Publication Search Results

TitleAuthorBibliographicDatesort ascendingGroupLinks
Trained to Accept? A Field Experiment on Consent DialogsR. Boehme and S. KoepsellProceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406April 2010Networking[PDF]

Insights from the Inside: A View of Botnet Management from InfiltrationC. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. SongProceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, CaliforniaApril 2010Networking[PDF]

On the Potential of Proactive Domain BlacklistingM. Felegyhazi, C. Kreibich, and V. PaxsonProceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, CaliforniaApril 2010Networking[PDF]

A Preliminary Analysis of TCP Performance in an Enterprise NetworkB. Nechaev, M. Allman, V. Paxson, and A. GurtovProceedings of the 2010 Internet Network Management Workshop/Workshop on Research and Enterprise Networking (INM/WREN '10), San Jose, CaliforniaApril 2010Networking[PDF]

RFC 5827: Early Retransmit for TCP and SCTPM. Allman, K. Avrachenkov, U. Ayesta, J. Blanton, and P. HurtigRequest for Comments 5827, ExperimentalApril 2010Networking[PDF]

Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-ReduceJ. Hendrik Boese, A. Andrzejak, and M. HoegqvistProceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010), Raleigh, North Carolina, Article No. 3April 2010Networking
Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster SchedulingM. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. StoicaProceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278April 2010Networking[PDF]

Dynamic Route Recomputation Considered HarmfulM. Caesar, M. Casado, T. Koponen, J. Rexford, and S. ShenkerComputer Communication Review, Vol. 40, Issue 2April 2010Networking[PDF]

A First Look at Mobile Hand-held Device TrafficG. Maier, F. Schneider, and A. FeldmannProceedings of the 11th International Conference on Passive and Active Network Measurement (PAM 2010), Zurich, Switzerland, pp. 161-170April 2010Networking[PDF]

Hedera: Dynamic Flow Scheduling for Data Center NetworksM. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. VahdatProceedings of the USENIX/ACM SIGCOMM Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CaliforniaApril 2010Networking[PDF]

The "Dresden Image Database" for Benchmarking Digital Image ForensicsT. Gloe and R. BoehmeProceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), pp. 1584-1590, Sierre, SwitzerlandMarch 2010Networking
Privacy in Online Social LendingR. Boehme and S. PoetzschProceedings of the AAAI 2010 Spring Symposium on Intelligent Information Privacy Management, Palo Alto, California, pp. 23-28March 2010Networking[PDF]

DDoS Defense by OffenseM. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. ShenkerACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3March 2010Networking[PDF]

Botnet Judo: Fighting Spam with ItselfA. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. SavageProceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, CaliforniaFebruary 2010Networking[PDF]

RFC 5690: Adding Acknowledgement Congestion Control to TCPS. Floyd, A. Arcia, D. Ros, and J. IyengarRequest for Comments 5690, InformationalFebruary 2010Networking[PDF]

Barter Trade Improves Message Delivery in Opportunistic NetworksL. Buttyan, L. Dora, M. Felegyhazi, and I. VajdaAd Hoc Networks, Vol. 8, Issue 1, pp. 1-14January 2010Networking[PDF]

The Iterated Weakest LinkR. Böhme and T. MooreIEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55January 2010Networking[PDF]

Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, GermanyC. Kreibich and M. Jahnke, eds.Springer 2010Networking
Securing Web ContentJ. Koskela, N. Weaver, A. Gurtov, and M. AllmanProceedings of the ACM CoNext Workshop on Re-Architecting the Internet (ReArch 2009), Rome, Italy, pp. 7-12December 2009Networking[PDF]

On Calibrating Enterprise Switch MeasurementsB. Nechaev, V. Paxson, M. Allman, and A. GurtovProceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 143-155November 2009Networking[PDF]

On Dominant Characteristics of Residential Broadband Internet TrafficG. Maier, A. Feldmann, V. Paxson, and M. AllmanProceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 90-102November 2009Networking[PDF]

Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-EngineeringJ. Caballero, P. Poosankam, C. Kreibich, and D. SongProceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, Illinois, pp. 621-634November 2009Networking[PDF]

Securing Mediated Trace Access Using Black-Box Permutation AnalysisP. Mittal, V. Paxson, R. Sommer, and M. WinterrowdProceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New YorkOctober 2009Networking[PDF]

A Policy Framework for the Future InternetA. Seehra, J. Naous, M. Walfish, D. Maziéres, A. Nicolosi, and S. ShenkerProceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New YorkOctober 2009Networking[PDF]

Extending Networking into the Virtualization LayerB. Pfaff, J. Pettit, K. Amidon, M. Casado, T. Koponen, and S. ShenkerProceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New YorkOctober 2009Networking[PDF]

Applying NOX to the DatacenterA. Tavakoli, M. Casado, T. Koponen, and S. ShenkerProceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New YorkOctober 2009Networking[PDF]

Hot Data Centers vs. Cool PeersS. Nedevschi, S. Ratnasamy, and J. PadhyeProceedings of the Workshop on Power Aware Computing and Systems (HotPower '09), Big Sky, Montana, p. 8October 2009Networking[PDF]

Enabling Innovation Below the Communication APIG. Ananthanarayanan, K. Heimerl, M. Zaharia, M. Demmer, T. Koponen, A. Tavakoli, S. Shenker, and I. StoicaUC Berkeley Technical Report, UCB/EECS-2009-141October 2009Networking[PDF]

A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software VendorsG. SchryenProceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics (IMF 2009), Stuttgart, Germany, pp. 153-168September 2009Networking[PDF]

Elektronische Wahlen: Verifizierung vs. ZertifizierungM. Volkamer, G. Schryen, L. Langer, A. Schmitt, and J. BuchmannPresented at the 39th Jahrestagung der Gesellschaft für Informatik e.V. (Informatik 2009), Lübeck, GermanySeptember 2009Networking
RFC 5681: TCP Congestion ControlM. Allman, V. Paxson, and E. BlantonRequest for Comments 5681, Proposed StandardSeptember 2009Networking[PDF]

Peer to Peer Edge Caches Should Be FreeN. WeaverProceedings of the 37th Research Conference on Communication, Information, and Internet Policy, Arlington, VirginiaSeptember 2009Networking[PDF]

Security of Open Source and Closed Source Software: An Empirical Comparison of Published VulnerabilitiesG. SchryenProceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), San Francisco, California, paper 387August 2009Networking[PDF]

How the Pursuit of Truth Led Me to Selling ViagraV. PaxsonInvited talk at the USENIX Security Symposium, Montreal, CanadaAugust 2009Networking[PDF]

RFC 5622: Profile for DCCP Congestion Control ID 4: TCP-Friendly Rate Control for Small Packets (TFRC-SP)S. Floyd and E. KohlerRequest for Comments 5622, ExperimentalAugust 2009Networking[PDF]

Rethinking Enterprise Network ControlM. Casado, M. J. Freedman, J. Pettit, J. Luo, N. Gude, N. McKeown, and S. ShenkerIEEE/ACM Transactions on Networking, Vol. 17, No. 4, pp. 1270-1283August 2009Networking[PDF]

Practical Declarative Network ManagementT. L. Hinrichs, N. S. Gude, M. Casado, J. C. Mitchell, and S. ShenkerProceedings of the First ACM Workshop on Research on Enterprise Networking (WREN 2009), Barcelona, Spain, pp. 1-10. DOI:http://doi.acm.org/10.1145/1592681.1592683August 2009Networking[PDF]

Pathlet RoutingP. Godfrey, I. Ganichev, S. Shenker, and I. StoicaProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2009), Barcelona, Spain, pp. 111-122August 2009Networking[PDF]

RFC 5562: Adding Explicit Congestion Notification (ECN) Capability to TCP's SYN/ACK PacketsA. Kuzmanovic, S. Floyd, and K. K. RamakrishnanRequest for Comments 5562, ExperimentalJuly 2009Networking[PDF]

An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion PreventionR. Sommer, N. Weaver, and V. PaxsonConcurrency and Computation: Practice and Experience, Vol. 21, Issue 10, pp. 1255-1279July 2009Networking[PDF]

Competitive Cyber-Insurance and Internet SecurityN. Shetty, G. Schwartz. M. Felegyhazi, and J. WalrandProceedings of the Workshop on Economics of Information Security (WEIS 2009), London, United KingdomJune 2009Networking[PDF]

Efficient Application Placement in a Dynamic Hosting PlatformZ. Al-Qudah, H. Alzoubi, M. Allman, M. Rabinovich, and V. LiberatoreProceedings of the 18th International World Wide Web Conference (WWW 2009), Madrid, Spain, pp. 281-290April 2009Networking[PDF]

Comments on Selecting Ephemeral PortsM. AllmanACM SIGCOMM Computer Communication Review, Vol. 39, Issue 2, pp. 13-19April 2009Networking[PDF]

Spamcraft: An Inside Look At Spam Campaign OrchestrationC. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’09), Boston, MassachusettsApril 2009Networking[PDF]

Skilled in the Art of Being Idle: Reducing Energy Waste in Networked SystemsS. Nedevschi, J. Chandrashenkar, B. Nordman, S. Ratnasamy, and N. TaftProceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), Boston, Massachusetts, pp. 381-394April 2009Networking[PDF]

ICTD State of the Union: Where Have We Reached and Where Are We Headed?S. Nedevschi, R. Patra, and J. PalProceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2009), Doha, QatarApril 2009Networking[PDF]

Open Source vs. Closed Source Software: Towards Measuring SecurityG. Schryen and R. KaduraProceedings of the 24th Annual ACM Symposium on Applied Computing (SAC 2009), Honolulu, Hawaii, pp. 2016-2023March 2009Networking[PDF]

Automating Analysis of Large-Scale Botnet Probing EventsZ. Li, A. Goyal, Y. Chen, and V. PaxsonProceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, pp. 11-22March 2009Networking[PDF]

An Investigation of the Internet’s IP-Layer ConnectivityL. Tang, J. Li, Y. Li, and S. ShenkerComputer Communications, Vol. 32, No. 5, pp. 913-926March 2009Networking
Tiered Fault Tolerance for Long-Term IntegrityB. Chun, P. Maniatis, S. Shenker, and J. KubiatowiczProceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California, pp. 267-282February 2009Networking[PDF]

Pages