Publication Search Results

TitleAuthorBibliographicDateGroupLinkssort descending
Sharing the Cost of Multicast TransmissionsJ. Feigenbaum, C. Papadimitriou, and S. ShenkerProceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC 2000), Portland, Oregon, pp. 218-227May 2000Networking
Distributed Algorithmic Mechanism Design: Recent Results and Future DirectionsJ. Feigenbaum and S. ShenkerProceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM'02), Atlanta, Georgia, pp. 1-13September 2002Networking[PDF]

An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being SlowE. Friedman, M. Shor, S. Shenker, and B. SopherGames and Economic Behavior, Vol. 47, Issue 2, pp. 325-352May 2004Networking
On the Effects of Registrar-Level InterventionH. Liu, K. Levchenko, M. Felegyhazi, C. Kreibich, G. Maier, G. M. Voelker, and Stefan SavageProceedings of the Fourth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11), Boston, MassachusettsMarch 2011Networking[PDF]

Internet Research Needs Better ModelsS. Floyd and E. KohlerACM Computer Communications Review, Vol. 33, No. 1, pp. 29-34January 2003Networking[PDF]

MultiQ: Automated Detection of Multiple Bottlenexk Capacities Along a PathS. Katti, D. Katabi, C. Blake, E. Kohler, and J. StraussProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 245-250October 2004Networking[PDF]

Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster SchedulingM. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. StoicaProceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278April 2010Networking[PDF]

Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, GermanyC. Kreibich and M. Jahnke, eds.Springer 2010Networking
Semantic-Free Referencing in Linked Distributed SystemsH. Balakrishnan, S. Shenker, and M. WalfishProceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, CaliforniaFebruary 2003Networking[PDF]

DoS: Fighting Fire with FireM. Walfish, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, MarylandNovember 2005Networking[PDF]

Very Fast Containment of Scanning Worms, RevisitedN. Weaver, S. Staniford, and V. PaxsonIn Malware Detection: Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, eds., pp. 113-145, Springer 2007Networking
Detecting Hidden Causality in Network ConnectionsJ. Kannan, J. Jung, V. Paxson, and C. E. KoksalEECS Department, UC Berkeley Technical Report No. UCB/EECS-2005-30, Berkeley, CaliforniaDecember 2005Networking[PDF]

Personal NamespacesM. AllmanProceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, GeorgiaNovember 2007Networking[PDF]

Onix: A Distributed Control Platform for Large-scale Production NetworksT. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, and S. ShenkerProceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 351-364October 2010Networking[PDF]

Netalyzr: Illuminating The Edge NetworkC. Kreibich, N. Weaver, B. Nechaev, and V. PaxsonProceedings of the Internet Measurement Conference (IMC 2010), Melbourne, Australia, pp. 246-259November 2010Networking[PDF]

@spam: The Underground on 140 Characters or LessC. Grier, K. Thomas, V. Paxson, and M. ZhangProceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, Illinois, pp. 27-37October 2010Networking[PDF]

Towards Insurable Network ArchitecturesR. BoehmeJournal of Information Technology, Vol. 52, No. 5, pp. 290-293September 2010Networking
Learning Heuristic Functions for State-Space PlaningB. Satzger and O. KramerProceedings of the Fifth IASTED International Conference on Computational Intelligence (CI 2010), Maui, HawaiiAugust 2010Networking
Using Strongly Typed Networking to Architect for TussleC. Muthukrishnan, V. Paxson, M. Allman, and A. AkellaProceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 9October 2010Networking[PDF]

On Building Special-Purpose Social Networks for Emergency CommunicationM. AllmanACM Computer Communication Review, Vol. 40, Issue 5October 2010Networking[PDF]

Optimal Information Security Investment with Penetration TestingR. Boehme and M. FelegyhaziProceedings of the Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany, 21-37November 2010Networking[PDF]

Brooery: A Graphical Environment for Analysis of Security-Relevant Network ActivityC. KreibichProceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118April 2005Networking[PDF]

Policy-Controlled Event Management for Distributed Intrusion DetectionC. Kreibich and R. SommerProceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05), Columbus, Ohio, Vol. 4, pp. 385-391June 2005Networking[PDF]

Holding the Internet AccountableD. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. ShenkerProceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, GeorgiaNovember 2007Networking[PDF]

Can Software Routers Scale?K. Argyraki, S. Baset, B. Chun, K. Fall, G. Iannaccone, A. Knies, E. Kohler, M. Manesh, S. Nedevschi, and S. RatnasamyProceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO'08), Seattle, WashingtonAugust 2008Networking[PDF]

Hot Data Centers vs. Cool PeersS. Nedevschi, S. Ratnasamy, and J. PadhyeProceedings of the Workshop on Power Aware Computing and Systems (HotPower '09), Big Sky, Montana, p. 8October 2009Networking[PDF]

Reducing Network Energy Consumption via Sleeping and Rate-AdaptationS. Nedevschi, L. Popa, G. Iannaccone, S. Raynasamy, and D. WetherallProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, California, pp. 323-336April 2008Networking[PDF]

Beyond Pilots: Keeping Rural Wireless Networks AliveS. Surana, R. Patra, S. Nedevschi, M. Ramos, L. Subramanian, Y. Ben-David, and E. BrewerProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, CaliforniaApril 2008Networking[PDF]

Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, CanadaS. Jha, R. Sommer, and C. Kreibich, eds.Springer VerlagSeptember 2010Networking
Ripcord: A Modular Platform for Data Center NetworkingB. Heller, D. Erickson, N. McKeown, R. Griffith, I. Ganichev, S. Whyte, K. Zarifis, D. Moon, S. Shenker, and S. StuartProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2010), New Delhi, India, pp. 457-458August 2010Networking[PDF]

Building Extensible Networks with Rule-Based ForwardingL. Popa, N. Egi, S. Ratnasamy, and I. StoicaProceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 379-391October 2010Networking[PDF]

The Importance of Trusting Beliefs Linked to the Corporate Website for Diffusion of Recruiting-Related Online InnovationsM. Bermudez-Edo, N. Hurtado-Torres, and J. A. Aragon-CorreaInformation Technology and Management, Vol. 11, No. 4, pp. 177-189December 2010Networking
Computing TCP's Retransmission TimerV. Paxson, M. Allman, J. Chu, and M. SargentRFC 6298June 2011Networking[PDF]

Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?T. Ouyang, S. Ray, M. Rabinovich, and M. AllmanProceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Detecting and Analyzing Automated Activity on TwitterC. M. Zhang and V. PaxsonProceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

A Cost Comparison of Datacenter Network ArchitecturesL. Popa, S. Ratnasamy, G. Iannaccone, A. Krishnamurthy, and I. StoicaProceedings of the 6th ACM International Conference on Emerging Networking EXperiments and Technologies, Philadelphia, Pennsylvania, article no. 16December 2010Networking[PDF]

CloudPolice: Taking Access Control out of the NetworkL. Popa, M. Yu, S. Y. Ko, S. Ratnasamy, and I. StoicaProceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 7October 2010Networking[PDF]

HTTP as the Narrow Waist of the Future InternetL. Popa, A. Ghodsi, and I. StoicaProceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 6October 2010Networking[PDF]

Dynamic Route Recomputation Considered HarmfulM. Caesar, M. Casado, T. Koponen, J. Rexford, and S. ShenkerComputer Communication Review, Vol. 40, Issue 2April 2010Networking[PDF]

Virtualizing the Network Forwarding PlaneM. Casado, T. Koponen, R. Ramanathan, and S. ShenkerProceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO 2010), Philadelphia, PennsylvaniaDecember 2010Networking[PDF]

YAMR: Yet Another Multipath Routing ProtocolI. Ganichev, B. Dai, B. Godfrey, and S. ShenkerACM SIGCOMM Computer Communication Review, Vol. 40, Issue 5October 2010Networking[PDF]

Dominant Resource Fairness: Fair Allocation of Multiple Resources in DatacentersA. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski, S. Shenker, and I. StoicaProceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011), Boston, MassachusettsMarch 2011Networking[PDF]

Fathom: A Browser-based Network Measurement PlatformM. Dhawan, J. Samuel, R. Teixeira, C. Kreibich, M. Allman, N. Weaver, and V. PaxsonProceedings of the 2012 Internet Measurement Conference (IMC 2012), Boston, MassachusettsNovember 2012Networking[PDF]

An Assessment of Overt Malicious Activity Manifest in Residential NetworksG. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. VallentinProceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp 144-163July 2011Networking[PDF]

NAT Usage in Residential Broadband NetworksG. Maier, F. Schneider, and A. FeldmannProceedings of the 12th International Conference on Passive and Active Network Measurement (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Click Trajectories: End-to-End Analysis of the Spam Value ChainK. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. SavageProceedings of the IEEE Symposium on Security and Privacy, pp. 431-446, Oakland, CaliforniaMay 2011Networking[PDF]

What's Clicking What? Techniques and Innovations of Today's ClickbotsB. Miller, P. Pearce, C. Grier, C. Kreibich, and V. PaxsonProceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp. 164-183July 2011Networking[PDF]

A First Look at Mobile Hand-held Device TrafficG. Maier, F. Schneider, and A. FeldmannProceedings of the 11th International Conference on Passive and Active Network Measurement (PAM 2010), Zurich, Switzerland, pp. 161-170April 2010Networking[PDF]

Implications of Netalyzr's DNS MeasurementsN. Weaver, C. Kreibich, B. Nechaev, and V. PaxsonProceedings of the First Workshop on Securing and Trusting Internet Names (SATIN), Teddington, United KingdomApril 2011Networking[PDF]

Design and Evaluation of a Real-Time URL Spam Filtering ServiceK. Thomas, C. Grier, J. Ma, V. Paxson, and D. SongProceedings of the 32nd IEEE Symposium on Security and Privacy, Oakland, California, pp. 447-464May 2011Networking[PDF]

Pages