| Adaptive RED: An Algorithm for Increasing the Robustness of RED's Active Queue Management | S. Floyd, R. Gummadi, and S. Shenker | | August 2001 | Networking | [PDF]
|
| Estimating Arrival Rates from the RED Packet Drop History | S. Floyd, K. Fall, and K. Tieu | | April 1998 | Networking | |
| Report of the NSF Scalable Information Infrastructure Workshop | C. Partridge, et al. | | October 07 1998 | Networking | |
| Reflections on Witty: Analyzing the Attacker | N. Weaver and D. Ellis | ;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37 | June 2004 | Networking | [PDF]
|
| Self-similarity and Heavy Tails: Structural Modeling of Network Traffic | W. Willinger, V. Paxson, and M.S. Taqqu | A Practical Guide to Heavy Tails: Statistical Techniques and Applications, Adler, R., Feldman, R., and Taqqu, M.S., editors, Birkhauser | 1998 | Networking | |
| The Stationarity of Internet Path Properties: Routing, Loss, and Throughput | Y. Zhang, V. Paxson, and S. Shenker | ACIRI Technical Report, May 2000. | May 2000 | Networking | |
| IMRG Workshop on Application Classification and Identification Report | T. Strayer, M. Allman, G. Armitage, S. Bellovin, S. Jin and A. W. Moore | ACM Computer Communication Review (editorial contribution), Vol. 38, Issue 3, pp. 87-90 | July 2008 | Networking | |
| TCP Byte Counting Refinements | M. Allman | ACM Computer Communication Review, 29(3), July 1999. | July 1999 | Networking | |
| On the Effective Evaluation of TCP | M. Allman and A. Falk | ACM Computer Communication Review, 29(5), October 1999. | October 1999 | Networking | |
| A Web Server's View of the Transport Layer | M. Allman | ACM Computer Communication Review, 30(5), October 2000. | October 2000 | Networking | |
| On Making TCP More Robust to Packet Reordering | E. Blanton and M. Allman | ACM Computer Communication Review, 32(1), January 2002. | January 2002 | Networking | |
| Does AS Size Determine Degree in AS Topology? | H. Tangmunarunkit, J. Doyle, R. Govindan, S. Jamin, S. Shenker, and W. Willinger | ACM Computer Communication Review, October 2001. | October 2001 | Networking | |
| TCP and Explicit Congestion Notification | S. Floyd | ACM Computer Communication Review, Vol. 24, No. 5, pp. 10-23 | October 1994 | Networking | [PDF]
|
| An Evaluation of TCP with Larger Initial Windows | M. Allman, C. Hayes, and S. Ostermann | ACM Computer Communication Review, Vol. 28, Issue 3 | July 1998 | Networking | |
| On the Generation and Use of TCP Acknowledgments | M. Allman | ACM Computer Communication Review, Vol. 28, Issue 5 | October 1998 | Networking | |
| Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks | I. Stoica, S. Shenker, and H. Zhang | ACM Computer Communication Review, Vol. 28, pp. 118-130 | September 1998 | Networking | |
| Uniform versus Priority Dropping for Layered Video | S. Bajaj, L. Breslau, and S. Shenker | ACM Computer Communication Review, Vol. 28, pp. 131-143 | September 1998 | Networking | |
| Best-Effort versus Reservations: A Simple Comparative Analysis | L. Breslau and S. Shenker | ACM Computer Communication Review, Vol. 28, pp. 3-16 | September 1998 | Networking | |
| Measuring the Evolution of Transport Protocols in the Internet | A. Medina, M. Allman, and S. Floyd | ACM Computer Communication Review, Vol. 35, Issue 2, pp. 37-52. DOI:http://doi.acm.org/10.1145/1064413.1064418 | April 2005 | Networking | [PDF]
|
| Thoughts on Reviewing | M. Allman | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50 | April 2008 | Networking | [PDF]
|
| OpenFlow: Enabling Innovation in Campus Networks | N. McKeown, T. Andershnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turneron, and H. Balakris | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 69-74 | April 2008 | Networking | [PDF]
|
| On Building Special-Purpose Social Networks for Emergency Communication | M. Allman | ACM Computer Communication Review, Vol. 40, Issue 5 | October 2010 | Networking | [PDF]
|
| On the Origin of Power Laws in Internet Topologies | A. Medina, I. Matta, and J. Byers | ACM Computer Communications Review, April 2000. Also BU-CS-TR-2000-004. January 21, 2000. | April 2000 | Networking | |
| Internet Research Needs Better Models | S. Floyd and E. Kohler | ACM Computer Communications Review, Vol. 33, No. 1, pp. 29-34 | January 2003 | Networking | [PDF]
|
| Modeling Wireless Links for Transport Protocols | A. Gurtov and S. Floyd | ACM Computer Communications Review, Vol. 34, No. 2, pp. 85-96 | April 2004 | Networking | [PDF]
|
| Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table | S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Gvoindan, L. Yin, and F. Yu | ACM MONET | 2003 | Networking | |
| An Evaluation of XML-RPC | M. Allman | ACM Performance Evaluation Review, 30(4) | March 2003 | Networking | |
| Estimating Loss Rates With TCP | M. Allman, W. Eddy, and S. Ostermann | ACM Performance Evaluation Review, 31(3) | December 2003 | Networking | |
| On Estimating End-to-End Network Path Properties | M. Allman and V. Paxson | ACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean, April 2001. This paper was originally presented at ACM SIGCOMM 1999. | April 2001 | Networking | |
| Endpoint Admission Control: Architectural Issues and Performance | L. Breslau, E.W. Knightly, S. Shenker, I. Stoica, and H. Zhang | ACM SIGCOMM 2000, pages 57-69, Stockholm, Sweeden, October 2000. | October 2000 | Networking | |
| Findings and Implications from Data Mining the IMC Review Process | R. Beverly and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 3, No. 1, pp. 23-29 | January 2013 | Networking | [PDF]
|
| New Techniques for Making Transport Protocols Robust to Corruption-Based Loss | W. Eddy, S. Ostermann, and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88 | October 2004 | Networking | [PDF]
|
| Notes on Burst Mitigation for Transport Protocols | M. Allman and E. Blanton | ACM SIGCOMM Computer Communication Review, Vol. 35, Issue 2, pp. 53-60. DOI:http://doi.acm.org/10.1145/1064413.1064419 | April 2005 | Networking | [PDF]
|
| Comments on Selecting Ephemeral Ports | M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 39, Issue 2, pp. 13-19 | April 2009 | Networking | [PDF]
|
| YAMR: Yet Another Multipath Routing Protocol | I. Ganichev, B. Dai, B. Godfrey, and S. Shenker | ACM SIGCOMM Computer Communication Review, Vol. 40, Issue 5 | October 2010 | Networking | [PDF]
|
| NOX: Towards an Operating System for Networks | N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker | ACM SIGCOMM Computer Communications Review, Vol. 38, No. 3, pp. 105-110 | July 2008 | Networking | [PDF]
|
| Editorial: Architecting for Innovation | T. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, B. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, and D. Kuptsov | ACM SIGCOMM Computer Communications Review, Vol. 41, No. 3 | July 2011 | Networking | [PDF]
|
| On Building Inexpensive Network Capabilities | C. Shue, A. Kalafut, M. Allman, and C. Taylor | ACM SIGCOMM Computer Communications Review, Vol. 42, No. 2, pp. 72-79 | April 2012 | Networking | [PDF]
|
| Comments on Bufferbloat | M. Allman | ACM SIGCOMM Computer Communications, Vol. 3, No. 1, pp. 30-37 | January 2013 | Networking | [PDF]
|
| Measuring End-to-End Bulk Transfer Capacity | M. Allman | ACM SIGCOMM Internet Measurement Workshop. November 2001. | November 2001 | Networking | |
| A Comparison of RED's Byte and Packet Modes | W. Eddy and M. Allman | ACM SIGCOMM Student Poster Session, August 2002. | August 2002 | Networking | |
| On Estimating End-to-End Network Path Properties | M. Allman and V. Paxson | ACM SIGCOMM, September 1999, Cambridge, Massachusetts. | September 1999 | Networking | |
| On the Performance of Middleboxes | M. Allman | ACM SIGCOMM/Usenix Internet Measurement Conference, Miami, FL, USA | October 2003 | Networking | |
| Incentive Compatibility and Dynamics of Congestion Control | P. B. Godfrey, M. Schapira, A. Zohar, and S. Shenker | ACM SIGMETRICS Performance Evaluation Review, Vol. 36, Issue 1, pp. 95-106 | June 2010 | Networking | [PDF]
|
| The Click Modular Router | E. Kohler, R. Morris, B. Chen, J. Jannotti, and M.F. Kaashoek | ACM Transactions on Computer Systems 18 (3), August 2000, pages 263-297. | August 2000 | Networking | |
| DDoS Defense by Offense | M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker | ACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3 | March 2010 | Networking | [PDF]
|
| A Simple Algorithm for Finding Frequent Elements in Streams and Bags | R.M. Karp, S. Shenker, and C.H. Papadimitriou | ACM Transactions on Database Systems, Vol. 28, Issue 1, pp. 51-55 | March 2003 | Networking | [PDF]
|
| Barter Trade Improves Message Delivery in Opportunistic Networks | L. Buttyan, L. Dora, M. Felegyhazi, and I. Vajda | Ad Hoc Networks, Vol. 8, Issue 1, pp. 1-14 | January 2010 | Networking | [PDF]
|
| Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. Resnick | W. Willinger and V. Paxson | Annals of Statistics, Vol. 25, No. 5, pp. 1805-1869 | 1997 | Networking | |
| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks | R. Krishnan, M. Allman, C. Partridge, and J.P.G. Sterbenz | BBN Technologies Technical Report No. 8333 | March 2002 | Networking | [PDF]
|