| Towards a Framework for Defining Internet Performance Metrics | V. Paxson | LBNL-38952 | June 20 1996 | Networking | |
| Reflections on Measurement Research: Crooked Lines, Straight Lines, and Moneyshots | V. Paxson | Keynote talk at the ACM Special Interest Group on Data Communications Conference (SIGCOMM 2011), Toronto, Canada | August 2011 | Networking | |
| On the Application of Formal Description Techniques to the Design of Interception Systems for GSM Mobile Terminals | M. J. Fernández, J. González, M. Llamas, J. M. Pousada, and J. Vales | Journal of Systems and Software, Vol. 60, Issue 1, pp. 49-56 | January 2002 | Networking | |
| Towards Insurable Network Architectures | R. Boehme | Journal of Information Technology, Vol. 52, No. 5, pp. 290-293 | September 2010 | Networking | |
| Sharing the Cost of Multicast Transmissions | J. Feigenbaum, C. Papadimitriou, and S. Shenker | Journal of Computer and System Sciences, Vol. 63, Issue 1, pp. 21-41, 2001 | August 2001 | Networking | [PDF]
|
| Algorithms for Optical Mapping | R.M. Karp and R. Shamir | Journal of Computational Biology 7(1,2) 2000. | 2000 | Networking | |
| Mobility-Aware Mesh Construction Algorithm for Low Data-Overhead Multicast Ad Hoc Routing | P. M. Ruiz and A.F. Gomez Skarmeta | Journal of Communications and Networks (JCN), Vol. 6, No. 4, pp. 331-342 | December 2004 | Networking | [PDF]
|
| Posted Price Profit Maximization for Multicast by Approximating Fixed Points | A. Mehta, S. Shenker, and V. Vazirani | Journal of Algorithms, Vol. 58, Issue 2, pp. 150-164 | February 2006 | Networking | |
| How the Pursuit of Truth Led Me to Selling Viagra | V. Paxson | Invited talk at the USENIX Security Symposium, Montreal, Canada | August 2009 | Networking | [PDF]
|
| A History of the Improvement of Internet Protocols Over Satellites Using ACTS | M. Allman, H. Kruse, and S. Ostermann | Invited paper for ACTS Conference 2000, May 2000. | May 2000 | Networking | |
| On Traffic Phase Effects in Packet-Switched Gateways | S. Floyd and V. Jacobson | Internetworking: Research and Experience, Vol. 3, No. 3, pp. 115-156 | September 1992 | Networking | [PDF]
|
| Experimentation and Modeling of HTTP Over Satellite Channels | H. Kruse, M. Allman, J. Griner, and D. Tran | International Journal of Satellite Communications, 19(1), January/February 2001. | January 2001 | Networking | |
| Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor Networks | F. Bian, X. Li, R. Govindan, and S. Shenker | International Journal of Ad Hoc and Ubiquitous Computing (special issue on wireless sensor networks), Vol. 1, No. 4, pp. 179-193 | January 2006 | Networking | [PDF]
|
| Range Queries Over DHTs | S. Ratnasamy, J. M. Hellerstein, and S. Shenker | Intel Research Technical Report, IRB-TR-03-011 | June 25 2003 | Networking | |
| The Importance of Trusting Beliefs Linked to the Corporate Website for Diffusion of Recruiting-Related Online Innovations | M. Bermudez-Edo, N. Hurtado-Torres, and J. A. Aragon-Correa | Information Technology and Management, Vol. 11, No. 4, pp. 177-189 | December 2010 | Networking | |
| The Origin of Power-Laws in Internet Topologies Revisited | Q. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger | INFOCOM, 2002. | 2002 | Networking | |
| Self-Verifying CSFQ | I. Stoica, H. Zhang, and S. Shenker | INFOCOM, 2002. | 2002 | Networking | |
| The Impact of Routing Policy on Internet Paths | H. Tangmunarunkit, R. Govindan, S. Shenker, and D. Estrin | INFOCOM 2001: 736-742. | 2001 | Networking | |
| Comments on the Performance of Measurement-Based Admission Control Algorithms | L. Breslau, S. Jamin, and S. Shenker | INFOCOM 2000, Tel Aviv, Israel, March 2000. | March 2000 | Networking | |
| Topologically-Aware Overlay Construction and Server Selection | S. Ratnasamy, M. Handley, R. M. Karp, and S. Shenker | INFOCOM | 2002 | Networking | |
| Data-Centric Storage in Sensornets | S. Shenker, S. Ratnasamy, B. Karp, R. Govindan, and D. Estrin | In Workshop Record of the First Workshop on Hot Topics in Networks (HotNets-I), October 2002. | October 2002 | Networking | |
| Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters | M. Zaharia, T. Das, H. Li, S. Shenker and I. Stoica | In the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MA | June 2012 | Networking | [PDF]
|
| Internet Topology: Discovery and Policy Impact, Parts I and II | H. Tangmunarunkit, R. Govindan, and S. Shenker | In The Internet as a Large-Scale Complex System, K. Park and W. Willinger, eds., pp. 121-160, Oxford University Press | 2005 | Networking | [PDF]
|
| Why We Don't Know How To Simulate The Internet | V. Paxson and S. Floyd | In Proceedings of the 1997 Winter Simulation Conference | December 1997 | Networking | |
| Empowering mobile software agents | V. Roth | In N. Suri, editor, Proceedings 6th IEEE Mobile Agents Conference, volume 2535 of Lecture Notes in Computer Science, pages 47-63. Springer Verlag, October 2002. | October 2002 | Networking | |
| Very Fast Containment of Scanning Worms, Revisited | N. Weaver, S. Staniford, and V. Paxson | In Malware Detection: Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, eds., pp. 113-145, Springer | 2007 | Networking | |
| From Complex Specifications to a Working Prototype: A Protocol Engineering Case Study | M. J. Fernández, J. González, J. M. Pousada, M. Llamas, and A. Romero | In Lecture Notes in Computer Science, Vol. 2021, pp. 436-448, Springer Verlag | 2001 | Networking | |
| Distributed Algorithmic Mechanism Design | J. Feigenbaum, M. Schapira, and S. Shenker | In Algorithmic Game Theory, N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, eds., pp. 363-384, Cambridge University Press | 2007 | Networking | |
| TCP Slow Start Survey: Standards and Issues | M. Allman | IETF Internet-Draft, Draft-ietf-tcpm-early-rexmt-00.txt, in progress | August 2008 | Networking | [PDF]
|
| Difficulties in Simulating the Internet | S. Floyd and V. Paxson | IEEE/ACM Transactions on Networking, Vol.9, No.4, pp. 392-403. (An earlier version appeared in Proceedings of the 1997 Winter Simulation Conference, December 1997). | August 2001 | Networking | [PDF]
|
| End-to-End Internet Packet Dynamics | V. Paxson | IEEE/ACM Transactions on Networking, Vol.7, No.3, pp. 277-292, June 1999. An earlier version appeared in Proc. ACM SIGCOMM '97, September 1997, Cannes, France. | June 1999 | Networking | |
| Sharing the "cost" of multicast trees: An axiomatic analysis | S. Herzog, S. Shenker, and D. Estrin | IEEE/ACM Transactions on Networking, Vol. 5, pp. 847-860 | December 1997 | Networking | |
| End-to-End Routing Behavior in the Internet | V. Paxson | IEEE/ACM Transactions on Networking, Vol. 5, No. 5, pp. 601-615. An earlier version appeared in the proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '96), August 1996, Stanford, California | October 1997 | Networking | |
| Link-sharing and Resource Management Models for Packet Networks | S. Floyd and V. Jacobson | IEEE/ACM Transactions on Networking, Vol. 3, No. 4, pp. 365-386 | August 1995 | Networking | [PDF]
|
| Wide-Area Traffic: The Failure of Poisson Modeling | V. Paxson and S. Floyd | IEEE/ACM Transactions on Networking, Vol. 3, No. 3, pp. 226-244 | June 1995 | Networking | |
| Empirically-Derived Analytic Models of Wide-Area TCP Connections | V. Paxson | IEEE/ACM Transactions on Networking, Vol. 2, No. 4 | August 1994 | Networking | |
| The Synchronization of Periodic Routing Messages | S. Floyd and V. Jacobson | IEEE/ACM Transactions on Networking, Vol. 2, No. 2, pp. 122-136 | April 1994 | Networking | [PDF]
|
| Rethinking Enterprise Network Control | M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. Gude, N. McKeown, and S. Shenker | IEEE/ACM Transactions on Networking, Vol. 17, No. 4, pp. 1270-1283 | August 2009 | Networking | [PDF]
|
| Observed Structure of Addresses in IP Traffic | E. Kohler, J. Li, V. Paxson, and S. Shenker | IEEE/ACM Transactions on Networking, Vol. 14, No. 6, pp. 1207-1218 | December 2006 | Networking | [PDF]
|
| Incremental Deployment Strategies for Router-Assisted Reliable Multicast | X. He, C. Papadopoulos, and P. Radoslavov | IEEE/ACM Transactions on Networking, Vol. 14, Issue 4, pp. 779-792 | August 2006 | Networking | |
| Network Loss Tomography Using Striped Unicast Probes | N. Duffield, F. Lo Presti, V. Paxson, and D. Towsley | IEEE/ACM Transactions on Networking, Vol. 14 Issue 4, pp. 697-710 | August 2006 | Networking | [PDF]
|
| Internet Indirection Infrastructure | I. Stoica, D. Adkins, S. Zhaung, S. Shenker, and S. Surana | IEEE/ACM Transactions on Networking, Vol. 12, Issue 2, pp. 205-218 | April 2004 | Networking | [PDF]
|
| Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed Networks | I. Stoica, S. Shenker, and H. Zhang | IEEE/ACM Transactions on Networking, Vol. 11, Issue 1, pp. 33-46. (A previous version appeared in the proceedings of the ACM's Special Interest Group on Data Communication (SIGCOMM'98), Vancouver, Canada, August 1998, pp. 118-130.) | February 2003 | Networking | [PDF]
|
| Random Early Detection Gateways for Congestion Avoidance | S. Floyd and V. Jacobson | IEEE/ACM Transactions on Networking, Vol. 1, No. 4, pp. 397-413 | August 1993 | Networking | |
| A Reliable Multicast Framework for Light-weight Sessions and Application Level Framing | S. Floyd, V. Jacobson, C. Liu, S. McCanne, and L. Zhang | IEEE/ACM Transactions on Networking, December 1997, Vol. 5, No. 6, pp. 784-803. Also in the proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '95), August 1995, pp. 342-356 | December 1997 | Networking | |
| Promoting the Use of End-to-End Congestion Control in the Internet | S. Floyd and K. Fall | IEEE/ACM Transactions on Networking, August 1999. Winner of the Communications Society William R. Bennett Prize Paper Award, 1999. | August 1999 | Networking | |
| A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast | P. Radoslavov, C. Papadopoulos, R. Govindan, and D. Estrin | IEEE/ACM Transactions on Networking (TON), Volume 12, Issue 3, pp. 469-482 | June 05 2004 | Networking | |
| Providing QoS through Machine Learning-Driven Adaptive Multimedia Applications | P. M. Ruiz, J. Botia, and A. Gomez-Skarmeta | IEEE Transactions on Systems, Man, and Cybernetics, Part-B, Vol. 34, No. 3, pp. 1398-1422 | June 2004 | Networking | |
| Towards Situational Awareness of Large-Scale Botnet Probing Events | Z. Li, A. Goyal, Y. Chen, and V. Paxson | IEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp. 175-188 | March 2011 | Networking | [PDF]
|
| The Iterated Weakest Link | R. Böhme and T. Moore | IEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55 | January 2010 | Networking | [PDF]
|