Conference A simple mechanism for capturing and replaying wireless channels 2005 • Proceedings of ACM SIGCOMM 2005 Workshops: Conference on Computer Communications • 58-63 Judd G, Steenkiste P
Conference Access control to people location information 2005 • ACM Transactions on Information and System Security • 8(4):424-456 Hengartner U, Steenkiste P
Conference Building self-adapting services using service-specific knowledge 2005 • Proceedings of the IEEE International Symposium on High Performance Distributed Computing • 34-43 Huang AC, Steenkiste P
Conference Dynamic load balancing for distributed search 2005 • Proceedings of the IEEE International Symposium on High Performance Distributed Computing • 157-166 Huston L, Nizhner A, Pillai P, Sukthankar R, Steenkiste P, Zhang J
Conference Exploiting hierarchical identity-based encryption for access control to pervasive computing information 2005 • FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS • 384-393 Hengartner U, Steenkiste P
Conference Exploiting information relationships for access control 2005 • THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS • 269-278 Hengartnert U, Steenkiste P
Conference Exploiting internet route sharing for large scale available bandwidth estimation 2005 • Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC • 187-192 Hu N, Steenkiste P
Conference Exploiting internet route sharing for large scale available bandwidth estimation 2005 1 Hu N, Steenkiste P
Conference Optimizing network performance in replicated hosting 2005 • WCW 2005: 10th International Workshop on Web Content Caching and Distribution, Proceedings • 3-14 Hu NN, Spatscheck O, Wang J, Steenkiste P
Conference Self-management in chaotic wireless deployments 2005 • Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM • 185-199 Akella A, Judd G, Seshan S, Steenkiste P
Journal Article Undergraduate Embedded System Education at Carnegie Mellon 2005 • Transactions on Embedded Computing Systems • 4(3):500-528 Koopman P, Choset H, Gandhi R, Krogh B, Marculescu D, Narasimhan P, Paul JM, Rajkumar R, Siewiorek D, Smailagic A, Steenkiste P, Thomas DE, Wang C
Conference Using emulation to understand and improve wireless networks and applications 2005 • USENIX Association Proceedings of the 2nd Symposium on Networked Systems Design & Implementation (NSDI '05) • 203-216 Judd G, Steenkiste P
Conference Video streaming over 802.11 WLAN with content-aware adaptive retry 2005 • 2005 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), VOLS 1 AND 2 • 723-726 Lu MH, Steenkiste P, Chen TH
Conference Workshop on Context Modeling and Reasoning (CoMoRea '05) 2005 xiii-xiii Becker C, Kortuem G, Nicklas D, Pingali G, Steenkiste P
Conference Workshop on Context Modeling and Reasoning (CoMoRea '05): Message from the workshop chair 2005 • Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops • 2005: Becker C, Kortuem G, Nicklas D, Pingali G, Steenkiste P
Journal Article A scalable peer-to-peer system for music information retrieval 2004 • Computer Music Journal • 28(2):24-33 Tzanetakis G, Gao J, Steenkiste P
Conference An adaptive protocol for efficient support of range queries in DHT-based systems 2004 • Proceedings - International Conference on Network Protocols, ICNP • 239-250 Gao J, Steenkiste P
Conference An architecture for coordinating multiple self-management systems 2004 • FOURTH WORKING IEEE/IFIP CONFERENCE ON SOFTWARE ARCHITECTURE (WICSA 2004), PROCEEDINGS • 243-252 Cheng SW, Huang AC, Garlan D, Schmerl B, Steenkiste P
Conference Building self-configuring services using service-specific knowledge 2004 • Proceedings of the IEEE International Symposium on High Performance Distributed Computing • 45-54 Huang AC, Steenkiste P
Journal Article Context-aware computing using a shared contextual information service 2004 Miller N, Judd G, Hengartner U, Gandon FL, Steenkiste P, Meng I-H, Feng M-W, Sadeh N
Journal Article Design and evaluation of a distributed scalable content discovery system 2004 • IEEE Journal on Selected Areas in Communications • 22(1):54-66 Gao J, Steenkiste P
Journal Article Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information 2004 Hengartner U, Steenkiste P
Conference Implementing access control to people location information 2004 • Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT 2002) • 9:11-20 Hengartner U, Steenkiste P
Conference International Workshop on Context Modeling and Reasoning (CoMoRea'04) 2004 xi-xi Becker C, Nicklas D, Kortuem G, Pingali G, Steenkiste P