Publication Search Results

Titlesort descendingAuthorBibliographicDateGroupLinks
Design and Evaluation of a Real-Time URL Spam Filtering ServiceK. Thomas, C. Grier, J. Ma, V. Paxson, and D. SongProceedings of the 32nd IEEE Symposium on Security and Privacy, Oakland, California, pp. 447-464May 2011Networking[PDF]

Design Guidelines for Robust Internet ProtocolsT. Anderson, S. Shenker, I. Stoica, and D. WetherallProceedings of the First Workshop on Hot Topics in Networks (HotNets-I), Princeton, New JerseyOctober 2002Networking[PDF]

Designing DCCP: Congestion Control Without ReliabilityE. Kohler, M. Handley, and S. FloydMay 2003May 2003Networking[PDF]

Designing DCCP: Congestion Control Without ReliabilityE. Kohler, M. Handley, and S. FloydProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 27-38September 2006Networking[PDF]

Designing Extensible IP Router SoftwareM. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. RadoslavovProceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 189-202May 2005Networking[PDF]

Detecting and Analyzing Automated Activity on TwitterC. M. Zhang and V. PaxsonProceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Detecting BackdoorsY. Zhang and V. PaxsonProceedings of the Ninth USENIX Security Symposium, August 2000.August 2000Networking
Detecting Forged TCP Reset PacketsN. Weaver, R. Sommer, and V. PaxsonProceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, CaliforniaFebruary 2009Networking[PDF]

Detecting Hidden Causality in Network ConnectionsJ. Kannan, J. Jung, V. Paxson, and C. E. KoksalEECS Department, UC Berkeley Technical Report No. UCB/EECS-2005-30, Berkeley, CaliforniaDecember 2005Networking[PDF]

Detecting In-Flight Page Changes with Web TripwiresC. Reis, S. Gribble, T. Kohno, and N. WeaverProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 31-44April 2008Networking[PDF]

Detecting Stepping StonesY. Zhang and V. PaxsonProceedings of the Ninth USENIX Security Symposium, August 2000.August 2000Networking
Determining an Appropriate Sending Rate Over an Underutilized Network PathP. Sarolahti, M. Allman, and S. FloydComputer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 51, Issue 7, pp. 1815-1832. DOI:10.1016/j.comnet.2006.11.006May 2007Networking[PDF]

Difficulties in Simulating the InternetS. Floyd and V. PaxsonIEEE/ACM Transactions on Networking, Vol.9, No.4, pp. 392-403. (An earlier version appeared in Proceedings of the 1997 Winter Simulation Conference, December 1997).August 2001Networking[PDF]

DIFS: A Distributed Index for Features in Sensor NetworksB. Greenstein, D. Estrin, R. Govindan, S. Ratnasamy, and S. ShenkerElsevier Journal of Ad Hoc Networks, 2003. (Also in the First IEEE Workshop on Sensor Networks Protocols and Applications, SNPA, 2003) 2003Networking
Discovery of Rgulatory Interactions Through Perturbation: Inference and Experimental DesignT.E. Ideker, V. Thorsson, and R.M. KarpPacific Symposium on Biocomputing, 2000. 2000Networking
Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large ClustersM. Zaharia, T. Das, H. Li, S. Shenker and I. StoicaIn the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MAJune 2012Networking[PDF]

Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. ResnickW. Willinger and V. PaxsonAnnals of Statistics, Vol. 25, No. 5, pp. 1805-1869 1997Networking
Disk-Locality in Datacenter Computing Considered IrrelevantG. Anantharayanan, A. Ghodsi, S. Shenker, and I. StoicaProceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), Napa, CaliforniaMay 2011Networking[PDF]

Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-EngineeringJ. Caballero, P. Poosankam, C. Kreibich, and D. SongProceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, Illinois, pp. 621-634November 2009Networking[PDF]

Dissemination of Mutable Sets of Web ObjectsS. Buchholz, S. Gobel, A. Schill, and T. ZiegertThirteenth IASTED International Conference on Parallel and Distributed Computing Systems, 2001. 2001Networking
Distributed Algorithmic Mechanism DesignJ. Feigenbaum, M. Schapira, and S. ShenkerIn Algorithmic Game Theory, N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, eds., pp. 363-384, Cambridge University Press 2007Networking
Distributed Algorithmic Mechanism Design: Recent Results and Future DirectionsJ. Feigenbaum and S. ShenkerProceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM'02), Atlanta, Georgia, pp. 1-13September 2002Networking[PDF]

Distributed Quota Enforcement for Spam ControlM. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 281-296May 2006Networking[PDF]

Distributed Segment Tree: Support Range Query and Cover Query over DHTC. Zheng, G. Shen, S. Li, and S. ShenkerProceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, CaliforniaFebruary 2006Networking[PDF]

Diverse Replication for Single-Machine Byzantine-Fault ToleranceB.-C. Chun, P. Maniatis, and S. ShenkerProceedings of the USENIX Annual Technical Conference, Boston, Massachusetts, pp. 287-292June 2008Networking[PDF]

Does AS Size Determine Degree in AS Topology?H. Tangmunarunkit, J. Doyle, R. Govindan, S. Jamin, S. Shenker, and W. WillingerACM Computer Communication Review, October 2001.October 2001Networking
Dominant Resource Fairness: Fair Allocation of Multiple Resources in DatacentersA. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski, S. Shenker, and I. StoicaProceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011), Boston, MassachusettsMarch 2011Networking[PDF]

DoS: Fighting Fire with FireM. Walfish, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, MarylandNovember 2005Networking[PDF]

Dynamic Application-Layer Protocol Analysis for Network Intrusion DetectionH. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. SommerProceedings of the 15th USENIX Security Symposium (Security '06), Vancouver, CanadaAugust 2006Networking[PDF]

Dynamic Behavior of Slowly-Responsive Congestion Control AlgorithmsD. Bansal, H. Balakrishnan, S. Floyd, and S. ShenkerSIGCOMM 2001 2001Networking
Dynamic Route Recomputation Considered HarmfulM. Caesar, M. Casado, T. Koponen, J. Rexford, and S. ShenkerComputer Communication Review, Vol. 40, Issue 2April 2010Networking[PDF]

Dynamics of TCP Traffic over ATM NetworksS. Floyd and A. RomanowIEEE Journal on Selected Areas in Communication, Vol. 13, No. 4, pp. 633-641May 1995Networking[PDF]

Editorial: Architecting for InnovationT. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, B. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, and D. KuptsovACM SIGCOMM Computer Communications Review, Vol. 41, No. 3July 2011Networking[PDF]

Effective Straggler Mitigation: Attack of the ClonesG. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. StoicaTo appear in the Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’13), Lombard, IllinoisApril 2013Networking
Efficient and Robust TCP Stream NormalizationM. Vutukuru, H. Balakrishnan, and V. PaxsonProceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 96-110May 2008Networking[PDF]

Efficient Application Placement in a Dynamic Hosting PlatformZ. Al-Qudah, H. Alzoubi, M. Allman, M. Rabinovich, and V. LiberatoreProceedings of the 18th International World Wide Web Conference (WWW 2009), Madrid, Spain, pp. 281-290April 2009Networking[PDF]

Elektronische Wahlen: Verifizierung vs. ZertifizierungM. Volkamer, G. Schryen, L. Langer, A. Schmitt, and J. BuchmannPresented at the 39th Jahrestagung der Gesellschaft für Informatik e.V. (Informatik 2009), Lübeck, GermanySeptember 2009Networking
Empirically-Derived Analytic Models of Wide-Area TCP ConnectionsV. PaxsonIEEE/ACM Transactions on Networking, Vol. 2, No. 4August 1994Networking
Empowering mobile software agentsV. RothIn N. Suri, editor, Proceedings 6th IEEE Mobile Agents Conference, volume 2535 of Lecture Notes in Computer Science, pages 47-63. Springer Verlag, October 2002.October 2002Networking
Enabling an Energy-Efficient Future Internet Through Selectively Connected End SystemsM. Allman, K. Christensen, B. Nordman, and V. PaxsonProceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, GeorgiaNovember 2007Networking[PDF]

Enabling Innovation Below the Communication APIG. Ananthanarayanan, K. Heimerl, M. Zaharia, M. Demmer, T. Koponen, A. Tavakoli, S. Shenker, and I. StoicaUC Berkeley Technical Report, UCB/EECS-2009-141October 2009Networking[PDF]

End-Host Controlled Multicast RoutingK. Lakshminarayanan, A. Rao, I. Stoica, and S. ShenkerElsevier Computer Networks, Special Issue on Overlay Distribution Structures and their Applications, Vol. 5, Issue 6, pp. 807-825. DOI:10.1016/j.comnet.2005.07.019April 2006Networking[PDF]

End-to-End Internet Packet DynamicsV. PaxsonIEEE/ACM Transactions on Networking, Vol.7, No.3, pp. 277-292, June 1999. An earlier version appeared in Proc. ACM SIGCOMM '97, September 1997, Cannes, France.June 1999Networking
End-to-End Internet Packet DynamicsV. PaxsonProceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Cannes, FranceSeptember 1997Networking
End-to-End Routing Behavior in the InternetV. PaxsonIEEE/ACM Transactions on Networking, Vol. 5, No. 5, pp. 601-615. An earlier version appeared in the proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '96), August 1996, Stanford, CaliforniaOctober 1997Networking
Endpoint Admission Control: Architectural Issues and PerformanceL. Breslau, E.W. Knightly, S. Shenker, I. Stoica, and H. ZhangACM SIGCOMM 2000, pages 57-69, Stockholm, Sweeden, October 2000.October 2000Networking
Energy-Efficient Routing on the Virtual SpannerH. Tejeda, E. Chavez, J.A. Sanchez, and P. M. RuizLecture Notes in Computer Science, Vol. 4104, pp. 101–113July 2006Networking
Enhanced Internet Connectivity for Hybrid Ad Hoc Networks Through Adaptive Gateway DiscoveryP. M. Ruiz and A.F. Gomez SkarmetaProceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), Tampa, FloridaNovember 2004Networking[PDF]

Enhancing Byte-Level Network Intrusion Detection Signatures with ContextR. Sommer and V. PaxsonProceedings of ACM CCS 2003Networking
Enhancing Network Intrusion Detection With Integrated Sampling and FilteringJ. Gonzalez and V. PaxsonProceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006), Hamburg, Germany, pp. 272-289September 2006Networking[PDF]

Pages