| YAMR: Yet Another Multipath Routing Protocol | I. Ganichev, B. Dai, B. Godfrey, and S. Shenker | ACM SIGCOMM Computer Communication Review, Vol. 40, Issue 5 | October 2010 | Networking | [PDF]
|
| XORP: An Open Platform for Network Research | M. Handley, O. Hodson, and E. Kohler | First Workshop on Hot Topics in Networking, October 2002. | October 2002 | Networking | |
| X-Trace: A Pervasive Network Tracing Framework | R. Fonseca, G. Porter, R.H. Katz, S. Shenker, and I. Stoica | Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Cambridge, Massachusetts, pp. 271-284 | April 2007 | Networking | [PDF]
|
| Worms vs. Perimeters: The Case for Hard-LANs | N. Weaver, D. Ellis, S. Staniford, and V. Paxson | Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12), Stanford, California, pp. 70-76 | August 2004 | Networking | [PDF]
|
| Wireless Urban Sensing Systems | M. Srivastava, M. Hansen, J. Burke, A. Parker, S. Reddy, G. Saurabh, M. Allman, V. Paxson, and D. Estrin | Center for Embedded Network Sensing, UC Los Angeles Technical Report No. 65, Los Angeles, California | April 2006 | Networking | [PDF]
|
| Wide-Area Traffic: The Failure of Poisson Modeling | V. Paxson and S. Floyd | IEEE/ACM Transactions on Networking, Vol. 3, No. 3, pp. 226-244 | June 1995 | Networking | |
| Why We Don't Know How To Simulate The Internet | V. Paxson and S. Floyd | In Proceedings of the 1997 Winter Simulation Conference | December 1997 | Networking | |
| Why Let Resources Idle? Aggressive Cloning of Jobs with Dolly | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), Boston, Massachusetts | June 2012 | Networking | [PDF]
|
| Where Mathematics Meets the Internet | W. Willinger and V. Paxson | Notices of the American Mathematical Society, Vol. 45, No. 8, pp. 961-970 | August 1998 | Networking | |
| What's Clicking What? Techniques and Innovations of Today's Clickbots | B. Miller, P. Pearce, C. Grier, C. Kreibich, and V. Paxson | Proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp. 164-183 | July 2011 | Networking | [PDF]
|
| What Ought a Program Committee to Do? | M. Allman | Proceedings of USENIX Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems (WOWCS), San Francisco, California | April 2008 | Networking | [PDF]
|
| Web Timeouts and Their Implications | Z. Al-Qudah, M. Rabinovich, and M. Allman | Proceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, Switzerland | April 2010 | Networking | [PDF]
|
| Web Caching and Zipf-Like Distributions: Evidence and Implications | L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker | Proceedings of Infocom 1999. | 1999 | Networking | |
| Virtualizing the Network Forwarding Plane | M. Casado, T. Koponen, R. Ramanathan, and S. Shenker | Proceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO 2010), Philadelphia, Pennsylvania | December 2010 | Networking | [PDF]
|
| Very Large Conferences on the Internet: the Internet Multimedia Conferencing Architecture | M. Handley, J. Crowcroft, C. Bormann, and J. Ott | Computer Networks and ISDN Systems, Special Issue on Internet Telephony | 1998 | Networking | |
| Very Fast Containment of Scanning Worms, Revisited | N. Weaver, S. Staniford, and V. Paxson | In Malware Detection: Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, eds., pp. 113-145, Springer | 2007 | Networking | |
| Very Fast Containment of Scanning Worms | N. Weaver, S. Staniford, and V. Paxson | Proceedings of the 13th USENIX Security Symposium, San Diego, California, pp. 29-44 | August 2004 | Networking | [PDF]
|
| Using Strongly Typed Networking to Architect for Tussle | C. Muthukrishnan, V. Paxson, M. Allman, and A. Akella | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 9 | October 2010 | Networking | [PDF]
|
| Using Honeynets for Internet Situational Awareness | V. Yegneswaran, P. Barford, and V. Paxson | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor Networks | F. Bian, X. Li, R. Govindan, and S. Shenker | International Journal of Ad Hoc and Ubiquitous Computing (special issue on wireless sensor networks), Vol. 1, No. 4, pp. 179-193 | January 2006 | Networking | [PDF]
|
| User-Aware Videoconference Session Control Using Software Agents | J.A. Botia, P. Ruiz, and A. Gomez-Skarmeta | Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), Beijing, China | September 2004 | Networking | |
| User-Aware Adaptive Applications for Enhanced Multimedia Quality in Heterogeneous Networking Environments | P. M. Ruiz, J.A. Botia, and A.Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3079 | June 2004 | Networking | [PDF]
|
| Untangling the Web from DNS | M. Walfish, H. Balakrishnan, and S. Shenker | Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238 | March 2004 | Networking | [PDF]
|
| Universal DNA Tag Systems: A Combinatorial Design Scheme | A. Ben-Dor, R. M. Karp, B. Schwikowski, and Z. Yakhini | RECOMB | 2000 | Networking | |
| Uniform versus Priority Dropping for Layered Video | S. Bajaj, L. Breslau, and S. Shenker | ACM Computer Communication Review, Vol. 28, pp. 131-143 | September 1998 | Networking | |
| Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks | P. Levis, N. Patel, D. Culler, and S. Shenker | NSDI | January 05 2004 | Networking | |
| Trained to Accept? A Field Experiment on Consent Dialogs | R. Boehme and S. Koepsell | Proceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406 | April 2010 | Networking | [PDF]
|
| Traffic Matrix Estimation Techniques: Existing Techniques Compared and New Directions | A. Medina, N. Taft, K.Salamatian, S. Bhattacharyyam, and C. Diot | Proceedings of SIGCOMM 2002, Pittsburgh, Pennsylvania. August 2002. | August 2002 | Networking | |
| Tracking the Role of Adversaries in Measuring Unwanted Traffic | M. Allman, P. Barford, B. Krishnamurty, and J. Wang | Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI), San Jose, California, p. 6 | July 2006 | Networking | [PDF]
|
| Towards Situational Awareness of Large-Scale Botnet Probing Events | Z. Li, A. Goyal, Y. Chen, and V. Paxson | IEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp. 175-188 | March 2011 | Networking | [PDF]
|
| Towards QoS in IP-Based Core Networks: A Survey on Performance Management, MPLS Case | J. L. Marzo, P. Maryni, and P. Vilà | Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'2001), Orlando, Florida | July 2001 | Networking | |
| Towards Insurable Network Architectures | R. Boehme | Journal of Information Technology, Vol. 52, No. 5, pp. 290-293 | September 2010 | Networking | |
| Towards Engineering a Location-Aware Wireless Multi-Agent System | I. Nieto-Cavajal, P. M. Ruiz, J.A. Botia, and A.F. Gomez-Skarmeta | Proceedings of the Workshop on Applications of Software Agents in Engineering at the 16th European Conference on Artificial Intelligence (ECAI 2004), Valencia, Spain | August 2004 | Networking | |
| Towards Capturing Representative AS-level Internet Topologies | H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger | SIGMETRICS 2002: 280-281. | 2002 | Networking | |
| Towards an Evolvable Internet Architecture | S. Ratnasamy, S. Shenker, S. McCanne | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 313-324 | August 2005 | Networking | [PDF]
|
| Towards an Economic Analysis of Trusted Systems (Position Paper) | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Towards an Economic Analysis of Trusted Systems | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Presented at the Third Annual Workshop on Economics of Information Security (WEIS04), Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Towards a Sensor Network Architecture: Lowering the Waistline | D. Culler, P. Dutta, C.T. Ee, R. Fonseca, J. Hui, P. Levis, J. Polastre, S. Shenker, I. Stoica, G. Tolle, and J. Zhao | Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS 10), Santa Fe, New Mexico, p. 24 | June 2005 | Networking | |
| Towards a Next Generation Inter-domain Routing Protocol | L. Subramanian, M. Caesar, M. Handley, M Mao, S. Shenker, and I. Stoica | Preprint 2004 | January 05 2004 | Networking | |
| Towards a Next Generation Inter-domain Routing Protocol | L. Subramanian, M. Caesar, C. Tien Ee, M. Handley, Z. Morley Mao, S. Shenker, and I. Stoica | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Towards a Framework for Defining Internet Performance Metrics | V. Paxson | LBNL-38952 | June 20 1996 | Networking | |
| Towards a Common TCP Evaluation Suite | L. Andrew, C. Marcondes, S. Floyd, L. Dunn, R. Guillier, W. Gang, L. Eggert, S. Ha, and I. Rhee | Proceedings of the International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet), Manchester, United Kingdom | March 2008 | Networking | [PDF]
|
| Topology-Informed Internet Replica Placement | P. Radoslavov, R. Govindan, and D. Estrin | Proceedings of the Sixth International Workshop on Web Caching and Content Distribution, Boston University, Boston, Massachusetts, USA, June 20-22, 2001. | June 20 2001 | Networking | |
| Topologically-Aware Overlay Construction and Server Selection | S. Ratnasamy, M. Handley, R. M. Karp, and S. Shenker | INFOCOM | 2002 | Networking | |
| Tiered Fault Tolerance for Long-Term Integrity | B. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz | Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California, pp. 267-282 | February 2009 | Networking | [PDF]
|
| Thoughts on Reviewing | M. Allman | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50 | April 2008 | Networking | [PDF]
|
| The Use of End-to-end Multicast Measurements for Characterizing Internal Network Behavior | A. Adams, T. Bu, R. Caceres, N. Duffield, T. Friedman, J. Horowitz, F. Lo Presti, S.B. Moon, V. Paxson, and D. Towsley | IEEE Communications, 38(5), May 2000. | April 2000 | Networking | |
| The Top Speed of Flash Worms | S. Staniford, D. Moore, V. Paxson, and N. Weaver | Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, Virginia | October 2004 | Networking | [PDF]
|
| The Synchronization of Periodic Routing Messages | S. Floyd and V. Jacobson | IEEE/ACM Transactions on Networking, Vol. 2, No. 2, pp. 122-136 | April 1994 | Networking | [PDF]
|
| The Strengths of Weaker Identities: Opportunistic Personas | M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver | Proceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, Massachusetts | August 2007 | Networking | [PDF]
|