| Growth Trends in Wide-Area TCP Connections | V. Paxson | IEEE Network, Vol. 8 No. 4, pp. 8-17 | June 1994 | Networking | |
| J. Ishac and M. Allman | On the Performance of TCP Spoofing in Satellite Networks | IEEE Milcom. October 2001. | October 2001 | Networking | |
| Approximate Fair Allocation of Link Bandwidth | R. Pan, B. Prabhakar, L. Breslau, and S. Shenker | IEEE Micro Vol. 23, Issue 1, pp. 36-43 | 2003 | Networking | |
| Inside the Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | IEEE Magazine of Security and Privacy, Vol. 1, Issue 4, pp. 33-39 | July 2003 | Networking | [PDF]
|
| Hidden-Action in Network Routing | M. Feldman, J. Chuang, I. Stoica, and S. Shenker | IEEE Journal on Selected Areas in Communications, Vol. 25, Issue 6, pp. 1161-1172 | August 2007 | Networking | [PDF]
|
| Dynamics of TCP Traffic over ATM Networks | S. Floyd and A. Romanow | IEEE Journal on Selected Areas in Communication, Vol. 13, No. 4, pp. 633-641 | May 1995 | Networking | [PDF]
|
| The Network Oracle | J. Hellerstein, V. Paxson, L. Peterson, T. Roscoe, S. Shenker, and D. Wetherall | IEEE Data Engineering Bulletin, Vol. 28, No. 1, pp. 3-10 | March 2005 | Networking | [PDF]
|
| Advances in Network Simulation | L. Breslau, et al. | IEEE Computer, May 2000, pp. 59-67. Or the technical report: Technical Report 99-702, University of Southern California, March 1999. | May 2000 | Networking | |
| Network Visualization with the Nam, VINT Network Animator | D. Estrin, M. Handley, J. Heidemann, S. McCanne, Y. Xu, and H. Yu | IEEE Computer, 33(11), 63-68, November 2000. | November 2000 | Networking | |
| An Architecture for Large-Scale Internet Measurement | V. Paxson, J. Mahdavi, A. Adams, and M. Mathis | IEEE Communications, Vol. 36, No. 8, pp. 48-54 | August 1998 | Networking | |
| The Use of End-to-end Multicast Measurements for Characterizing Internal Network Behavior | A. Adams, T. Bu, R. Caceres, N. Duffield, T. Friedman, J. Horowitz, F. Lo Presti, S.B. Moon, V. Paxson, and D. Towsley | IEEE Communications, 38(5), May 2000. | April 2000 | Networking | |
| Internet Connectivity for Mobile Ad Hoc Networks: Solutions and Challenges | P. M. Ruiz, F. J. Ros, and A.F. Gomez Skarmeta | IEEE Communications Magazine, pp. 118–125 | October 2005 | Networking | |
| A Report on Some Recent Developments in TCP Congestion Control | S. Floyd | IEEE Communications Magazine, April 2001. | April 2001 | Networking | |
| NOSIX: A Portable Switch Interface for the Network Operating System | A. Wundsam and M.Yu | ICSI Technical Report TR-12-013 | October 2012 | Networking | [PDF]
|
| Content‐based Privacy for Consumer‐Produced Multimedia | A. Janin, G. Friedland, and R. Sommer | ICSI Technical Report TR-12-012 | October 2012 | Networking | [PDF]
|
| Making the Internet More Evolvable | B. Raghavan, T. Koponen, A. Ghodsi, V. Brajkovic, and S. Shenker | ICSI Technical Report TR-12-011 | September 2012 | Networking | [PDF]
|
| RR-TCP: A Reordering-Robust TCP with DSACK | M. Zhang, B. Karp, S. Floyd, and L. Peterson | ICSI Technical Report TR-02-006 | July 2002 | Networking | [PDF]
|
| Controlling High-Bandwidth Flows at the Congested Router | R. Mahajan, S. Floyd, and D. Wetherall | ICNP 2001 | 2001 | Networking | |
| An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being Slow | E. Friedman, M. Shor, S. Shenker, and B. Sopher | Games and Economic Behavior, Vol. 47, Issue 2, pp. 325-352 | May 2004 | Networking | |
| Approximation and Collusion in Multicast Cost Sharing | J. Feigenbaum, A. Archer, A. Krishnamurthy, R. Sami, and S. Shenker | Games and Economic Behavior, Vol. 47, Issue 1, pp. 36-71 | April 2004 | Networking | [PDF]
|
| Randomized Rumor Spreading | R. M. Karp, C. Schindelhauer, S. Shenker, and B. Vocking | FOCS 2000, pp. 565-574 | 2000 | Networking | |
| XORP: An Open Platform for Network Research | M. Handley, O. Hodson, and E. Kohler | First Workshop on Hot Topics in Networking, October 2002. | October 2002 | Networking | |
| Agents' Privacy In Distributed Algorithmic Mechanisms (Position Paper) | J. Feigenbaum, N. Nisan, V. Ramachandran, R. Sami, and S. Shenker | First Workshop on Economics and Information Security, Berkeley, California | May 2002 | Networking | |
| GHT: A Geographic Hash-table for Data-centric Storage in Sensornets | S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker | First ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), September 2002. | September 2002 | Networking | |
| Ongoing TCP Research Related to Satellites | M. Allman, S. Dawkins, D. Glover, J. Griner, D. Tran, T. Henderson, J. Heidemann, J. Touch, H. Kruse, S. Ostermann, K. Scott, and J. Semke | February 2000. Request for Comments 2760. | February 2000 | Networking | |
| Reliable Multicast Transport Building Blocks for One-to-Many Bulk-Data Transfer | B Whetton, L. Vicisano, R. Kermode, M. Handley, S. Floyd, and M. Luby | Experimental Request for Comments, October 2000. | October 2000 | Networking | |
| DIFS: A Distributed Index for Features in Sensor Networks | B. Greenstein, D. Estrin, R. Govindan, S. Ratnasamy, and S. Shenker | Elsevier Journal of Ad Hoc Networks, 2003. (Also in the First IEEE Workshop on Sensor Networks Protocols and Applications, SNPA, 2003) | 2003 | Networking | |
| End-Host Controlled Multicast Routing | K. Lakshminarayanan, A. Rao, I. Stoica, and S. Shenker | Elsevier Computer Networks, Special Issue on Overlay Distribution Structures and their Applications, Vol. 5, Issue 6, pp. 807-825. DOI:10.1016/j.comnet.2005.07.019 | April 2006 | Networking | [PDF]
|
| Post Placement C-Slow Retiming for the Xilinx Virtex FPGA | N. Weaver, Y. Markovskiy, Y. Patel, and J. Wawrzynek | Eleventh ACM Symposium of Field Programmable Gate Arrays (FPGA) | 2003 | Networking | [PDF]
|
| Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community | M. Zaharia, S. Katti, C. Grier, V. Paxson, S. Shenker, I. Stoica and D. Song | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2012-12, Berkeley, California | January 2012 | Networking | [PDF]
|
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. Franklin, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-82, Berkeley, California | July 2011 | Networking | [PDF]
|
| Flush: A Reliable Bulk Transport Protocol for Multihop Wireless Network | S. Kim, R. Fonseca, P.K. Dutta, A. Tavakoli, D.E. Culler, P. Levis, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2006-169, Berkeley, California | December 12 2006 | Networking | |
| Detecting Hidden Causality in Network Connections | J. Kannan, J. Jung, V. Paxson, and C. E. Koksal | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2005-30, Berkeley, California | December 2005 | Networking | [PDF]
|
| The Design and Implementation of a Declarative Sensor Network System | D. Chu, L. Popa, A. Tavakoli, J. Hellerstein, P. Levis, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. EECS-2006-132, Berkeley, California | October 2006 | Networking | |
| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks - Summary | R. Krishnan, M. Allman, C. Partridge, J.P.G. Sterbenz, and W. Ivancic | Earth Science Technology Conference, Pasadena, California, June 2002. | June 2002 | Networking | |
| Java Security Architecture and Extensions | V. Roth | Dr. Dobbs Journal, 2002(335), April 2002. | April 2002 | Networking | |
| Mechanism Design for Policy Routing | J. Feigenbaum, R. Sami, and S. Shenker | Distributed Computing, Vol. 18, Issue. 4, pp. 150-164 | March 2006 | Networking | [PDF]
|
| Incentives and Internet Computation | J. Feigenbaum and S. Shenker | Distributed Computing Column #9, SIGACT News, Vol. 33, Issue 4, pp. 37-54 | 2002 | Networking | |
| Comparative Analysis of Traffic Matrix Estimation Methods | A. Medina, N. Taft, K. Salamatian, S. Bhattacharyya, and C. Diot | DIMACS Workshop on Internet and WWW Measurement, Mapping and Modeling. February 13-15 2002. | February 13 2002 | Networking | |
| Shark: Fast Data Analysis Using Coarse-grained Distributed Memory | C. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. Stoica | Demo, ACM SIGMOD/PODS Conference, Scottsdale, Arizona | May 2012 | Networking | [PDF]
|
| Large Scale Malicious Code: A Research Agenda | N. Weaver, V. Paxson, S. Staniford, and R. Cunningham | DARPA-sponsored report | 2003 | Networking | |
| A Survey of Support for Implementing Debuggers | V. Paxson | CS 262 class project, University of California, Berkeley | October 1990 | Networking | [PDF]
|
| FrameNet as a Resource for Paraphrase Research | Y. Hasegawa, R. Lee-Goldman, A. Kong, and K. Akita | Constructions and Frames, Special Issue on Advances in Frame Semantics, Vol. 3, Issue 1, pp. 104-127 | August 2011 | Networking | |
| An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention | R. Sommer, N. Weaver, and V. Paxson | Concurrency and Computation: Practice and Experience, Vol. 21, Issue 10, pp. 1255-1279 | July 2009 | Networking | [PDF]
|
| An Analysis of The Internal Structure of Large Autonomous Systems | R. Govindan and P. Radoslavov | Computer Science Department, University of Southern California Technical Report No. 02-777, Los Angeles, California | November 2002 | Networking | |
| A Comparison of Incremental Deployment Strategies for Router-Assisted Reliable Multicast | X. He, C. Papadopoulos, P. Radoslavov, and R. Govindan | Computer Science Department, University of Southern California Technical Report No. 01-751, Los Angeles, California | July 2001 | Networking | [PDF]
|
| The Internet Under Crisis Conditions: Learning From September 11 | C. Partridge, P. Barford, D. Clark, S. Donelan, V. Paxson, J. Rexford, M. Vernon, J. Eisenberg, M. Blumenthal, D. Padgham, K. Batch, D. Drake, and J. Briscoe | Computer Science and Telecommunications Board, National Research Council, National Academy Press, Washington, DC | 2002 | Networking | [PDF]
|
| Determining an Appropriate Sending Rate Over an Underutilized Network Path | P. Sarolahti, M. Allman, and S. Floyd | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 51, Issue 7, pp. 1815-1832. DOI:10.1016/j.comnet.2006.11.006 | May 2007 | Networking | [PDF]
|
| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks | R. Krishnan, J. Sterbenz, W. Eddy, C. Partridge, and M. Allman | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 46, Issue 3, pp. 343-362 | October 2004 | Networking | [PDF]
|
| A Comparison of RED's Byte and Packet Modes | W. Eddy and M. Allman | Computer Networks, 42(2) | June 2003 | Networking | |