| The Iterated Weakest Link | R. Böhme and T. Moore | IEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55 | January 2010 | Networking | [PDF]
|
| The MASC/BGMP Architecture for Inter-Domain Multicast Routing | S. Kumar, P. Radoslavov, D. Thaler, C. Alaettinoglu, D. Estrin, and M. Handley | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (SIGCOMM '98), Vancouver, British Columbia, Canada | August 1998 | Networking | |
| The Multicast Address-Set Claim (MASC) Protocol | P. Radoslavov, D. Estrin, R. Govindan, M. Handley, S. Kumar, and D. Thaler | Request for Comments 2909, Experimental, September 2000. | September 2000 | Networking | |
| The Network Block Device | P. T. Breuer, A. Marín Lopez, and A. García Ares | Linux Journal, Vol. 73 | May 2000 | Networking | |
| The Network Oracle | J. Hellerstein, V. Paxson, L. Peterson, T. Roscoe, S. Shenker, and D. Wetherall | IEEE Data Engineering Bulletin, Vol. 28, No. 1, pp. 3-10 | March 2005 | Networking | [PDF]
|
| The NewReno Modification to TCP's Fast Recovery Algorithm | S. Floyd and T. Henderson | Request for Comments 2582, Experimental, April 1999. | April 1999 | Networking | |
| The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware | M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney | Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007), Queensland, Australia | September 2007 | Networking | [PDF]
|
| The Origin of Power-Laws in Internet Topologies Revisited | Q. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger | INFOCOM, 2002. | 2002 | Networking | |
| The Relationship Between Topology and Protocol Performance: Case Studies | P. Radoslavov | PhD Dissertation, Computer Science Department, University of Southern California, December 2001. | December 2001 | Networking | |
| The Reliable Multicast Design Space for Bulk Data Transfer | M. Handley, S, Floyd, B. Whetten, R. Kermode, L. Vicisano, and M. Luby | Request for Comments 2887, Informational, August 2000. | August 2000 | Networking | |
| The Role of Soft Information in Trust Building: Evidence from Online Social Lending | S. Poetzsch and R. Boehme | Proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST 2010), Berlin, Germany, pp. 381-395 | June 2010 | Networking | |
| The SFRA: A Corner-Turn FPGA Architecture | N. Weaver, J. Hauser and J. Wawrzynek | Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12 | February 2004 | Networking | [PDF]
|
| The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention | N. Weaver, V. Paxson, and J.M. Gonzalez | Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007), Monterey, California, pp. 199-206 | February 2007 | Networking | [PDF]
|
| The Spread of the Sapphire/Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | The Cooperative Association for Internet Data Analysis Technical Report | February 2003 | Networking | |
| The Stationarity of Internet Path Properties: Routing, Loss, and Throughput | Y. Zhang, V. Paxson, and S. Shenker | ACIRI Technical Report, May 2000. | May 2000 | Networking | |
| The Strengths of Weaker Identities: Opportunistic Personas | M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver | Proceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, Massachusetts | August 2007 | Networking | [PDF]
|
| The Synchronization of Periodic Routing Messages | S. Floyd and V. Jacobson | IEEE/ACM Transactions on Networking, Vol. 2, No. 2, pp. 122-136 | April 1994 | Networking | [PDF]
|
| The Top Speed of Flash Worms | S. Staniford, D. Moore, V. Paxson, and N. Weaver | Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, Virginia | October 2004 | Networking | [PDF]
|
| The Use of End-to-end Multicast Measurements for Characterizing Internal Network Behavior | A. Adams, T. Bu, R. Caceres, N. Duffield, T. Friedman, J. Horowitz, F. Lo Presti, S.B. Moon, V. Paxson, and D. Towsley | IEEE Communications, 38(5), May 2000. | April 2000 | Networking | |
| Thoughts on Reviewing | M. Allman | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50 | April 2008 | Networking | [PDF]
|
| Tiered Fault Tolerance for Long-Term Integrity | B. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz | Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California, pp. 267-282 | February 2009 | Networking | [PDF]
|
| Topologically-Aware Overlay Construction and Server Selection | S. Ratnasamy, M. Handley, R. M. Karp, and S. Shenker | INFOCOM | 2002 | Networking | |
| Topology-Informed Internet Replica Placement | P. Radoslavov, R. Govindan, and D. Estrin | Proceedings of the Sixth International Workshop on Web Caching and Content Distribution, Boston University, Boston, Massachusetts, USA, June 20-22, 2001. | June 20 2001 | Networking | |
| Towards a Common TCP Evaluation Suite | L. Andrew, C. Marcondes, S. Floyd, L. Dunn, R. Guillier, W. Gang, L. Eggert, S. Ha, and I. Rhee | Proceedings of the International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet), Manchester, United Kingdom | March 2008 | Networking | [PDF]
|
| Towards a Framework for Defining Internet Performance Metrics | V. Paxson | LBNL-38952 | June 20 1996 | Networking | |
| Towards a Next Generation Inter-domain Routing Protocol | L. Subramanian, M. Caesar, M. Handley, M Mao, S. Shenker, and I. Stoica | Preprint 2004 | January 05 2004 | Networking | |
| Towards a Next Generation Inter-domain Routing Protocol | L. Subramanian, M. Caesar, C. Tien Ee, M. Handley, Z. Morley Mao, S. Shenker, and I. Stoica | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Towards a Sensor Network Architecture: Lowering the Waistline | D. Culler, P. Dutta, C.T. Ee, R. Fonseca, J. Hui, P. Levis, J. Polastre, S. Shenker, I. Stoica, G. Tolle, and J. Zhao | Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS 10), Santa Fe, New Mexico, p. 24 | June 2005 | Networking | |
| Towards an Economic Analysis of Trusted Systems | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Presented at the Third Annual Workshop on Economics of Information Security (WEIS04), Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Towards an Economic Analysis of Trusted Systems (Position Paper) | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Towards an Evolvable Internet Architecture | S. Ratnasamy, S. Shenker, S. McCanne | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 313-324 | August 2005 | Networking | [PDF]
|
| Towards Capturing Representative AS-level Internet Topologies | H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger | SIGMETRICS 2002: 280-281. | 2002 | Networking | |
| Towards Engineering a Location-Aware Wireless Multi-Agent System | I. Nieto-Cavajal, P. M. Ruiz, J.A. Botia, and A.F. Gomez-Skarmeta | Proceedings of the Workshop on Applications of Software Agents in Engineering at the 16th European Conference on Artificial Intelligence (ECAI 2004), Valencia, Spain | August 2004 | Networking | |
| Towards Insurable Network Architectures | R. Boehme | Journal of Information Technology, Vol. 52, No. 5, pp. 290-293 | September 2010 | Networking | |
| Towards QoS in IP-Based Core Networks: A Survey on Performance Management, MPLS Case | J. L. Marzo, P. Maryni, and P. Vilà | Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'2001), Orlando, Florida | July 2001 | Networking | |
| Towards Situational Awareness of Large-Scale Botnet Probing Events | Z. Li, A. Goyal, Y. Chen, and V. Paxson | IEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp. 175-188 | March 2011 | Networking | [PDF]
|
| Tracking the Role of Adversaries in Measuring Unwanted Traffic | M. Allman, P. Barford, B. Krishnamurty, and J. Wang | Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI), San Jose, California, p. 6 | July 2006 | Networking | [PDF]
|
| Traffic Matrix Estimation Techniques: Existing Techniques Compared and New Directions | A. Medina, N. Taft, K.Salamatian, S. Bhattacharyyam, and C. Diot | Proceedings of SIGCOMM 2002, Pittsburgh, Pennsylvania. August 2002. | August 2002 | Networking | |
| Trained to Accept? A Field Experiment on Consent Dialogs | R. Boehme and S. Koepsell | Proceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406 | April 2010 | Networking | [PDF]
|
| Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks | P. Levis, N. Patel, D. Culler, and S. Shenker | NSDI | January 05 2004 | Networking | |
| Uniform versus Priority Dropping for Layered Video | S. Bajaj, L. Breslau, and S. Shenker | ACM Computer Communication Review, Vol. 28, pp. 131-143 | September 1998 | Networking | |
| Universal DNA Tag Systems: A Combinatorial Design Scheme | A. Ben-Dor, R. M. Karp, B. Schwikowski, and Z. Yakhini | RECOMB | 2000 | Networking | |
| Untangling the Web from DNS | M. Walfish, H. Balakrishnan, and S. Shenker | Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238 | March 2004 | Networking | [PDF]
|
| User-Aware Adaptive Applications for Enhanced Multimedia Quality in Heterogeneous Networking Environments | P. M. Ruiz, J.A. Botia, and A.Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3079 | June 2004 | Networking | [PDF]
|
| User-Aware Videoconference Session Control Using Software Agents | J.A. Botia, P. Ruiz, and A. Gomez-Skarmeta | Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), Beijing, China | September 2004 | Networking | |
| Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor Networks | F. Bian, X. Li, R. Govindan, and S. Shenker | International Journal of Ad Hoc and Ubiquitous Computing (special issue on wireless sensor networks), Vol. 1, No. 4, pp. 179-193 | January 2006 | Networking | [PDF]
|
| Using Honeynets for Internet Situational Awareness | V. Yegneswaran, P. Barford, and V. Paxson | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| Using Strongly Typed Networking to Architect for Tussle | C. Muthukrishnan, V. Paxson, M. Allman, and A. Akella | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 9 | October 2010 | Networking | [PDF]
|
| Very Fast Containment of Scanning Worms | N. Weaver, S. Staniford, and V. Paxson | Proceedings of the 13th USENIX Security Symposium, San Diego, California, pp. 29-44 | August 2004 | Networking | [PDF]
|
| Very Fast Containment of Scanning Worms, Revisited | N. Weaver, S. Staniford, and V. Paxson | In Malware Detection: Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, eds., pp. 113-145, Springer | 2007 | Networking | |