Publication Search Results

TitleAuthorBibliographicsort descendingDateGroupLinks
On the Performance of TCP-Based Data Transfers on a Faded Ka-Band Satellite LinkH. Kruse, S. Ostermann, and M. AllmanProceedings of the Sixth Ka-Band Utilization Conference, June 2000.June 2000Networking
On the Impact of Bursting on TCP PerformanceE. Blanton and M. AllmanProceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, MassachusettsMarch 2005Networking[PDF]

Building Efficient Wireless Sensor Networks With Low-Level NamingJ. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. GanesanProceedings of the Symposium on Operating Systems Principles, Banff, Canada, October 2001.October 2001Networking
Programming Language Optimizations for Modular Router ConfigurationsE. Kohler, R. Morris, and B. ChenProceedings of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, California, October 2002, pages 251-263.October 2002Networking
Seamless Multimedia Communications in Heterogeneous Mobile Access NetworksP. M. Ruiz, J.A. Botia, A. Gomez-SkarmetaProceedings of the TERENA Networking Conference (TNC 2004), Rhodes, GreeceJune 2004Networking[PDF]

Approximation and Collusion in Multicast Cost SharingJ. Feigenbaum, A. Krishnamurthy, R. Sami, and S. ShenkerProceedings of the Third ACM Conference on Electronic Commerce (ACM-EE 2001), Tampa, Florida, pp. 253-255October 2001Networking
A Unifying Link Abstraction for Wireless Sensor NetworksJ. Polastre, J. Hui, P. Levis, J. Zhao, D. Culler, S. Shenker, and I. StoicaProceedings of the Third ACM Conference on Embedded Networked Sensor Systems (Sensys 2005), San Diego, California, pp. 76-89November 2005Networking
Overcoming the Internet Impasse through VirtualizationL. Peterson, S. Shenker, and J.TurnerProceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

Towards a Next Generation Inter-domain Routing ProtocolL. Subramanian, M. Caesar, C. Tien Ee, M. Handley, Z. Morley Mao, S. Shenker, and I. StoicaProceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

Reduced State Routing in the InternetR. Gummadi, N. Kothari, Y.-J. Kim, R. Govindan, B. Karp, and S. ShenkerProceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

GMR: Geographic Multicast Routing for Wireless Sensor NetworksJ.A. Sanchez, P. M. Ruiz, and I. StojmenovicProceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Networks (IEEE SECON 2006), Reston, VirginiaSeptember 2006Networking
An Intermittent Energy Internet ArchitectureB. Raghavan, D. Irwin, J. Albrecht, J. Ma, and A. StreedProceedings of the Third International Conference on Future Energy Systems (e-Energy 2012), Madrid, SpainMay 2012Networking[PDF]

The Role of Soft Information in Trust Building: Evidence from Online Social LendingS. Poetzsch and R. BoehmeProceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST 2010), Berlin, Germany, pp. 381-395June 2010Networking
A Dynamic Multilevel MPLS Protection DomainE. Calle, T. Jové, P. Vilà, and J. L. MarzoProceedings of the Third International Workshop on Design of Reliable Communication Networks (DRCN 2001), Budapest, HungaryOctober 2001Networking
Spurring Adoption of DHTs with OpenHash, a Public DHT ServiceB. Karp, S. Ratnasamy, S. Rhea, and S. ShenkerProceedings of the Third International Workshop on Peer-to-Peer Systems, San Diego, CaliforniaFebruary 2004Networking[PDF]

Adaptive Web Caching: Towards a New Global Caching ArchitectureL. Zhang, S. Michel, K. Nguyen, A. Rosenstein, S. Floyd, and V. JacobsonProceedings of the Third International WWW Caching WorkshopJune 1998Networking
OCALA: An Architecture for Supporting Legacy Applications Over OverlaysD. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I. Stoica, and K. WehrleProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 267-280May 2006Networking[PDF]

Distributed Quota Enforcement for Spam ControlM. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 281-296May 2006Networking[PDF]

Practical Data-Centric StorageC. T. Ee, S. Ratnasamy, and S. ShenkerProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 325-338May 2006Networking[PDF]

The Datacenter Needs an Operating SystemM. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. StoicaProceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, OregonJune 2011Networking[PDF]

Principles for Developing Comprehensive Network VisibilityM. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. WeaverProceedings of the Third USENIX Workshop on Hot Topics in Security (HotSec ’08), San Jose, CaliforniaJuly 2008Networking[PDF]

Insights from the Inside: A View of Botnet Management from InfiltrationC. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. SongProceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, CaliforniaApril 2010Networking[PDF]

On the Potential of Proactive Domain BlacklistingM. Felegyhazi, C. Kreibich, and V. PaxsonProceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, CaliforniaApril 2010Networking[PDF]

Towards an Economic Analysis of Trusted Systems (Position Paper)D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. SmithProceedings of the Third Workshop on Economics and Information Security, Minneapolis, MinnesotaMay 2004Networking[PDF]

Providing Packet ObituariesK. Argyraki, P. Maniatis, D. Cheriton, and Scott ShenkerProceedings of the Third Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

Gatekeeper: Supporting Bandwidth Guarantees for Multi-Tenant Datacenter NetworksH. Rodrigues, J.R. Santos, Y. Turner, P. Soares, and D. GuedesProceedings of the Third Workshop on I/O Virtualization (WIOV '11), Portland, OregonJune 2011Networking[PDF]

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted SystemsL. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. StoicaProceedings of the USENIX Annual Technical Conference (ATC), Boston, MAJune 2012Networking[PDF]

Diverse Replication for Single-Machine Byzantine-Fault ToleranceB.-C. Chun, P. Maniatis, and S. ShenkerProceedings of the USENIX Annual Technical Conference, Boston, Massachusetts, pp. 287-292June 2008Networking[PDF]

Brooery: A Graphical Environment for Analysis of Security-Relevant Network ActivityC. KreibichProceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118April 2005Networking[PDF]

On Controller Performance in Software-Defined NetworksA. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and R. SherwoodProceedings of the USENIX NSDI Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), San Jose, CaliforniaApril 2012Networking[PDF]

Hedera: Dynamic Flow Scheduling for Data Center NetworksM. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. VahdatProceedings of the USENIX/ACM SIGCOMM Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CaliforniaApril 2010Networking[PDF]

Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al EncaminarC.M. Yago, P. M. Ruiz, and A.F. Gomez SkarmetaProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Aproximacion de Arboles Multicast Optimos en Redes Ad Hoc InalambricasP.M. Ruiz and A.F. Gomez SkarmetaProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAMA.F. Gomez Skarmeta and P.M. RuizProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Towards Engineering a Location-Aware Wireless Multi-Agent SystemI. Nieto-Cavajal, P. M. Ruiz, J.A. Botia, and A.F. Gomez-SkarmetaProceedings of the Workshop on Applications of Software Agents in Engineering at the 16th European Conference on Artificial Intelligence (ECAI 2004), Valencia, SpainAugust 2004Networking
Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in EstoniaG. SchryenProceedings of the Workshop on e-Business (WEB 2008), Paris, France, pp. 37-50December 2008Networking[PDF]

Competitive Cyber-Insurance and Internet SecurityN. Shetty, G. Schwartz. M. Felegyhazi, and J. WalrandProceedings of the Workshop on Economics of Information Security (WEIS 2009), London, United KingdomJune 2009Networking[PDF]

Logically Centralized? State Distribution Tradeoffs in Software Defined NetworksD. Levin, A. Wundsam, B. Heller, N. Handigol, and A. FeldmannProceedings of the Workshop on Hot Topics in Software Defined Networks (HotSDN '12) at ACM SIGCOMM 2012, Helsinki, FinlandAugust 2012Networking[PDF]

Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-ReduceJ. Hendrik Boese, A. Andrzejak, and M. HoegqvistProceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010), Raleigh, North Carolina, Article No. 3April 2010Networking
NS-3 Project GoalsT. Henderson, S. Roy, S. Floyd, and G. RileyProceedings of the Workshop on NS-2 (WNS2 2006), Pisa, Italy, article 13October 2006Networking[PDF]

Hot Data Centers vs. Cool PeersS. Nedevschi, S. Ratnasamy, and J. PadhyeProceedings of the Workshop on Power Aware Computing and Systems (HotPower '09), Big Sky, Montana, p. 8October 2009Networking[PDF]

Virtualizing the Network Forwarding PlaneM. Casado, T. Koponen, R. Ramanathan, and S. ShenkerProceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO 2010), Philadelphia, PennsylvaniaDecember 2010Networking[PDF]

Applying Fuzzy Logic to Model User Preferences on Multimedia SessionsJ.A. Botia, M. Valdes, P. M. Ruiz, and A.F. Gomez Skarmeta.Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy, Jaen, Spain, pp. 467-470September 2005Networking
A Worst-Case WormN. Weaver and V. PaxsonProceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, MinnesotaMay 2004Networking[PDF]

Application-Level Multicast Using Content-Addressable NetworksS. Ratnasamy, M. Handley, R.M. Karp, and S. ShenkerProceedings of Third International Workshop on Networked Group Communication, London, Nov 2001.November 2001Networking
Stress Testing Cluster BroN. Weaver and R. SommerProceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007), Boston, MassachusettsAugust 2007Networking[PDF]

Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML)M. Handley, C. Kreibich, and V. PaxsonProceedings of USENIX Security Symposium 2001. 2001Networking
The Strengths of Weaker Identities: Opportunistic PersonasM. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. WeaverProceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, MassachusettsAugust 2007Networking[PDF]

What Ought a Program Committee to Do?M. AllmanProceedings of USENIX Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems (WOWCS), San Francisco, CaliforniaApril 2008Networking[PDF]

Jellyfish: Networking Data Centers RandomlyA. Singla, C.-Y. Hong, L. Popa, and P. Brighten GodfreyProceedings the Third USENIX Workshop on Hot Topics in Cloud Computing (USENIX HotCloud ‘11), Portland, OregonJune 2011Networking[PDF]

Pages