| User-Aware Adaptive Applications for Enhanced Multimedia Quality in Heterogeneous Networking Environments | P. M. Ruiz, J.A. Botia, and A.Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3079 | June 2004 | Networking | [PDF]
|
| Implementation and Evaluation of a Location-Aware Wireless Multi-Agent System | I. Nieto-Carvajal, J.A. Botia, P. M. Ruiz, and A. Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3207, pp. 528-537 | August 2004 | Networking | [PDF]
|
| User-Aware Videoconference Session Control Using Software Agents | J.A. Botia, P. Ruiz, and A. Gomez-Skarmeta | Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), Beijing, China | September 2004 | Networking | |
| Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al Encaminar | C.M. Yago, P. M. Ruiz, and A.F. Gomez Skarmeta | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Aproximacion de Arboles Multicast Optimos en Redes Ad Hoc Inalambricas | P.M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAM | A.F. Gomez Skarmeta and P.M. Ruiz | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Applying Fuzzy Logic to Model User Preferences on Multimedia Sessions | J.A. Botia, M. Valdes, P. M. Ruiz, and A.F. Gomez Skarmeta. | Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy, Jaen, Spain, pp. 467-470 | September 2005 | Networking | |
| Security Extensions to MMARP Through Cryptographically Generated Addresses | F.J. Galera, P.M. Ruiz, and A.F. Gomez Skarmeta | Lecture Notes on Informatics, Vol. P-68, pp. 339–343 | September 2005 | Networking | |
| Heuristic Algorithms for Minimum Bandwidth Consumption Multicast Trees in Wireless Mesh Networks | P.M. Ruiz and A.F. Gomez Skarmeta | Lecture Notes in Computer Science, Vol. 3738, pp. 258–270 | October 2005 | Networking | |
| Internet Connectivity for Mobile Ad Hoc Networks: Solutions and Challenges | P. M. Ruiz, F. J. Ros, and A.F. Gomez Skarmeta | IEEE Communications Magazine, pp. 118–125 | October 2005 | Networking | |
| Improving Delivery Ratio and Power Efficiency in Unicast Geographic Routing with a Realistic Physical Layer for Wireless Sensor Networks | J.A. Sanchez and P. M. Ruiz | Proceedings of the 9th Euromicro Conference on Digital System Design Architectures, Methods, and Tools (DSD 2006), Drubovnid, Croatia | September 2006 | Networking | |
| A Virtual Spanner for Efficient Face Routing in Multihop Wireless Networks | H. Tejeda, E. Chavez, J.A. Sanchez, and P. M. Ruiz | Lecture Notes in Computer Science, Vol. 4217, pp. 459–470 | September 2006 | Networking | |
| Energy-Efficient Routing on the Virtual Spanner | H. Tejeda, E. Chavez, J.A. Sanchez, and P. M. Ruiz | Lecture Notes in Computer Science, Vol. 4104, pp. 101–113 | July 2006 | Networking | |
| GMR: Geographic Multicast Routing for Wireless Sensor Networks | J.A. Sanchez, P. M. Ruiz, and I. Stojmenovic | Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Networks (IEEE SECON 2006), Reston, Virginia | September 2006 | Networking | |
| Securing Web Content | J. Koskela, N. Weaver, A. Gurtov, and M. Allman | Proceedings of the ACM CoNext Workshop on Re-Architecting the Internet (ReArch 2009), Rome, Italy, pp. 7-12 | December 2009 | Networking | [PDF]
|
| RFC 5681: TCP Congestion Control | M. Allman, V. Paxson, and E. Blanton | Request for Comments 5681, Proposed Standard | September 2009 | Networking | [PDF]
|
| Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-Engineering | J. Caballero, P. Poosankam, C. Kreibich, and D. Song | Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, Illinois, pp. 621-634 | November 2009 | Networking | [PDF]
|
| Securing Mediated Trace Access Using Black-Box Permutation Analysis | P. Mittal, V. Paxson, R. Sommer, and M. Winterrowd | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems | S. Nedevschi, J. Chandrashenkar, B. Nordman, S. Ratnasamy, and N. Taft | Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), Boston, Massachusetts, pp. 381-394 | April 2009 | Networking | [PDF]
|
| ICTD State of the Union: Where Have We Reached and Where Are We Headed? | S. Nedevschi, R. Patra, and J. Pal | Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2009), Doha, Qatar | April 2009 | Networking | [PDF]
|
| The "Dresden Image Database" for Benchmarking Digital Image Forensics | T. Gloe and R. Boehme | Proceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), pp. 1584-1590, Sierre, Switzerland | March 2010 | Networking | |
| Privacy in Online Social Lending | R. Boehme and S. Poetzsch | Proceedings of the AAAI 2010 Spring Symposium on Intelligent Information Privacy Management, Palo Alto, California, pp. 23-28 | March 2010 | Networking | [PDF]
|
| Botnet Judo: Fighting Spam with Itself | A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. Savage | Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, California | February 2010 | Networking | [PDF]
|
| A Longitudinal View of HTTP Traffic | T. Callahan, M. Allman, and V. Paxson | Proceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, Switzerland | April 2010 | Networking | [PDF]
|
| Web Timeouts and Their Implications | Z. Al-Qudah, M. Rabinovich, and M. Allman | Proceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, Switzerland | April 2010 | Networking | [PDF]
|
| The Iterated Weakest Link | R. Böhme and T. Moore | IEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55 | January 2010 | Networking | [PDF]
|
| Trained to Accept? A Field Experiment on Consent Dialogs | R. Boehme and S. Koepsell | Proceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406 | April 2010 | Networking | [PDF]
|
| DDoS Defense by Offense | M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker | ACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3 | March 2010 | Networking | [PDF]
|
| A Policy Framework for the Future Internet | A. Seehra, J. Naous, M. Walfish, D. Maziéres, A. Nicolosi, and S. Shenker | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| Outside the Closed World: On Using Machine Learning for Network Intrusion Detection | R. Sommer and V. Paxson | Proceedings of the IEEE Symposium on Security and Privacy 2010, Oakland, California, pp. 305-316 | May 2010 | Networking | [PDF]
|
| Rethinking Enterprise Network Control | M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. Gude, N. McKeown, and S. Shenker | IEEE/ACM Transactions on Networking, Vol. 17, No. 4, pp. 1270-1283 | August 2009 | Networking | [PDF]
|
| Practical Declarative Network Management | T. L. Hinrichs, N. S. Gude, M. Casado, J. C. Mitchell, and S. Shenker | Proceedings of the First ACM Workshop on Research on Enterprise Networking (WREN 2009), Barcelona, Spain, pp. 1-10. DOI:http://doi.acm.org/10.1145/1592681.1592683 | August 2009 | Networking | [PDF]
|
| Extending Networking into the Virtualization Layer | B. Pfaff, J. Pettit, K. Amidon, M. Casado, T. Koponen, and S. Shenker | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| An Investigation of the Internet’s IP-Layer Connectivity | L. Tang, J. Li, Y. Li, and S. Shenker | Computer Communications, Vol. 32, No. 5, pp. 913-926 | March 2009 | Networking | |
| Applying NOX to the Datacenter | A. Tavakoli, M. Casado, T. Koponen, and S. Shenker | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| Peer to Peer Edge Caches Should Be Free | N. Weaver | Proceedings of the 37th Research Conference on Communication, Information, and Internet Policy, Arlington, Virginia | September 2009 | Networking | [PDF]
|
| An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention | R. Sommer, N. Weaver, and V. Paxson | Concurrency and Computation: Practice and Experience, Vol. 21, Issue 10, pp. 1255-1279 | July 2009 | Networking | [PDF]
|
| Pathlet Routing | P. Godfrey, I. Ganichev, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2009), Barcelona, Spain, pp. 111-122 | August 2009 | Networking | [PDF]
|
| Insights from the Inside: A View of Botnet Management from Infiltration | C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song | Proceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, California | April 2010 | Networking | [PDF]
|
| On the Potential of Proactive Domain Blacklisting | M. Felegyhazi, C. Kreibich, and V. Paxson | Proceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, California | April 2010 | Networking | [PDF]
|
| A Preliminary Analysis of TCP Performance in an Enterprise Network | B. Nechaev, M. Allman, V. Paxson, and A. Gurtov | Proceedings of the 2010 Internet Network Management Workshop/Workshop on Research and Enterprise Networking (INM/WREN '10), San Jose, California | April 2010 | Networking | [PDF]
|
| The Role of Soft Information in Trust Building: Evidence from Online Social Lending | S. Poetzsch and R. Boehme | Proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST 2010), Berlin, Germany, pp. 381-395 | June 2010 | Networking | |
| Measuring Access Connectivity Characteristics with Netalyzr | N. Weaver, C. Kreibich, and V. Paxson | Presented at the meeting of the North American Network Operators' Group (NANOG49), San Francisco, California | June 2010 | Networking | [PDF]
|
| RFC 5827: Early Retransmit for TCP and SCTP | M. Allman, K. Avrachenkov, U. Ayesta, J. Blanton, and P. Hurtig | Request for Comments 5827, Experimental | April 2010 | Networking | [PDF]
|
| Modeling Cyber-Insurance: Towards a Unifying Framework | R. Boehme and G. Schwartz | Proceedings of the 9th Workshop on the Economics of Information Security (WEIS 2010), Cambridge, Massachusetts | June 2010 | Networking | [PDF]
|
| RFC 5690: Adding Acknowledgement Congestion Control to TCP | S. Floyd, A. Arcia, D. Ros, and J. Iyengar | Request for Comments 5690, Informational | February 2010 | Networking | [PDF]
|
| Incentive Compatibility and Dynamics of Congestion Control | P. B. Godfrey, M. Schapira, A. Zohar, and S. Shenker | ACM SIGMETRICS Performance Evaluation Review, Vol. 36, Issue 1, pp. 95-106 | June 2010 | Networking | [PDF]
|
| Cybercasing the Joint: On the Privacy Implications of Geotagging | G. Friedland and R. Sommer | Proceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C. | August 2010 | Networking | [PDF]
|
| Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-Reduce | J. Hendrik Boese, A. Andrzejak, and M. Hoegqvist | Proceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010), Raleigh, North Carolina, Article No. 3 | April 2010 | Networking | |
| Hardness Results for Multicast Cost Sharing | J. Feigenbaum, A. Krishnamurthy, R. Sami, and S. Shenker | Theoretical Computer Science, Vol. 304, Issues 1-3, pp. 215-236 | July 2003 | Networking | |