| IANA Allocation Guidelines For Values In the Internet Protocol and Related Headers | S. Bradner and V. Paxson | Request for Comments 2780, Best Current Practice, March 2000. | March 2000 | Networking | |
| Multicast-Scope Zone Announcement Protocol (MZAP) | M. Handley, D. Thaler, and R. Kermode | Request for Comments 2776, Proposed Standard, February 2000. | February 2000 | Networking | |
| IPPM Metrics for Measuring Connectivity | J. Mahdavi and V. Paxson | Request for Comments 2678, Proposed Standard, September 1999. | September 1999 | Networking | |
| The NewReno Modification to TCP's Fast Recovery Algorithm | S. Floyd and T. Henderson | Request for Comments 2582, Experimental, April 1999. | April 1999 | Networking | |
| TCP Congestion Control | M. Allman, V. Paxson, and W.R. Stevens | Request for Comments 2581, Proposed Standard, April 1999. | April 1999 | Networking | |
| FTP Security Considerations | M. Allman and S. Ostermann | Request for Comments 2577, May 1999. | May 1999 | Networking | |
| Known TCP Implementation Problems | V. Paxson, M. Allman, S. Dawson, W. Fenner, J. Griner, I. Heavens, K. Lahey, J. Semke, and B. Volz | Request for Comments 2525, Informational, March 1999. | March 1999 | Networking | |
| A Proposal to Add Explicit Congestion Notification (ECN) to IP | K.K. Ramakrishnan and S. Floyd | Request for Comments 2481, Experimental, January 1999. Obsoleted by RFC 3168, Proposed Standard. | January 1999 | Networking | |
| General characterization parameters for integrated service network elements. | S. Shenker and J. Wroclawski | Request for Comments (Proposed Standard) 2215, Internet Engineering Task Force | September 1997 | Networking | |
| Specification of guaranteed quality of service | S. Shenker, C. Partridge, and R. Guerin | Request for Comments (Proposed Standard) 2212, Internet Engineering Task Force | September 1997 | Networking | |
| Recommendations on queue management and congestion avoidance in the internet | B. Braden, D. Clark, J. Crowcroft, B. Davie, S. Deering, D. Estrin, S. Floyd, V. Jacobson, G. Minshall, C. Partridge, L. Peterson, K. Ramakrishnan, S. Shenker, J. Wroclawski, and L. Zhang | Request for Comments (Informational) 2309, Internet Engineering Task Force | April 1998 | Networking | |
| Network element service specification template | S. Shenker and J. Wroclawski | Request for Comments (Informational) 2216, Internet Engineering Task Force | September 1997 | Networking | |
| Strawman Specification for TCP Friendly (Reliable) Multicast Congestion Control (TFMCC) | M. Handley and S. Floyd | Reliable Multicast Research Group | December 1998 | Networking | |
| Universal DNA Tag Systems: A Combinatorial Design Scheme | A. Ben-Dor, R. M. Karp, B. Schwikowski, and Z. Yakhini | RECOMB | 2000 | Networking | |
| Secure Mobile Agent Systems Using Java - Where Are We Heading? | W. Binder and V. Roth | Proceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS), Madrid, Spain, March 2002. | March 2002 | Networking | |
| Jellyfish: Networking Data Centers Randomly | A. Singla, C.-Y. Hong, L. Popa, and P. Brighten Godfrey | Proceedings the Third USENIX Workshop on Hot Topics in Cloud Computing (USENIX HotCloud ‘11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| What Ought a Program Committee to Do? | M. Allman | Proceedings of USENIX Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems (WOWCS), San Francisco, California | April 2008 | Networking | [PDF]
|
| The Strengths of Weaker Identities: Opportunistic Personas | M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver | Proceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, Massachusetts | August 2007 | Networking | [PDF]
|
| Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML) | M. Handley, C. Kreibich, and V. Paxson | Proceedings of USENIX Security Symposium 2001. | 2001 | Networking | |
| Stress Testing Cluster Bro | N. Weaver and R. Sommer | Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007), Boston, Massachusetts | August 2007 | Networking | [PDF]
|
| Application-Level Multicast Using Content-Addressable Networks | S. Ratnasamy, M. Handley, R.M. Karp, and S. Shenker | Proceedings of Third International Workshop on Networked Group Communication, London, Nov 2001. | November 2001 | Networking | |
| A Worst-Case Worm | N. Weaver and V. Paxson | Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Applying Fuzzy Logic to Model User Preferences on Multimedia Sessions | J.A. Botia, M. Valdes, P. M. Ruiz, and A.F. Gomez Skarmeta. | Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy, Jaen, Spain, pp. 467-470 | September 2005 | Networking | |
| Virtualizing the Network Forwarding Plane | M. Casado, T. Koponen, R. Ramanathan, and S. Shenker | Proceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO 2010), Philadelphia, Pennsylvania | December 2010 | Networking | [PDF]
|
| Hot Data Centers vs. Cool Peers | S. Nedevschi, S. Ratnasamy, and J. Padhye | Proceedings of the Workshop on Power Aware Computing and Systems (HotPower '09), Big Sky, Montana, p. 8 | October 2009 | Networking | [PDF]
|
| NS-3 Project Goals | T. Henderson, S. Roy, S. Floyd, and G. Riley | Proceedings of the Workshop on NS-2 (WNS2 2006), Pisa, Italy, article 13 | October 2006 | Networking | [PDF]
|
| Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-Reduce | J. Hendrik Boese, A. Andrzejak, and M. Hoegqvist | Proceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010), Raleigh, North Carolina, Article No. 3 | April 2010 | Networking | |
| Logically Centralized? State Distribution Tradeoffs in Software Defined Networks | D. Levin, A. Wundsam, B. Heller, N. Handigol, and A. Feldmann | Proceedings of the Workshop on Hot Topics in Software Defined Networks (HotSDN '12) at ACM SIGCOMM 2012, Helsinki, Finland | August 2012 | Networking | [PDF]
|
| Competitive Cyber-Insurance and Internet Security | N. Shetty, G. Schwartz. M. Felegyhazi, and J. Walrand | Proceedings of the Workshop on Economics of Information Security (WEIS 2009), London, United Kingdom | June 2009 | Networking | [PDF]
|
| Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia | G. Schryen | Proceedings of the Workshop on e-Business (WEB 2008), Paris, France, pp. 37-50 | December 2008 | Networking | [PDF]
|
| Towards Engineering a Location-Aware Wireless Multi-Agent System | I. Nieto-Cavajal, P. M. Ruiz, J.A. Botia, and A.F. Gomez-Skarmeta | Proceedings of the Workshop on Applications of Software Agents in Engineering at the 16th European Conference on Artificial Intelligence (ECAI 2004), Valencia, Spain | August 2004 | Networking | |
| Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al Encaminar | C.M. Yago, P. M. Ruiz, and A.F. Gomez Skarmeta | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Aproximacion de Arboles Multicast Optimos en Redes Ad Hoc Inalambricas | P.M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAM | A.F. Gomez Skarmeta and P.M. Ruiz | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Hedera: Dynamic Flow Scheduling for Data Center Networks | M. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. Vahdat | Proceedings of the USENIX/ACM SIGCOMM Symposium on Networked Systems Design and Implementation (NSDI), San Jose, California | April 2010 | Networking | [PDF]
|
| On Controller Performance in Software-Defined Networks | A. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and R. Sherwood | Proceedings of the USENIX NSDI Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), San Jose, California | April 2012 | Networking | [PDF]
|
| Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity | C. Kreibich | Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118 | April 2005 | Networking | [PDF]
|
| Diverse Replication for Single-Machine Byzantine-Fault Tolerance | B.-C. Chun, P. Maniatis, and S. Shenker | Proceedings of the USENIX Annual Technical Conference, Boston, Massachusetts, pp. 287-292 | June 2008 | Networking | [PDF]
|
| Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems | L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica | Proceedings of the USENIX Annual Technical Conference (ATC), Boston, MA | June 2012 | Networking | [PDF]
|
| Gatekeeper: Supporting Bandwidth Guarantees for Multi-Tenant Datacenter Networks | H. Rodrigues, J.R. Santos, Y. Turner, P. Soares, and D. Guedes | Proceedings of the Third Workshop on I/O Virtualization (WIOV '11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| Providing Packet Obituaries | K. Argyraki, P. Maniatis, D. Cheriton, and Scott Shenker | Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Towards an Economic Analysis of Trusted Systems (Position Paper) | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Insights from the Inside: A View of Botnet Management from Infiltration | C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song | Proceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, California | April 2010 | Networking | [PDF]
|
| On the Potential of Proactive Domain Blacklisting | M. Felegyhazi, C. Kreibich, and V. Paxson | Proceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, California | April 2010 | Networking | [PDF]
|
| Principles for Developing Comprehensive Network Visibility | M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver | Proceedings of the Third USENIX Workshop on Hot Topics in Security (HotSec ’08), San Jose, California | July 2008 | Networking | [PDF]
|
| The Datacenter Needs an Operating System | M. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. Stoica | Proceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| Practical Data-Centric Storage | C. T. Ee, S. Ratnasamy, and S. Shenker | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 325-338 | May 2006 | Networking | [PDF]
|
| Distributed Quota Enforcement for Spam Control | M. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 281-296 | May 2006 | Networking | [PDF]
|
| OCALA: An Architecture for Supporting Legacy Applications Over Overlays | D. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I. Stoica, and K. Wehrle | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 267-280 | May 2006 | Networking | [PDF]
|
| Adaptive Web Caching: Towards a New Global Caching Architecture | L. Zhang, S. Michel, K. Nguyen, A. Rosenstein, S. Floyd, and V. Jacobson | Proceedings of the Third International WWW Caching Workshop | June 1998 | Networking | |