Publication Search Results

Titlesort descendingAuthorBibliographicDateGroupLinks
Sharing the Cost of Multicast TransmissionsJ. Feigenbaum, C. Papadimitriou, and S. ShenkerThirty-Second Annual ACM Symposium on Theory of Computing (STOC00), May 2000.May 2000Networking
Sharing the Cost of Multicast TransmissionsJ. Feigenbaum, C. Papadimitriou, and S. ShenkerProceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC 2000), Portland, Oregon, pp. 218-227May 2000Networking
Shark: Fast Data Analysis Using Coarse-grained Distributed MemoryC. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. StoicaDemo, ACM SIGMOD/PODS Conference, Scottsdale, ArizonaMay 2012Networking[PDF]

Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online PrivacyG. Friedland, G. Maier, R. Sommer, and N. WeaverProceedings of the New Security Paradigms Workshop (NSPW), Marin County, CaliforniaSeptember 2011Networking[PDF]

Show Me the Money: Characterizing Spam-Advertised RevenueC. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. SavageProceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion PreventionJ. Gonzalez, V. Paxson, and N. WeaverProceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008), Alexandria, Virginia, pp. 139-149October 2007Networking[PDF]

Simulation is CrucialS. FloydSidebar, IEEE Spectrum, January 2001.January 2001Networking
Simulation-based Comparisons of Tahoe, Reno, and SACK TCPK. Fall and S. FloydComputer Communication Review, Vol. 26, No. 3, pp. 5-21July 1996Networking[PDF]

Skilled in the Art of Being Idle: Reducing Energy Waste in Networked SystemsS. Nedevschi, J. Chandrashenkar, B. Nordman, S. Ratnasamy, and N. TaftProceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), Boston, Massachusetts, pp. 381-394April 2009Networking[PDF]

SmartSeer: Using a DHT to Process Continuous Queries over Peer-to-Peer NetworksS. Banerjee, S. Basu, J. Kannan, S. J. Lee, P. Sharma, S. Shenker, and B. YangProceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), Barcelona, Spain, pp. 1-12April 2006Networking[PDF]

Software-Defined Internet ArchitectureB. Raghavan, T. Koponen, M. Casado, A. Ghodsi, S. Ratnasamy, and S. ShenkerProceedings of the ACM Workshop on Hot Topics in Networks (HotNets-XII), Seattle, WashingtonOctober 2012Networking[PDF]

Software-Defined Networking: History, Hype, and HopeS. ShenkerProceedings of the Conference on Large-Scale Distributed Systems and Middleware (LADIS 2012), Madeira, Portugal. Also in the proceedings of the Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2012), Ouro Preto, Brazil, April 2012.July 2012Networking
Spam Detection Using Web Page Content: A New BattlegroundM. Ribeiro, P. Guerra, L. Vilela, A. Veloso, D. Guedes, W. Meira Jr., M. Chaves, K. Steding-Jessen, and C. HoepersProceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011), Perth, Australia.September 2011Networking[PDF]

Spamalytics: An Empirical Analysis of Spam Marketing ConversionC. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 3-14. Also appeared in the Communications of the ACM, Vol. 52, No. 9, pp. 99-107, September 2009October 2008Networking[PDF]

Spamcraft: An Inside Look At Spam Campaign OrchestrationC. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’09), Boston, MassachusettsApril 2009Networking[PDF]

Spark: Cluster Computing with Working SetsM. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker and I. StoicaProceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, MassachusettsJune 2010Networking[PDF]

Specification of guaranteed quality of serviceS. Shenker, C. Partridge, and R. GuerinRequest for Comments (Proposed Standard) 2212, Internet Engineering Task ForceSeptember 1997Networking
Specifying New Congestion Control AlgorithmsS. Floyd and M. AllmanRequest For Comments 5033, Best Current Practice 133August 2007Networking[PDF]

Spurring Adoption of DHTs with OpenHash, a Public DHT ServiceB. Karp, S. Ratnasamy, S. Rhea, and S. ShenkerProceedings of the Third International Workshop on Peer-to-Peer Systems, San Diego, CaliforniaFebruary 2004Networking[PDF]

Strategies for Sound Internet MeasurementV. PaxsonProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, ItalyOctober 2004Networking[PDF]

Strawman Specification for TCP Friendly (Reliable) Multicast Congestion Control (TFMCC)M. Handley and S. FloydReliable Multicast Research GroupDecember 1998Networking
Stream Control Transmission ProtocolR. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. PaxsonRequest for Comments 2960, Proposed Standard, October 2000.October 2000Networking
Stress Testing Cluster BroN. Weaver and R. SommerProceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007), Boston, MassachusettsAugust 2007Networking[PDF]

Suspended Accounts in Retrospect: An Analysis of Twitter SpamK. Thomas, C. Grier, V. Paxson, and D. SongProceedings of the 2011 Internet Measurement Conference (IMC), Berlin, GermanyNovember 2011Networking[PDF]

TCP and Explicit Congestion NotificationS. FloydACM Computer Communication Review, Vol. 24, No. 5, pp. 10-23October 1994Networking[PDF]

TCP Behavior in Networks with Dynamic Propagation DelayM. Allman, J. Griner, and A. RichardProceedings of Globecom 2000, November 2000.November 2000Networking
TCP Byte Counting RefinementsM. AllmanACM Computer Communication Review, 29(3), July 1999.July 1999Networking
TCP Congestion ControlM. Allman, V. Paxson, and W.R. StevensRequest for Comments 2581, Proposed Standard, April 1999.April 1999Networking
TCP Congestion Control with Appropriate Byte Counting (ABC)M. AllmanRFC 3465February 2003Networking
TCP Congestion Window ValidationM. Handley, S. Floyd, and J. PadhyeRequest for Comments 2861, Experimental, June 2000.June 2000Networking
TCP Congestion Window ValidationM. Handley, J. Padhye, and S. FloydRequest for Comments 2861, Experimental, June 2000. Also UMass CMPSCI Technical Report No. 99-77, September 1999.June 2000Networking
TCP Fast OpenS. Radhakrishnan, Y. Cheng, J. Chu, A. Jain, and B. RaghavanProceedings of the 7th International Conference on emerging Network EXperiments and Technologies (ACM CoNEXT 2011), Tokyo, JapanDecember 2011Networking[PDF]

TCP Performance Over Satellite LinksM. Allman, C. Hayes, H. Kruse, and S. OstermannProceedings of the Fifth International Conference on Telecommunications Systems, Nashville, TennesseeeMarch 1997Networking
TCP Processing of the IPv4 Precedence FieldX. Xiao, A. Hannan, V. Paxson, and E. CrabbeRequest for Comments 2873, Proposed Standard, June 2000.June 2000Networking
TCP Slow Start Survey: Standards and IssuesM. AllmanIETF Internet-Draft, Draft-ietf-tcpm-early-rexmt-00.txt, in progressAugust 2008Networking[PDF]

The "Dresden Image Database" for Benchmarking Digital Image ForensicsT. Gloe and R. BoehmeProceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), pp. 1584-1590, Sierre, SwitzerlandMarch 2010Networking
The Architecture of PIER: An Internet-Scale Query ProcessorR. Huebsch, B. Chun, J. M. Hellerstein, B. T. Loo, P. Maniatis, T. Roscoe, S. Shenker, I. Stoica, and A. R. YumerefendiProceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, California, pp. 28-43January 2005Networking[PDF]

The BIZ Top-Level Domain: Ten Years LaterT. Halvorson, J. Szurdi, G. Maier, M. Felegyhazi, C. Kreibich, N. Weaver, K. Levchenko, and V. PaxsonProceedings of the 13th Passive and Active Measurement Conference, Vienna, AustriaMarch 2012Networking[PDF]

The Click Modular RouterE. KohlerPh.D. thesis, Massachusetts Institute of Technology, November 2000.November 2000Networking
The Click Modular RouterE. Kohler, R. Morris, B. Chen, J. Jannotti, and M.F. KaashoekACM Transactions on Computer Systems 18 (3), August 2000, pages 263-297.August 2000Networking
The Click Modular RouterR. Morris, E. Kohler, J. Jannotti, and M.F. KaashoekProceedings of the Seventeenth ACM Symposium on Operating Systems Principles (SOSP '99) , Kiawah Island, South Carolina, December 1999, pages 217-231.December 1999Networking
The Datacenter Needs an Operating SystemM. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. StoicaProceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, OregonJune 2011Networking[PDF]

The Design and Implementation of a Declarative Sensor Network SystemD. Chu, L. Popa, A. Tavakoli, J. Hellerstein, P. Levis, S. Shenker, and I. StoicaEECS Department, UC Berkeley Technical Report No. EECS-2006-132, Berkeley, CaliforniaOctober 2006Networking
The Devil and Packet Trace AnonymizationR. Pang, M. Allman, V. Paxson, and J. LeeComputer Communication Review, Vol. 36, Issue 1, pp. 29-38January 2006Networking
The Energy and Emergy of the InternetB. Raghavan and J. MaProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

The Impact of DHT Routing Geometry on Resilience and ProximityK. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. StoicaProceedings of ACM SIGCOMM 2003, Karlruhe, GermanyAugust 2003Networking
The Impact of Routing Policy on Internet PathsH. Tangmunarunkit, R. Govindan, S. Shenker, and D. EstrinINFOCOM 2001: 736-742. 2001Networking
The Importance of Trusting Beliefs Linked to the Corporate Website for Diffusion of Recruiting-Related Online InnovationsM. Bermudez-Edo, N. Hurtado-Torres, and J. A. Aragon-CorreaInformation Technology and Management, Vol. 11, No. 4, pp. 177-189December 2010Networking
The Internet Multicast Address Allocation ArchitectureD. Thaler, M. Handley, and D. EstrinRequest for Comments 2908, Informational, September 2000.September 2000Networking
The Internet Under Crisis Conditions: Learning From September 11C. Partridge, P. Barford, D. Clark, S. Donelan, V. Paxson, J. Rexford, M. Vernon, J. Eisenberg, M. Blumenthal, D. Padgham, K. Batch, D. Drake, and J. BriscoeComputer Science and Telecommunications Board, National Research Council, National Academy Press, Washington, DC 2002Networking[PDF]

Pages