David M Johnson
David M Johnson
Verified email at - Homepage
Cited by
Cited by
The design and operation of CloudLab
D Duplyakin, R Ricci, A Maricq, G Wong, J Duerig, E Eide, L Stoller, ...
2019 {USENIX} Annual Technical Conference ({USENIX}{ATC} 19), 1-14, 2019
Mobile Emulab: A robotic wireless and sensor network testbed
D Johnson, T Stack, R Fish, DM Flickinger, L Stoller, R Ricci, J Lepreau
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
POWDER: Platform for Open Wireless Data-driven Experimental Research
J Breen, A Buffmire, J Duerig, K Dutt, E Eide, M Hibler, D Johnson, ...
Proceedings of the 14th International Workshop on Wireless Network Testbeds …, 2020
NexRAN: Closed-loop RAN slicing in POWDER-A top-to-bottom open-source open-RAN use case
D Johnson, D Maas, J Van Der Merwe
Proceedings of the 15th ACM Workshop on Wireless Network Testbeds …, 2022
Abstractions for practical virtual machine replay
A Burtsev, D Johnson, M Hibler, E Eide, J Regehr
Proceedings of the12th ACM SIGPLAN/SIGOPS International Conference on …, 2016
Composable multi-level debugging with Stackdb
D Johnson, M Hibler, E Eide
ACM SIGPLAN Notices 49 (7), 213-226, 2014
A3: An environment for self-adaptive diagnosis and immunization of novel attacks
P Pal, R Schantz, A Paulos, B Benyo, D Johnson, M Hibler, E Eide
2012 IEEE Sixth International Conference on Self-Adaptive and Self …, 2012
Open source RAN slicing on POWDER: A top-to-bottom O-RAN use case
D Johnson, D Maas, J Van Der Merwe
Proceedings of the 19th Annual International Conference on Mobile Systems …, 2021
Towards a high quality path-oriented network measurement and storage system
D Johnson, D Gebhardt, J Lepreau
Passive and Active Network Measurement: 9th International Conference, PAM …, 2008
CapNet: security and least authority in a capability-enabled cloud
A Burtsev, D Johnson, J Kunz, E Eide, J Van der Merwe
Proceedings of the 2017 Symposium on Cloud Computing, 128-141, 2017
Isolation of malicious external inputs in a security focused adaptive execution environment
A Paulos, P Pal, R Schantz, B Benyo, D Johnson, M Hibler, E Eide
2013 International Conference on Availability, Reliability and Security, 82-91, 2013
The Part-Time Cloud: Enabling Balanced Elasticity Between Diverse Computing Environments
D Duplyakin, D Johnson, R Ricci
Proceedings of the 8th Workshop on Scientific Cloud Computing, 1-8, 2017
Fluorescence: Detecting Kernel-Resident Malware in Clouds
R Li, M Du, D Johnson, R Ricci, J Van der Merwe, E Eide
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
Digital Spectrum Twins for Enhanced Spectrum Sharing and Other Radio Applications
S Tadik, KM Graves, MA Varner, CR Anderson, D Johnson, SK Kasera, ...
IEEE Journal of Radio Frequency Identification, 2023
Supporting docker in emulab-based network testbeds
D Johnson, E Grubb, E Eide
11th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 18), 2018
A Wingman for Virtual Appliances
P Nayak, M Hibler, D Johnson, E Eide
Runtime Verification: 17th International Conference, RV 2017, Seattle, WA …, 2017
Critical Reroute: A Practical Approach to Network Flow Prioritization using Segment Routing
S Redman, D Johnson, J van der Merwe
2019 IEEE International Symposium on Local and Metropolitan Area Networks …, 2019
The system can't perform the operation now. Try again later.
Articles 1–17