Publication Search Results

TitleAuthorsort descendingBibliographicDateGroupLinks
Towards an Economic Analysis of Trusted Systems (Position Paper)D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. SmithProceedings of the Third Workshop on Economics and Information Security, Minneapolis, MinnesotaMay 2004Networking[PDF]

Towards an Economic Analysis of Trusted SystemsD. Bergemann, J. Feigenbaum, S. Shenker, and J. M. SmithPresented at the Third Annual Workshop on Economics of Information Security (WEIS04), Minneapolis, MinnesotaMay 2004Networking[PDF]

Flexibility as an Instrument in DRM SystemsD. Bergemann, T. Eisenbach, J. Feigenbaum, and S. ShenkerProceedings of 2005 Workshop on the Economics of Information Security (WEIS 2005), Cambridge, MassachusettsJune 2005Networking[PDF]

The Design and Implementation of a Declarative Sensor Network SystemD. Chu, L. Popa, A. Tavakoli, J. Hellerstein, P. Levis, S. Shenker, and I. StoicaEECS Department, UC Berkeley Technical Report No. EECS-2006-132, Berkeley, CaliforniaOctober 2006Networking
Towards a Sensor Network Architecture: Lowering the WaistlineD. Culler, P. Dutta, C.T. Ee, R. Fonseca, J. Hui, P. Levis, J. Polastre, S. Shenker, I. Stoica, G. Tolle, and J. ZhaoProceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS 10), Santa Fe, New Mexico, p. 24June 2005Networking
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable DelayD. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. StanifordProceedings of RAID, 2002. 2002Networking
A Dynamic Bootstrap Mechanism for Rendezvous-Based Multicast RoutingD. Estrin, M. Handley, A. Helmy, P. Huang, and D. ThalerProceedings of Infocom 1999. 1999Networking
Network Visualization with the Nam, VINT Network AnimatorD. Estrin, M. Handley, J. Heidemann, S. McCanne, Y. Xu, and H. YuIEEE Computer, 33(11), 63-68, November 2000.November 2000Networking
Replay Debugging for Distributed ApplicationsD. Geels, G. Altekar, S. Shenker, and I. StoicaProceedings of the 2006 USENIX Annual Technical Conference (best paper), Boston, Massachusetts, pp. 289-300May 2006Networking[PDF]

OCALA: An Architecture for Supporting Legacy Applications Over OverlaysD. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I. Stoica, and K. WehrleProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 267-280May 2006Networking[PDF]

Internet Congestion Control for High Bandwidth-Delay Product EnvironmentsD. Katabi, M. Handley, and C. RohrsProceedings of ACM SIGCOMM 2002. 2002Networking
Logically Centralized? State Distribution Tradeoffs in Software Defined NetworksD. Levin, A. Wundsam, B. Heller, N. Handigol, and A. FeldmannProceedings of the Workshop on Hot Topics in Software Defined Networks (HotSDN '12) at ACM SIGCOMM 2012, Helsinki, FinlandAugust 2012Networking[PDF]

Congestion Control Without a Startup PhaseD. Liu, M. Allman, S. Jin, and L. WangProceedings of the Fifth International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet 2007), Los Angeles, CaliforniaFebruary 2007Networking[PDF]

PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate ProgramsD. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. LevchenkoProceedings of the 21st USENIX Security Symposium, Bellevue, WashingtonAugust 2012Networking[PDF]

Priceless: The Role of Payments in Abuse-Advertised GoodsD. McCoy, H. Dharmdasani, C. Kreibich, G. M. Voelker, and S. SavageProceedings of the 19th ACM Conference on Computer and Communications Society (CCS 2012), pp. 845-856, Raleigh, North CarolinaOctober 2012Networking
Rethinking Packet Forwarding HardwareD. Moon, M. Casado, T. Koponen, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 1-6October 2008Networking[PDF]

Inside the Slammer WormD. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. WeaverIEEE Magazine of Security and Privacy, Vol. 1, Issue 4, pp. 33-39July 2003Networking[PDF]

The Spread of the Sapphire/Slammer WormD. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. WeaverThe Cooperative Association for Internet Data Analysis Technical ReportFebruary 2003Networking
On the Aggregatability of Multicast Forwarding StateD. Thaler and M. HandleyProceedings of Infocom 2000. 2000Networking
The Internet Multicast Address Allocation ArchitectureD. Thaler, M. Handley, and D. EstrinRequest for Comments 2908, Informational, September 2000.September 2000Networking
RFC 3708: Using TCP DSACKs and SCTP Duplicate TSNs to Detect Spurious RetransmissionsE. Blanton and M. AllmanRequest for Comments 3708, ExperimentalFebruary 2004Networking[PDF]

On the Impact of Bursting on TCP PerformanceE. Blanton and M. AllmanProceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, MassachusettsMarch 2005Networking[PDF]

On Making TCP More Robust to Packet ReorderingE. Blanton and M. AllmanACM Computer Communication Review, 32(1), January 2002.January 2002Networking
A Conservative Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm for TCPE. Blanton, M. Allman, K. Fall, and L. WangRFC 3517April 2003Networking
A Dynamic Multilevel MPLS Protection DomainE. Calle, T. Jové, P. Vilà, and J. L. MarzoProceedings of the Third International Workshop on Design of Reliable Communication Networks (DRCN 2001), Budapest, HungaryOctober 2001Networking
Replication Strategies in Unstructured Peer-to-Peer NetworksE. Cohen and S. ShenkerProceedings ACM SIGCOMM 2002. 2002Networking
An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being SlowE. Friedman, M. Shor, S. Shenker, and B. SopherGames and Economic Behavior, Vol. 47, Issue 2, pp. 325-352May 2004Networking
The Click Modular RouterE. KohlerPh.D. thesis, Massachusetts Institute of Technology, November 2000.November 2000Networking
Prolac: a language for protocol compilationE. KohlerMaster's thesis, Massachusetts Institute of TechnologySeptember 1997Networking
Programming Language Techniques for Modular Router ConfigurationsE. Kohler, B. Chen, M.F. Kaashoek, R. Morris, and M. PolettoMIT Laboratory for Computer Science technical report MIT-LCS-TR-812, August 2000.August 2000Networking
Observed Structure of Addresses in IP TrafficE. Kohler, J. Li, V. Paxson, and S. ShenkerProceedings of ACM SIGCOMM Internet Measurement Workshop, November 2002. Also in Proceedings of the 2nd Internet Measurement Workshop (IMW) 2002.November 2002Networking
Observed Structure of Addresses in IP TrafficE. Kohler, J. Li, V. Paxson, and S. ShenkerIEEE/ACM Transactions on Networking, Vol. 14, No. 6, pp. 1207-1218December 2006Networking[PDF]

Evolving Software with an Application-Specific LanguageE. Kohler, M, Poletto, and D.R. MontgomeryWorkshop Record of WCSSS '99: The 2nd ACM SIGPLAN Workshop on Compiler Support for Systems Software, Atlanta, Georgia, May 1999, pages 94-102.May 1999Networking
Designing DCCP: Congestion Control Without ReliabilityE. Kohler, M. Handley, and S. FloydMay 2003May 2003Networking[PDF]

RFC 4340: Datagram Congestion Control Protocol (DCCP)E. Kohler, M. Handley, and S. FloydRequest For Comments 4340, Proposed StandardMarch 2006Networking[PDF]

Designing DCCP: Congestion Control Without ReliabilityE. Kohler, M. Handley, and S. FloydProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 27-38September 2006Networking[PDF]

A Readable TCP in the Prolac Protocol LanguageE. Kohler, M.F. Kaashoek, and D.R. MontgomeryProceedings of the ACM SIGCOMM '99 Conference: Applications, Technologies, Architectures, and Protocols for Computer Communication, Cambridge, Massachusetts, August 1999, pages 3-13.August 1999Networking
Programming Language Optimizations for Modular Router ConfigurationsE. Kohler, R. Morris, and B. ChenProceedings of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, California, October 2002, pages 251-263.October 2002Networking
Modular Components for Network Address TranslationE. Kohler, R. Morris, and M. PolettoProceedings of the Fifth International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50.Proceedings of the 5th International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50.June 2002Networking
The Click Modular RouterE. Kohler, R. Morris, B. Chen, J. Jannotti, and M.F. KaashoekACM Transactions on Computer Systems 18 (3), August 2000, pages 263-297.August 2000Networking
Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor NetworksF. Bian, X. Li, R. Govindan, and S. ShenkerInternational Journal of Ad Hoc and Ubiquitous Computing (special issue on wireless sensor networks), Vol. 1, No. 4, pp. 179-193January 2006Networking[PDF]

Security Extensions to MMARP Through Cryptographically Generated AddressesF.J. Galera, P.M. Ruiz, and A.F. Gomez SkarmetaLecture Notes on Informatics, Vol. P-68, pp. 339–343September 2005Networking
PACMan: Coordinated Memory Caching for Parallel JobsG. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. StoicaProceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, CaliforniaApril 2012Networking[PDF]

Effective Straggler Mitigation: Attack of the ClonesG. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. StoicaTo appear in the Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’13), Lombard, IllinoisApril 2013Networking
Why Let Resources Idle? Aggressive Cloning of Jobs with DollyG. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. StoicaProceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), Boston, MassachusettsJune 2012Networking[PDF]

Enabling Innovation Below the Communication APIG. Ananthanarayanan, K. Heimerl, M. Zaharia, M. Demmer, T. Koponen, A. Tavakoli, S. Shenker, and I. StoicaUC Berkeley Technical Report, UCB/EECS-2009-141October 2009Networking[PDF]

Disk-Locality in Datacenter Computing Considered IrrelevantG. Anantharayanan, A. Ghodsi, S. Shenker, and I. StoicaProceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), Napa, CaliforniaMay 2011Networking[PDF]

Cybercasing the Joint: On the Privacy Implications of GeotaggingG. Friedland and R. SommerProceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C.August 2010Networking[PDF]

Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online PrivacyG. Friedland, G. Maier, R. Sommer, and N. WeaverProceedings of the New Security Paradigms Workshop (NSPW), Marin County, CaliforniaSeptember 2011Networking[PDF]

On Dominant Characteristics of Residential Broadband Internet TrafficG. Maier, A. Feldmann, V. Paxson, and M. AllmanProceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 90-102November 2009Networking[PDF]

Pages