Publication Search Results

Titlesort descendingAuthorBibliographicDateGroupLinks
A Worst-Case WormN. Weaver and V. PaxsonProceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, MinnesotaMay 2004Networking[PDF]

Accountable Internet Protocol (AIP)D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 339-350August 2008Networking[PDF]

Achieving Convergence-Free Routing Using Failure-Carrying PacketsK. Lakshminarayanan, M. Caesar, M. Rangan, T. Anderson, S. Shenker, and I. StoicaProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 241 - 252August 2007Networking[PDF]

Achieving Fairness Through Selective Early DroppingJ. Scott and R.M. Karppreprint 2004. 2004Networking
Active Mapping: Resisting NIDS Evasion Without Altering TrafficU. Shankar and V. PaxsonProceedings of the IEEE Symposium on Security and Privacy, Oakland, CaliforniaMay 2003Networking[PDF]

Adapting Social Spam Infrastructure for Political CensorshipK. Thomas, C. Grier, and V. PaxsonProceedings of the Fifth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12), San Jose, CaliforniaApril 2012Networking[PDF]

Adaptive Power Control for Ad-Hoc NetworksM. SanchezProceedings of Fifth International Conference on Sytemics Cybernetics and Informatics (SCI), 2001 2001Networking
Adaptive RED: An Algorithm for Increasing the Robustness of RED's Active Queue ManagementS. Floyd, R. Gummadi, and S. ShenkerAugust 2001Networking[PDF]

Adaptive Web Caching: Towards a New Global Caching ArchitectureL. Zhang, S. Michel, K. Nguyen, A. Rosenstein, S. Floyd, and V. JacobsonProceedings of the Third International WWW Caching WorkshopJune 1998Networking
Advances in Network SimulationL. Breslau, et al.IEEE Computer, May 2000, pp. 59-67. Or the technical report: Technical Report 99-702, University of Southern California, March 1999.May 2000Networking
Advantages of Parallel Processing and the Effects of Communications TimeW. Eddy and M. AllmanTechnical Report CR-209455, NASA Glenn Research Center, February 2000.February 2000Networking
Agents' Privacy In Distributed Algorithmic Mechanisms (Position Paper)J. Feigenbaum, N. Nisan, V. Ramachandran, R. Sami, and S. ShenkerFirst Workshop on Economics and Information Security, Berkeley, CaliforniaMay 2002Networking
Algorithms for Optical MappingR.M. Karp and R. ShamirJournal of Computational Biology 7(1,2) 2000. 2000Networking
An Admission Control Approach for Elastic Flows in the InternetL. Fàbrega, T. Jové, A. Bueno, and J. L. MarzoProceedings of the 9th IFIP Working Conference on Performance Modeling and Evaluation of ATM and IP Networks (IFIP ATM and IP 2001), Budapest, HungaryJune 2001Networking
An Algorithm for Cost-Delay Balanced Trees and Its Application to Wide Area Network MulticastP. Radoslavov and T. TokudaProceedings of the First International Conference on Worldwide Computing and Its Applications, Tsukuba, JapanMarch 1997Networking
An Analysis of The Internal Structure of Large Autonomous SystemsR. Govindan and P. RadoslavovComputer Science Department, University of Southern California Technical Report No. 02-777, Los Angeles, CaliforniaNovember 2002Networking
An Analysis of Using Reflectors for Distributed Denial-of-Service AttacksV. PaxsonComputer Communication Review 31(3), July 2001.July 2001Networking
An Architecture for a Global Internet Host Distance Estimation ServiceP. Francis, S. Jamin, V. Paxson, L. Zhang, D. Gryniewicz, and Y. JinProceedings of IEEE INFOCOM, March 1999.March 1999Networking
An Architecture for Developing Behavioral HistoryM. Allman, E. Blanton, and V. PaxsonProceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05), Cambridge, Massachusetts, p. 45-51July 2005Networking[PDF]

An Architecture for Energy Management in Wireless Sensor NetworksX. Jiang, J. Taneja, J. Ortiz, A. Tavakoli, P. Dutta, J. Jeong, D. Culler, P. Levis, and S. ShenkerProceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 31-36April 2007Networking[PDF]

An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion PreventionV. Paxson, R. Sommer, and N. WeaverProceedings of IEEE Sarnoff Symposium, Princeton, New Jersey, pp. 1-7May 2007Networking[PDF]

An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion PreventionR. Sommer, N. Weaver, and V. PaxsonConcurrency and Computation: Practice and Experience, Vol. 21, Issue 10, pp. 1255-1279July 2009Networking[PDF]

An Architecture for Large-Scale Internet MeasurementV. Paxson, J. Mahdavi, A. Adams, and M. MathisIEEE Communications, Vol. 36, No. 8, pp. 48-54August 1998Networking
An Assessment of Overt Malicious Activity Manifest in Residential NetworksG. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. VallentinProceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp 144-163July 2011Networking[PDF]

An ATM Distributed Simulator for Network Management ResearchJ. L. Marzo, P. Vilà, L. Fàbrega, and D. MassaguerProceedings of the 34th Annual Simulation Symposium (SS 2001), Seattle, Washington, pp. 185-192April 2001Networking
An Evaluation of TCP with Larger Initial WindowsM. Allman, C. Hayes, and S. OstermannACM Computer Communication Review, Vol. 28, Issue 3July 1998Networking
An Evaluation of XML-RPCM. AllmanACM Performance Evaluation Review, 30(4)March 2003Networking
An Examination of MBone PerformanceM. HandleyUSC/ISI Research Report: ISI/RR-97-450 1997Networking
An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being SlowE. Friedman, M. Shor, S. Shenker, and B. SopherGames and Economic Behavior, Vol. 47, Issue 2, pp. 325-352May 2004Networking
An Extension to the Selective Acknowledgement (SACK) Option for TCPS. Floyd, J. Mahdavi, M. Mathis, and M. PodolskyRequest for Comments 2883, Proposed Standard, July 2000.July 2000Networking
An Inquiry into the Nature and Causes of the Wealth of Internet MiscreantsJ. Franklin, V. Paxson, A. Perrig, and S. SavageProceedings of ACM Computer and Communication Security Conference (ACM CCS), Alexandria, Virginia, pp. 375-388October 2007Networking[PDF]

An Intermittent Energy Internet ArchitectureB. Raghavan, D. Irwin, J. Albrecht, J. Ma, and A. StreedProceedings of the Third International Conference on Future Energy Systems (e-Energy 2012), Madrid, SpainMay 2012Networking[PDF]

An Investigation of the Internet’s IP-Layer ConnectivityL. Tang, J. Li, Y. Li, and S. ShenkerComputer Communications, Vol. 32, No. 5, pp. 913-926March 2009Networking
An Optimal Algorithm for Monte-Carlo EstimationP. Dagum, R. M. Karp, M. Luby, and S. RossSIAM Journal of Computing, Vol. 29, No. 5, pp. 1484-1496 2000Networking
Application-Level Multicast Using Content-Addressable NetworksS. Ratnasamy, M. Handley, R.M. Karp, and S. ShenkerProceedings of Third International Workshop on Networked Group Communication, London, Nov 2001.November 2001Networking
Applying Fuzzy Logic to Model User Preferences on Multimedia SessionsJ.A. Botia, M. Valdes, P. M. Ruiz, and A.F. Gomez Skarmeta.Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy, Jaen, Spain, pp. 467-470September 2005Networking
Applying NOX to the DatacenterA. Tavakoli, M. Casado, T. Koponen, and S. ShenkerProceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New YorkOctober 2009Networking[PDF]

Approximate Fair Allocation of Link BandwidthR. Pan, B. Prabhakar, L. Breslau, and S. ShenkerIEEE Micro Vol. 23, Issue 1, pp. 36-43 2003Networking
Approximate fairness through differential droppingR. Pan, L. Breslau, B. Prabhakar, and S. ShenkerComputer Communication Review, Vol. 33, Issue 2, pp. 23-39 2003Networking
Approximation and Collusion in Multicast Cost SharingJ. Feigenbaum, A. Krishnamurthy, R. Sami, and S. ShenkerProceedings of the Third ACM Conference on Electronic Commerce (ACM-EE 2001), Tampa, Florida, pp. 253-255October 2001Networking
Approximation and Collusion in Multicast Cost SharingJ. Feigenbaum, A. Archer, A. Krishnamurthy, R. Sami, and S. ShenkerGames and Economic Behavior, Vol. 47, Issue 1, pp. 36-71April 2004Networking[PDF]

Aproximacion de Arboles Multicast Optimos en Redes Ad Hoc InalambricasP.M. Ruiz and A.F. Gomez SkarmetaProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Architectural Considerations for Playback of Quality Adaptive Video over the InternetR. Rejaie, M. Handley, and D. EstrinTechnical report 98-686, Computer Science Department, University of Southern California 1998Networking
Attested Append-Only Memory: Making Adversaries Stick to their WordB.-G. Chun, P. Maniatis, S. Shenker, and J. KubiatowiczProceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, Washington, pp. 189-204October 2007Networking[PDF]

Automated Packet Trace Analysis of TCP ImplementationsV. PaxsonProceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Cannes, FranceSeptember 1997Networking
Automating Analysis of Large-Scale Botnet Probing EventsZ. Li, A. Goyal, Y. Chen, and V. PaxsonProceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, pp. 11-22March 2009Networking[PDF]

Barter Trade Improves Message Delivery in Opportunistic NetworksL. Buttyan, L. Dora, M. Felegyhazi, and I. VajdaAd Hoc Networks, Vol. 8, Issue 1, pp. 1-14January 2010Networking[PDF]

Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless SensornetsR. Fonseca, S. Ratnasamy, J. Zhao, C. Tien Ee, D. Culler, S. Shenker, and I. StoicaProceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 329-342May 2005Networking[PDF]

Best-Effort versus Reservations: A Simple Comparative AnalysisL. Breslau and S. ShenkerACM Computer Communication Review, Vol. 28, pp. 3-16September 1998Networking
Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-ReduceJ. Hendrik Boese, A. Andrzejak, and M. HoegqvistProceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010), Raleigh, North Carolina, Article No. 3April 2010Networking

Pages