Publication Search Results

Titlesort ascendingAuthorBibliographicDateGroupLinks
Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?T. Ouyang, S. Ray, M. Rabinovich, and M. AllmanProceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Can Heterogeneity Make Gnutella Scalable?Q. Lv, S. Ratnasamy, and S. ShenkerThe First International Workshop on Peer-to-Peer Systems (IPTPS): 94-103, 2002. 2002Networking
Building Extensible Networks with Rule-Based ForwardingL. Popa, N. Egi, S. Ratnasamy, and I. StoicaProceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 379-391October 2010Networking[PDF]

Building Efficient Wireless Sensor Networks With Low-Level NamingJ. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. GanesanProceedings of the Symposium on Operating Systems Principles, Banff, Canada, October 2001.October 2001Networking
Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network TrafficS. Kornexl, V. Paxson, H. Dreger, A. Feldmann, and R. SommerProceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005), Berkeley, California, pp. 267-272October 2005Networking[PDF]

Brooery: A Graphical Environment for Analysis of Security-Relevant Network ActivityC. KreibichProceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118April 2005Networking[PDF]

Bro: A System for Detecting Network Intruders in Real-TimeV. PaxsonComputer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999.December 14 1999Networking
Bro: A System for Detecting Network Intruders in Real-TimeV. PaxsonProceedings of the 7th USENIX Security Symposium, San Antonio, TexasJanuary 1998Networking
BRITE: Universal Topology Generation From a User's PerspectiveA. Medina, A. Lakhina, I. Matta, and J. ByersBU-CS-TR-2001-003. April 05, 2001.April 05 2001Networking
BRITE: An Approach to Universal Topology GenerationA. Medina, A. Lakhina, I. Matta, and J. ByersProceedings of MASCOTS 2001. IEEE Computer Society, August 2001.August 2001Networking
BRITE: A Flexible Generator of Internet TopologiesA. Medina and I. MattaBU-CS-TR-2000-005. January 21, 2000.January 21 2000Networking
Brief Announcement: Prefix Hash TreeS. Ramabhadran, S. Ratnasamy, J.M. Hellerstein, and S. ShenkerProceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, p. 367July 2004Networking[PDF]

Botnet Judo: Fighting Spam with ItselfA. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. SavageProceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, CaliforniaFebruary 2010Networking[PDF]

binpac: A yacc for Writing Application Protocol ParsersR. Pang, V. Paxson, R. Sommer, and L. PetersonProceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 289-300October 2006Networking[PDF]

Beyond Pilots: Keeping Rural Wireless Networks AliveS. Surana, R. Patra, S. Nedevschi, M. Ramos, L. Subramanian, Y. Ben-David, and E. BrewerProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, CaliforniaApril 2008Networking[PDF]

Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-ReduceJ. Hendrik Boese, A. Andrzejak, and M. HoegqvistProceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010), Raleigh, North Carolina, Article No. 3April 2010Networking
Best-Effort versus Reservations: A Simple Comparative AnalysisL. Breslau and S. ShenkerACM Computer Communication Review, Vol. 28, pp. 3-16September 1998Networking
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless SensornetsR. Fonseca, S. Ratnasamy, J. Zhao, C. Tien Ee, D. Culler, S. Shenker, and I. StoicaProceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 329-342May 2005Networking[PDF]

Barter Trade Improves Message Delivery in Opportunistic NetworksL. Buttyan, L. Dora, M. Felegyhazi, and I. VajdaAd Hoc Networks, Vol. 8, Issue 1, pp. 1-14January 2010Networking[PDF]

Automating Analysis of Large-Scale Botnet Probing EventsZ. Li, A. Goyal, Y. Chen, and V. PaxsonProceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, pp. 11-22March 2009Networking[PDF]

Automated Packet Trace Analysis of TCP ImplementationsV. PaxsonProceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Cannes, FranceSeptember 1997Networking
Attested Append-Only Memory: Making Adversaries Stick to their WordB.-G. Chun, P. Maniatis, S. Shenker, and J. KubiatowiczProceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, Washington, pp. 189-204October 2007Networking[PDF]

Architectural Considerations for Playback of Quality Adaptive Video over the InternetR. Rejaie, M. Handley, and D. EstrinTechnical report 98-686, Computer Science Department, University of Southern California 1998Networking
Aproximacion de Arboles Multicast Optimos en Redes Ad Hoc InalambricasP.M. Ruiz and A.F. Gomez SkarmetaProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Approximation and Collusion in Multicast Cost SharingJ. Feigenbaum, A. Krishnamurthy, R. Sami, and S. ShenkerProceedings of the Third ACM Conference on Electronic Commerce (ACM-EE 2001), Tampa, Florida, pp. 253-255October 2001Networking
Approximation and Collusion in Multicast Cost SharingJ. Feigenbaum, A. Archer, A. Krishnamurthy, R. Sami, and S. ShenkerGames and Economic Behavior, Vol. 47, Issue 1, pp. 36-71April 2004Networking[PDF]

Approximate fairness through differential droppingR. Pan, L. Breslau, B. Prabhakar, and S. ShenkerComputer Communication Review, Vol. 33, Issue 2, pp. 23-39 2003Networking
Approximate Fair Allocation of Link BandwidthR. Pan, B. Prabhakar, L. Breslau, and S. ShenkerIEEE Micro Vol. 23, Issue 1, pp. 36-43 2003Networking
Applying NOX to the DatacenterA. Tavakoli, M. Casado, T. Koponen, and S. ShenkerProceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New YorkOctober 2009Networking[PDF]

Applying Fuzzy Logic to Model User Preferences on Multimedia SessionsJ.A. Botia, M. Valdes, P. M. Ruiz, and A.F. Gomez Skarmeta.Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy, Jaen, Spain, pp. 467-470September 2005Networking
Application-Level Multicast Using Content-Addressable NetworksS. Ratnasamy, M. Handley, R.M. Karp, and S. ShenkerProceedings of Third International Workshop on Networked Group Communication, London, Nov 2001.November 2001Networking
An Optimal Algorithm for Monte-Carlo EstimationP. Dagum, R. M. Karp, M. Luby, and S. RossSIAM Journal of Computing, Vol. 29, No. 5, pp. 1484-1496 2000Networking
An Investigation of the Internet’s IP-Layer ConnectivityL. Tang, J. Li, Y. Li, and S. ShenkerComputer Communications, Vol. 32, No. 5, pp. 913-926March 2009Networking
An Intermittent Energy Internet ArchitectureB. Raghavan, D. Irwin, J. Albrecht, J. Ma, and A. StreedProceedings of the Third International Conference on Future Energy Systems (e-Energy 2012), Madrid, SpainMay 2012Networking[PDF]

An Inquiry into the Nature and Causes of the Wealth of Internet MiscreantsJ. Franklin, V. Paxson, A. Perrig, and S. SavageProceedings of ACM Computer and Communication Security Conference (ACM CCS), Alexandria, Virginia, pp. 375-388October 2007Networking[PDF]

An Extension to the Selective Acknowledgement (SACK) Option for TCPS. Floyd, J. Mahdavi, M. Mathis, and M. PodolskyRequest for Comments 2883, Proposed Standard, July 2000.July 2000Networking
An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being SlowE. Friedman, M. Shor, S. Shenker, and B. SopherGames and Economic Behavior, Vol. 47, Issue 2, pp. 325-352May 2004Networking
An Examination of MBone PerformanceM. HandleyUSC/ISI Research Report: ISI/RR-97-450 1997Networking
An Evaluation of XML-RPCM. AllmanACM Performance Evaluation Review, 30(4)March 2003Networking
An Evaluation of TCP with Larger Initial WindowsM. Allman, C. Hayes, and S. OstermannACM Computer Communication Review, Vol. 28, Issue 3July 1998Networking
An ATM Distributed Simulator for Network Management ResearchJ. L. Marzo, P. Vilà, L. Fàbrega, and D. MassaguerProceedings of the 34th Annual Simulation Symposium (SS 2001), Seattle, Washington, pp. 185-192April 2001Networking
An Assessment of Overt Malicious Activity Manifest in Residential NetworksG. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. VallentinProceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp 144-163July 2011Networking[PDF]

An Architecture for Large-Scale Internet MeasurementV. Paxson, J. Mahdavi, A. Adams, and M. MathisIEEE Communications, Vol. 36, No. 8, pp. 48-54August 1998Networking
An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion PreventionV. Paxson, R. Sommer, and N. WeaverProceedings of IEEE Sarnoff Symposium, Princeton, New Jersey, pp. 1-7May 2007Networking[PDF]

An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion PreventionR. Sommer, N. Weaver, and V. PaxsonConcurrency and Computation: Practice and Experience, Vol. 21, Issue 10, pp. 1255-1279July 2009Networking[PDF]

An Architecture for Energy Management in Wireless Sensor NetworksX. Jiang, J. Taneja, J. Ortiz, A. Tavakoli, P. Dutta, J. Jeong, D. Culler, P. Levis, and S. ShenkerProceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 31-36April 2007Networking[PDF]

An Architecture for Developing Behavioral HistoryM. Allman, E. Blanton, and V. PaxsonProceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05), Cambridge, Massachusetts, p. 45-51July 2005Networking[PDF]

An Architecture for a Global Internet Host Distance Estimation ServiceP. Francis, S. Jamin, V. Paxson, L. Zhang, D. Gryniewicz, and Y. JinProceedings of IEEE INFOCOM, March 1999.March 1999Networking
An Analysis of Using Reflectors for Distributed Denial-of-Service AttacksV. PaxsonComputer Communication Review 31(3), July 2001.July 2001Networking
An Analysis of The Internal Structure of Large Autonomous SystemsR. Govindan and P. RadoslavovComputer Science Department, University of Southern California Technical Report No. 02-777, Los Angeles, CaliforniaNovember 2002Networking

Pages