forked from stevecheckoway/ucsddissertation
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathsysnet.bib
10200 lines (8965 loc) · 369 KB
/
sysnet.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
% $Id: sysnet.bib,v 1.768 2012-02-12 19:56:41 voelker Exp $
%
% tags
% hsn (high-speed networking), security, wireless, www, routing, measure,
% vm, selfstab (self-stabilization), bioinformatics, p2p, ml(machine learning),
% datacenter (also for cloud), power, storage, debug
%
% Systems Journals
@string{tocs = "ACM Transactions on Computer Systems"}
@string{tocsurl = "http://www.acm.org/tocs/"}
@string{tos = "ACM Transaction on Storage"}
@string{tosurl = "http://tos.acm.org/"}
@string{taco = "ACM Transaction on Architecture and Code Generation"}
@string{tacourl = "http://taco.acm.org/"}
@string{toit = "ACM Transactions on Internet Technology (TOIT)"}
@string{toiturl = "http://toit.acm.org/"}
@string{tist = "ACM Transactions on Intelligent Systems and Technology (TIST)"}
@string{tisturl = "http://tist.acm.org/"}
@string{ccr = "ACM SIGCOMM Computer Communication Review"}
@string{ccrurl = "http://acm.org/sigcomm/ccr/"}
@string{osr = "ACM SIGOPS Operating Systems Review"}
@string{osrurl = "http://www.sigops.org/osr.html"}
@string{ton = "IEEE/ACM Transactions on Networking"}
@string{tonurl = "http://www.ton.seas.upenn.edu/"}
@string{toplas = "ACM Transactions on Programming Languages and Systems (TOPLAS)"}
@string{toplasurl = "http://toplas.acm.org/"}
@string{twc = "IEEE Transactions on Wireless Communications"}
@string{twcurl = "http://www.comsoc.org/twc/"}
@string{tpds = "IEEE Transactions on Parallel and Distributed Systems"}
@string{tpdsurl = "http://www.computer.org/tpds"}
@string{tdsc = "IEEE Transactions on Dependable and Secure Computing"}
@string{tdscurl = "http://www.computer.org/tdsc"}
@string{jsac = "IEEE Journal on Selected Areas in Communication"}
@string{jsacurl = "http://www.comsoc.org/jsac"}
@string{cacm = "Communications of the Association for Computing Machinery"}
@string{cacmurl = "http://www.acm.org/pubs/cacm/"}
@string{mone = "Mobile Networks and Applications"}
@string{moneurl = "http://springerlink.metapress.com/openurl.asp?genre\=journal\&eissn\=1572-8153"}
@string{mc2r = "Mobile Computing and Communications Review (MC2R)"}
@string{mc2rurl = "http://www.sigmobile.org/pubs/mc2r"}
@string{comnet = "Computer Networks"}
@string{comneturl = "http://www.elsevier.com/locate/comnet/"}
@string{tissec = "ACM Transactions on Information and System Security"}
@string{tissecurl = "http://tissec.acm.org/"}
% Magazines
@string{secpriv = "IEEE Security and Privacy"}
@string{secprivurl = "http://www.computer.org/security/"}
@string{network = "IEEE Network"}
@string{networkurl = "http://www.comsoc.org/pubs/net/"}
@string{micro = "IEEE MICRO"}
@string{microurl = "http://www.computer.org/micro/"}
@string{login = "USENIX ;login:"}
@string{loginurl = "http://www.usenix.org/publications/login/"}
@string{tmc = "IEEE Transcations on Mobile Computing"}
@string{tmcurl = "http://www.computer.org/portal/web/tmc"}
%
% 2018
%
@inproceedings{ransomware:oakland18,
title = "Tracking Ransomware End-to-end",
author = "Danny Yuxing Huang and
Maxwell Matthaios Aliapoulios and
Vector Guo Li and
Luca Invernizzi and
Elie Bursztein and
Kylie McRoberts and
Jonathan Levin and
Kirill Levchenko and
Alex C. Snoeren and
Damon McCoy",
crossref = oakland18,
year = 2018,
tags = "security",
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/ransom-oakland18.pdf",
}
@inproceedings{altcoin:fc18,
title = "Estimating Profitability of Alternative Cryptocurrencies",
author = "Danny Yuxing Huang and Kirill Levchenko and Alex C. Snoeren",
crossref = fc18,
year = 2018,
tags = "security",
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/altcoin-fc18.pdf",
}
%
% 2017
%
@article{fault:login17,
title = "Passive Realtime Datacenter Fault Detection and Localization",
author = "Arjun Roy and Hongyi Zeng and Jasmeet Bagga and Alex C. Snoeren",
journal = login,
journalurl = loginurl,
year = {2017},
volume = 42, number = 3,
tags = "security",
www_pdf_url = "https://www.usenix.org/publications/login/fall2017/roy",
}
@inproceedings{pressure:ccs17,
author = "Alex Gamero-Garrido and Stefan Savage and Kirill Levchenko and Alex C. Snoeren",
title = "Quantifying the Pressure of Legal Risks on Third-party
Vulnerability Research",
crossref = "ccs17",
year = 2017,
tags = "measure,security",
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/dmca-ccs17.pdf"
}
@inproceedings{tripwire:imc17,
author = "Joe DeBlasio and Stefan Savage and Geoffrey M. Voelker and Alex C. Snoeren",
title = "Tripwire: Inferring Internet Site Compromise",
crossref = "imc17",
year = 2017,
tags = "measure,security",
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/tripwire-imc17.pdf"
}
@inproceedings{bingads,
author = "Joe DeBlasio and Saikat Guha and Geoffrey M. Voelker and Alex C. Snoeren",
title = "Exploring the Dynamics of Search Advertiser Fraud",
crossref = "imc17",
year = 2017,
tags = "measure",
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/bingads-imc17.pdf"
}
@inproceedings{packetlab:imc17,
author = "Kirill Levchenko and Amogh Dhamdhere and Bradley Huffaker and kc claffy and Mark Allman and Vern Paxson",
title = "{PacketLab}: A Universal Measurement Endpoint Interface",
crossref = "imc17",
year = 2017,
tags = "measure",
www_pdf_url = "http://www.cs.ucsd.edu/~klevchen/packetlab-imc17.pdf"
}
@inproceedings{rotornet:sigcomm17,
author = "William M. Mellette and Rob McGuinness and Arjun Roy and Alex Forencich and George Papen and Alex C. Snoeren and George Porter",
title = "{RotorNet:} A Scalable, Low-complexity, Optical Datacenter Network",
year = 2017,
crossref = "sigcomm17",
www_pdf_url = "http://www.cs.ucsd.edu/~gmporter/papers/sigcomm17-rotornet.pdf"
}
@inproceedings{backpage:kdd17,
title = "{Backpage and Bitcoin: Uncovering Human Traffickers}",
author = "Rebecca S. Portnoff and Danny Yuxing Huang and Periwinkle Doerfler and Sadia Afroz and Damon McCoy",
crossref = "kdd17",
year = 2017,
www_pdf_url = "http://www.sysnet.ucsd.edu/sysnet/miscpapers/backcoin-kdd17.pdf",
}
@inproceedings{tsaattack:usesec17,
author = "Craig Disselkoen and David Kohlbrenner and Leo Porter and Dean Tullsen",
title = "{Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX}",
crossref = "usesec17",
year = 2017,
www_pdf_url = "http://www.sysnet.ucsd.edu/sysnet/miscpapers/sec17-disselkoen.pdf",
tags = "security"
}
@inproceedings{floattime:usesec17,
author = "David Kohlbrenner and Hovav Shacham",
title = "{On the Effectiveness of Mitigations against Floating-point Timing channels}",
crossref = "usesec17",
year = 2017,
www_pdf_url = "http://www.sysnet.ucsd.edu/sysnet/miscpapers/sec17-kohlbrenner.pdf",
tags = "security"
}
@inproceedings{deadstore:usesec17,
author = "Zhaomo Yang and Brian Johannesmeyer and Anders Trier Olesen and Sorin Lerner and Kirill Levchenko",
title = "{Dead Store Elimination (Still) Considered Harmful}",
crossref = "usesec17",
year = 2017,
tags = "security"
}
@inproceedings{mbeface:cset17,
author = "Louis F. DeKoven and Stefan Savage and Geoffrey M. Voelker and Nektarios Lentiadis",
title = "{Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser}",
booktitle = "{Proceedings of Workshop on Cyber Security Experimentation and Test (CSET)}",
month = aug,
year = {2017},
bookurl = "https://www.usenix.org/conference/cset17",
tags = "security",
www_pdf_url = "http://www.cs.ucsd.edu/~voelker/pubs/malextend-cset17.pdf",
}
@inproceedings{indy:ancs17,
author = "Conglong Li and Matthew Mukerjee and David G. Andersen and
Srinivasan Seshan and Michael Kaminsky and George Porter and
Alex C. Snoeren",
title = "Using Indirect Routing to Recover from Network Traffic Scheduling Estimation Error",
year = 2017,
crossref = "ancs17",
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/indy-ancs17.pdf",
}
@InProceedings{dieselsec:oakland17,
author = {Mortiz Contag and Guo Li and Andre Pawlowski and Felix Domke and Stefan Savage and Kirill Levchenko and Thorsten Holz},
title = {How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles},
year = 2017,
crossref = "oakland17",
www_pdf_url = "http://www.cs.ucsd.edu/~klevchen/diesel-sp17.pdf"
}
@InProceedings{ratter:oakland17,
author = {Brown Farinholt and Mohammad Rezaeirad and Paul Pearce and Hitesh Dharamdasani and Haikuo Yin and Stevens LeBlond and Damon McCoy and Kirill Levchenko},
title = {To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild},
year = 2017,
crossref = "oakland17",
www_pdf_url = "http://www.cs.ucsd.edu/~klevchen/rat-sp17.pdf"
}
@InProceedings{jscriptbind:oakland17,
author = {Fraser Brown and Shravan Narayan and Riad S. Wahby and Dawson Engler and Ranjit Jhala and Deian Stefan},
title = {Finding and Preventing Bugs in JavaScript Bindings},
year = 2017,
crossref = "oakland17",
www_pdf_url = "http://cseweb.ucsd.edu/~dstefan/pubs/brown:2017:finding.pdf"
}
@inproceedings{xu:chi:17,
author = {Tianyin Xu and Han Min Naing and Le Lu and Yuanyuan Zhou},
title = "{How Do System Administrators Resolve Access-Denied Issues in the Real World?}",
booktitle = "Proceedings of the 35th Annual CHI Conference on Human Factors in Computing Systems (CHI'17)",
address = "Denver, CO, USA",
month = may,
year = 2017,
www_pdf_url = "http://opera.ucsd.edu/paper/chi17-accessdenied.pdf",
}
@inproceedings{mapspam:www17,
author = "Danny Yuxing Huang and Doug Grundman and Kurt Thomas and and Elie Bursztein and Abhishek Kumar and Kirill Levchenko and Alex C. Snoeren",
title = "Pinning Down Abuse on Google Maps",
crossref = "www17",
tags = "security",
year = 2017,
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/mapspam-www17.pdf",
}
@inproceedings{autocrime:www17,
author = "Rebecca S Portnoff and Sadia Afroz and Greg Durrett and Jonathan K Kummerfeld and Taylor Berg-Kirkpatrick and Damon McCoy and Kirill Levchenko and Vern Paxson",
title = "Tools for Automated Analysis of Cybercriminal Markets",
crossref = "www17",
tags = "security",
www_pdf_url = "http://cseweb.ucsd.edu/~klevchen/padkbmlp-www17.pdf",
year = 2017,
}
@inproceedings{fault:nsdi17,
title = "Passive Realtime Datacenter Fault Detection and Localization",
author = "Arjun Roy and Hongyi Zeng and Jasmeet Bagga and Alex C. Snoeren",
crossref = nsdi17,
year = 2017,
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/fault-nsdi17.pdf",
}
@inproceedings{excamera:nsdi17,
title = "Encoding, Fast and Slow: Low-Latency Video Processing Using Thousands of Tiny Threads",
author = "Sadjad Fouladi and Riad S. Wahby and Brennan Shacklett and Karthikeyan Vasuki Balasubramaniam and William Zeng and Rahul Bhalerao and Anirudh Sivaraman and George Porter and Keith Winstein",
crossref = nsdi17,
www_pdf_url = "http://www.cs.ucsd.edu/~gmporter/papers/nsdi17-excamera.pdf",
year = 2017,
}
@inproceedings{megaswitch:nsdi17,
title = "Enabling Wide-spread Communications on Optical Fabric with MegaSwitch",
author = "Li Chen and Kai Chen and Joshua Zhu and Minlan Yu and George Porter and Chunming Qiao and Shan Zhong",
crossref = nsdi17,
www_pdf_url = "http://www.cs.ucsd.edu/~gmporter/papers/nsdi17-megaswitch.pdf",
year = 2017,
}
@inproceedings{jin:nsdi:17,
author = {Deepak Vasisht and Zerina Kapetanovic and Jongho Won and Xinxin Jin and Ranveer Chandra and Sudipta Sinha and Ashish Kapoor and Madhusudhan Gumbalapura Sudarshan and Sean Stratman},
title = "{FarmBeats: An IoT Platform for Data-Driven Agriculture}",
crossref = nsdi17,
month = mar,
year = 2017,
www_pdf_url = "http://www.sysnet.ucsd.edu/sysnet/miscpapers/nsdi17-vasisht.pdf",
}
@inproceedings{jitsec:ndss17,
author = "Wilson Lian and Hovav Shacham and Stefan Savage",
title = "A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations",
crossref = "ndss17", year = 2017,
tags = "security",
www_pdf_url = "http://cseweb.ucsd.edu/~savage/papers/NDSS17.pdf",
}
%
% 2016
%
@inproceedings{datalog:icbd16,
title = "Datalography: Scaling Datalog Graph Analytics on Graph Processing Systems",
author = "Walaa Moustafa and Vicky Papavasileiou and Ken Yocum and Alin Deutsch",
booktitle = "Proceedings of the {IEEE} International Conference on Big Data",
year = 2016,
month = dec,
bookurl = "http://cci.drexel.edu/bigdata/bigdata2016/",
www_pdf_url = "http://www.sysnet.ucsd.edu/sysnet/miscpapers/datalog-icbd16.pdf",
}
@inproceedings{ptree:hotnets16,
author = "William M. Mellette and Alex C. Snoeren and George Porter",
title = "{P-FatTree}: A Multi-channel Datacenter Network Topology",
crossref = "hotnets16",
year = 2016, month = nov,
tags = "datacenter",
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/ptree-hotnets16.pdf",
}
@inproceedings{xu:osdi:16,
author = {Tianyin Xu and Xinxin Jin and Peng Huang and Yuanyuan Zhou and Shan Lu and Long Jin and Shankar Pasupathy},
title = "{Early Detection of Configuration Errors to Reduce Failure Damage}",
booktitle = {Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI'16)},
address = "Savannah, GA, USA",
month = nov,
year = 2016,
www_pdf_url = "http://opera.ucsd.edu/paper/osdi16-pcheck.pdf",
}
@inproceedings{sdm:nanocom16,
author = "Yeshaiahu Fainman and Andrew Grieco and George Porter and Jordan Davis",
title = "Nanophotonic Devices and Circuits for Communications",
booktitle = "Proceedings of the Third Annual International Conference on Nanoscale Computing and Communication ({ACM} {N}anocom'16)",
address = "New York, NY",
month = sep,
year = 2016,
bookurl = "http://nanocom.acm.org/",
tags = "datacenter"
}
@inproceedings{notification:usesec16,
author = "Frank Li and Zakir Durumeric and Jakub Czyz and Damon McCoy and Stefan Savage and Michael Bailey and Vern Paxson",
title = "{You've Got Vulnerability: Exploring Effective Vulnerability Notifications}",
crossref = "usesec16",
year = 2016,
www_pdf_url = "http://cseweb.ucsd.edu/~savage/papers/USESEC16.pdf",
tags = "security"
}
@inproceedings{mosaic:pets16,
author = "Steven Hill and Zhimin Zhou and Lawrence Saul and Hovav Shacham",
title = "{On the (In)effectiveness of Mosaicing and Blurring as Tools for Document Redaction}",
crossref = {pets16},
year = 2016,
tags = "security",
}
@inproceedings{carprivacy:pets16,
author = "Miro Enev and Alex Takakuwa and Karl Koscher and Tadayoshi Kohno",
title = "Automobile Driver Fingerprinting",
crossref = "pets16",
year = 2016,
www_pdf_url = "http://www.autosec.org/pubs/fingerprint.pdf",
tags = "security,measurement",
}
@inproceedings{huang:mobisys:16,
author = {Peng Huang and Tianyin Xu and Xinxin Jin and Yuanyuan Zhou},
title = "{DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior}",
booktitle = "Proceedings of the 14th International Conference on Mobile Systems, Applications, and Services (MobiSys'16)",
address = "Singapore",
month = jun,
year = 2016,
www_pdf_url = "http://opera.ucsd.edu/paper/mobisys16-defdroid.pdf",
}
@article{lost:jsac16,
author = "Alberto Dainotti and Karyn Benson and Alistair King and Bradley Huffaker and Eduard Glatz and Xenofontas Dimitropoulos and Philipp Richter and Alessandro Finamore and Alex C. Snoeren",
title = "Lost in Space: Improving Inference of {IPv4} Address Space Utilization",
journal = jsac,
journalurl = jsacurl,
volume = 34, number = 6,
year = 2016, month = jun,
tags = "measure",
www_pdf_url = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7460207",
}
@inproceedings{jin:eurosys:16,
author = {Xinxin Jin and Peng Huang and Tianyin Xu and Yuanyuan Zhou},
title = "{NChecker: Saving Mobile App Developers from Network Disruptions}",
booktitle = "Proceedings of the 11th ACM European Conference on Computer Systems (EuroSys'16)",
address = "London, UK",
month = apr,
year = 2016,
www_pdf_url = "http://opera.ucsd.edu/paper/eurosys16-nchecker.pdf",
}
@inproceedings{li:nsdi:16,
author = {Zhenhua Li and Weiwei Wang and Tianyin Xu and Xin Zhong and Xiang-Yang Li and Yunhao Liu and Christo Wilson and Ben Y. Zhao},
title = "{Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard}",
booktitle = "Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI'16)",
address = "Santa Clara, CA, USA",
month = mar,
year = 2016,
www_pdf_url = "http://cseweb.ucsd.edu/~tixu/papers/nsdi16.pdf",
}
@inproceedings{Mellette:16,
author = {William Mellette and Glenn M. Schuster and George Porter and Joseph Ford},
booktitle = {Optical Fiber Communication Conference},
journal = {Optical Fiber Communication Conference},
keywords = {Optical microelectromechanical devices; Switching ; Switching, circuit},
pages = {M3I.3},
publisher = {Optical Society of America},
title = {61 Port 1x6 Selector Switch for Data Center Networks},
year = {2016},
month = mar,
url = {http://www.osapublishing.org/abstract.cfm?URI=OFC-2016-M3I.3},
doi = {10.1364/OFC.2016.M3I.3},
}
@inproceedings{memdisagg:ancs16,
author = "Pramod Subba Rao and George Porter",
title = "Is memory disaggregation feasible? A case study with Spark SQL",
crossref = "ancs16", year = 2016,
acceptance = "12/58=21",
tags = "datacenter",
www_pdf_url = "http://cseweb.ucsd.edu/~gmporter/papers/memdisagg-ancs16.pdf"
}
@inproceedings{bitcoin:fc16,
author = "Khaled Baqer and Danny Yuxing Huang and Nicholas Weaver and Damon McCoy",
title = {{Stressing Out: Bitcoin "Stress Testing"}},
booktitle = "BITCOIN '14: The Third Workshop on Bitcoin and Blockchain Research",
bookurl = "http://fc16.ifca.ai/bitcoin/",
address = "Christ Church, Barbados",
year = 2016, month = feb,
tags = "security,measurement",
}
%
% 2015
%
@article{can:login15,
author = "Ian Foster and Karl Koscher",
title = "{Exploring Controller Area Networks}",
journal = login,
journalurl = loginurl,
year = {2015},
month = dec,
volume = 40, number = 6,
www_pdf_url = "http://www.sysnet.ucsd.edu/sysnet/miscpapers/login_dec15_02_foster.pdf",
tags = "security",
}
@article{spacemux:quantum15,
title = "Integrated Space-division Multiplexer for Data Center Networks",
journal = "IEEE Journal of Selected Topics in Quantum Electronics",
author = "Andrew Grieco and George Porter and Yeshaiahu Fainman",
year = 2015,
month = oct,
volume = "PP",
number = 99,
pages = "1-1",
tags = "datacenter",
www_pdf_url = "http://www.cs.ucsd.edu/~gmporter/papers/sdm-quantum15.pdf"
}
@TechReport{themis-gce-tr-2015,
author = {Michael Conley and Amin Vahdat and George Porter},
title = "{Sorting 100{TB} on {G}oogle {C}ompute {E}ngine}",
institution = {UC San Diego},
year = {2015},
number = {CS2015-2013},
month = sep,
www_pdf_url = "http://cseweb.ucsd.edu/~gmporter/papers/themis-gce15-tr.pdf",
tags = "datacenter"
}
@inproceedings{solstice:conext15,
author = "He Liu and Matthew K. Mukerjee and Conglong Li and Nicolas Feltman and George Papen and Stefan Savage and Srinivasan Seshan and Geoffrey M. Voelker and David G. Andersen and Michael Kaminsky and George Porter and Alex C. Snoeren",
title = "Scheduling Techniques for Hybrid Circuit/Packet Networks",
crossref = "conext15",
tags = "datacenter",
acceptance = "41/196=21",
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/solstice-conext15.pdf",
}
@inproceedings{emailsec:ccs15,
author = "Ian Foster and Jon Larson and Max Masich and Alex C. Snoeren and Stefan Savage and Kirill Levchenko",
title = "Security by Any Other Name: On the Effectiveness of Provider Based Email Security",
crossref = "ccs15",
year = 2015,
tags = "security,measurement",
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/smtpsec-ccs15.pdf",
}
@inproceedings{ads:imc15,
author = "Bhanu Vattikonda and Vacha Dave and Saikat Guha and Alex C. Snoeren",
title = "{Empirical Analysis of Search Advertising Strategies}",
crossref = "imc15",
year = 2015,
tags = "measure",
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/ads-imc15.pdf",
}
@inproceedings{ibr:imc15,
author = "Karyn Benson and Alberto Dainotti and kc claffy and Alex C. Snoeren and Michael Kallitsis",
title = "Leveraging Internet Background Radiation for Opportunistic Network Analysis",
crossref = "imc15",
year = 2015,
tags = "measure",
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/ibr-imc15.pdf",
}
@inproceedings{tldlandrush:imc15,
author = "Tristan Halvorson and Matthew F. Der and Ian Foster and Stefan Savage and Lawrence K. Saul and Geoffrey M. Voelker",
title = "From .academy to .zone: An Analysis of the New TLD Land Rush",
crossref = "imc15",
year = 2015,
tags = "measure",
www_pdf_url = "http://www.sysnet.ucsd.edu/~voelker/pubs/newtlds-imc15.pdf",
}
@inproceedings{whoisparse:imc15,
author = "Suqi Liu and Ian Foster and Stefan Savage and Geoffrey M. Voelker and Lawrence K. Saul",
title = "Who is .com? Learning to Parse WHOIS Records",
crossref = "imc15",
year = 2015,
tags = "measure",
www_pdf_url = "http://www.sysnet.ucsd.edu/~voelker/pubs/whois-imc15.pdf",
}
@inproceedings{dnsanal:imc15,
author = "Neha Chachra and Stefan Savage and Geoffrey M. Voelker",
title = "Affiliate Crookies: Characterizing Affiliate Marketing Abuse",
crossref = "imc15",
year = 2015,
tags = "measure,security",
www_pdf_url = "http://www.sysnet.ucsd.edu/~voelker/pubs/crookies-imc15.pdf",
}
% http://dl.acm.org/citation.cfm?id=2815675
% acceptance 43/169
@inproceedings{li:imc:15,
author = {Zhenhua Li and Christo Wilson and Tianyin Xu and Yao Liu and Zhen Lu and Yinlong Wang},
title = "{Offline Downloading in China: A Comparative Study}",
crossref = "imc15",
year = 2015,
tags = "measure,security",
www_pdf_url = "http://cseweb.ucsd.edu/~tixu/papers/imc15.pdf",
}
@inproceedings{themis:socc15,
author = "Michael Conley and Amin Vahdat and George Porter",
title = "Achieving Cost-efficient, Data-intensive Computing in the Cloud",
crossref = "socc15",
tags = "datacenter",
acceptance = "34/157=22",
www_pdf_url = "http://www.cs.ucsd.edu/~gmporter/papers/23-conley.pdf",
}
@inproceedings{overconfig:fse15,
author = "Tianyin Xu and Long Jin and Xuepeng Fan and Yuanyuan Zhou and Shankar Pasupathy and Rukma Talwadker",
title = "{Hey, You Have Given Me Too Many Knobs! -- Understanding and Dealing with Over-Designed Configuration in System Software}",
booktitle = "{Proceedings of the 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'15)}",
address = "Bergamo, Italy",
bookurl = "http://esec-fse15.dei.polimi.it/",
month = aug,
year = 2015,
}
@inproceedings{facebook:sigcomm15,
author = "Arjun Roy and Hongyi Zeng and Jasmeet Bagga and George Porter and Alex C. Snoeren",
title = "Inside the Social Network's (Datacenter) Network",
crossref = "sigcomm15",
year = 2015,
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/fb-sigcomm15.pdf",
}
@inproceedings{obdii:woot15,
author = "Ian Foster and Andrew Prudhomme and Karl Koscher and Stefan Savage",
title = "{Fast and Vulnerable: A Story of Telematic Failures}",
crossref = {woot15},
year = 2015,
bookurl = "http://www.usenix.org/conference/woot15",
tags = "security",
www_pdf_url = "http://cseweb.ucsd.edu/~savage/papers/WOOT15.pdf"
}
@inproceedings{surrogates:woot15,
author = "Karl Koscher and Tadayoshi Kohno and David Molnar",
title = "{SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems}",
crossref = {woot15},
year = 2015,
bookurl = "http://www.usenix.org/conference/woot15",
tags = "security",
}
@inproceedings{ads:kdd15,
title = "{Interpreting Advertiser Intent in Sponsored Search}",
author = "Bhanu C. Vattikonda and Santhosh Kodipaka and Hongyan Zhou and Vacha Dave and Saikat Guha and Alex C. Snoeren",
crossref = "kdd15",
year = 2015,
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/ads-kdd15.pdf",
}
@inproceedings{nanophotonics:omn2015,
author = "Andrew Grieco and George Porter and Yeshaiahu Fainman",
title = "Nanophotonics: Technology and Application",
booktitle = "Proceedings of the IEEE Optical {MEMS} and Nanophotonics Conference",
address = "Jerusalem, Israel",
month = aug, year = 2015,
bookurl = "http://www.omn2015.org/",
year = 2015,
}
@article{xu:csur:15,
author = {Tianyin Xu and Yuanyuan Zhou},
title = "{Systems Approaches to Tackling Configuration Errors: A Survey}",
journal = "ACM Computing Surveys (CSUR)",
volume = 47,
number = 4,
month = jul,
year = 2015,
www_pdf_url = "http://opera.ucsd.edu/paper/csur15-survey.pdf",
}
@inproceedings{cybercrime:weis15,
author = "Kurt Thomas and Danny Yuxing Huang and David Wang and Elie Bursztein and Chris Grier and Tom Holt and Christopher Kruegel and Damon McCoy and Stefan Savage and Giovanni Vigna",
title = "{Framing Dependencies Introduced by Underground Commoditization}",
crossref = "weis15",
tags = "security",
www_pdf_url = "http://cseweb.ucsd.edu/~savage/papers/WEIS15.pdf",
}
@inproceedings{confvalley:eurosys15,
title = "{ConfValley: A Systematic Configuration Validation Framework for Cloud Services}",
author = "Peng Huang and William J. Bolosky and Abhishek Singh and Yuanyuan Zhou",
crossref = eurosys15,
www_pdf_url = "http://cseweb.ucsd.edu/~peh003/confvalley-eurosys15.pdf",
}
@inproceedings{reconfig:infocom15,
title = "{Scheduling for Data Center Networks with Reconfiguration Delay}",
author = "Chang-Heng Wang and Tara Javidi and George Porter",
pages = "1--9",
crossref = "infocom15",
year = 2015,
www_pdf_url = "http://cseweb.ucsd.edu/~gmporter/papers/opticalsched-infocom15.pdf",
acceptance = "316/1640=19",
}
@article{foco:cacm15,
author = "Feng Lu and Patrick Ling and Geoffrey M. Voelker and Alex C. Snoeren",
title = "Enfold: Downclocking {OFDM} in {WiFi}",
volume = 19,
number = 2,
month = apr,
year = 2015,
pages = "10-13",
journal = "GetMobile: Mobile Computing and Communications",
journalurl = "https://www.sigmobile.org/pubs/getmobile/",
tags = "wireless",
www_pdf_url = "http://dl.acm.org/citation.cfm?id=2817765",
}
@article{medley:tmc,
www_pdf_url = "http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6832485",
author = "Feng Lu and Geoffrey M. Voelker and Alex C. Snoeren",
title = "Managing Contention with {Medley}",
journal = tmc,
journalurl = tmcurl,
year = 2015,
month = mar,
volume = 14,
number = 3,
tages = "wireless",
}
@article{cdp:tmc,
www_pdf_url = "http://www.computer.org/csdl/trans/tm/preprint/06815751-abs.html",
author = "Abhijeet A. Bhorkar and Tara Javidi and Alex C. Snoeren",
title = "Achieving Congestion Diversity in Multi-hop Wireless Mesh Networks",
journal = tmc,
journalurl = tmcurl,
year = 2015,
month = mar,
volume = 15,
number = 3,
tages = "wireless",
}
@inproceedings{ftxen:hpca15,
author = "Xinxin Jin and Soyeon Park and Tianwei Sheng and Rishan Chen and Zhiyong Shan and Yuanyuan Zhou",
title = "{FTXen: Making Hypervisor Resilient to Hardware Faults on Relaxed Cores}",
booktitle = "{Proceedings of the 21st IEEE International Symposium on High Performance Computer Architecture (HPCA'15)}",
address = "Bay Area, CA",
bookurl = "http://darksilicon.org/hpca/",
month = feb,
year = 2015,
}
@inproceedings{cqic:hotmobile15,
author = "Feng Lu and Hao Du and Ankur Jain and Geoffrey M. Voelker and Alex C. Snoeren and Andreas Terzis",
title = "{CQIC}: Revisiting Cross-Layer Congestion Control for Cellular Networks",
crossref = "hotmobile15", year = 2015,
tags = "wireless",
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/cqic-hotmobile15.pdf",
}
% http://dl.acm.org/citation.cfm?id=2699343
% acceptance 23/85
@inproceedings{toolejit:ndss15,
author = "Wilson Lian and Hovav Shacham and Stefan Savage",
title = "Too LeJIT to Quit: Extending JIT Spraying to ARM",
crossref = "ndss15", year = 2015,
tags = "security",
www_pdf_url = "http://cseweb.ucsd.edu/~hovav/dist/lejit.pdf"
}
%
% 2014
%
@inproceedings{cockpit:ccs14,
author = "Devin Lundberg and Brown Farinholt and Edward Sullivan and Ryan Mast and Stephen Checkoway and Stefan Savage and Alex C. Snoeren and Kirill Levchenko",
title = "On The Security of Mobile Cockpit Information Systems",
crossref = "ccs14",
year = 2014,
tags = "security",
www_pdf_url = "http://cseweb.ucsd.edu/~savage/papers/CCS14MobileCockpit.pdf",
}
@inproceedings{denali:ccs14,
author = "Abhinav Narain and Nick Feamster and Alex C. Snoeren",
title = "Deniable Liaisons",
crossref = "ccs14",
year = 2014,
tags = "security,wireless",
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/denali-ccs14.pdf",
}
@inproceedings{zastudy:ccs14,
author = "Paul Pearce and Vacha Dave and Chris Grier and Kirill Levchenko and Saikat Guha and Damon McCoy and Vern Paxson and Stefan Savage and Geoffrey M. Voelker",
title = "{Characterizing Large-Scale Click Fraud in ZeroAccess}",
crossref = "ccs14",
year = 2014,
tags = "security",
www_pdf_url = "http://cseweb.ucsd.edu/~savage/papers/CCS14ZeroAccess.pdf",
}
% http://dl.acm.org/citation.cfm?id=2660267
% acceptance 114/585
@inproceedings{algmac:ccs14,
author = "Melissa Chase and Sarah Meiklejohn and Greg Zaverucha",
title = "Algebraic MACs and Keyed-Verification Anonymous Credentials",
crossref = "ccs14",
year = 2014,
tags = "security",
}
@inproceedings{searchseizure:imc14,
author = "David Wang and Matthew Der and Mohammad Karami and Lawrence Saul and Damon McCoy and Stefan Savage and Geoffrey M. Voelker",
title = "Search + Seizure: The Effectiveness of Interventions on SEO Campaigns",
crossref = "imc14",
year = 2014,
tags = "security,measure",
www_pdf_url = "http://sysnet.ucsd.edu/projects/cloaking/",
}
% http://dl.acm.org/citation.cfm?id=2663716
% acceptance 42/188
@inproceedings{hardfraud:imc14,
author = "Elie Bursztein and Borbala Benko and Daniel Margolis and Tadek Pietraszek and Andy Archer and Allan Aquino and Andreas Pitsillidis and Stefan Savage",
title = "{Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild}",
crossref = "imc14",
year = 2014,
tags = "security,measure",
www_pdf_url = "http://cseweb.ucsd.edu/~savage/papers/IMC14Hijack.pdf",
}
@inproceedings{cloudnet:imc14,
author = "Zhenhua Li and Cheng Jin and Tianyin Xu and Christo Wilson and Yao
Liu and Linsong Cheng and Yunhao Liu and Yafei Dai and Zhi-Li Zhang",
title = "Towards Network-level Efficiency for Cloud Storage Services",
crossref = "imc14",
tags = "storage,measure",
}
@inproceedings{interdomaincong:imc14,
author = "Matthew Luckie and Amogh Dhamdhere and David Clark and Bradley Huffaker and kc claffy",
title = "Challenges in Inferring Internet Interdomain Congestion",
crossref = "imc14",
year = 2014,
tags = "measure",
}
@inproceedings{finegrainedinf:imc14,
author = "Vasileios Giotsas and Matthew Luckie and Bradley Huffaker and kc claffy",
title = "Inferring Complex AS Relationships",
crossref = "imc14",
year = 2014,
tags = "measure",
}
@inproceedings{willow:osdi14,
author = "Sundaram Bhaskaran and Trevor Bunker and Arup De and Mark Gahagan and Yanqin Jin and Robert Liu and Sudharsan Seshadri and Steven Swanson",
title = "Willow: A Programmable SSD",
crossref = "osdi14",
year = 2014,
}
@inproceedings{tswitch:ancs14,
author = "Kevin C. Webb and Arjun Roy and Kenneth Yocum and Alex C. Snoeren",
title = "Blender: Upgrading Tenant-based Data Center Networking",
crossref = "ancs14", year = 2014,
tags = "datacenter",
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/tswitch-ancs14.pdf",
}
@inproceedings{foco:mobicom14,
author = "Feng Lu and Patrick Ling and Geoffrey M. Voelker and Alex C. Snoeren",
title = "Enfold: Downclocking {OFDM} in {WiFi}",
crossref = "mobicom14", year = 2014,
tags = "wireless",
www_pdf_url = "http://www.cs.ucsd.edu/~snoeren/papers/enfold-mobicom14.pdf",
}
% acceptance 36/220
@inproceedings{cuttingcord:mobicom14,
author = "Yibo Zhu and Xia Zhou and Zengbin Zhang and Lin Zhou and Amin Vahdat and Ben Y. Zhao and Haitao Zheng",
title = "Cutting the Cord: a Robust Wireless Facilities Network for Data Centers",
crossref = "mobicom14", year = 2014,
tags = "wireless",
www_pdf_url = "http://www.sysnet.ucsd.edu/sysnet/miscpapers/angora-mobicom14.pdf"
}
@inproceedings{dream:sigcomm14,
author = "Masoud Moshref and Minlan Yu and Ramesh Govindan and Amin Vahdat",
title = "{DREAM}: Dynamic Resource Allocation for Software-defined Measurement",
crossref = "sigcomm14",
year = 2014,
www_pdf_url = "http://www.sysnet.ucsd.edu/sysnet/miscpapers/DreamSigcomm14.pdf"
}
@inproceedings{hulk:usesec14,
author = "Alexandros Kapravelos and Chris Grier and Neha Chachra and Chris Kruegel and Giovanni Vigna and Vern Paxson",
title = "{Hulk: Eliciting Malicious Behavior in Browser Extensions}",
crossref = "usesec14",
year = 2014,
tags = "security",
www_pdf_url = "http://www.sysnet.ucsd.edu/sysnet/miscpapers/usenix2014_hulk.pdf"
}
@inproceedings{knockoff:kdd14,
author = "Matthew Der and Lawrence K. Saul and Stefan Savage and Geoffrey M. Voelker",
title = "{Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise}",
crossref = "kdd14",
tags = "security",
www_pdf_url = "http://cseweb.ucsd.edu/~voelker/pubs/knock-kdd14.pdf",
}
% http://dl.acm.org/citation.cfm?id=2623330
%
% This year we had a record number of submissions. There were 1036 submissions
% to the Research Track, and 151 papers were accepted. There were 197
% submissions to the Industry and Government Track, and 44 papers were
% accepted.
@inproceedings{ngrams:uai14,
author = "Karl Stratos and Do-kyum Kim and Daniel Hsu and Michael Collins",
title = "{A Spectral Algorithm for Learning Class-Based n-gram Models of Natural Language}",
booktitle = "Proceedings of the 30th Conference on Uncertainty in Artificial Intelligence (UAI 2014)",
address = "Quebec City, Canada",
year = 2014,
month = jul,
www_pdf_url = "http://www.sysnet.ucsd.edu/sysnet/miscpapers/uai2014.pdf"
}
@inproceedings{blacklisting:weis14,
author = "Neha Chachra and Damon McCoy and Stefan Savage and Geoffrey M. Voelker",
title = "{Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting}",
crossref = "weis14",
tags = "security",
www_pdf_url = "http://cseweb.ucsd.edu/~voelker/pubs/namevalue-weis14.pdf",
acceptance = "9/40=22",
_pages = "4:1:1-4:1:13",
}
@inproceedings{pra:icse14,
author = "Peng Huang and Xiao Ma and Dongcai Shen and Yuanyuan Zhou",
title = "Performance Regression Testing Target Prioritization via Performance Risk Analysis",
crossref = "icse14",
tags = "debug",
www_pdf_url = "http://opera.ucsd.edu/paper/icse14-perfscope.pdf"
}
@inproceedings{wcmp:eurosys14,
author = "Junlan Zhou and Malveeka Tewari and Min Zhu and Abdul Kabbani and Leon Poutievski and Arjun Singh and Amin Vahdat",
title = "WCMP: Weighted Cost Multipathing for Improved Fairness in Data Centers",
crossref = "eurosys14",
tags = "datacenter,hsn",
www_pdf_url = "http://www.sysnet.ucsd.edu/sysnet/miscpapers/wcmp-eurosys-final.pdf"
}
@inproceedings{lvm:aistats14,
author = "Do-kyum Kim and Matthew Der and Lawrence K. Saul",
title = "{A Gaussian Latent Variable Model for Large Margin Classification of Labeled and Unlabeled Data}",
booktitle = "Proceedings of the 17th International Conference on Artificial Intelligence and Statistics (AISTATS)",
address = "Reykjavik, Iceland",
month = apr, year = 2014,
bookurl = "http://www.aistats.org/",
www_pdf_url = "http://jmlr.org/proceedings/papers/v33/kim14a.pdf",
}
@inproceedings{xxx:www14,
author = "Tristan Halvorson and Kirill Levchenko and Stefan Savage and Geoffrey M. Voelker",
title = "{XXXtortion? Inferring Registration Intent in the .XXX TLD}",
crossref = "www14", year = 2014,
www_pdf_url = "http://cseweb.ucsd.edu/~voelker/pubs/xxxtld-www14.pdf",
tags = "security,www",
acceptance = "84/645=13",
pages = "901--912",
}
@inproceedings{senic:nsdi14,
author = "Sivasankar Radhakrishnan and Yilong Geng and Vimalkumar Jeyakumar and Abdul Kabbani and George Porter and Amin Vahdat",
title = "{SENIC: A Scalable NIC for End-Host Rate Limiting}",
crossref = "nsdi14", year = 2014,
tags = "hsn,datacenter",
www_pdf_url = "http://www.cs.ucsd.edu/~gmporter/papers/nsdi14-senic.pdf"
}
@inproceedings{reactor:nsdi14,
author = "He Liu and Feng Lu and Alex Forencich and Rishi Kapoor and
Malveeka Tewari and Geoffrey M. Voelker and George
Papen and Alex C. Snoeren and George Porter",
title = "{Circuit Switching Under the Radar with REACToR}",
crossref = "nsdi14", year = 2014,
tags = "hsn,datacenter",
www_pdf_url = "http://www.cs.ucsd.edu/~gmporter/papers/nsdi14-reactor.pdf",
acceptance = "38/223=17",
pages = "1--15",
}
@inproceedings{libra:nsdi14,
author = "Hongyi Zeng and Shidong Zhang and Fei Ye and Vimalkumar Jeyakumar and Mickey Ju and Junda Liu and Nick McKeown and Amin Vahdat",
title = "Libra: Divide and Conquer to Verify Formading Tables in Huge Networks",
crossref = "nsdi14", year = 2014,
www_pdf_url = "http://www.sysnet.ucsd.edu/sysnet/miscpapers/libra2014.pdf",
tags = "datacenter"
}
@article{siphotonics:oe14,
author = "Ryan Aguinaldo and Alex Forencich and Christopher DeRose and Anthony Lentine and Douglas C. Trotter and Yeshaiahu Fainman and George Porter and George Papen and Shayan Mookherjea",
journal = "Opt. Express",
number = 7,