Publication Search Results

TitleAuthorBibliographicsort ascendingDateGroupLinks
IANA Allocation Guidelines For Values In the Internet Protocol and Related HeadersS. Bradner and V. PaxsonRequest for Comments 2780, Best Current Practice, March 2000.March 2000Networking
Multicast-Scope Zone Announcement Protocol (MZAP)M. Handley, D. Thaler, and R. KermodeRequest for Comments 2776, Proposed Standard, February 2000.February 2000Networking
IPPM Metrics for Measuring ConnectivityJ. Mahdavi and V. PaxsonRequest for Comments 2678, Proposed Standard, September 1999.September 1999Networking
The NewReno Modification to TCP's Fast Recovery AlgorithmS. Floyd and T. HendersonRequest for Comments 2582, Experimental, April 1999.April 1999Networking
TCP Congestion ControlM. Allman, V. Paxson, and W.R. StevensRequest for Comments 2581, Proposed Standard, April 1999.April 1999Networking
FTP Security ConsiderationsM. Allman and S. OstermannRequest for Comments 2577, May 1999.May 1999Networking
Known TCP Implementation ProblemsV. Paxson, M. Allman, S. Dawson, W. Fenner, J. Griner, I. Heavens, K. Lahey, J. Semke, and B. VolzRequest for Comments 2525, Informational, March 1999.March 1999Networking
A Proposal to Add Explicit Congestion Notification (ECN) to IPK.K. Ramakrishnan and S. FloydRequest for Comments 2481, Experimental, January 1999. Obsoleted by RFC 3168, Proposed Standard.January 1999Networking
General characterization parameters for integrated service network elements.S. Shenker and J. WroclawskiRequest for Comments (Proposed Standard) 2215, Internet Engineering Task ForceSeptember 1997Networking
Specification of guaranteed quality of serviceS. Shenker, C. Partridge, and R. GuerinRequest for Comments (Proposed Standard) 2212, Internet Engineering Task ForceSeptember 1997Networking
Recommendations on queue management and congestion avoidance in the internetB. Braden, D. Clark, J. Crowcroft, B. Davie, S. Deering, D. Estrin, S. Floyd, V. Jacobson, G. Minshall, C. Partridge, L. Peterson, K. Ramakrishnan, S. Shenker, J. Wroclawski, and L. ZhangRequest for Comments (Informational) 2309, Internet Engineering Task ForceApril 1998Networking
Network element service specification templateS. Shenker and J. WroclawskiRequest for Comments (Informational) 2216, Internet Engineering Task ForceSeptember 1997Networking
Strawman Specification for TCP Friendly (Reliable) Multicast Congestion Control (TFMCC)M. Handley and S. FloydReliable Multicast Research GroupDecember 1998Networking
Universal DNA Tag Systems: A Combinatorial Design SchemeA. Ben-Dor, R. M. Karp, B. Schwikowski, and Z. YakhiniRECOMB 2000Networking
Secure Mobile Agent Systems Using Java - Where Are We Heading?W. Binder and V. RothProceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS), Madrid, Spain, March 2002.March 2002Networking
Jellyfish: Networking Data Centers RandomlyA. Singla, C.-Y. Hong, L. Popa, and P. Brighten GodfreyProceedings the Third USENIX Workshop on Hot Topics in Cloud Computing (USENIX HotCloud ‘11), Portland, OregonJune 2011Networking[PDF]

What Ought a Program Committee to Do?M. AllmanProceedings of USENIX Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems (WOWCS), San Francisco, CaliforniaApril 2008Networking[PDF]

The Strengths of Weaker Identities: Opportunistic PersonasM. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. WeaverProceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, MassachusettsAugust 2007Networking[PDF]

Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML)M. Handley, C. Kreibich, and V. PaxsonProceedings of USENIX Security Symposium 2001. 2001Networking
Stress Testing Cluster BroN. Weaver and R. SommerProceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007), Boston, MassachusettsAugust 2007Networking[PDF]

Application-Level Multicast Using Content-Addressable NetworksS. Ratnasamy, M. Handley, R.M. Karp, and S. ShenkerProceedings of Third International Workshop on Networked Group Communication, London, Nov 2001.November 2001Networking
A Worst-Case WormN. Weaver and V. PaxsonProceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, MinnesotaMay 2004Networking[PDF]

Applying Fuzzy Logic to Model User Preferences on Multimedia SessionsJ.A. Botia, M. Valdes, P. M. Ruiz, and A.F. Gomez Skarmeta.Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy, Jaen, Spain, pp. 467-470September 2005Networking
Virtualizing the Network Forwarding PlaneM. Casado, T. Koponen, R. Ramanathan, and S. ShenkerProceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO 2010), Philadelphia, PennsylvaniaDecember 2010Networking[PDF]

Hot Data Centers vs. Cool PeersS. Nedevschi, S. Ratnasamy, and J. PadhyeProceedings of the Workshop on Power Aware Computing and Systems (HotPower '09), Big Sky, Montana, p. 8October 2009Networking[PDF]

NS-3 Project GoalsT. Henderson, S. Roy, S. Floyd, and G. RileyProceedings of the Workshop on NS-2 (WNS2 2006), Pisa, Italy, article 13October 2006Networking[PDF]

Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-ReduceJ. Hendrik Boese, A. Andrzejak, and M. HoegqvistProceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010), Raleigh, North Carolina, Article No. 3April 2010Networking
Logically Centralized? State Distribution Tradeoffs in Software Defined NetworksD. Levin, A. Wundsam, B. Heller, N. Handigol, and A. FeldmannProceedings of the Workshop on Hot Topics in Software Defined Networks (HotSDN '12) at ACM SIGCOMM 2012, Helsinki, FinlandAugust 2012Networking[PDF]

Competitive Cyber-Insurance and Internet SecurityN. Shetty, G. Schwartz. M. Felegyhazi, and J. WalrandProceedings of the Workshop on Economics of Information Security (WEIS 2009), London, United KingdomJune 2009Networking[PDF]

Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in EstoniaG. SchryenProceedings of the Workshop on e-Business (WEB 2008), Paris, France, pp. 37-50December 2008Networking[PDF]

Towards Engineering a Location-Aware Wireless Multi-Agent SystemI. Nieto-Cavajal, P. M. Ruiz, J.A. Botia, and A.F. Gomez-SkarmetaProceedings of the Workshop on Applications of Software Agents in Engineering at the 16th European Conference on Artificial Intelligence (ECAI 2004), Valencia, SpainAugust 2004Networking
Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al EncaminarC.M. Yago, P. M. Ruiz, and A.F. Gomez SkarmetaProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Aproximacion de Arboles Multicast Optimos en Redes Ad Hoc InalambricasP.M. Ruiz and A.F. Gomez SkarmetaProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAMA.F. Gomez Skarmeta and P.M. RuizProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Hedera: Dynamic Flow Scheduling for Data Center NetworksM. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. VahdatProceedings of the USENIX/ACM SIGCOMM Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CaliforniaApril 2010Networking[PDF]

On Controller Performance in Software-Defined NetworksA. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and R. SherwoodProceedings of the USENIX NSDI Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), San Jose, CaliforniaApril 2012Networking[PDF]

Brooery: A Graphical Environment for Analysis of Security-Relevant Network ActivityC. KreibichProceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118April 2005Networking[PDF]

Diverse Replication for Single-Machine Byzantine-Fault ToleranceB.-C. Chun, P. Maniatis, and S. ShenkerProceedings of the USENIX Annual Technical Conference, Boston, Massachusetts, pp. 287-292June 2008Networking[PDF]

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted SystemsL. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. StoicaProceedings of the USENIX Annual Technical Conference (ATC), Boston, MAJune 2012Networking[PDF]

Gatekeeper: Supporting Bandwidth Guarantees for Multi-Tenant Datacenter NetworksH. Rodrigues, J.R. Santos, Y. Turner, P. Soares, and D. GuedesProceedings of the Third Workshop on I/O Virtualization (WIOV '11), Portland, OregonJune 2011Networking[PDF]

Providing Packet ObituariesK. Argyraki, P. Maniatis, D. Cheriton, and Scott ShenkerProceedings of the Third Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

Towards an Economic Analysis of Trusted Systems (Position Paper)D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. SmithProceedings of the Third Workshop on Economics and Information Security, Minneapolis, MinnesotaMay 2004Networking[PDF]

Insights from the Inside: A View of Botnet Management from InfiltrationC. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. SongProceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, CaliforniaApril 2010Networking[PDF]

On the Potential of Proactive Domain BlacklistingM. Felegyhazi, C. Kreibich, and V. PaxsonProceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, CaliforniaApril 2010Networking[PDF]

Principles for Developing Comprehensive Network VisibilityM. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. WeaverProceedings of the Third USENIX Workshop on Hot Topics in Security (HotSec ’08), San Jose, CaliforniaJuly 2008Networking[PDF]

The Datacenter Needs an Operating SystemM. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. StoicaProceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, OregonJune 2011Networking[PDF]

Practical Data-Centric StorageC. T. Ee, S. Ratnasamy, and S. ShenkerProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 325-338May 2006Networking[PDF]

Distributed Quota Enforcement for Spam ControlM. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 281-296May 2006Networking[PDF]

OCALA: An Architecture for Supporting Legacy Applications Over OverlaysD. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I. Stoica, and K. WehrleProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 267-280May 2006Networking[PDF]

Adaptive Web Caching: Towards a New Global Caching ArchitectureL. Zhang, S. Michel, K. Nguyen, A. Rosenstein, S. Floyd, and V. JacobsonProceedings of the Third International WWW Caching WorkshopJune 1998Networking

Pages