| The Stationarity of Internet Path Properties: Routing, Loss, and Throughput | Y. Zhang, V. Paxson, and S. Shenker | ACIRI Technical Report, May 2000. | May 2000 | Networking | |
| The Spread of the Sapphire/Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | The Cooperative Association for Internet Data Analysis Technical Report | February 2003 | Networking | |
| The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention | N. Weaver, V. Paxson, and J.M. Gonzalez | Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007), Monterey, California, pp. 199-206 | February 2007 | Networking | [PDF]
|
| The SFRA: A Corner-Turn FPGA Architecture | N. Weaver, J. Hauser and J. Wawrzynek | Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12 | February 2004 | Networking | [PDF]
|
| The Role of Soft Information in Trust Building: Evidence from Online Social Lending | S. Poetzsch and R. Boehme | Proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST 2010), Berlin, Germany, pp. 381-395 | June 2010 | Networking | |
| The Reliable Multicast Design Space for Bulk Data Transfer | M. Handley, S, Floyd, B. Whetten, R. Kermode, L. Vicisano, and M. Luby | Request for Comments 2887, Informational, August 2000. | August 2000 | Networking | |
| The Relationship Between Topology and Protocol Performance: Case Studies | P. Radoslavov | PhD Dissertation, Computer Science Department, University of Southern California, December 2001. | December 2001 | Networking | |
| The Origin of Power-Laws in Internet Topologies Revisited | Q. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger | INFOCOM, 2002. | 2002 | Networking | |
| The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware | M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney | Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007), Queensland, Australia | September 2007 | Networking | [PDF]
|
| The NewReno Modification to TCP's Fast Recovery Algorithm | S. Floyd and T. Henderson | Request for Comments 2582, Experimental, April 1999. | April 1999 | Networking | |
| The Network Oracle | J. Hellerstein, V. Paxson, L. Peterson, T. Roscoe, S. Shenker, and D. Wetherall | IEEE Data Engineering Bulletin, Vol. 28, No. 1, pp. 3-10 | March 2005 | Networking | [PDF]
|
| The Network Block Device | P. T. Breuer, A. Marín Lopez, and A. García Ares | Linux Journal, Vol. 73 | May 2000 | Networking | |
| The Multicast Address-Set Claim (MASC) Protocol | P. Radoslavov, D. Estrin, R. Govindan, M. Handley, S. Kumar, and D. Thaler | Request for Comments 2909, Experimental, September 2000. | September 2000 | Networking | |
| The MASC/BGMP Architecture for Inter-Domain Multicast Routing | S. Kumar, P. Radoslavov, D. Thaler, C. Alaettinoglu, D. Estrin, and M. Handley | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (SIGCOMM '98), Vancouver, British Columbia, Canada | August 1998 | Networking | |
| The Iterated Weakest Link | R. Böhme and T. Moore | IEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55 | January 2010 | Networking | [PDF]
|
| The Internet Under Crisis Conditions: Learning From September 11 | C. Partridge, P. Barford, D. Clark, S. Donelan, V. Paxson, J. Rexford, M. Vernon, J. Eisenberg, M. Blumenthal, D. Padgham, K. Batch, D. Drake, and J. Briscoe | Computer Science and Telecommunications Board, National Research Council, National Academy Press, Washington, DC | 2002 | Networking | [PDF]
|
| The Internet Multicast Address Allocation Architecture | D. Thaler, M. Handley, and D. Estrin | Request for Comments 2908, Informational, September 2000. | September 2000 | Networking | |
| The Importance of Trusting Beliefs Linked to the Corporate Website for Diffusion of Recruiting-Related Online Innovations | M. Bermudez-Edo, N. Hurtado-Torres, and J. A. Aragon-Correa | Information Technology and Management, Vol. 11, No. 4, pp. 177-189 | December 2010 | Networking | |
| The Impact of Routing Policy on Internet Paths | H. Tangmunarunkit, R. Govindan, S. Shenker, and D. Estrin | INFOCOM 2001: 736-742. | 2001 | Networking | |
| The Impact of DHT Routing Geometry on Resilience and Proximity | K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica | Proceedings of ACM SIGCOMM 2003, Karlruhe, Germany | August 2003 | Networking | |
| The Energy and Emergy of the Internet | B. Raghavan and J. Ma | Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, Massachusetts | November 2011 | Networking | [PDF]
|
| The Devil and Packet Trace Anonymization | R. Pang, M. Allman, V. Paxson, and J. Lee | Computer Communication Review, Vol. 36, Issue 1, pp. 29-38 | January 2006 | Networking | |
| The Design and Implementation of a Declarative Sensor Network System | D. Chu, L. Popa, A. Tavakoli, J. Hellerstein, P. Levis, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. EECS-2006-132, Berkeley, California | October 2006 | Networking | |
| The Datacenter Needs an Operating System | M. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. Stoica | Proceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| The Click Modular Router | E. Kohler | Ph.D. thesis, Massachusetts Institute of Technology, November 2000. | November 2000 | Networking | |
| The Click Modular Router | E. Kohler, R. Morris, B. Chen, J. Jannotti, and M.F. Kaashoek | ACM Transactions on Computer Systems 18 (3), August 2000, pages 263-297. | August 2000 | Networking | |
| The Click Modular Router | R. Morris, E. Kohler, J. Jannotti, and M.F. Kaashoek | Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles (SOSP '99) , Kiawah Island, South Carolina, December 1999, pages 217-231. | December 1999 | Networking | |
| The BIZ Top-Level Domain: Ten Years Later | T. Halvorson, J. Szurdi, G. Maier, M. Felegyhazi, C. Kreibich, N. Weaver, K. Levchenko, and V. Paxson | Proceedings of the 13th Passive and Active Measurement Conference, Vienna, Austria | March 2012 | Networking | [PDF]
|
| The Architecture of PIER: An Internet-Scale Query Processor | R. Huebsch, B. Chun, J. M. Hellerstein, B. T. Loo, P. Maniatis, T. Roscoe, S. Shenker, I. Stoica, and A. R. Yumerefendi | Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, California, pp. 28-43 | January 2005 | Networking | [PDF]
|
| The "Dresden Image Database" for Benchmarking Digital Image Forensics | T. Gloe and R. Boehme | Proceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), pp. 1584-1590, Sierre, Switzerland | March 2010 | Networking | |
| TCP Slow Start Survey: Standards and Issues | M. Allman | IETF Internet-Draft, Draft-ietf-tcpm-early-rexmt-00.txt, in progress | August 2008 | Networking | [PDF]
|
| TCP Processing of the IPv4 Precedence Field | X. Xiao, A. Hannan, V. Paxson, and E. Crabbe | Request for Comments 2873, Proposed Standard, June 2000. | June 2000 | Networking | |
| TCP Performance Over Satellite Links | M. Allman, C. Hayes, H. Kruse, and S. Ostermann | Proceedings of the Fifth International Conference on Telecommunications Systems, Nashville, Tennesseee | March 1997 | Networking | |
| TCP Fast Open | S. Radhakrishnan, Y. Cheng, J. Chu, A. Jain, and B. Raghavan | Proceedings of the 7th International Conference on emerging Network EXperiments and Technologies (ACM CoNEXT 2011), Tokyo, Japan | December 2011 | Networking | [PDF]
|
| TCP Congestion Window Validation | M. Handley, S. Floyd, and J. Padhye | Request for Comments 2861, Experimental, June 2000. | June 2000 | Networking | |
| TCP Congestion Window Validation | M. Handley, J. Padhye, and S. Floyd | Request for Comments 2861, Experimental, June 2000. Also UMass CMPSCI Technical Report No. 99-77, September 1999. | June 2000 | Networking | |
| TCP Congestion Control with Appropriate Byte Counting (ABC) | M. Allman | RFC 3465 | February 2003 | Networking | |
| TCP Congestion Control | M. Allman, V. Paxson, and W.R. Stevens | Request for Comments 2581, Proposed Standard, April 1999. | April 1999 | Networking | |
| TCP Byte Counting Refinements | M. Allman | ACM Computer Communication Review, 29(3), July 1999. | July 1999 | Networking | |
| TCP Behavior in Networks with Dynamic Propagation Delay | M. Allman, J. Griner, and A. Richard | Proceedings of Globecom 2000, November 2000. | November 2000 | Networking | |
| TCP and Explicit Congestion Notification | S. Floyd | ACM Computer Communication Review, Vol. 24, No. 5, pp. 10-23 | October 1994 | Networking | [PDF]
|
| Suspended Accounts in Retrospect: An Analysis of Twitter Spam | K. Thomas, C. Grier, V. Paxson, and D. Song | Proceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany | November 2011 | Networking | [PDF]
|
| Stress Testing Cluster Bro | N. Weaver and R. Sommer | Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007), Boston, Massachusetts | August 2007 | Networking | [PDF]
|
| Stream Control Transmission Protocol | R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson | Request for Comments 2960, Proposed Standard, October 2000. | October 2000 | Networking | |
| Strawman Specification for TCP Friendly (Reliable) Multicast Congestion Control (TFMCC) | M. Handley and S. Floyd | Reliable Multicast Research Group | December 1998 | Networking | |
| Strategies for Sound Internet Measurement | V. Paxson | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy | October 2004 | Networking | [PDF]
|
| Spurring Adoption of DHTs with OpenHash, a Public DHT Service | B. Karp, S. Ratnasamy, S. Rhea, and S. Shenker | Proceedings of the Third International Workshop on Peer-to-Peer Systems, San Diego, California | February 2004 | Networking | [PDF]
|
| Specifying New Congestion Control Algorithms | S. Floyd and M. Allman | Request For Comments 5033, Best Current Practice 133 | August 2007 | Networking | [PDF]
|
| Specification of guaranteed quality of service | S. Shenker, C. Partridge, and R. Guerin | Request for Comments (Proposed Standard) 2212, Internet Engineering Task Force | September 1997 | Networking | |
| Spark: Cluster Computing with Working Sets | M. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker and I. Stoica | Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, Massachusetts | June 2010 | Networking | [PDF]
|