Publication Search Results

TitleAuthorsort ascendingBibliographicDateGroupLinks
Dynamic Application-Layer Protocol Analysis for Network Intrusion DetectionH. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. SommerProceedings of the 15th USENIX Security Symposium (Security '06), Vancouver, CanadaAugust 2006Networking[PDF]

Towards Capturing Representative AS-level Internet TopologiesH. Chang, R. Govindan, S. Jamin, S. Shenker, and W. WillingerSIGMETRICS 2002: 280-281. 2002Networking
Off by DefaultH. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. ShenkerProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

Peering Peer-to-Peer ProvidersH. Balakrishnan, S. Shenker, and M. WalfishProceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 104-114February 2005Networking[PDF]

Semantic-Free Referencing in Linked Distributed SystemsH. Balakrishnan, S. Shenker, and M. WalfishProceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, CaliforniaFebruary 2003Networking[PDF]

A Layered Naming Architecture for the InternetH. Balakrishnan, K. Lakshminaryanan, S. Ratnasamy, S. Shenker, I. Stoica, and M. WalfishProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2004), Portland, OregonAugust 2004Networking[PDF]

Open Source vs. Closed Source Software: Towards Measuring SecurityG. Schryen and R. KaduraProceedings of the 24th Annual ACM Symposium on Applied Computing (SAC 2009), Honolulu, Hawaii, pp. 2016-2023March 2009Networking[PDF]

Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in EstoniaG. SchryenProceedings of the Workshop on e-Business (WEB 2008), Paris, France, pp. 37-50December 2008Networking[PDF]

Security of Open Source and Closed Source Software: An Empirical Comparison of Published VulnerabilitiesG. SchryenProceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), San Francisco, California, paper 387August 2009Networking[PDF]

A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software VendorsG. SchryenProceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics (IMF 2009), Stuttgart, Germany, pp. 153-168September 2009Networking[PDF]

Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling LawG. Phillips, S. Shenker, and H. TangmunarunkitSIGCOMM, September 1999.September 1999Networking
Enriching Network Security Analysis with Time TravelG. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson, and F. SchneiderProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 183-194August 2008Networking[PDF]

NAT Usage in Residential Broadband NetworksG. Maier, F. Schneider, and A. FeldmannProceedings of the 12th International Conference on Passive and Active Network Measurement (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

A First Look at Mobile Hand-held Device TrafficG. Maier, F. Schneider, and A. FeldmannProceedings of the 11th International Conference on Passive and Active Network Measurement (PAM 2010), Zurich, Switzerland, pp. 161-170April 2010Networking[PDF]

An Assessment of Overt Malicious Activity Manifest in Residential NetworksG. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. VallentinProceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp 144-163July 2011Networking[PDF]

On Dominant Characteristics of Residential Broadband Internet TrafficG. Maier, A. Feldmann, V. Paxson, and M. AllmanProceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 90-102November 2009Networking[PDF]

Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online PrivacyG. Friedland, G. Maier, R. Sommer, and N. WeaverProceedings of the New Security Paradigms Workshop (NSPW), Marin County, CaliforniaSeptember 2011Networking[PDF]

Cybercasing the Joint: On the Privacy Implications of GeotaggingG. Friedland and R. SommerProceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C.August 2010Networking[PDF]

Disk-Locality in Datacenter Computing Considered IrrelevantG. Anantharayanan, A. Ghodsi, S. Shenker, and I. StoicaProceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), Napa, CaliforniaMay 2011Networking[PDF]

Enabling Innovation Below the Communication APIG. Ananthanarayanan, K. Heimerl, M. Zaharia, M. Demmer, T. Koponen, A. Tavakoli, S. Shenker, and I. StoicaUC Berkeley Technical Report, UCB/EECS-2009-141October 2009Networking[PDF]

Effective Straggler Mitigation: Attack of the ClonesG. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. StoicaTo appear in the Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’13), Lombard, IllinoisApril 2013Networking
Why Let Resources Idle? Aggressive Cloning of Jobs with DollyG. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. StoicaProceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), Boston, MassachusettsJune 2012Networking[PDF]

PACMan: Coordinated Memory Caching for Parallel JobsG. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. StoicaProceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, CaliforniaApril 2012Networking[PDF]

Security Extensions to MMARP Through Cryptographically Generated AddressesF.J. Galera, P.M. Ruiz, and A.F. Gomez SkarmetaLecture Notes on Informatics, Vol. P-68, pp. 339–343September 2005Networking
Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor NetworksF. Bian, X. Li, R. Govindan, and S. ShenkerInternational Journal of Ad Hoc and Ubiquitous Computing (special issue on wireless sensor networks), Vol. 1, No. 4, pp. 179-193January 2006Networking[PDF]

The Click Modular RouterE. Kohler, R. Morris, B. Chen, J. Jannotti, and M.F. KaashoekACM Transactions on Computer Systems 18 (3), August 2000, pages 263-297.August 2000Networking
Modular Components for Network Address TranslationE. Kohler, R. Morris, and M. PolettoProceedings of the Fifth International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50.Proceedings of the 5th International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50.June 2002Networking
Programming Language Optimizations for Modular Router ConfigurationsE. Kohler, R. Morris, and B. ChenProceedings of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, California, October 2002, pages 251-263.October 2002Networking
A Readable TCP in the Prolac Protocol LanguageE. Kohler, M.F. Kaashoek, and D.R. MontgomeryProceedings of the ACM SIGCOMM '99 Conference: Applications, Technologies, Architectures, and Protocols for Computer Communication, Cambridge, Massachusetts, August 1999, pages 3-13.August 1999Networking
Designing DCCP: Congestion Control Without ReliabilityE. Kohler, M. Handley, and S. FloydMay 2003May 2003Networking[PDF]

RFC 4340: Datagram Congestion Control Protocol (DCCP)E. Kohler, M. Handley, and S. FloydRequest For Comments 4340, Proposed StandardMarch 2006Networking[PDF]

Designing DCCP: Congestion Control Without ReliabilityE. Kohler, M. Handley, and S. FloydProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 27-38September 2006Networking[PDF]

Evolving Software with an Application-Specific LanguageE. Kohler, M, Poletto, and D.R. MontgomeryWorkshop Record of WCSSS '99: The 2nd ACM SIGPLAN Workshop on Compiler Support for Systems Software, Atlanta, Georgia, May 1999, pages 94-102.May 1999Networking
Observed Structure of Addresses in IP TrafficE. Kohler, J. Li, V. Paxson, and S. ShenkerProceedings of ACM SIGCOMM Internet Measurement Workshop, November 2002. Also in Proceedings of the 2nd Internet Measurement Workshop (IMW) 2002.November 2002Networking
Observed Structure of Addresses in IP TrafficE. Kohler, J. Li, V. Paxson, and S. ShenkerIEEE/ACM Transactions on Networking, Vol. 14, No. 6, pp. 1207-1218December 2006Networking[PDF]

Programming Language Techniques for Modular Router ConfigurationsE. Kohler, B. Chen, M.F. Kaashoek, R. Morris, and M. PolettoMIT Laboratory for Computer Science technical report MIT-LCS-TR-812, August 2000.August 2000Networking
The Click Modular RouterE. KohlerPh.D. thesis, Massachusetts Institute of Technology, November 2000.November 2000Networking
Prolac: a language for protocol compilationE. KohlerMaster's thesis, Massachusetts Institute of TechnologySeptember 1997Networking
An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being SlowE. Friedman, M. Shor, S. Shenker, and B. SopherGames and Economic Behavior, Vol. 47, Issue 2, pp. 325-352May 2004Networking
Replication Strategies in Unstructured Peer-to-Peer NetworksE. Cohen and S. ShenkerProceedings ACM SIGCOMM 2002. 2002Networking
A Dynamic Multilevel MPLS Protection DomainE. Calle, T. Jové, P. Vilà, and J. L. MarzoProceedings of the Third International Workshop on Design of Reliable Communication Networks (DRCN 2001), Budapest, HungaryOctober 2001Networking
A Conservative Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm for TCPE. Blanton, M. Allman, K. Fall, and L. WangRFC 3517April 2003Networking
RFC 3708: Using TCP DSACKs and SCTP Duplicate TSNs to Detect Spurious RetransmissionsE. Blanton and M. AllmanRequest for Comments 3708, ExperimentalFebruary 2004Networking[PDF]

On the Impact of Bursting on TCP PerformanceE. Blanton and M. AllmanProceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, MassachusettsMarch 2005Networking[PDF]

On Making TCP More Robust to Packet ReorderingE. Blanton and M. AllmanACM Computer Communication Review, 32(1), January 2002.January 2002Networking
The Internet Multicast Address Allocation ArchitectureD. Thaler, M. Handley, and D. EstrinRequest for Comments 2908, Informational, September 2000.September 2000Networking
On the Aggregatability of Multicast Forwarding StateD. Thaler and M. HandleyProceedings of Infocom 2000. 2000Networking
Inside the Slammer WormD. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. WeaverIEEE Magazine of Security and Privacy, Vol. 1, Issue 4, pp. 33-39July 2003Networking[PDF]

The Spread of the Sapphire/Slammer WormD. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. WeaverThe Cooperative Association for Internet Data Analysis Technical ReportFebruary 2003Networking
Rethinking Packet Forwarding HardwareD. Moon, M. Casado, T. Koponen, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 1-6October 2008Networking[PDF]

Pages