Publication Search Results

Titlesort descendingAuthorBibliographicDateGroupLinks
The Iterated Weakest LinkR. Böhme and T. MooreIEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55January 2010Networking[PDF]

The MASC/BGMP Architecture for Inter-Domain Multicast RoutingS. Kumar, P. Radoslavov, D. Thaler, C. Alaettinoglu, D. Estrin, and M. HandleyProceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (SIGCOMM '98), Vancouver, British Columbia, CanadaAugust 1998Networking
The Multicast Address-Set Claim (MASC) ProtocolP. Radoslavov, D. Estrin, R. Govindan, M. Handley, S. Kumar, and D. ThalerRequest for Comments 2909, Experimental, September 2000.September 2000Networking
The Network Block DeviceP. T. Breuer, A. Marín Lopez, and A. García AresLinux Journal, Vol. 73May 2000Networking
The Network OracleJ. Hellerstein, V. Paxson, L. Peterson, T. Roscoe, S. Shenker, and D. WetherallIEEE Data Engineering Bulletin, Vol. 28, No. 1, pp. 3-10March 2005Networking[PDF]

The NewReno Modification to TCP's Fast Recovery AlgorithmS. Floyd and T. HendersonRequest for Comments 2582, Experimental, April 1999.April 1999Networking
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity HardwareM. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. TierneyProceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007), Queensland, AustraliaSeptember 2007Networking[PDF]

The Origin of Power-Laws in Internet Topologies RevisitedQ. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. WillingerINFOCOM, 2002. 2002Networking
The Relationship Between Topology and Protocol Performance: Case StudiesP. RadoslavovPhD Dissertation, Computer Science Department, University of Southern California, December 2001.December 2001Networking
The Reliable Multicast Design Space for Bulk Data TransferM. Handley, S, Floyd, B. Whetten, R. Kermode, L. Vicisano, and M. LubyRequest for Comments 2887, Informational, August 2000.August 2000Networking
The Role of Soft Information in Trust Building: Evidence from Online Social LendingS. Poetzsch and R. BoehmeProceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST 2010), Berlin, Germany, pp. 381-395June 2010Networking
The SFRA: A Corner-Turn FPGA ArchitectureN. Weaver, J. Hauser and J. WawrzynekProceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12February 2004Networking[PDF]

The Shunt: An FPGA-Based Accelerator for Network Intrusion PreventionN. Weaver, V. Paxson, and J.M. GonzalezProceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007), Monterey, California, pp. 199-206February 2007Networking[PDF]

The Spread of the Sapphire/Slammer WormD. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. WeaverThe Cooperative Association for Internet Data Analysis Technical ReportFebruary 2003Networking
The Stationarity of Internet Path Properties: Routing, Loss, and ThroughputY. Zhang, V. Paxson, and S. ShenkerACIRI Technical Report, May 2000.May 2000Networking
The Strengths of Weaker Identities: Opportunistic PersonasM. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. WeaverProceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, MassachusettsAugust 2007Networking[PDF]

The Synchronization of Periodic Routing MessagesS. Floyd and V. JacobsonIEEE/ACM Transactions on Networking, Vol. 2, No. 2, pp. 122-136April 1994Networking[PDF]

The Top Speed of Flash WormsS. Staniford, D. Moore, V. Paxson, and N. WeaverProceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, VirginiaOctober 2004Networking[PDF]

The Use of End-to-end Multicast Measurements for Characterizing Internal Network BehaviorA. Adams, T. Bu, R. Caceres, N. Duffield, T. Friedman, J. Horowitz, F. Lo Presti, S.B. Moon, V. Paxson, and D. TowsleyIEEE Communications, 38(5), May 2000.April 2000Networking
Thoughts on ReviewingM. AllmanACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50April 2008Networking[PDF]

Tiered Fault Tolerance for Long-Term IntegrityB. Chun, P. Maniatis, S. Shenker, and J. KubiatowiczProceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California, pp. 267-282February 2009Networking[PDF]

Topologically-Aware Overlay Construction and Server SelectionS. Ratnasamy, M. Handley, R. M. Karp, and S. ShenkerINFOCOM 2002Networking
Topology-Informed Internet Replica PlacementP. Radoslavov, R. Govindan, and D. EstrinProceedings of the Sixth International Workshop on Web Caching and Content Distribution, Boston University, Boston, Massachusetts, USA, June 20-22, 2001.June 20 2001Networking
Towards a Common TCP Evaluation SuiteL. Andrew, C. Marcondes, S. Floyd, L. Dunn, R. Guillier, W. Gang, L. Eggert, S. Ha, and I. RheeProceedings of the International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet), Manchester, United KingdomMarch 2008Networking[PDF]

Towards a Framework for Defining Internet Performance MetricsV. PaxsonLBNL-38952June 20 1996Networking
Towards a Next Generation Inter-domain Routing ProtocolL. Subramanian, M. Caesar, M. Handley, M Mao, S. Shenker, and I. StoicaPreprint 2004January 05 2004Networking
Towards a Next Generation Inter-domain Routing ProtocolL. Subramanian, M. Caesar, C. Tien Ee, M. Handley, Z. Morley Mao, S. Shenker, and I. StoicaProceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

Towards a Sensor Network Architecture: Lowering the WaistlineD. Culler, P. Dutta, C.T. Ee, R. Fonseca, J. Hui, P. Levis, J. Polastre, S. Shenker, I. Stoica, G. Tolle, and J. ZhaoProceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS 10), Santa Fe, New Mexico, p. 24June 2005Networking
Towards an Economic Analysis of Trusted SystemsD. Bergemann, J. Feigenbaum, S. Shenker, and J. M. SmithPresented at the Third Annual Workshop on Economics of Information Security (WEIS04), Minneapolis, MinnesotaMay 2004Networking[PDF]

Towards an Economic Analysis of Trusted Systems (Position Paper)D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. SmithProceedings of the Third Workshop on Economics and Information Security, Minneapolis, MinnesotaMay 2004Networking[PDF]

Towards an Evolvable Internet ArchitectureS. Ratnasamy, S. Shenker, S. McCanneProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 313-324August 2005Networking[PDF]

Towards Capturing Representative AS-level Internet TopologiesH. Chang, R. Govindan, S. Jamin, S. Shenker, and W. WillingerSIGMETRICS 2002: 280-281. 2002Networking
Towards Engineering a Location-Aware Wireless Multi-Agent SystemI. Nieto-Cavajal, P. M. Ruiz, J.A. Botia, and A.F. Gomez-SkarmetaProceedings of the Workshop on Applications of Software Agents in Engineering at the 16th European Conference on Artificial Intelligence (ECAI 2004), Valencia, SpainAugust 2004Networking
Towards Insurable Network ArchitecturesR. BoehmeJournal of Information Technology, Vol. 52, No. 5, pp. 290-293September 2010Networking
Towards QoS in IP-Based Core Networks: A Survey on Performance Management, MPLS CaseJ. L. Marzo, P. Maryni, and P. VilàProceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'2001), Orlando, FloridaJuly 2001Networking
Towards Situational Awareness of Large-Scale Botnet Probing EventsZ. Li, A. Goyal, Y. Chen, and V. PaxsonIEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp. 175-188March 2011Networking[PDF]

Tracking the Role of Adversaries in Measuring Unwanted TrafficM. Allman, P. Barford, B. Krishnamurty, and J. WangProceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI), San Jose, California, p. 6July 2006Networking[PDF]

Traffic Matrix Estimation Techniques: Existing Techniques Compared and New DirectionsA. Medina, N. Taft, K.Salamatian, S. Bhattacharyyam, and C. DiotProceedings of SIGCOMM 2002, Pittsburgh, Pennsylvania. August 2002.August 2002Networking
Trained to Accept? A Field Experiment on Consent DialogsR. Boehme and S. KoepsellProceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406April 2010Networking[PDF]

Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor NetworksP. Levis, N. Patel, D. Culler, and S. ShenkerNSDIJanuary 05 2004Networking
Uniform versus Priority Dropping for Layered VideoS. Bajaj, L. Breslau, and S. ShenkerACM Computer Communication Review, Vol. 28, pp. 131-143September 1998Networking
Universal DNA Tag Systems: A Combinatorial Design SchemeA. Ben-Dor, R. M. Karp, B. Schwikowski, and Z. YakhiniRECOMB 2000Networking
Untangling the Web from DNSM. Walfish, H. Balakrishnan, and S. ShenkerProceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238March 2004Networking[PDF]

User-Aware Adaptive Applications for Enhanced Multimedia Quality in Heterogeneous Networking EnvironmentsP. M. Ruiz, J.A. Botia, and A.Gomez-SkarmetaLecture Notes in Computer Science, Vol. 3079June 2004Networking[PDF]

User-Aware Videoconference Session Control Using Software AgentsJ.A. Botia, P. Ruiz, and A. Gomez-SkarmetaProceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), Beijing, ChinaSeptember 2004Networking
Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor NetworksF. Bian, X. Li, R. Govindan, and S. ShenkerInternational Journal of Ad Hoc and Ubiquitous Computing (special issue on wireless sensor networks), Vol. 1, No. 4, pp. 179-193January 2006Networking[PDF]

Using Honeynets for Internet Situational AwarenessV. Yegneswaran, P. Barford, and V. PaxsonProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

Using Strongly Typed Networking to Architect for TussleC. Muthukrishnan, V. Paxson, M. Allman, and A. AkellaProceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 9October 2010Networking[PDF]

Very Fast Containment of Scanning WormsN. Weaver, S. Staniford, and V. PaxsonProceedings of the 13th USENIX Security Symposium, San Diego, California, pp. 29-44August 2004Networking[PDF]

Very Fast Containment of Scanning Worms, RevisitedN. Weaver, S. Staniford, and V. PaxsonIn Malware Detection: Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, eds., pp. 113-145, Springer 2007Networking

Pages