| Discovery of Rgulatory Interactions Through Perturbation: Inference and Experimental Design | T.E. Ideker, V. Thorsson, and R.M. Karp | Pacific Symposium on Biocomputing, 2000. | 2000 | Networking | |
| DIFS: A Distributed Index for Features in Sensor Networks | B. Greenstein, D. Estrin, R. Govindan, S. Ratnasamy, and S. Shenker | Elsevier Journal of Ad Hoc Networks, 2003. (Also in the First IEEE Workshop on Sensor Networks Protocols and Applications, SNPA, 2003) | 2003 | Networking | |
| Difficulties in Simulating the Internet | S. Floyd and V. Paxson | IEEE/ACM Transactions on Networking, Vol.9, No.4, pp. 392-403. (An earlier version appeared in Proceedings of the 1997 Winter Simulation Conference, December 1997). | August 2001 | Networking | [PDF]
|
| Determining an Appropriate Sending Rate Over an Underutilized Network Path | P. Sarolahti, M. Allman, and S. Floyd | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 51, Issue 7, pp. 1815-1832. DOI:10.1016/j.comnet.2006.11.006 | May 2007 | Networking | [PDF]
|
| Detecting Stepping Stones | Y. Zhang and V. Paxson | Proceedings of the Ninth USENIX Security Symposium, August 2000. | August 2000 | Networking | |
| Detecting In-Flight Page Changes with Web Tripwires | C. Reis, S. Gribble, T. Kohno, and N. Weaver | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 31-44 | April 2008 | Networking | [PDF]
|
| Detecting Hidden Causality in Network Connections | J. Kannan, J. Jung, V. Paxson, and C. E. Koksal | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2005-30, Berkeley, California | December 2005 | Networking | [PDF]
|
| Detecting Forged TCP Reset Packets | N. Weaver, R. Sommer, and V. Paxson | Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, California | February 2009 | Networking | [PDF]
|
| Detecting Backdoors | Y. Zhang and V. Paxson | Proceedings of the Ninth USENIX Security Symposium, August 2000. | August 2000 | Networking | |
| Detecting and Analyzing Automated Activity on Twitter | C. M. Zhang and V. Paxson | Proceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, Georgia | March 2011 | Networking | [PDF]
|
| Designing Extensible IP Router Software | M. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. Radoslavov | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 189-202 | May 2005 | Networking | [PDF]
|
| Designing DCCP: Congestion Control Without Reliability | E. Kohler, M. Handley, and S. Floyd | May 2003 | May 2003 | Networking | [PDF]
|
| Designing DCCP: Congestion Control Without Reliability | E. Kohler, M. Handley, and S. Floyd | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 27-38 | September 2006 | Networking | [PDF]
|
| Design Guidelines for Robust Internet Protocols | T. Anderson, S. Shenker, I. Stoica, and D. Wetherall | Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I), Princeton, New Jersey | October 2002 | Networking | [PDF]
|
| Design and Evaluation of a Real-Time URL Spam Filtering Service | K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song | Proceedings of the 32nd IEEE Symposium on Security and Privacy, Oakland, California, pp. 447-464 | May 2011 | Networking | [PDF]
|
| DelfosnetX: A Workbench for XML-Based Information Retrieval Systems | M. J. Fernández, P. Pavón, J. Rodríguez, L. Anido, and M. Llamas | Proceedings of he 7th International Symposium on String Processing and Information Retrieval, A Coruna, Spain, pp. 87-95 | September 2000 | Networking | |
| Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling | M. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. Stoica | Proceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278 | April 2010 | Networking | [PDF]
|
| DDoS Defense by Offense | M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 303-314 | September 2006 | Networking | [PDF]
|
| DDoS Defense by Offense | M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker | ACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3 | March 2010 | Networking | [PDF]
|
| Data-Driven Network Connectivity | J. Liu, S. Shenker, M. Schapira, and B. Yang | Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, Massachusetts | November 2011 | Networking | [PDF]
|
| Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table | S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Gvoindan, L. Yin, and F. Yu | ACM MONET | 2003 | Networking | |
| Data-Centric Storage in Sensornets | S. Shenker, S. Ratnasamy, B. Karp, R. Govindan, and D. Estrin | In Workshop Record of the First Workshop on Hot Topics in Networks (HotNets-I), October 2002. | October 2002 | Networking | |
| Cybercasing the Joint: On the Privacy Implications of Geotagging | G. Friedland and R. Sommer | Proceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C. | August 2010 | Networking | [PDF]
|
| Creating a Scalable Architecture for Internet Measurement | A. Adams, J. Mahdavi, M. Mathis, and V. Paxson | Proceedings of the Internet Summit (INET '98), Geneva, Switzerland | July 1998 | Networking | |
| Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks | I. Stoica, S. Shenker, and H. Zhang | ACM Computer Communication Review, Vol. 28, pp. 118-130 | September 1998 | Networking | |
| Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed Networks | I. Stoica, S. Shenker, and H. Zhang | IEEE/ACM Transactions on Networking, Vol. 11, Issue 1, pp. 33-46. (A previous version appeared in the proceedings of the ACM's Special Interest Group on Data Communication (SIGCOMM'98), Vancouver, Canada, August 1998, pp. 118-130.) | February 2003 | Networking | [PDF]
|
| COPS: Quality of Service Vs. Any Service at All | R. Katz, G. Porter, S. Shenker, I. Stoica, and M. Tsai | Proceedings of the 13th International Workshop on Quality of Service 2005 (IWQoS 2005), Passau, Germany, pp. 3-15 | June 2005 | Networking | |
| Controlling High-Bandwidth Flows at the Congested Router | R. Mahajan, S. Floyd, and D. Wetherall | ICNP 2001 | 2001 | Networking | |
| Controlling High Bandwidth Aggregates in the Network | R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker | Computer Communication Review 32(3), July 2002. | July 2002 | Networking | |
| Content‐based Privacy for Consumer‐Produced Multimedia | A. Janin, G. Friedland, and R. Sommer | ICSI Technical Report TR-12-012 | October 2012 | Networking | [PDF]
|
| Connections with Multiple Congested Gateways in Packet-Switched Networks Part 1: One-way Traffic | S. Floyd | Computer Communication Review, Vol. 21, No. 5, pp. 30-47 | October 1991 | Networking | [PDF]
|
| Congestion Control Without a Startup Phase | D. Liu, M. Allman, S. Jin, and L. Wang | Proceedings of the Fifth International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet 2007), Los Angeles, California | February 2007 | Networking | [PDF]
|
| Congestion Control Principles | S. Floyd | Request for Comments 2914, Best Current Practice, September 2000. | September 2000 | Networking | |
| Computing TCP's Retransmission Timer | V. Paxson and M. Allman | Request for Comments 2988, Proposed Standard | November 2000 | Networking | |
| Computing TCP's Retransmission Timer | V. Paxson, M. Allman, J. Chu, and M. Sargent | RFC 6298 | June 2011 | Networking | [PDF]
|
| Computing Security in the Developing World: A Case for Multidisciplinary Research | Y. Ben-David, S. Hasan, J. Pal, M. Vallentin, S. Panjwani, P. Gutheim, J. Chen, and E. Brewer | Proceedings of the Fifth ACM Workshop on Networked Systems for Developing Regions (NSDR), pp.39-44, Washington, D.C. | June 2011 | Networking | [PDF]
|
| Complex Queries in DHT-based Peer-to-Peer Networks | M. Harren, J.M. Hellerstein, R. Huebsch, B.T. Loo, S. Shenker, and I. Stoica | The First International Workshop on Peer-to-Peer Systems (IPTPS): 242-259, 2002. | 2002 | Networking | |
| Competitive Cyber-Insurance and Internet Security | N. Shetty, G. Schwartz. M. Felegyhazi, and J. Walrand | Proceedings of the Workshop on Economics of Information Security (WEIS 2009), London, United Kingdom | June 2009 | Networking | [PDF]
|
| Comparison of Measurement-based Admission Control Algorithms for Controlled-Load Service | S. Jamin, S.J. Shenker, and P.B. Danzig | Proceedings of the Conference on Computer Communications (IEEE Infocom), Kobe, Japan | April 1997 | Networking | |
| Comparative Analysis of Traffic Matrix Estimation Methods | A. Medina, N. Taft, K. Salamatian, S. Bhattacharyya, and C. Diot | DIMACS Workshop on Internet and WWW Measurement, Mapping and Modeling. February 13-15 2002. | February 13 2002 | Networking | |
| Comments on the Performance of Measurement-Based Admission Control Algorithms | L. Breslau, S. Jamin, and S. Shenker | INFOCOM 2000, Tel Aviv, Israel, March 2000. | March 2000 | Networking | |
| Comments on Selecting Ephemeral Ports | M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 39, Issue 2, pp. 13-19 | April 2009 | Networking | [PDF]
|
| Comments on Measurement-based Admissions Control for Controlled-Load Services | S. Floyd | Technical Report | July 1996 | Networking | |
| Comments on Bufferbloat | M. Allman | ACM SIGCOMM Computer Communications, Vol. 3, No. 1, pp. 30-37 | January 2013 | Networking | [PDF]
|
| CloudPolice: Taking Access Control out of the Network | L. Popa, M. Yu, S. Y. Ko, S. Ratnasamy, and I. Stoica | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 7 | October 2010 | Networking | [PDF]
|
| Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems | L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica | Proceedings of the USENIX Annual Technical Conference (ATC), Boston, MA | June 2012 | Networking | [PDF]
|
| Click Trajectories: End-to-End Analysis of the Spam Value Chain | K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage | Proceedings of the IEEE Symposium on Security and Privacy, pp. 431-446, Oakland, California | May 2011 | Networking | [PDF]
|
| Characteristics of Internet Background Radiation | R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy | October 2004 | Networking | [PDF]
|
| Carat: Collaborative Energy Bug Detection | A. J. Oliner, A. P. Iyer, E. Lagerspetz, I. Stoica, and S. Tarkoma | Poster and demo at the proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12), San Jose, California | April 2012 | Networking | |
| Can Software Routers Scale? | K. Argyraki, S. Baset, B. Chun, K. Fall, G. Iannaccone, A. Knies, E. Kohler, M. Manesh, S. Nedevschi, and S. Ratnasamy | Proceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO'08), Seattle, Washington | August 2008 | Networking | [PDF]
|