Publication Search Results

TitleAuthorBibliographicDateGroupsort descendingLinks
Hold-On: Protecting Against On-Path DNS PoisoningH. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. PaxsonProceedings of the Conference on Securing and Trusting Internet Names (SATIN 2012), Teddington, United KingdomMarch 2012Networking[PDF]

Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research CommunityM. Zaharia, S. Katti, C. Grier, V. Paxson, S. Shenker, I. Stoica and D. SongEECS Department, UC Berkeley Technical Report No. UCB/EECS-2012-12, Berkeley, CaliforniaJanuary 2012Networking[PDF]

Effective Straggler Mitigation: Attack of the ClonesG. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. StoicaTo appear in the Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’13), Lombard, IllinoisApril 2013Networking
Why Let Resources Idle? Aggressive Cloning of Jobs with DollyG. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. StoicaProceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), Boston, MassachusettsJune 2012Networking[PDF]

PACMan: Coordinated Memory Caching for Parallel JobsG. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. StoicaProceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, CaliforniaApril 2012Networking[PDF]

Enabling Innovation Below the Communication APIG. Ananthanarayanan, K. Heimerl, M. Zaharia, M. Demmer, T. Koponen, A. Tavakoli, S. Shenker, and I. StoicaUC Berkeley Technical Report, UCB/EECS-2009-141October 2009Networking[PDF]

Shark: Fast Data Analysis Using Coarse-grained Distributed MemoryC. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. StoicaDemo, ACM SIGMOD/PODS Conference, Scottsdale, ArizonaMay 2012Networking[PDF]

Mesos: Flexible Resource Sharing for the CloudB. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A.D. Joseph, R. Katz, S. Shenker and I. StoicaUSENIX ;login:, Vol. 36, No. 4, pp. 37-45August 2011Networking[PDF]

Spark: Cluster Computing with Working SetsM. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker and I. StoicaProceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, MassachusettsJune 2010Networking[PDF]

Software-Defined Internet ArchitectureB. Raghavan, T. Koponen, M. Casado, A. Ghodsi, S. Ratnasamy, and S. ShenkerProceedings of the ACM Workshop on Hot Topics in Networks (HotNets-XII), Seattle, WashingtonOctober 2012Networking[PDF]

Naming in Content-Oriented ArchitecturesA. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti, and S. ShenkerProceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN 2011), Toronto, ON, CanadaAugust 2011Networking[PDF]

Comments on BufferbloatM. AllmanACM SIGCOMM Computer Communications, Vol. 3, No. 1, pp. 30-37January 2013Networking[PDF]

Findings and Implications from Data Mining the IMC Review ProcessR. Beverly and M. AllmanACM SIGCOMM Computer Communication Review, Vol. 3, No. 1, pp. 23-29January 2013Networking[PDF]

Exploiting Innocuous Activity for Correlating Users Across SitesO. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. TeixeiraTo appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, BrazilMay 2013Networking
Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the WebD. Akhawe, B. Amann, M. Vallentin, and R. SommerTo appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, BrazilMay 2013Networking

Pages