| Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection | H. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. Sommer | Proceedings of the 15th USENIX Security Symposium (Security '06), Vancouver, Canada | August 2006 | Networking | [PDF]
|
| Towards Capturing Representative AS-level Internet Topologies | H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger | SIGMETRICS 2002: 280-281. | 2002 | Networking | |
| Off by Default | H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. Shenker | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| Peering Peer-to-Peer Providers | H. Balakrishnan, S. Shenker, and M. Walfish | Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 104-114 | February 2005 | Networking | [PDF]
|
| Semantic-Free Referencing in Linked Distributed Systems | H. Balakrishnan, S. Shenker, and M. Walfish | Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, California | February 2003 | Networking | [PDF]
|
| A Layered Naming Architecture for the Internet | H. Balakrishnan, K. Lakshminaryanan, S. Ratnasamy, S. Shenker, I. Stoica, and M. Walfish | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2004), Portland, Oregon | August 2004 | Networking | [PDF]
|
| Open Source vs. Closed Source Software: Towards Measuring Security | G. Schryen and R. Kadura | Proceedings of the 24th Annual ACM Symposium on Applied Computing (SAC 2009), Honolulu, Hawaii, pp. 2016-2023 | March 2009 | Networking | [PDF]
|
| Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia | G. Schryen | Proceedings of the Workshop on e-Business (WEB 2008), Paris, France, pp. 37-50 | December 2008 | Networking | [PDF]
|
| Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities | G. Schryen | Proceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), San Francisco, California, paper 387 | August 2009 | Networking | [PDF]
|
| A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors | G. Schryen | Proceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics (IMF 2009), Stuttgart, Germany, pp. 153-168 | September 2009 | Networking | [PDF]
|
| Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling Law | G. Phillips, S. Shenker, and H. Tangmunarunkit | SIGCOMM, September 1999. | September 1999 | Networking | |
| Enriching Network Security Analysis with Time Travel | G. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson, and F. Schneider | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 183-194 | August 2008 | Networking | [PDF]
|
| NAT Usage in Residential Broadband Networks | G. Maier, F. Schneider, and A. Feldmann | Proceedings of the 12th International Conference on Passive and Active Network Measurement (PAM 2011), Atlanta, Georgia | March 2011 | Networking | [PDF]
|
| A First Look at Mobile Hand-held Device Traffic | G. Maier, F. Schneider, and A. Feldmann | Proceedings of the 11th International Conference on Passive and Active Network Measurement (PAM 2010), Zurich, Switzerland, pp. 161-170 | April 2010 | Networking | [PDF]
|
| An Assessment of Overt Malicious Activity Manifest in Residential Networks | G. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. Vallentin | Proceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp 144-163 | July 2011 | Networking | [PDF]
|
| On Dominant Characteristics of Residential Broadband Internet Traffic | G. Maier, A. Feldmann, V. Paxson, and M. Allman | Proceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 90-102 | November 2009 | Networking | [PDF]
|
| Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy | G. Friedland, G. Maier, R. Sommer, and N. Weaver | Proceedings of the New Security Paradigms Workshop (NSPW), Marin County, California | September 2011 | Networking | [PDF]
|
| Cybercasing the Joint: On the Privacy Implications of Geotagging | G. Friedland and R. Sommer | Proceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C. | August 2010 | Networking | [PDF]
|
| Disk-Locality in Datacenter Computing Considered Irrelevant | G. Anantharayanan, A. Ghodsi, S. Shenker, and I. Stoica | Proceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), Napa, California | May 2011 | Networking | [PDF]
|
| Enabling Innovation Below the Communication API | G. Ananthanarayanan, K. Heimerl, M. Zaharia, M. Demmer, T. Koponen, A. Tavakoli, S. Shenker, and I. Stoica | UC Berkeley Technical Report, UCB/EECS-2009-141 | October 2009 | Networking | [PDF]
|
| Effective Straggler Mitigation: Attack of the Clones | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | To appear in the Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’13), Lombard, Illinois | April 2013 | Networking | |
| Why Let Resources Idle? Aggressive Cloning of Jobs with Dolly | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), Boston, Massachusetts | June 2012 | Networking | [PDF]
|
| PACMan: Coordinated Memory Caching for Parallel Jobs | G. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, California | April 2012 | Networking | [PDF]
|
| Security Extensions to MMARP Through Cryptographically Generated Addresses | F.J. Galera, P.M. Ruiz, and A.F. Gomez Skarmeta | Lecture Notes on Informatics, Vol. P-68, pp. 339–343 | September 2005 | Networking | |
| Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor Networks | F. Bian, X. Li, R. Govindan, and S. Shenker | International Journal of Ad Hoc and Ubiquitous Computing (special issue on wireless sensor networks), Vol. 1, No. 4, pp. 179-193 | January 2006 | Networking | [PDF]
|
| The Click Modular Router | E. Kohler, R. Morris, B. Chen, J. Jannotti, and M.F. Kaashoek | ACM Transactions on Computer Systems 18 (3), August 2000, pages 263-297. | August 2000 | Networking | |
| Modular Components for Network Address Translation | E. Kohler, R. Morris, and M. Poletto | Proceedings of the Fifth International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50.Proceedings of the 5th International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50. | June 2002 | Networking | |
| Programming Language Optimizations for Modular Router Configurations | E. Kohler, R. Morris, and B. Chen | Proceedings of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, California, October 2002, pages 251-263. | October 2002 | Networking | |
| A Readable TCP in the Prolac Protocol Language | E. Kohler, M.F. Kaashoek, and D.R. Montgomery | Proceedings of the ACM SIGCOMM '99 Conference: Applications, Technologies, Architectures, and Protocols for Computer Communication, Cambridge, Massachusetts, August 1999, pages 3-13. | August 1999 | Networking | |
| Designing DCCP: Congestion Control Without Reliability | E. Kohler, M. Handley, and S. Floyd | May 2003 | May 2003 | Networking | [PDF]
|
| RFC 4340: Datagram Congestion Control Protocol (DCCP) | E. Kohler, M. Handley, and S. Floyd | Request For Comments 4340, Proposed Standard | March 2006 | Networking | [PDF]
|
| Designing DCCP: Congestion Control Without Reliability | E. Kohler, M. Handley, and S. Floyd | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 27-38 | September 2006 | Networking | [PDF]
|
| Evolving Software with an Application-Specific Language | E. Kohler, M, Poletto, and D.R. Montgomery | Workshop Record of WCSSS '99: The 2nd ACM SIGPLAN Workshop on Compiler Support for Systems Software, Atlanta, Georgia, May 1999, pages 94-102. | May 1999 | Networking | |
| Observed Structure of Addresses in IP Traffic | E. Kohler, J. Li, V. Paxson, and S. Shenker | Proceedings of ACM SIGCOMM Internet Measurement Workshop, November 2002. Also in Proceedings of the 2nd Internet Measurement Workshop (IMW) 2002. | November 2002 | Networking | |
| Observed Structure of Addresses in IP Traffic | E. Kohler, J. Li, V. Paxson, and S. Shenker | IEEE/ACM Transactions on Networking, Vol. 14, No. 6, pp. 1207-1218 | December 2006 | Networking | [PDF]
|
| Programming Language Techniques for Modular Router Configurations | E. Kohler, B. Chen, M.F. Kaashoek, R. Morris, and M. Poletto | MIT Laboratory for Computer Science technical report MIT-LCS-TR-812, August 2000. | August 2000 | Networking | |
| The Click Modular Router | E. Kohler | Ph.D. thesis, Massachusetts Institute of Technology, November 2000. | November 2000 | Networking | |
| Prolac: a language for protocol compilation | E. Kohler | Master's thesis, Massachusetts Institute of Technology | September 1997 | Networking | |
| An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being Slow | E. Friedman, M. Shor, S. Shenker, and B. Sopher | Games and Economic Behavior, Vol. 47, Issue 2, pp. 325-352 | May 2004 | Networking | |
| Replication Strategies in Unstructured Peer-to-Peer Networks | E. Cohen and S. Shenker | Proceedings ACM SIGCOMM 2002. | 2002 | Networking | |
| A Dynamic Multilevel MPLS Protection Domain | E. Calle, T. Jové, P. Vilà, and J. L. Marzo | Proceedings of the Third International Workshop on Design of Reliable Communication Networks (DRCN 2001), Budapest, Hungary | October 2001 | Networking | |
| A Conservative Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm for TCP | E. Blanton, M. Allman, K. Fall, and L. Wang | RFC 3517 | April 2003 | Networking | |
| RFC 3708: Using TCP DSACKs and SCTP Duplicate TSNs to Detect Spurious Retransmissions | E. Blanton and M. Allman | Request for Comments 3708, Experimental | February 2004 | Networking | [PDF]
|
| On the Impact of Bursting on TCP Performance | E. Blanton and M. Allman | Proceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, Massachusetts | March 2005 | Networking | [PDF]
|
| On Making TCP More Robust to Packet Reordering | E. Blanton and M. Allman | ACM Computer Communication Review, 32(1), January 2002. | January 2002 | Networking | |
| The Internet Multicast Address Allocation Architecture | D. Thaler, M. Handley, and D. Estrin | Request for Comments 2908, Informational, September 2000. | September 2000 | Networking | |
| On the Aggregatability of Multicast Forwarding State | D. Thaler and M. Handley | Proceedings of Infocom 2000. | 2000 | Networking | |
| Inside the Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | IEEE Magazine of Security and Privacy, Vol. 1, Issue 4, pp. 33-39 | July 2003 | Networking | [PDF]
|
| The Spread of the Sapphire/Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | The Cooperative Association for Internet Data Analysis Technical Report | February 2003 | Networking | |
| Rethinking Packet Forwarding Hardware | D. Moon, M. Casado, T. Koponen, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 1-6 | October 2008 | Networking | [PDF]
|