| Bro: A System for Detecting Network Intruders in Real-Time | V. Paxson | Computer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999. | December 14 1999 | Networking | |
| Very Large Conferences on the Internet: the Internet Multimedia Conferencing Architecture | M. Handley, J. Crowcroft, C. Bormann, and J. Ott | Computer Networks and ISDN Systems, Special Issue on Internet Telephony | 1998 | Networking | |
| An Investigation of the Internet’s IP-Layer Connectivity | L. Tang, J. Li, Y. Li, and S. Shenker | Computer Communications, Vol. 32, No. 5, pp. 913-926 | March 2009 | Networking | |
| Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic | V. Paxson | Computer Communications Review, Vol. 27, No. 5, pp. 5-18. This paper is a minor revision of Fast Approximation of Self-Similar Network Traffic, an April 1995 technical report. | October 1997 | Networking | |
| Dynamic Route Recomputation Considered Harmful | M. Caesar, M. Casado, T. Koponen, J. Rexford, and S. Shenker | Computer Communication Review, Vol. 40, Issue 2 | April 2010 | Networking | [PDF]
|
| A Data-oriented (and Beyond) Network Architecture | T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. Stoica | Computer Communication Review, Vol. 37, Issue 4, ACM, pp. 181-192 | October 2007 | Networking | [PDF]
|
| The Devil and Packet Trace Anonymization | R. Pang, M. Allman, V. Paxson, and J. Lee | Computer Communication Review, Vol. 36, Issue 1, pp. 29-38 | January 2006 | Networking | |
| Approximate fairness through differential dropping | R. Pan, L. Breslau, B. Prabhakar, and S. Shenker | Computer Communication Review, Vol. 33, Issue 2, pp. 23-39 | 2003 | Networking | |
| Simulation-based Comparisons of Tahoe, Reno, and SACK TCP | K. Fall and S. Floyd | Computer Communication Review, Vol. 26, No. 3, pp. 5-21 | July 1996 | Networking | [PDF]
|
| Connections with Multiple Congested Gateways in Packet-Switched Networks Part 1: One-way Traffic | S. Floyd | Computer Communication Review, Vol. 21, No. 5, pp. 30-47 | October 1991 | Networking | [PDF]
|
| Controlling High Bandwidth Aggregates in the Network | R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker | Computer Communication Review 32(3), July 2002. | July 2002 | Networking | |
| An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks | V. Paxson | Computer Communication Review 31(3), July 2001. | July 2001 | Networking | |
| Wireless Urban Sensing Systems | M. Srivastava, M. Hansen, J. Burke, A. Parker, S. Reddy, G. Saurabh, M. Allman, V. Paxson, and D. Estrin | Center for Embedded Network Sensing, UC Los Angeles Technical Report No. 65, Los Angeles, California | April 2006 | Networking | [PDF]
|
| BRITE: Universal Topology Generation From a User's Perspective | A. Medina, A. Lakhina, I. Matta, and J. Byers | BU-CS-TR-2001-003. April 05, 2001. | April 05 2001 | Networking | |
| BRITE: A Flexible Generator of Internet Topologies | A. Medina and I. Matta | BU-CS-TR-2000-005. January 21, 2000. | January 21 2000 | Networking | |
| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks | R. Krishnan, M. Allman, C. Partridge, and J.P.G. Sterbenz | BBN Technologies Technical Report No. 8333 | March 2002 | Networking | [PDF]
|
| Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. Resnick | W. Willinger and V. Paxson | Annals of Statistics, Vol. 25, No. 5, pp. 1805-1869 | 1997 | Networking | |
| Barter Trade Improves Message Delivery in Opportunistic Networks | L. Buttyan, L. Dora, M. Felegyhazi, and I. Vajda | Ad Hoc Networks, Vol. 8, Issue 1, pp. 1-14 | January 2010 | Networking | [PDF]
|
| A Simple Algorithm for Finding Frequent Elements in Streams and Bags | R.M. Karp, S. Shenker, and C.H. Papadimitriou | ACM Transactions on Database Systems, Vol. 28, Issue 1, pp. 51-55 | March 2003 | Networking | [PDF]
|
| DDoS Defense by Offense | M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker | ACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3 | March 2010 | Networking | [PDF]
|
| The Click Modular Router | E. Kohler, R. Morris, B. Chen, J. Jannotti, and M.F. Kaashoek | ACM Transactions on Computer Systems 18 (3), August 2000, pages 263-297. | August 2000 | Networking | |
| Incentive Compatibility and Dynamics of Congestion Control | P. B. Godfrey, M. Schapira, A. Zohar, and S. Shenker | ACM SIGMETRICS Performance Evaluation Review, Vol. 36, Issue 1, pp. 95-106 | June 2010 | Networking | [PDF]
|
| On the Performance of Middleboxes | M. Allman | ACM SIGCOMM/Usenix Internet Measurement Conference, Miami, FL, USA | October 2003 | Networking | |
| On Estimating End-to-End Network Path Properties | M. Allman and V. Paxson | ACM SIGCOMM, September 1999, Cambridge, Massachusetts. | September 1999 | Networking | |
| A Comparison of RED's Byte and Packet Modes | W. Eddy and M. Allman | ACM SIGCOMM Student Poster Session, August 2002. | August 2002 | Networking | |
| Measuring End-to-End Bulk Transfer Capacity | M. Allman | ACM SIGCOMM Internet Measurement Workshop. November 2001. | November 2001 | Networking | |
| Comments on Bufferbloat | M. Allman | ACM SIGCOMM Computer Communications, Vol. 3, No. 1, pp. 30-37 | January 2013 | Networking | [PDF]
|
| On Building Inexpensive Network Capabilities | C. Shue, A. Kalafut, M. Allman, and C. Taylor | ACM SIGCOMM Computer Communications Review, Vol. 42, No. 2, pp. 72-79 | April 2012 | Networking | [PDF]
|
| Editorial: Architecting for Innovation | T. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, B. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, and D. Kuptsov | ACM SIGCOMM Computer Communications Review, Vol. 41, No. 3 | July 2011 | Networking | [PDF]
|
| NOX: Towards an Operating System for Networks | N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker | ACM SIGCOMM Computer Communications Review, Vol. 38, No. 3, pp. 105-110 | July 2008 | Networking | [PDF]
|
| YAMR: Yet Another Multipath Routing Protocol | I. Ganichev, B. Dai, B. Godfrey, and S. Shenker | ACM SIGCOMM Computer Communication Review, Vol. 40, Issue 5 | October 2010 | Networking | [PDF]
|
| Comments on Selecting Ephemeral Ports | M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 39, Issue 2, pp. 13-19 | April 2009 | Networking | [PDF]
|
| Notes on Burst Mitigation for Transport Protocols | M. Allman and E. Blanton | ACM SIGCOMM Computer Communication Review, Vol. 35, Issue 2, pp. 53-60. DOI:http://doi.acm.org/10.1145/1064413.1064419 | April 2005 | Networking | [PDF]
|
| New Techniques for Making Transport Protocols Robust to Corruption-Based Loss | W. Eddy, S. Ostermann, and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88 | October 2004 | Networking | [PDF]
|
| Findings and Implications from Data Mining the IMC Review Process | R. Beverly and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 3, No. 1, pp. 23-29 | January 2013 | Networking | [PDF]
|
| Endpoint Admission Control: Architectural Issues and Performance | L. Breslau, E.W. Knightly, S. Shenker, I. Stoica, and H. Zhang | ACM SIGCOMM 2000, pages 57-69, Stockholm, Sweeden, October 2000. | October 2000 | Networking | |
| On Estimating End-to-End Network Path Properties | M. Allman and V. Paxson | ACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean, April 2001. This paper was originally presented at ACM SIGCOMM 1999. | April 2001 | Networking | |
| Estimating Loss Rates With TCP | M. Allman, W. Eddy, and S. Ostermann | ACM Performance Evaluation Review, 31(3) | December 2003 | Networking | |
| An Evaluation of XML-RPC | M. Allman | ACM Performance Evaluation Review, 30(4) | March 2003 | Networking | |
| Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table | S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Gvoindan, L. Yin, and F. Yu | ACM MONET | 2003 | Networking | |
| Modeling Wireless Links for Transport Protocols | A. Gurtov and S. Floyd | ACM Computer Communications Review, Vol. 34, No. 2, pp. 85-96 | April 2004 | Networking | [PDF]
|
| Internet Research Needs Better Models | S. Floyd and E. Kohler | ACM Computer Communications Review, Vol. 33, No. 1, pp. 29-34 | January 2003 | Networking | [PDF]
|
| On the Origin of Power Laws in Internet Topologies | A. Medina, I. Matta, and J. Byers | ACM Computer Communications Review, April 2000. Also BU-CS-TR-2000-004. January 21, 2000. | April 2000 | Networking | |
| On Building Special-Purpose Social Networks for Emergency Communication | M. Allman | ACM Computer Communication Review, Vol. 40, Issue 5 | October 2010 | Networking | [PDF]
|
| OpenFlow: Enabling Innovation in Campus Networks | N. McKeown, T. Andershnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turneron, and H. Balakris | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 69-74 | April 2008 | Networking | [PDF]
|
| Thoughts on Reviewing | M. Allman | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50 | April 2008 | Networking | [PDF]
|
| Measuring the Evolution of Transport Protocols in the Internet | A. Medina, M. Allman, and S. Floyd | ACM Computer Communication Review, Vol. 35, Issue 2, pp. 37-52. DOI:http://doi.acm.org/10.1145/1064413.1064418 | April 2005 | Networking | [PDF]
|
| Best-Effort versus Reservations: A Simple Comparative Analysis | L. Breslau and S. Shenker | ACM Computer Communication Review, Vol. 28, pp. 3-16 | September 1998 | Networking | |
| Uniform versus Priority Dropping for Layered Video | S. Bajaj, L. Breslau, and S. Shenker | ACM Computer Communication Review, Vol. 28, pp. 131-143 | September 1998 | Networking | |
| Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks | I. Stoica, S. Shenker, and H. Zhang | ACM Computer Communication Review, Vol. 28, pp. 118-130 | September 1998 | Networking | |