| Towards an Economic Analysis of Trusted Systems (Position Paper) | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Towards an Economic Analysis of Trusted Systems | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Presented at the Third Annual Workshop on Economics of Information Security (WEIS04), Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Flexibility as an Instrument in DRM Systems | D. Bergemann, T. Eisenbach, J. Feigenbaum, and S. Shenker | Proceedings of 2005 Workshop on the Economics of Information Security (WEIS 2005), Cambridge, Massachusetts | June 2005 | Networking | [PDF]
|
| The Design and Implementation of a Declarative Sensor Network System | D. Chu, L. Popa, A. Tavakoli, J. Hellerstein, P. Levis, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. EECS-2006-132, Berkeley, California | October 2006 | Networking | |
| Towards a Sensor Network Architecture: Lowering the Waistline | D. Culler, P. Dutta, C.T. Ee, R. Fonseca, J. Hui, P. Levis, J. Polastre, S. Shenker, I. Stoica, G. Tolle, and J. Zhao | Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS 10), Santa Fe, New Mexico, p. 24 | June 2005 | Networking | |
| Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay | D. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford | Proceedings of RAID, 2002. | 2002 | Networking | |
| A Dynamic Bootstrap Mechanism for Rendezvous-Based Multicast Routing | D. Estrin, M. Handley, A. Helmy, P. Huang, and D. Thaler | Proceedings of Infocom 1999. | 1999 | Networking | |
| Network Visualization with the Nam, VINT Network Animator | D. Estrin, M. Handley, J. Heidemann, S. McCanne, Y. Xu, and H. Yu | IEEE Computer, 33(11), 63-68, November 2000. | November 2000 | Networking | |
| Replay Debugging for Distributed Applications | D. Geels, G. Altekar, S. Shenker, and I. Stoica | Proceedings of the 2006 USENIX Annual Technical Conference (best paper), Boston, Massachusetts, pp. 289-300 | May 2006 | Networking | [PDF]
|
| OCALA: An Architecture for Supporting Legacy Applications Over Overlays | D. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I. Stoica, and K. Wehrle | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 267-280 | May 2006 | Networking | [PDF]
|
| Internet Congestion Control for High Bandwidth-Delay Product Environments | D. Katabi, M. Handley, and C. Rohrs | Proceedings of ACM SIGCOMM 2002. | 2002 | Networking | |
| Logically Centralized? State Distribution Tradeoffs in Software Defined Networks | D. Levin, A. Wundsam, B. Heller, N. Handigol, and A. Feldmann | Proceedings of the Workshop on Hot Topics in Software Defined Networks (HotSDN '12) at ACM SIGCOMM 2012, Helsinki, Finland | August 2012 | Networking | [PDF]
|
| Congestion Control Without a Startup Phase | D. Liu, M. Allman, S. Jin, and L. Wang | Proceedings of the Fifth International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet 2007), Los Angeles, California | February 2007 | Networking | [PDF]
|
| PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs | D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. Levchenko | Proceedings of the 21st USENIX Security Symposium, Bellevue, Washington | August 2012 | Networking | [PDF]
|
| Priceless: The Role of Payments in Abuse-Advertised Goods | D. McCoy, H. Dharmdasani, C. Kreibich, G. M. Voelker, and S. Savage | Proceedings of the 19th ACM Conference on Computer and Communications Society (CCS 2012), pp. 845-856, Raleigh, North Carolina | October 2012 | Networking | |
| Rethinking Packet Forwarding Hardware | D. Moon, M. Casado, T. Koponen, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 1-6 | October 2008 | Networking | [PDF]
|
| Inside the Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | IEEE Magazine of Security and Privacy, Vol. 1, Issue 4, pp. 33-39 | July 2003 | Networking | [PDF]
|
| The Spread of the Sapphire/Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | The Cooperative Association for Internet Data Analysis Technical Report | February 2003 | Networking | |
| On the Aggregatability of Multicast Forwarding State | D. Thaler and M. Handley | Proceedings of Infocom 2000. | 2000 | Networking | |
| The Internet Multicast Address Allocation Architecture | D. Thaler, M. Handley, and D. Estrin | Request for Comments 2908, Informational, September 2000. | September 2000 | Networking | |
| RFC 3708: Using TCP DSACKs and SCTP Duplicate TSNs to Detect Spurious Retransmissions | E. Blanton and M. Allman | Request for Comments 3708, Experimental | February 2004 | Networking | [PDF]
|
| On the Impact of Bursting on TCP Performance | E. Blanton and M. Allman | Proceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, Massachusetts | March 2005 | Networking | [PDF]
|
| On Making TCP More Robust to Packet Reordering | E. Blanton and M. Allman | ACM Computer Communication Review, 32(1), January 2002. | January 2002 | Networking | |
| A Conservative Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm for TCP | E. Blanton, M. Allman, K. Fall, and L. Wang | RFC 3517 | April 2003 | Networking | |
| A Dynamic Multilevel MPLS Protection Domain | E. Calle, T. Jové, P. Vilà, and J. L. Marzo | Proceedings of the Third International Workshop on Design of Reliable Communication Networks (DRCN 2001), Budapest, Hungary | October 2001 | Networking | |
| Replication Strategies in Unstructured Peer-to-Peer Networks | E. Cohen and S. Shenker | Proceedings ACM SIGCOMM 2002. | 2002 | Networking | |
| An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being Slow | E. Friedman, M. Shor, S. Shenker, and B. Sopher | Games and Economic Behavior, Vol. 47, Issue 2, pp. 325-352 | May 2004 | Networking | |
| The Click Modular Router | E. Kohler | Ph.D. thesis, Massachusetts Institute of Technology, November 2000. | November 2000 | Networking | |
| Prolac: a language for protocol compilation | E. Kohler | Master's thesis, Massachusetts Institute of Technology | September 1997 | Networking | |
| Programming Language Techniques for Modular Router Configurations | E. Kohler, B. Chen, M.F. Kaashoek, R. Morris, and M. Poletto | MIT Laboratory for Computer Science technical report MIT-LCS-TR-812, August 2000. | August 2000 | Networking | |
| Observed Structure of Addresses in IP Traffic | E. Kohler, J. Li, V. Paxson, and S. Shenker | Proceedings of ACM SIGCOMM Internet Measurement Workshop, November 2002. Also in Proceedings of the 2nd Internet Measurement Workshop (IMW) 2002. | November 2002 | Networking | |
| Observed Structure of Addresses in IP Traffic | E. Kohler, J. Li, V. Paxson, and S. Shenker | IEEE/ACM Transactions on Networking, Vol. 14, No. 6, pp. 1207-1218 | December 2006 | Networking | [PDF]
|
| Evolving Software with an Application-Specific Language | E. Kohler, M, Poletto, and D.R. Montgomery | Workshop Record of WCSSS '99: The 2nd ACM SIGPLAN Workshop on Compiler Support for Systems Software, Atlanta, Georgia, May 1999, pages 94-102. | May 1999 | Networking | |
| Designing DCCP: Congestion Control Without Reliability | E. Kohler, M. Handley, and S. Floyd | May 2003 | May 2003 | Networking | [PDF]
|
| RFC 4340: Datagram Congestion Control Protocol (DCCP) | E. Kohler, M. Handley, and S. Floyd | Request For Comments 4340, Proposed Standard | March 2006 | Networking | [PDF]
|
| Designing DCCP: Congestion Control Without Reliability | E. Kohler, M. Handley, and S. Floyd | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 27-38 | September 2006 | Networking | [PDF]
|
| A Readable TCP in the Prolac Protocol Language | E. Kohler, M.F. Kaashoek, and D.R. Montgomery | Proceedings of the ACM SIGCOMM '99 Conference: Applications, Technologies, Architectures, and Protocols for Computer Communication, Cambridge, Massachusetts, August 1999, pages 3-13. | August 1999 | Networking | |
| Programming Language Optimizations for Modular Router Configurations | E. Kohler, R. Morris, and B. Chen | Proceedings of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, California, October 2002, pages 251-263. | October 2002 | Networking | |
| Modular Components for Network Address Translation | E. Kohler, R. Morris, and M. Poletto | Proceedings of the Fifth International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50.Proceedings of the 5th International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50. | June 2002 | Networking | |
| The Click Modular Router | E. Kohler, R. Morris, B. Chen, J. Jannotti, and M.F. Kaashoek | ACM Transactions on Computer Systems 18 (3), August 2000, pages 263-297. | August 2000 | Networking | |
| Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor Networks | F. Bian, X. Li, R. Govindan, and S. Shenker | International Journal of Ad Hoc and Ubiquitous Computing (special issue on wireless sensor networks), Vol. 1, No. 4, pp. 179-193 | January 2006 | Networking | [PDF]
|
| Security Extensions to MMARP Through Cryptographically Generated Addresses | F.J. Galera, P.M. Ruiz, and A.F. Gomez Skarmeta | Lecture Notes on Informatics, Vol. P-68, pp. 339–343 | September 2005 | Networking | |
| PACMan: Coordinated Memory Caching for Parallel Jobs | G. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, California | April 2012 | Networking | [PDF]
|
| Effective Straggler Mitigation: Attack of the Clones | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | To appear in the Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’13), Lombard, Illinois | April 2013 | Networking | |
| Why Let Resources Idle? Aggressive Cloning of Jobs with Dolly | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), Boston, Massachusetts | June 2012 | Networking | [PDF]
|
| Enabling Innovation Below the Communication API | G. Ananthanarayanan, K. Heimerl, M. Zaharia, M. Demmer, T. Koponen, A. Tavakoli, S. Shenker, and I. Stoica | UC Berkeley Technical Report, UCB/EECS-2009-141 | October 2009 | Networking | [PDF]
|
| Disk-Locality in Datacenter Computing Considered Irrelevant | G. Anantharayanan, A. Ghodsi, S. Shenker, and I. Stoica | Proceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), Napa, California | May 2011 | Networking | [PDF]
|
| Cybercasing the Joint: On the Privacy Implications of Geotagging | G. Friedland and R. Sommer | Proceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C. | August 2010 | Networking | [PDF]
|
| Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy | G. Friedland, G. Maier, R. Sommer, and N. Weaver | Proceedings of the New Security Paradigms Workshop (NSPW), Marin County, California | September 2011 | Networking | [PDF]
|
| On Dominant Characteristics of Residential Broadband Internet Traffic | G. Maier, A. Feldmann, V. Paxson, and M. Allman | Proceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 90-102 | November 2009 | Networking | [PDF]
|