M
Mary Baker
Researcher at Hewlett-Packard
Publications - 127
Citations - 10732
Mary Baker is an academic researcher from Hewlett-Packard. The author has contributed to research in topics: Ubiquitous computing & The Internet. The author has an hindex of 38, co-authored 127 publications receiving 10617 citations. Previous affiliations of Mary Baker include University of California, Berkeley & Stanford University.
Papers
More filters
Proceedings ArticleDOI
Mitigating routing misbehavior in mobile ad hoc networks
TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Proceedings ArticleDOI
Measurements of a distributed file system
TL;DR: This work analyzed the user-level file access patterns and caching behavior of the Sprite distributed file system and found that client cache consistency is needed to prevent stale data errors, but that it is not invoked often enough to degrade overall system performance.
Journal ArticleDOI
Measuring link bandwidths using a deterministic model of packet delay
Kevin Lai,Mary Baker +1 more
TL;DR: A deterministic model of packet delay is described and used to derive both the packet pair property of FIFO-queueing networks and a new technique packet tailgating ) for actively measuring link bandwidths.
Proceedings ArticleDOI
Analysis of a local-area wireless network
Diane Tang,Mary Baker +1 more
TL;DR: A twelve-week trace of a building-wide local-area wireless network is examined to understand better how users take advantage of wireless networks, finding that users are divided into distinct location-based sub-communities, each with its own movement, activity, and usage characteristics.
Posted Content
Observation-based Cooperation Enforcement in Ad Hoc Networks
Sorav Bansal,Mary Baker +1 more
TL;DR: OCEAN is found that, in many scenarios, OCEAN can do as well as, or even better than, schemes requiring second-hand reputation exchanges, and could possibly help obviate solutions requiring trust-management for some contexts.