Publication Search Results

TitleAuthorBibliographicsort descendingDateGroupLinks
Content‐based Privacy for Consumer‐Produced MultimediaA. Janin, G. Friedland, and R. SommerICSI Technical Report TR-12-012October 2012Networking[PDF]

NOSIX: A Portable Switch Interface for the Network Operating SystemA. Wundsam and M.YuICSI Technical Report TR-12-013October 2012Networking[PDF]

A Report on Some Recent Developments in TCP Congestion ControlS. FloydIEEE Communications Magazine, April 2001.April 2001Networking
Internet Connectivity for Mobile Ad Hoc Networks: Solutions and ChallengesP. M. Ruiz, F. J. Ros, and A.F. Gomez SkarmetaIEEE Communications Magazine, pp. 118–125October 2005Networking
The Use of End-to-end Multicast Measurements for Characterizing Internal Network BehaviorA. Adams, T. Bu, R. Caceres, N. Duffield, T. Friedman, J. Horowitz, F. Lo Presti, S.B. Moon, V. Paxson, and D. TowsleyIEEE Communications, 38(5), May 2000.April 2000Networking
An Architecture for Large-Scale Internet MeasurementV. Paxson, J. Mahdavi, A. Adams, and M. MathisIEEE Communications, Vol. 36, No. 8, pp. 48-54August 1998Networking
Network Visualization with the Nam, VINT Network AnimatorD. Estrin, M. Handley, J. Heidemann, S. McCanne, Y. Xu, and H. YuIEEE Computer, 33(11), 63-68, November 2000.November 2000Networking
Advances in Network SimulationL. Breslau, et al.IEEE Computer, May 2000, pp. 59-67. Or the technical report: Technical Report 99-702, University of Southern California, March 1999.May 2000Networking
The Network OracleJ. Hellerstein, V. Paxson, L. Peterson, T. Roscoe, S. Shenker, and D. WetherallIEEE Data Engineering Bulletin, Vol. 28, No. 1, pp. 3-10March 2005Networking[PDF]

Dynamics of TCP Traffic over ATM NetworksS. Floyd and A. RomanowIEEE Journal on Selected Areas in Communication, Vol. 13, No. 4, pp. 633-641May 1995Networking[PDF]

Hidden-Action in Network RoutingM. Feldman, J. Chuang, I. Stoica, and S. ShenkerIEEE Journal on Selected Areas in Communications, Vol. 25, Issue 6, pp. 1161-1172August 2007Networking[PDF]

Inside the Slammer WormD. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. WeaverIEEE Magazine of Security and Privacy, Vol. 1, Issue 4, pp. 33-39July 2003Networking[PDF]

Approximate Fair Allocation of Link BandwidthR. Pan, B. Prabhakar, L. Breslau, and S. ShenkerIEEE Micro Vol. 23, Issue 1, pp. 36-43 2003Networking
J. Ishac and M. AllmanOn the Performance of TCP Spoofing in Satellite NetworksIEEE Milcom. October 2001.October 2001Networking
Growth Trends in Wide-Area TCP ConnectionsV. PaxsonIEEE Network, Vol. 8 No. 4, pp. 8-17June 1994Networking
The Iterated Weakest LinkR. Böhme and T. MooreIEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55January 2010Networking[PDF]

Towards Situational Awareness of Large-Scale Botnet Probing EventsZ. Li, A. Goyal, Y. Chen, and V. PaxsonIEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp. 175-188March 2011Networking[PDF]

Providing QoS through Machine Learning-Driven Adaptive Multimedia ApplicationsP. M. Ruiz, J. Botia, and A. Gomez-SkarmetaIEEE Transactions on Systems, Man, and Cybernetics, Part-B, Vol. 34, No. 3, pp. 1398-1422June 2004Networking
A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable MulticastP. Radoslavov, C. Papadopoulos, R. Govindan, and D. EstrinIEEE/ACM Transactions on Networking (TON), Volume 12, Issue 3, pp. 469-482June 05 2004Networking
Promoting the Use of End-to-End Congestion Control in the InternetS. Floyd and K. FallIEEE/ACM Transactions on Networking, August 1999. Winner of the Communications Society William R. Bennett Prize Paper Award, 1999.August 1999Networking
A Reliable Multicast Framework for Light-weight Sessions and Application Level FramingS. Floyd, V. Jacobson, C. Liu, S. McCanne, and L. ZhangIEEE/ACM Transactions on Networking, December 1997, Vol. 5, No. 6, pp. 784-803. Also in the proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '95), August 1995, pp. 342-356December 1997Networking
Random Early Detection Gateways for Congestion AvoidanceS. Floyd and V. JacobsonIEEE/ACM Transactions on Networking, Vol. 1, No. 4, pp. 397-413August 1993Networking
Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed NetworksI. Stoica, S. Shenker, and H. ZhangIEEE/ACM Transactions on Networking, Vol. 11, Issue 1, pp. 33-46. (A previous version appeared in the proceedings of the ACM's Special Interest Group on Data Communication (SIGCOMM'98), Vancouver, Canada, August 1998, pp. 118-130.)February 2003Networking[PDF]

Internet Indirection InfrastructureI. Stoica, D. Adkins, S. Zhaung, S. Shenker, and S. SuranaIEEE/ACM Transactions on Networking, Vol. 12, Issue 2, pp. 205-218April 2004Networking[PDF]

Network Loss Tomography Using Striped Unicast ProbesN. Duffield, F. Lo Presti, V. Paxson, and D. TowsleyIEEE/ACM Transactions on Networking, Vol. 14 Issue 4, pp. 697-710August 2006Networking[PDF]

Incremental Deployment Strategies for Router-Assisted Reliable MulticastX. He, C. Papadopoulos, and P. RadoslavovIEEE/ACM Transactions on Networking, Vol. 14, Issue 4, pp. 779-792August 2006Networking
Observed Structure of Addresses in IP TrafficE. Kohler, J. Li, V. Paxson, and S. ShenkerIEEE/ACM Transactions on Networking, Vol. 14, No. 6, pp. 1207-1218December 2006Networking[PDF]

Rethinking Enterprise Network ControlM. Casado, M. J. Freedman, J. Pettit, J. Luo, N. Gude, N. McKeown, and S. ShenkerIEEE/ACM Transactions on Networking, Vol. 17, No. 4, pp. 1270-1283August 2009Networking[PDF]

The Synchronization of Periodic Routing MessagesS. Floyd and V. JacobsonIEEE/ACM Transactions on Networking, Vol. 2, No. 2, pp. 122-136April 1994Networking[PDF]

Empirically-Derived Analytic Models of Wide-Area TCP ConnectionsV. PaxsonIEEE/ACM Transactions on Networking, Vol. 2, No. 4August 1994Networking
Wide-Area Traffic: The Failure of Poisson ModelingV. Paxson and S. FloydIEEE/ACM Transactions on Networking, Vol. 3, No. 3, pp. 226-244June 1995Networking
Link-sharing and Resource Management Models for Packet NetworksS. Floyd and V. JacobsonIEEE/ACM Transactions on Networking, Vol. 3, No. 4, pp. 365-386August 1995Networking[PDF]

End-to-End Routing Behavior in the InternetV. PaxsonIEEE/ACM Transactions on Networking, Vol. 5, No. 5, pp. 601-615. An earlier version appeared in the proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '96), August 1996, Stanford, CaliforniaOctober 1997Networking
Sharing the "cost" of multicast trees: An axiomatic analysisS. Herzog, S. Shenker, and D. EstrinIEEE/ACM Transactions on Networking, Vol. 5, pp. 847-860December 1997Networking
End-to-End Internet Packet DynamicsV. PaxsonIEEE/ACM Transactions on Networking, Vol.7, No.3, pp. 277-292, June 1999. An earlier version appeared in Proc. ACM SIGCOMM '97, September 1997, Cannes, France.June 1999Networking
Difficulties in Simulating the InternetS. Floyd and V. PaxsonIEEE/ACM Transactions on Networking, Vol.9, No.4, pp. 392-403. (An earlier version appeared in Proceedings of the 1997 Winter Simulation Conference, December 1997).August 2001Networking[PDF]

TCP Slow Start Survey: Standards and IssuesM. AllmanIETF Internet-Draft, Draft-ietf-tcpm-early-rexmt-00.txt, in progressAugust 2008Networking[PDF]

Distributed Algorithmic Mechanism DesignJ. Feigenbaum, M. Schapira, and S. ShenkerIn Algorithmic Game Theory, N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, eds., pp. 363-384, Cambridge University Press 2007Networking
From Complex Specifications to a Working Prototype: A Protocol Engineering Case StudyM. J. Fernández, J. González, J. M. Pousada, M. Llamas, and A. RomeroIn Lecture Notes in Computer Science, Vol. 2021, pp. 436-448, Springer Verlag 2001Networking
Very Fast Containment of Scanning Worms, RevisitedN. Weaver, S. Staniford, and V. PaxsonIn Malware Detection: Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, eds., pp. 113-145, Springer 2007Networking
Empowering mobile software agentsV. RothIn N. Suri, editor, Proceedings 6th IEEE Mobile Agents Conference, volume 2535 of Lecture Notes in Computer Science, pages 47-63. Springer Verlag, October 2002.October 2002Networking
Why We Don't Know How To Simulate The InternetV. Paxson and S. FloydIn Proceedings of the 1997 Winter Simulation ConferenceDecember 1997Networking
Internet Topology: Discovery and Policy Impact, Parts I and IIH. Tangmunarunkit, R. Govindan, and S. ShenkerIn The Internet as a Large-Scale Complex System, K. Park and W. Willinger, eds., pp. 121-160, Oxford University Press 2005Networking[PDF]

Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large ClustersM. Zaharia, T. Das, H. Li, S. Shenker and I. StoicaIn the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MAJune 2012Networking[PDF]

Data-Centric Storage in SensornetsS. Shenker, S. Ratnasamy, B. Karp, R. Govindan, and D. EstrinIn Workshop Record of the First Workshop on Hot Topics in Networks (HotNets-I), October 2002.October 2002Networking
Topologically-Aware Overlay Construction and Server SelectionS. Ratnasamy, M. Handley, R. M. Karp, and S. ShenkerINFOCOM 2002Networking
Comments on the Performance of Measurement-Based Admission Control AlgorithmsL. Breslau, S. Jamin, and S. ShenkerINFOCOM 2000, Tel Aviv, Israel, March 2000.March 2000Networking
The Impact of Routing Policy on Internet PathsH. Tangmunarunkit, R. Govindan, S. Shenker, and D. EstrinINFOCOM 2001: 736-742. 2001Networking
The Origin of Power-Laws in Internet Topologies RevisitedQ. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. WillingerINFOCOM, 2002. 2002Networking
Self-Verifying CSFQI. Stoica, H. Zhang, and S. ShenkerINFOCOM, 2002. 2002Networking

Pages