The newest publications are from available: Google Scholar.
This page is no longer up to date.
2021
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols by Shengtuo Hu,
Qi Alfred Chen, Jiachen Sun, Yiheng Feng, Z. Morley Mao, Henry Liu, Proceedings of Usenix Security 2021.
2020
MPBond: Efficient Network-level Collaboration Among Personal Mobile Devices by Xiao Zhu, Jiachen Sun, Xumiao Zhang, Y. Ethan Guo, Feng Qian, Z. Morley Mao,
Proceedings of MobiSys 2020 (PDF)
CSI: Inferring Mobile ABR Video Adaptation Behavior under HTTPS and QUIC by Shichang Xu, Subhabrata Sen, Z. Morley Mao, Proceedings of EuroSys 2020. (PDF)
AVGuardian: Detecting and Mitigating Publish-Subscribe Overprivilege for Autonomous Vehicle Systems by D. Hong, J. Kloosterman, Y. Jin, Y. Cao, Q. Chen, S. Mahlke, Z. Mao, Proceedings of EuroS&P 2020.
What You See Is What You Get: Measure ABR Video Streaming QoE
via On-device Screen Recording by Shichang Xu, Eric Petajan, Subhabrata Sen, and Z. Morley Mao, Proceedings of NOSSDAV 2020.
Towards Robust LiDAR-based Perception in Autonomous Driving by Jiachen Sun, Yulong Cao, Q. Chen, Z. Mao, Proceedings of CVPR 2020 Workshop on Adversarial Machine Learning in Computer Vision 2020.
Crafting Adversarial Examples on 3D Object Detection Sensor Fusion Models by Won Park, Q. Chen, Z. Mao, Proceedings of CVPR 2020 Workshop on Adversarial Machine Learning in Computer Vision 2020.
CVShield: Guarding Sensor Data in Connected Vehicle with Trusted Execution Environment by Shengtuo Hu, Qi Alfred Chen, Jiwon Joung, Can Carlak, Yiheng Feng, Z Morley Mao, Henry X Liu, Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security 2020.
Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures by
J. Sun, Y. Cao, Q. Chen, Z. Mao, Proceedings of Usenix Security 2020.
Cyber-Vulnerability Analysis for Connected Vehicle Based Traffic Signal Control Systems by Shihong Huang, Wai Wong, Yiheng Feng, Qi Alfred Chen, Henry X. Liu, and Z. Morley Mao, Cyber-Vulnerability Analysis for Connected Vehicle Based Traffic Signal Control Systems, Transportation Research Board Annual Meeting (TRB) 2020.
2019
Egret: Simplifying Traffic Management for Physical and
Virtual Network Functions by Yikai Lin, Ajay Mahimkar, Bo Han, Zihui Ge, Vijay Gopalakrishnan, and
Z Morley Mao, Proceedings of the 15th International
Conference on Emerging Networking EXperiments and Technologies. ACM, 2019.
Adversarial sensor attack on LiDAR-based perception in
autonomous driving by Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara
Rampazzi, Qi Alfred Chen, Kevin Fu, Z. Morley Mao, Proceedings of
CCS 2019.
ADD: Application and Data-Driven Controller Design by
Yikai Lin, Yuru Shao, Xiao Zhu, Junpeng Guo, Kira Barton, and
Z. Morley Mao,
Proceedings of SOSR 2019.
MP-H2: a Client-only Multipath Solution for HTTP/2 by
Ashkan Nikravesh, Yihua Guo, Xiao Zhu, Feng Qian, Z. Morley Mao,
Proceedings of Mobicom 2019. (PDF)
Towards Automated Safety Vetting of PLC Code
in Real-World Plants by Mu Zhang, Chien-Ying Chen, Bin-Chou Kao, Yassine Qamsane, Yuru Shao, Yikai Lin, Elaine Shi, Sibin Mohan, Kira
Barton, James Moyne and Z. Morley Mao, Proceedings of IEEE
Symposium on Security and Privacy 2019.
Leveraging Context-Triggered Measurements to Characterize LTE
Handover Performance by Shichang Xu, Ashkan Nikravesh, and
Z. Morley Mao, Proceedings of PAM 2019.
A Lightweight Framework for Fine-Grained Lifecycle Control of
Android Applications by Yuru Shao, Ruowen Wang, Xun Chen, Ahmed
Azab, and Z. Morley Mao, Proceedings of EuroSys 2019.
Understanding the Networking Performance of Wear OS by Xiao
Zhu, Yihua Ethan Guo, Ashkan Nikravesh, Feng Qian, and Z. Morley Mao, Proceedings of SIGMETRICS 2019.
PerfProbe: a systematic, cross-layer performance diagnosis framework for mobile platforms by
David Ke Hong, Ashkan Nikravesh, Z Morley Mao, Mahesh Ketkar, Michael Kishinevsky,
Proceedings of 2019 IEEE/ACM 6th International Conference on Mobile Software Engineering and Systems (MOBILESoft)
Trajectory-Based Hierarchical Defense Model to Detect Cyber-Attacks on Transportation Infrastructure by Wai Wong, Shihong Huang, Yiheng Feng, Qi Alfred Chen, Henry X. Liu, and Z. Morley Mao, Transportation Research Board 2019 Annual Meeting (TRB), 2019.
2018
SkyCore: Moving Core to the Edge for Untethered and Reliable
UAV-based LTE networks by Mehrdad Moradi, Karthik Sundaresan,
Eugene Chai, Sampath Rangarajan, and Z. Morley Mao, Proceedings of
Mobicom 2018. Best paper award.
CommPact: Evaluating the Feasibility of Autonomous Vehicle
Contracts by Jeremy Erickson, Shibo Chen, Melisa Savich, Shengtuo
Hu, and Z. Morley Mao, Proceedings of 2018 IEEE Vehicular
Networking Conference (VNC).
CommPact: Exploring the Feasibility of Autonomous Vehicle Contracts by Jeremy Erickson, Mel Savich, Shibo Chen, Mert Pese,
Shengtuo Hu and Z. Morley Mao, Proceedings of Escar (Embedded
Security in Cars) USA 2018.
Dragon: Scalable, Flexible and Efficient Traffic Engineering
Framework For ISP Networks by Mehrdad Moradi, Ying Zhang,
Z. Morley Mao, and Ravi Manghirmalani, IEEE JSAC Special Issue on Scalability Issues and Solutions for
Software Defined Networks 2018.
SoftBox: A Customizable, Low-Latency, and Scalable 5G Core
Network Architecture by Mehrdad
Moradi, Yikai Lin, Z. Morley Mao, Shubho Sen, Oliver Spatscheck, IEEE JSAC series on network softwarization and enablers 2018.
No One In The Middle: Enabling Network Access Control Via
Transparent Attribution by Jeremy Erickson, Qi Alfred Chen,
Xiaochen Yu, Erinjen Lin, Robert Levy, and Z. Morley Mao, Proceedings of AsiaCCS 2018.
Pausing and Resuming Network Flows using
Programmable Buffers by Yikai Lin, Ulaş C. Kozat, John
Kaippallimalil, Mehrdad Moradi, Anthony C.K. Soong, and Z. Morley Mao, Proceedings of SOSR 2018.
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic
Signal Control by Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, and Henry X. Liu, Proceedings of the 25th Network and Distributed System Security
Symposium (NDSS'18), San Diego, Feb. 2018.
Vulnerability of Traffic Control System Under Cyber-Attacks Using Falsified Data by Yiheng Feng, Shihong Huang, Qi Alfred Chen, Henry X. Liu, and
Z. Morley Mao, Proceedings of Transportation Research Board 2018
Annual Meeting (TRB'18), Washington, D.C., Jan. 2018.
Production as a Service: A Digital Manufacturing Framework for
Optimizing Utilization by Efe Balta, Yikai Lin, Kira Barton, Dawn
Tilbury, Z. Morley Mao, IEEE Transactions on Automation Science and
Engineering 2018.
QoE Inference and Improvement Without End-Host Control by
Ashkan Nikravesh, Qi Alfred Chen, Scott Haseley, Xiao Zhu, Geoffrey Challen, Z. Morley Mao
Proceedings of the 3rd ACM/IEEE Symposium on Edge Computing, Bellevue, WA, Oct. 2018.
2017
Client-side Name Collision Vulnerability in the New gTLD Era: A
Systematic Study by Qi Alfred Chen, Matthew Thomas, Eric
Osterweil, Yulong Cao, Jie You, Z. Morley Mao, Proceedings of CCS 2017.
Dissecting HAS VOD Services for Cellular: Performance, Root Causes and
Best Practices by Shichang Xu, Yunhan Jia, Z. Morley Mao, and
Subhabrata Sen, Proceedings of IMC 2017.
Accelerating Multipath Transport Through Balanced
Subflow Completion by Yihua Guo, Ashkan Nikravesh, Z. Morley Mao,
Feng Qian, and Subhabrata Sen, Proceedings of Mobicom 2017.
Towards Secure and Safe Appified Automated Vehicle by
Yunhan Jack Jia, Ding Zhao, Qi Alfred Chen, Z. Morley Mao
Proceedings of the 28th IEEE Intelligent Vechile Symposium
(IVS'17) 2017.
Push or Request: An Investigation of HTTP/2 Server Push
for Improving Mobile Performance by Sanae Rosen, Bo Han, Shuai Hao, Z. Morley Mao, Feng Qian, Proceedings of WWW 2017.
ContexIoT: Towards Providing Contextual Integrity to Appified IoT Platforms by Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Z. Morley Mao, and Atul Prakash, Proceedings of NDSS 2017.
Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications by Yunhan Jack Jia, Qi Alfred Chen, Yikai Lin, Chao Kong, and Z. Morley Mao, Proceedings of The 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17)
2017.
Production as a Service: A Centralized Framework for Small
Batch Manufacturing by Efe C. Balta, Kshitij Jain, Yikai Lin, Dawn Tilbury,
Kira Barton, Z. Morley Mao, Proceedings of 13th Conference on
Automation Science and Engineering (CASE) 2017.
Categorization of Anomalies in Smart Manufacturing Systems to
Support the Selection of Detection Mechanisms, by Felipe
Lopez, Miguel Saez, Yuru Shao, Efe C. Balta, James R. Moyne, Z.
Morley Mao, Kira Barton, Dawn M. Tilbury, IEEE Robotics and
Automation Letters 2(4): 1885-1892 (2017).
2016
Understanding On-device Bufferbloat for Cellular Upload by
Yihua Guo, Feng Qian, Qi Alfred Chen, Z. Morley Mao, Subhabrata Sen, Proceedings of IMC 2016.
The Misuse of Android Unix Domain Sockets and Security
Implications by Yuru Shao, Jason Ott, Yunhan Jack Jia, Zhiyun
Qian, Z. Morley Mao Proceedings of CCS 2016.
An In-depth Understanding of Multipath TCP on Mobile Devices: Measurement and
System Design by Ashkan Nikravesh, Yihua Guo, Feng Qian, Z. Morley
Mao, and Subhabrata Sen, Proceedings of Mobicom 2016.
Production as a Service: Optimizing Utilization in
Manufacturing Systems by Matthew Porter, Vikram Raghavan, Yikai
Lin, Z. Morley Mao, Kira Barton, Dawn Tilbury, Proceedings of Dynamic Systems and Control
Conference (DSCC) 2016.
Diagnosing Mobile Apps' Quality of Experience: Challenges and
Promising Directions by Z. Morley Mao, IEEE Internet Computing
(Volume:20, Issue: 1) 2016.
MitM Attack by Name Collision: Cause Analysis and Vulnerability
Assessment in the New gTLD Era by Qi Alfred Chen, Eric Osterweil,
Matthew Thomas, and Z. Morley Mao, Proceedings of IEEE Symposium on
Security and Privacy 2016.
Kratos: Discovering Inconsistent Security Policy Enforcement in
the Android Framework by Yuru (Roy) Shao, Jason Ott, Qi Alfred
Chen, Zhiyun Qian, and Z. Morley Mao, Proceedings of
Annual Network & Distributed System Security Symposium (NDSS) 2016.
Android UI Deception Revisited: Attacks and Defenses by
Earlence Fernandes, Qi Alfred Chen, Justin Paupore, Georg Essl,
J. Alex Halderman, Z. Morley Mao, and Atul Prakash, Proceedings of
International Conference on Financial Cryptography and Data Security
(FC) 2016.
Incremental Deployment of SDN in Hybrid Enterprise and ISP
Networks by David Ke Hong, Yadi Ma, Sujata Banerjee, and Z. Morley
Mao, Proceedings of Symposium on SDN Research (SOSR) 2016.
2015
Revisiting Network Energy Efficiency of Mobile Apps: Performance
in the Wild by Sanae Rosen, Ashkan Nikravesh, Yihua Guo, Z. Morley
Mao, Feng Qian, Shubho Sen, Proceedings of ACM Internet Measurement
Conference (IMC) 2015.(PDF)
Static Detection of Packet Injection Vulnerabilities -- A Case
for Identifying Attacker-controlled Implicit Information Leaks by Qi
Alfred Chen, Zhiyun Qian, Yunhan Jack Jia, Yuru Roy Shao, Z. Morley Mao, Proceedings of ACM Conference on Computer and Communications Security
(CCS) 2015.(PDF)
Performance Characterization and Call Reliability Problem
Diagnosis for Voice over LTE by Yunhan Jack Jia, Qi Alfred Chen,
Z.Morley Mao, Jie Hui, Kranthi Sontineni, Alex Yoon, Samson Kwong,
Kevin Lau, Proceedings of ACM Mobicom 2015.(PDF)
SAMPLES: Self Adaptive Mining of Persistent Lexical Snippets
for Classifying Mobile Application Traffic by Hongyi Yao, Gyan
Ranjan, Alok Tongaonkar, Yong Liao, Z. Morley Mao, Proceedings of
ACM Mobicom 2015.(PDF)
Mobilyzer: An Open Platform for Controllable Mobile Network
Measurements by Ashkan Nikravesh, Hongyi Yao, Shichang Xu, David Choffnes, and
Z. Morley Mao, Proceedings of MobiSys 2015.(PDF)
Accelerating Mobile Applications through Flip-Flop
Replication by Mark Gordon, David Ke Hong, Peter Chen, Jason Flinn, Scott Mahlke,
and Z. Morley Mao, Proceedings of MobiSys 2015.(PDF) Best paper award.
TANGO: Accelerating Mobile Applications through Flip-Flop
Replication by Mark S. Gordon, David Ke Hong, Peter M. Chen, Jason
Flinn, Scott Mahlke, Z. Morley Mao, GetMobile: Mobile Computing
and Communications, Volume 19, Issue 3, July 2015.(PDF)
Summary report for the First NSF Workshop on Mobile Community
Measurement Infrastructure by david choffnes and Z. Morley Mao,
GetMobile: Mobile Computing and Communications, Volume 19, Issue
3, July 2015.(PDF)
High-Speed and Memory-Efficient Forwarding Engine
for Future Internet Architecture by Mehrdad Moradi, Feng Qian,
Qiang Xu, Z. Morley Mao, Darrell Bethea, and Michael Reiter,
Proceedings of ACM/IEEE Symposium on Architectures for Networking
and Communications Systems (ANCS) 2015.(PDF)
Automatic Generation of Mobile App Signatures from Traffic
Observations by Qiang Xu, Yong Liao, Stanislav Miskovic, Mario
Baldi, Z. Morley Mao, Antonio Nucci, and Thomas Andrews,
Proceedings of INFOCOM 2015.(PDF)
Performance and Energy Consumption Analysis of a Delay-Tolerant
Network for Censorship-Resistant Communications by Yue Liu, David
Bild, David Adrian, Gulshan Singh, Robert Dick, Dan Wallach, and
Z. Morley Mao, Proceedings of ACM MobiHoc 2015.(PDF)
Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph by David R. Bild, Yue Liu, Robert P. Dick, Z. Morley Mao, and Dan S. Wallach, ACM TOIT (Transactions on Internet Technology) 2015.(PDF)
The Mason Test: A Defense Against Sybil Attacks in Wireless
Networks Without Trusted Authorities by Yue Liu, David R. Bild, Robert
P. Dick, Z. Morley Mao, and Dan S. Wallach, TMC (IEEE Transactions
on Mobile Computing) 2015.(PDF)
2014
MCNet: Crowdsourcing wireless performance measurements through the
eyes of mobile devices. by Sanae Rosen, Sung-Ju Lee, Jeongkeun Lee, Paul Congdon, Z. Morley Mao, and Ken Burden, 2014 IEEE Communications Magazine, p86-91, 2014.
MobilityFirst: A Mobility-Centric and Trustworthy Internet
Architecture by A. Venkataramani, J. Kurose, D. Raychaudhuri,
K. Nagaraja, M. Mao, S. Banerjee, Proceedings of CCR July 2014.(PDF)
SoftMoW: A Dynamic and Scalable Software Defined Architecture for Cellular WANs by Mehrdad Moradi, Wenfei Wu, Li Erran Li and Z. Morley Mao, Proceedings of CoNEXT 2014.(PDF)
QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control
and Cross-layer Analysis by
Qi Alfred Chen, Haokun Luo, Sanae Rosen, Z. Morley Mao,
Karthik Iyer, Jie Hui, Kranthi Sontineni, Kevin Lau, Proceedings of
IMC 2014.(PDF)
Distributing Mobile Music Applications for Audience
Participation Using Mobile Ad-hoc Network (MANET) by Sang Won Lee,
Georg Essl, and Z. Morley Mao, Proceedings of 14th International
Conference on New Interfaces for Musical Expression (NIME) 2014.
Demo: Mapping global mobile performance trends with Mobilyzer and
MobiPerf by Sanae Rosen, Hongyi Yao, Ashkan Nikravesh, Yunhan Jia, David
Choffnes, Z. Morley Mao, MobiSys 2014.
Discovering Fine-grained RRC State Dynamics and Performance
Impacts in Cellular Networks by
Sanae Rosen, Haokun Luo, Qi Alfred Chen, Z. Morley Mao, Jie Hui, Aaron
Drake, and Kevin Lau, Proceedings of ACM Mobicom 2014.(PDF)
Peeking into Your App without Actually Seeing it: UI State
Inference and Novel Android Attacks by Qi Alfred Chen, Zhiyun
Qian, and Z. Morley Mao, Proceedings of Usenix Security Symposium 2014.(PDF)
SoftMoW: A Dynamic and Scalable Software Defined Architecture for
Cellular WANs by Mehrdad Moradi, Li Li, and Z. Morley Mao,
Open Networking Summit (Research Track) 2014.(PDF)
FLOWR: A Self-Learning System for Classifying Mobile
Application Traffic by Qiang Xu, Thomas Andrews, Yong Liao,
Stanislav Miskovic, Z. Morley Mao, Mario Baldi and Antonio Nucci,
Proceedings of SIGMETRICS 2014 (POSTER).
RadioProphet: Intelligent Radio Resource Deallocation for
Cellular Networks by Junxian Huang, Feng Qian, Z. Morley Mao,
Subhabrata Sen, and Oliver Spatscheck, Proceedings
of Passive and Active Measurement Conference (PAM) 2014.(PDF)
Mobile Network Performance from User Devices: A Longitudinal,
Multidimensional Analysis by Ashkan Nikravesh, David R. Choffnes,
Ethan Katz-Bassett, Z. Morley Mao, and Matt Welsh, Proceedings of
Passive and Active Measurement Conference (PAM) 2014.(PDF)
Diagnosing Path Inflation of Mobile Client Traffic by
Kyriakos Zarifis, Tobias Flach, Srikanth Nori, David Choffnes, Ramesh
Govindan, Ethan Katz-Bassett, Z. Morley Mao, and Matt Welsh,
Proceedings of Passive and Active Measurement Conference (PAM) 2014.(PDF)
2013
Performance and Power Characterization of Cellular Networks and Mobile Application Optimizations by Junxian Huang, Ph.D. thesis.
(PDF)
Optimizing Mobile Application Performance
through Network Infrastructure Aware Adaptations by Qiang Xu, Ph.D. thesis. (PDF)
Panappticon: Event-based Tracing to Optimize Mobile Application and Platform
Performance by Lide Zhang, David R. Bild, Robert P. Dick,
Z. Morley Mao and Peter Dinda, Proceedings of (IEEE) CODES+ISSS
2013. (PDF)
An In-depth Study of LTE: Effect of Network Protocol and Application
Behavior on Performance by Junxian Huang, Feng Qian, Yihua Guo,
Yuanyuan Zhou, Qiang Xu, Z. Morley Mao, Subhabrata Sen, and Oliver
Spatscheck, Proceedings of ACM SIGCOMM 2013.(PDF)
SocialWatch: Detection of Online Service Abuse via Large-Scale Social Graphs by Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi,
Eliot Gillum and Z. Morley Mao, Proceedings of ACM AsiaCCS
2013.(PDF)
How to Reduce Smartphone Traffic Volume by 30%? by Feng
Qian, Junxian Huang, Jeffrey Erman, Z. Morley Mao, Subhabrata Sen, and
Oliver Spatscheck, Proceedings of PAM 2013.(PDF)
AppProfiler: A Flexible Method of Exposing Privacy-Related
Behavior in Android Applications to End Users by Sanae Rosen,
Zhiyun Qian, and Z. Morley Mao, Proceedings of ACM CODASPY
2013.(PDF)
PROTEUS: Network Performance Forecast for Real-Time,
Interactive Mobile Applications by Qiang Xu, Sanjeev Mehrotra,
Z. Morley Mao, and Jin Li, Proceedings of Mobisys 2013.(PDF)
2012
Characterization and Optimization of Resource Utilization For Cellular Networks by Feng Qian, Ph.D. thesis. (PDF)
Discover, Analyze, and Validate Attacks With Introspective Side Channels by Zhiyun Qian, Ph.D. thesis. (PDF)
COMET: Code Offload by Migrating Execution Transparently by
Mark S. Gordon, D. Anoushe Jamshidi, Scott Mahlke, Z. Morley Mao and Xu Chen, Proceedings of OSDI 2012.(PDF)
Screen-Off Traffic Characterization and Optimization in 3G/4G
Networks by Junxian Huang, Feng Qian, Z. Morley Mao,
Subhabrata Sen and Oliver Spatscheck, Proceedings of IMC 2012.(PDF)
Cyberinfrastructure Enabling Personalized Production by
Janani Viswanathan, Dawn Tilbury, Jack Hu, and Z. Morley Mao,
Proceedings of ISFA Conference 2012.(PDF)
Toward software-defined cellular networks by Li Erran Li, Z. Morley Mao, and Jennifer Rexford, Proceedings of European Workshop on
Software Defined Networking 2012.(PDF)
ADEL: An Automatic Detector of Energy Leaks for Smartphone
Applications by Lide Zhang, Mark Gordon, Robert Dick, Z. Morley
Mao, Peter Dinda and Lei Yang, Proceedings of (IEEE) CODES+ISSS 2012.(PDF)
Collaborated Off-Path TCP Sequence Number Inference Attack ---
How to Crack Sequence Number Under A Second by Zhiyun Qian,
Z. Morley Mao and Yinglian Xie, Proceedings of CCS 2012.(PDF)
Innocent by Association: Early Recognition of Legitimate
Users by Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, Eliot
Gillum, Krish Vitaldevaria, Jason Walter, Junxian Huang and Z. Morley
Mao, Proceedings of CCS 2012.(PDF)
Web Caching on Smartphones: Ideal vs. Reality by Feng Qian, Kee Shen Quah, Junxian Huang, Jeffrey Erman, Alexandre
Gerber, Z. Morley Mao,
Subhabrata Sen, and Oliver Spatscheck, Proceedings of ACM Mobisys 2012.(PDF)
A Close Examination of Performance and Power Characteristics of 4G LTE Networks by Junxian Huang, Feng Qian, Alexandre Gerber, Z. Morley Mao, Subhabrata
Sen, and Oliver Spatscheck, Proceedings of ACM Mobisys 2012.(PDF)
Periodic Transfers in Mobile Applications: Network-wide Origin, Impact, and Optimization by Feng Qian, Zhaoguang Wang, Yudong Gao, Junxian Huang, Alexandre
Gerber, Z. Morley Mao,
Subhabrata Sen, and Oliver Spatscheck, Proceedings of WWW 2012.(PDF)
Off-Path TCP Sequence Number Inference Attack -- How Firewall
Middleboxes Reduce Security by Zhiyun Qian and Z. Morley Mao,
Proceedings of IEEE Security and Privacy (Oakland) 2012.(PDF) (Project web page)
You Can Run, but You Can't Hide: Exposing Network Location for
Targeted DoS Attacks in Cellular Networks by Zhiyun Qian, Zhaoguang
Wang, Qiang Xu, Z. Morley Mao, Ming Zhang and Yi-Min Wang,
Proceedings of NDSS 2012.(PDF)
2011
Using Predictable Mobility Patterns to Support Scalable and Secure
MANETs of Handheld Devices
by David Bild, Yue Liu, Robert Dick, Z. Morley Mao and Dan
Wallach, Proceedings of The 6th ACM International Workshop on
Mobility in the Evolving Internet Architecture (MobiArch) 2011.(PDF)
Contrail: Enabling Decentralized Social Networks on
Smartphones by Patrick Stuedi, Iqbal Mohomed, Mahesh Balakrishnan,
Ted Wobber, Doug Terry and Z. Morley Mao, Proceedings of Middleware
2011.(PDF)
Best paper award.
Identifying Diverse Usage Behaviors of Smartphone Apps by
Qiang Xu, Jeffrey Erman, Alexandre Gerber, Z. Morley Mao, Jeffrey
Pang, and Shobha Venkataraman, Proceedings of IMC 2011.(PDF)
Designing Scalable and Effective Decision Support for Mitigating
Attacks in Large Enterprise Networks by Zhiyun Qian, Z. Morley
Mao, Ammar Rayes and David Jaffe, Proceedings of SecureComm
2011.(PDF)
An Untold Story of Middleboxes in Cellular Networks by
Zhaoguang Wang, Zhiyun Qian, Qiang Xu, Zhuoqing Morley Mao, and Ming
Zhang, Proceedings of SIGCOMM 2011.(PDF)
(In the news: MIT Technology Review coverage
and Slashdot coverage,
cnet news coverage)
Demo: Mobile Application Resource Optimizer (ARO)
by Feng Qian, Zhaoguang Wang, Alexandre Gerber, Z. Morley Mao, Subhabrata
Sen, Oliver Spatscheck, Proceedings of Mobisys 2011.(PDF)
AccuLoc: Practical Localization of Performance Measurements in
3G Networks by Qiang Xu, Alex Gerber,
Z. Morley Mao, and Jeff Pang, Proceedings of Mobisys 2011.(PDF)
Profiling Resource Usage for Mobile Applications: a Cross-layer
Approach by Feng Qian, Zhaoguang Wang, Alex Gerber, Z. Morley Mao,
Subhabrata Sen, and Oliver Spatscheck Proceedings of Mobisys 2011.(PDF)
KnowOps: Towards an Embedded Knowledge Base for Network
Management and Operations by Xu Chen, Yun Mao, Z. Morley Mao, and
Jacobus Van der Merwe, Proceedings of The first Hot-ICE workshop 2011.(PDF)
Internet Censorship in China: Where Does the Filtering Occur? by Xueyang
Xu, Z. Morley Mao, and J. Alex Halderman, Proceedings of PAM
2011.(PDF)
Can Deterministic Replay be an Enabling Tool for Mobile
Computing? by Jason Flinn and Z. Morley Mao, Proceedings of
HotMobile 2011.(PDF)
Cellular Data Network Infrastructure Characterization and
Implication on Mobile Content Placement by Qiang Xu, Junxian
Huang, Zhaoguang Wang, Feng Qian, Alexandre Gerber, and Z. Morley Mao,
Proceedings of SIGMETRICS 2011.(PDF)
2010
Toward Automated Network Management and Operations by Xu Simon Chen, Ph.D. thesis. (PDF)
Location, Location, Location!: Modeling Data Proximity in the
Cloud by Birjodh Tiwana, Mahesh Balakrishnan, Marcos Aguilera,
Hitesh Ballani, and Z. Morley Mao, Proceedings of HotNets 2010.(PDF)
Declarative Configuration Management for Complex and Dynamic
Networks by Xu Chen, Yun Mao, Z. Morley Mao, and Kobus van der
Merwe, Proceedings of CoNext 2010.(PDF)
Characterizing Radio Resource Allocation for 3G Networks
by Feng Qian, Zhaoguang Wang, Alex Gerber, Z. Morley Mao, Subhabrata
Sen, and Oliver Spatscheck, Proceedings of IMC 2010.(PDF)
TOP: Tail Optimization Protocol for Cellular Radio Resource
Allocation by Feng Qian, Zhaoguang Wang, Alex Gerber, Z. Morley
Mao, Subhabrata Sen, and Oliver Spatscheck, Proceedings of ICNP 2010.(PDF)
iSPY: Detecting IP Prefix Hijacking on My Own by Zheng Zhang, Ying
Zhang, Y. Charlie Hu, Z. Morley Mao, and Randy Bush,
ACM/IEEE Transactions on Networking (ToN), Dec. 2010.
Accurate Online Power Estimation and Automatic Battery Behavior
Based Power Model Generation for Smartphones by Lide Zhang,
Birjodh Tiwana, Zhiyun Qian, Zhaoguang Wang, Robert Dick, Z. Morley Mao
and Lei Yang, Proceedings of (IEEE) CODES+ISSS 2010.(PDF)
Performance and Power Modeling in a Multi-Programmed Multi-Core Environment by Xi Chen, Chi Xu, Robert Dick, and Z. Morley Mao,
Proceedings of Design Automation Conference (DAC) 2010.(PDF)
Anatomizing Application Performance Differences on
Smartphones by Junxian Huang, Qiang Xu, Birjodh Tiwana, Z. Morley
Mao, Ming Zhang, Paramvir Bahl, Proceedings of Mobisys 2010.(PDF)
A Case for Unsupervised-Learning-based Spam Filtering by
Feng Qian, Abhinav Pathak, Y. Charlie Hu, Z. Morley Mao, and Yinglian
Xie, Proceedings of SIGMETRICS 2010 (Extended Abstract).(PDF)
Cache Contention and Application Performance Prediction for
Multi-Core Systems by Chi Xu, Xi Chen, Robert P. Dick, and
Z. Morley Mao, Proceedings of ISPASS 2010.(PDF)
Investigation of Triangular Spamming: a Stealthy and Efficient
Spamming Technique by Zhiyun Qian, Z. Morley Mao, Yinglian Xie,
and Fang Yu, Proceedings of IEEE Security and Privacy (Oakland)
2010.(PDF)
On Network-level Clusters for Spam Detection by Zhiyun
Qian, Z. Morley Mao, Yinglian Xie, and Fang Yu, Proceedings of 17th
Annual Network & Distributed System Security Symposium (NDSS)
2010.(PDF)
On the Safety of Enterprise Policy Deployment by Yudong
Gao, Xu Chen, Ni Pan, and Z. Morley Mao, Proceedings of 17th Annual
Network & Distributed System Security Symposium (NDSS) 2010.(PDF)
2009
Effective Wide-Area Network Performance Monitoring and Diagnosis from End Systems by Ying Zhang, Ph.D. thesis. (PDF)
PACMAN: a Platform for Automated and Controlled network
operations and configuration MANagement by Xu Chen,
Z. Morley Mao, and Jacobus Van der Merwe, Proceedings of
CoNext 2009.
(PDF)
TCP Revisited: A Fresh Look at TCP in the Wild by Feng
Qian, Alex Gerber, Z. Morley Mao, Subhabrata Sen, Oliver
Spatscheck, and Walter Willinger,
Proceedings of IMC 2009.
(PDF)
Detecting Traffic Differentiation in Backbone ISPs with
NetPolice by Ying Zhang, Z. Morley Mao, and Ming Zhang,
Proceedings of IMC 2009.(PDF)
Ensemble: Community-based Anomaly Detection for Popular
Applications by Feng Qian, Zhiyun Qian, Z. Morley Mao, and Atul
Prakash, Proceedings of SecureComm 2009.(PDF)
DECOR: DEClarative network management and OpeRation by Xu
Chen, Yun Mao, Z. Morley Mao, and Jacobus Van der Merwe, Proceedings of
PRESTO Workshop 2009.(PDF)
(fast-tracked to CCR)
ShadowNet: A Platform for Rapid and Safe Network Evolution
by Xu Chen, Z. Morley Mao, and Kobus van der Merwe, Proceedings of
Usenix Technical Conference 2009.(PDF)
Botnet Spam Campaigns can be Long Lasting: Evidence,
Implications, and Analysis by Abhinav Pathak, Feng Qian,
Y. Charlie Hu, Z. Morley Mao, and Supranamaya Ranjan, Proceedings
of SIGMETRICS 2009.(PDF)
HC-BGP: A Light-weight and Flexible Scheme for Securing Prefix
Ownership by Ying Zhang, Zheng Zhang, Z. Morley Mao and
Y. Charlie Hu, Proceedings of DSN-DCCS 2009.(PDF)
2008
Routing analysis, network security and management:
WebBee: A Platform for Secure Mobile Coordination and
Communication in Crisis Scenarios by Sugih Jamin, Z. Morley Mao,
T. V. Lakshman, Sarit Mukherjee, Jignesh Patel, and Limin Wang et
al. , STSC CrossTalk Journal of Defense Software Engineering, Oct
2008. (link)
Ascertaining the Reality of Network Neutrality Violation in
Backbone ISPs by Ying Zhang, Z. Morley Mao, and Ming Zhang,
Proceedings of HotNets 2008.(PDF)
Automating Network Application Dependency Discovery:
Experiences, Limitations, and New Solutions by Xu Chen, Ming
Zhang, Z. Morley Mao, and Victor Bahl, Proceedings of OSDI 2008.(PDF)
iSPY: Detecting IP Prefix Hijacking on My Own by Zheng
Zhang, Ying Zhang, Y Charlie Hu, Z Morley Mao, and Randy Bush,
Proceedings of ACM SIGCOMM 2008.(PDF)
Peeking into Spammer Behavior from a Unique Vantage Point
by Abhinav Pathak, Y. Charlie Hu, and Z. Morley Mao, Proceedings of
the First USENIX Workshop on Large-Scale Exploits and Emergent Threats
(LEET) 2008.(PDF)
Deterring Malware by Imitating Emulation and Debugging
Environment by Xu Chen, Jon Andersen, Z. Morley Mao, Michael
Bailey, Jose Nazario, and Farnam Jahanian, Proceedings of DSN-DCCS
2008.(PDF)
A Measurement Study of Internet Delay Asymmetry by Abhinav
Pathak, Himabindu Pucha, Ying Zhang, Y. Charlie Hu, and Z. Morley Mao,
Proceedings of Passive and Active Measurement Conference (PAM) 2008.(PDF)
Effective Diagnosis of Routing Disruptions from End Systems
by Ying Zhang, Z. Morley Mao and Ming Zhang, Proceedings of NSDI
2008.(PDF)
Wide-Area IP Network Mobility by Xin Hu, Li Li, Z. Morley
Mao, and Yang Richard Yang, Proceedings of IEEE INFOCOM 2008.(PDF)
Internet traffic and multiresolution analysis by Ying
Zhang, Zihui Ge, Suhas Diggavi, Z. Morley Mao, Matthew Roughan, Vinay
Vaishampayan, Walter Willinger, and Yin Zhang, Markov Processes
and Related Fields: A Festschrift in Honor of Thomas G. Kurtz/,
S. N. Ethier, J. Feng and R. H. Stockbridge (eds.), IMS Lecture
Notes--Monograph Series.(PDF)
2007
Practical Defenses Against BGP Prefix Hijacking by Zheng
Zhang, Ying Zhang, Y. Charlie Hu and Z. Morley Mao, Proceedings of
CoNext 2007.(PDF)
Internet Routing Resilience to Failures: Analysis and
Implications by Jian Wu and Ying Zhang, Z. Morley Mao, and Kang
Shin, Proceedings of CoNext 2007.(PDF)
On the Impact of Route Monitor Selection by Ying Zhang,
Zheng Zhang, Z. Morley Mao, Y. Charlie Hu, and Bruce Maggs,
Proceedings of ACM Internet Measurement Conference (IMC)
2007.(PDF)
Automated Classification and Analysis of Internet Malware
by Michael Bailey, Jon Oberheide, Jon Andersen, Z. Morley Mao,
Farnam Jahanian, and Jose Nazario, Proceedings of RAID 2007.(PDF)
Towards Automated Network Management: Network Operations
using Dynamic Views by Xu Chen, Z. Morley Mao, and Kobus van der
Merwe, Proceedings of SIGCOMM INM workshop 2007.(PDF)
MIDAS: An Impact Scale for DDoS attacks by Ranga Vasudevan,
Z. Morley Mao, Oliver Spatscheck, Kobus Van der Merwe, Proceedings
of LANMAN 2007 (15th Workshop on Local and Metropolitan Area Networks).(PDF)
Characterizing Dark DNS Behavior by Jon Oberheide, Manish
Karir and Z. Morley Mao, Proceedings of DIMVA 2007.(PDF)
A Firewall for Routers: Protecting Against Routing
Misbehavior by Ying Zhang, Z. Morley Mao, Jia Wang, Proceedings
of DSN-DCCS 2007.(PDF)
Understanding Network Delay Changes Caused by Routing
Events by Himabindu Pucha, Ying Zhang, Z. Morley Mao, Y. Charlie
Hu, Proceedings of ACM SIGMETRICS 2007.(PDF)
Accurate Real-time Identification of IP Prefix Hijacking by
Xin Hu and Z. Morley Mao, Proceedings of IEEE Security and Privacy
(Oakland) 2007.(PDF)
A Framework for Measuring and Predicting Impact of Routing
Changes by Ying Zhang, Z. Morley Mao, and Jia Wang, Proceedings
of IEEE INFOCOM 2007. (PDF)
Low-Rate TCP-Targeted DoS Attacks Disrupts Internet Routing
by Ying Zhang, Z. Morley Mao, and Jia Wang,
Proceedings of 14th Annual Network & Distributed System Security Symposium (NDSS) 2007.(PDF)
2006
Tussle in Routing: Who Determines Internet Paths? by Z. Morley Mao. Invited paper,
Workshop on Internet Routing Evolution and Design (WIRED), 2006 (PDF)
On the Impact of Research Network Based Testbeds on Wide-area
Experiments by Himabindu Pucha, Y. Charlie Hu, and Z. Morley Mao,
Proceedings of ACM Internet Measurement Conference (IMC) 2006.
(paper [PDF])
Internet-scale Malware Mitigation: Combining Intelligence of
the Control and Data Plane by Ying Zhang, Evan Cooke, and Z. Morley Mao,
Proceedings of WORM 2006. (paper [PDF])
Differentiated BGP Update Processing for Improved Routing
Convergence by Wei Sun, Z. Morley Mao, and Kang Shin,
Proceedings of IEEE ICNP 2006.
(paper [PDF])
Analyzing Large DDoS Attacks using Multiple Data Sources,
by Z. Morley Mao, Vyas Sekar, Oliver Spatscheck, Jacobus van der
Merwe, Rangarajan Vasudevan, Proceedings of ACM SIGCOMM Workshop on
Large-Scale Attack Defense (LSAD) 2006. (paper [PDF])
A Measurement Study on the Impact of Routing Events on
End-to-End Internet Path Performance, by Feng Wang, Z. Morley Mao,
Jia Wang, Lixin Gao, and Randy Bush, Proceedings of ACM SIGCOMM
2006. (paper [PDF])
Reval: A Tool for Real-time Evaluation of DDoS Mitigation
Strategies, by Ranga Vasudevan, Z. Morley Mao, Oliver Spatscheck,
Kobus Van der Merwe, Proceedings of Usenix Technical Conference
2006. (paper [PDF])
Hotspots: The Root Causes of Non-Uniformity in Self-Propagating
Malware, by Evan Cooke, Z. Morley Mao, Farnam Jahanian,
Proceedings of DSN 2006. (paper [PDF])
Is BGP Update Storm a Sign of Trouble: Observing the Internet
Control and Data Planes During Internet Worms, by Matthew Roughan,
Jun Li, Randy Bush, Z. Morley Mao and Timothy Griffin, Proceedings
of SPECTS 2006. (paper [PDF])
Watching Data Streams Toward a Multi-Homed Sink Under Routing Changes
Introduced by a BGP Beacon, by Jun Li, Randy Bush, Z. Mao, Tim
Griffin, Matt Roughan, Dan Stutzbach, and E. Purpus, Proceedings of
Passive and Active Measurement Conference (PAM) 2006. (paper [PDF])
2005
Guest editorial - Interdomain routing and the border gateway
protocol by Olivier Bonaventure, A. Feldmann, L. Gao, T. Griffin,
Z. M. Mao, IEEE Network 19(6): 3-4 (2005).
An Empirical Approach to Modeling Inter-AS Traffic
Matrices, by H. Chang, S. Jamin, Z. Mao, and W. Willinger,
Proceedings of ACM Internet Measurement Conference (IMC) 2005.(paper [PDF])
HLP: A Next-generation Interdomain Routing Protocol, by
Lakshminarayanan Subramanian, Matthew Caesar, Cheng Tien Ee, Mark
Handley, Z. Morley Mao, Scott Shenker, Ion Stoica, Proceedings of
ACM SIGCOMM 2005 (paper [PDF])
Finding a Needle in a Haystack: Pinpointing Significant BGP
Routing Changes in an IP Network, by Jian Wu, Z. Morley Mao,
Jennifer Rexford, and Jia Wang, Proceedings of 2nd Symposium on
Networked Systems Design and Implementation (NSDI), Boston, MA, May
2005. (talk [PDF], [PPT], paper [PDF])
On AS-Level Path Inference by Z. Morley Mao, Lili Qiu, Jia Wang,
and Yin Zhang, Proceedings of ACM SIGMETRICS, Banff,
Canada, June 2005. (paper [PDF])
Enriching intrusion alerts through multi-host causality by
Samuel T. King, Z. Morley Mao, Dominic G. Lucchetti, and Peter
M. Chen, Proceedings of the 2005 Network and Distributed System Security
Symposium (NDSS), February 2005.
(paper [PDF])
A Measurement Study of Internet Bottlenecks by Ningning Hu, Li
Li, Z. Morley Mao, Peter Steenkiste, and Jia Wang,
Proceedings of IEEE INFOCOM 2005 (paper [PDF])
2004
Towards a Next Generation Inter-domain Routing Protocol
by Lakshminarayanan Subramanian, Matthew Caesar, Cheng Tien Ee (UC
Berkeley), Mark Handley (University College, London), Z. Morley Mao
(University of Michigan), Scott Shenker (UC Berkeley and ICSI), and
Ion Stoica (UC Berkeley), Proceedings of HotNets 2004 (paper [PDF])
BorderGuard: Detecting Cold Potatoes from Peers by
N. Feamster, Z. Mao, and J. Rexford,
Proc. ACM Internet Measurement Conference (IMC), Taormina, Sicily, Italy,
October 2004 (PDF).
Toward Understanding Distributed Blackhole Placement by
Evan Cooke, Michael Bailey, Z. Morley Mao, David Watson, Farnam
Jahanian and Danny McPherson,
Proceedings of WORM 2004 (paper [PDF])
Combining Routing and Traffic Data for Detection of IP
Forwarding Anomalies by Matthew Roughan, Tim Griffin, Z. Morley
Mao, Albert Greenberg, and Brian Freeman, Poster paper,
Proceedings of ACM SIGMETRICS 2004 (full version [PDF])(talk PDF)
Proceedings of ACM SIGCOMM NeTs Workshop, Portland, OR, August 2004
Locating Internet Bottlenecks: Algorithms, Measurements,
and Implications by Ningning Hu, Li Li, Z. Morley Mao, Peter
Steenkiste, and Jia Wang, Proceedings of ACM SIGCOMM, Portland, OR,
August 2004 (PS)Project info
Locating Internet Routing Instabilities by Anja
Feldmann, Olaf Maennel, Z. Morley Mao, Arthur Berger, Bruce
Maggs, Proceedings of ACM SIGCOMM, Portland, OR,
August 2004 (PS)
Routing at various layers:
Scalable and accurate identification of AS-level forwarding
paths by Z. Morley Mao, David Johnson, Jennifer Rexford, Jia
Wang, and Randy H. Katz, Proc. IEEE INFOCOM, March 2004. (PDF)
2003
BGP Beacons by Z. Morley Mao, Randy Bush, Tim Griffin, and
Matt Roughan, Internet Measurement Conference (IMC) 2003.(PDF)
Towards an Accurate AS-Level Traceroute Tool by Z. Morley
Mao, Jennifer Rexford, Jia Wang, and Randy Katz,
ACM SIGCOMM 2003.(PDF)software
Interdomain Routing Streams by Timothy
G. Griffin and Z. Morley Mao, Workshop on
Management and Processing of Data Streams 2003.(PDF)
Efficient and Robust Streaming Provisioning in VPNs by
Z. Morley Mao, David Johnson, Oliver Spatscheck, Jacobus Van der
Merwe, and Jia Wang. World Wide Web Conference
2003.(ps.gz)(PDF)(Conference presentation: PDF)
Routing Research Issues by Z. Morley Mao. Invited paper,
Workshop on Internet Routing Evolution and Design (WIRED), 2003 (PDF)
2002 and earlier
Route Flap Damping Exacerbates Internet Routing Convergence
by Z. Morley Mao, Ramesh Govindan, George Varghese, and Randy Katz.
ACM SIGCOMM 2002.(PS)
(PDF)
A Precise and Efficient Evaluation of the Proximity
between Web Clients and their Local DNS Servers, by Z. Morley
Mao, Charles Cranor, Fred Douglis, Michael Rabinovich, Oliver
Spatscheck, and
Jia Wang,USENIX Annual Technical Conference,
2002.(PS)(PDF)
(Invited talk at HP Labs PPT)
(Conference presentation: PPT)
Automatic Service Composition:
Achieving Service Portability using Self-adaptive Data
Paths, by Z. Morley Mao, Randy H. Katz, IEEE Communications Magazine special Issue
on Service Portability and Virtual Home Environment, January
2002.(PDF)
A Framework for Universal Service Access Using
Device Ensemble by Z. Morley Mao, and Randy Katz. (Young Investigator Award)
Grace Hopper Celebration of Women in Computing 2002.(PS)
(PDF)
Network Support for Mobile Multimedia using a Self-adaptive
Distributed Proxy, by Z. Morley Mao, H. Wilson So, ByungHoon
Kang, and Randy H. Katz, 11th International Workshop on Network and Operating
Systems Support for Digital Audio and Video (NOSSDAV-2001).(PS)
(PDF).
Achieving Service Portability in ICEBERG, by Z. Morley Mao
and Randy H. Katz, IEEE GlobeCom 2000, Workshop on Service Portability
(SerP-2000).(PS)
(PDF)
Fault-tolerant, Scalable, Wide-Area Internet Service
Composition, by Z. Morley Mao and Eric A. Brewer and Randy
H. Katz, U.C. Berkeley Technical Report UCB//CSD-01-1129, Jan
2001. (PS.GZ, archive)
SAHARA, ICEBERG, Ninja Group Project Papers
The SAHARA Model for Service Composition Across
Multiple Providers, by B. Raman, S. Agarwal, Y. Chen,
M. Caesar, W. Cui, P. Johansson, K. Lai, T. Lavian, S. Machiraju,
Z. M. Mao, G. Porter, T. Roscoe, M. Seshadri, J. Shih, K. Sklower,
L. Subramanian, T. Suzuki, S. Zhuang, A. D. Joseph, Randy Katz,
Ion Stoica, Proceedings of the International Conference on
Pervasive Computing, August 26-28, 2002. (PS)(PDF)
The Ninja Architecture for Robust Internet-Scale Systems and Services,
by Steven D. Gribble, Matt Welsh, Rob von Behren, Eric A. Brewer, David
Culler, N. Borisov, S. Czerwinski, R. Gummadi, J. Hill, A. Joseph, R.H.
Katz, Z. Mao, S. Ross, and B. Zhao.(Best Journal Paper Award for the Year 2001),
Special Issue of Computer Networks on Pervasive Computing,
Volume 35, Issue 4, March 2001, Pages 473-497.
(PS)((PDF).
ICEBERG: An Internet-core Network Architecture for Integrated
Communications, H. J. Wang, B. Raman, C-N. Chuah, R. Biswas, R. Gummadi, B. Hohlt, X. Hong,
E. Kiciman, Z. Mao, J. S. Shih, L. Subramanian, B. Y. Zhao, A. D. Joseph,
and R. H. Katz, IEEE Personal Communications Special
Issue on IP-based Mobile Telecommunications Networks, August 2000.
(PDF, 2.2 MB) (PS.GZ)
This material is presented to ensure timely dissemination of
scholarly and technical work. Copyright and all rights therein are
retained by authors or by other copyright holders. All persons copying
this information are expected to adhere to the terms and constraints
invoked by each author's copyright. These works may not be reposted
without the explicit permission of the copyright holder.