Publication Search Results

TitleAuthorsort descendingBibliographicDateGroupLinks
GPSR: Greedy Perimeter Stateless Routing for Wireless networksB. Karp and H.T. KungMOBICOM, 2000. 2001Networking
Spurring Adoption of DHTs with OpenHash, a Public DHT ServiceB. Karp, S. Ratnasamy, S. Rhea, and S. ShenkerProceedings of the Third International Workshop on Peer-to-Peer Systems, San Diego, CaliforniaFebruary 2004Networking[PDF]

What's Clicking What? Techniques and Innovations of Today's ClickbotsB. Miller, P. Pearce, C. Grier, C. Kreibich, and V. PaxsonProceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp. 164-183July 2011Networking[PDF]

A Preliminary Analysis of TCP Performance in an Enterprise NetworkB. Nechaev, M. Allman, V. Paxson, and A. GurtovProceedings of the 2010 Internet Network Management Workshop/Workshop on Research and Enterprise Networking (INM/WREN '10), San Jose, CaliforniaApril 2010Networking[PDF]

On Calibrating Enterprise Switch MeasurementsB. Nechaev, V. Paxson, M. Allman, and A. GurtovProceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 143-155November 2009Networking[PDF]

Extending Networking into the Virtualization LayerB. Pfaff, J. Pettit, K. Amidon, M. Casado, T. Koponen, and S. ShenkerProceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New YorkOctober 2009Networking[PDF]

Networking in the Long EmergencyB. Raghavan and J. MaProceedings of the ACM SIGCOMM Workshop on Green Networking (GreenNet '11), Ontario, Canada, pp. 37-42August 2011Networking[PDF]

The Energy and Emergy of the InternetB. Raghavan and J. MaProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

An Intermittent Energy Internet ArchitectureB. Raghavan, D. Irwin, J. Albrecht, J. Ma, and A. StreedProceedings of the Third International Conference on Future Energy Systems (e-Energy 2012), Madrid, SpainMay 2012Networking[PDF]

Making the Internet More EvolvableB. Raghavan, T. Koponen, A. Ghodsi, V. Brajkovic, and S. ShenkerICSI Technical Report TR-12-011September 2012Networking[PDF]

Software-Defined Internet ArchitectureB. Raghavan, T. Koponen, M. Casado, A. Ghodsi, S. Ratnasamy, and S. ShenkerProceedings of the ACM Workshop on Hot Topics in Networks (HotNets-XII), Seattle, WashingtonOctober 2012Networking[PDF]

Learning Heuristic Functions for State-Space PlaningB. Satzger and O. KramerProceedings of the Fifth IASTED International Conference on Computational Intelligence (CI 2010), Maui, HawaiiAugust 2010Networking
Enhancing P2P File-Sharing with an Internet-Scale Query ProcessorB. Thau Loo , J. M. Hellerstein, R. Huebsch, S. Shenker, and I. StoicaProceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004), Toronto, Canada, pp. 432-443August 2004Networking[PDF]

RFC 3048: Reliable Multicast Transport Building Blocks for One-to-Many Bulk-Data TransferB. Whetten, L. Vicisano, R. Kermode, M. Handley, S. Floyd, and M. LubyRequest for Comments 3048, Informational, January 2001.January 2001Networking
Diverse Replication for Single-Machine Byzantine-Fault ToleranceB.-C. Chun, P. Maniatis, and S. ShenkerProceedings of the USENIX Annual Technical Conference, Boston, Massachusetts, pp. 287-292June 2008Networking[PDF]

Attested Append-Only Memory: Making Adversaries Stick to their WordB.-G. Chun, P. Maniatis, S. Shenker, and J. KubiatowiczProceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, Washington, pp. 189-204October 2007Networking[PDF]

NetComplex: A Complexity Metric for Network System DesignsB.-G. Chun, S. Ratnasamy, and E. KohlerProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 393-406April 2008Networking
Shark: Fast Data Analysis Using Coarse-grained Distributed MemoryC. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. StoicaDemo, ACM SIGMOD/PODS Conference, Scottsdale, ArizonaMay 2012Networking[PDF]

@spam: The Underground on 140 Characters or LessC. Grier, K. Thomas, V. Paxson, and M. ZhangProceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, Illinois, pp. 27-37October 2010Networking[PDF]

Manufacturing Compromise: The Emergence of Exploit-as-a-ServiceC. Grier, L. Ballard, J. Caballero, N. Chachra, C. J. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, M. Zubair Rafique, M. Abu Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, and G. M. VoelkerProceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012), pp. 821-832, Raleigh, North CarolinaOctober 2012Networking[PDF]

Spamalytics: An Empirical Analysis of Spam Marketing ConversionC. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 3-14. Also appeared in the Communications of the ACM, Vol. 52, No. 9, pp. 99-107, September 2009October 2008Networking[PDF]

Show Me the Money: Characterizing Spam-Advertised RevenueC. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. SavageProceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

Brooery: A Graphical Environment for Analysis of Security-Relevant Network ActivityC. KreibichProceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118April 2005Networking[PDF]

Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, GermanyC. Kreibich and M. Jahnke, eds.Springer 2010Networking
Policy-Controlled Event Management for Distributed Intrusion DetectionC. Kreibich and R. SommerProceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05), Columbus, Ohio, Vol. 4, pp. 385-391June 2005Networking[PDF]

On the Spam Campaign TrailC. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, CaliforniaApril 2008Networking[PDF]

Spamcraft: An Inside Look At Spam Campaign OrchestrationC. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’09), Boston, MassachusettsApril 2009Networking[PDF]

Netalyzr: Illuminating The Edge NetworkC. Kreibich, N. Weaver, B. Nechaev, and V. PaxsonProceedings of the Internet Measurement Conference (IMC 2010), Melbourne, Australia, pp. 246-259November 2010Networking[PDF]

GQ: Practical Containment for Measuring Modern Malware SystemsC. Kreibich, N. Weaver, C. Kanich, W. Cui, V. PaxsonProceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany. Also appeared as ICSI Technical Report TR-11-002.November 2011Networking
Experiences from Netalyzr with Engaging Users in End-System MeasurementC. Kreibich, N. Weaver, G. Maier, B. Nechaev, and V. PaxsonProceedings of ACM SIGCOMM Workshop on Measurements Up the Stack (W-MUST), pp. 25-30, Toronto, Canada.August 2011Networking[PDF]

Detecting and Analyzing Automated Activity on TwitterC. M. Zhang and V. PaxsonProceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Using Strongly Typed Networking to Architect for TussleC. Muthukrishnan, V. Paxson, M. Allman, and A. AkellaProceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 9October 2010Networking[PDF]

A Swifter Start for TCPC. Partridge, D. Rockwell, M. Allman, R. Krishnan, and J.P.G. SterbenzTechnical Report No. 8339, BBN Technologies, March 2002March 2002Networking
Report of the NSF Scalable Information Infrastructure WorkshopC. Partridge, et al.October 07 1998Networking
The Internet Under Crisis Conditions: Learning From September 11C. Partridge, P. Barford, D. Clark, S. Donelan, V. Paxson, J. Rexford, M. Vernon, J. Eisenberg, M. Blumenthal, D. Padgham, K. Batch, D. Drake, and J. BriscoeComputer Science and Telecommunications Board, National Research Council, National Academy Press, Washington, DC 2002Networking[PDF]

Detecting In-Flight Page Changes with Web TripwiresC. Reis, S. Gribble, T. Kohno, and N. WeaverProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 31-44April 2008Networking[PDF]

Prudent Practices for Designing Malware Experiments: Status Quo and OutlookC. Rossow, C. J. Dietrich, C. Kreibich, C. Grier, V. Paxson, N. Pohlmann, H. Bos, and M. van SteenProceedings of the 33rd IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, California, pp. 65-79May 2012Networking[PDF]

On Building Inexpensive Network CapabilitiesC. Shue, A. Kalafut, M. Allman, and C. TaylorACM SIGCOMM Computer Communications Review, Vol. 42, No. 2, pp. 72-79April 2012Networking[PDF]

Practical Data-Centric StorageC. T. Ee, S. Ratnasamy, and S. ShenkerProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 325-338May 2006Networking[PDF]

Resolving Inter-Domain Policy DisputesC. T. Ee, V. Ramachandran, B.-G. Chun, K. Lakshminarayanan, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 157-168August 2007Networking[PDF]

Insights from the Inside: A View of Botnet Management from InfiltrationC. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. SongProceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, CaliforniaApril 2010Networking[PDF]

Distributed Segment Tree: Support Range Query and Cover Query over DHTC. Zheng, G. Shen, S. Li, and S. ShenkerProceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, CaliforniaFebruary 2006Networking[PDF]

Local error recovery in SRM: comparison of two approachesC.G. Liu, D. Estrin, S. Shenker, and L. ZhangProceedings of IEEE/ACM Transactions on Networking, Vol. 6, pp. 686-699December 1998Networking
Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al EncaminarC.M. Yago, P. M. Ruiz, and A.F. Gomez SkarmetaProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
A Modular Network Layer for SensornetsC.T. Ee, R. Fonseca, S. Kim, D. Moon, A. Tavakoli, D. Culler, S. Shenker, and I. StoicaProceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), Seattle, Washington, pp. 249-262November 2006Networking[PDF]

A Tool for Debugging Internet Multicast RoutingD. Agarwal and S. FloydProceedings of the 22nd Annual ACM Computer Science Conference (CSC '94), Phoenix, ArizonaMarch 1994Networking
Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the WebD. Akhawe, B. Amann, M. Vallentin, and R. SommerTo appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, BrazilMay 2013Networking
Accountable Internet Protocol (AIP)D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 339-350August 2008Networking[PDF]

Holding the Internet AccountableD. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. ShenkerProceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, GeorgiaNovember 2007Networking[PDF]

Dynamic Behavior of Slowly-Responsive Congestion Control AlgorithmsD. Bansal, H. Balakrishnan, S. Floyd, and S. ShenkerSIGCOMM 2001 2001Networking

Pages