Joshua Smith, University of Washington (Main WISP Development Group)
Shyam Gollakota, University of Washington
Alanson Sample, University of Michigan
Thiemo Voight, Uppsala University
Przemysław Pawełczak, TU Delft
Wendi Heinzelman, University of Rochester
Kaushik Chowdhury, Northeastern University
Brandon Lucia, Carnegie Mellon University
Aggelos Bletsas, Technical University of Crete
Matt Reynolds, University of Washington
Kevin Fu, University of Michigan
Josiah Hester, Northwestern University
The Intel Research Network of Labs operates under a model of collaboration between industry and academia. Wholly owned and funded by Intel, these labs also operate in a uniquely open fashion where much of their research is published and shared widely. Labs are located in Berkeley, Pittsburgh and Seattle.
Joshua Smith, WISP Principal Investigator
David Weatherall, Director
Polly Powledge, WISP Firmware developer
Alanson Sample, WISP hardware developer
Aaron Parks, WISP Hardware/Firmware developer
The University of Washington and Intel Research are located within just a few blocks. Many Intel interns from UW have contributed to the WISP project. Several professors at UW have collaborated with or employed the WISP for various projects.
Professor Brian Otis - worked with wireless sensing devices.
Professor Sumit Roy - Does protocol research as part of the FuNLab group.
Kevin Fu at UMass is one of WISP's earliest collaborators. Despite suffering through some of the early Gen1 prototypes, Kevin Fu started a class on RFID (http://prisms.cs.umass.edu/cs291e/) using WISP. He has published several papers using WISP (http://prisms.cs.umass.edu/bibliography/kevin.php?val=all&format=display) and has several new projects underway (http://www.cs.umass.edu/~kevinfu/research.html). Kevin Fu coined the term computational RFIDs, or CRFIDs. His group has a compilation of publications related to this topic here: http://www.cs.umass.edu/~ssclark/crfid/
Nitesh Saxena's SPIES research group at UAB (previously at NYU-Poly) works on security and applied cryptography. They are looking into:
Fault-Tolerant Distributed Cryptography (e.g., in the context of MANETs)
Usable Security (e.g., Device Pairing; User Authentication)
Security of P2P Systems
Privacy and Anonymity on the Interne