| Framework for IP Performance Metrics | V. Paxson, G. Almes, J. Mahdavi, and M. Mathis. | RFC 2330, Informational | May 1998 | Networking | |
| IETF Criteria for Evaluating Reliable Multicast Transport and Application Protocols | A. Mankin, A. Romanow, S. Bradner, and V. Paxson | RFC 2357, Informational | June 1998 | Networking | |
| FTP Extensions for IPv6 and NATs | M. Allman, S. Ostermann and C. Metz | RFC 2428 | September 1998 | Networking | |
| RFC 2914: Congestion Control Principles | S. Floyd | RFC 2914, Best Current Practice | September 2000 | Networking | [PDF]
|
| RFC 3042: Enhancing TCP's Loss Recovery Using Limited Transmit | M. Allman, H. Balakrishnan, and S. Floyd | RFC 3042, Proposed Standard, January 2001 | January 2001 | Networking | |
| A Framework for Defining Empirical Bulk Transfer Capacity Metrics | M. Mathis and M. Allman | RFC 3148. July 2001. | July 2001 | Networking | |
| RFC 3168: The Addition of Explicit Congestion Notification (ECN) to IP | K.K. Ramakrishnan, S. Floyd, and D. Black | RFC 3168, Proposed Standard, September 2001. | September 2001 | Networking | |
| RFC 3238: IAB Architectural and Policy Considerations for Open Pluggable Edge Services | S. Floyd and L. Daigle, editors | RFC 3238, Informational, January 2002. Also an excerpt, the ISOC Member Briefing #5 on OPES. | January 2002 | Networking | [PDF]
|
| RFC 3390: Increasing TCP's Initial Window | M. Allman, S. Floyd, and C. Partridge | RFC 3390, October 2002. Proposed Standard. Obsoletes RFC 2414 (Experimental). | October 2002 | Networking | [PDF]
|
| RFC 3448: TCP Friendly Rate Control (TFRC): Protocol Specification | M. Handley, S. Floyd, J. Pahdye, and J. Widmer | RFC 3448, Proposed Standard | January 2003 | Networking | [PDF]
|
| TCP Congestion Control with Appropriate Byte Counting (ABC) | M. Allman | RFC 3465 | February 2003 | Networking | |
| A Conservative Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm for TCP | E. Blanton, M. Allman, K. Fall, and L. Wang | RFC 3517 | April 2003 | Networking | |
| RFC 3869: IAB Concerns & Recommendations Regarding Internet Research & Evolution | R. Atkinson and S. Floyd | RFC 3869 | August 2004 | Networking | [PDF]
|
| RFC 4336: Problem Statement for the Datagram Congestion Control Protocol (DCCP) | S. Floyd, M. Handley, and E. Kohler | RFC 4336, Informational | March 2006 | Networking | [PDF]
|
| RFC 4828: TCP Friendly Rate Control (TFRC): the Small-Packet (SP) Variant | S. Floyd and E. Kohler | RFC 4828, Experimental | April 2007 | Networking | [PDF]
|
| RFC 5166: Metrics for the Evaluation of Congestion Control Mechanisms | S. Floyd | RFC 5166, Information, March 2008 | March 2008 | Networking | [PDF]
|
| Computing TCP's Retransmission Timer | V. Paxson, M. Allman, J. Chu, and M. Sargent | RFC 6298 | June 2011 | Networking | [PDF]
|
| Parallel Sorting with Limited Bandwidth | M. Adler, J. Byers, and R. M. Karp | SIAM Journal of Computing Vol. 29, No. 6, pp. 1997-2015 | 2000 | Networking | |
| An Optimal Algorithm for Monte-Carlo Estimation | P. Dagum, R. M. Karp, M. Luby, and S. Ross | SIAM Journal of Computing, Vol. 29, No. 5, pp. 1484-1496 | 2000 | Networking | |
| Simulation is Crucial | S. Floyd | Sidebar, IEEE Spectrum, January 2001. | January 2001 | Networking | |
| Dynamic Behavior of Slowly-Responsive Congestion Control Algorithms | D. Bansal, H. Balakrishnan, S. Floyd, and S. Shenker | SIGCOMM 2001 | 2001 | Networking | |
| IPNL: A NAT-Extended Internet Architecture | P. Francis and R. Gummadi | SIGCOMM 2001 | 2001 | Networking | |
| Identifying the TCP Behavior of Web Servers | J. Padhye and S. Floyd | SIGCOMM 2001, August 2001. Or the ICSI Technical Report 01-002, February 2001. | 2001 | Networking | |
| Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling Law | G. Phillips, S. Shenker, and H. Tangmunarunkit | SIGCOMM, September 1999. | September 1999 | Networking | |
| Towards Capturing Representative AS-level Internet Topologies | H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger | SIGMETRICS 2002: 280-281. | 2002 | Networking | |
| A Taxonomy of Traffic Matrices | A. Medina, C. Fraleigh, N. Taft, S. Battacharyya, and C. Diot | SPIE Workshop on Scalability and Traffic Control in IP Networks II. Boston, Massachusetts. July 29-August 1, 2002. | July 2002 | Networking | |
| Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, Germany | C. Kreibich and M. Jahnke, eds. | Springer | 2010 | Networking | |
| Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Canada | S. Jha, R. Sommer, and C. Kreibich, eds. | Springer Verlag | September 2010 | Networking | |
| On the Convergence of Statistical Techniques for Estimating Network Traffic Demands | A. Medina, K. Salamatian, N. Taft, I. Matta, Y. Tsang, and C. Diot | Submitted for publication 2003 | February 2003 | Networking | |
| Finite-Length Analysis of LT-codes | R.M. Karp, M. Luby, and A. Shokrollahi | Submitted to International Symposium on Information Theory (ISIT '04). | 2004 | Networking | |
| Practical and Robust Geographic Routing in Wireless Networks | Y. Kim, R. Govindan, B. Karp, and S. Shenker | Submitted to Mobicom | January 05 2004 | Networking | |
| Impact of Network Dynamics on End-to-End Protocols: Case Studies in TCP and Reliable Multicast | K. Varadhan, D. Estrin, and S. Floyd | Tech report USC-CS-TR 98-672, April 1998. An abbreviated version appeared in the proceedings of the IEEE Symposium on Computers and Communications, July 1998 | April 1998 | Networking | |
| Scalable Session Messages in SRM | P. Sharma, D. Estrin, S. Floyd, and L. Zhang | Technical report | February 1998 | Networking | |
| Ns Simulator Tests for Random Early Detection (RED) Gateways | S. Floyd | Technical Report | October 1996 | Networking | |
| Comments on Measurement-based Admissions Control for Controlled-Load Services | S. Floyd | Technical Report | July 1996 | Networking | |
| Issues of TCP with SACK | S. Floyd | Technical report | January 1996 | Networking | [PDF]
|
| On Characterizing Network Topologies and Analyzing Their Impact on Protocol Design | P. Radoslavov, H. Tangmunarunkit, H. Yu, R. Govindan, S. Shenker, and D. Estrin | Technical Report 00-731, Computer Science Department, University of Southern California, February 2000. | February 2000 | Networking | |
| Architectural Considerations for Playback of Quality Adaptive Video over the Internet | R. Rejaie, M. Handley, and D. Estrin | Technical report 98-686, Computer Science Department, University of Southern California | 1998 | Networking | |
| Exploiting the Bandwidth-Memory Tradeoff in Multicast State Aggregation | P. Radoslavov, D. Estrin, and R. Govindan | Technical Report 99-697, Computer Science Department, University of Southern California, July 1999. | July 1999 | Networking | |
| Fixing Two BSD TCP Bugs | M. Allman | Technical Report CR-204151, NASA Lewis Research Center | October 1997 | Networking | |
| FTP Extensions for Variable Protocol Specification | M. Allman and S. Ostermann | Technical Report CR-209414, NASA Glenn Research Center, February 2000. | February 2000 | Networking | |
| Advantages of Parallel Processing and the Effects of Communications Time | W. Eddy and M. Allman | Technical Report CR-209455, NASA Glenn Research Center, February 2000. | February 2000 | Networking | |
| A Swifter Start for TCP | C. Partridge, D. Rockwell, M. Allman, R. Krishnan, and J.P.G. Sterbenz | Technical Report No. 8339, BBN Technologies, March 2002 | March 2002 | Networking | |
| Multiple Data Connection FTP Extensions | M. Allman and S. Ostermann | Technical Report TR-19971, Ohio University Computer Science | February 1997 | Networking | |
| ONE: The Ohio Network Emulator | M. Allman, A. Caldwell, and S. Ostermann | Technical Report TR-19972, Ohio University Computer Science Department | August 1997 | Networking | |
| Exploiting Independent State For Network Intrusion Detection | R. Sommer and V. Paxson | Technische Universität München Technical Report No. TUM-I0420, Munich, Germany | November 2004 | Networking | [PDF]
|
| The Spread of the Sapphire/Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | The Cooperative Association for Internet Data Analysis Technical Report | February 2003 | Networking | |
| Internet Indirection Infrastructure | I. Stoica, D. Adkins, S. Ratnasamy, S. Shenker, S. Surana, and S. Zhuang | The First International Workshop on Peer-to-Peer Systems (IPTPS): 191-202, 2002. | 2002 | Networking | |
| Complex Queries in DHT-based Peer-to-Peer Networks | M. Harren, J.M. Hellerstein, R. Huebsch, B.T. Loo, S. Shenker, and I. Stoica | The First International Workshop on Peer-to-Peer Systems (IPTPS): 242-259, 2002. | 2002 | Networking | |
| Routing Algorithms for DHTs: Some Open Questions | S. Ratnasamy, I. Stoica, and S. Shenker | The First International Workshop on Peer-to-Peer Systems (IPTPS): 45-52, 2002. | 2002 | Networking | |