David Naylor
David Naylor
Nefeli Networks
Verified email at - Homepage
Cited by
Cited by
Users' guides to the medical literature: VI. How to use an overview
AD Oxman, DJ Cook, GH Guyatt, E Bass, P Brill-Edwards, G Browman, ...
Jama 272 (17), 1367-1371, 1994
Users' guides to the medical literature: I. How to get started
AD Oxman, DL Sackett, GH Guyatt, G Browman, D Cook, H Gerstein, ...
Jama 270 (17), 2093-2095, 1993
Users' guides to the medical literature: V. How to use an article about prognosis
A Laupacis, G Wells, WS Richardson, P Tugwell, GH Guyatt, G Browman, ...
Jama 272 (3), 234-237, 1994
Users' guides to the medical literature: IV. How to use an article about harm
M Levine, S Walter, H Lee, T Haines, A Holbrook, V Moyer, G Guyatt, ...
Jama 271 (20), 1615-1619, 1994
Users' Guides to the Medical Literature: VIII. How to Use Clinical Practice Guidelines B. What Are the Recommendations and Will They Help You in Caring for Your Patients?
MC Wilson, RSA Hayward, SR Tunis, EB Bass, G Guyatt, D Cook, ...
Jama 274 (20), 1630-1632, 1995
The Cost of the S in HTTPS
D Naylor, A Finamore, I Leontiadis, Y Grunenberger, M Mellia, M Munafň, ...
Proceedings of the 10th ACM International on Conference on emerging …, 2014
Users' guides to the medical literature: VII. How to use a clinical decision analysis B. What are the results and will they help me in caring for my patients?
WS Richardson, AS Detsky, G Guyatt, D Cook, H Gerstein, R Hayward, ...
Jama 273 (20), 1610-1613, 1995
Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS
D Naylor, K Schomp, M Varvello, I Leontiadis, J Blackburn, D Lopez, ...
SIGCOMM 2015, 199-212, 2015
Randomized assessment of resource use in fast-track cardiac surgery 1-year after hospital discharge
DCH Cheng, C Wall, G Djaiani, RA Peragallo, J Carroll, C Li, D Naylor
The Journal of the American Society of Anesthesiologists 98 (3), 651-657, 2003
Practical, real-time centralized control for cdn-based live video delivery
MK Mukerjee, D Naylor, J Jiang, D Han, S Seshan, H Zhang
Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015
Using sensor networks to study the effect of peripatetic healthcare workers on the spread of hospital-associated infections
T Hornbeck, D Naylor, AM Segre, G Thomas, T Herman, PM Polgreen
The Journal of infectious diseases 206 (10), 1549-1557, 2012
Unleashing innovation
D Naylor, T Jenkins, F Girard, C Power, N Fraser, JM Mintz
desLibris, 2015
Eyeorg: A platform for crowdsourcing web quality of experience measurements
M Varvello, J Blackburn, D Naylor, K Papagiannaki
Proceedings of the 12th International on Conference on emerging Networking …, 2016
Is the web http/2 yet?
M Varvello, K Schomp, D Naylor, J Blackburn, A Finamore, ...
Passive and Active Measurement: 17th International Conference, PAM 2016 …, 2016
XIA: architecting a more trustworthy and evolvable internet
D Naylor, MK Mukerjee, P Agyapong, R Grandl, R Kang, M Machado, ...
ACM SIGCOMM Computer Communication Review 44 (3), 50-57, 2014
Balancing Accountability and Privacy in the Network
D Naylor, MK Mukerjee, P Steenkiste
SIGCOMM 2014, 2014
And then there were more: Secure communication for more than two parties
D Naylor, R Li, C Gkantsidis, T Karagiannis, P Steenkiste
Proceedings of the 13th International Conference on emerging Networking …, 2017
Enabling near real-time central control for live video delivery in CDNs
MK Mukerjee, JA Hong, J Jiang, D Naylor, D Han, S Seshan, H Zhang
Proceedings of the 2014 ACM conference on SIGCOMM, 343-344, 2014
Introducing middleboxes into secure communications between a client and a server
T Karagiannis, C Gkantsidis, D Naylor, R Li
US Patent 10,389,524, 2019
To HTTP/2, or not to HTTP/2, that is the question
M Varvello, K Schomp, D Naylor, J Blackburn, A Finamore, ...
arXiv preprint arXiv:1507.06562, 2015
The system can't perform the operation now. Try again later.
Articles 1–20