| Route Flap Dampening Exacerbates Internet Routing Convergence | Z.M. Mao, R. Govindan, G. Varghese, and R. Katz | Proceedings of the ACM SIGCOMM 2002. | 2002 | Networking | |
| Automating Analysis of Large-Scale Botnet Probing Events | Z. Li, A. Goyal, Y. Chen, and V. Paxson | Proceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, pp. 11-22 | March 2009 | Networking | [PDF]
|
| Towards Situational Awareness of Large-Scale Botnet Probing Events | Z. Li, A. Goyal, Y. Chen, and V. Paxson | IEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp. 175-188 | March 2011 | Networking | [PDF]
|
| Web Timeouts and Their Implications | Z. Al-Qudah, M. Rabinovich, and M. Allman | Proceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, Switzerland | April 2010 | Networking | [PDF]
|
| Efficient Application Placement in a Dynamic Hosting Platform | Z. Al-Qudah, H. Alzoubi, M. Allman, M. Rabinovich, and V. Liberatore | Proceedings of the 18th International World Wide Web Conference (WWW 2009), Madrid, Spain, pp. 281-290 | April 2009 | Networking | [PDF]
|
| Geographic Routing Made Practical | Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 217-230 | May 2005 | Networking | [PDF]
|
| On the Pitfalls of Geographic Face Routing | Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cologne, Germany, pp. 34-43 | September 2005 | Networking | [PDF]
|
| The Stationarity of Internet Path Properties: Routing, Loss, and Throughput | Y. Zhang, V. Paxson, and S. Shenker | ACIRI Technical Report, May 2000. | May 2000 | Networking | |
| On the Constancy of Internet Path Properties | Y. Zhang, N. Duffield, V. Paxson, and S. Shenker | Proceedings of ACM SIGCOMM Internet Measurement Workshop, November 2001. | November 2001 | Networking | |
| On the Characteristics and Origins of Internet Flow Rates | Y. Zhang, L. Breslau, V. Paxson, and S. Shenker | Proceedings of ACM SIGCOMM, August 2002. | 2002 | Networking | |
| Detecting Backdoors | Y. Zhang and V. Paxson | Proceedings of the Ninth USENIX Security Symposium, August 2000. | August 2000 | Networking | |
| Detecting Stepping Stones | Y. Zhang and V. Paxson | Proceedings of the Ninth USENIX Security Symposium, August 2000. | August 2000 | Networking | |
| Practical and Robust Geographic Routing in Wireless Networks | Y. Kim, R. Govindan, B. Karp, and S. Shenker | Submitted to Mobicom | January 05 2004 | Networking | |
| FrameNet as a Resource for Paraphrase Research | Y. Hasegawa, R. Lee-Goldman, A. Kong, and K. Akita | Constructions and Frames, Special Issue on Advances in Frame Semantics, Vol. 3, Issue 1, pp. 104-127 | August 2011 | Networking | |
| Making Gnutella-Like P2P Systems Scalable | Y. Chawathe, S. Ratnasamy, L. Breslau, and S. Shenker | Proceedings of ACM SIGCOMM | 2003 | Networking | |
| A Case Study in Building Layered DHT Applications | Y. Chawathe, S. Ramabhadran, S. Ratnasamy, A. LaMarca, S. Shenker, J. Hellerstein | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 97-108 | August 2005 | Networking | [PDF]
|
| Computing Security in the Developing World: A Case for Multidisciplinary Research | Y. Ben-David, S. Hasan, J. Pal, M. Vallentin, S. Panjwani, P. Gutheim, J. Chen, and E. Brewer | Proceedings of the Fifth ACM Workshop on Networked Systems for Developing Regions (NSDR), pp.39-44, Washington, D.C. | June 2011 | Networking | [PDF]
|
| TCP Processing of the IPv4 Precedence Field | X. Xiao, A. Hannan, V. Paxson, and E. Crabbe | Request for Comments 2873, Proposed Standard, June 2000. | June 2000 | Networking | |
| An Architecture for Energy Management in Wireless Sensor Networks | X. Jiang, J. Taneja, J. Ortiz, A. Tavakoli, P. Dutta, J. Jeong, D. Culler, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 31-36 | April 2007 | Networking | [PDF]
|
| A Comparison of Incremental Deployment Strategies for Router-Assisted Reliable Multicast | X. He, C. Papadopoulos, P. Radoslavov, and R. Govindan | Computer Science Department, University of Southern California Technical Report No. 01-751, Los Angeles, California | July 2001 | Networking | [PDF]
|
| A Framework for Incremental Deployment Strategies for Router-Assisted Services | X. He, C. Papadopoulos, and P. Radoslavov | Proceedings of the IEEE Infocom 2003. San Francisco, California, USA | April 2003 | Networking | |
| Incremental Deployment Strategies for Router-Assisted Reliable Multicast | X. He, C. Papadopoulos, and P. Radoslavov | IEEE/ACM Transactions on Networking, Vol. 14, Issue 4, pp. 779-792 | August 2006 | Networking | |
| Long-Range Dependence and Data Network Traffic | W. Willinger, V. Paxson, R.H. Riedi, and M.S. Taqqu | Long-Range Dependence: Theory and Applications, P. Doukhan, G. Oppenheim and M. S. Taqqu, eds., Birkhauser, 2002. | 2002 | Networking | |
| Self-similarity and Heavy Tails: Structural Modeling of Network Traffic | W. Willinger, V. Paxson, and M.S. Taqqu | A Practical Guide to Heavy Tails: Statistical Techniques and Applications, Adler, R., Feldman, R., and Taqqu, M.S., editors, Birkhauser | 1998 | Networking | |
| Scaling Phenomena in the Internet: Critically Examining Criticality | W. Willinger, R. Govindan, S. Jamin, V. Paxson, and S. Shenker | Proceedings of National Academy of Science USA, Vol. 99, Suppl. 1, 2573-2580, February 19, 2002. | February 19 2002 | Networking | |
| Where Mathematics Meets the Internet | W. Willinger and V. Paxson | Notices of the American Mathematical Society, Vol. 45, No. 8, pp. 961-970 | August 1998 | Networking | |
| Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. Resnick | W. Willinger and V. Paxson | Annals of Statistics, Vol. 25, No. 5, pp. 1805-1869 | 1997 | Networking | |
| New Techniques for Making Transport Protocols Robust to Corruption-Based Loss | W. Eddy, S. Ostermann, and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88 | October 2004 | Networking | [PDF]
|
| A Comparison of RED's Byte and Packet Modes | W. Eddy and M. Allman | Computer Networks, 42(2) | June 2003 | Networking | |
| A Comparison of RED's Byte and Packet Modes | W. Eddy and M. Allman | ACM SIGCOMM Student Poster Session, August 2002. | August 2002 | Networking | |
| Advantages of Parallel Processing and the Effects of Communications Time | W. Eddy and M. Allman | Technical Report CR-209455, NASA Glenn Research Center, February 2000. | February 2000 | Networking | |
| Protocol-Independent Adaptive Replay of Application Dialog | W. Cui, V. Paxson, N. Weaver, and R.H. Katz | Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06), San Diego, California | February 2006 | Networking | [PDF]
|
| Secure Mobile Agent Systems Using Java - Where Are We Heading? | W. Binder and V. Roth | Proceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS), Madrid, Spain, March 2002. | March 2002 | Networking | |
| Using Honeynets for Internet Situational Awareness | V. Yegneswaran, P. Barford, and V. Paxson | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| Finding a ‘Kneedle’ in a Haystack: Detecting Knee Points in System Behavior | V. Satopaa, J. Albrecht, D. Irwin, and B. Raghavan | Proceedings of the 30th International Conference on Distributed Computing Systems SIMPLEX Workshop (ICDCS 2010), Genoa, Italy | June 2010 | Networking | [PDF]
|
| Improved Key Management for Digital Watermark Monitoring | V. Roth and M. Arnold | Proceedings of SPIE, San Jose, California, January 2002. | January 2002 | Networking | |
| Java Security Architecture and Extensions | V. Roth | Dr. Dobbs Journal, 2002(335), April 2002. | April 2002 | Networking | |
| Empowering mobile software agents | V. Roth | In N. Suri, editor, Proceedings 6th IEEE Mobile Agents Conference, volume 2535 of Lecture Notes in Computer Science, pages 47-63. Springer Verlag, October 2002. | October 2002 | Networking | |
| An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention | V. Paxson, R. Sommer, and N. Weaver | Proceedings of IEEE Sarnoff Symposium, Princeton, New Jersey, pp. 1-7 | May 2007 | Networking | [PDF]
|
| Known TCP Implementation Problems | V. Paxson, M. Allman, S. Dawson, W. Fenner, J. Griner, I. Heavens, K. Lahey, J. Semke, and B. Volz | Request for Comments 2525, Informational, March 1999. | March 1999 | Networking | |
| Computing TCP's Retransmission Timer | V. Paxson, M. Allman, J. Chu, and M. Sargent | RFC 6298 | June 2011 | Networking | [PDF]
|
| Rethinking Hardware Support for Network Analysis and Intrusion Prevention | V. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, and N. Weaver | Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06), Vancouver, Canada | August 2006 | Networking | [PDF]
|
| An Architecture for Large-Scale Internet Measurement | V. Paxson, J. Mahdavi, A. Adams, and M. Mathis | IEEE Communications, Vol. 36, No. 8, pp. 48-54 | August 1998 | Networking | |
| Framework for IP Performance Metrics | V. Paxson, G. Almes, J. Mahdavi, and M. Mathis. | RFC 2330, Informational | May 1998 | Networking | |
| Experiences with NIMI | V. Paxson, A. Adams, and M. Mathis | Proceedings of Passive & Active Measurement: PAM-2000. | 2000 | Networking | |
| Experiences with NIMI | V. Paxson, A. Adams, and M. Mathis | Proceedings of the Passive & Active Measurement (PAM 2000), Hamilton, New Zealand | April 2000 | Networking | [PDF]
|
| Why We Don't Know How To Simulate The Internet | V. Paxson and S. Floyd | In Proceedings of the 1997 Winter Simulation Conference | December 1997 | Networking | |
| Wide-Area Traffic: The Failure of Poisson Modeling | V. Paxson and S. Floyd | IEEE/ACM Transactions on Networking, Vol. 3, No. 3, pp. 226-244 | June 1995 | Networking | |
| Computing TCP's Retransmission Timer | V. Paxson and M. Allman | Request for Comments 2988, Proposed Standard | November 2000 | Networking | |
| Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems | V. Paxson and C. Saltmarsh | Proceedings of the 1993 Winter USENIX Technical Conference, San Diego, California | January 1993 | Networking | |