| A Layered Naming Architecture for the Internet | H. Balakrishnan, K. Lakshminaryanan, S. Ratnasamy, S. Shenker, I. Stoica, and M. Walfish | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2004), Portland, Oregon | August 2004 | Networking | [PDF]
|
| Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor Networks | F. Bian, X. Li, R. Govindan, and S. Shenker | International Journal of Ad Hoc and Ubiquitous Computing (special issue on wireless sensor networks), Vol. 1, No. 4, pp. 179-193 | January 2006 | Networking | [PDF]
|
| RFC 3708: Using TCP DSACKs and SCTP Duplicate TSNs to Detect Spurious Retransmissions | E. Blanton and M. Allman | Request for Comments 3708, Experimental | February 2004 | Networking | [PDF]
|
| Global Synchronization in Sensornets | J. Elson, R. M. Karp, C.H. Papadimitriou and S. Shenker | Proceedings of LATIN, pp. 609-624 | January 05 2004 | Networking | |
| RFC 3742: Limited Slow-Start for TCP with Large Congestion Windows | S. Floyd | Request For Comments 3742, Experimental | March 2004 | Networking | [PDF]
|
| RFC 3782: The NewReno Modification to TCP's Fast Recovery Algorithm | S. Floyd, T. Henderson, and A. Gurtov | Request For Comments 3782, Proposed Standard | April 05 2004 | Networking | [PDF]
|
| RFC 3714: IAB Concerns Regarding Congestion Control for Voice Traffic in the Internet | S. Floyd and J. Kempf, Editors | Request For Comments 3714, Informational | March 2004 | Networking | [PDF]
|
| Fast Portscan Detection Using Sequention Hypothesis Testing | J. Jung, V. Paxson, A. Berger, and H. Balakrishnan | Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 211-225 | May 2004 | Networking | |
| Spurring Adoption of DHTs with OpenHash, a Public DHT Service | B. Karp, S. Ratnasamy, S. Rhea, and S. Shenker | Proceedings of the Third International Workshop on Peer-to-Peer Systems, San Diego, California | February 2004 | Networking | [PDF]
|
| Practical and Robust Geographic Routing in Wireless Networks | Y. Kim, R. Govindan, B. Karp, and S. Shenker | Submitted to Mobicom | January 05 2004 | Networking | |
| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks | R. Krishnan, J. Sterbenz, W. Eddy, C. Partridge, and M. Allman | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 46, Issue 3, pp. 343-362 | October 2004 | Networking | [PDF]
|
| Routing as a Service | K. Lakshminarayanan, I. Stoica, and S. Shenker | Proceedings of the Service Architecture for Heterogeneous Access, Resources, and Applications Retreat (SAHARA 2004), Tahoe City, California | January 2004 | Networking | [PDF]
|
| Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks | P. Levis, N. Patel, D. Culler, and S. Shenker | NSDI | January 05 2004 | Networking | |
| A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast | P. Radoslavov, C. Papadopoulos, R. Govindan, and D. Estrin | IEEE/ACM Transactions on Networking (TON), Volume 12, Issue 3, pp. 469-482 | June 05 2004 | Networking | |
| Brief Announcement: Prefix Hash Tree | S. Ramabhadran, S. Ratnasamy, J.M. Hellerstein, and S. Shenker | Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, p. 367 | July 2004 | Networking | [PDF]
|
| Identification of Protein Complexes by Comparative Analysis of Yeast and Bacterial Protein Interaction Data | R. Sharan, T. Ideker, B.P. Kelley, R. Shamir, and R.M. Karp | Proceedings of RECOMB 2004, pp. 282-289 | January 05 2004 | Networking | |
| Towards a Next Generation Inter-domain Routing Protocol | L. Subramanian, M. Caesar, M. Handley, M Mao, S. Shenker, and I. Stoica | Preprint 2004 | January 05 2004 | Networking | |
| Listen and Whisper: Security Mechanisms for BGP | L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz | Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI '04), San Francisco, California | March 2004 | Networking | [PDF]
|
| Untangling the Web from DNS | M. Walfish, H. Balakrishnan, and S. Shenker | Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238 | March 2004 | Networking | [PDF]
|
| Reflections on Witty: Analyzing the Attacker | N. Weaver and D. Ellis | ;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37 | June 2004 | Networking | [PDF]
|
| Worms vs. Perimeters: The Case for Hard-LANs | N. Weaver, D. Ellis, S. Staniford, and V. Paxson | Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12), Stanford, California, pp. 70-76 | August 2004 | Networking | [PDF]
|
| A Worst-Case Worm | N. Weaver and V. Paxson | Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Very Fast Containment of Scanning Worms | N. Weaver, S. Staniford, and V. Paxson | Proceedings of the 13th USENIX Security Symposium, San Diego, California, pp. 29-44 | August 2004 | Networking | [PDF]
|
| On the Impact of Bursting on TCP Performance | E. Blanton and M. Allman | Proceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, Massachusetts | March 2005 | Networking | [PDF]
|
| The SFRA: A Corner-Turn FPGA Architecture | N. Weaver, J. Hauser and J. Wawrzynek | Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12 | February 2004 | Networking | [PDF]
|
| Achieving Fairness Through Selective Early Dropping | J. Scott and R.M. Karp | preprint 2004. | 2004 | Networking | |
| Finite-Length Analysis of LT-codes | R.M. Karp, M. Luby, and A. Shokrollahi | Submitted to International Symposium on Information Theory (ISIT '04). | 2004 | Networking | |
| Load Balancing in Dynamic Structured P2P Systems | B. Godfrey, R.M. Karp, K. Lakshminarayanan, S. Surana, and I. Stoica | Proceedings of INFOCOMM, 2004 | 2004 | Networking | |
| New Techniques for Making Transport Protocols Robust to Corruption-Based Loss | W. Eddy, S. Ostermann, and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88 | October 2004 | Networking | [PDF]
|
| Search Strategies in Inter-Domain Traffic Engineering | K. Chandrayana, R.M. Karp, M. Roughan, S. Sen, and Y. Zhang | preprint 2004 | 2004 | Networking | |
| A Stochastic Process on the Hypercube with Applications to Peer-to-peer Networks | M. Adler, E. Halperin, R. M. Karp, and V Vazirani | Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC 2003), San Diego, California, pp. 575-584 | June 2003 | Networking | [PDF]
|
| On the Performance of Middleboxes | M. Allman | ACM SIGCOMM/Usenix Internet Measurement Conference, Miami, FL, USA | October 2003 | Networking | |
| An Evaluation of XML-RPC | M. Allman | ACM Performance Evaluation Review, 30(4) | March 2003 | Networking | |
| TCP Congestion Control with Appropriate Byte Counting (ABC) | M. Allman | RFC 3465 | February 2003 | Networking | |
| Estimating Loss Rates With TCP | M. Allman, W. Eddy, and S. Ostermann | ACM Performance Evaluation Review, 31(3) | December 2003 | Networking | |
| A Conservative Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm for TCP | E. Blanton, M. Allman, K. Fall, and L. Wang | RFC 3517 | April 2003 | Networking | |
| Making Gnutella-Like P2P Systems Scalable | Y. Chawathe, S. Ratnasamy, L. Breslau, and S. Shenker | Proceedings of ACM SIGCOMM | 2003 | Networking | |
| A Comparison of RED's Byte and Packet Modes | W. Eddy and M. Allman | Computer Networks, 42(2) | June 2003 | Networking | |
| Mechanism Design for Policy Routing | J. Feigenbaum, R. Sami, and S. Shenker | Yale University Technical Report YALEU/DCS/TR-1258 | November 2003 | Networking | |
| Pktd: A Packet Capture and Injection Daemon | J. Gonzalez and V. Paxson | Proceedings of Passive and Active Measurement Workshop (PAM-2003), La Jolla, California, pp. 87-96 | April 2003 | Networking | [PDF]
|
| DIFS: A Distributed Index for Features in Sensor Networks | B. Greenstein, D. Estrin, R. Govindan, S. Ratnasamy, and S. Shenker | Elsevier Journal of Ad Hoc Networks, 2003. (Also in the First IEEE Workshop on Sensor Networks Protocols and Applications, SNPA, 2003) | 2003 | Networking | |
| The Impact of DHT Routing Geometry on Resilience and Proximity | K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica | Proceedings of ACM SIGCOMM 2003, Karlruhe, Germany | August 2003 | Networking | |
| Modeling Wireless Links for Transport Protocols | A. Gurtov and S. Floyd | ACM Computer Communications Review, Vol. 34, No. 2, pp. 85-96 | April 2004 | Networking | [PDF]
|
| RFC 3448: TCP Friendly Rate Control (TFRC): Protocol Specification | M. Handley, S. Floyd, J. Pahdye, and J. Widmer | RFC 3448, Proposed Standard | January 2003 | Networking | [PDF]
|
| A Framework for Incremental Deployment Strategies for Router-Assisted Services | X. He, C. Papadopoulos, and P. Radoslavov | Proceedings of the IEEE Infocom 2003. San Francisco, California, USA | April 2003 | Networking | |
| Querying the Internet with PIER | R. Huebsch, J.M. Hellerstein, N. Lanham, B.T. Loo, S. Shenker, and I. Stoica | Proceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003), Berlin, Germany | September 2003 | Networking | [PDF]
|
| A Simple Algorithm for Finding Frequent Elements in Streams and Bags | R.M. Karp, S. Shenker, and C.H. Papadimitriou | ACM Transactions on Database Systems, Vol. 28, Issue 1, pp. 51-55 | March 2003 | Networking | [PDF]
|
| Designing DCCP: Congestion Control Without Reliability | E. Kohler, M. Handley, and S. Floyd | May 2003 | May 2003 | Networking | [PDF]
|
| On the Convergence of Statistical Techniques for Estimating Network Traffic Demands | A. Medina, K. Salamatian, N. Taft, I. Matta, Y. Tsang, and C. Diot | Submitted for publication 2003 | February 2003 | Networking | |
| Inside the Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | IEEE Magazine of Security and Privacy, Vol. 1, Issue 4, pp. 33-39 | July 2003 | Networking | [PDF]
|