Publication Search Results

TitleAuthorBibliographicDatesort descendingGroupLinks
Fabric: A Retrospective on Evolving SDNM. Casado, T. Koponen, S. Shenker, and A. TootoonchianProceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Helsinki, FinlandAugust 2012Networking[PDF]

Fast and Interactive Analytics Over Hadoop Data with SparkM. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. StoicaUSENIX ;login:, Vol. 34, No. 4, pp. 45-51August 2012Networking[PDF]

A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time IntelligenceB. Amann, R. Sommer, A. Sharma, and S. HallProceedings of the 15th International Symposium on Attacks, Intrusions, and Detections (RAID 2012), pp. 314-333, Amsterdam, the NetherlandsSeptember 2012Networking
Making the Internet More EvolvableB. Raghavan, T. Koponen, A. Ghodsi, V. Brajkovic, and S. ShenkerICSI Technical Report TR-12-011September 2012Networking[PDF]

Priceless: The Role of Payments in Abuse-Advertised GoodsD. McCoy, H. Dharmdasani, C. Kreibich, G. M. Voelker, and S. SavageProceedings of the 19th ACM Conference on Computer and Communications Society (CCS 2012), pp. 845-856, Raleigh, North CarolinaOctober 2012Networking
Manufacturing Compromise: The Emergence of Exploit-as-a-ServiceC. Grier, L. Ballard, J. Caballero, N. Chachra, C. J. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, M. Zubair Rafique, M. Abu Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, and G. M. VoelkerProceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012), pp. 821-832, Raleigh, North CarolinaOctober 2012Networking[PDF]

Content‐based Privacy for Consumer‐Produced MultimediaA. Janin, G. Friedland, and R. SommerICSI Technical Report TR-12-012October 2012Networking[PDF]

NOSIX: A Portable Switch Interface for the Network Operating SystemA. Wundsam and M.YuICSI Technical Report TR-12-013October 2012Networking[PDF]

Software-Defined Internet ArchitectureB. Raghavan, T. Koponen, M. Casado, A. Ghodsi, S. Ratnasamy, and S. ShenkerProceedings of the ACM Workshop on Hot Topics in Networks (HotNets-XII), Seattle, WashingtonOctober 2012Networking[PDF]

Fathom: A Browser-based Network Measurement PlatformM. Dhawan, J. Samuel, R. Teixeira, C. Kreibich, M. Allman, N. Weaver, and V. PaxsonProceedings of the 2012 Internet Measurement Conference (IMC 2012), Boston, MassachusettsNovember 2012Networking[PDF]

Comments on BufferbloatM. AllmanACM SIGCOMM Computer Communications, Vol. 3, No. 1, pp. 30-37January 2013Networking[PDF]

Findings and Implications from Data Mining the IMC Review ProcessR. Beverly and M. AllmanACM SIGCOMM Computer Communication Review, Vol. 3, No. 1, pp. 23-29January 2013Networking[PDF]

Effective Straggler Mitigation: Attack of the ClonesG. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. StoicaTo appear in the Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’13), Lombard, IllinoisApril 2013Networking
Exploiting Innocuous Activity for Correlating Users Across SitesO. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. TeixeiraTo appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, BrazilMay 2013Networking
Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the WebD. Akhawe, B. Amann, M. Vallentin, and R. SommerTo appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, BrazilMay 2013Networking

Pages