Publication Search Results

TitleAuthorBibliographicDatesort ascendingGroupLinks
FrameNet as a Resource for Paraphrase ResearchY. Hasegawa, R. Lee-Goldman, A. Kong, and K. AkitaConstructions and Frames, Special Issue on Advances in Frame Semantics, Vol. 3, Issue 1, pp. 104-127August 2011Networking
Mesos: Flexible Resource Sharing for the CloudB. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A.D. Joseph, R. Katz, S. Shenker and I. StoicaUSENIX ;login:, Vol. 36, No. 4, pp. 37-45August 2011Networking[PDF]

Naming in Content-Oriented ArchitecturesA. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti, and S. ShenkerProceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN 2011), Toronto, ON, CanadaAugust 2011Networking[PDF]

An Assessment of Overt Malicious Activity Manifest in Residential NetworksG. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. VallentinProceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp 144-163July 2011Networking[PDF]

What's Clicking What? Techniques and Innovations of Today's ClickbotsB. Miller, P. Pearce, C. Grier, C. Kreibich, and V. PaxsonProceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp. 164-183July 2011Networking[PDF]

Editorial: Architecting for InnovationT. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, B. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, and D. KuptsovACM SIGCOMM Computer Communications Review, Vol. 41, No. 3July 2011Networking[PDF]

Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingM. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. Franklin, S. Shenker, and I. StoicaEECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-82, Berkeley, CaliforniaJuly 2011Networking[PDF]

Computing TCP's Retransmission TimerV. Paxson, M. Allman, J. Chu, and M. SargentRFC 6298June 2011Networking[PDF]

Jellyfish: Networking Data Centers RandomlyA. Singla, C.-Y. Hong, L. Popa, and P. Brighten GodfreyProceedings the Third USENIX Workshop on Hot Topics in Cloud Computing (USENIX HotCloud ‘11), Portland, OregonJune 2011Networking[PDF]

Gatekeeper: Supporting Bandwidth Guarantees for Multi-Tenant Datacenter NetworksH. Rodrigues, J.R. Santos, Y. Turner, P. Soares, and D. GuedesProceedings of the Third Workshop on I/O Virtualization (WIOV '11), Portland, OregonJune 2011Networking[PDF]

Computing Security in the Developing World: A Case for Multidisciplinary ResearchY. Ben-David, S. Hasan, J. Pal, M. Vallentin, S. Panjwani, P. Gutheim, J. Chen, and E. BrewerProceedings of the Fifth ACM Workshop on Networked Systems for Developing Regions (NSDR), pp.39-44, Washington, D.C.June 2011Networking[PDF]

The Datacenter Needs an Operating SystemM. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. StoicaProceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, OregonJune 2011Networking[PDF]

Click Trajectories: End-to-End Analysis of the Spam Value ChainK. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. SavageProceedings of the IEEE Symposium on Security and Privacy, pp. 431-446, Oakland, CaliforniaMay 2011Networking[PDF]

Design and Evaluation of a Real-Time URL Spam Filtering ServiceK. Thomas, C. Grier, J. Ma, V. Paxson, and D. SongProceedings of the 32nd IEEE Symposium on Security and Privacy, Oakland, California, pp. 447-464May 2011Networking[PDF]

Disk-Locality in Datacenter Computing Considered IrrelevantG. Anantharayanan, A. Ghodsi, S. Shenker, and I. StoicaProceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), Napa, CaliforniaMay 2011Networking[PDF]

Implications of Netalyzr's DNS MeasurementsN. Weaver, C. Kreibich, B. Nechaev, and V. PaxsonProceedings of the First Workshop on Securing and Trusting Internet Names (SATIN), Teddington, United KingdomApril 2011Networking[PDF]

On the Effects of Registrar-Level InterventionH. Liu, K. Levchenko, M. Felegyhazi, C. Kreibich, G. Maier, G. M. Voelker, and Stefan SavageProceedings of the Fourth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11), Boston, MassachusettsMarch 2011Networking[PDF]

Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?T. Ouyang, S. Ray, M. Rabinovich, and M. AllmanProceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Detecting and Analyzing Automated Activity on TwitterC. M. Zhang and V. PaxsonProceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Dominant Resource Fairness: Fair Allocation of Multiple Resources in DatacentersA. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski, S. Shenker, and I. StoicaProceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011), Boston, MassachusettsMarch 2011Networking[PDF]

NAT Usage in Residential Broadband NetworksG. Maier, F. Schneider, and A. FeldmannProceedings of the 12th International Conference on Passive and Active Network Measurement (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Mesos: A Platform for Fine-Grained Resource Sharing in the Data CenterB. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. StoicaProceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011), Boston, MassachusettsMarch 2011Networking[PDF]

Towards Situational Awareness of Large-Scale Botnet Probing EventsZ. Li, A. Goyal, Y. Chen, and V. PaxsonIEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp. 175-188March 2011Networking[PDF]

The Importance of Trusting Beliefs Linked to the Corporate Website for Diffusion of Recruiting-Related Online InnovationsM. Bermudez-Edo, N. Hurtado-Torres, and J. A. Aragon-CorreaInformation Technology and Management, Vol. 11, No. 4, pp. 177-189December 2010Networking
A Cost Comparison of Datacenter Network ArchitecturesL. Popa, S. Ratnasamy, G. Iannaccone, A. Krishnamurthy, and I. StoicaProceedings of the 6th ACM International Conference on Emerging Networking EXperiments and Technologies, Philadelphia, Pennsylvania, article no. 16December 2010Networking[PDF]

Virtualizing the Network Forwarding PlaneM. Casado, T. Koponen, R. Ramanathan, and S. ShenkerProceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO 2010), Philadelphia, PennsylvaniaDecember 2010Networking[PDF]

Netalyzr: Illuminating The Edge NetworkC. Kreibich, N. Weaver, B. Nechaev, and V. PaxsonProceedings of the Internet Measurement Conference (IMC 2010), Melbourne, Australia, pp. 246-259November 2010Networking[PDF]

Optimal Information Security Investment with Penetration TestingR. Boehme and M. FelegyhaziProceedings of the Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany, 21-37November 2010Networking[PDF]

Onix: A Distributed Control Platform for Large-scale Production NetworksT. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, and S. ShenkerProceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 351-364October 2010Networking[PDF]

@spam: The Underground on 140 Characters or LessC. Grier, K. Thomas, V. Paxson, and M. ZhangProceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, Illinois, pp. 27-37October 2010Networking[PDF]

Using Strongly Typed Networking to Architect for TussleC. Muthukrishnan, V. Paxson, M. Allman, and A. AkellaProceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 9October 2010Networking[PDF]

On Building Special-Purpose Social Networks for Emergency CommunicationM. AllmanACM Computer Communication Review, Vol. 40, Issue 5October 2010Networking[PDF]

Building Extensible Networks with Rule-Based ForwardingL. Popa, N. Egi, S. Ratnasamy, and I. StoicaProceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 379-391October 2010Networking[PDF]

CloudPolice: Taking Access Control out of the NetworkL. Popa, M. Yu, S. Y. Ko, S. Ratnasamy, and I. StoicaProceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 7October 2010Networking[PDF]

HTTP as the Narrow Waist of the Future InternetL. Popa, A. Ghodsi, and I. StoicaProceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 6October 2010Networking[PDF]

YAMR: Yet Another Multipath Routing ProtocolI. Ganichev, B. Dai, B. Godfrey, and S. ShenkerACM SIGCOMM Computer Communication Review, Vol. 40, Issue 5October 2010Networking[PDF]

Towards Insurable Network ArchitecturesR. BoehmeJournal of Information Technology, Vol. 52, No. 5, pp. 290-293September 2010Networking
Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, CanadaS. Jha, R. Sommer, and C. Kreibich, eds.Springer VerlagSeptember 2010Networking
Cybercasing the Joint: On the Privacy Implications of GeotaggingG. Friedland and R. SommerProceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C.August 2010Networking[PDF]

Learning Heuristic Functions for State-Space PlaningB. Satzger and O. KramerProceedings of the Fifth IASTED International Conference on Computational Intelligence (CI 2010), Maui, HawaiiAugust 2010Networking
Ripcord: A Modular Platform for Data Center NetworkingB. Heller, D. Erickson, N. McKeown, R. Griffith, I. Ganichev, S. Whyte, K. Zarifis, D. Moon, S. Shenker, and S. StuartProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2010), New Delhi, India, pp. 457-458August 2010Networking[PDF]

The Role of Soft Information in Trust Building: Evidence from Online Social LendingS. Poetzsch and R. BoehmeProceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST 2010), Berlin, Germany, pp. 381-395June 2010Networking
Measuring Access Connectivity Characteristics with NetalyzrN. Weaver, C. Kreibich, and V. PaxsonPresented at the meeting of the North American Network Operators' Group (NANOG49), San Francisco, CaliforniaJune 2010Networking[PDF]

Modeling Cyber-Insurance: Towards a Unifying FrameworkR. Boehme and G. SchwartzProceedings of the 9th Workshop on the Economics of Information Security (WEIS 2010), Cambridge, MassachusettsJune 2010Networking[PDF]

Incentive Compatibility and Dynamics of Congestion ControlP. B. Godfrey, M. Schapira, A. Zohar, and S. ShenkerACM SIGMETRICS Performance Evaluation Review, Vol. 36, Issue 1, pp. 95-106June 2010Networking[PDF]

Finding a ‘Kneedle’ in a Haystack: Detecting Knee Points in System BehaviorV. Satopaa, J. Albrecht, D. Irwin, and B. RaghavanProceedings of the 30th International Conference on Distributed Computing Systems SIMPLEX Workshop (ICDCS 2010), Genoa, ItalyJune 2010Networking[PDF]

Spark: Cluster Computing with Working SetsM. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker and I. StoicaProceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, MassachusettsJune 2010Networking[PDF]

Outside the Closed World: On Using Machine Learning for Network Intrusion DetectionR. Sommer and V. PaxsonProceedings of the IEEE Symposium on Security and Privacy 2010, Oakland, California, pp. 305-316May 2010Networking[PDF]

A Longitudinal View of HTTP TrafficT. Callahan, M. Allman, and V. PaxsonProceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, SwitzerlandApril 2010Networking[PDF]

Web Timeouts and Their ImplicationsZ. Al-Qudah, M. Rabinovich, and M. AllmanProceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, SwitzerlandApril 2010Networking[PDF]

Pages