| BRITE: A Flexible Generator of Internet Topologies | A. Medina and I. Matta | BU-CS-TR-2000-005. January 21, 2000. | January 21 2000 | Networking | |
| BRITE: Universal Topology Generation From a User's Perspective | A. Medina, A. Lakhina, I. Matta, and J. Byers | BU-CS-TR-2001-003. April 05, 2001. | April 05 2001 | Networking | |
| Wireless Urban Sensing Systems | M. Srivastava, M. Hansen, J. Burke, A. Parker, S. Reddy, G. Saurabh, M. Allman, V. Paxson, and D. Estrin | Center for Embedded Network Sensing, UC Los Angeles Technical Report No. 65, Los Angeles, California | April 2006 | Networking | [PDF]
|
| An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks | V. Paxson | Computer Communication Review 31(3), July 2001. | July 2001 | Networking | |
| Controlling High Bandwidth Aggregates in the Network | R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker | Computer Communication Review 32(3), July 2002. | July 2002 | Networking | |
| Connections with Multiple Congested Gateways in Packet-Switched Networks Part 1: One-way Traffic | S. Floyd | Computer Communication Review, Vol. 21, No. 5, pp. 30-47 | October 1991 | Networking | [PDF]
|
| Simulation-based Comparisons of Tahoe, Reno, and SACK TCP | K. Fall and S. Floyd | Computer Communication Review, Vol. 26, No. 3, pp. 5-21 | July 1996 | Networking | [PDF]
|
| Approximate fairness through differential dropping | R. Pan, L. Breslau, B. Prabhakar, and S. Shenker | Computer Communication Review, Vol. 33, Issue 2, pp. 23-39 | 2003 | Networking | |
| The Devil and Packet Trace Anonymization | R. Pang, M. Allman, V. Paxson, and J. Lee | Computer Communication Review, Vol. 36, Issue 1, pp. 29-38 | January 2006 | Networking | |
| A Data-oriented (and Beyond) Network Architecture | T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. Stoica | Computer Communication Review, Vol. 37, Issue 4, ACM, pp. 181-192 | October 2007 | Networking | [PDF]
|
| Dynamic Route Recomputation Considered Harmful | M. Caesar, M. Casado, T. Koponen, J. Rexford, and S. Shenker | Computer Communication Review, Vol. 40, Issue 2 | April 2010 | Networking | [PDF]
|
| Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic | V. Paxson | Computer Communications Review, Vol. 27, No. 5, pp. 5-18. This paper is a minor revision of Fast Approximation of Self-Similar Network Traffic, an April 1995 technical report. | October 1997 | Networking | |
| An Investigation of the Internet’s IP-Layer Connectivity | L. Tang, J. Li, Y. Li, and S. Shenker | Computer Communications, Vol. 32, No. 5, pp. 913-926 | March 2009 | Networking | |
| Very Large Conferences on the Internet: the Internet Multimedia Conferencing Architecture | M. Handley, J. Crowcroft, C. Bormann, and J. Ott | Computer Networks and ISDN Systems, Special Issue on Internet Telephony | 1998 | Networking | |
| Bro: A System for Detecting Network Intruders in Real-Time | V. Paxson | Computer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999. | December 14 1999 | Networking | |
| A Comparison of RED's Byte and Packet Modes | W. Eddy and M. Allman | Computer Networks, 42(2) | June 2003 | Networking | |
| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks | R. Krishnan, J. Sterbenz, W. Eddy, C. Partridge, and M. Allman | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 46, Issue 3, pp. 343-362 | October 2004 | Networking | [PDF]
|
| Determining an Appropriate Sending Rate Over an Underutilized Network Path | P. Sarolahti, M. Allman, and S. Floyd | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 51, Issue 7, pp. 1815-1832. DOI:10.1016/j.comnet.2006.11.006 | May 2007 | Networking | [PDF]
|
| The Internet Under Crisis Conditions: Learning From September 11 | C. Partridge, P. Barford, D. Clark, S. Donelan, V. Paxson, J. Rexford, M. Vernon, J. Eisenberg, M. Blumenthal, D. Padgham, K. Batch, D. Drake, and J. Briscoe | Computer Science and Telecommunications Board, National Research Council, National Academy Press, Washington, DC | 2002 | Networking | [PDF]
|
| A Comparison of Incremental Deployment Strategies for Router-Assisted Reliable Multicast | X. He, C. Papadopoulos, P. Radoslavov, and R. Govindan | Computer Science Department, University of Southern California Technical Report No. 01-751, Los Angeles, California | July 2001 | Networking | [PDF]
|
| An Analysis of The Internal Structure of Large Autonomous Systems | R. Govindan and P. Radoslavov | Computer Science Department, University of Southern California Technical Report No. 02-777, Los Angeles, California | November 2002 | Networking | |
| An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention | R. Sommer, N. Weaver, and V. Paxson | Concurrency and Computation: Practice and Experience, Vol. 21, Issue 10, pp. 1255-1279 | July 2009 | Networking | [PDF]
|
| FrameNet as a Resource for Paraphrase Research | Y. Hasegawa, R. Lee-Goldman, A. Kong, and K. Akita | Constructions and Frames, Special Issue on Advances in Frame Semantics, Vol. 3, Issue 1, pp. 104-127 | August 2011 | Networking | |
| A Survey of Support for Implementing Debuggers | V. Paxson | CS 262 class project, University of California, Berkeley | October 1990 | Networking | [PDF]
|
| Large Scale Malicious Code: A Research Agenda | N. Weaver, V. Paxson, S. Staniford, and R. Cunningham | DARPA-sponsored report | 2003 | Networking | |
| Shark: Fast Data Analysis Using Coarse-grained Distributed Memory | C. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. Stoica | Demo, ACM SIGMOD/PODS Conference, Scottsdale, Arizona | May 2012 | Networking | [PDF]
|
| Comparative Analysis of Traffic Matrix Estimation Methods | A. Medina, N. Taft, K. Salamatian, S. Bhattacharyya, and C. Diot | DIMACS Workshop on Internet and WWW Measurement, Mapping and Modeling. February 13-15 2002. | February 13 2002 | Networking | |
| Incentives and Internet Computation | J. Feigenbaum and S. Shenker | Distributed Computing Column #9, SIGACT News, Vol. 33, Issue 4, pp. 37-54 | 2002 | Networking | |
| Mechanism Design for Policy Routing | J. Feigenbaum, R. Sami, and S. Shenker | Distributed Computing, Vol. 18, Issue. 4, pp. 150-164 | March 2006 | Networking | [PDF]
|
| Java Security Architecture and Extensions | V. Roth | Dr. Dobbs Journal, 2002(335), April 2002. | April 2002 | Networking | |
| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks - Summary | R. Krishnan, M. Allman, C. Partridge, J.P.G. Sterbenz, and W. Ivancic | Earth Science Technology Conference, Pasadena, California, June 2002. | June 2002 | Networking | |
| The Design and Implementation of a Declarative Sensor Network System | D. Chu, L. Popa, A. Tavakoli, J. Hellerstein, P. Levis, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. EECS-2006-132, Berkeley, California | October 2006 | Networking | |
| Detecting Hidden Causality in Network Connections | J. Kannan, J. Jung, V. Paxson, and C. E. Koksal | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2005-30, Berkeley, California | December 2005 | Networking | [PDF]
|
| Flush: A Reliable Bulk Transport Protocol for Multihop Wireless Network | S. Kim, R. Fonseca, P.K. Dutta, A. Tavakoli, D.E. Culler, P. Levis, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2006-169, Berkeley, California | December 12 2006 | Networking | |
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. Franklin, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-82, Berkeley, California | July 2011 | Networking | [PDF]
|
| Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community | M. Zaharia, S. Katti, C. Grier, V. Paxson, S. Shenker, I. Stoica and D. Song | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2012-12, Berkeley, California | January 2012 | Networking | [PDF]
|
| Post Placement C-Slow Retiming for the Xilinx Virtex FPGA | N. Weaver, Y. Markovskiy, Y. Patel, and J. Wawrzynek | Eleventh ACM Symposium of Field Programmable Gate Arrays (FPGA) | 2003 | Networking | [PDF]
|
| End-Host Controlled Multicast Routing | K. Lakshminarayanan, A. Rao, I. Stoica, and S. Shenker | Elsevier Computer Networks, Special Issue on Overlay Distribution Structures and their Applications, Vol. 5, Issue 6, pp. 807-825. DOI:10.1016/j.comnet.2005.07.019 | April 2006 | Networking | [PDF]
|
| DIFS: A Distributed Index for Features in Sensor Networks | B. Greenstein, D. Estrin, R. Govindan, S. Ratnasamy, and S. Shenker | Elsevier Journal of Ad Hoc Networks, 2003. (Also in the First IEEE Workshop on Sensor Networks Protocols and Applications, SNPA, 2003) | 2003 | Networking | |
| Reliable Multicast Transport Building Blocks for One-to-Many Bulk-Data Transfer | B Whetton, L. Vicisano, R. Kermode, M. Handley, S. Floyd, and M. Luby | Experimental Request for Comments, October 2000. | October 2000 | Networking | |
| Ongoing TCP Research Related to Satellites | M. Allman, S. Dawkins, D. Glover, J. Griner, D. Tran, T. Henderson, J. Heidemann, J. Touch, H. Kruse, S. Ostermann, K. Scott, and J. Semke | February 2000. Request for Comments 2760. | February 2000 | Networking | |
| GHT: A Geographic Hash-table for Data-centric Storage in Sensornets | S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker | First ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), September 2002. | September 2002 | Networking | |
| Agents' Privacy In Distributed Algorithmic Mechanisms (Position Paper) | J. Feigenbaum, N. Nisan, V. Ramachandran, R. Sami, and S. Shenker | First Workshop on Economics and Information Security, Berkeley, California | May 2002 | Networking | |
| XORP: An Open Platform for Network Research | M. Handley, O. Hodson, and E. Kohler | First Workshop on Hot Topics in Networking, October 2002. | October 2002 | Networking | |
| Randomized Rumor Spreading | R. M. Karp, C. Schindelhauer, S. Shenker, and B. Vocking | FOCS 2000, pp. 565-574 | 2000 | Networking | |
| Approximation and Collusion in Multicast Cost Sharing | J. Feigenbaum, A. Archer, A. Krishnamurthy, R. Sami, and S. Shenker | Games and Economic Behavior, Vol. 47, Issue 1, pp. 36-71 | April 2004 | Networking | [PDF]
|
| An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being Slow | E. Friedman, M. Shor, S. Shenker, and B. Sopher | Games and Economic Behavior, Vol. 47, Issue 2, pp. 325-352 | May 2004 | Networking | |
| Controlling High-Bandwidth Flows at the Congested Router | R. Mahajan, S. Floyd, and D. Wetherall | ICNP 2001 | 2001 | Networking | |
| RR-TCP: A Reordering-Robust TCP with DSACK | M. Zhang, B. Karp, S. Floyd, and L. Peterson | ICSI Technical Report TR-02-006 | July 2002 | Networking | [PDF]
|
| Making the Internet More Evolvable | B. Raghavan, T. Koponen, A. Ghodsi, V. Brajkovic, and S. Shenker | ICSI Technical Report TR-12-011 | September 2012 | Networking | [PDF]
|