| A Worst-Case Worm | N. Weaver and V. Paxson | Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Accountable Internet Protocol (AIP) | D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 339-350 | August 2008 | Networking | [PDF]
|
| Achieving Convergence-Free Routing Using Failure-Carrying Packets | K. Lakshminarayanan, M. Caesar, M. Rangan, T. Anderson, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 241 - 252 | August 2007 | Networking | [PDF]
|
| Achieving Fairness Through Selective Early Dropping | J. Scott and R.M. Karp | preprint 2004. | 2004 | Networking | |
| Active Mapping: Resisting NIDS Evasion Without Altering Traffic | U. Shankar and V. Paxson | Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California | May 2003 | Networking | [PDF]
|
| Adapting Social Spam Infrastructure for Political Censorship | K. Thomas, C. Grier, and V. Paxson | Proceedings of the Fifth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12), San Jose, California | April 2012 | Networking | [PDF]
|
| Adaptive Power Control for Ad-Hoc Networks | M. Sanchez | Proceedings of Fifth International Conference on Sytemics Cybernetics and Informatics (SCI), 2001 | 2001 | Networking | |
| Adaptive RED: An Algorithm for Increasing the Robustness of RED's Active Queue Management | S. Floyd, R. Gummadi, and S. Shenker | | August 2001 | Networking | [PDF]
|
| Adaptive Web Caching: Towards a New Global Caching Architecture | L. Zhang, S. Michel, K. Nguyen, A. Rosenstein, S. Floyd, and V. Jacobson | Proceedings of the Third International WWW Caching Workshop | June 1998 | Networking | |
| Advances in Network Simulation | L. Breslau, et al. | IEEE Computer, May 2000, pp. 59-67. Or the technical report: Technical Report 99-702, University of Southern California, March 1999. | May 2000 | Networking | |
| Advantages of Parallel Processing and the Effects of Communications Time | W. Eddy and M. Allman | Technical Report CR-209455, NASA Glenn Research Center, February 2000. | February 2000 | Networking | |
| Agents' Privacy In Distributed Algorithmic Mechanisms (Position Paper) | J. Feigenbaum, N. Nisan, V. Ramachandran, R. Sami, and S. Shenker | First Workshop on Economics and Information Security, Berkeley, California | May 2002 | Networking | |
| Algorithms for Optical Mapping | R.M. Karp and R. Shamir | Journal of Computational Biology 7(1,2) 2000. | 2000 | Networking | |
| An Admission Control Approach for Elastic Flows in the Internet | L. Fàbrega, T. Jové, A. Bueno, and J. L. Marzo | Proceedings of the 9th IFIP Working Conference on Performance Modeling and Evaluation of ATM and IP Networks (IFIP ATM and IP 2001), Budapest, Hungary | June 2001 | Networking | |
| An Algorithm for Cost-Delay Balanced Trees and Its Application to Wide Area Network Multicast | P. Radoslavov and T. Tokuda | Proceedings of the First International Conference on Worldwide Computing and Its Applications, Tsukuba, Japan | March 1997 | Networking | |
| An Analysis of The Internal Structure of Large Autonomous Systems | R. Govindan and P. Radoslavov | Computer Science Department, University of Southern California Technical Report No. 02-777, Los Angeles, California | November 2002 | Networking | |
| An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks | V. Paxson | Computer Communication Review 31(3), July 2001. | July 2001 | Networking | |
| An Architecture for a Global Internet Host Distance Estimation Service | P. Francis, S. Jamin, V. Paxson, L. Zhang, D. Gryniewicz, and Y. Jin | Proceedings of IEEE INFOCOM, March 1999. | March 1999 | Networking | |
| An Architecture for Developing Behavioral History | M. Allman, E. Blanton, and V. Paxson | Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05), Cambridge, Massachusetts, p. 45-51 | July 2005 | Networking | [PDF]
|
| An Architecture for Energy Management in Wireless Sensor Networks | X. Jiang, J. Taneja, J. Ortiz, A. Tavakoli, P. Dutta, J. Jeong, D. Culler, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 31-36 | April 2007 | Networking | [PDF]
|
| An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention | V. Paxson, R. Sommer, and N. Weaver | Proceedings of IEEE Sarnoff Symposium, Princeton, New Jersey, pp. 1-7 | May 2007 | Networking | [PDF]
|
| An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention | R. Sommer, N. Weaver, and V. Paxson | Concurrency and Computation: Practice and Experience, Vol. 21, Issue 10, pp. 1255-1279 | July 2009 | Networking | [PDF]
|
| An Architecture for Large-Scale Internet Measurement | V. Paxson, J. Mahdavi, A. Adams, and M. Mathis | IEEE Communications, Vol. 36, No. 8, pp. 48-54 | August 1998 | Networking | |
| An Assessment of Overt Malicious Activity Manifest in Residential Networks | G. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. Vallentin | Proceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp 144-163 | July 2011 | Networking | [PDF]
|
| An ATM Distributed Simulator for Network Management Research | J. L. Marzo, P. Vilà, L. Fàbrega, and D. Massaguer | Proceedings of the 34th Annual Simulation Symposium (SS 2001), Seattle, Washington, pp. 185-192 | April 2001 | Networking | |
| An Evaluation of TCP with Larger Initial Windows | M. Allman, C. Hayes, and S. Ostermann | ACM Computer Communication Review, Vol. 28, Issue 3 | July 1998 | Networking | |
| An Evaluation of XML-RPC | M. Allman | ACM Performance Evaluation Review, 30(4) | March 2003 | Networking | |
| An Examination of MBone Performance | M. Handley | USC/ISI Research Report: ISI/RR-97-450 | 1997 | Networking | |
| An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being Slow | E. Friedman, M. Shor, S. Shenker, and B. Sopher | Games and Economic Behavior, Vol. 47, Issue 2, pp. 325-352 | May 2004 | Networking | |
| An Extension to the Selective Acknowledgement (SACK) Option for TCP | S. Floyd, J. Mahdavi, M. Mathis, and M. Podolsky | Request for Comments 2883, Proposed Standard, July 2000. | July 2000 | Networking | |
| An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | J. Franklin, V. Paxson, A. Perrig, and S. Savage | Proceedings of ACM Computer and Communication Security Conference (ACM CCS), Alexandria, Virginia, pp. 375-388 | October 2007 | Networking | [PDF]
|
| An Intermittent Energy Internet Architecture | B. Raghavan, D. Irwin, J. Albrecht, J. Ma, and A. Streed | Proceedings of the Third International Conference on Future Energy Systems (e-Energy 2012), Madrid, Spain | May 2012 | Networking | [PDF]
|
| An Investigation of the Internet’s IP-Layer Connectivity | L. Tang, J. Li, Y. Li, and S. Shenker | Computer Communications, Vol. 32, No. 5, pp. 913-926 | March 2009 | Networking | |
| An Optimal Algorithm for Monte-Carlo Estimation | P. Dagum, R. M. Karp, M. Luby, and S. Ross | SIAM Journal of Computing, Vol. 29, No. 5, pp. 1484-1496 | 2000 | Networking | |
| Application-Level Multicast Using Content-Addressable Networks | S. Ratnasamy, M. Handley, R.M. Karp, and S. Shenker | Proceedings of Third International Workshop on Networked Group Communication, London, Nov 2001. | November 2001 | Networking | |
| Applying Fuzzy Logic to Model User Preferences on Multimedia Sessions | J.A. Botia, M. Valdes, P. M. Ruiz, and A.F. Gomez Skarmeta. | Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy, Jaen, Spain, pp. 467-470 | September 2005 | Networking | |
| Applying NOX to the Datacenter | A. Tavakoli, M. Casado, T. Koponen, and S. Shenker | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| Approximate Fair Allocation of Link Bandwidth | R. Pan, B. Prabhakar, L. Breslau, and S. Shenker | IEEE Micro Vol. 23, Issue 1, pp. 36-43 | 2003 | Networking | |
| Approximate fairness through differential dropping | R. Pan, L. Breslau, B. Prabhakar, and S. Shenker | Computer Communication Review, Vol. 33, Issue 2, pp. 23-39 | 2003 | Networking | |
| Approximation and Collusion in Multicast Cost Sharing | J. Feigenbaum, A. Krishnamurthy, R. Sami, and S. Shenker | Proceedings of the Third ACM Conference on Electronic Commerce (ACM-EE 2001), Tampa, Florida, pp. 253-255 | October 2001 | Networking | |
| Approximation and Collusion in Multicast Cost Sharing | J. Feigenbaum, A. Archer, A. Krishnamurthy, R. Sami, and S. Shenker | Games and Economic Behavior, Vol. 47, Issue 1, pp. 36-71 | April 2004 | Networking | [PDF]
|
| Aproximacion de Arboles Multicast Optimos en Redes Ad Hoc Inalambricas | P.M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Architectural Considerations for Playback of Quality Adaptive Video over the Internet | R. Rejaie, M. Handley, and D. Estrin | Technical report 98-686, Computer Science Department, University of Southern California | 1998 | Networking | |
| Attested Append-Only Memory: Making Adversaries Stick to their Word | B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz | Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, Washington, pp. 189-204 | October 2007 | Networking | [PDF]
|
| Automated Packet Trace Analysis of TCP Implementations | V. Paxson | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Cannes, France | September 1997 | Networking | |
| Automating Analysis of Large-Scale Botnet Probing Events | Z. Li, A. Goyal, Y. Chen, and V. Paxson | Proceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, pp. 11-22 | March 2009 | Networking | [PDF]
|
| Barter Trade Improves Message Delivery in Opportunistic Networks | L. Buttyan, L. Dora, M. Felegyhazi, and I. Vajda | Ad Hoc Networks, Vol. 8, Issue 1, pp. 1-14 | January 2010 | Networking | [PDF]
|
| Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets | R. Fonseca, S. Ratnasamy, J. Zhao, C. Tien Ee, D. Culler, S. Shenker, and I. Stoica | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 329-342 | May 2005 | Networking | [PDF]
|
| Best-Effort versus Reservations: A Simple Comparative Analysis | L. Breslau and S. Shenker | ACM Computer Communication Review, Vol. 28, pp. 3-16 | September 1998 | Networking | |
| Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-Reduce | J. Hendrik Boese, A. Andrzejak, and M. Hoegqvist | Proceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010), Raleigh, North Carolina, Article No. 3 | April 2010 | Networking | |