| Spamcraft: An Inside Look At Spam Campaign Orchestration | C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’09), Boston, Massachusetts | April 2009 | Networking | [PDF]
|
| Spamalytics: An Empirical Analysis of Spam Marketing Conversion | C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 3-14. Also appeared in the Communications of the ACM, Vol. 52, No. 9, pp. 99-107, September 2009 | October 2008 | Networking | [PDF]
|
| Spam Detection Using Web Page Content: A New Battleground | M. Ribeiro, P. Guerra, L. Vilela, A. Veloso, D. Guedes, W. Meira Jr., M. Chaves, K. Steding-Jessen, and C. Hoepers | Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011), Perth, Australia. | September 2011 | Networking | [PDF]
|
| Software-Defined Networking: History, Hype, and Hope | S. Shenker | Proceedings of the Conference on Large-Scale Distributed Systems and Middleware (LADIS 2012), Madeira, Portugal. Also in the proceedings of the Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2012), Ouro Preto, Brazil, April 2012. | July 2012 | Networking | |
| Software-Defined Internet Architecture | B. Raghavan, T. Koponen, M. Casado, A. Ghodsi, S. Ratnasamy, and S. Shenker | Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets-XII), Seattle, Washington | October 2012 | Networking | [PDF]
|
| SmartSeer: Using a DHT to Process Continuous Queries over Peer-to-Peer Networks | S. Banerjee, S. Basu, J. Kannan, S. J. Lee, P. Sharma, S. Shenker, and B. Yang | Proceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), Barcelona, Spain, pp. 1-12 | April 2006 | Networking | [PDF]
|
| Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems | S. Nedevschi, J. Chandrashenkar, B. Nordman, S. Ratnasamy, and N. Taft | Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), Boston, Massachusetts, pp. 381-394 | April 2009 | Networking | [PDF]
|
| Simulation-based Comparisons of Tahoe, Reno, and SACK TCP | K. Fall and S. Floyd | Computer Communication Review, Vol. 26, No. 3, pp. 5-21 | July 1996 | Networking | [PDF]
|
| Simulation is Crucial | S. Floyd | Sidebar, IEEE Spectrum, January 2001. | January 2001 | Networking | |
| Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention | J. Gonzalez, V. Paxson, and N. Weaver | Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008), Alexandria, Virginia, pp. 139-149 | October 2007 | Networking | [PDF]
|
| Show Me the Money: Characterizing Spam-Advertised Revenue | C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. Savage | Proceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, California | August 2011 | Networking | [PDF]
|
| Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy | G. Friedland, G. Maier, R. Sommer, and N. Weaver | Proceedings of the New Security Paradigms Workshop (NSPW), Marin County, California | September 2011 | Networking | [PDF]
|
| Shark: Fast Data Analysis Using Coarse-grained Distributed Memory | C. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. Stoica | Demo, ACM SIGMOD/PODS Conference, Scottsdale, Arizona | May 2012 | Networking | [PDF]
|
| Sharing the Cost of Multicast Transmissions | J. Feigenbaum, C. Papadimitriou, and S. Shenker | Journal of Computer and System Sciences, Vol. 63, Issue 1, pp. 21-41, 2001 | August 2001 | Networking | [PDF]
|
| Sharing the Cost of Multicast Transmissions | J. Feigenbaum, C. Papadimitriou, and S. Shenker | Thirty-Second Annual ACM Symposium on Theory of Computing (STOC00), May 2000. | May 2000 | Networking | |
| Sharing the Cost of Multicast Transmissions | J. Feigenbaum, C. Papadimitriou, and S. Shenker | Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC 2000), Portland, Oregon, pp. 218-227 | May 2000 | Networking | |
| Sharing the "cost" of multicast trees: An axiomatic analysis | S. Herzog, S. Shenker, and D. Estrin | IEEE/ACM Transactions on Networking, Vol. 5, pp. 847-860 | December 1997 | Networking | |
| Session Directories and Scalable Internet Multicast Address Allocation | M. Handley | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM 98), September 1998, Vancouver, Canada | September 1998 | Networking | |
| Session Announcement Protocol | M. Handley, C. Perkins, E. Whelan | Request for Comments 2974, Experimental, October 2000. | October 2002 | Networking | |
| Service Portability: Why http Redirect is the Model for the Future | S. Singh, S. Shenker, and G. Varghese | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 49-54 | November 2006 | Networking | [PDF]
|
| Semi-Automated Discovery of Application Session Structure | J. Kannan, J. Jung, V. Paxson, and C. Koksal | Proceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 119-132 | October 2006 | Networking | [PDF]
|
| Semantic-Free Referencing in Linked Distributed Systems | H. Balakrishnan, S. Shenker, and M. Walfish | Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, California | February 2003 | Networking | [PDF]
|
| Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCP | A. Akella, R.M. Karp, C. Papadimitriou, S. Seshan, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002), Pittsburgh, Pennsylvania | August 2002 | Networking | [PDF]
|
| Self-Verifying CSFQ | I. Stoica, H. Zhang, and S. Shenker | INFOCOM, 2002. | 2002 | Networking | |
| Self-similarity and Heavy Tails: Structural Modeling of Network Traffic | W. Willinger, V. Paxson, and M.S. Taqqu | A Practical Guide to Heavy Tails: Statistical Techniques and Applications, Adler, R., Feldman, R., and Taqqu, M.S., editors, Birkhauser | 1998 | Networking | |
| Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities | G. Schryen | Proceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), San Francisco, California, paper 387 | August 2009 | Networking | [PDF]
|
| Security Extensions to MMARP Through Cryptographically Generated Addresses | F.J. Galera, P.M. Ruiz, and A.F. Gomez Skarmeta | Lecture Notes on Informatics, Vol. P-68, pp. 339–343 | September 2005 | Networking | |
| Securing Web Content | J. Koskela, N. Weaver, A. Gurtov, and M. Allman | Proceedings of the ACM CoNext Workshop on Re-Architecting the Internet (ReArch 2009), Rome, Italy, pp. 7-12 | December 2009 | Networking | [PDF]
|
| Securing Mediated Trace Access Using Black-Box Permutation Analysis | P. Mittal, V. Paxson, R. Sommer, and M. Winterrowd | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| Secure Mobile Agent Systems Using Java - Where Are We Heading? | W. Binder and V. Roth | Proceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS), Madrid, Spain, March 2002. | March 2002 | Networking | |
| Search Strategies in Inter-Domain Traffic Engineering | K. Chandrayana, R.M. Karp, M. Roughan, S. Sen, and Y. Zhang | preprint 2004 | 2004 | Networking | |
| Search and Replication in Unstructured Peer-to-Peer Networks | Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker | Proceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002), Marina Del Rey, California, pp. 258-259 | June 2002 | Networking | |
| Search and Replication in Unstructured Peer-to-Peer Networks | Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker | Proceedings of the 16th International Conference on Supercomputing (ICS-02), New York, New York, pp. 84-95 | June 2002 | Networking | [PDF]
|
| Seamless Multimedia Communications in Heterogeneous Mobile Access Networks | P. M. Ruiz, J.A. Botia, A. Gomez-Skarmeta | Proceedings of the TERENA Networking Conference (TNC 2004), Rhodes, Greece | June 2004 | Networking | [PDF]
|
| Scaling Phenomena in the Internet: Critically Examining Criticality | W. Willinger, R. Govindan, S. Jamin, V. Paxson, and S. Shenker | Proceedings of National Academy of Science USA, Vol. 99, Suppl. 1, 2573-2580, February 19, 2002. | February 19 2002 | Networking | |
| Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling Law | G. Phillips, S. Shenker, and H. Tangmunarunkit | SIGCOMM, September 1999. | September 1999 | Networking | |
| Scalable Timers for Soft State Protocols | P. Sharma, D. Estrin, S. Floyd, and V. Jacobson | Proceedings of the Conference on Computer Communications, 16th Annual Joint Conference of the IEEE Computer and Communications Societies, Driving the Information Revolution (IEEE INFOCOM 1997), Kobe, Japan, pp. 222-229 | April 1997 | Networking | |
| Scalable Session Messages in SRM | P. Sharma, D. Estrin, S. Floyd, and L. Zhang | Technical report | February 1998 | Networking | |
| Satellite Network Performance Measurements Using Simulated Multi-User Internet Traffic | H. Kruse, M. Allman, J. Griner, S. Ostermann, and E. Helvey | Proceedings of the Seventh International Conference on Telecommunication Systems. March 1999. | March 1999 | Networking | |
| SANE: A Protection Architecture for Enterprise Networks | M. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. Shenker | Proceedings of the 15th USENIX Security Symposium (Security '05), Vancouver, Canada, pp. 137–151 | August 2006 | Networking | [PDF]
|
| RR-TCP: A Reordering-Robust TCP with DSACK | M. Zhang, B. Karp, S. Floyd, and L. Peterson | ICSI Technical Report TR-02-006 | July 2002 | Networking | [PDF]
|
| Routing as a Service | K. Lakshminarayanan, I. Stoica, and S. Shenker | Proceedings of the Service Architecture for Heterogeneous Access, Resources, and Applications Retreat (SAHARA 2004), Tahoe City, California | January 2004 | Networking | [PDF]
|
| Routing Algorithms in DHTs: Some Open Questions | I. Stoica, D. Adkins, S. Ratnasamy, S. Surana, S. Shenker, and S. Zhuang | Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS) 2002, March 2002. | March 2002 | Networking | |
| Routing Algorithms for DHTs: Some Open Questions | S. Ratnasamy, I. Stoica, and S. Shenker | The First International Workshop on Peer-to-Peer Systems (IPTPS): 45-52, 2002. | 2002 | Networking | |
| Route Flap Dampening Exacerbates Internet Routing Convergence | Z.M. Mao, R. Govindan, G. Varghese, and R. Katz | Proceedings of the ACM SIGCOMM 2002. | 2002 | Networking | |
| ROFL: Routing on Flat Labels | M. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 363-374 | September 2006 | Networking | [PDF]
|
| Robust TCP Reassembly in the Presence of Adversaries | S. Dharmapurikar and V. Paxson | Proceedings of the 14th Conference on USENIX Security Symposium (Security '05), Baltimore, Maryland, pp. 65-80 | August 2005 | Networking | [PDF]
|
| Ripcord: A Modular Platform for Data Center Networking | B. Heller, D. Erickson, N. McKeown, R. Griffith, I. Ganichev, S. Whyte, K. Zarifis, D. Moon, S. Shenker, and S. Stuart | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2010), New Delhi, India, pp. 457-458 | August 2010 | Networking | [PDF]
|
| RFC 5827: Early Retransmit for TCP and SCTP | M. Allman, K. Avrachenkov, U. Ayesta, J. Blanton, and P. Hurtig | Request for Comments 5827, Experimental | April 2010 | Networking | [PDF]
|
| RFC 5690: Adding Acknowledgement Congestion Control to TCP | S. Floyd, A. Arcia, D. Ros, and J. Iyengar | Request for Comments 5690, Informational | February 2010 | Networking | [PDF]
|