Publication Search Results

TitleAuthorBibliographicDateGroupLinkssort descending
A Layered Naming Architecture for the InternetH. Balakrishnan, K. Lakshminaryanan, S. Ratnasamy, S. Shenker, I. Stoica, and M. WalfishProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2004), Portland, OregonAugust 2004Networking[PDF]

Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor NetworksF. Bian, X. Li, R. Govindan, and S. ShenkerInternational Journal of Ad Hoc and Ubiquitous Computing (special issue on wireless sensor networks), Vol. 1, No. 4, pp. 179-193January 2006Networking[PDF]

RFC 3708: Using TCP DSACKs and SCTP Duplicate TSNs to Detect Spurious RetransmissionsE. Blanton and M. AllmanRequest for Comments 3708, ExperimentalFebruary 2004Networking[PDF]

Global Synchronization in SensornetsJ. Elson, R. M. Karp, C.H. Papadimitriou and S. ShenkerProceedings of LATIN, pp. 609-624January 05 2004Networking
RFC 3742: Limited Slow-Start for TCP with Large Congestion WindowsS. FloydRequest For Comments 3742, ExperimentalMarch 2004Networking[PDF]

RFC 3782: The NewReno Modification to TCP's Fast Recovery AlgorithmS. Floyd, T. Henderson, and A. GurtovRequest For Comments 3782, Proposed StandardApril 05 2004Networking[PDF]

RFC 3714: IAB Concerns Regarding Congestion Control for Voice Traffic in the InternetS. Floyd and J. Kempf, EditorsRequest For Comments 3714, InformationalMarch 2004Networking[PDF]

Fast Portscan Detection Using Sequention Hypothesis TestingJ. Jung, V. Paxson, A. Berger, and H. BalakrishnanProceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 211-225May 2004Networking
Spurring Adoption of DHTs with OpenHash, a Public DHT ServiceB. Karp, S. Ratnasamy, S. Rhea, and S. ShenkerProceedings of the Third International Workshop on Peer-to-Peer Systems, San Diego, CaliforniaFebruary 2004Networking[PDF]

Practical and Robust Geographic Routing in Wireless NetworksY. Kim, R. Govindan, B. Karp, and S. ShenkerSubmitted to MobicomJanuary 05 2004Networking
Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite NetworksR. Krishnan, J. Sterbenz, W. Eddy, C. Partridge, and M. AllmanComputer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 46, Issue 3, pp. 343-362October 2004Networking[PDF]

Routing as a ServiceK. Lakshminarayanan, I. Stoica, and S. ShenkerProceedings of the Service Architecture for Heterogeneous Access, Resources, and Applications Retreat (SAHARA 2004), Tahoe City, CaliforniaJanuary 2004Networking[PDF]

Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor NetworksP. Levis, N. Patel, D. Culler, and S. ShenkerNSDIJanuary 05 2004Networking
A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable MulticastP. Radoslavov, C. Papadopoulos, R. Govindan, and D. EstrinIEEE/ACM Transactions on Networking (TON), Volume 12, Issue 3, pp. 469-482June 05 2004Networking
Brief Announcement: Prefix Hash TreeS. Ramabhadran, S. Ratnasamy, J.M. Hellerstein, and S. ShenkerProceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, p. 367July 2004Networking[PDF]

Identification of Protein Complexes by Comparative Analysis of Yeast and Bacterial Protein Interaction DataR. Sharan, T. Ideker, B.P. Kelley, R. Shamir, and R.M. KarpProceedings of RECOMB 2004, pp. 282-289January 05 2004Networking
Towards a Next Generation Inter-domain Routing ProtocolL. Subramanian, M. Caesar, M. Handley, M Mao, S. Shenker, and I. StoicaPreprint 2004January 05 2004Networking
Listen and Whisper: Security Mechanisms for BGPL. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. KatzProceedings of the First Symposium on Networked Systems Design and Implementation (NSDI '04), San Francisco, CaliforniaMarch 2004Networking[PDF]

Untangling the Web from DNSM. Walfish, H. Balakrishnan, and S. ShenkerProceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238March 2004Networking[PDF]

Reflections on Witty: Analyzing the AttackerN. Weaver and D. Ellis;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37June 2004Networking[PDF]

Worms vs. Perimeters: The Case for Hard-LANsN. Weaver, D. Ellis, S. Staniford, and V. PaxsonProceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12), Stanford, California, pp. 70-76August 2004Networking[PDF]

A Worst-Case WormN. Weaver and V. PaxsonProceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, MinnesotaMay 2004Networking[PDF]

Very Fast Containment of Scanning WormsN. Weaver, S. Staniford, and V. PaxsonProceedings of the 13th USENIX Security Symposium, San Diego, California, pp. 29-44August 2004Networking[PDF]

On the Impact of Bursting on TCP PerformanceE. Blanton and M. AllmanProceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, MassachusettsMarch 2005Networking[PDF]

The SFRA: A Corner-Turn FPGA ArchitectureN. Weaver, J. Hauser and J. WawrzynekProceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12February 2004Networking[PDF]

Achieving Fairness Through Selective Early DroppingJ. Scott and R.M. Karppreprint 2004. 2004Networking
Finite-Length Analysis of LT-codesR.M. Karp, M. Luby, and A. ShokrollahiSubmitted to International Symposium on Information Theory (ISIT '04). 2004Networking
Load Balancing in Dynamic Structured P2P SystemsB. Godfrey, R.M. Karp, K. Lakshminarayanan, S. Surana, and I. StoicaProceedings of INFOCOMM, 2004 2004Networking
New Techniques for Making Transport Protocols Robust to Corruption-Based LossW. Eddy, S. Ostermann, and M. AllmanACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88October 2004Networking[PDF]

Search Strategies in Inter-Domain Traffic EngineeringK. Chandrayana, R.M. Karp, M. Roughan, S. Sen, and Y. Zhangpreprint 2004 2004Networking
A Stochastic Process on the Hypercube with Applications to Peer-to-peer NetworksM. Adler, E. Halperin, R. M. Karp, and V VaziraniProceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC 2003), San Diego, California, pp. 575-584June 2003Networking[PDF]

On the Performance of MiddleboxesM. AllmanACM SIGCOMM/Usenix Internet Measurement Conference, Miami, FL, USAOctober 2003Networking
An Evaluation of XML-RPCM. AllmanACM Performance Evaluation Review, 30(4)March 2003Networking
TCP Congestion Control with Appropriate Byte Counting (ABC)M. AllmanRFC 3465February 2003Networking
Estimating Loss Rates With TCPM. Allman, W. Eddy, and S. OstermannACM Performance Evaluation Review, 31(3)December 2003Networking
A Conservative Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm for TCPE. Blanton, M. Allman, K. Fall, and L. WangRFC 3517April 2003Networking
Making Gnutella-Like P2P Systems ScalableY. Chawathe, S. Ratnasamy, L. Breslau, and S. ShenkerProceedings of ACM SIGCOMM 2003Networking
A Comparison of RED's Byte and Packet ModesW. Eddy and M. AllmanComputer Networks, 42(2)June 2003Networking
Mechanism Design for Policy RoutingJ. Feigenbaum, R. Sami, and S. ShenkerYale University Technical Report YALEU/DCS/TR-1258November 2003Networking
Pktd: A Packet Capture and Injection DaemonJ. Gonzalez and V. PaxsonProceedings of Passive and Active Measurement Workshop (PAM-2003), La Jolla, California, pp. 87-96April 2003Networking[PDF]

DIFS: A Distributed Index for Features in Sensor NetworksB. Greenstein, D. Estrin, R. Govindan, S. Ratnasamy, and S. ShenkerElsevier Journal of Ad Hoc Networks, 2003. (Also in the First IEEE Workshop on Sensor Networks Protocols and Applications, SNPA, 2003) 2003Networking
The Impact of DHT Routing Geometry on Resilience and ProximityK. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. StoicaProceedings of ACM SIGCOMM 2003, Karlruhe, GermanyAugust 2003Networking
Modeling Wireless Links for Transport ProtocolsA. Gurtov and S. FloydACM Computer Communications Review, Vol. 34, No. 2, pp. 85-96April 2004Networking[PDF]

RFC 3448: TCP Friendly Rate Control (TFRC): Protocol SpecificationM. Handley, S. Floyd, J. Pahdye, and J. WidmerRFC 3448, Proposed StandardJanuary 2003Networking[PDF]

A Framework for Incremental Deployment Strategies for Router-Assisted ServicesX. He, C. Papadopoulos, and P. RadoslavovProceedings of the IEEE Infocom 2003. San Francisco, California, USAApril 2003Networking
Querying the Internet with PIERR. Huebsch, J.M. Hellerstein, N. Lanham, B.T. Loo, S. Shenker, and I. StoicaProceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003), Berlin, GermanySeptember 2003Networking[PDF]

A Simple Algorithm for Finding Frequent Elements in Streams and BagsR.M. Karp, S. Shenker, and C.H. PapadimitriouACM Transactions on Database Systems, Vol. 28, Issue 1, pp. 51-55March 2003Networking[PDF]

Designing DCCP: Congestion Control Without ReliabilityE. Kohler, M. Handley, and S. FloydMay 2003May 2003Networking[PDF]

On the Convergence of Statistical Techniques for Estimating Network Traffic DemandsA. Medina, K. Salamatian, N. Taft, I. Matta, Y. Tsang, and C. DiotSubmitted for publication 2003February 2003Networking
Inside the Slammer WormD. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. WeaverIEEE Magazine of Security and Privacy, Vol. 1, Issue 4, pp. 33-39July 2003Networking[PDF]

Pages