Publication Search Results

TitleAuthorBibliographicsort ascendingDateGroupLinks
Bro: A System for Detecting Network Intruders in Real-TimeV. PaxsonComputer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999.December 14 1999Networking
Very Large Conferences on the Internet: the Internet Multimedia Conferencing ArchitectureM. Handley, J. Crowcroft, C. Bormann, and J. OttComputer Networks and ISDN Systems, Special Issue on Internet Telephony 1998Networking
An Investigation of the Internet’s IP-Layer ConnectivityL. Tang, J. Li, Y. Li, and S. ShenkerComputer Communications, Vol. 32, No. 5, pp. 913-926March 2009Networking
Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network TrafficV. PaxsonComputer Communications Review, Vol. 27, No. 5, pp. 5-18. This paper is a minor revision of Fast Approximation of Self-Similar Network Traffic, an April 1995 technical report.October 1997Networking
Dynamic Route Recomputation Considered HarmfulM. Caesar, M. Casado, T. Koponen, J. Rexford, and S. ShenkerComputer Communication Review, Vol. 40, Issue 2April 2010Networking[PDF]

A Data-oriented (and Beyond) Network ArchitectureT. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. StoicaComputer Communication Review, Vol. 37, Issue 4, ACM, pp. 181-192October 2007Networking[PDF]

The Devil and Packet Trace AnonymizationR. Pang, M. Allman, V. Paxson, and J. LeeComputer Communication Review, Vol. 36, Issue 1, pp. 29-38January 2006Networking
Approximate fairness through differential droppingR. Pan, L. Breslau, B. Prabhakar, and S. ShenkerComputer Communication Review, Vol. 33, Issue 2, pp. 23-39 2003Networking
Simulation-based Comparisons of Tahoe, Reno, and SACK TCPK. Fall and S. FloydComputer Communication Review, Vol. 26, No. 3, pp. 5-21July 1996Networking[PDF]

Connections with Multiple Congested Gateways in Packet-Switched Networks Part 1: One-way TrafficS. FloydComputer Communication Review, Vol. 21, No. 5, pp. 30-47October 1991Networking[PDF]

Controlling High Bandwidth Aggregates in the NetworkR. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. ShenkerComputer Communication Review 32(3), July 2002.July 2002Networking
An Analysis of Using Reflectors for Distributed Denial-of-Service AttacksV. PaxsonComputer Communication Review 31(3), July 2001.July 2001Networking
Wireless Urban Sensing SystemsM. Srivastava, M. Hansen, J. Burke, A. Parker, S. Reddy, G. Saurabh, M. Allman, V. Paxson, and D. EstrinCenter for Embedded Network Sensing, UC Los Angeles Technical Report No. 65, Los Angeles, CaliforniaApril 2006Networking[PDF]

BRITE: Universal Topology Generation From a User's PerspectiveA. Medina, A. Lakhina, I. Matta, and J. ByersBU-CS-TR-2001-003. April 05, 2001.April 05 2001Networking
BRITE: A Flexible Generator of Internet TopologiesA. Medina and I. MattaBU-CS-TR-2000-005. January 21, 2000.January 21 2000Networking
Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite NetworksR. Krishnan, M. Allman, C. Partridge, and J.P.G. SterbenzBBN Technologies Technical Report No. 8333March 2002Networking[PDF]

Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. ResnickW. Willinger and V. PaxsonAnnals of Statistics, Vol. 25, No. 5, pp. 1805-1869 1997Networking
Barter Trade Improves Message Delivery in Opportunistic NetworksL. Buttyan, L. Dora, M. Felegyhazi, and I. VajdaAd Hoc Networks, Vol. 8, Issue 1, pp. 1-14January 2010Networking[PDF]

A Simple Algorithm for Finding Frequent Elements in Streams and BagsR.M. Karp, S. Shenker, and C.H. PapadimitriouACM Transactions on Database Systems, Vol. 28, Issue 1, pp. 51-55March 2003Networking[PDF]

DDoS Defense by OffenseM. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. ShenkerACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3March 2010Networking[PDF]

The Click Modular RouterE. Kohler, R. Morris, B. Chen, J. Jannotti, and M.F. KaashoekACM Transactions on Computer Systems 18 (3), August 2000, pages 263-297.August 2000Networking
Incentive Compatibility and Dynamics of Congestion ControlP. B. Godfrey, M. Schapira, A. Zohar, and S. ShenkerACM SIGMETRICS Performance Evaluation Review, Vol. 36, Issue 1, pp. 95-106June 2010Networking[PDF]

On the Performance of MiddleboxesM. AllmanACM SIGCOMM/Usenix Internet Measurement Conference, Miami, FL, USAOctober 2003Networking
On Estimating End-to-End Network Path PropertiesM. Allman and V. PaxsonACM SIGCOMM, September 1999, Cambridge, Massachusetts.September 1999Networking
A Comparison of RED's Byte and Packet ModesW. Eddy and M. AllmanACM SIGCOMM Student Poster Session, August 2002.August 2002Networking
Measuring End-to-End Bulk Transfer CapacityM. AllmanACM SIGCOMM Internet Measurement Workshop. November 2001.November 2001Networking
Comments on BufferbloatM. AllmanACM SIGCOMM Computer Communications, Vol. 3, No. 1, pp. 30-37January 2013Networking[PDF]

On Building Inexpensive Network CapabilitiesC. Shue, A. Kalafut, M. Allman, and C. TaylorACM SIGCOMM Computer Communications Review, Vol. 42, No. 2, pp. 72-79April 2012Networking[PDF]

Editorial: Architecting for InnovationT. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, B. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, and D. KuptsovACM SIGCOMM Computer Communications Review, Vol. 41, No. 3July 2011Networking[PDF]

NOX: Towards an Operating System for NetworksN. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. ShenkerACM SIGCOMM Computer Communications Review, Vol. 38, No. 3, pp. 105-110July 2008Networking[PDF]

YAMR: Yet Another Multipath Routing ProtocolI. Ganichev, B. Dai, B. Godfrey, and S. ShenkerACM SIGCOMM Computer Communication Review, Vol. 40, Issue 5October 2010Networking[PDF]

Comments on Selecting Ephemeral PortsM. AllmanACM SIGCOMM Computer Communication Review, Vol. 39, Issue 2, pp. 13-19April 2009Networking[PDF]

Notes on Burst Mitigation for Transport ProtocolsM. Allman and E. BlantonACM SIGCOMM Computer Communication Review, Vol. 35, Issue 2, pp. 53-60. DOI:http://doi.acm.org/10.1145/1064413.1064419April 2005Networking[PDF]

New Techniques for Making Transport Protocols Robust to Corruption-Based LossW. Eddy, S. Ostermann, and M. AllmanACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88October 2004Networking[PDF]

Findings and Implications from Data Mining the IMC Review ProcessR. Beverly and M. AllmanACM SIGCOMM Computer Communication Review, Vol. 3, No. 1, pp. 23-29January 2013Networking[PDF]

Endpoint Admission Control: Architectural Issues and PerformanceL. Breslau, E.W. Knightly, S. Shenker, I. Stoica, and H. ZhangACM SIGCOMM 2000, pages 57-69, Stockholm, Sweeden, October 2000.October 2000Networking
On Estimating End-to-End Network Path PropertiesM. Allman and V. PaxsonACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean, April 2001. This paper was originally presented at ACM SIGCOMM 1999.April 2001Networking
Estimating Loss Rates With TCPM. Allman, W. Eddy, and S. OstermannACM Performance Evaluation Review, 31(3)December 2003Networking
An Evaluation of XML-RPCM. AllmanACM Performance Evaluation Review, 30(4)March 2003Networking
Data-Centric Storage in Sensornets with GHT, a Geographic Hash TableS. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Gvoindan, L. Yin, and F. YuACM MONET 2003Networking
Modeling Wireless Links for Transport ProtocolsA. Gurtov and S. FloydACM Computer Communications Review, Vol. 34, No. 2, pp. 85-96April 2004Networking[PDF]

Internet Research Needs Better ModelsS. Floyd and E. KohlerACM Computer Communications Review, Vol. 33, No. 1, pp. 29-34January 2003Networking[PDF]

On the Origin of Power Laws in Internet TopologiesA. Medina, I. Matta, and J. ByersACM Computer Communications Review, April 2000. Also BU-CS-TR-2000-004. January 21, 2000.April 2000Networking
On Building Special-Purpose Social Networks for Emergency CommunicationM. AllmanACM Computer Communication Review, Vol. 40, Issue 5October 2010Networking[PDF]

OpenFlow: Enabling Innovation in Campus NetworksN. McKeown, T. Andershnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turneron, and H. BalakrisACM Computer Communication Review, Vol. 38, Issue 2, pp. 69-74April 2008Networking[PDF]

Thoughts on ReviewingM. AllmanACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50April 2008Networking[PDF]

Measuring the Evolution of Transport Protocols in the InternetA. Medina, M. Allman, and S. FloydACM Computer Communication Review, Vol. 35, Issue 2, pp. 37-52. DOI:http://doi.acm.org/10.1145/1064413.1064418April 2005Networking[PDF]

Best-Effort versus Reservations: A Simple Comparative AnalysisL. Breslau and S. ShenkerACM Computer Communication Review, Vol. 28, pp. 3-16September 1998Networking
Uniform versus Priority Dropping for Layered VideoS. Bajaj, L. Breslau, and S. ShenkerACM Computer Communication Review, Vol. 28, pp. 131-143September 1998Networking
Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed NetworksI. Stoica, S. Shenker, and H. ZhangACM Computer Communication Review, Vol. 28, pp. 118-130September 1998Networking

Pages