| FrameNet as a Resource for Paraphrase Research | Y. Hasegawa, R. Lee-Goldman, A. Kong, and K. Akita | Constructions and Frames, Special Issue on Advances in Frame Semantics, Vol. 3, Issue 1, pp. 104-127 | August 2011 | Networking | |
| Mesos: Flexible Resource Sharing for the Cloud | B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A.D. Joseph, R. Katz, S. Shenker and I. Stoica | USENIX ;login:, Vol. 36, No. 4, pp. 37-45 | August 2011 | Networking | [PDF]
|
| Naming in Content-Oriented Architectures | A. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti, and S. Shenker | Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN 2011), Toronto, ON, Canada | August 2011 | Networking | [PDF]
|
| An Assessment of Overt Malicious Activity Manifest in Residential Networks | G. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. Vallentin | Proceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp 144-163 | July 2011 | Networking | [PDF]
|
| What's Clicking What? Techniques and Innovations of Today's Clickbots | B. Miller, P. Pearce, C. Grier, C. Kreibich, and V. Paxson | Proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp. 164-183 | July 2011 | Networking | [PDF]
|
| Editorial: Architecting for Innovation | T. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, B. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, and D. Kuptsov | ACM SIGCOMM Computer Communications Review, Vol. 41, No. 3 | July 2011 | Networking | [PDF]
|
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. Franklin, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-82, Berkeley, California | July 2011 | Networking | [PDF]
|
| Computing TCP's Retransmission Timer | V. Paxson, M. Allman, J. Chu, and M. Sargent | RFC 6298 | June 2011 | Networking | [PDF]
|
| Jellyfish: Networking Data Centers Randomly | A. Singla, C.-Y. Hong, L. Popa, and P. Brighten Godfrey | Proceedings the Third USENIX Workshop on Hot Topics in Cloud Computing (USENIX HotCloud ‘11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| Gatekeeper: Supporting Bandwidth Guarantees for Multi-Tenant Datacenter Networks | H. Rodrigues, J.R. Santos, Y. Turner, P. Soares, and D. Guedes | Proceedings of the Third Workshop on I/O Virtualization (WIOV '11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| Computing Security in the Developing World: A Case for Multidisciplinary Research | Y. Ben-David, S. Hasan, J. Pal, M. Vallentin, S. Panjwani, P. Gutheim, J. Chen, and E. Brewer | Proceedings of the Fifth ACM Workshop on Networked Systems for Developing Regions (NSDR), pp.39-44, Washington, D.C. | June 2011 | Networking | [PDF]
|
| The Datacenter Needs an Operating System | M. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. Stoica | Proceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| Click Trajectories: End-to-End Analysis of the Spam Value Chain | K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage | Proceedings of the IEEE Symposium on Security and Privacy, pp. 431-446, Oakland, California | May 2011 | Networking | [PDF]
|
| Design and Evaluation of a Real-Time URL Spam Filtering Service | K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song | Proceedings of the 32nd IEEE Symposium on Security and Privacy, Oakland, California, pp. 447-464 | May 2011 | Networking | [PDF]
|
| Disk-Locality in Datacenter Computing Considered Irrelevant | G. Anantharayanan, A. Ghodsi, S. Shenker, and I. Stoica | Proceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), Napa, California | May 2011 | Networking | [PDF]
|
| Implications of Netalyzr's DNS Measurements | N. Weaver, C. Kreibich, B. Nechaev, and V. Paxson | Proceedings of the First Workshop on Securing and Trusting Internet Names (SATIN), Teddington, United Kingdom | April 2011 | Networking | [PDF]
|
| On the Effects of Registrar-Level Intervention | H. Liu, K. Levchenko, M. Felegyhazi, C. Kreibich, G. Maier, G. M. Voelker, and Stefan Savage | Proceedings of the Fourth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11), Boston, Massachusetts | March 2011 | Networking | [PDF]
|
| Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise? | T. Ouyang, S. Ray, M. Rabinovich, and M. Allman | Proceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, Georgia | March 2011 | Networking | [PDF]
|
| Detecting and Analyzing Automated Activity on Twitter | C. M. Zhang and V. Paxson | Proceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, Georgia | March 2011 | Networking | [PDF]
|
| Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters | A. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski, S. Shenker, and I. Stoica | Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011), Boston, Massachusetts | March 2011 | Networking | [PDF]
|
| NAT Usage in Residential Broadband Networks | G. Maier, F. Schneider, and A. Feldmann | Proceedings of the 12th International Conference on Passive and Active Network Measurement (PAM 2011), Atlanta, Georgia | March 2011 | Networking | [PDF]
|
| Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center | B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. Stoica | Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011), Boston, Massachusetts | March 2011 | Networking | [PDF]
|
| Towards Situational Awareness of Large-Scale Botnet Probing Events | Z. Li, A. Goyal, Y. Chen, and V. Paxson | IEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp. 175-188 | March 2011 | Networking | [PDF]
|
| The Importance of Trusting Beliefs Linked to the Corporate Website for Diffusion of Recruiting-Related Online Innovations | M. Bermudez-Edo, N. Hurtado-Torres, and J. A. Aragon-Correa | Information Technology and Management, Vol. 11, No. 4, pp. 177-189 | December 2010 | Networking | |
| A Cost Comparison of Datacenter Network Architectures | L. Popa, S. Ratnasamy, G. Iannaccone, A. Krishnamurthy, and I. Stoica | Proceedings of the 6th ACM International Conference on Emerging Networking EXperiments and Technologies, Philadelphia, Pennsylvania, article no. 16 | December 2010 | Networking | [PDF]
|
| Virtualizing the Network Forwarding Plane | M. Casado, T. Koponen, R. Ramanathan, and S. Shenker | Proceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO 2010), Philadelphia, Pennsylvania | December 2010 | Networking | [PDF]
|
| Netalyzr: Illuminating The Edge Network | C. Kreibich, N. Weaver, B. Nechaev, and V. Paxson | Proceedings of the Internet Measurement Conference (IMC 2010), Melbourne, Australia, pp. 246-259 | November 2010 | Networking | [PDF]
|
| Optimal Information Security Investment with Penetration Testing | R. Boehme and M. Felegyhazi | Proceedings of the Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany, 21-37 | November 2010 | Networking | [PDF]
|
| Onix: A Distributed Control Platform for Large-scale Production Networks | T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, and S. Shenker | Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 351-364 | October 2010 | Networking | [PDF]
|
| @spam: The Underground on 140 Characters or Less | C. Grier, K. Thomas, V. Paxson, and M. Zhang | Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, Illinois, pp. 27-37 | October 2010 | Networking | [PDF]
|
| Using Strongly Typed Networking to Architect for Tussle | C. Muthukrishnan, V. Paxson, M. Allman, and A. Akella | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 9 | October 2010 | Networking | [PDF]
|
| On Building Special-Purpose Social Networks for Emergency Communication | M. Allman | ACM Computer Communication Review, Vol. 40, Issue 5 | October 2010 | Networking | [PDF]
|
| Building Extensible Networks with Rule-Based Forwarding | L. Popa, N. Egi, S. Ratnasamy, and I. Stoica | Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 379-391 | October 2010 | Networking | [PDF]
|
| CloudPolice: Taking Access Control out of the Network | L. Popa, M. Yu, S. Y. Ko, S. Ratnasamy, and I. Stoica | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 7 | October 2010 | Networking | [PDF]
|
| HTTP as the Narrow Waist of the Future Internet | L. Popa, A. Ghodsi, and I. Stoica | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 6 | October 2010 | Networking | [PDF]
|
| YAMR: Yet Another Multipath Routing Protocol | I. Ganichev, B. Dai, B. Godfrey, and S. Shenker | ACM SIGCOMM Computer Communication Review, Vol. 40, Issue 5 | October 2010 | Networking | [PDF]
|
| Towards Insurable Network Architectures | R. Boehme | Journal of Information Technology, Vol. 52, No. 5, pp. 290-293 | September 2010 | Networking | |
| Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Canada | S. Jha, R. Sommer, and C. Kreibich, eds. | Springer Verlag | September 2010 | Networking | |
| Cybercasing the Joint: On the Privacy Implications of Geotagging | G. Friedland and R. Sommer | Proceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C. | August 2010 | Networking | [PDF]
|
| Learning Heuristic Functions for State-Space Planing | B. Satzger and O. Kramer | Proceedings of the Fifth IASTED International Conference on Computational Intelligence (CI 2010), Maui, Hawaii | August 2010 | Networking | |
| Ripcord: A Modular Platform for Data Center Networking | B. Heller, D. Erickson, N. McKeown, R. Griffith, I. Ganichev, S. Whyte, K. Zarifis, D. Moon, S. Shenker, and S. Stuart | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2010), New Delhi, India, pp. 457-458 | August 2010 | Networking | [PDF]
|
| The Role of Soft Information in Trust Building: Evidence from Online Social Lending | S. Poetzsch and R. Boehme | Proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST 2010), Berlin, Germany, pp. 381-395 | June 2010 | Networking | |
| Measuring Access Connectivity Characteristics with Netalyzr | N. Weaver, C. Kreibich, and V. Paxson | Presented at the meeting of the North American Network Operators' Group (NANOG49), San Francisco, California | June 2010 | Networking | [PDF]
|
| Modeling Cyber-Insurance: Towards a Unifying Framework | R. Boehme and G. Schwartz | Proceedings of the 9th Workshop on the Economics of Information Security (WEIS 2010), Cambridge, Massachusetts | June 2010 | Networking | [PDF]
|
| Incentive Compatibility and Dynamics of Congestion Control | P. B. Godfrey, M. Schapira, A. Zohar, and S. Shenker | ACM SIGMETRICS Performance Evaluation Review, Vol. 36, Issue 1, pp. 95-106 | June 2010 | Networking | [PDF]
|
| Finding a ‘Kneedle’ in a Haystack: Detecting Knee Points in System Behavior | V. Satopaa, J. Albrecht, D. Irwin, and B. Raghavan | Proceedings of the 30th International Conference on Distributed Computing Systems SIMPLEX Workshop (ICDCS 2010), Genoa, Italy | June 2010 | Networking | [PDF]
|
| Spark: Cluster Computing with Working Sets | M. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker and I. Stoica | Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, Massachusetts | June 2010 | Networking | [PDF]
|
| Outside the Closed World: On Using Machine Learning for Network Intrusion Detection | R. Sommer and V. Paxson | Proceedings of the IEEE Symposium on Security and Privacy 2010, Oakland, California, pp. 305-316 | May 2010 | Networking | [PDF]
|
| A Longitudinal View of HTTP Traffic | T. Callahan, M. Allman, and V. Paxson | Proceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, Switzerland | April 2010 | Networking | [PDF]
|
| Web Timeouts and Their Implications | Z. Al-Qudah, M. Rabinovich, and M. Allman | Proceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, Switzerland | April 2010 | Networking | [PDF]
|