Publication Search Results

TitleAuthorsort ascendingBibliographicDateGroupLinks
Route Flap Dampening Exacerbates Internet Routing ConvergenceZ.M. Mao, R. Govindan, G. Varghese, and R. KatzProceedings of the ACM SIGCOMM 2002. 2002Networking
Automating Analysis of Large-Scale Botnet Probing EventsZ. Li, A. Goyal, Y. Chen, and V. PaxsonProceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, pp. 11-22March 2009Networking[PDF]

Towards Situational Awareness of Large-Scale Botnet Probing EventsZ. Li, A. Goyal, Y. Chen, and V. PaxsonIEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp. 175-188March 2011Networking[PDF]

Web Timeouts and Their ImplicationsZ. Al-Qudah, M. Rabinovich, and M. AllmanProceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, SwitzerlandApril 2010Networking[PDF]

Efficient Application Placement in a Dynamic Hosting PlatformZ. Al-Qudah, H. Alzoubi, M. Allman, M. Rabinovich, and V. LiberatoreProceedings of the 18th International World Wide Web Conference (WWW 2009), Madrid, Spain, pp. 281-290April 2009Networking[PDF]

Geographic Routing Made PracticalY.-J. Kim, R. Govindan, B. Karp, and S. ShenkerProceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 217-230May 2005Networking[PDF]

On the Pitfalls of Geographic Face RoutingY.-J. Kim, R. Govindan, B. Karp, and S. ShenkerProceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cologne, Germany, pp. 34-43September 2005Networking[PDF]

The Stationarity of Internet Path Properties: Routing, Loss, and ThroughputY. Zhang, V. Paxson, and S. ShenkerACIRI Technical Report, May 2000.May 2000Networking
On the Constancy of Internet Path PropertiesY. Zhang, N. Duffield, V. Paxson, and S. ShenkerProceedings of ACM SIGCOMM Internet Measurement Workshop, November 2001.November 2001Networking
On the Characteristics and Origins of Internet Flow RatesY. Zhang, L. Breslau, V. Paxson, and S. ShenkerProceedings of ACM SIGCOMM, August 2002. 2002Networking
Detecting BackdoorsY. Zhang and V. PaxsonProceedings of the Ninth USENIX Security Symposium, August 2000.August 2000Networking
Detecting Stepping StonesY. Zhang and V. PaxsonProceedings of the Ninth USENIX Security Symposium, August 2000.August 2000Networking
Practical and Robust Geographic Routing in Wireless NetworksY. Kim, R. Govindan, B. Karp, and S. ShenkerSubmitted to MobicomJanuary 05 2004Networking
FrameNet as a Resource for Paraphrase ResearchY. Hasegawa, R. Lee-Goldman, A. Kong, and K. AkitaConstructions and Frames, Special Issue on Advances in Frame Semantics, Vol. 3, Issue 1, pp. 104-127August 2011Networking
Making Gnutella-Like P2P Systems ScalableY. Chawathe, S. Ratnasamy, L. Breslau, and S. ShenkerProceedings of ACM SIGCOMM 2003Networking
A Case Study in Building Layered DHT ApplicationsY. Chawathe, S. Ramabhadran, S. Ratnasamy, A. LaMarca, S. Shenker, J. HellersteinProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 97-108August 2005Networking[PDF]

Computing Security in the Developing World: A Case for Multidisciplinary ResearchY. Ben-David, S. Hasan, J. Pal, M. Vallentin, S. Panjwani, P. Gutheim, J. Chen, and E. BrewerProceedings of the Fifth ACM Workshop on Networked Systems for Developing Regions (NSDR), pp.39-44, Washington, D.C.June 2011Networking[PDF]

TCP Processing of the IPv4 Precedence FieldX. Xiao, A. Hannan, V. Paxson, and E. CrabbeRequest for Comments 2873, Proposed Standard, June 2000.June 2000Networking
An Architecture for Energy Management in Wireless Sensor NetworksX. Jiang, J. Taneja, J. Ortiz, A. Tavakoli, P. Dutta, J. Jeong, D. Culler, P. Levis, and S. ShenkerProceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 31-36April 2007Networking[PDF]

A Comparison of Incremental Deployment Strategies for Router-Assisted Reliable MulticastX. He, C. Papadopoulos, P. Radoslavov, and R. GovindanComputer Science Department, University of Southern California Technical Report No. 01-751, Los Angeles, CaliforniaJuly 2001Networking[PDF]

A Framework for Incremental Deployment Strategies for Router-Assisted ServicesX. He, C. Papadopoulos, and P. RadoslavovProceedings of the IEEE Infocom 2003. San Francisco, California, USAApril 2003Networking
Incremental Deployment Strategies for Router-Assisted Reliable MulticastX. He, C. Papadopoulos, and P. RadoslavovIEEE/ACM Transactions on Networking, Vol. 14, Issue 4, pp. 779-792August 2006Networking
Long-Range Dependence and Data Network TrafficW. Willinger, V. Paxson, R.H. Riedi, and M.S. TaqquLong-Range Dependence: Theory and Applications, P. Doukhan, G. Oppenheim and M. S. Taqqu, eds., Birkhauser, 2002. 2002Networking
Self-similarity and Heavy Tails: Structural Modeling of Network TrafficW. Willinger, V. Paxson, and M.S. TaqquA Practical Guide to Heavy Tails: Statistical Techniques and Applications, Adler, R., Feldman, R., and Taqqu, M.S., editors, Birkhauser 1998Networking
Scaling Phenomena in the Internet: Critically Examining CriticalityW. Willinger, R. Govindan, S. Jamin, V. Paxson, and S. ShenkerProceedings of National Academy of Science USA, Vol. 99, Suppl. 1, 2573-2580, February 19, 2002.February 19 2002Networking
Where Mathematics Meets the InternetW. Willinger and V. PaxsonNotices of the American Mathematical Society, Vol. 45, No. 8, pp. 961-970August 1998Networking
Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. ResnickW. Willinger and V. PaxsonAnnals of Statistics, Vol. 25, No. 5, pp. 1805-1869 1997Networking
New Techniques for Making Transport Protocols Robust to Corruption-Based LossW. Eddy, S. Ostermann, and M. AllmanACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88October 2004Networking[PDF]

A Comparison of RED's Byte and Packet ModesW. Eddy and M. AllmanComputer Networks, 42(2)June 2003Networking
A Comparison of RED's Byte and Packet ModesW. Eddy and M. AllmanACM SIGCOMM Student Poster Session, August 2002.August 2002Networking
Advantages of Parallel Processing and the Effects of Communications TimeW. Eddy and M. AllmanTechnical Report CR-209455, NASA Glenn Research Center, February 2000.February 2000Networking
Protocol-Independent Adaptive Replay of Application DialogW. Cui, V. Paxson, N. Weaver, and R.H. KatzProceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06), San Diego, CaliforniaFebruary 2006Networking[PDF]

Secure Mobile Agent Systems Using Java - Where Are We Heading?W. Binder and V. RothProceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS), Madrid, Spain, March 2002.March 2002Networking
Using Honeynets for Internet Situational AwarenessV. Yegneswaran, P. Barford, and V. PaxsonProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

Finding a ‘Kneedle’ in a Haystack: Detecting Knee Points in System BehaviorV. Satopaa, J. Albrecht, D. Irwin, and B. RaghavanProceedings of the 30th International Conference on Distributed Computing Systems SIMPLEX Workshop (ICDCS 2010), Genoa, ItalyJune 2010Networking[PDF]

Improved Key Management for Digital Watermark MonitoringV. Roth and M. ArnoldProceedings of SPIE, San Jose, California, January 2002.January 2002Networking
Java Security Architecture and ExtensionsV. RothDr. Dobbs Journal, 2002(335), April 2002.April 2002Networking
Empowering mobile software agentsV. RothIn N. Suri, editor, Proceedings 6th IEEE Mobile Agents Conference, volume 2535 of Lecture Notes in Computer Science, pages 47-63. Springer Verlag, October 2002.October 2002Networking
An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion PreventionV. Paxson, R. Sommer, and N. WeaverProceedings of IEEE Sarnoff Symposium, Princeton, New Jersey, pp. 1-7May 2007Networking[PDF]

Known TCP Implementation ProblemsV. Paxson, M. Allman, S. Dawson, W. Fenner, J. Griner, I. Heavens, K. Lahey, J. Semke, and B. VolzRequest for Comments 2525, Informational, March 1999.March 1999Networking
Computing TCP's Retransmission TimerV. Paxson, M. Allman, J. Chu, and M. SargentRFC 6298June 2011Networking[PDF]

Rethinking Hardware Support for Network Analysis and Intrusion PreventionV. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, and N. WeaverProceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06), Vancouver, CanadaAugust 2006Networking[PDF]

An Architecture for Large-Scale Internet MeasurementV. Paxson, J. Mahdavi, A. Adams, and M. MathisIEEE Communications, Vol. 36, No. 8, pp. 48-54August 1998Networking
Framework for IP Performance MetricsV. Paxson, G. Almes, J. Mahdavi, and M. Mathis.RFC 2330, InformationalMay 1998Networking
Experiences with NIMIV. Paxson, A. Adams, and M. MathisProceedings of Passive & Active Measurement: PAM-2000. 2000Networking
Experiences with NIMIV. Paxson, A. Adams, and M. MathisProceedings of the Passive & Active Measurement (PAM 2000), Hamilton, New ZealandApril 2000Networking[PDF]

Why We Don't Know How To Simulate The InternetV. Paxson and S. FloydIn Proceedings of the 1997 Winter Simulation ConferenceDecember 1997Networking
Wide-Area Traffic: The Failure of Poisson ModelingV. Paxson and S. FloydIEEE/ACM Transactions on Networking, Vol. 3, No. 3, pp. 226-244June 1995Networking
Computing TCP's Retransmission TimerV. Paxson and M. AllmanRequest for Comments 2988, Proposed StandardNovember 2000Networking
Glish: A User-Level Software Bus for Loosely-Coupled Distributed SystemsV. Paxson and C. SaltmarshProceedings of the 1993 Winter USENIX Technical Conference, San Diego, CaliforniaJanuary 1993Networking

Pages