| Mechanism Design for Policy Routing | J. Feigenbaum, R. Sami, and S. Shenker | Yale University Technical Report YALEU/DCS/TR-1258 | November 2003 | Networking | |
| Evolving Software with an Application-Specific Language | E. Kohler, M, Poletto, and D.R. Montgomery | Workshop Record of WCSSS '99: The 2nd ACM SIGPLAN Workshop on Compiler Support for Systems Software, Atlanta, Georgia, May 1999, pages 94-102. | May 1999 | Networking | |
| Mesos: Flexible Resource Sharing for the Cloud | B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A.D. Joseph, R. Katz, S. Shenker and I. Stoica | USENIX ;login:, Vol. 36, No. 4, pp. 37-45 | August 2011 | Networking | [PDF]
|
| Fast and Interactive Analytics Over Hadoop Data with Spark | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | USENIX ;login:, Vol. 34, No. 4, pp. 45-51 | August 2012 | Networking | [PDF]
|
| An Examination of MBone Performance | M. Handley | USC/ISI Research Report: ISI/RR-97-450 | 1997 | Networking | |
| On Scalable Internet Multimedia Conferencing Systems | M. Handley | University of London Ph.D Thesis | November 1997 | Networking | |
| Enabling Innovation Below the Communication API | G. Ananthanarayanan, K. Heimerl, M. Zaharia, M. Demmer, T. Koponen, A. Tavakoli, S. Shenker, and I. Stoica | UC Berkeley Technical Report, UCB/EECS-2009-141 | October 2009 | Networking | [PDF]
|
| Exploiting Innocuous Activity for Correlating Users Across Sites | O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. Teixeira | To appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, Brazil | May 2013 | Networking | |
| Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web | D. Akhawe, B. Amann, M. Vallentin, and R. Sommer | To appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, Brazil | May 2013 | Networking | |
| Effective Straggler Mitigation: Attack of the Clones | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | To appear in the Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’13), Lombard, Illinois | April 2013 | Networking | |
| Sharing the Cost of Multicast Transmissions | J. Feigenbaum, C. Papadimitriou, and S. Shenker | Thirty-Second Annual ACM Symposium on Theory of Computing (STOC00), May 2000. | May 2000 | Networking | |
| Dissemination of Mutable Sets of Web Objects | S. Buchholz, S. Gobel, A. Schill, and T. Ziegert | Thirteenth IASTED International Conference on Parallel and Distributed Computing Systems, 2001. | 2001 | Networking | |
| Hardness Results for Multicast Cost Sharing | J. Feigenbaum, A. Krishnamurthy, R. Sami, and S. Shenker | Theoretical Computer Science, Vol. 304, Issues 1-3, pp. 215-236 | July 2003 | Networking | |
| A Comparison of the AES Candidates Amenability to FPGA Implementation | N. Weaver and J. Wawrzynek | The Third Advanced Encryption Standard (AES) Candidate Conference, 2000. | 2000 | Networking | |
| Can Heterogeneity Make Gnutella Scalable? | Q. Lv, S. Ratnasamy, and S. Shenker | The First International Workshop on Peer-to-Peer Systems (IPTPS): 94-103, 2002. | 2002 | Networking | |
| Routing Algorithms for DHTs: Some Open Questions | S. Ratnasamy, I. Stoica, and S. Shenker | The First International Workshop on Peer-to-Peer Systems (IPTPS): 45-52, 2002. | 2002 | Networking | |
| Complex Queries in DHT-based Peer-to-Peer Networks | M. Harren, J.M. Hellerstein, R. Huebsch, B.T. Loo, S. Shenker, and I. Stoica | The First International Workshop on Peer-to-Peer Systems (IPTPS): 242-259, 2002. | 2002 | Networking | |
| Internet Indirection Infrastructure | I. Stoica, D. Adkins, S. Ratnasamy, S. Shenker, S. Surana, and S. Zhuang | The First International Workshop on Peer-to-Peer Systems (IPTPS): 191-202, 2002. | 2002 | Networking | |
| The Spread of the Sapphire/Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | The Cooperative Association for Internet Data Analysis Technical Report | February 2003 | Networking | |
| Exploiting Independent State For Network Intrusion Detection | R. Sommer and V. Paxson | Technische Universität München Technical Report No. TUM-I0420, Munich, Germany | November 2004 | Networking | [PDF]
|
| ONE: The Ohio Network Emulator | M. Allman, A. Caldwell, and S. Ostermann | Technical Report TR-19972, Ohio University Computer Science Department | August 1997 | Networking | |
| Multiple Data Connection FTP Extensions | M. Allman and S. Ostermann | Technical Report TR-19971, Ohio University Computer Science | February 1997 | Networking | |
| A Swifter Start for TCP | C. Partridge, D. Rockwell, M. Allman, R. Krishnan, and J.P.G. Sterbenz | Technical Report No. 8339, BBN Technologies, March 2002 | March 2002 | Networking | |
| Advantages of Parallel Processing and the Effects of Communications Time | W. Eddy and M. Allman | Technical Report CR-209455, NASA Glenn Research Center, February 2000. | February 2000 | Networking | |
| FTP Extensions for Variable Protocol Specification | M. Allman and S. Ostermann | Technical Report CR-209414, NASA Glenn Research Center, February 2000. | February 2000 | Networking | |
| Fixing Two BSD TCP Bugs | M. Allman | Technical Report CR-204151, NASA Lewis Research Center | October 1997 | Networking | |
| Exploiting the Bandwidth-Memory Tradeoff in Multicast State Aggregation | P. Radoslavov, D. Estrin, and R. Govindan | Technical Report 99-697, Computer Science Department, University of Southern California, July 1999. | July 1999 | Networking | |
| Architectural Considerations for Playback of Quality Adaptive Video over the Internet | R. Rejaie, M. Handley, and D. Estrin | Technical report 98-686, Computer Science Department, University of Southern California | 1998 | Networking | |
| On Characterizing Network Topologies and Analyzing Their Impact on Protocol Design | P. Radoslavov, H. Tangmunarunkit, H. Yu, R. Govindan, S. Shenker, and D. Estrin | Technical Report 00-731, Computer Science Department, University of Southern California, February 2000. | February 2000 | Networking | |
| Scalable Session Messages in SRM | P. Sharma, D. Estrin, S. Floyd, and L. Zhang | Technical report | February 1998 | Networking | |
| Ns Simulator Tests for Random Early Detection (RED) Gateways | S. Floyd | Technical Report | October 1996 | Networking | |
| Comments on Measurement-based Admissions Control for Controlled-Load Services | S. Floyd | Technical Report | July 1996 | Networking | |
| Issues of TCP with SACK | S. Floyd | Technical report | January 1996 | Networking | [PDF]
|
| Impact of Network Dynamics on End-to-End Protocols: Case Studies in TCP and Reliable Multicast | K. Varadhan, D. Estrin, and S. Floyd | Tech report USC-CS-TR 98-672, April 1998. An abbreviated version appeared in the proceedings of the IEEE Symposium on Computers and Communications, July 1998 | April 1998 | Networking | |
| Practical and Robust Geographic Routing in Wireless Networks | Y. Kim, R. Govindan, B. Karp, and S. Shenker | Submitted to Mobicom | January 05 2004 | Networking | |
| Finite-Length Analysis of LT-codes | R.M. Karp, M. Luby, and A. Shokrollahi | Submitted to International Symposium on Information Theory (ISIT '04). | 2004 | Networking | |
| On the Convergence of Statistical Techniques for Estimating Network Traffic Demands | A. Medina, K. Salamatian, N. Taft, I. Matta, Y. Tsang, and C. Diot | Submitted for publication 2003 | February 2003 | Networking | |
| Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Canada | S. Jha, R. Sommer, and C. Kreibich, eds. | Springer Verlag | September 2010 | Networking | |
| Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, Germany | C. Kreibich and M. Jahnke, eds. | Springer | 2010 | Networking | |
| A Taxonomy of Traffic Matrices | A. Medina, C. Fraleigh, N. Taft, S. Battacharyya, and C. Diot | SPIE Workshop on Scalability and Traffic Control in IP Networks II. Boston, Massachusetts. July 29-August 1, 2002. | July 2002 | Networking | |
| Towards Capturing Representative AS-level Internet Topologies | H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger | SIGMETRICS 2002: 280-281. | 2002 | Networking | |
| Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling Law | G. Phillips, S. Shenker, and H. Tangmunarunkit | SIGCOMM, September 1999. | September 1999 | Networking | |
| Identifying the TCP Behavior of Web Servers | J. Padhye and S. Floyd | SIGCOMM 2001, August 2001. Or the ICSI Technical Report 01-002, February 2001. | 2001 | Networking | |
| Dynamic Behavior of Slowly-Responsive Congestion Control Algorithms | D. Bansal, H. Balakrishnan, S. Floyd, and S. Shenker | SIGCOMM 2001 | 2001 | Networking | |
| IPNL: A NAT-Extended Internet Architecture | P. Francis and R. Gummadi | SIGCOMM 2001 | 2001 | Networking | |
| Simulation is Crucial | S. Floyd | Sidebar, IEEE Spectrum, January 2001. | January 2001 | Networking | |
| An Optimal Algorithm for Monte-Carlo Estimation | P. Dagum, R. M. Karp, M. Luby, and S. Ross | SIAM Journal of Computing, Vol. 29, No. 5, pp. 1484-1496 | 2000 | Networking | |
| Parallel Sorting with Limited Bandwidth | M. Adler, J. Byers, and R. M. Karp | SIAM Journal of Computing Vol. 29, No. 6, pp. 1997-2015 | 2000 | Networking | |
| Computing TCP's Retransmission Timer | V. Paxson, M. Allman, J. Chu, and M. Sargent | RFC 6298 | June 2011 | Networking | [PDF]
|
| RFC 5166: Metrics for the Evaluation of Congestion Control Mechanisms | S. Floyd | RFC 5166, Information, March 2008 | March 2008 | Networking | [PDF]
|