The design and operation of CloudLab D Duplyakin, R Ricci, A Maricq, G Wong, J Duerig, E Eide, L Stoller, ... 2019 {USENIX} Annual Technical Conference ({USENIX}{ATC} 19), 1-14, 2019 | 548 | 2019 |
Mobile Emulab: A robotic wireless and sensor network testbed D Johnson, T Stack, R Fish, DM Flickinger, L Stoller, R Ricci, J Lepreau Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006 | 308 | 2006 |
POWDER: Platform for Open Wireless Data-driven Experimental Research J Breen, A Buffmire, J Duerig, K Dutt, E Eide, M Hibler, D Johnson, ... Proceedings of the 14th International Workshop on Wireless Network Testbeds …, 2020 | 126 | 2020 |
NexRAN: Closed-loop RAN slicing in POWDER-A top-to-bottom open-source open-RAN use case D Johnson, D Maas, J Van Der Merwe Proceedings of the 15th ACM Workshop on Wireless Network Testbeds …, 2022 | 48 | 2022 |
Abstractions for practical virtual machine replay A Burtsev, D Johnson, M Hibler, E Eide, J Regehr Proceedings of the12th ACM SIGPLAN/SIGOPS International Conference on …, 2016 | 19 | 2016 |
Composable multi-level debugging with Stackdb D Johnson, M Hibler, E Eide ACM SIGPLAN Notices 49 (7), 213-226, 2014 | 17 | 2014 |
Open source RAN slicing on POWDER: A top-to-bottom O-RAN use case D Johnson, D Maas, J Van Der Merwe Proceedings of the 19th Annual International Conference on Mobile Systems …, 2021 | 14 | 2021 |
A3: An environment for self-adaptive diagnosis and immunization of novel attacks P Pal, R Schantz, A Paulos, B Benyo, D Johnson, M Hibler, E Eide 2012 IEEE Sixth International Conference on Self-Adaptive and Self …, 2012 | 12 | 2012 |
Towards a high quality path-oriented network measurement and storage system D Johnson, D Gebhardt, J Lepreau Passive and Active Network Measurement: 9th International Conference, PAM …, 2008 | 10 | 2008 |
CapNet: security and least authority in a capability-enabled cloud A Burtsev, D Johnson, J Kunz, E Eide, J Van der Merwe Proceedings of the 2017 Symposium on Cloud Computing, 128-141, 2017 | 9 | 2017 |
Isolation of malicious external inputs in a security focused adaptive execution environment A Paulos, P Pal, R Schantz, B Benyo, D Johnson, M Hibler, E Eide 2013 International Conference on Availability, Reliability and Security, 82-91, 2013 | 5 | 2013 |
The Part-Time Cloud: Enabling Balanced Elasticity Between Diverse Computing Environments D Duplyakin, D Johnson, R Ricci Proceedings of the 8th Workshop on Scientific Cloud Computing, 1-8, 2017 | 4 | 2017 |
Digital Spectrum Twins for Enhanced Spectrum Sharing and Other Radio Applications S Tadik, KM Graves, MA Varner, CR Anderson, D Johnson, SK Kasera, ... IEEE Journal of Radio Frequency Identification, 2023 | 3 | 2023 |
Fluorescence: Detecting Kernel-Resident Malware in Clouds R Li, M Du, D Johnson, R Ricci, J Van der Merwe, E Eide 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 3 | 2019 |
Supporting docker in emulab-based network testbeds D Johnson, E Grubb, E Eide 11th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 18), 2018 | 1 | 2018 |
A Wingman for Virtual Appliances P Nayak, M Hibler, D Johnson, E Eide Runtime Verification: 17th International Conference, RV 2017, Seattle, WA …, 2017 | 1 | 2017 |
Critical Reroute: A Practical Approach to Network Flow Prioritization using Segment Routing S Redman, D Johnson, J van der Merwe 2019 IEEE International Symposium on Local and Metropolitan Area Networks …, 2019 | | 2019 |