| Beyond Pilots: Keeping Rural Wireless Networks Alive | S. Surana, R. Patra, S. Nedevschi, M. Ramos, L. Subramanian, Y. Ben-David, and E. Brewer | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, California | April 2008 | Networking | [PDF]
|
| binpac: A yacc for Writing Application Protocol Parsers | R. Pang, V. Paxson, R. Sommer, and L. Peterson | Proceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 289-300 | October 2006 | Networking | [PDF]
|
| Botnet Judo: Fighting Spam with Itself | A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. Savage | Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, California | February 2010 | Networking | [PDF]
|
| Brief Announcement: Prefix Hash Tree | S. Ramabhadran, S. Ratnasamy, J.M. Hellerstein, and S. Shenker | Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, p. 367 | July 2004 | Networking | [PDF]
|
| BRITE: A Flexible Generator of Internet Topologies | A. Medina and I. Matta | BU-CS-TR-2000-005. January 21, 2000. | January 21 2000 | Networking | |
| BRITE: An Approach to Universal Topology Generation | A. Medina, A. Lakhina, I. Matta, and J. Byers | Proceedings of MASCOTS 2001. IEEE Computer Society, August 2001. | August 2001 | Networking | |
| BRITE: Universal Topology Generation From a User's Perspective | A. Medina, A. Lakhina, I. Matta, and J. Byers | BU-CS-TR-2001-003. April 05, 2001. | April 05 2001 | Networking | |
| Bro: A System for Detecting Network Intruders in Real-Time | V. Paxson | Computer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999. | December 14 1999 | Networking | |
| Bro: A System for Detecting Network Intruders in Real-Time | V. Paxson | Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas | January 1998 | Networking | |
| Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity | C. Kreibich | Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118 | April 2005 | Networking | [PDF]
|
| Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic | S. Kornexl, V. Paxson, H. Dreger, A. Feldmann, and R. Sommer | Proceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005), Berkeley, California, pp. 267-272 | October 2005 | Networking | [PDF]
|
| Building Efficient Wireless Sensor Networks With Low-Level Naming | J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. Ganesan | Proceedings of the Symposium on Operating Systems Principles, Banff, Canada, October 2001. | October 2001 | Networking | |
| Building Extensible Networks with Rule-Based Forwarding | L. Popa, N. Egi, S. Ratnasamy, and I. Stoica | Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 379-391 | October 2010 | Networking | [PDF]
|
| Can Heterogeneity Make Gnutella Scalable? | Q. Lv, S. Ratnasamy, and S. Shenker | The First International Workshop on Peer-to-Peer Systems (IPTPS): 94-103, 2002. | 2002 | Networking | |
| Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise? | T. Ouyang, S. Ray, M. Rabinovich, and M. Allman | Proceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, Georgia | March 2011 | Networking | [PDF]
|
| Can Software Routers Scale? | K. Argyraki, S. Baset, B. Chun, K. Fall, G. Iannaccone, A. Knies, E. Kohler, M. Manesh, S. Nedevschi, and S. Ratnasamy | Proceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO'08), Seattle, Washington | August 2008 | Networking | [PDF]
|
| Carat: Collaborative Energy Bug Detection | A. J. Oliner, A. P. Iyer, E. Lagerspetz, I. Stoica, and S. Tarkoma | Poster and demo at the proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12), San Jose, California | April 2012 | Networking | |
| Characteristics of Internet Background Radiation | R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy | October 2004 | Networking | [PDF]
|
| Click Trajectories: End-to-End Analysis of the Spam Value Chain | K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage | Proceedings of the IEEE Symposium on Security and Privacy, pp. 431-446, Oakland, California | May 2011 | Networking | [PDF]
|
| Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems | L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica | Proceedings of the USENIX Annual Technical Conference (ATC), Boston, MA | June 2012 | Networking | [PDF]
|
| CloudPolice: Taking Access Control out of the Network | L. Popa, M. Yu, S. Y. Ko, S. Ratnasamy, and I. Stoica | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 7 | October 2010 | Networking | [PDF]
|
| Comments on Bufferbloat | M. Allman | ACM SIGCOMM Computer Communications, Vol. 3, No. 1, pp. 30-37 | January 2013 | Networking | [PDF]
|
| Comments on Measurement-based Admissions Control for Controlled-Load Services | S. Floyd | Technical Report | July 1996 | Networking | |
| Comments on Selecting Ephemeral Ports | M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 39, Issue 2, pp. 13-19 | April 2009 | Networking | [PDF]
|
| Comments on the Performance of Measurement-Based Admission Control Algorithms | L. Breslau, S. Jamin, and S. Shenker | INFOCOM 2000, Tel Aviv, Israel, March 2000. | March 2000 | Networking | |
| Comparative Analysis of Traffic Matrix Estimation Methods | A. Medina, N. Taft, K. Salamatian, S. Bhattacharyya, and C. Diot | DIMACS Workshop on Internet and WWW Measurement, Mapping and Modeling. February 13-15 2002. | February 13 2002 | Networking | |
| Comparison of Measurement-based Admission Control Algorithms for Controlled-Load Service | S. Jamin, S.J. Shenker, and P.B. Danzig | Proceedings of the Conference on Computer Communications (IEEE Infocom), Kobe, Japan | April 1997 | Networking | |
| Competitive Cyber-Insurance and Internet Security | N. Shetty, G. Schwartz. M. Felegyhazi, and J. Walrand | Proceedings of the Workshop on Economics of Information Security (WEIS 2009), London, United Kingdom | June 2009 | Networking | [PDF]
|
| Complex Queries in DHT-based Peer-to-Peer Networks | M. Harren, J.M. Hellerstein, R. Huebsch, B.T. Loo, S. Shenker, and I. Stoica | The First International Workshop on Peer-to-Peer Systems (IPTPS): 242-259, 2002. | 2002 | Networking | |
| Computing Security in the Developing World: A Case for Multidisciplinary Research | Y. Ben-David, S. Hasan, J. Pal, M. Vallentin, S. Panjwani, P. Gutheim, J. Chen, and E. Brewer | Proceedings of the Fifth ACM Workshop on Networked Systems for Developing Regions (NSDR), pp.39-44, Washington, D.C. | June 2011 | Networking | [PDF]
|
| Computing TCP's Retransmission Timer | V. Paxson and M. Allman | Request for Comments 2988, Proposed Standard | November 2000 | Networking | |
| Computing TCP's Retransmission Timer | V. Paxson, M. Allman, J. Chu, and M. Sargent | RFC 6298 | June 2011 | Networking | [PDF]
|
| Congestion Control Principles | S. Floyd | Request for Comments 2914, Best Current Practice, September 2000. | September 2000 | Networking | |
| Congestion Control Without a Startup Phase | D. Liu, M. Allman, S. Jin, and L. Wang | Proceedings of the Fifth International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet 2007), Los Angeles, California | February 2007 | Networking | [PDF]
|
| Connections with Multiple Congested Gateways in Packet-Switched Networks Part 1: One-way Traffic | S. Floyd | Computer Communication Review, Vol. 21, No. 5, pp. 30-47 | October 1991 | Networking | [PDF]
|
| Content‐based Privacy for Consumer‐Produced Multimedia | A. Janin, G. Friedland, and R. Sommer | ICSI Technical Report TR-12-012 | October 2012 | Networking | [PDF]
|
| Controlling High Bandwidth Aggregates in the Network | R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker | Computer Communication Review 32(3), July 2002. | July 2002 | Networking | |
| Controlling High-Bandwidth Flows at the Congested Router | R. Mahajan, S. Floyd, and D. Wetherall | ICNP 2001 | 2001 | Networking | |
| COPS: Quality of Service Vs. Any Service at All | R. Katz, G. Porter, S. Shenker, I. Stoica, and M. Tsai | Proceedings of the 13th International Workshop on Quality of Service 2005 (IWQoS 2005), Passau, Germany, pp. 3-15 | June 2005 | Networking | |
| Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed Networks | I. Stoica, S. Shenker, and H. Zhang | IEEE/ACM Transactions on Networking, Vol. 11, Issue 1, pp. 33-46. (A previous version appeared in the proceedings of the ACM's Special Interest Group on Data Communication (SIGCOMM'98), Vancouver, Canada, August 1998, pp. 118-130.) | February 2003 | Networking | [PDF]
|
| Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks | I. Stoica, S. Shenker, and H. Zhang | ACM Computer Communication Review, Vol. 28, pp. 118-130 | September 1998 | Networking | |
| Creating a Scalable Architecture for Internet Measurement | A. Adams, J. Mahdavi, M. Mathis, and V. Paxson | Proceedings of the Internet Summit (INET '98), Geneva, Switzerland | July 1998 | Networking | |
| Cybercasing the Joint: On the Privacy Implications of Geotagging | G. Friedland and R. Sommer | Proceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), Washington, D.C. | August 2010 | Networking | [PDF]
|
| Data-Centric Storage in Sensornets | S. Shenker, S. Ratnasamy, B. Karp, R. Govindan, and D. Estrin | In Workshop Record of the First Workshop on Hot Topics in Networks (HotNets-I), October 2002. | October 2002 | Networking | |
| Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table | S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Gvoindan, L. Yin, and F. Yu | ACM MONET | 2003 | Networking | |
| Data-Driven Network Connectivity | J. Liu, S. Shenker, M. Schapira, and B. Yang | Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, Massachusetts | November 2011 | Networking | [PDF]
|
| DDoS Defense by Offense | M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 303-314 | September 2006 | Networking | [PDF]
|
| DDoS Defense by Offense | M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker | ACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3 | March 2010 | Networking | [PDF]
|
| Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling | M. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. Stoica | Proceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278 | April 2010 | Networking | [PDF]
|
| DelfosnetX: A Workbench for XML-Based Information Retrieval Systems | M. J. Fernández, P. Pavón, J. Rodríguez, L. Anido, and M. Llamas | Proceedings of he 7th International Symposium on String Processing and Information Retrieval, A Coruna, Spain, pp. 87-95 | September 2000 | Networking | |