Publication Search Results

TitleAuthorBibliographicDateGroupsort descendingLinks
Untangling the Web from DNSM. Walfish, H. Balakrishnan, and S. ShenkerProceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238March 2004Networking[PDF]

Reflections on Witty: Analyzing the AttackerN. Weaver and D. Ellis;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37June 2004Networking[PDF]

Worms vs. Perimeters: The Case for Hard-LANsN. Weaver, D. Ellis, S. Staniford, and V. PaxsonProceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12), Stanford, California, pp. 70-76August 2004Networking[PDF]

A Worst-Case WormN. Weaver and V. PaxsonProceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, MinnesotaMay 2004Networking[PDF]

Very Fast Containment of Scanning WormsN. Weaver, S. Staniford, and V. PaxsonProceedings of the 13th USENIX Security Symposium, San Diego, California, pp. 29-44August 2004Networking[PDF]

On the Impact of Bursting on TCP PerformanceE. Blanton and M. AllmanProceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, MassachusettsMarch 2005Networking[PDF]

The SFRA: A Corner-Turn FPGA ArchitectureN. Weaver, J. Hauser and J. WawrzynekProceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12February 2004Networking[PDF]

Achieving Fairness Through Selective Early DroppingJ. Scott and R.M. Karppreprint 2004. 2004Networking
Finite-Length Analysis of LT-codesR.M. Karp, M. Luby, and A. ShokrollahiSubmitted to International Symposium on Information Theory (ISIT '04). 2004Networking
Load Balancing in Dynamic Structured P2P SystemsB. Godfrey, R.M. Karp, K. Lakshminarayanan, S. Surana, and I. StoicaProceedings of INFOCOMM, 2004 2004Networking
New Techniques for Making Transport Protocols Robust to Corruption-Based LossW. Eddy, S. Ostermann, and M. AllmanACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88October 2004Networking[PDF]

Search Strategies in Inter-Domain Traffic EngineeringK. Chandrayana, R.M. Karp, M. Roughan, S. Sen, and Y. Zhangpreprint 2004 2004Networking
A Stochastic Process on the Hypercube with Applications to Peer-to-peer NetworksM. Adler, E. Halperin, R. M. Karp, and V VaziraniProceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC 2003), San Diego, California, pp. 575-584June 2003Networking[PDF]

On the Performance of MiddleboxesM. AllmanACM SIGCOMM/Usenix Internet Measurement Conference, Miami, FL, USAOctober 2003Networking
An Evaluation of XML-RPCM. AllmanACM Performance Evaluation Review, 30(4)March 2003Networking
TCP Congestion Control with Appropriate Byte Counting (ABC)M. AllmanRFC 3465February 2003Networking
Estimating Loss Rates With TCPM. Allman, W. Eddy, and S. OstermannACM Performance Evaluation Review, 31(3)December 2003Networking
A Conservative Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm for TCPE. Blanton, M. Allman, K. Fall, and L. WangRFC 3517April 2003Networking
Making Gnutella-Like P2P Systems ScalableY. Chawathe, S. Ratnasamy, L. Breslau, and S. ShenkerProceedings of ACM SIGCOMM 2003Networking
A Comparison of RED's Byte and Packet ModesW. Eddy and M. AllmanComputer Networks, 42(2)June 2003Networking
Mechanism Design for Policy RoutingJ. Feigenbaum, R. Sami, and S. ShenkerYale University Technical Report YALEU/DCS/TR-1258November 2003Networking
Pktd: A Packet Capture and Injection DaemonJ. Gonzalez and V. PaxsonProceedings of Passive and Active Measurement Workshop (PAM-2003), La Jolla, California, pp. 87-96April 2003Networking[PDF]

DIFS: A Distributed Index for Features in Sensor NetworksB. Greenstein, D. Estrin, R. Govindan, S. Ratnasamy, and S. ShenkerElsevier Journal of Ad Hoc Networks, 2003. (Also in the First IEEE Workshop on Sensor Networks Protocols and Applications, SNPA, 2003) 2003Networking
The Impact of DHT Routing Geometry on Resilience and ProximityK. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. StoicaProceedings of ACM SIGCOMM 2003, Karlruhe, GermanyAugust 2003Networking
Modeling Wireless Links for Transport ProtocolsA. Gurtov and S. FloydACM Computer Communications Review, Vol. 34, No. 2, pp. 85-96April 2004Networking[PDF]

RFC 3448: TCP Friendly Rate Control (TFRC): Protocol SpecificationM. Handley, S. Floyd, J. Pahdye, and J. WidmerRFC 3448, Proposed StandardJanuary 2003Networking[PDF]

A Framework for Incremental Deployment Strategies for Router-Assisted ServicesX. He, C. Papadopoulos, and P. RadoslavovProceedings of the IEEE Infocom 2003. San Francisco, California, USAApril 2003Networking
Querying the Internet with PIERR. Huebsch, J.M. Hellerstein, N. Lanham, B.T. Loo, S. Shenker, and I. StoicaProceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003), Berlin, GermanySeptember 2003Networking[PDF]

A Simple Algorithm for Finding Frequent Elements in Streams and BagsR.M. Karp, S. Shenker, and C.H. PapadimitriouACM Transactions on Database Systems, Vol. 28, Issue 1, pp. 51-55March 2003Networking[PDF]

Designing DCCP: Congestion Control Without ReliabilityE. Kohler, M. Handley, and S. FloydMay 2003May 2003Networking[PDF]

On the Convergence of Statistical Techniques for Estimating Network Traffic DemandsA. Medina, K. Salamatian, N. Taft, I. Matta, Y. Tsang, and C. DiotSubmitted for publication 2003February 2003Networking
Inside the Slammer WormD. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. WeaverIEEE Magazine of Security and Privacy, Vol. 1, Issue 4, pp. 33-39July 2003Networking[PDF]

The Spread of the Sapphire/Slammer WormD. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. WeaverThe Cooperative Association for Internet Data Analysis Technical ReportFebruary 2003Networking
A High-level Programming Environment for Packet Trace Anonymization and TransformationR. Pang and V. PaxsonProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2003), Karlsruhe, GermanyAugust 2003Networking[PDF]

On Selfish Routing in Internet-Like EnvironmentsL. Qiu, Y.R. Yang, Y. Zhang, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM), Karlsruhe, GermanyAugust 2003Networking[PDF]

Load Balancing in Structured P2P SystemsA. Rao, K. Lakshminaryanan, S. Surana, R. M. Karp, and I. StoicaProceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, CaliforniaFebruary 2003Networking[PDF]

Geographic Routing Without Location InformationA. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, and I. StoicaProceedings of ACM MOBICOMM 2003, San Diego, CaliforniaSeptember 2003Networking
Range Queries Over DHTsS. Ratnasamy, J. M. Hellerstein, and S. ShenkerIntel Research Technical Report, IRB-TR-03-011June 25 2003Networking
Data-Centric Storage in Sensornets with GHT, a Geographic Hash TableS. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Gvoindan, L. Yin, and F. YuACM MONET 2003Networking
Active Mapping: Resisting NIDS Evasion Without Altering TrafficU. Shankar and V. PaxsonProceedings of the IEEE Symposium on Security and Privacy, Oakland, CaliforniaMay 2003Networking[PDF]

Enhancing Byte-Level Network Intrusion Detection Signatures with ContextR. Sommer and V. PaxsonProceedings of ACM CCS 2003Networking
Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed NetworksI. Stoica, S. Shenker, and H. ZhangIEEE/ACM Transactions on Networking, Vol. 11, Issue 1, pp. 33-46. (A previous version appeared in the proceedings of the ACM's Special Interest Group on Data Communication (SIGCOMM'98), Vancouver, Canada, August 1998, pp. 118-130.)February 2003Networking[PDF]

Post Placement C-Slow Retiming for the Xilinx Virtex FPGAN. Weaver, Y. Markovskiy, Y. Patel, and J. WawrzynekEleventh ACM Symposium of Field Programmable Gate Arrays (FPGA) 2003Networking[PDF]

A Taxonomy of Computer WormsN. Weaver, V. Paxson, S. Staniford, and R. CunninghamProceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003), Washington, DC, pp. 11-18October 2003Networking[PDF]

Large Scale Malicious Code: A Research AgendaN. Weaver, V. Paxson, S. Staniford, and R. CunninghamDARPA-sponsored report 2003Networking
RR-TCP: A Reordering-Robust TCP with DSACKM. Zhang, B. Karp, S. Floyd, and L. PetersonICSI Technical Report TR-02-006July 2002Networking[PDF]

Host Mobility Using and Internet Indirection InfrastructureS. Zhuang, K. Lai, I. Stoica, R. Katz, and S. ShenkerProceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, California, pp. 129-144May 2003Networking[PDF]

Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCPA. Akella, R.M. Karp, C. Papadimitriou, S. Seshan, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002), Pittsburgh, PennsylvaniaAugust 2002Networking[PDF]

A Scalable System for Sharing Internet MeasurementsM. Allman, E. Blanton, and W. EddyProceedings of the Passive and Active Measurement Workshop, March 2002March 2002Networking
RFC 3390: Increasing TCP's Initial WindowM. Allman, S. Floyd, and C. PartridgeRFC 3390, October 2002. Proposed Standard. Obsoletes RFC 2414 (Experimental).October 2002Networking[PDF]

Pages