| RFC 3869: IAB Concerns & Recommendations Regarding Internet Research & Evolution | R. Atkinson and S. Floyd | RFC 3869 | August 2004 | Networking | [PDF]
|
| RFC 4336: Problem Statement for the Datagram Congestion Control Protocol (DCCP) | S. Floyd, M. Handley, and E. Kohler | RFC 4336, Informational | March 2006 | Networking | [PDF]
|
| RFC 4340: Datagram Congestion Control Protocol (DCCP) | E. Kohler, M. Handley, and S. Floyd | Request For Comments 4340, Proposed Standard | March 2006 | Networking | [PDF]
|
| RFC 4341: Profile for Datagram Congestion Control Protocol (DCCP) Congestion Control ID 2: TCP-like Congestion Control | S. Floyd and E. Kohler | Request For Comments 4341, Proposed Standard | March 2006 | Networking | [PDF]
|
| RFC 4342: Profile for Datagram Congestion Control Protocol (DCCP) Congestion Control ID 3: TCP-Friendly Rate Control (TFRC) | S. Floyd, E. Kohler, and J. Padhye | Request For Comments 4342, Proposed Standard | March 2006 | Networking | [PDF]
|
| RFC 4440: IAB Thoughts on the Role of the Internet Research Task Force (IRTF) | S. Floyd, V. Paxson, and A. Falk, editors | Request For Comments 4440 | March 2006 | Networking | [PDF]
|
| RFC 4653: Improving the Robustness of TCP to Non-Congestion Events | S. Bhandarkar, A.L.N. Reddy, M. Allman, and E. Blanton | Request for Comments 4653 (Experimental) | August 2006 | Networking | |
| RFC 4774: Specifying Alternate Semantics for the Explicit Congestion Notification (ECN) Field | S. Floyd | Request For Comments 4774, Best Current Practice | November 2006 | Networking | [PDF]
|
| RFC 4782 Quick-Start for TCP and IP | S. Floyd, M. Allman, A. Jain, and P. Sarolahti | Request For Comments 4782 | January 2007 | Networking | [PDF]
|
| RFC 4828: TCP Friendly Rate Control (TFRC): the Small-Packet (SP) Variant | S. Floyd and E. Kohler | RFC 4828, Experimental | April 2007 | Networking | [PDF]
|
| RFC 5166: Metrics for the Evaluation of Congestion Control Mechanisms | S. Floyd | RFC 5166, Information, March 2008 | March 2008 | Networking | [PDF]
|
| RFC 5290: Comments on the Usefulness of Simple Best-Effort Traffic | S. Floyd and M. Allman | Request for Comments 5290, Informational | July 2008 | Networking | [PDF]
|
| RFC 5562: Adding Explicit Congestion Notification (ECN) Capability to TCP's SYN/ACK Packets | A. Kuzmanovic, S. Floyd, and K. K. Ramakrishnan | Request for Comments 5562, Experimental | July 2009 | Networking | [PDF]
|
| RFC 5622: Profile for DCCP Congestion Control ID 4: TCP-Friendly Rate Control for Small Packets (TFRC-SP) | S. Floyd and E. Kohler | Request for Comments 5622, Experimental | August 2009 | Networking | [PDF]
|
| RFC 5681: TCP Congestion Control | M. Allman, V. Paxson, and E. Blanton | Request for Comments 5681, Proposed Standard | September 2009 | Networking | [PDF]
|
| RFC 5690: Adding Acknowledgement Congestion Control to TCP | S. Floyd, A. Arcia, D. Ros, and J. Iyengar | Request for Comments 5690, Informational | February 2010 | Networking | [PDF]
|
| RFC 5827: Early Retransmit for TCP and SCTP | M. Allman, K. Avrachenkov, U. Ayesta, J. Blanton, and P. Hurtig | Request for Comments 5827, Experimental | April 2010 | Networking | [PDF]
|
| Ripcord: A Modular Platform for Data Center Networking | B. Heller, D. Erickson, N. McKeown, R. Griffith, I. Ganichev, S. Whyte, K. Zarifis, D. Moon, S. Shenker, and S. Stuart | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2010), New Delhi, India, pp. 457-458 | August 2010 | Networking | [PDF]
|
| Robust TCP Reassembly in the Presence of Adversaries | S. Dharmapurikar and V. Paxson | Proceedings of the 14th Conference on USENIX Security Symposium (Security '05), Baltimore, Maryland, pp. 65-80 | August 2005 | Networking | [PDF]
|
| ROFL: Routing on Flat Labels | M. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 363-374 | September 2006 | Networking | [PDF]
|
| Route Flap Dampening Exacerbates Internet Routing Convergence | Z.M. Mao, R. Govindan, G. Varghese, and R. Katz | Proceedings of the ACM SIGCOMM 2002. | 2002 | Networking | |
| Routing Algorithms for DHTs: Some Open Questions | S. Ratnasamy, I. Stoica, and S. Shenker | The First International Workshop on Peer-to-Peer Systems (IPTPS): 45-52, 2002. | 2002 | Networking | |
| Routing Algorithms in DHTs: Some Open Questions | I. Stoica, D. Adkins, S. Ratnasamy, S. Surana, S. Shenker, and S. Zhuang | Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS) 2002, March 2002. | March 2002 | Networking | |
| Routing as a Service | K. Lakshminarayanan, I. Stoica, and S. Shenker | Proceedings of the Service Architecture for Heterogeneous Access, Resources, and Applications Retreat (SAHARA 2004), Tahoe City, California | January 2004 | Networking | [PDF]
|
| RR-TCP: A Reordering-Robust TCP with DSACK | M. Zhang, B. Karp, S. Floyd, and L. Peterson | ICSI Technical Report TR-02-006 | July 2002 | Networking | [PDF]
|
| SANE: A Protection Architecture for Enterprise Networks | M. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. Shenker | Proceedings of the 15th USENIX Security Symposium (Security '05), Vancouver, Canada, pp. 137–151 | August 2006 | Networking | [PDF]
|
| Satellite Network Performance Measurements Using Simulated Multi-User Internet Traffic | H. Kruse, M. Allman, J. Griner, S. Ostermann, and E. Helvey | Proceedings of the Seventh International Conference on Telecommunication Systems. March 1999. | March 1999 | Networking | |
| Scalable Session Messages in SRM | P. Sharma, D. Estrin, S. Floyd, and L. Zhang | Technical report | February 1998 | Networking | |
| Scalable Timers for Soft State Protocols | P. Sharma, D. Estrin, S. Floyd, and V. Jacobson | Proceedings of the Conference on Computer Communications, 16th Annual Joint Conference of the IEEE Computer and Communications Societies, Driving the Information Revolution (IEEE INFOCOM 1997), Kobe, Japan, pp. 222-229 | April 1997 | Networking | |
| Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling Law | G. Phillips, S. Shenker, and H. Tangmunarunkit | SIGCOMM, September 1999. | September 1999 | Networking | |
| Scaling Phenomena in the Internet: Critically Examining Criticality | W. Willinger, R. Govindan, S. Jamin, V. Paxson, and S. Shenker | Proceedings of National Academy of Science USA, Vol. 99, Suppl. 1, 2573-2580, February 19, 2002. | February 19 2002 | Networking | |
| Seamless Multimedia Communications in Heterogeneous Mobile Access Networks | P. M. Ruiz, J.A. Botia, A. Gomez-Skarmeta | Proceedings of the TERENA Networking Conference (TNC 2004), Rhodes, Greece | June 2004 | Networking | [PDF]
|
| Search and Replication in Unstructured Peer-to-Peer Networks | Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker | Proceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002), Marina Del Rey, California, pp. 258-259 | June 2002 | Networking | |
| Search and Replication in Unstructured Peer-to-Peer Networks | Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker | Proceedings of the 16th International Conference on Supercomputing (ICS-02), New York, New York, pp. 84-95 | June 2002 | Networking | [PDF]
|
| Search Strategies in Inter-Domain Traffic Engineering | K. Chandrayana, R.M. Karp, M. Roughan, S. Sen, and Y. Zhang | preprint 2004 | 2004 | Networking | |
| Secure Mobile Agent Systems Using Java - Where Are We Heading? | W. Binder and V. Roth | Proceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS), Madrid, Spain, March 2002. | March 2002 | Networking | |
| Securing Mediated Trace Access Using Black-Box Permutation Analysis | P. Mittal, V. Paxson, R. Sommer, and M. Winterrowd | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| Securing Web Content | J. Koskela, N. Weaver, A. Gurtov, and M. Allman | Proceedings of the ACM CoNext Workshop on Re-Architecting the Internet (ReArch 2009), Rome, Italy, pp. 7-12 | December 2009 | Networking | [PDF]
|
| Security Extensions to MMARP Through Cryptographically Generated Addresses | F.J. Galera, P.M. Ruiz, and A.F. Gomez Skarmeta | Lecture Notes on Informatics, Vol. P-68, pp. 339–343 | September 2005 | Networking | |
| Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities | G. Schryen | Proceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), San Francisco, California, paper 387 | August 2009 | Networking | [PDF]
|
| Self-similarity and Heavy Tails: Structural Modeling of Network Traffic | W. Willinger, V. Paxson, and M.S. Taqqu | A Practical Guide to Heavy Tails: Statistical Techniques and Applications, Adler, R., Feldman, R., and Taqqu, M.S., editors, Birkhauser | 1998 | Networking | |
| Self-Verifying CSFQ | I. Stoica, H. Zhang, and S. Shenker | INFOCOM, 2002. | 2002 | Networking | |
| Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCP | A. Akella, R.M. Karp, C. Papadimitriou, S. Seshan, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002), Pittsburgh, Pennsylvania | August 2002 | Networking | [PDF]
|
| Semantic-Free Referencing in Linked Distributed Systems | H. Balakrishnan, S. Shenker, and M. Walfish | Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, California | February 2003 | Networking | [PDF]
|
| Semi-Automated Discovery of Application Session Structure | J. Kannan, J. Jung, V. Paxson, and C. Koksal | Proceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 119-132 | October 2006 | Networking | [PDF]
|
| Service Portability: Why http Redirect is the Model for the Future | S. Singh, S. Shenker, and G. Varghese | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 49-54 | November 2006 | Networking | [PDF]
|
| Session Announcement Protocol | M. Handley, C. Perkins, E. Whelan | Request for Comments 2974, Experimental, October 2000. | October 2002 | Networking | |
| Session Directories and Scalable Internet Multicast Address Allocation | M. Handley | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM 98), September 1998, Vancouver, Canada | September 1998 | Networking | |
| Sharing the "cost" of multicast trees: An axiomatic analysis | S. Herzog, S. Shenker, and D. Estrin | IEEE/ACM Transactions on Networking, Vol. 5, pp. 847-860 | December 1997 | Networking | |
| Sharing the Cost of Multicast Transmissions | J. Feigenbaum, C. Papadimitriou, and S. Shenker | Journal of Computer and System Sciences, Vol. 63, Issue 1, pp. 21-41, 2001 | August 2001 | Networking | [PDF]
|