Publication Search Results

Titlesort ascendingAuthorBibliographicDateGroupLinks
Discovery of Rgulatory Interactions Through Perturbation: Inference and Experimental DesignT.E. Ideker, V. Thorsson, and R.M. KarpPacific Symposium on Biocomputing, 2000. 2000Networking
DIFS: A Distributed Index for Features in Sensor NetworksB. Greenstein, D. Estrin, R. Govindan, S. Ratnasamy, and S. ShenkerElsevier Journal of Ad Hoc Networks, 2003. (Also in the First IEEE Workshop on Sensor Networks Protocols and Applications, SNPA, 2003) 2003Networking
Difficulties in Simulating the InternetS. Floyd and V. PaxsonIEEE/ACM Transactions on Networking, Vol.9, No.4, pp. 392-403. (An earlier version appeared in Proceedings of the 1997 Winter Simulation Conference, December 1997).August 2001Networking[PDF]

Determining an Appropriate Sending Rate Over an Underutilized Network PathP. Sarolahti, M. Allman, and S. FloydComputer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 51, Issue 7, pp. 1815-1832. DOI:10.1016/j.comnet.2006.11.006May 2007Networking[PDF]

Detecting Stepping StonesY. Zhang and V. PaxsonProceedings of the Ninth USENIX Security Symposium, August 2000.August 2000Networking
Detecting In-Flight Page Changes with Web TripwiresC. Reis, S. Gribble, T. Kohno, and N. WeaverProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 31-44April 2008Networking[PDF]

Detecting Hidden Causality in Network ConnectionsJ. Kannan, J. Jung, V. Paxson, and C. E. KoksalEECS Department, UC Berkeley Technical Report No. UCB/EECS-2005-30, Berkeley, CaliforniaDecember 2005Networking[PDF]

Detecting Forged TCP Reset PacketsN. Weaver, R. Sommer, and V. PaxsonProceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, CaliforniaFebruary 2009Networking[PDF]

Detecting BackdoorsY. Zhang and V. PaxsonProceedings of the Ninth USENIX Security Symposium, August 2000.August 2000Networking
Detecting and Analyzing Automated Activity on TwitterC. M. Zhang and V. PaxsonProceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Designing Extensible IP Router SoftwareM. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. RadoslavovProceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 189-202May 2005Networking[PDF]

Designing DCCP: Congestion Control Without ReliabilityE. Kohler, M. Handley, and S. FloydMay 2003May 2003Networking[PDF]

Designing DCCP: Congestion Control Without ReliabilityE. Kohler, M. Handley, and S. FloydProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 27-38September 2006Networking[PDF]

Design Guidelines for Robust Internet ProtocolsT. Anderson, S. Shenker, I. Stoica, and D. WetherallProceedings of the First Workshop on Hot Topics in Networks (HotNets-I), Princeton, New JerseyOctober 2002Networking[PDF]

Design and Evaluation of a Real-Time URL Spam Filtering ServiceK. Thomas, C. Grier, J. Ma, V. Paxson, and D. SongProceedings of the 32nd IEEE Symposium on Security and Privacy, Oakland, California, pp. 447-464May 2011Networking[PDF]

DelfosnetX: A Workbench for XML-Based Information Retrieval SystemsM. J. Fernández, P. Pavón, J. Rodríguez, L. Anido, and M. LlamasProceedings of he 7th International Symposium on String Processing and Information Retrieval, A Coruna, Spain, pp. 87-95September 2000Networking
Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster SchedulingM. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. StoicaProceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278April 2010Networking[PDF]

DDoS Defense by OffenseM. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 303-314September 2006Networking[PDF]

DDoS Defense by OffenseM. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. ShenkerACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3March 2010Networking[PDF]

Data-Driven Network ConnectivityJ. Liu, S. Shenker, M. Schapira, and B. YangProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

Data-Centric Storage in Sensornets with GHT, a Geographic Hash TableS. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Gvoindan, L. Yin, and F. YuACM MONET 2003Networking
Data-Centric Storage in SensornetsS. Shenker, S. Ratnasamy, B. Karp, R. Govindan, and D. EstrinIn Workshop Record of the First Workshop on Hot Topics in Networks (HotNets-I), October 2002.October 2002Networking
Cybercasing the Joint: On the Privacy Implications of GeotaggingG. Friedland and R. SommerProceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C.August 2010Networking[PDF]

Creating a Scalable Architecture for Internet MeasurementA. Adams, J. Mahdavi, M. Mathis, and V. PaxsonProceedings of the Internet Summit (INET '98), Geneva, SwitzerlandJuly 1998Networking
Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed NetworksI. Stoica, S. Shenker, and H. ZhangACM Computer Communication Review, Vol. 28, pp. 118-130September 1998Networking
Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed NetworksI. Stoica, S. Shenker, and H. ZhangIEEE/ACM Transactions on Networking, Vol. 11, Issue 1, pp. 33-46. (A previous version appeared in the proceedings of the ACM's Special Interest Group on Data Communication (SIGCOMM'98), Vancouver, Canada, August 1998, pp. 118-130.)February 2003Networking[PDF]

COPS: Quality of Service Vs. Any Service at AllR. Katz, G. Porter, S. Shenker, I. Stoica, and M. TsaiProceedings of the 13th International Workshop on Quality of Service 2005 (IWQoS 2005), Passau, Germany, pp. 3-15June 2005Networking
Controlling High-Bandwidth Flows at the Congested RouterR. Mahajan, S. Floyd, and D. WetherallICNP 2001 2001Networking
Controlling High Bandwidth Aggregates in the NetworkR. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. ShenkerComputer Communication Review 32(3), July 2002.July 2002Networking
Content‐based Privacy for Consumer‐Produced MultimediaA. Janin, G. Friedland, and R. SommerICSI Technical Report TR-12-012October 2012Networking[PDF]

Connections with Multiple Congested Gateways in Packet-Switched Networks Part 1: One-way TrafficS. FloydComputer Communication Review, Vol. 21, No. 5, pp. 30-47October 1991Networking[PDF]

Congestion Control Without a Startup PhaseD. Liu, M. Allman, S. Jin, and L. WangProceedings of the Fifth International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet 2007), Los Angeles, CaliforniaFebruary 2007Networking[PDF]

Congestion Control PrinciplesS. FloydRequest for Comments 2914, Best Current Practice, September 2000.September 2000Networking
Computing TCP's Retransmission TimerV. Paxson and M. AllmanRequest for Comments 2988, Proposed StandardNovember 2000Networking
Computing TCP's Retransmission TimerV. Paxson, M. Allman, J. Chu, and M. SargentRFC 6298June 2011Networking[PDF]

Computing Security in the Developing World: A Case for Multidisciplinary ResearchY. Ben-David, S. Hasan, J. Pal, M. Vallentin, S. Panjwani, P. Gutheim, J. Chen, and E. BrewerProceedings of the Fifth ACM Workshop on Networked Systems for Developing Regions (NSDR), pp.39-44, Washington, D.C.June 2011Networking[PDF]

Complex Queries in DHT-based Peer-to-Peer NetworksM. Harren, J.M. Hellerstein, R. Huebsch, B.T. Loo, S. Shenker, and I. StoicaThe First International Workshop on Peer-to-Peer Systems (IPTPS): 242-259, 2002. 2002Networking
Competitive Cyber-Insurance and Internet SecurityN. Shetty, G. Schwartz. M. Felegyhazi, and J. WalrandProceedings of the Workshop on Economics of Information Security (WEIS 2009), London, United KingdomJune 2009Networking[PDF]

Comparison of Measurement-based Admission Control Algorithms for Controlled-Load ServiceS. Jamin, S.J. Shenker, and P.B. DanzigProceedings of the Conference on Computer Communications (IEEE Infocom), Kobe, JapanApril 1997Networking
Comparative Analysis of Traffic Matrix Estimation MethodsA. Medina, N. Taft, K. Salamatian, S. Bhattacharyya, and C. DiotDIMACS Workshop on Internet and WWW Measurement, Mapping and Modeling. February 13-15 2002.February 13 2002Networking
Comments on the Performance of Measurement-Based Admission Control AlgorithmsL. Breslau, S. Jamin, and S. ShenkerINFOCOM 2000, Tel Aviv, Israel, March 2000.March 2000Networking
Comments on Selecting Ephemeral PortsM. AllmanACM SIGCOMM Computer Communication Review, Vol. 39, Issue 2, pp. 13-19April 2009Networking[PDF]

Comments on Measurement-based Admissions Control for Controlled-Load ServicesS. FloydTechnical ReportJuly 1996Networking
Comments on BufferbloatM. AllmanACM SIGCOMM Computer Communications, Vol. 3, No. 1, pp. 30-37January 2013Networking[PDF]

CloudPolice: Taking Access Control out of the NetworkL. Popa, M. Yu, S. Y. Ko, S. Ratnasamy, and I. StoicaProceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 7October 2010Networking[PDF]

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted SystemsL. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. StoicaProceedings of the USENIX Annual Technical Conference (ATC), Boston, MAJune 2012Networking[PDF]

Click Trajectories: End-to-End Analysis of the Spam Value ChainK. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. SavageProceedings of the IEEE Symposium on Security and Privacy, pp. 431-446, Oakland, CaliforniaMay 2011Networking[PDF]

Characteristics of Internet Background RadiationR. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. PetersonProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, ItalyOctober 2004Networking[PDF]

Carat: Collaborative Energy Bug DetectionA. J. Oliner, A. P. Iyer, E. Lagerspetz, I. Stoica, and S. TarkomaPoster and demo at the proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12), San Jose, CaliforniaApril 2012Networking
Can Software Routers Scale?K. Argyraki, S. Baset, B. Chun, K. Fall, G. Iannaccone, A. Knies, E. Kohler, M. Manesh, S. Nedevschi, and S. RatnasamyProceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO'08), Seattle, WashingtonAugust 2008Networking[PDF]

Pages