| Content‐based Privacy for Consumer‐Produced Multimedia | A. Janin, G. Friedland, and R. Sommer | ICSI Technical Report TR-12-012 | October 2012 | Networking | [PDF]
|
| NOSIX: A Portable Switch Interface for the Network Operating System | A. Wundsam and M.Yu | ICSI Technical Report TR-12-013 | October 2012 | Networking | [PDF]
|
| A Report on Some Recent Developments in TCP Congestion Control | S. Floyd | IEEE Communications Magazine, April 2001. | April 2001 | Networking | |
| Internet Connectivity for Mobile Ad Hoc Networks: Solutions and Challenges | P. M. Ruiz, F. J. Ros, and A.F. Gomez Skarmeta | IEEE Communications Magazine, pp. 118–125 | October 2005 | Networking | |
| The Use of End-to-end Multicast Measurements for Characterizing Internal Network Behavior | A. Adams, T. Bu, R. Caceres, N. Duffield, T. Friedman, J. Horowitz, F. Lo Presti, S.B. Moon, V. Paxson, and D. Towsley | IEEE Communications, 38(5), May 2000. | April 2000 | Networking | |
| An Architecture for Large-Scale Internet Measurement | V. Paxson, J. Mahdavi, A. Adams, and M. Mathis | IEEE Communications, Vol. 36, No. 8, pp. 48-54 | August 1998 | Networking | |
| Network Visualization with the Nam, VINT Network Animator | D. Estrin, M. Handley, J. Heidemann, S. McCanne, Y. Xu, and H. Yu | IEEE Computer, 33(11), 63-68, November 2000. | November 2000 | Networking | |
| Advances in Network Simulation | L. Breslau, et al. | IEEE Computer, May 2000, pp. 59-67. Or the technical report: Technical Report 99-702, University of Southern California, March 1999. | May 2000 | Networking | |
| The Network Oracle | J. Hellerstein, V. Paxson, L. Peterson, T. Roscoe, S. Shenker, and D. Wetherall | IEEE Data Engineering Bulletin, Vol. 28, No. 1, pp. 3-10 | March 2005 | Networking | [PDF]
|
| Dynamics of TCP Traffic over ATM Networks | S. Floyd and A. Romanow | IEEE Journal on Selected Areas in Communication, Vol. 13, No. 4, pp. 633-641 | May 1995 | Networking | [PDF]
|
| Hidden-Action in Network Routing | M. Feldman, J. Chuang, I. Stoica, and S. Shenker | IEEE Journal on Selected Areas in Communications, Vol. 25, Issue 6, pp. 1161-1172 | August 2007 | Networking | [PDF]
|
| Inside the Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | IEEE Magazine of Security and Privacy, Vol. 1, Issue 4, pp. 33-39 | July 2003 | Networking | [PDF]
|
| Approximate Fair Allocation of Link Bandwidth | R. Pan, B. Prabhakar, L. Breslau, and S. Shenker | IEEE Micro Vol. 23, Issue 1, pp. 36-43 | 2003 | Networking | |
| J. Ishac and M. Allman | On the Performance of TCP Spoofing in Satellite Networks | IEEE Milcom. October 2001. | October 2001 | Networking | |
| Growth Trends in Wide-Area TCP Connections | V. Paxson | IEEE Network, Vol. 8 No. 4, pp. 8-17 | June 1994 | Networking | |
| The Iterated Weakest Link | R. Böhme and T. Moore | IEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55 | January 2010 | Networking | [PDF]
|
| Towards Situational Awareness of Large-Scale Botnet Probing Events | Z. Li, A. Goyal, Y. Chen, and V. Paxson | IEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp. 175-188 | March 2011 | Networking | [PDF]
|
| Providing QoS through Machine Learning-Driven Adaptive Multimedia Applications | P. M. Ruiz, J. Botia, and A. Gomez-Skarmeta | IEEE Transactions on Systems, Man, and Cybernetics, Part-B, Vol. 34, No. 3, pp. 1398-1422 | June 2004 | Networking | |
| A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast | P. Radoslavov, C. Papadopoulos, R. Govindan, and D. Estrin | IEEE/ACM Transactions on Networking (TON), Volume 12, Issue 3, pp. 469-482 | June 05 2004 | Networking | |
| Promoting the Use of End-to-End Congestion Control in the Internet | S. Floyd and K. Fall | IEEE/ACM Transactions on Networking, August 1999. Winner of the Communications Society William R. Bennett Prize Paper Award, 1999. | August 1999 | Networking | |
| A Reliable Multicast Framework for Light-weight Sessions and Application Level Framing | S. Floyd, V. Jacobson, C. Liu, S. McCanne, and L. Zhang | IEEE/ACM Transactions on Networking, December 1997, Vol. 5, No. 6, pp. 784-803. Also in the proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '95), August 1995, pp. 342-356 | December 1997 | Networking | |
| Random Early Detection Gateways for Congestion Avoidance | S. Floyd and V. Jacobson | IEEE/ACM Transactions on Networking, Vol. 1, No. 4, pp. 397-413 | August 1993 | Networking | |
| Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed Networks | I. Stoica, S. Shenker, and H. Zhang | IEEE/ACM Transactions on Networking, Vol. 11, Issue 1, pp. 33-46. (A previous version appeared in the proceedings of the ACM's Special Interest Group on Data Communication (SIGCOMM'98), Vancouver, Canada, August 1998, pp. 118-130.) | February 2003 | Networking | [PDF]
|
| Internet Indirection Infrastructure | I. Stoica, D. Adkins, S. Zhaung, S. Shenker, and S. Surana | IEEE/ACM Transactions on Networking, Vol. 12, Issue 2, pp. 205-218 | April 2004 | Networking | [PDF]
|
| Network Loss Tomography Using Striped Unicast Probes | N. Duffield, F. Lo Presti, V. Paxson, and D. Towsley | IEEE/ACM Transactions on Networking, Vol. 14 Issue 4, pp. 697-710 | August 2006 | Networking | [PDF]
|
| Incremental Deployment Strategies for Router-Assisted Reliable Multicast | X. He, C. Papadopoulos, and P. Radoslavov | IEEE/ACM Transactions on Networking, Vol. 14, Issue 4, pp. 779-792 | August 2006 | Networking | |
| Observed Structure of Addresses in IP Traffic | E. Kohler, J. Li, V. Paxson, and S. Shenker | IEEE/ACM Transactions on Networking, Vol. 14, No. 6, pp. 1207-1218 | December 2006 | Networking | [PDF]
|
| Rethinking Enterprise Network Control | M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. Gude, N. McKeown, and S. Shenker | IEEE/ACM Transactions on Networking, Vol. 17, No. 4, pp. 1270-1283 | August 2009 | Networking | [PDF]
|
| The Synchronization of Periodic Routing Messages | S. Floyd and V. Jacobson | IEEE/ACM Transactions on Networking, Vol. 2, No. 2, pp. 122-136 | April 1994 | Networking | [PDF]
|
| Empirically-Derived Analytic Models of Wide-Area TCP Connections | V. Paxson | IEEE/ACM Transactions on Networking, Vol. 2, No. 4 | August 1994 | Networking | |
| Wide-Area Traffic: The Failure of Poisson Modeling | V. Paxson and S. Floyd | IEEE/ACM Transactions on Networking, Vol. 3, No. 3, pp. 226-244 | June 1995 | Networking | |
| Link-sharing and Resource Management Models for Packet Networks | S. Floyd and V. Jacobson | IEEE/ACM Transactions on Networking, Vol. 3, No. 4, pp. 365-386 | August 1995 | Networking | [PDF]
|
| End-to-End Routing Behavior in the Internet | V. Paxson | IEEE/ACM Transactions on Networking, Vol. 5, No. 5, pp. 601-615. An earlier version appeared in the proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '96), August 1996, Stanford, California | October 1997 | Networking | |
| Sharing the "cost" of multicast trees: An axiomatic analysis | S. Herzog, S. Shenker, and D. Estrin | IEEE/ACM Transactions on Networking, Vol. 5, pp. 847-860 | December 1997 | Networking | |
| End-to-End Internet Packet Dynamics | V. Paxson | IEEE/ACM Transactions on Networking, Vol.7, No.3, pp. 277-292, June 1999. An earlier version appeared in Proc. ACM SIGCOMM '97, September 1997, Cannes, France. | June 1999 | Networking | |
| Difficulties in Simulating the Internet | S. Floyd and V. Paxson | IEEE/ACM Transactions on Networking, Vol.9, No.4, pp. 392-403. (An earlier version appeared in Proceedings of the 1997 Winter Simulation Conference, December 1997). | August 2001 | Networking | [PDF]
|
| TCP Slow Start Survey: Standards and Issues | M. Allman | IETF Internet-Draft, Draft-ietf-tcpm-early-rexmt-00.txt, in progress | August 2008 | Networking | [PDF]
|
| Distributed Algorithmic Mechanism Design | J. Feigenbaum, M. Schapira, and S. Shenker | In Algorithmic Game Theory, N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, eds., pp. 363-384, Cambridge University Press | 2007 | Networking | |
| From Complex Specifications to a Working Prototype: A Protocol Engineering Case Study | M. J. Fernández, J. González, J. M. Pousada, M. Llamas, and A. Romero | In Lecture Notes in Computer Science, Vol. 2021, pp. 436-448, Springer Verlag | 2001 | Networking | |
| Very Fast Containment of Scanning Worms, Revisited | N. Weaver, S. Staniford, and V. Paxson | In Malware Detection: Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, eds., pp. 113-145, Springer | 2007 | Networking | |
| Empowering mobile software agents | V. Roth | In N. Suri, editor, Proceedings 6th IEEE Mobile Agents Conference, volume 2535 of Lecture Notes in Computer Science, pages 47-63. Springer Verlag, October 2002. | October 2002 | Networking | |
| Why We Don't Know How To Simulate The Internet | V. Paxson and S. Floyd | In Proceedings of the 1997 Winter Simulation Conference | December 1997 | Networking | |
| Internet Topology: Discovery and Policy Impact, Parts I and II | H. Tangmunarunkit, R. Govindan, and S. Shenker | In The Internet as a Large-Scale Complex System, K. Park and W. Willinger, eds., pp. 121-160, Oxford University Press | 2005 | Networking | [PDF]
|
| Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters | M. Zaharia, T. Das, H. Li, S. Shenker and I. Stoica | In the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MA | June 2012 | Networking | [PDF]
|
| Data-Centric Storage in Sensornets | S. Shenker, S. Ratnasamy, B. Karp, R. Govindan, and D. Estrin | In Workshop Record of the First Workshop on Hot Topics in Networks (HotNets-I), October 2002. | October 2002 | Networking | |
| Topologically-Aware Overlay Construction and Server Selection | S. Ratnasamy, M. Handley, R. M. Karp, and S. Shenker | INFOCOM | 2002 | Networking | |
| Comments on the Performance of Measurement-Based Admission Control Algorithms | L. Breslau, S. Jamin, and S. Shenker | INFOCOM 2000, Tel Aviv, Israel, March 2000. | March 2000 | Networking | |
| The Impact of Routing Policy on Internet Paths | H. Tangmunarunkit, R. Govindan, S. Shenker, and D. Estrin | INFOCOM 2001: 736-742. | 2001 | Networking | |
| The Origin of Power-Laws in Internet Topologies Revisited | Q. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger | INFOCOM, 2002. | 2002 | Networking | |
| Self-Verifying CSFQ | I. Stoica, H. Zhang, and S. Shenker | INFOCOM, 2002. | 2002 | Networking | |