Publication Search Results

TitleAuthorBibliographicDateGroupsort ascendingLinks
User-Aware Adaptive Applications for Enhanced Multimedia Quality in Heterogeneous Networking EnvironmentsP. M. Ruiz, J.A. Botia, and A.Gomez-SkarmetaLecture Notes in Computer Science, Vol. 3079June 2004Networking[PDF]

Implementation and Evaluation of a Location-Aware Wireless Multi-Agent SystemI. Nieto-Carvajal, J.A. Botia, P. M. Ruiz, and A. Gomez-SkarmetaLecture Notes in Computer Science, Vol. 3207, pp. 528-537August 2004Networking[PDF]

User-Aware Videoconference Session Control Using Software AgentsJ.A. Botia, P. Ruiz, and A. Gomez-SkarmetaProceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), Beijing, ChinaSeptember 2004Networking
Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al EncaminarC.M. Yago, P. M. Ruiz, and A.F. Gomez SkarmetaProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Aproximacion de Arboles Multicast Optimos en Redes Ad Hoc InalambricasP.M. Ruiz and A.F. Gomez SkarmetaProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAMA.F. Gomez Skarmeta and P.M. RuizProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Applying Fuzzy Logic to Model User Preferences on Multimedia SessionsJ.A. Botia, M. Valdes, P. M. Ruiz, and A.F. Gomez Skarmeta.Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy, Jaen, Spain, pp. 467-470September 2005Networking
Security Extensions to MMARP Through Cryptographically Generated AddressesF.J. Galera, P.M. Ruiz, and A.F. Gomez SkarmetaLecture Notes on Informatics, Vol. P-68, pp. 339–343September 2005Networking
Heuristic Algorithms for Minimum Bandwidth Consumption Multicast Trees in Wireless Mesh NetworksP.M. Ruiz and A.F. Gomez SkarmetaLecture Notes in Computer Science, Vol. 3738, pp. 258–270October 2005Networking
Internet Connectivity for Mobile Ad Hoc Networks: Solutions and ChallengesP. M. Ruiz, F. J. Ros, and A.F. Gomez SkarmetaIEEE Communications Magazine, pp. 118–125October 2005Networking
Improving Delivery Ratio and Power Efficiency in Unicast Geographic Routing with a Realistic Physical Layer for Wireless Sensor NetworksJ.A. Sanchez and P. M. RuizProceedings of the 9th Euromicro Conference on Digital System Design Architectures, Methods, and Tools (DSD 2006), Drubovnid, CroatiaSeptember 2006Networking
A Virtual Spanner for Efficient Face Routing in Multihop Wireless NetworksH. Tejeda, E. Chavez, J.A. Sanchez, and P. M. RuizLecture Notes in Computer Science, Vol. 4217, pp. 459–470September 2006Networking
Energy-Efficient Routing on the Virtual SpannerH. Tejeda, E. Chavez, J.A. Sanchez, and P. M. RuizLecture Notes in Computer Science, Vol. 4104, pp. 101–113July 2006Networking
GMR: Geographic Multicast Routing for Wireless Sensor NetworksJ.A. Sanchez, P. M. Ruiz, and I. StojmenovicProceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Networks (IEEE SECON 2006), Reston, VirginiaSeptember 2006Networking
Securing Web ContentJ. Koskela, N. Weaver, A. Gurtov, and M. AllmanProceedings of the ACM CoNext Workshop on Re-Architecting the Internet (ReArch 2009), Rome, Italy, pp. 7-12December 2009Networking[PDF]

RFC 5681: TCP Congestion ControlM. Allman, V. Paxson, and E. BlantonRequest for Comments 5681, Proposed StandardSeptember 2009Networking[PDF]

Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-EngineeringJ. Caballero, P. Poosankam, C. Kreibich, and D. SongProceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, Illinois, pp. 621-634November 2009Networking[PDF]

Securing Mediated Trace Access Using Black-Box Permutation AnalysisP. Mittal, V. Paxson, R. Sommer, and M. WinterrowdProceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New YorkOctober 2009Networking[PDF]

Skilled in the Art of Being Idle: Reducing Energy Waste in Networked SystemsS. Nedevschi, J. Chandrashenkar, B. Nordman, S. Ratnasamy, and N. TaftProceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), Boston, Massachusetts, pp. 381-394April 2009Networking[PDF]

ICTD State of the Union: Where Have We Reached and Where Are We Headed?S. Nedevschi, R. Patra, and J. PalProceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2009), Doha, QatarApril 2009Networking[PDF]

The "Dresden Image Database" for Benchmarking Digital Image ForensicsT. Gloe and R. BoehmeProceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), pp. 1584-1590, Sierre, SwitzerlandMarch 2010Networking
Privacy in Online Social LendingR. Boehme and S. PoetzschProceedings of the AAAI 2010 Spring Symposium on Intelligent Information Privacy Management, Palo Alto, California, pp. 23-28March 2010Networking[PDF]

Botnet Judo: Fighting Spam with ItselfA. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. SavageProceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, CaliforniaFebruary 2010Networking[PDF]

A Longitudinal View of HTTP TrafficT. Callahan, M. Allman, and V. PaxsonProceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, SwitzerlandApril 2010Networking[PDF]

Web Timeouts and Their ImplicationsZ. Al-Qudah, M. Rabinovich, and M. AllmanProceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, SwitzerlandApril 2010Networking[PDF]

The Iterated Weakest LinkR. Böhme and T. MooreIEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55January 2010Networking[PDF]

Trained to Accept? A Field Experiment on Consent DialogsR. Boehme and S. KoepsellProceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406April 2010Networking[PDF]

DDoS Defense by OffenseM. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. ShenkerACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3March 2010Networking[PDF]

A Policy Framework for the Future InternetA. Seehra, J. Naous, M. Walfish, D. Maziéres, A. Nicolosi, and S. ShenkerProceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New YorkOctober 2009Networking[PDF]

Outside the Closed World: On Using Machine Learning for Network Intrusion DetectionR. Sommer and V. PaxsonProceedings of the IEEE Symposium on Security and Privacy 2010, Oakland, California, pp. 305-316May 2010Networking[PDF]

Rethinking Enterprise Network ControlM. Casado, M. J. Freedman, J. Pettit, J. Luo, N. Gude, N. McKeown, and S. ShenkerIEEE/ACM Transactions on Networking, Vol. 17, No. 4, pp. 1270-1283August 2009Networking[PDF]

Practical Declarative Network ManagementT. L. Hinrichs, N. S. Gude, M. Casado, J. C. Mitchell, and S. ShenkerProceedings of the First ACM Workshop on Research on Enterprise Networking (WREN 2009), Barcelona, Spain, pp. 1-10. DOI:http://doi.acm.org/10.1145/1592681.1592683August 2009Networking[PDF]

Extending Networking into the Virtualization LayerB. Pfaff, J. Pettit, K. Amidon, M. Casado, T. Koponen, and S. ShenkerProceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New YorkOctober 2009Networking[PDF]

An Investigation of the Internet’s IP-Layer ConnectivityL. Tang, J. Li, Y. Li, and S. ShenkerComputer Communications, Vol. 32, No. 5, pp. 913-926March 2009Networking
Applying NOX to the DatacenterA. Tavakoli, M. Casado, T. Koponen, and S. ShenkerProceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New YorkOctober 2009Networking[PDF]

Peer to Peer Edge Caches Should Be FreeN. WeaverProceedings of the 37th Research Conference on Communication, Information, and Internet Policy, Arlington, VirginiaSeptember 2009Networking[PDF]

An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion PreventionR. Sommer, N. Weaver, and V. PaxsonConcurrency and Computation: Practice and Experience, Vol. 21, Issue 10, pp. 1255-1279July 2009Networking[PDF]

Pathlet RoutingP. Godfrey, I. Ganichev, S. Shenker, and I. StoicaProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2009), Barcelona, Spain, pp. 111-122August 2009Networking[PDF]

Insights from the Inside: A View of Botnet Management from InfiltrationC. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. SongProceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, CaliforniaApril 2010Networking[PDF]

On the Potential of Proactive Domain BlacklistingM. Felegyhazi, C. Kreibich, and V. PaxsonProceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, CaliforniaApril 2010Networking[PDF]

A Preliminary Analysis of TCP Performance in an Enterprise NetworkB. Nechaev, M. Allman, V. Paxson, and A. GurtovProceedings of the 2010 Internet Network Management Workshop/Workshop on Research and Enterprise Networking (INM/WREN '10), San Jose, CaliforniaApril 2010Networking[PDF]

The Role of Soft Information in Trust Building: Evidence from Online Social LendingS. Poetzsch and R. BoehmeProceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST 2010), Berlin, Germany, pp. 381-395June 2010Networking
Measuring Access Connectivity Characteristics with NetalyzrN. Weaver, C. Kreibich, and V. PaxsonPresented at the meeting of the North American Network Operators' Group (NANOG49), San Francisco, CaliforniaJune 2010Networking[PDF]

RFC 5827: Early Retransmit for TCP and SCTPM. Allman, K. Avrachenkov, U. Ayesta, J. Blanton, and P. HurtigRequest for Comments 5827, ExperimentalApril 2010Networking[PDF]

Modeling Cyber-Insurance: Towards a Unifying FrameworkR. Boehme and G. SchwartzProceedings of the 9th Workshop on the Economics of Information Security (WEIS 2010), Cambridge, MassachusettsJune 2010Networking[PDF]

RFC 5690: Adding Acknowledgement Congestion Control to TCPS. Floyd, A. Arcia, D. Ros, and J. IyengarRequest for Comments 5690, InformationalFebruary 2010Networking[PDF]

Incentive Compatibility and Dynamics of Congestion ControlP. B. Godfrey, M. Schapira, A. Zohar, and S. ShenkerACM SIGMETRICS Performance Evaluation Review, Vol. 36, Issue 1, pp. 95-106June 2010Networking[PDF]

Cybercasing the Joint: On the Privacy Implications of GeotaggingG. Friedland and R. SommerProceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C.August 2010Networking[PDF]

Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-ReduceJ. Hendrik Boese, A. Andrzejak, and M. HoegqvistProceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010), Raleigh, North Carolina, Article No. 3April 2010Networking
Hardness Results for Multicast Cost SharingJ. Feigenbaum, A. Krishnamurthy, R. Sami, and S. ShenkerTheoretical Computer Science, Vol. 304, Issues 1-3, pp. 215-236July 2003Networking

Pages