| Sharing the Cost of Multicast Transmissions | J. Feigenbaum, C. Papadimitriou, and S. Shenker | Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC 2000), Portland, Oregon, pp. 218-227 | May 2000 | Networking | |
| Distributed Algorithmic Mechanism Design: Recent Results and Future Directions | J. Feigenbaum and S. Shenker | Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM'02), Atlanta, Georgia, pp. 1-13 | September 2002 | Networking | [PDF]
|
| An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being Slow | E. Friedman, M. Shor, S. Shenker, and B. Sopher | Games and Economic Behavior, Vol. 47, Issue 2, pp. 325-352 | May 2004 | Networking | |
| On the Effects of Registrar-Level Intervention | H. Liu, K. Levchenko, M. Felegyhazi, C. Kreibich, G. Maier, G. M. Voelker, and Stefan Savage | Proceedings of the Fourth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11), Boston, Massachusetts | March 2011 | Networking | [PDF]
|
| Internet Research Needs Better Models | S. Floyd and E. Kohler | ACM Computer Communications Review, Vol. 33, No. 1, pp. 29-34 | January 2003 | Networking | [PDF]
|
| MultiQ: Automated Detection of Multiple Bottlenexk Capacities Along a Path | S. Katti, D. Katabi, C. Blake, E. Kohler, and J. Strauss | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 245-250 | October 2004 | Networking | [PDF]
|
| Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling | M. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. Stoica | Proceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278 | April 2010 | Networking | [PDF]
|
| Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, Germany | C. Kreibich and M. Jahnke, eds. | Springer | 2010 | Networking | |
| Semantic-Free Referencing in Linked Distributed Systems | H. Balakrishnan, S. Shenker, and M. Walfish | Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, California | February 2003 | Networking | [PDF]
|
| DoS: Fighting Fire with Fire | M. Walfish, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| Very Fast Containment of Scanning Worms, Revisited | N. Weaver, S. Staniford, and V. Paxson | In Malware Detection: Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, eds., pp. 113-145, Springer | 2007 | Networking | |
| Detecting Hidden Causality in Network Connections | J. Kannan, J. Jung, V. Paxson, and C. E. Koksal | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2005-30, Berkeley, California | December 2005 | Networking | [PDF]
|
| Personal Namespaces | M. Allman | Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| Onix: A Distributed Control Platform for Large-scale Production Networks | T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, and S. Shenker | Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 351-364 | October 2010 | Networking | [PDF]
|
| Netalyzr: Illuminating The Edge Network | C. Kreibich, N. Weaver, B. Nechaev, and V. Paxson | Proceedings of the Internet Measurement Conference (IMC 2010), Melbourne, Australia, pp. 246-259 | November 2010 | Networking | [PDF]
|
| @spam: The Underground on 140 Characters or Less | C. Grier, K. Thomas, V. Paxson, and M. Zhang | Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, Illinois, pp. 27-37 | October 2010 | Networking | [PDF]
|
| Towards Insurable Network Architectures | R. Boehme | Journal of Information Technology, Vol. 52, No. 5, pp. 290-293 | September 2010 | Networking | |
| Learning Heuristic Functions for State-Space Planing | B. Satzger and O. Kramer | Proceedings of the Fifth IASTED International Conference on Computational Intelligence (CI 2010), Maui, Hawaii | August 2010 | Networking | |
| Using Strongly Typed Networking to Architect for Tussle | C. Muthukrishnan, V. Paxson, M. Allman, and A. Akella | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 9 | October 2010 | Networking | [PDF]
|
| On Building Special-Purpose Social Networks for Emergency Communication | M. Allman | ACM Computer Communication Review, Vol. 40, Issue 5 | October 2010 | Networking | [PDF]
|
| Optimal Information Security Investment with Penetration Testing | R. Boehme and M. Felegyhazi | Proceedings of the Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany, 21-37 | November 2010 | Networking | [PDF]
|
| Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity | C. Kreibich | Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118 | April 2005 | Networking | [PDF]
|
| Policy-Controlled Event Management for Distributed Intrusion Detection | C. Kreibich and R. Sommer | Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05), Columbus, Ohio, Vol. 4, pp. 385-391 | June 2005 | Networking | [PDF]
|
| Holding the Internet Accountable | D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker | Proceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| Can Software Routers Scale? | K. Argyraki, S. Baset, B. Chun, K. Fall, G. Iannaccone, A. Knies, E. Kohler, M. Manesh, S. Nedevschi, and S. Ratnasamy | Proceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO'08), Seattle, Washington | August 2008 | Networking | [PDF]
|
| Hot Data Centers vs. Cool Peers | S. Nedevschi, S. Ratnasamy, and J. Padhye | Proceedings of the Workshop on Power Aware Computing and Systems (HotPower '09), Big Sky, Montana, p. 8 | October 2009 | Networking | [PDF]
|
| Reducing Network Energy Consumption via Sleeping and Rate-Adaptation | S. Nedevschi, L. Popa, G. Iannaccone, S. Raynasamy, and D. Wetherall | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, California, pp. 323-336 | April 2008 | Networking | [PDF]
|
| Beyond Pilots: Keeping Rural Wireless Networks Alive | S. Surana, R. Patra, S. Nedevschi, M. Ramos, L. Subramanian, Y. Ben-David, and E. Brewer | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, California | April 2008 | Networking | [PDF]
|
| Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Canada | S. Jha, R. Sommer, and C. Kreibich, eds. | Springer Verlag | September 2010 | Networking | |
| Ripcord: A Modular Platform for Data Center Networking | B. Heller, D. Erickson, N. McKeown, R. Griffith, I. Ganichev, S. Whyte, K. Zarifis, D. Moon, S. Shenker, and S. Stuart | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2010), New Delhi, India, pp. 457-458 | August 2010 | Networking | [PDF]
|
| Building Extensible Networks with Rule-Based Forwarding | L. Popa, N. Egi, S. Ratnasamy, and I. Stoica | Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 379-391 | October 2010 | Networking | [PDF]
|
| The Importance of Trusting Beliefs Linked to the Corporate Website for Diffusion of Recruiting-Related Online Innovations | M. Bermudez-Edo, N. Hurtado-Torres, and J. A. Aragon-Correa | Information Technology and Management, Vol. 11, No. 4, pp. 177-189 | December 2010 | Networking | |
| Computing TCP's Retransmission Timer | V. Paxson, M. Allman, J. Chu, and M. Sargent | RFC 6298 | June 2011 | Networking | [PDF]
|
| Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise? | T. Ouyang, S. Ray, M. Rabinovich, and M. Allman | Proceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, Georgia | March 2011 | Networking | [PDF]
|
| Detecting and Analyzing Automated Activity on Twitter | C. M. Zhang and V. Paxson | Proceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, Georgia | March 2011 | Networking | [PDF]
|
| A Cost Comparison of Datacenter Network Architectures | L. Popa, S. Ratnasamy, G. Iannaccone, A. Krishnamurthy, and I. Stoica | Proceedings of the 6th ACM International Conference on Emerging Networking EXperiments and Technologies, Philadelphia, Pennsylvania, article no. 16 | December 2010 | Networking | [PDF]
|
| CloudPolice: Taking Access Control out of the Network | L. Popa, M. Yu, S. Y. Ko, S. Ratnasamy, and I. Stoica | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 7 | October 2010 | Networking | [PDF]
|
| HTTP as the Narrow Waist of the Future Internet | L. Popa, A. Ghodsi, and I. Stoica | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 6 | October 2010 | Networking | [PDF]
|
| Dynamic Route Recomputation Considered Harmful | M. Caesar, M. Casado, T. Koponen, J. Rexford, and S. Shenker | Computer Communication Review, Vol. 40, Issue 2 | April 2010 | Networking | [PDF]
|
| Virtualizing the Network Forwarding Plane | M. Casado, T. Koponen, R. Ramanathan, and S. Shenker | Proceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO 2010), Philadelphia, Pennsylvania | December 2010 | Networking | [PDF]
|
| YAMR: Yet Another Multipath Routing Protocol | I. Ganichev, B. Dai, B. Godfrey, and S. Shenker | ACM SIGCOMM Computer Communication Review, Vol. 40, Issue 5 | October 2010 | Networking | [PDF]
|
| Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters | A. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski, S. Shenker, and I. Stoica | Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011), Boston, Massachusetts | March 2011 | Networking | [PDF]
|
| Fathom: A Browser-based Network Measurement Platform | M. Dhawan, J. Samuel, R. Teixeira, C. Kreibich, M. Allman, N. Weaver, and V. Paxson | Proceedings of the 2012 Internet Measurement Conference (IMC 2012), Boston, Massachusetts | November 2012 | Networking | [PDF]
|
| An Assessment of Overt Malicious Activity Manifest in Residential Networks | G. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. Vallentin | Proceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp 144-163 | July 2011 | Networking | [PDF]
|
| NAT Usage in Residential Broadband Networks | G. Maier, F. Schneider, and A. Feldmann | Proceedings of the 12th International Conference on Passive and Active Network Measurement (PAM 2011), Atlanta, Georgia | March 2011 | Networking | [PDF]
|
| Click Trajectories: End-to-End Analysis of the Spam Value Chain | K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage | Proceedings of the IEEE Symposium on Security and Privacy, pp. 431-446, Oakland, California | May 2011 | Networking | [PDF]
|
| What's Clicking What? Techniques and Innovations of Today's Clickbots | B. Miller, P. Pearce, C. Grier, C. Kreibich, and V. Paxson | Proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp. 164-183 | July 2011 | Networking | [PDF]
|
| A First Look at Mobile Hand-held Device Traffic | G. Maier, F. Schneider, and A. Feldmann | Proceedings of the 11th International Conference on Passive and Active Network Measurement (PAM 2010), Zurich, Switzerland, pp. 161-170 | April 2010 | Networking | [PDF]
|
| Implications of Netalyzr's DNS Measurements | N. Weaver, C. Kreibich, B. Nechaev, and V. Paxson | Proceedings of the First Workshop on Securing and Trusting Internet Names (SATIN), Teddington, United Kingdom | April 2011 | Networking | [PDF]
|
| Design and Evaluation of a Real-Time URL Spam Filtering Service | K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song | Proceedings of the 32nd IEEE Symposium on Security and Privacy, Oakland, California, pp. 447-464 | May 2011 | Networking | [PDF]
|