Publication Search Results

Titlesort ascendingAuthorBibliographicDateGroupLinks
YAMR: Yet Another Multipath Routing ProtocolI. Ganichev, B. Dai, B. Godfrey, and S. ShenkerACM SIGCOMM Computer Communication Review, Vol. 40, Issue 5October 2010Networking[PDF]

XORP: An Open Platform for Network ResearchM. Handley, O. Hodson, and E. KohlerFirst Workshop on Hot Topics in Networking, October 2002.October 2002Networking
X-Trace: A Pervasive Network Tracing FrameworkR. Fonseca, G. Porter, R.H. Katz, S. Shenker, and I. StoicaProceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Cambridge, Massachusetts, pp. 271-284April 2007Networking[PDF]

Worms vs. Perimeters: The Case for Hard-LANsN. Weaver, D. Ellis, S. Staniford, and V. PaxsonProceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12), Stanford, California, pp. 70-76August 2004Networking[PDF]

Wireless Urban Sensing SystemsM. Srivastava, M. Hansen, J. Burke, A. Parker, S. Reddy, G. Saurabh, M. Allman, V. Paxson, and D. EstrinCenter for Embedded Network Sensing, UC Los Angeles Technical Report No. 65, Los Angeles, CaliforniaApril 2006Networking[PDF]

Wide-Area Traffic: The Failure of Poisson ModelingV. Paxson and S. FloydIEEE/ACM Transactions on Networking, Vol. 3, No. 3, pp. 226-244June 1995Networking
Why We Don't Know How To Simulate The InternetV. Paxson and S. FloydIn Proceedings of the 1997 Winter Simulation ConferenceDecember 1997Networking
Why Let Resources Idle? Aggressive Cloning of Jobs with DollyG. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. StoicaProceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), Boston, MassachusettsJune 2012Networking[PDF]

Where Mathematics Meets the InternetW. Willinger and V. PaxsonNotices of the American Mathematical Society, Vol. 45, No. 8, pp. 961-970August 1998Networking
What's Clicking What? Techniques and Innovations of Today's ClickbotsB. Miller, P. Pearce, C. Grier, C. Kreibich, and V. PaxsonProceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp. 164-183July 2011Networking[PDF]

What Ought a Program Committee to Do?M. AllmanProceedings of USENIX Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems (WOWCS), San Francisco, CaliforniaApril 2008Networking[PDF]

Web Timeouts and Their ImplicationsZ. Al-Qudah, M. Rabinovich, and M. AllmanProceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, SwitzerlandApril 2010Networking[PDF]

Web Caching and Zipf-Like Distributions: Evidence and ImplicationsL. Breslau, P. Cao, L. Fan, G. Phillips, and S. ShenkerProceedings of Infocom 1999. 1999Networking
Virtualizing the Network Forwarding PlaneM. Casado, T. Koponen, R. Ramanathan, and S. ShenkerProceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO 2010), Philadelphia, PennsylvaniaDecember 2010Networking[PDF]

Very Large Conferences on the Internet: the Internet Multimedia Conferencing ArchitectureM. Handley, J. Crowcroft, C. Bormann, and J. OttComputer Networks and ISDN Systems, Special Issue on Internet Telephony 1998Networking
Very Fast Containment of Scanning Worms, RevisitedN. Weaver, S. Staniford, and V. PaxsonIn Malware Detection: Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, eds., pp. 113-145, Springer 2007Networking
Very Fast Containment of Scanning WormsN. Weaver, S. Staniford, and V. PaxsonProceedings of the 13th USENIX Security Symposium, San Diego, California, pp. 29-44August 2004Networking[PDF]

Using Strongly Typed Networking to Architect for TussleC. Muthukrishnan, V. Paxson, M. Allman, and A. AkellaProceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 9October 2010Networking[PDF]

Using Honeynets for Internet Situational AwarenessV. Yegneswaran, P. Barford, and V. PaxsonProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor NetworksF. Bian, X. Li, R. Govindan, and S. ShenkerInternational Journal of Ad Hoc and Ubiquitous Computing (special issue on wireless sensor networks), Vol. 1, No. 4, pp. 179-193January 2006Networking[PDF]

User-Aware Videoconference Session Control Using Software AgentsJ.A. Botia, P. Ruiz, and A. Gomez-SkarmetaProceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), Beijing, ChinaSeptember 2004Networking
User-Aware Adaptive Applications for Enhanced Multimedia Quality in Heterogeneous Networking EnvironmentsP. M. Ruiz, J.A. Botia, and A.Gomez-SkarmetaLecture Notes in Computer Science, Vol. 3079June 2004Networking[PDF]

Untangling the Web from DNSM. Walfish, H. Balakrishnan, and S. ShenkerProceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238March 2004Networking[PDF]

Universal DNA Tag Systems: A Combinatorial Design SchemeA. Ben-Dor, R. M. Karp, B. Schwikowski, and Z. YakhiniRECOMB 2000Networking
Uniform versus Priority Dropping for Layered VideoS. Bajaj, L. Breslau, and S. ShenkerACM Computer Communication Review, Vol. 28, pp. 131-143September 1998Networking
Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor NetworksP. Levis, N. Patel, D. Culler, and S. ShenkerNSDIJanuary 05 2004Networking
Trained to Accept? A Field Experiment on Consent DialogsR. Boehme and S. KoepsellProceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406April 2010Networking[PDF]

Traffic Matrix Estimation Techniques: Existing Techniques Compared and New DirectionsA. Medina, N. Taft, K.Salamatian, S. Bhattacharyyam, and C. DiotProceedings of SIGCOMM 2002, Pittsburgh, Pennsylvania. August 2002.August 2002Networking
Tracking the Role of Adversaries in Measuring Unwanted TrafficM. Allman, P. Barford, B. Krishnamurty, and J. WangProceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI), San Jose, California, p. 6July 2006Networking[PDF]

Towards Situational Awareness of Large-Scale Botnet Probing EventsZ. Li, A. Goyal, Y. Chen, and V. PaxsonIEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp. 175-188March 2011Networking[PDF]

Towards QoS in IP-Based Core Networks: A Survey on Performance Management, MPLS CaseJ. L. Marzo, P. Maryni, and P. VilàProceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'2001), Orlando, FloridaJuly 2001Networking
Towards Insurable Network ArchitecturesR. BoehmeJournal of Information Technology, Vol. 52, No. 5, pp. 290-293September 2010Networking
Towards Engineering a Location-Aware Wireless Multi-Agent SystemI. Nieto-Cavajal, P. M. Ruiz, J.A. Botia, and A.F. Gomez-SkarmetaProceedings of the Workshop on Applications of Software Agents in Engineering at the 16th European Conference on Artificial Intelligence (ECAI 2004), Valencia, SpainAugust 2004Networking
Towards Capturing Representative AS-level Internet TopologiesH. Chang, R. Govindan, S. Jamin, S. Shenker, and W. WillingerSIGMETRICS 2002: 280-281. 2002Networking
Towards an Evolvable Internet ArchitectureS. Ratnasamy, S. Shenker, S. McCanneProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 313-324August 2005Networking[PDF]

Towards an Economic Analysis of Trusted Systems (Position Paper)D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. SmithProceedings of the Third Workshop on Economics and Information Security, Minneapolis, MinnesotaMay 2004Networking[PDF]

Towards an Economic Analysis of Trusted SystemsD. Bergemann, J. Feigenbaum, S. Shenker, and J. M. SmithPresented at the Third Annual Workshop on Economics of Information Security (WEIS04), Minneapolis, MinnesotaMay 2004Networking[PDF]

Towards a Sensor Network Architecture: Lowering the WaistlineD. Culler, P. Dutta, C.T. Ee, R. Fonseca, J. Hui, P. Levis, J. Polastre, S. Shenker, I. Stoica, G. Tolle, and J. ZhaoProceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS 10), Santa Fe, New Mexico, p. 24June 2005Networking
Towards a Next Generation Inter-domain Routing ProtocolL. Subramanian, M. Caesar, M. Handley, M Mao, S. Shenker, and I. StoicaPreprint 2004January 05 2004Networking
Towards a Next Generation Inter-domain Routing ProtocolL. Subramanian, M. Caesar, C. Tien Ee, M. Handley, Z. Morley Mao, S. Shenker, and I. StoicaProceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

Towards a Framework for Defining Internet Performance MetricsV. PaxsonLBNL-38952June 20 1996Networking
Towards a Common TCP Evaluation SuiteL. Andrew, C. Marcondes, S. Floyd, L. Dunn, R. Guillier, W. Gang, L. Eggert, S. Ha, and I. RheeProceedings of the International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet), Manchester, United KingdomMarch 2008Networking[PDF]

Topology-Informed Internet Replica PlacementP. Radoslavov, R. Govindan, and D. EstrinProceedings of the Sixth International Workshop on Web Caching and Content Distribution, Boston University, Boston, Massachusetts, USA, June 20-22, 2001.June 20 2001Networking
Topologically-Aware Overlay Construction and Server SelectionS. Ratnasamy, M. Handley, R. M. Karp, and S. ShenkerINFOCOM 2002Networking
Tiered Fault Tolerance for Long-Term IntegrityB. Chun, P. Maniatis, S. Shenker, and J. KubiatowiczProceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California, pp. 267-282February 2009Networking[PDF]

Thoughts on ReviewingM. AllmanACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50April 2008Networking[PDF]

The Use of End-to-end Multicast Measurements for Characterizing Internal Network BehaviorA. Adams, T. Bu, R. Caceres, N. Duffield, T. Friedman, J. Horowitz, F. Lo Presti, S.B. Moon, V. Paxson, and D. TowsleyIEEE Communications, 38(5), May 2000.April 2000Networking
The Top Speed of Flash WormsS. Staniford, D. Moore, V. Paxson, and N. WeaverProceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, VirginiaOctober 2004Networking[PDF]

The Synchronization of Periodic Routing MessagesS. Floyd and V. JacobsonIEEE/ACM Transactions on Networking, Vol. 2, No. 2, pp. 122-136April 1994Networking[PDF]

The Strengths of Weaker Identities: Opportunistic PersonasM. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. WeaverProceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, MassachusettsAugust 2007Networking[PDF]

Pages