, ACM. September, 2010. <http://www.isi.edu/~johnh/PAPERS/Syed10a.html>.
- Ahn10a
- Joon Ahn, Affan Syed, Bhaskar Krishnamachari, and John Heidemann. Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks. Ad Hoc Networks Journal, 9 (5 ), pp. 752-766, July, 2010. (Published on-line September, 2010.). <doi:10.1016/j.adhoc.2010.09.007>, <http://www.isi.edu/~johnh/PAPERS/Ahn10a.html>.
- Ahn10b
- Joon Ahn, Affan Syed, Bhaskar Krishnamachari, and John Heidemann. Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks. Technical Report ISI-TR-2010-668, USC/Information Sciences Institute, September, 2010. This technical report is a draft preprint of a paper to appear in Elsevier Ad Hoc Networks Journal. Please access and cite that version if possible. <http://www.isi.edu/~johnh/PAPERS/Ahn10b.html>.
- Syed08b
- Affan A. Syed, Wei Ye, and John Heidemann. Comparison and Evaluation of the T-Lohi MAC for Underwater Acoustic Sensor Networks. IEEE Journal of Selected Areas in Communication, 26 (12 ), pp. 1731-1743, December, 2008. <doi:10.1109/JSAC.2008.081212>, <http://www.isi.edu/~johnh/PAPERS/Syed08b.html>.
- Heidemann08d
- John Heidemann, Urbashi Mitra, James Preisig, Milica Stojanovic, and Michele Zorzi. Guest Editorial: Underwater Wireless Communication Networks. IEEE Journal of Selected Areas in Communication, 26 (9 ), pp. 1617-1619, December, 2008. <doi:10.1109/JSAC.2008.4686798>, <http://www.isi.edu/~johnh/PAPERS/Heidemann08d.html>.
- Khan08a
- Muhammad Omar Khan, Affan A. Syed, John Heidemann, Wei Ye, and Jack Wills. Demo Abstract: Bringing Sensor Networks Underwater with Low-Power Acoustic Communications. In Proceedings of the Sixth ACM SenSys Conference , pp. 379-380. Raleigh, North Carolina, USA, ACM. November, 2008. <http://www.isi.edu/~johnh/PAPERS/Khan08a.html>.
- Syed08c
- Affan A. Syed, Muhammad Omar Khan, John Heidemann, Jack Wills, and Wei Ye. Demo Abstract: A Sensornet-inspired Underwater Acoustic Modem for Wake-up and Data. In ACM International Workshop on UnderWater Networks (WUWNet) , San Francisco, CA, USA, ACM. September, 2008. <http://www.isi.edu/~johnh/PAPERS/Syed08c.html>.
- Syed08a
- Affan A. Syed, Wei Ye, and John Heidemann. T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks. In Proceedings of the IEEE Infocom, p. to appear. Phoenix, Arizona, USA, IEEE. April, 2008. <http://www.isi.edu/~johnh/PAPERS/Syed08a.html>.
- Syed07b
- Affan Syed, Wei Ye, Bhaskar Krishnamachari, and John Heidemann. Understanding Spatio-Temporal Uncertainty in Medium Access with ALOHA Protocols. In Proceedings of the Second ACM International Workshop on UnderWater Networks (WUWNet) , pp. 41-48. Montréal, Quebec, Canada, ACM. September, 2007. <http://doi.acm.org/10.1145/1287812.1287822>. <http://www.isi.edu/~johnh/PAPERS/Syed07b.html>.
- Syed07a
- Affan A. Syed, Wei Ye, and John Heidemann. T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks. Technical Report ISI-TR-638b, USC/Information Sciences Institute, April, 2007. Technical report originally released April 2007, updated July 2007. <http://www.isi.edu/~johnh/PAPERS/Syed07a.html>.
- Syed06c
- Affan A. Syed, Wei Ye, and John Heidemann. Medium Access for Underwater Acoustic Sensor Networks (Extended Abstract for Work-in-Progress Poster). Technical Report USC/Information Sciences Institute, October, 2006. <http://www.isi.edu/~johnh/PAPERS/Syed06c.html>.
- Heidemann07a
- John Heidemann, Wei Ye, and Jack Wills. Underwater Networking Research at USC/ISI. In Proceedings of the Undersea Distributed Networked Systems Conference, Newport, Rhode Island, USA, February, 2007. <http://www.isi.edu/~johnh/PAPERS/Heidemann07a.html>.
- Wills06a
- Jack Wills, Wei Ye, and John Heidemann. Low-Power Acoustic Modem for Dense Underwater Sensor Networks. In Proceedings of the First ACM International Workshop on UnderWater Networks (WUWNet) , pp. 79-85. Los Angeles, California, USA, ACM. September, 2006. <http://www.isi.edu/~johnh/PAPERS/Wills06a.html>.
- Syed06a
- Affan Syed and John Heidemann. Time Synchronization for High Latency Acoustic Networks. In Proceedings of the IEEE Infocom, p. to appear. Barcelona, Spain, IEEE. April, 2006. <http://www.isi.edu/~johnh/PAPERS/Syed06a.html>.
- Heidemann06a
- John Heidemann, Wei Ye, Jack Wills, Affan Syed, and Yuan Li. Research Challenges and Applications for Underwater Sensor Networking. In Proceedings of the IEEE Wireless Communications and Networking Conference, pp. 228-235. Las Vegas, Nevada, USA, IEEE. April, 2006. <http://www.isi.edu/~johnh/PAPERS/Heidemann06a.html>.
Energy Conservation and Management
(Energy conservation and management, not related to more specific topics like MAC or data dissemination.)
- Syed10b
- Affan A. Syed, Young Cho, and John Heidemann. Demo Abstract: Energy Transference for Sensornets. In Proceedings of the 8th ACM SenSys Conference , p. to appear. Zurich, Switzerland, ACM. November, 2010. <http://www.isi.edu/~johnh/PAPERS/Syed10b.html>.
Sensornet Applications and SCADA Systems
Topology and Address Space Modeling
- Quan13b
- Lin Quan, John Heidemann, and Yuri Pradkin. Visualizing Sparse Internet Events: Network Outages and Route Changes. Computing, p. to appear, January, 2013. <doi:10.1007/s00607-013-0283-7>, <http://www.isi.edu/~johnh/PAPERS/Quan13b.html>.
- Heidemann13a
- John Heidemann and Walter Willinger. Internet Visualization. Computing, p. to appear, 2013. (Editorial discussing the First ACM Workshop on Internet Visualization). <doi:10.1007/s00607-013-0284-6>, <http://www.isi.edu/~johnh/PAPERS/Heidemann13a.html>.
- Quan12b
- Lin Quan, John Heidemann, and Yuri Pradkin. Visualizing Sparse Internet Events: Network Outages and Route Changes. In Proceedings of the First ACM Workshop on Internet Visualization, p. to appear. Boston, Mass., USA, Springer. November, 2012. <http://www.isi.edu/~johnh/PAPERS/Quan12b.html>.
- Hu12a
- Zi Hu and John Heidemann. Towards Geolocation of Millions of IP Addresses. In Proceedings of the ACM Internet Measurement Conference, pp. 123-130. Boston, MA, USA, ACM. 2012. <http://dx.doi.org/10.1145/2398776.2398790>, <http://www.isi.edu/~johnh/PAPERS/Hu12a.html>.
- Cai12b
- Xue Cai, John Heidemann, Balachander Krishnamurthy, and Walter Willinger. An Organization-Level View of the Internet and its Implications (Extended). Technical Report ISI-TR-2009-679, USC/Information Sciences Institute, June, 2012. <http://www.isi.edu/~johnh/PAPERS/Cai12b.html>.
- Fan10a
- Xun Fan and John Heidemann. Selecting Representative IP Addresses for Internet Topology Studies. In Proceedings of the ACM Internet Measurement Conference, p. 411-423. Melbourne, Australia, ACM. November, 2010. <http://www.isi.edu/~johnh/PAPERS/Fan10a.html>.
- Cai10c
- Xue Cai, John Heidemann, Balachander Krishnamurthy, and Walter Willinger. Towards an AS-to-Organization Map. In Proceedings of the ACM Internet Measurement Conference, pp. 199-205. Melbourne, Australia, ACM. November, 2010. <http://dx.doi.org/10.1145/1879141.1879166>, <http://www.isi.edu/~johnh/PAPERS/Cai10c.html>.
- Cai10a
- Xue Cai and John Heidemann. Understanding Block-level Address Usage in the Visible Internet. In Proceedings of the ACM SIGCOMM Conference , p. to appear. New Delhi, India, ACM. August, 2010. <http://www.isi.edu/~johnh/PAPERS/Cai10a.html>.
- Cai10b
- Xue Cai and John Heidemann. Understanding Block-level Address Usage in the Visible Internet (extended). Technical Report ISI-TR-2009-665, USC/Information Sciences Institute, June, 2010. This technical report extends the SIGCOMM 2010 paper with three appendices with supporting details. <http://www.isi.edu/~johnh/PAPERS/Cai10b.html>.
- Heidemann10a
- John Heidemann. Mapping the Internet to Assist Cyber-Defense. Invited talk at Spring Electronic Crimes Task Force Meeting. May, 2010. <http://www.isi.edu/~johnh/PAPERS/Heidemann10a.html>.
- Cai09b
- Xue Cai and John Heidemann. Understanding Address Usage in the Visible Internet. Technical Report ISI-TR-2009-656, USC/Information Sciences Institute, February, 2009. <http://www.isi.edu/~johnh/PAPERS/Cai09b.html>.
- Heidemann08c
- John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, and Joseph Bannister. Census and Survey of the Visible Internet. In Proceedings of the ACM Internet Measurement Conference, p. 169-182. Vouliagmeni, Greece, ACM. October, 2008. <http://www.isi.edu/~johnh/PAPERS/Heidemann08c.html>.
- Cai08a
- Xue Cai and John Heidemann. Active Probing to Classify Internet Address Blocks (poster abstract). In Proceedings of the ACM SIGCOMM Conference , p. to appear. Seattle, Washington, USA, ACM. August, 2008. (The poster abstract and poster are also available as ISI-TR-2008-653.). <http://www.isi.edu/~johnh/PAPERS/Cai08a.html>.
- Heidemann08a
- John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, and Joseph Bannister. Census and Survey of the Visible Internet (extended). Technical Report ISI-TR-2008-649b, USC/Information Sciences Institute, February, 2008. Updated August, 2008. <http://www.isi.edu/~johnh/PAPERS/Heidemann08a.html>.
- Heidemann07c
- John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, and Joseph Bannister. Exploring Visible Internet Hosts through Census and Survey. Technical Report ISI-TR-2007-640, USC/Information Sciences Institute, May, 2007. <http://www.isi.edu/~johnh/PAPERS/Heidemann07c.html>.
Network Simulation
- Hussain13a
- Alefiya Hussain, Yuri Pradkin, and John Heidemann. Replay of Malicious Traffic in Network Testbeds. In Proceedings of the 13th IEEE Conference on Technologies for Homeland Security (HST), p. (to appear). Waltham, Massachusetts, USA, IEEE. November, 2013. <http://www.isi.edu/~johnh/PAPERS/Hussain13a.html>.
- Hussain04a
- Alefiya Hussain, Aman Kapoor, and John Heidemann. The Effect of Detail on Ethernet Simulation. In Proceedings of the ACM Workshop on Parallel and Distributed Simulation, pp. 97-104. Kufstein, Austria, ACM. May, 2004. <http://www.isi.edu/~johnh/PAPERS/Hussain04a.html>.
- Dutta02d
- Debojyoti Dutta, Ashish Goel, and John Heidemann.
Faster Network Design with Scenario Pre-filtering. In Proceedings of the International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 237-246.
Fort Worth, Texas, USA, USC/Information Sciences Institute, IEEE.
October, 2002.
<http://www.isi.edu/~johnh/PAPERS/Dutta02d.html>.
- Papadopoulos02a
- Christos Papadopoulos and John Heidemann.
Using Ns in the Classroom and Lab. In Proceedings of the ACM SIGCOMM Workshop on Computer Networking: Curriculum Designs and Educational Challenges, pp. 45-46.
Pittsburgh, PA, USA, ACM.
August, 2002.
<http://www.isi.edu/~johnh/PAPERS/Papadopoulos02a.html>.
- Ye01a
- Wei Ye, Richard T. Vaughyan, Gaurav S. Sukhatme, John Heidemann, Deborah Estrin, and Maja J. Mataric.
Evaluating Control Strategies for Wireless-Networked Robots Using an Integrated Robot and Network Simulation. In Proceedings of the IEEE International Conference on Robotics and Automation, pp. 2941-2947.
Seoul, Korea, USC/Information Sciences Institute, IEEE.
May, 2001.
<http://www.isi.edu/~johnh/PAPERS/Ye01a.html>.
- Heidemann01f
- John Heidemann, Kevin Mills, and Sri Kumar.
Expanding Confidence in Network Simulation. IEEE Network Magazine, 15 (5 ), pp. 58-63, Sept./Oct., 2001.
<http://www.isi.edu/~johnh/PAPERS/Heidemann01f.html>.
- Huang01b
- Polly Huang and John Heidemann.
Minimizing Routing State for Light-Weight Network Simulation. In Proceedings of the International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, p. to appear.
Cincinnati, Ohio, USA, IEEE.
August, 2001.
<http://www.isi.edu/~johnh/PAPERS/Huang01b.html>.
- Estrin00b
- Deborah Estrin, Mark Handley, John Heidemann, Steven McCanne, Ya Xu, and Haobo Yu.
Network Visualization with the Nam, VINT Network Animator. IEEE Computer, 33 (11), pp. 63-68, November, 2000.
<http://www.isi.edu/~johnh/PAPERS/Estrin00b.html>.
- Heidemann01a
- John Heidemann, Nirupama Bulusu, Jeremy Elson, Chalermek Intanagonwiwat, Kun-chan Lan, Ya Xu, Wei Ye, Deborah Estrin, and Ramesh Govindan.
Effects of Detail in Wireless Network Simulation. In Proceedings of the SCS Multiconference on Distributed Simulation, pp. 3-11.
Phoenix, Arizona, USA, USC/Information Sciences Institute, Society for Computer Simulation.
January, 2001.
<http://www.isi.edu/~johnh/PAPERS/Heidemann01a.html>.
- Huang01a
- Polly Huang and John Heidemann.
Capturing TCP Burstiness in Light-weight Simulations. In Proceedings of the SCS Conference on Communication Networks and Distributed Systems Modeling and Simulation, p. to appear.
Phoenix, Arizona, USA, USC/Information Sciences Institute, Society for Computer Simulation.
January, 2001.
<http://www.isi.edu/~johnh/PAPERS/Huang01a.html>.
- Breslau00a
- Lee Breslau, Deborah Estrin, Kevin Fall, Sally Floyd, John Heidemann, Ahmed Helmy, Polly Huang, Steven McCanne, Kannan Varadhan, Ya Xu, and Haobo Yu.
Advances in Network Simulation. IEEE Computer, 33 (5 ), pp. 59-67, May, 2000.
Expanded version available as USC TR 99-702b
at http://www.isi.edu/ johnh/PAPERS/Bajaj99a.html.
<http://www.isi.edu/~johnh/PAPERS/Breslau00a.html>.
- Huang98a
- Polly Huang, Deborah Estrin, and John Heidemann. Enabling Large-scale simulations: selective abstraction approach to the study of multicast protocols. In Proceedings of the International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Montreal, Canada, IEEE. July, 1998. to appear.
File-system Stacking
- Heidemann95e
-
John Shelby Heidemann.
Stackable Design of File Systems.
Technical Report CSD-950032, University of California, Los Angeles, September, 1995.
- Heidemann95a
-
John Shelby Heidemann.
Stackable Design of File Systems.
Ph.D. dissertation, University of California, Los Angeles, 1995.
- Heidemann95c
-
John Heidemann and Gerald Popek.
Performance of Cache Coherence in Stackable Filing.
In Proceedings of the 15th Symposium on Operating Systems Principles. ACM, December 1995.
- Heidemann94a
-
John S. Heidemann and Gerald J. Popek.
File-system development with stackable layers.
In ACM Transactions on Computer Systems, 12(1):58-89, 1994.
An early version is available as UCLA technical report CSD-930019.
- Heidemann91a
-
John S. Heidemann.
Stackable layers: an architecture for file system development.
Master's thesis, University of California, Los Angeles, July 1991.
Available as UCLA technical report CSD-910056.
- Heidemann91c
- John S. Heidemann. Stackable Layers: an Architecture for File System Development. Technical Report CSD-910056, University of California, Los Angeles, July, 1991. Master's Thesis.
Optimistic Replication
- Page98a
-
T. W. Page, R. G. Guy, J. S. Heidemann, D. Ratner, P. Reiher, A. Goel, G. H. Kuenning, and G. J. Popek.
Perspectives on Optimistically Replicated Peer-to-Peer Filing.
Software--Practice and Experience, 28 2, 155-180, February, 1998.
- Heidemann95d
-
John Heidemann, Ashvin Goel, and Gerald Popek.
Defining and Measuring Conflicts
in Optimistic Replication.
Technical Report UCLA-CSD-950033, University of California, Los Angeles, September, 1995.
- Reiher94a
-
Peter Reiher, John S. Heidemann, David Ratner, Gregory Skinner, and Gerald J.
Popek.
Resolving file conflicts in the Ficus file system.
In USENIX Conference Proceedings, pages 183-195. USENIX,
June 1994.
- Heidemann92a
-
John S. Heidemann, Thomas W. Page, Jr., Richard G. Guy, and Gerald J. Popek.
Primarily disconnected operation: Experiences with Ficus.
In Proceedings of the Second Workshop on Management of
Replicated Data. IEEE, November 1992.
- Page91b
-
Thomas W. Page, Jr., Richard G. Guy, Gerald J. Popek, John S. Heidemann, Wai
Mak, and Dieter Rothmeier.
Management of replicated volume location data in the Ficus
replicated file system.
In USENIX Conference Proceedings. USENIX, June 1991.
- Popek90a
-
Gerald J. Popek, Richard G. Guy, Thomas W. Page, Jr., and John S. Heidemann.
Replication in Ficus distributed file systems.
In Proceedings of the Workshop on Management of Replicated
Data, pages 20-25. IEEE, November 1990.
- Guy90d
-
Richard G. Guy, Thomas W. Page, Jr., John S. Heidemann, and Gerald J. Popek.
Name transparency in very large scale distributed file systems.
In Second IEEE Workshop on Experimental Distributed Systems,
October 1990.
- Guy90b
- Richard G. Guy, John S. Heidemann, Wai Mak, Thomas W. Page, Jr., Gerald J. Popek, and Dieter Rothmeier. Implementation of the Ficus replicated file system. In USENIX Conference Proceedings, pages 63-71. USENIX, June 1990.
Other Subjects
- Heidemann01b
- John Heidemann.
Getting the Light Out. Photo Electronic Imaging, 44 (1 ), pp. 30-32, January, 2001.
<http://www.isi.edu/~johnh/PAPERS/Heidemann01b.html>.
- Gillett90a
-
Will Gillett and John Heidemann.
DNA Mapping Algorithms: The DNA Simulator.
Technical Report WUCS-90-37, University of Washington in St. Louis, October, 1990.
- Miller86a
- L. D. Miller, M. Unverferth, D. Williss, and J. Heidemann. A Microcomputer Based Geographic Information System to Provide Input to Site Specific Decision Processes. In Proceedings of the Geographic Information Systems for Environmental Protection, pp. 123-162. Las Vegas, Nevada, USA, Environmental Research Center, University of Nevada, Las Vegas. January, 1986. <http://www.isi.edu/~johnh/PAPERS/Miller86a.html>.