| Sharing the Cost of Multicast Transmissions | J. Feigenbaum, C. Papadimitriou, and S. Shenker | Thirty-Second Annual ACM Symposium on Theory of Computing (STOC00), May 2000. | May 2000 | Networking | |
| Sharing the Cost of Multicast Transmissions | J. Feigenbaum, C. Papadimitriou, and S. Shenker | Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC 2000), Portland, Oregon, pp. 218-227 | May 2000 | Networking | |
| Shark: Fast Data Analysis Using Coarse-grained Distributed Memory | C. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. Stoica | Demo, ACM SIGMOD/PODS Conference, Scottsdale, Arizona | May 2012 | Networking | [PDF]
|
| Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy | G. Friedland, G. Maier, R. Sommer, and N. Weaver | Proceedings of the New Security Paradigms Workshop (NSPW), Marin County, California | September 2011 | Networking | [PDF]
|
| Show Me the Money: Characterizing Spam-Advertised Revenue | C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. Savage | Proceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, California | August 2011 | Networking | [PDF]
|
| Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention | J. Gonzalez, V. Paxson, and N. Weaver | Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008), Alexandria, Virginia, pp. 139-149 | October 2007 | Networking | [PDF]
|
| Simulation is Crucial | S. Floyd | Sidebar, IEEE Spectrum, January 2001. | January 2001 | Networking | |
| Simulation-based Comparisons of Tahoe, Reno, and SACK TCP | K. Fall and S. Floyd | Computer Communication Review, Vol. 26, No. 3, pp. 5-21 | July 1996 | Networking | [PDF]
|
| Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems | S. Nedevschi, J. Chandrashenkar, B. Nordman, S. Ratnasamy, and N. Taft | Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), Boston, Massachusetts, pp. 381-394 | April 2009 | Networking | [PDF]
|
| SmartSeer: Using a DHT to Process Continuous Queries over Peer-to-Peer Networks | S. Banerjee, S. Basu, J. Kannan, S. J. Lee, P. Sharma, S. Shenker, and B. Yang | Proceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), Barcelona, Spain, pp. 1-12 | April 2006 | Networking | [PDF]
|
| Software-Defined Internet Architecture | B. Raghavan, T. Koponen, M. Casado, A. Ghodsi, S. Ratnasamy, and S. Shenker | Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets-XII), Seattle, Washington | October 2012 | Networking | [PDF]
|
| Software-Defined Networking: History, Hype, and Hope | S. Shenker | Proceedings of the Conference on Large-Scale Distributed Systems and Middleware (LADIS 2012), Madeira, Portugal. Also in the proceedings of the Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2012), Ouro Preto, Brazil, April 2012. | July 2012 | Networking | |
| Spam Detection Using Web Page Content: A New Battleground | M. Ribeiro, P. Guerra, L. Vilela, A. Veloso, D. Guedes, W. Meira Jr., M. Chaves, K. Steding-Jessen, and C. Hoepers | Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011), Perth, Australia. | September 2011 | Networking | [PDF]
|
| Spamalytics: An Empirical Analysis of Spam Marketing Conversion | C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 3-14. Also appeared in the Communications of the ACM, Vol. 52, No. 9, pp. 99-107, September 2009 | October 2008 | Networking | [PDF]
|
| Spamcraft: An Inside Look At Spam Campaign Orchestration | C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’09), Boston, Massachusetts | April 2009 | Networking | [PDF]
|
| Spark: Cluster Computing with Working Sets | M. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker and I. Stoica | Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, Massachusetts | June 2010 | Networking | [PDF]
|
| Specification of guaranteed quality of service | S. Shenker, C. Partridge, and R. Guerin | Request for Comments (Proposed Standard) 2212, Internet Engineering Task Force | September 1997 | Networking | |
| Specifying New Congestion Control Algorithms | S. Floyd and M. Allman | Request For Comments 5033, Best Current Practice 133 | August 2007 | Networking | [PDF]
|
| Spurring Adoption of DHTs with OpenHash, a Public DHT Service | B. Karp, S. Ratnasamy, S. Rhea, and S. Shenker | Proceedings of the Third International Workshop on Peer-to-Peer Systems, San Diego, California | February 2004 | Networking | [PDF]
|
| Strategies for Sound Internet Measurement | V. Paxson | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy | October 2004 | Networking | [PDF]
|
| Strawman Specification for TCP Friendly (Reliable) Multicast Congestion Control (TFMCC) | M. Handley and S. Floyd | Reliable Multicast Research Group | December 1998 | Networking | |
| Stream Control Transmission Protocol | R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson | Request for Comments 2960, Proposed Standard, October 2000. | October 2000 | Networking | |
| Stress Testing Cluster Bro | N. Weaver and R. Sommer | Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007), Boston, Massachusetts | August 2007 | Networking | [PDF]
|
| Suspended Accounts in Retrospect: An Analysis of Twitter Spam | K. Thomas, C. Grier, V. Paxson, and D. Song | Proceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany | November 2011 | Networking | [PDF]
|
| TCP and Explicit Congestion Notification | S. Floyd | ACM Computer Communication Review, Vol. 24, No. 5, pp. 10-23 | October 1994 | Networking | [PDF]
|
| TCP Behavior in Networks with Dynamic Propagation Delay | M. Allman, J. Griner, and A. Richard | Proceedings of Globecom 2000, November 2000. | November 2000 | Networking | |
| TCP Byte Counting Refinements | M. Allman | ACM Computer Communication Review, 29(3), July 1999. | July 1999 | Networking | |
| TCP Congestion Control | M. Allman, V. Paxson, and W.R. Stevens | Request for Comments 2581, Proposed Standard, April 1999. | April 1999 | Networking | |
| TCP Congestion Control with Appropriate Byte Counting (ABC) | M. Allman | RFC 3465 | February 2003 | Networking | |
| TCP Congestion Window Validation | M. Handley, S. Floyd, and J. Padhye | Request for Comments 2861, Experimental, June 2000. | June 2000 | Networking | |
| TCP Congestion Window Validation | M. Handley, J. Padhye, and S. Floyd | Request for Comments 2861, Experimental, June 2000. Also UMass CMPSCI Technical Report No. 99-77, September 1999. | June 2000 | Networking | |
| TCP Fast Open | S. Radhakrishnan, Y. Cheng, J. Chu, A. Jain, and B. Raghavan | Proceedings of the 7th International Conference on emerging Network EXperiments and Technologies (ACM CoNEXT 2011), Tokyo, Japan | December 2011 | Networking | [PDF]
|
| TCP Performance Over Satellite Links | M. Allman, C. Hayes, H. Kruse, and S. Ostermann | Proceedings of the Fifth International Conference on Telecommunications Systems, Nashville, Tennesseee | March 1997 | Networking | |
| TCP Processing of the IPv4 Precedence Field | X. Xiao, A. Hannan, V. Paxson, and E. Crabbe | Request for Comments 2873, Proposed Standard, June 2000. | June 2000 | Networking | |
| TCP Slow Start Survey: Standards and Issues | M. Allman | IETF Internet-Draft, Draft-ietf-tcpm-early-rexmt-00.txt, in progress | August 2008 | Networking | [PDF]
|
| The "Dresden Image Database" for Benchmarking Digital Image Forensics | T. Gloe and R. Boehme | Proceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), pp. 1584-1590, Sierre, Switzerland | March 2010 | Networking | |
| The Architecture of PIER: An Internet-Scale Query Processor | R. Huebsch, B. Chun, J. M. Hellerstein, B. T. Loo, P. Maniatis, T. Roscoe, S. Shenker, I. Stoica, and A. R. Yumerefendi | Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, California, pp. 28-43 | January 2005 | Networking | [PDF]
|
| The BIZ Top-Level Domain: Ten Years Later | T. Halvorson, J. Szurdi, G. Maier, M. Felegyhazi, C. Kreibich, N. Weaver, K. Levchenko, and V. Paxson | Proceedings of the 13th Passive and Active Measurement Conference, Vienna, Austria | March 2012 | Networking | [PDF]
|
| The Click Modular Router | E. Kohler | Ph.D. thesis, Massachusetts Institute of Technology, November 2000. | November 2000 | Networking | |
| The Click Modular Router | E. Kohler, R. Morris, B. Chen, J. Jannotti, and M.F. Kaashoek | ACM Transactions on Computer Systems 18 (3), August 2000, pages 263-297. | August 2000 | Networking | |
| The Click Modular Router | R. Morris, E. Kohler, J. Jannotti, and M.F. Kaashoek | Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles (SOSP '99) , Kiawah Island, South Carolina, December 1999, pages 217-231. | December 1999 | Networking | |
| The Datacenter Needs an Operating System | M. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. Stoica | Proceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| The Design and Implementation of a Declarative Sensor Network System | D. Chu, L. Popa, A. Tavakoli, J. Hellerstein, P. Levis, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. EECS-2006-132, Berkeley, California | October 2006 | Networking | |
| The Devil and Packet Trace Anonymization | R. Pang, M. Allman, V. Paxson, and J. Lee | Computer Communication Review, Vol. 36, Issue 1, pp. 29-38 | January 2006 | Networking | |
| The Energy and Emergy of the Internet | B. Raghavan and J. Ma | Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, Massachusetts | November 2011 | Networking | [PDF]
|
| The Impact of DHT Routing Geometry on Resilience and Proximity | K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica | Proceedings of ACM SIGCOMM 2003, Karlruhe, Germany | August 2003 | Networking | |
| The Impact of Routing Policy on Internet Paths | H. Tangmunarunkit, R. Govindan, S. Shenker, and D. Estrin | INFOCOM 2001: 736-742. | 2001 | Networking | |
| The Importance of Trusting Beliefs Linked to the Corporate Website for Diffusion of Recruiting-Related Online Innovations | M. Bermudez-Edo, N. Hurtado-Torres, and J. A. Aragon-Correa | Information Technology and Management, Vol. 11, No. 4, pp. 177-189 | December 2010 | Networking | |
| The Internet Multicast Address Allocation Architecture | D. Thaler, M. Handley, and D. Estrin | Request for Comments 2908, Informational, September 2000. | September 2000 | Networking | |
| The Internet Under Crisis Conditions: Learning From September 11 | C. Partridge, P. Barford, D. Clark, S. Donelan, V. Paxson, J. Rexford, M. Vernon, J. Eisenberg, M. Blumenthal, D. Padgham, K. Batch, D. Drake, and J. Briscoe | Computer Science and Telecommunications Board, National Research Council, National Academy Press, Washington, DC | 2002 | Networking | [PDF]
|