Publication Search Results

TitleAuthorBibliographicsort ascendingDateGroupLinks
Towards a Framework for Defining Internet Performance MetricsV. PaxsonLBNL-38952June 20 1996Networking
Reflections on Measurement Research: Crooked Lines, Straight Lines, and MoneyshotsV. PaxsonKeynote talk at the ACM Special Interest Group on Data Communications Conference (SIGCOMM 2011), Toronto, CanadaAugust 2011Networking
On the Application of Formal Description Techniques to the Design of Interception Systems for GSM Mobile TerminalsM. J. Fernández, J. González, M. Llamas, J. M. Pousada, and J. ValesJournal of Systems and Software, Vol. 60, Issue 1, pp. 49-56January 2002Networking
Towards Insurable Network ArchitecturesR. BoehmeJournal of Information Technology, Vol. 52, No. 5, pp. 290-293September 2010Networking
Sharing the Cost of Multicast TransmissionsJ. Feigenbaum, C. Papadimitriou, and S. ShenkerJournal of Computer and System Sciences, Vol. 63, Issue 1, pp. 21-41, 2001August 2001Networking[PDF]

Algorithms for Optical MappingR.M. Karp and R. ShamirJournal of Computational Biology 7(1,2) 2000. 2000Networking
Mobility-Aware Mesh Construction Algorithm for Low Data-Overhead Multicast Ad Hoc RoutingP. M. Ruiz and A.F. Gomez SkarmetaJournal of Communications and Networks (JCN), Vol. 6, No. 4, pp. 331-342December 2004Networking[PDF]

Posted Price Profit Maximization for Multicast by Approximating Fixed PointsA. Mehta, S. Shenker, and V. VaziraniJournal of Algorithms, Vol. 58, Issue 2, pp. 150-164February 2006Networking
How the Pursuit of Truth Led Me to Selling ViagraV. PaxsonInvited talk at the USENIX Security Symposium, Montreal, CanadaAugust 2009Networking[PDF]

A History of the Improvement of Internet Protocols Over Satellites Using ACTSM. Allman, H. Kruse, and S. OstermannInvited paper for ACTS Conference 2000, May 2000.May 2000Networking
On Traffic Phase Effects in Packet-Switched GatewaysS. Floyd and V. JacobsonInternetworking: Research and Experience, Vol. 3, No. 3, pp. 115-156September 1992Networking[PDF]

Experimentation and Modeling of HTTP Over Satellite ChannelsH. Kruse, M. Allman, J. Griner, and D. TranInternational Journal of Satellite Communications, 19(1), January/February 2001.January 2001Networking
Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor NetworksF. Bian, X. Li, R. Govindan, and S. ShenkerInternational Journal of Ad Hoc and Ubiquitous Computing (special issue on wireless sensor networks), Vol. 1, No. 4, pp. 179-193January 2006Networking[PDF]

Range Queries Over DHTsS. Ratnasamy, J. M. Hellerstein, and S. ShenkerIntel Research Technical Report, IRB-TR-03-011June 25 2003Networking
The Importance of Trusting Beliefs Linked to the Corporate Website for Diffusion of Recruiting-Related Online InnovationsM. Bermudez-Edo, N. Hurtado-Torres, and J. A. Aragon-CorreaInformation Technology and Management, Vol. 11, No. 4, pp. 177-189December 2010Networking
The Origin of Power-Laws in Internet Topologies RevisitedQ. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. WillingerINFOCOM, 2002. 2002Networking
Self-Verifying CSFQI. Stoica, H. Zhang, and S. ShenkerINFOCOM, 2002. 2002Networking
The Impact of Routing Policy on Internet PathsH. Tangmunarunkit, R. Govindan, S. Shenker, and D. EstrinINFOCOM 2001: 736-742. 2001Networking
Comments on the Performance of Measurement-Based Admission Control AlgorithmsL. Breslau, S. Jamin, and S. ShenkerINFOCOM 2000, Tel Aviv, Israel, March 2000.March 2000Networking
Topologically-Aware Overlay Construction and Server SelectionS. Ratnasamy, M. Handley, R. M. Karp, and S. ShenkerINFOCOM 2002Networking
Data-Centric Storage in SensornetsS. Shenker, S. Ratnasamy, B. Karp, R. Govindan, and D. EstrinIn Workshop Record of the First Workshop on Hot Topics in Networks (HotNets-I), October 2002.October 2002Networking
Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large ClustersM. Zaharia, T. Das, H. Li, S. Shenker and I. StoicaIn the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MAJune 2012Networking[PDF]

Internet Topology: Discovery and Policy Impact, Parts I and IIH. Tangmunarunkit, R. Govindan, and S. ShenkerIn The Internet as a Large-Scale Complex System, K. Park and W. Willinger, eds., pp. 121-160, Oxford University Press 2005Networking[PDF]

Why We Don't Know How To Simulate The InternetV. Paxson and S. FloydIn Proceedings of the 1997 Winter Simulation ConferenceDecember 1997Networking
Empowering mobile software agentsV. RothIn N. Suri, editor, Proceedings 6th IEEE Mobile Agents Conference, volume 2535 of Lecture Notes in Computer Science, pages 47-63. Springer Verlag, October 2002.October 2002Networking
Very Fast Containment of Scanning Worms, RevisitedN. Weaver, S. Staniford, and V. PaxsonIn Malware Detection: Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, eds., pp. 113-145, Springer 2007Networking
From Complex Specifications to a Working Prototype: A Protocol Engineering Case StudyM. J. Fernández, J. González, J. M. Pousada, M. Llamas, and A. RomeroIn Lecture Notes in Computer Science, Vol. 2021, pp. 436-448, Springer Verlag 2001Networking
Distributed Algorithmic Mechanism DesignJ. Feigenbaum, M. Schapira, and S. ShenkerIn Algorithmic Game Theory, N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, eds., pp. 363-384, Cambridge University Press 2007Networking
TCP Slow Start Survey: Standards and IssuesM. AllmanIETF Internet-Draft, Draft-ietf-tcpm-early-rexmt-00.txt, in progressAugust 2008Networking[PDF]

Difficulties in Simulating the InternetS. Floyd and V. PaxsonIEEE/ACM Transactions on Networking, Vol.9, No.4, pp. 392-403. (An earlier version appeared in Proceedings of the 1997 Winter Simulation Conference, December 1997).August 2001Networking[PDF]

End-to-End Internet Packet DynamicsV. PaxsonIEEE/ACM Transactions on Networking, Vol.7, No.3, pp. 277-292, June 1999. An earlier version appeared in Proc. ACM SIGCOMM '97, September 1997, Cannes, France.June 1999Networking
Sharing the "cost" of multicast trees: An axiomatic analysisS. Herzog, S. Shenker, and D. EstrinIEEE/ACM Transactions on Networking, Vol. 5, pp. 847-860December 1997Networking
End-to-End Routing Behavior in the InternetV. PaxsonIEEE/ACM Transactions on Networking, Vol. 5, No. 5, pp. 601-615. An earlier version appeared in the proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '96), August 1996, Stanford, CaliforniaOctober 1997Networking
Link-sharing and Resource Management Models for Packet NetworksS. Floyd and V. JacobsonIEEE/ACM Transactions on Networking, Vol. 3, No. 4, pp. 365-386August 1995Networking[PDF]

Wide-Area Traffic: The Failure of Poisson ModelingV. Paxson and S. FloydIEEE/ACM Transactions on Networking, Vol. 3, No. 3, pp. 226-244June 1995Networking
Empirically-Derived Analytic Models of Wide-Area TCP ConnectionsV. PaxsonIEEE/ACM Transactions on Networking, Vol. 2, No. 4August 1994Networking
The Synchronization of Periodic Routing MessagesS. Floyd and V. JacobsonIEEE/ACM Transactions on Networking, Vol. 2, No. 2, pp. 122-136April 1994Networking[PDF]

Rethinking Enterprise Network ControlM. Casado, M. J. Freedman, J. Pettit, J. Luo, N. Gude, N. McKeown, and S. ShenkerIEEE/ACM Transactions on Networking, Vol. 17, No. 4, pp. 1270-1283August 2009Networking[PDF]

Observed Structure of Addresses in IP TrafficE. Kohler, J. Li, V. Paxson, and S. ShenkerIEEE/ACM Transactions on Networking, Vol. 14, No. 6, pp. 1207-1218December 2006Networking[PDF]

Incremental Deployment Strategies for Router-Assisted Reliable MulticastX. He, C. Papadopoulos, and P. RadoslavovIEEE/ACM Transactions on Networking, Vol. 14, Issue 4, pp. 779-792August 2006Networking
Network Loss Tomography Using Striped Unicast ProbesN. Duffield, F. Lo Presti, V. Paxson, and D. TowsleyIEEE/ACM Transactions on Networking, Vol. 14 Issue 4, pp. 697-710August 2006Networking[PDF]

Internet Indirection InfrastructureI. Stoica, D. Adkins, S. Zhaung, S. Shenker, and S. SuranaIEEE/ACM Transactions on Networking, Vol. 12, Issue 2, pp. 205-218April 2004Networking[PDF]

Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed NetworksI. Stoica, S. Shenker, and H. ZhangIEEE/ACM Transactions on Networking, Vol. 11, Issue 1, pp. 33-46. (A previous version appeared in the proceedings of the ACM's Special Interest Group on Data Communication (SIGCOMM'98), Vancouver, Canada, August 1998, pp. 118-130.)February 2003Networking[PDF]

Random Early Detection Gateways for Congestion AvoidanceS. Floyd and V. JacobsonIEEE/ACM Transactions on Networking, Vol. 1, No. 4, pp. 397-413August 1993Networking
A Reliable Multicast Framework for Light-weight Sessions and Application Level FramingS. Floyd, V. Jacobson, C. Liu, S. McCanne, and L. ZhangIEEE/ACM Transactions on Networking, December 1997, Vol. 5, No. 6, pp. 784-803. Also in the proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '95), August 1995, pp. 342-356December 1997Networking
Promoting the Use of End-to-End Congestion Control in the InternetS. Floyd and K. FallIEEE/ACM Transactions on Networking, August 1999. Winner of the Communications Society William R. Bennett Prize Paper Award, 1999.August 1999Networking
A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable MulticastP. Radoslavov, C. Papadopoulos, R. Govindan, and D. EstrinIEEE/ACM Transactions on Networking (TON), Volume 12, Issue 3, pp. 469-482June 05 2004Networking
Providing QoS through Machine Learning-Driven Adaptive Multimedia ApplicationsP. M. Ruiz, J. Botia, and A. Gomez-SkarmetaIEEE Transactions on Systems, Man, and Cybernetics, Part-B, Vol. 34, No. 3, pp. 1398-1422June 2004Networking
Towards Situational Awareness of Large-Scale Botnet Probing EventsZ. Li, A. Goyal, Y. Chen, and V. PaxsonIEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp. 175-188March 2011Networking[PDF]

The Iterated Weakest LinkR. Böhme and T. MooreIEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55January 2010Networking[PDF]

Pages