Publication Search Results

Titlesort descendingAuthorBibliographicDateGroupLinks
Beyond Pilots: Keeping Rural Wireless Networks AliveS. Surana, R. Patra, S. Nedevschi, M. Ramos, L. Subramanian, Y. Ben-David, and E. BrewerProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, CaliforniaApril 2008Networking[PDF]

binpac: A yacc for Writing Application Protocol ParsersR. Pang, V. Paxson, R. Sommer, and L. PetersonProceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 289-300October 2006Networking[PDF]

Botnet Judo: Fighting Spam with ItselfA. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. SavageProceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, CaliforniaFebruary 2010Networking[PDF]

Brief Announcement: Prefix Hash TreeS. Ramabhadran, S. Ratnasamy, J.M. Hellerstein, and S. ShenkerProceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, p. 367July 2004Networking[PDF]

BRITE: A Flexible Generator of Internet TopologiesA. Medina and I. MattaBU-CS-TR-2000-005. January 21, 2000.January 21 2000Networking
BRITE: An Approach to Universal Topology GenerationA. Medina, A. Lakhina, I. Matta, and J. ByersProceedings of MASCOTS 2001. IEEE Computer Society, August 2001.August 2001Networking
BRITE: Universal Topology Generation From a User's PerspectiveA. Medina, A. Lakhina, I. Matta, and J. ByersBU-CS-TR-2001-003. April 05, 2001.April 05 2001Networking
Bro: A System for Detecting Network Intruders in Real-TimeV. PaxsonComputer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999.December 14 1999Networking
Bro: A System for Detecting Network Intruders in Real-TimeV. PaxsonProceedings of the 7th USENIX Security Symposium, San Antonio, TexasJanuary 1998Networking
Brooery: A Graphical Environment for Analysis of Security-Relevant Network ActivityC. KreibichProceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118April 2005Networking[PDF]

Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network TrafficS. Kornexl, V. Paxson, H. Dreger, A. Feldmann, and R. SommerProceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005), Berkeley, California, pp. 267-272October 2005Networking[PDF]

Building Efficient Wireless Sensor Networks With Low-Level NamingJ. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. GanesanProceedings of the Symposium on Operating Systems Principles, Banff, Canada, October 2001.October 2001Networking
Building Extensible Networks with Rule-Based ForwardingL. Popa, N. Egi, S. Ratnasamy, and I. StoicaProceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 379-391October 2010Networking[PDF]

Can Heterogeneity Make Gnutella Scalable?Q. Lv, S. Ratnasamy, and S. ShenkerThe First International Workshop on Peer-to-Peer Systems (IPTPS): 94-103, 2002. 2002Networking
Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?T. Ouyang, S. Ray, M. Rabinovich, and M. AllmanProceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Can Software Routers Scale?K. Argyraki, S. Baset, B. Chun, K. Fall, G. Iannaccone, A. Knies, E. Kohler, M. Manesh, S. Nedevschi, and S. RatnasamyProceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO'08), Seattle, WashingtonAugust 2008Networking[PDF]

Carat: Collaborative Energy Bug DetectionA. J. Oliner, A. P. Iyer, E. Lagerspetz, I. Stoica, and S. TarkomaPoster and demo at the proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12), San Jose, CaliforniaApril 2012Networking
Characteristics of Internet Background RadiationR. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. PetersonProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, ItalyOctober 2004Networking[PDF]

Click Trajectories: End-to-End Analysis of the Spam Value ChainK. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. SavageProceedings of the IEEE Symposium on Security and Privacy, pp. 431-446, Oakland, CaliforniaMay 2011Networking[PDF]

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted SystemsL. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. StoicaProceedings of the USENIX Annual Technical Conference (ATC), Boston, MAJune 2012Networking[PDF]

CloudPolice: Taking Access Control out of the NetworkL. Popa, M. Yu, S. Y. Ko, S. Ratnasamy, and I. StoicaProceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 7October 2010Networking[PDF]

Comments on BufferbloatM. AllmanACM SIGCOMM Computer Communications, Vol. 3, No. 1, pp. 30-37January 2013Networking[PDF]

Comments on Measurement-based Admissions Control for Controlled-Load ServicesS. FloydTechnical ReportJuly 1996Networking
Comments on Selecting Ephemeral PortsM. AllmanACM SIGCOMM Computer Communication Review, Vol. 39, Issue 2, pp. 13-19April 2009Networking[PDF]

Comments on the Performance of Measurement-Based Admission Control AlgorithmsL. Breslau, S. Jamin, and S. ShenkerINFOCOM 2000, Tel Aviv, Israel, March 2000.March 2000Networking
Comparative Analysis of Traffic Matrix Estimation MethodsA. Medina, N. Taft, K. Salamatian, S. Bhattacharyya, and C. DiotDIMACS Workshop on Internet and WWW Measurement, Mapping and Modeling. February 13-15 2002.February 13 2002Networking
Comparison of Measurement-based Admission Control Algorithms for Controlled-Load ServiceS. Jamin, S.J. Shenker, and P.B. DanzigProceedings of the Conference on Computer Communications (IEEE Infocom), Kobe, JapanApril 1997Networking
Competitive Cyber-Insurance and Internet SecurityN. Shetty, G. Schwartz. M. Felegyhazi, and J. WalrandProceedings of the Workshop on Economics of Information Security (WEIS 2009), London, United KingdomJune 2009Networking[PDF]

Complex Queries in DHT-based Peer-to-Peer NetworksM. Harren, J.M. Hellerstein, R. Huebsch, B.T. Loo, S. Shenker, and I. StoicaThe First International Workshop on Peer-to-Peer Systems (IPTPS): 242-259, 2002. 2002Networking
Computing Security in the Developing World: A Case for Multidisciplinary ResearchY. Ben-David, S. Hasan, J. Pal, M. Vallentin, S. Panjwani, P. Gutheim, J. Chen, and E. BrewerProceedings of the Fifth ACM Workshop on Networked Systems for Developing Regions (NSDR), pp.39-44, Washington, D.C.June 2011Networking[PDF]

Computing TCP's Retransmission TimerV. Paxson and M. AllmanRequest for Comments 2988, Proposed StandardNovember 2000Networking
Computing TCP's Retransmission TimerV. Paxson, M. Allman, J. Chu, and M. SargentRFC 6298June 2011Networking[PDF]

Congestion Control PrinciplesS. FloydRequest for Comments 2914, Best Current Practice, September 2000.September 2000Networking
Congestion Control Without a Startup PhaseD. Liu, M. Allman, S. Jin, and L. WangProceedings of the Fifth International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet 2007), Los Angeles, CaliforniaFebruary 2007Networking[PDF]

Connections with Multiple Congested Gateways in Packet-Switched Networks Part 1: One-way TrafficS. FloydComputer Communication Review, Vol. 21, No. 5, pp. 30-47October 1991Networking[PDF]

Content‐based Privacy for Consumer‐Produced MultimediaA. Janin, G. Friedland, and R. SommerICSI Technical Report TR-12-012October 2012Networking[PDF]

Controlling High Bandwidth Aggregates in the NetworkR. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. ShenkerComputer Communication Review 32(3), July 2002.July 2002Networking
Controlling High-Bandwidth Flows at the Congested RouterR. Mahajan, S. Floyd, and D. WetherallICNP 2001 2001Networking
COPS: Quality of Service Vs. Any Service at AllR. Katz, G. Porter, S. Shenker, I. Stoica, and M. TsaiProceedings of the 13th International Workshop on Quality of Service 2005 (IWQoS 2005), Passau, Germany, pp. 3-15June 2005Networking
Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed NetworksI. Stoica, S. Shenker, and H. ZhangIEEE/ACM Transactions on Networking, Vol. 11, Issue 1, pp. 33-46. (A previous version appeared in the proceedings of the ACM's Special Interest Group on Data Communication (SIGCOMM'98), Vancouver, Canada, August 1998, pp. 118-130.)February 2003Networking[PDF]

Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed NetworksI. Stoica, S. Shenker, and H. ZhangACM Computer Communication Review, Vol. 28, pp. 118-130September 1998Networking
Creating a Scalable Architecture for Internet MeasurementA. Adams, J. Mahdavi, M. Mathis, and V. PaxsonProceedings of the Internet Summit (INET '98), Geneva, SwitzerlandJuly 1998Networking
Cybercasing the Joint: On the Privacy Implications of GeotaggingG. Friedland and R. SommerProceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C.August 2010Networking[PDF]

Data-Centric Storage in SensornetsS. Shenker, S. Ratnasamy, B. Karp, R. Govindan, and D. EstrinIn Workshop Record of the First Workshop on Hot Topics in Networks (HotNets-I), October 2002.October 2002Networking
Data-Centric Storage in Sensornets with GHT, a Geographic Hash TableS. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Gvoindan, L. Yin, and F. YuACM MONET 2003Networking
Data-Driven Network ConnectivityJ. Liu, S. Shenker, M. Schapira, and B. YangProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

DDoS Defense by OffenseM. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 303-314September 2006Networking[PDF]

DDoS Defense by OffenseM. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. ShenkerACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3March 2010Networking[PDF]

Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster SchedulingM. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. StoicaProceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278April 2010Networking[PDF]

DelfosnetX: A Workbench for XML-Based Information Retrieval SystemsM. J. Fernández, P. Pavón, J. Rodríguez, L. Anido, and M. LlamasProceedings of he 7th International Symposium on String Processing and Information Retrieval, A Coruna, Spain, pp. 87-95September 2000Networking

Pages