A random graph model for massive graphs W Aiello, F Chung, L Lu Proceedings of the thirty-second annual ACM symposium on Theory of computing …, 2000 | 1871* | 2000 |
Random evolution in massive graphs W Aiello, F Chung, L Lu Handbook of massive data sets, 97-122, 2002 | 410 | 2002 |
Working around BGP: an incremental approach to improving security and accuracy in interdomain routing. G Goodell, W Aiello, T Griffin, J Ioannidis, PD McDaniel, AD Rubin NDSS 23, 156, 2003 | 354 | 2003 |
Just fast keying: Key agreement in a hostile internet W Aiello, SM Bellovin, M Blaze, R Canetti, J Ioannidis, AD Keromytis, ... ACM Transactions on Information and System Security (TISSEC) 7 (2), 242-273, 2004 | 325* | 2004 |
Protecting consumer privacy from electric load monitoring S McLaughlin, P McDaniel, W Aiello Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 317 | 2011 |
Reverse firewall with self-provisioning WA Aiello, CR Kalmanek Jr, WJ Leighton III, P McDaniel, S Sen, ... US Patent 8,453,227, 2013 | 298 | 2013 |
Fast digital identity revocation W Aiello, S Lodha, R Ostrovsky Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998 | 269 | 1998 |
Breaking up is hard to do: security and functionality in a commodity hypervisor P Colp, M Nanavati, J Zhu, W Aiello, G Coker, T Deegan, P Loscocco, ... Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011 | 212 | 2011 |
Shuffler: fast and deployable continuous code {re-randomization} D Williams-King, G Gobieski, K Williams-King, JP Blake, X Yuan, P Colp, ... 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2016 | 193 | 2016 |
Origin authentication in interdomain routing W Aiello, J Ioannidis, P McDaniel Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 181* | 2003 |
Competitive queue policies for differentiated services WA Aiello, Y Mansour, S Rajagopolan, A Rosén Journal of Algorithms 55 (2), 113-141, 2005 | 166 | 2005 |
System having filtering/monitoring of secure connections W Aiello, S Bellovin, E Crandall, A Kaplan, D Kormann, A Rubin, ... US Patent App. 10/322,189, 2004 | 165 | 2004 |
Statistical zero-knowledge languages can be recognized in two rounds W Aiello, J Hastad Journal of Computer and System Sciences 42 (3), 327-345, 1991 | 161 | 1991 |
Configuration management at massive scale: System design and experience W Enck, T Moyer, P McDaniel, S Sen, P Sebos, S Spoerel, A Greenberg, ... IEEE Journal on Selected Areas in Communications 27 (3), 323-335, 2009 | 137 | 2009 |
Adaptive packet routing for bursty adversarial traffic W Aiello, E Kushilevitz, R Ostrovsky, A Rosén Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998 | 120 | 1998 |
Method for efficiently revoking digital identities W Aiello, S Lodha, R Ostrovsky US Patent 6,397,329, 2002 | 117 | 2002 |
A spatial web graph model with local influence regions W Aiello, A Bonato, C Cooper, J Janssen, P Prałat Internet Mathematics 5 (1-2), 175-196, 2008 | 108 | 2008 |
Approximate load balancing on dynamic and asynchronous networks W Aiello, B Awerbuch, B Maggs, S Rao Proceedings of the twenty-fifth annual ACM symposium on theory of computing …, 1993 | 105 | 1993 |
Analysis of communities of interest in data networks W Aiello, C Kalmanek, P McDaniel, S Sen, O Spatscheck, ... Passive and Active Network Measurement: 6th International Workshop, PAM 2005 …, 2005 | 100 | 2005 |
Sparse matrix computations on parallel processor arrays AT Ogielski, W Aiello SIAM Journal on Scientific Computing 14 (3), 519-530, 1993 | 100 | 1993 |