ROLE
Author only
· Advisor only
· Other only
· All roles
AUTHOR'S COLLEAGUES
See all colleagues of this author
KEYWORDS
See all author supplied keywords
AUTHOR PROFILE PAGES
Project background
Author-Izer Service
BOOKMARK & SHARE
|
|
133 results found
Export Results:
bibtex
| endnote
| acmref
| csv
Result page:
1
2
3
4
5
6
7
1
Borg, Omega, and Kubernetes
April 2016
Communications of the ACM: Volume 59 Issue 5, May 2016
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 151, Downloads (12 Months): 1,286, Downloads (Overall): 1,686
Full text available:
Html PDF
Lessons learned from three container-management systems over a decade.
2
Kubernetes and the path to cloud native
August 2015
SoCC '15: Proceedings of the Sixth ACM Symposium on Cloud Computing
Publisher: ACM
We are in the midst of an important shift to higher levels of abstraction than virtual machines. Kubernetes aims to simplify the deployment and management of services, including the construction of applications as sets of interacting but independent services. We explain some of the key concepts in Kubernetes and show ...
3
Analysis of smartphone adoption and usage in a rural community cellular network
May 2015
ICTD '15: Proceedings of the Seventh International Conference on Information and Communication Technologies and Development
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 4, Downloads (12 Months): 45, Downloads (Overall): 87
Full text available:
PDF
The smartphone has been touted as the technology of the 21st century. Global smartphone adoption rates are growing rapidly, up to over 24% in 2014, with usage increasing 25% in the last year. However, rural areas are often the last places to benefit from these technological trends. Utilizing cellular network ...
Keywords:
information and communications technology and development
4
The nesC language: a holistic approach to networked embedded systems
July 2014
ACM SIGPLAN Notices - Supplemental issue: Volume 49 Issue 4, April 2014
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3, Downloads (12 Months): 25, Downloads (Overall): 101
Full text available:
PDF
We present nesC, a programming language for networked embedded systems that represent a new design space for application developers. An example of a networked embedded system is a sensor network, which consists of (potentially) thousands of tiny, lowpower "motes," each of which execute concurrent, reactive programs that must operate with ...
Keywords:
C, concurrency, components, first-order, modules, nesC, programming languages, data races, tinyOS
5
Local, sustainable, small-scale cellular networks
December 2013
ICTD '13: Proceedings of the Sixth International Conference on Information and Communication Technologies and Development: Full Papers - Volume 1
Publisher: ACM
Bibliometrics:
Citation Count: 14
Downloads (6 Weeks): 7, Downloads (12 Months): 38, Downloads (Overall): 190
Full text available:
PDF
Over five billion people are active cellular subscribers, spending over a trillion dollars a year on communications. Despite this, hundreds of millions of people are still not connected. Implicit in these networks is a top-down design, with large nation-scale telecommunication firms deciding when and where coverage will be available. This ...
Keywords:
information and communications technology for development, legal factors
6
The evolving braid: how an organization in Uganda achieved reliable communications
December 2013
ICTD '13: Proceedings of the Sixth International Conference on Information and Communication Technologies and Development: Full Papers - Volume 1
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 1, Downloads (12 Months): 27, Downloads (Overall): 98
Full text available:
PDF
When engaged in ICTD research, it is often simpler to focus efforts on a single specific technology, whether that entails computers for telecenters, mobile phones for data collection, or text messages for public health education. In practice, however, people and organizations use a variety of technologies together, smoothly interweaving them ...
Keywords:
ICT4D, SMS, braided communications, communications, mobile, HCI4D
7
An experiment in reducing cellular base station power draw with virtual coverage
December 2013
ACM DEV-4 '13: Proceedings of the 4th Annual Symposium on Computing for Development
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 3, Downloads (12 Months): 19, Downloads (Overall): 50
Full text available:
PDF
Lack of access to cellular service often goes hand-in-hand with lack of access to power. For example, the GSM Association estimates that 95% of people living without cellular access in East Africa also lack access to grid power. This situation forces cellular network operators to build out power infrastructure along ...
Keywords:
information and communications technology for development
8
Expanding rural cellular networks with virtual coverage
April 2013
nsdi'13: Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation
Publisher: USENIX Association
The cellular system is the world's largest network, providing service to over five billion people. Operators of these networks face fundamental trade-offs in coverage, capacity and operating power. These trade-offs, when coupled with the reality of infrastructure in poorer areas, mean that upwards of a billion people lack access to ...
9
Pushing the CAP: Strategies for Consistency and Availability
February 2012
Computer: Volume 45 Issue 2, February 2012
Publisher: IEEE Computer Society Press
The CAP theorem asserts that any networked shared-data system can have only two of three desirable properties. However, by explicitly handling partitions, designers can optimize consistency and availability, thereby achieving some trade-off of all three. The featured Web extra is a podcast from Software Engineering Radio, in which the host ...
Keywords:
CAP theorem, ACID, BASE, cloud computing
10
Improving per-node efficiency in the datacenter with new OS abstractions
October 2011
SOCC '11: Proceedings of the 2nd ACM Symposium on Cloud Computing
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 6, Downloads (12 Months): 37, Downloads (Overall): 641
Full text available:
PDF
We believe datacenters can benefit from more focus on per-node efficiency, performance, and predictability, versus the more common focus so far on scalability to a large number of nodes. Improving per-node efficiency decreases costs and fault recovery because fewer nodes are required for the same amount of work. We believe ...
Keywords:
custom OS, Akaros, datacenter
11
PaperSpeckle: microscopic fingerprinting of paper
October 2011
CCS '11: Proceedings of the 18th ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 5, Downloads (12 Months): 41, Downloads (Overall): 444
Full text available:
PDF
Paper forgery is among the leading causes of corruption in many developing regions. In this paper, we introduce PaperSpeckle, a robust system that leverages the natural randomness property present in paper to generate a fingerprint for any piece of paper. Our goal in developing PaperSpeckle is to build a low-cost ...
Keywords:
paper fingerprinting, paper speckle
12
Computing security in the developing world: a case for multidisciplinary research
June 2011
NSDR '11: Proceedings of the 5th ACM workshop on Networked systems for developing regions
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 8, Downloads (12 Months): 43, Downloads (Overall): 410
Full text available:
PDF
Technology users in the developing world face a varied and complex set of computer security concerns. These challenges are deeply tied to a range of contextual factors including poor infrastructure, non-traditional usage patterns, and different attitudes towards security, which make simply importing security solutions from industrialized nations inadequate. Recognizing this, ...
Keywords:
computer security, ictd
13
A case study on designing interfaces for multiple users in developing regions
December 2010
ACM DEV '10: Proceedings of the First ACM Symposium on Computing for Development
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 6, Downloads (Overall): 98
Full text available:
PDF
Computer assisted learning (or E-learning) is used broadly in the developed world. However, comparable technologies are only recently beginning to be used in rural and developing regions. In these environments, obstacles to the successful deployment of educational software include a lack of basic infrastructure, low student attendance, necessary sharing of ...
14
SMS-based web search for low-end mobile devices
September 2010
MobiCom '10: Proceedings of the sixteenth annual international conference on Mobile computing and networking
Publisher: ACM
Bibliometrics:
Citation Count: 7
Downloads (6 Weeks): 6, Downloads (12 Months): 25, Downloads (Overall): 699
Full text available:
Pdf
Short Messaging Service (SMS) based mobile information services have become increasingly common around the world, especially in emerging regions among users with low-end mobile devices. This paper presents the design and implementation of SMSFind, an SMS-based search system that enables users to obtain extremely concise (one SMS) message of 140 ...
Keywords:
cell phones, search, question/answering, sms
15
A certain freedom: thoughts on the CAP theorem
July 2010
PODC '10: Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 28, Downloads (12 Months): 174, Downloads (Overall): 1,384
Full text available:
PDF
At PODC 2000, the CAP theorem received its first broad audience. Surprisingly for an impossibility result, one important effect has been to free designers to explore a wider range of distributed systems. Designers of wide-area systems, in which network partitions are considered inevitable, know they cannot have both availability and ...
Keywords:
cap theorem
16
The village base station
June 2010
NSDR '10: Proceedings of the 4th ACM Workshop on Networked Systems for Developing Regions
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 4, Downloads (12 Months): 22, Downloads (Overall): 126
Full text available:
PDF
Cellular communications, including handsets and base stations, have become ubiquitous technologies throughout the developing and developed world. Roughly three billion users spend large portions of their income on these basic communications [1]. However, the remaining half of the world currently has limited access, in large part due to lack of ...
17
JaldiMAC: taking the distance further
Yahel Ben-David,
Matthias Vallentin,
Seth Fowler,
Eric Brewer
June 2010
NSDR '10: Proceedings of the 4th ACM Workshop on Networked Systems for Developing Regions
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 7, Downloads (12 Months): 19, Downloads (Overall): 209
Full text available:
PDF
WiFi has been promoted as an affordable technology that can provide broadband Internet connectivity to poor and sparsely populated regions. A growing number of deployments, some of substantial scale, are making use of WiFi to extend connectivity into rural areas. However, the vast majority of the 3.5 billion people living ...
18
Technology for developing regions: Moore's law is not enough
March 2010
ACM SIGARCH Computer Architecture News - ASPLOS '10: Volume 38 Issue 1, March 2010
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 10, Downloads (Overall): 569
Full text available:
PDF
The historic focus of development has rightfully been on macroeconomics and good governance, but technology has an increasingly large role to play. In this talk, I review several novel technologies that we have deployed in India and Africa, and discuss the challenges and opportunities of this new subfield of EECS ...
Keywords:
developing regions, ictd, it for development.
Also published in:
March 2010
ACM SIGPLAN Notices - ASPLOS '10: Volume 45 Issue 3, March 2010 March 2010
ASPLOS XV: Proceedings of the fifteenth edition of ASPLOS on Architectural support for programming languages and operating systems
19
Experience with Top Gun Wingman: a proxy-based graphical web browser for the 3Com PalmPilot
November 2009
Middleware '98: Proceedings of the IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 32
Downloads (6 Weeks): 0, Downloads (12 Months): 0, Downloads (Overall): 121
Full text available:
Pdf
After an inauspicious debut, communication-enabled personal digital assistants (or PDA's) and handheld PC's are being "rediscovered" as mobile information access terminals. In response, developers have attempted to bring complex applications such as Web browsers to such devices. However, the limited resources available on thin client platforms make them unsuitable for ...
Keywords:
TopGun Wingman, adaptive, middleware, Palm Pilot, proxy
20
System support for scalable and fault tolerant internet services
November 2009
Middleware '98: Proceedings of the IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 0, Downloads (12 Months): 1, Downloads (Overall): 51
Full text available:
Pdf
Over the past few years, we have seen the proliferation of Internet-based services ranging from search engines and map services to video-on-demand servers. All of these kinds of services need to be able to provide guarantees of availability and scalability to their users. With millions of users on the Internet ...
Keywords:
load balancing, scalability, availability, fault tolerance, scalable network services
|
|