Publication Search Results

Titlesort ascendingAuthorBibliographicDateGroupLinks
Spamcraft: An Inside Look At Spam Campaign OrchestrationC. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’09), Boston, MassachusettsApril 2009Networking[PDF]

Spamalytics: An Empirical Analysis of Spam Marketing ConversionC. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 3-14. Also appeared in the Communications of the ACM, Vol. 52, No. 9, pp. 99-107, September 2009October 2008Networking[PDF]

Spam Detection Using Web Page Content: A New BattlegroundM. Ribeiro, P. Guerra, L. Vilela, A. Veloso, D. Guedes, W. Meira Jr., M. Chaves, K. Steding-Jessen, and C. HoepersProceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011), Perth, Australia.September 2011Networking[PDF]

Software-Defined Networking: History, Hype, and HopeS. ShenkerProceedings of the Conference on Large-Scale Distributed Systems and Middleware (LADIS 2012), Madeira, Portugal. Also in the proceedings of the Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2012), Ouro Preto, Brazil, April 2012.July 2012Networking
Software-Defined Internet ArchitectureB. Raghavan, T. Koponen, M. Casado, A. Ghodsi, S. Ratnasamy, and S. ShenkerProceedings of the ACM Workshop on Hot Topics in Networks (HotNets-XII), Seattle, WashingtonOctober 2012Networking[PDF]

SmartSeer: Using a DHT to Process Continuous Queries over Peer-to-Peer NetworksS. Banerjee, S. Basu, J. Kannan, S. J. Lee, P. Sharma, S. Shenker, and B. YangProceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), Barcelona, Spain, pp. 1-12April 2006Networking[PDF]

Skilled in the Art of Being Idle: Reducing Energy Waste in Networked SystemsS. Nedevschi, J. Chandrashenkar, B. Nordman, S. Ratnasamy, and N. TaftProceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), Boston, Massachusetts, pp. 381-394April 2009Networking[PDF]

Simulation-based Comparisons of Tahoe, Reno, and SACK TCPK. Fall and S. FloydComputer Communication Review, Vol. 26, No. 3, pp. 5-21July 1996Networking[PDF]

Simulation is CrucialS. FloydSidebar, IEEE Spectrum, January 2001.January 2001Networking
Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion PreventionJ. Gonzalez, V. Paxson, and N. WeaverProceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008), Alexandria, Virginia, pp. 139-149October 2007Networking[PDF]

Show Me the Money: Characterizing Spam-Advertised RevenueC. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. SavageProceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online PrivacyG. Friedland, G. Maier, R. Sommer, and N. WeaverProceedings of the New Security Paradigms Workshop (NSPW), Marin County, CaliforniaSeptember 2011Networking[PDF]

Shark: Fast Data Analysis Using Coarse-grained Distributed MemoryC. Engle, A. Lupher, R. Xin, M. Zaharia, M. Franklin, S. Shenker, and I. StoicaDemo, ACM SIGMOD/PODS Conference, Scottsdale, ArizonaMay 2012Networking[PDF]

Sharing the Cost of Multicast TransmissionsJ. Feigenbaum, C. Papadimitriou, and S. ShenkerJournal of Computer and System Sciences, Vol. 63, Issue 1, pp. 21-41, 2001August 2001Networking[PDF]

Sharing the Cost of Multicast TransmissionsJ. Feigenbaum, C. Papadimitriou, and S. ShenkerThirty-Second Annual ACM Symposium on Theory of Computing (STOC00), May 2000.May 2000Networking
Sharing the Cost of Multicast TransmissionsJ. Feigenbaum, C. Papadimitriou, and S. ShenkerProceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC 2000), Portland, Oregon, pp. 218-227May 2000Networking
Sharing the "cost" of multicast trees: An axiomatic analysisS. Herzog, S. Shenker, and D. EstrinIEEE/ACM Transactions on Networking, Vol. 5, pp. 847-860December 1997Networking
Session Directories and Scalable Internet Multicast Address AllocationM. HandleyProceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM 98), September 1998, Vancouver, CanadaSeptember 1998Networking
Session Announcement ProtocolM. Handley, C. Perkins, E. WhelanRequest for Comments 2974, Experimental, October 2000.October 2002Networking
Service Portability: Why http Redirect is the Model for the FutureS. Singh, S. Shenker, and G. VargheseProceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 49-54November 2006Networking[PDF]

Semi-Automated Discovery of Application Session StructureJ. Kannan, J. Jung, V. Paxson, and C. KoksalProceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 119-132October 2006Networking[PDF]

Semantic-Free Referencing in Linked Distributed SystemsH. Balakrishnan, S. Shenker, and M. WalfishProceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, CaliforniaFebruary 2003Networking[PDF]

Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCPA. Akella, R.M. Karp, C. Papadimitriou, S. Seshan, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002), Pittsburgh, PennsylvaniaAugust 2002Networking[PDF]

Self-Verifying CSFQI. Stoica, H. Zhang, and S. ShenkerINFOCOM, 2002. 2002Networking
Self-similarity and Heavy Tails: Structural Modeling of Network TrafficW. Willinger, V. Paxson, and M.S. TaqquA Practical Guide to Heavy Tails: Statistical Techniques and Applications, Adler, R., Feldman, R., and Taqqu, M.S., editors, Birkhauser 1998Networking
Security of Open Source and Closed Source Software: An Empirical Comparison of Published VulnerabilitiesG. SchryenProceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), San Francisco, California, paper 387August 2009Networking[PDF]

Security Extensions to MMARP Through Cryptographically Generated AddressesF.J. Galera, P.M. Ruiz, and A.F. Gomez SkarmetaLecture Notes on Informatics, Vol. P-68, pp. 339–343September 2005Networking
Securing Web ContentJ. Koskela, N. Weaver, A. Gurtov, and M. AllmanProceedings of the ACM CoNext Workshop on Re-Architecting the Internet (ReArch 2009), Rome, Italy, pp. 7-12December 2009Networking[PDF]

Securing Mediated Trace Access Using Black-Box Permutation AnalysisP. Mittal, V. Paxson, R. Sommer, and M. WinterrowdProceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New YorkOctober 2009Networking[PDF]

Secure Mobile Agent Systems Using Java - Where Are We Heading?W. Binder and V. RothProceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS), Madrid, Spain, March 2002.March 2002Networking
Search Strategies in Inter-Domain Traffic EngineeringK. Chandrayana, R.M. Karp, M. Roughan, S. Sen, and Y. Zhangpreprint 2004 2004Networking
Search and Replication in Unstructured Peer-to-Peer NetworksQ. Lv, P. Cao, E. Cohen, K. Li, and S. ShenkerProceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002), Marina Del Rey, California, pp. 258-259June 2002Networking
Search and Replication in Unstructured Peer-to-Peer NetworksQ. Lv, P. Cao, E. Cohen, K. Li, and S. ShenkerProceedings of the 16th International Conference on Supercomputing (ICS-02), New York, New York, pp. 84-95June 2002Networking[PDF]

Seamless Multimedia Communications in Heterogeneous Mobile Access NetworksP. M. Ruiz, J.A. Botia, A. Gomez-SkarmetaProceedings of the TERENA Networking Conference (TNC 2004), Rhodes, GreeceJune 2004Networking[PDF]

Scaling Phenomena in the Internet: Critically Examining CriticalityW. Willinger, R. Govindan, S. Jamin, V. Paxson, and S. ShenkerProceedings of National Academy of Science USA, Vol. 99, Suppl. 1, 2573-2580, February 19, 2002.February 19 2002Networking
Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling LawG. Phillips, S. Shenker, and H. TangmunarunkitSIGCOMM, September 1999.September 1999Networking
Scalable Timers for Soft State ProtocolsP. Sharma, D. Estrin, S. Floyd, and V. JacobsonProceedings of the Conference on Computer Communications, 16th Annual Joint Conference of the IEEE Computer and Communications Societies, Driving the Information Revolution (IEEE INFOCOM 1997), Kobe, Japan, pp. 222-229April 1997Networking
Scalable Session Messages in SRMP. Sharma, D. Estrin, S. Floyd, and L. ZhangTechnical reportFebruary 1998Networking
Satellite Network Performance Measurements Using Simulated Multi-User Internet TrafficH. Kruse, M. Allman, J. Griner, S. Ostermann, and E. HelveyProceedings of the Seventh International Conference on Telecommunication Systems. March 1999.March 1999Networking
SANE: A Protection Architecture for Enterprise NetworksM. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. ShenkerProceedings of the 15th USENIX Security Symposium (Security '05), Vancouver, Canada, pp. 137–151August 2006Networking[PDF]

RR-TCP: A Reordering-Robust TCP with DSACKM. Zhang, B. Karp, S. Floyd, and L. PetersonICSI Technical Report TR-02-006July 2002Networking[PDF]

Routing as a ServiceK. Lakshminarayanan, I. Stoica, and S. ShenkerProceedings of the Service Architecture for Heterogeneous Access, Resources, and Applications Retreat (SAHARA 2004), Tahoe City, CaliforniaJanuary 2004Networking[PDF]

Routing Algorithms in DHTs: Some Open QuestionsI. Stoica, D. Adkins, S. Ratnasamy, S. Surana, S. Shenker, and S. ZhuangProceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS) 2002, March 2002.March 2002Networking
Routing Algorithms for DHTs: Some Open QuestionsS. Ratnasamy, I. Stoica, and S. ShenkerThe First International Workshop on Peer-to-Peer Systems (IPTPS): 45-52, 2002. 2002Networking
Route Flap Dampening Exacerbates Internet Routing ConvergenceZ.M. Mao, R. Govindan, G. Varghese, and R. KatzProceedings of the ACM SIGCOMM 2002. 2002Networking
ROFL: Routing on Flat LabelsM. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, S. Shenker, and I. StoicaProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 363-374September 2006Networking[PDF]

Robust TCP Reassembly in the Presence of AdversariesS. Dharmapurikar and V. PaxsonProceedings of the 14th Conference on USENIX Security Symposium (Security '05), Baltimore, Maryland, pp. 65-80August 2005Networking[PDF]

Ripcord: A Modular Platform for Data Center NetworkingB. Heller, D. Erickson, N. McKeown, R. Griffith, I. Ganichev, S. Whyte, K. Zarifis, D. Moon, S. Shenker, and S. StuartProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2010), New Delhi, India, pp. 457-458August 2010Networking[PDF]

RFC 5827: Early Retransmit for TCP and SCTPM. Allman, K. Avrachenkov, U. Ayesta, J. Blanton, and P. HurtigRequest for Comments 5827, ExperimentalApril 2010Networking[PDF]

RFC 5690: Adding Acknowledgement Congestion Control to TCPS. Floyd, A. Arcia, D. Ros, and J. IyengarRequest for Comments 5690, InformationalFebruary 2010Networking[PDF]

Pages