Publication Search Results

TitleAuthorBibliographicDatesort ascendingGroupLinks
Minuet: Rethinking Concurrency Control in Storage Area NetworksA. Ermolinskiy, D. Moon, B. Chun, and S. ShenkerProceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, CaliforniaFebruary 2009Networking[PDF]

Detecting Forged TCP Reset PacketsN. Weaver, R. Sommer, and V. PaxsonProceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, CaliforniaFebruary 2009Networking[PDF]

Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in EstoniaG. SchryenProceedings of the Workshop on e-Business (WEB 2008), Paris, France, pp. 37-50December 2008Networking[PDF]

Spamalytics: An Empirical Analysis of Spam Marketing ConversionC. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 3-14. Also appeared in the Communications of the ACM, Vol. 52, No. 9, pp. 99-107, September 2009October 2008Networking[PDF]

Revocation Games in Ephemeral NetworksM. Raya, M. H. Manshaei, M. Felegyhazi, and J.-P. HubauxProceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 199-210October 2008Networking[PDF]

Reducing Transient Disconnectivity Using Anomaly-Cognizant ForwardingA. Ermolinskiy and S. ShenkerProceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 91-96October 2008Networking[PDF]

Pathlet RoutingP. B. Godfrey, S. Shenker, and I. StoicaProceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 97-102October 2008Networking[PDF]

Rethinking Packet Forwarding HardwareD. Moon, M. Casado, T. Koponen, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 1-6October 2008Networking[PDF]

Predicting the Resource Consumption of Network Intrusion Detection SystemsH. Dreger, A. Feldmann, V. Paxson, and R. SommerProceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2008), Cambridge, Massachusetts, pp. 135-154September 2008Networking[PDF]

Enriching Network Security Analysis with Time TravelG. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson, and F. SchneiderProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 183-194August 2008Networking[PDF]

TCP Slow Start Survey: Standards and IssuesM. AllmanIETF Internet-Draft, Draft-ietf-tcpm-early-rexmt-00.txt, in progressAugust 2008Networking[PDF]

Packet Caches on Routers: The Implications of Universal Redundant Traffic EliminationA. Anand, A. Gupta, A. Akella, S. Seshan, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), San Diego, California, pp. 219-230August 2008Networking[PDF]

Accountable Internet Protocol (AIP)D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 339-350August 2008Networking[PDF]

Can Software Routers Scale?K. Argyraki, S. Baset, B. Chun, K. Fall, G. Iannaccone, A. Knies, E. Kohler, M. Manesh, S. Nedevschi, and S. RatnasamyProceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO'08), Seattle, WashingtonAugust 2008Networking[PDF]

RFC 5290: Comments on the Usefulness of Simple Best-Effort TrafficS. Floyd and M. AllmanRequest for Comments 5290, InformationalJuly 2008Networking[PDF]

IMRG Workshop on Application Classification and Identification ReportT. Strayer, M. Allman, G. Armitage, S. Bellovin, S. Jin and A. W. MooreACM Computer Communication Review (editorial contribution), Vol. 38, Issue 3, pp. 87-90July 2008Networking
Principles for Developing Comprehensive Network VisibilityM. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. WeaverProceedings of the Third USENIX Workshop on Hot Topics in Security (HotSec ’08), San Jose, CaliforniaJuly 2008Networking[PDF]

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection SystemsL. Juan, C. Kreibich, C.-H. Lin, and V. PaxsonProceedings of the Fifth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2008), Paris, France, pp. 267-278July 2008Networking[PDF]

NOX: Towards an Operating System for NetworksN. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. ShenkerACM SIGCOMM Computer Communications Review, Vol. 38, No. 3, pp. 105-110July 2008Networking[PDF]

Diverse Replication for Single-Machine Byzantine-Fault ToleranceB.-C. Chun, P. Maniatis, and S. ShenkerProceedings of the USENIX Annual Technical Conference, Boston, Massachusetts, pp. 287-292June 2008Networking[PDF]

Efficient and Robust TCP Stream NormalizationM. Vutukuru, H. Balakrishnan, and V. PaxsonProceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 96-110May 2008Networking[PDF]

NetComplex: A Complexity Metric for Network System DesignsB.-G. Chun, S. Ratnasamy, and E. KohlerProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 393-406April 2008Networking
A Reactive Measurement FrameworkM. Allman and V. PaxsonProceedings of the 9th International Conference on Passive and Active Network Measurement (PAM 2008), Cleveland, Ohio, pp. 92-101April 2008Networking[PDF]

On Community-Oriented Internet MeasurementM. Allman, L. Martin, M. Rabinovich, and K. AtchinsonProceedings of the Passive and Active Measurement Conference (PAM 2008), Cleveland, Ohio, pp. 112-121April 2008Networking[PDF]

What Ought a Program Committee to Do?M. AllmanProceedings of USENIX Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems (WOWCS), San Francisco, CaliforniaApril 2008Networking[PDF]

Thoughts on ReviewingM. AllmanACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50April 2008Networking[PDF]

On the Spam Campaign TrailC. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, CaliforniaApril 2008Networking[PDF]

OpenFlow: Enabling Innovation in Campus NetworksN. McKeown, T. Andershnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turneron, and H. BalakrisACM Computer Communication Review, Vol. 38, Issue 2, pp. 69-74April 2008Networking[PDF]

Detecting In-Flight Page Changes with Web TripwiresC. Reis, S. Gribble, T. Kohno, and N. WeaverProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 31-44April 2008Networking[PDF]

Reducing Network Energy Consumption via Sleeping and Rate-AdaptationS. Nedevschi, L. Popa, G. Iannaccone, S. Raynasamy, and D. WetherallProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, California, pp. 323-336April 2008Networking[PDF]

Beyond Pilots: Keeping Rural Wireless Networks AliveS. Surana, R. Patra, S. Nedevschi, M. Ramos, L. Subramanian, Y. Ben-David, and E. BrewerProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, CaliforniaApril 2008Networking[PDF]

RFC 5166: Metrics for the Evaluation of Congestion Control MechanismsS. FloydRFC 5166, Information, March 2008March 2008Networking[PDF]

Towards a Common TCP Evaluation SuiteL. Andrew, C. Marcondes, S. Floyd, L. Dunn, R. Guillier, W. Gang, L. Eggert, S. Ha, and I. RheeProceedings of the International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet), Manchester, United KingdomMarch 2008Networking[PDF]

Enabling an Energy-Efficient Future Internet Through Selectively Connected End SystemsM. Allman, K. Christensen, B. Nordman, and V. PaxsonProceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, GeorgiaNovember 2007Networking[PDF]

Personal NamespacesM. AllmanProceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, GeorgiaNovember 2007Networking[PDF]

Holding the Internet AccountableD. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. ShenkerProceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, GeorgiaNovember 2007Networking[PDF]

A Data-oriented (and Beyond) Network ArchitectureT. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. StoicaComputer Communication Review, Vol. 37, Issue 4, ACM, pp. 181-192October 2007Networking[PDF]

Loss and Delay Accountability for the InternetK. Argyraki, P. Maniatis, O. Irzak, A. Subramanian, and S. ShenkerProceedings of the 15th IEEE International Conference on Network Protocols (ICNP 2007), Beijing, China, pp. 194-205October 2007Networking[PDF]

Attested Append-Only Memory: Making Adversaries Stick to their WordB.-G. Chun, P. Maniatis, S. Shenker, and J. KubiatowiczProceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, Washington, pp. 189-204October 2007Networking[PDF]

Issues and Etiquette Concerning Use of Shared Measurement DataM. Allman and V. PaxsonProceedings of ACM SIGCOMM Conference on Internet Measurement (IMC 2007), San Diego, California, pp. 135-140October 2007Networking[PDF]

A Brief History of ScanningM. Allman, V. Paxson, and J. TerrellProceedings of ACM SIGCOMM Conference on Internet Measurement, San Diego, California, pp. 77-82October 2007Networking[PDF]

Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion PreventionJ. Gonzalez, V. Paxson, and N. WeaverProceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008), Alexandria, Virginia, pp. 139-149October 2007Networking[PDF]

An Inquiry into the Nature and Causes of the Wealth of Internet MiscreantsJ. Franklin, V. Paxson, A. Perrig, and S. SavageProceedings of ACM Computer and Communication Security Conference (ACM CCS), Alexandria, Virginia, pp. 375-388October 2007Networking[PDF]

The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity HardwareM. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. TierneyProceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007), Queensland, AustraliaSeptember 2007Networking[PDF]

Resolving Inter-Domain Policy DisputesC. T. Ee, V. Ramachandran, B.-G. Chun, K. Lakshminarayanan, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 157-168August 2007Networking[PDF]

Specifying New Congestion Control AlgorithmsS. Floyd and M. AllmanRequest For Comments 5033, Best Current Practice 133August 2007Networking[PDF]

Hidden-Action in Network RoutingM. Feldman, J. Chuang, I. Stoica, and S. ShenkerIEEE Journal on Selected Areas in Communications, Vol. 25, Issue 6, pp. 1161-1172August 2007Networking[PDF]

Ethane: Taking Control of the EnterpriseM. Casado, M. Freedman, J. Pettit, N. McKeown, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 1-12August 2007Networking[PDF]

Achieving Convergence-Free Routing Using Failure-Carrying PacketsK. Lakshminarayanan, M. Caesar, M. Rangan, T. Anderson, S. Shenker, and I. StoicaProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 241 - 252August 2007Networking[PDF]

The Strengths of Weaker Identities: Opportunistic PersonasM. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. WeaverProceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, MassachusettsAugust 2007Networking[PDF]

Pages