| The Importance of Trusting Beliefs Linked to the Corporate Website for Diffusion of Recruiting-Related Online Innovations | M. Bermudez-Edo, N. Hurtado-Torres, and J. A. Aragon-Correa | Information Technology and Management, Vol. 11, No. 4, pp. 177-189 | December 2010 | Networking | |
| Range Queries Over DHTs | S. Ratnasamy, J. M. Hellerstein, and S. Shenker | Intel Research Technical Report, IRB-TR-03-011 | June 25 2003 | Networking | |
| Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor Networks | F. Bian, X. Li, R. Govindan, and S. Shenker | International Journal of Ad Hoc and Ubiquitous Computing (special issue on wireless sensor networks), Vol. 1, No. 4, pp. 179-193 | January 2006 | Networking | [PDF]
|
| Experimentation and Modeling of HTTP Over Satellite Channels | H. Kruse, M. Allman, J. Griner, and D. Tran | International Journal of Satellite Communications, 19(1), January/February 2001. | January 2001 | Networking | |
| On Traffic Phase Effects in Packet-Switched Gateways | S. Floyd and V. Jacobson | Internetworking: Research and Experience, Vol. 3, No. 3, pp. 115-156 | September 1992 | Networking | [PDF]
|
| A History of the Improvement of Internet Protocols Over Satellites Using ACTS | M. Allman, H. Kruse, and S. Ostermann | Invited paper for ACTS Conference 2000, May 2000. | May 2000 | Networking | |
| How the Pursuit of Truth Led Me to Selling Viagra | V. Paxson | Invited talk at the USENIX Security Symposium, Montreal, Canada | August 2009 | Networking | [PDF]
|
| Posted Price Profit Maximization for Multicast by Approximating Fixed Points | A. Mehta, S. Shenker, and V. Vazirani | Journal of Algorithms, Vol. 58, Issue 2, pp. 150-164 | February 2006 | Networking | |
| Mobility-Aware Mesh Construction Algorithm for Low Data-Overhead Multicast Ad Hoc Routing | P. M. Ruiz and A.F. Gomez Skarmeta | Journal of Communications and Networks (JCN), Vol. 6, No. 4, pp. 331-342 | December 2004 | Networking | [PDF]
|
| Algorithms for Optical Mapping | R.M. Karp and R. Shamir | Journal of Computational Biology 7(1,2) 2000. | 2000 | Networking | |
| Sharing the Cost of Multicast Transmissions | J. Feigenbaum, C. Papadimitriou, and S. Shenker | Journal of Computer and System Sciences, Vol. 63, Issue 1, pp. 21-41, 2001 | August 2001 | Networking | [PDF]
|
| Towards Insurable Network Architectures | R. Boehme | Journal of Information Technology, Vol. 52, No. 5, pp. 290-293 | September 2010 | Networking | |
| On the Application of Formal Description Techniques to the Design of Interception Systems for GSM Mobile Terminals | M. J. Fernández, J. González, M. Llamas, J. M. Pousada, and J. Vales | Journal of Systems and Software, Vol. 60, Issue 1, pp. 49-56 | January 2002 | Networking | |
| Reflections on Measurement Research: Crooked Lines, Straight Lines, and Moneyshots | V. Paxson | Keynote talk at the ACM Special Interest Group on Data Communications Conference (SIGCOMM 2011), Toronto, Canada | August 2011 | Networking | |
| Towards a Framework for Defining Internet Performance Metrics | V. Paxson | LBNL-38952 | June 20 1996 | Networking | |
| User-Aware Adaptive Applications for Enhanced Multimedia Quality in Heterogeneous Networking Environments | P. M. Ruiz, J.A. Botia, and A.Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3079 | June 2004 | Networking | [PDF]
|
| Maximal Source Coverage Adaptive Gateway Discovery for Hybrid Ad Hoc Networks | P. M. Ruiz and A.F. Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3158, pp. 28-41 | July 2004 | Networking | [PDF]
|
| Implementation and Evaluation of a Location-Aware Wireless Multi-Agent System | I. Nieto-Carvajal, J.A. Botia, P. M. Ruiz, and A. Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3207, pp. 528-537 | August 2004 | Networking | [PDF]
|
| Heuristic Algorithms for Minimum Bandwidth Consumption Multicast Trees in Wireless Mesh Networks | P.M. Ruiz and A.F. Gomez Skarmeta | Lecture Notes in Computer Science, Vol. 3738, pp. 258–270 | October 2005 | Networking | |
| Energy-Efficient Routing on the Virtual Spanner | H. Tejeda, E. Chavez, J.A. Sanchez, and P. M. Ruiz | Lecture Notes in Computer Science, Vol. 4104, pp. 101–113 | July 2006 | Networking | |
| A Virtual Spanner for Efficient Face Routing in Multihop Wireless Networks | H. Tejeda, E. Chavez, J.A. Sanchez, and P. M. Ruiz | Lecture Notes in Computer Science, Vol. 4217, pp. 459–470 | September 2006 | Networking | |
| Security Extensions to MMARP Through Cryptographically Generated Addresses | F.J. Galera, P.M. Ruiz, and A.F. Gomez Skarmeta | Lecture Notes on Informatics, Vol. P-68, pp. 339–343 | September 2005 | Networking | |
| The Network Block Device | P. T. Breuer, A. Marín Lopez, and A. García Ares | Linux Journal, Vol. 73 | May 2000 | Networking | |
| Long-Range Dependence and Data Network Traffic | W. Willinger, V. Paxson, R.H. Riedi, and M.S. Taqqu | Long-Range Dependence: Theory and Applications, P. Doukhan, G. Oppenheim and M. S. Taqqu, eds., Birkhauser, 2002. | 2002 | Networking | |
| Prolac: a language for protocol compilation | E. Kohler | Master's thesis, Massachusetts Institute of Technology | September 1997 | Networking | |
| Improving TCP Performance Over Satellite Channels | M. Allman | Master's Thesis, Ohio University | June 1997 | Networking | |
| Designing DCCP: Congestion Control Without Reliability | E. Kohler, M. Handley, and S. Floyd | May 2003 | May 2003 | Networking | [PDF]
|
| Programming Language Techniques for Modular Router Configurations | E. Kohler, B. Chen, M.F. Kaashoek, R. Morris, and M. Poletto | MIT Laboratory for Computer Science technical report MIT-LCS-TR-812, August 2000. | August 2000 | Networking | |
| GPSR: Greedy Perimeter Stateless Routing for Wireless networks | B. Karp and H.T. Kung | MOBICOM, 2000. | 2001 | Networking | |
| Internetworking Multimedia | J. Crowcroft, M. Handley, and I. Wakeman | Morgan Kaufmann, ISBN 1-55860-584-3, 1999. | 1999 | Networking | |
| Where Mathematics Meets the Internet | W. Willinger and V. Paxson | Notices of the American Mathematical Society, Vol. 45, No. 8, pp. 961-970 | August 1998 | Networking | |
| Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks | P. Levis, N. Patel, D. Culler, and S. Shenker | NSDI | January 05 2004 | Networking | |
| Discovery of Rgulatory Interactions Through Perturbation: Inference and Experimental Design | T.E. Ideker, V. Thorsson, and R.M. Karp | Pacific Symposium on Biocomputing, 2000. | 2000 | Networking | |
| Measurements and Analysis of End-to-End Internet Dynamics | V. Paxson | Ph.D. dissertation | 1997 | Networking | |
| The Click Modular Router | E. Kohler | Ph.D. thesis, Massachusetts Institute of Technology, November 2000. | November 2000 | Networking | |
| The Relationship Between Topology and Protocol Performance: Case Studies | P. Radoslavov | PhD Dissertation, Computer Science Department, University of Southern California, December 2001. | December 2001 | Networking | |
| Petri Net Based Performance Evaluation of USAIA's Bandwidth Partitioning for the Wireless Cell Level | J. Sokol and D. Tutsch | PNPN Petri nets and Performance Models, September 2001. | September 2001 | Networking | |
| Carat: Collaborative Energy Bug Detection | A. J. Oliner, A. P. Iyer, E. Lagerspetz, I. Stoica, and S. Tarkoma | Poster and demo at the proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12), San Jose, California | April 2012 | Networking | |
| Towards a Next Generation Inter-domain Routing Protocol | L. Subramanian, M. Caesar, M. Handley, M Mao, S. Shenker, and I. Stoica | Preprint 2004 | January 05 2004 | Networking | |
| Search Strategies in Inter-Domain Traffic Engineering | K. Chandrayana, R.M. Karp, M. Roughan, S. Sen, and Y. Zhang | preprint 2004 | 2004 | Networking | |
| Achieving Fairness Through Selective Early Dropping | J. Scott and R.M. Karp | preprint 2004. | 2004 | Networking | |
| Elektronische Wahlen: Verifizierung vs. Zertifizierung | M. Volkamer, G. Schryen, L. Langer, A. Schmitt, and J. Buchmann | Presented at the 39th Jahrestagung der Gesellschaft für Informatik e.V. (Informatik 2009), Lübeck, Germany | September 2009 | Networking | |
| Measuring Access Connectivity Characteristics with Netalyzr | N. Weaver, C. Kreibich, and V. Paxson | Presented at the meeting of the North American Network Operators' Group (NANOG49), San Francisco, California | June 2010 | Networking | [PDF]
|
| Towards an Economic Analysis of Trusted Systems | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Presented at the Third Annual Workshop on Economics of Information Security (WEIS04), Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Replication Strategies in Unstructured Peer-to-Peer Networks | E. Cohen and S. Shenker | Proceedings ACM SIGCOMM 2002. | 2002 | Networking | |
| Network Topology Generators: Degree-Based vs. Structural | H. Tangmunarunkit, R. Govindan, S. Jamin, S. Shenker, and W. Willinger | Proceedings ACM SIGCOMM 2002. | 2002 | Networking | |
| Mobile Agent Interoperability Patterns and Practice | U. Pinsdorf and V. Roth | Proceedings Ninth Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, Lund, Sweden, April 2002. | April 2002 | Networking | |
| An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention | V. Paxson, R. Sommer, and N. Weaver | Proceedings of IEEE Sarnoff Symposium, Princeton, New Jersey, pp. 1-7 | May 2007 | Networking | [PDF]
|
| COPS: Quality of Service Vs. Any Service at All | R. Katz, G. Porter, S. Shenker, I. Stoica, and M. Tsai | Proceedings of the 13th International Workshop on Quality of Service 2005 (IWQoS 2005), Passau, Germany, pp. 3-15 | June 2005 | Networking | |
| Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention | J. Gonzalez, V. Paxson, and N. Weaver | Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008), Alexandria, Virginia, pp. 139-149 | October 2007 | Networking | [PDF]
|