Publication Search Results

TitleAuthorsort ascendingBibliographicDateGroupLinks
Congestion Control PrinciplesS. FloydRequest for Comments 2914, Best Current Practice, September 2000.September 2000Networking
RFC 3649: HighSpeed TCP for Large Congestion WindowsS. FloydRequest For Comments 3649, ExperimentalDecember 2003Networking[PDF]

RFC 2914: Congestion Control PrinciplesS. FloydRFC 2914, Best Current PracticeSeptember 2000Networking[PDF]

Ns Simulator Tests for Random Early Detection (RED) GatewaysS. FloydTechnical ReportOctober 1996Networking
Comments on Measurement-based Admissions Control for Controlled-Load ServicesS. FloydTechnical ReportJuly 1996Networking
Issues of TCP with SACKS. FloydTechnical reportJanuary 1996Networking[PDF]

TCP and Explicit Congestion NotificationS. FloydACM Computer Communication Review, Vol. 24, No. 5, pp. 10-23October 1994Networking[PDF]

Connections with Multiple Congested Gateways in Packet-Switched Networks Part 1: One-way TrafficS. FloydComputer Communication Review, Vol. 21, No. 5, pp. 30-47October 1991Networking[PDF]

RFC 4774: Specifying Alternate Semantics for the Explicit Congestion Notification (ECN) FieldS. FloydRequest For Comments 4774, Best Current PracticeNovember 2006Networking[PDF]

RFC 5166: Metrics for the Evaluation of Congestion Control MechanismsS. FloydRFC 5166, Information, March 2008March 2008Networking[PDF]

Robust TCP Reassembly in the Presence of AdversariesS. Dharmapurikar and V. PaxsonProceedings of the 14th Conference on USENIX Security Symposium (Security '05), Baltimore, Maryland, pp. 65-80August 2005Networking[PDF]

Dissemination of Mutable Sets of Web ObjectsS. Buchholz, S. Gobel, A. Schill, and T. ZiegertThirteenth IASTED International Conference on Parallel and Distributed Computing Systems, 2001. 2001Networking
IANA Allocation Guidelines For Values In the Internet Protocol and Related HeadersS. Bradner and V. PaxsonRequest for Comments 2780, Best Current Practice, March 2000.March 2000Networking
RFC 4653: Improving the Robustness of TCP to Non-Congestion EventsS. Bhandarkar, A.L.N. Reddy, M. Allman, and E. BlantonRequest for Comments 4653 (Experimental)August 2006Networking
SmartSeer: Using a DHT to Process Continuous Queries over Peer-to-Peer NetworksS. Banerjee, S. Basu, J. Kannan, S. J. Lee, P. Sharma, S. Shenker, and B. YangProceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), Barcelona, Spain, pp. 1-12April 2006Networking[PDF]

Uniform versus Priority Dropping for Layered VideoS. Bajaj, L. Breslau, and S. ShenkerACM Computer Communication Review, Vol. 28, pp. 131-143September 1998Networking
On Preserving Privacy in Information-Centric NetworksS. Arianfar, T. Koponen, B. Raghavan, and S. ShenkerProceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN-2011), Toronto, Canada, pp. 19-24August 2011Networking[PDF]

A Simple Algorithm for Finding Frequent Elements in Streams and BagsR.M. Karp, S. Shenker, and C.H. PapadimitriouACM Transactions on Database Systems, Vol. 28, Issue 1, pp. 51-55March 2003Networking[PDF]

Finite-Length Analysis of LT-codesR.M. Karp, M. Luby, and A. ShokrollahiSubmitted to International Symposium on Information Theory (ISIT '04). 2004Networking
Optimization Problems in Congestion ControlR.M. Karp, E. Koutsoupias, C.H. Papadimitriou, and S. ShenkerProceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS 2000), Redondo Beach, California, pp. 66-74November 2000Networking[PDF]

Algorithms for Optical MappingR.M. Karp and R. ShamirJournal of Computational Biology 7(1,2) 2000. 2000Networking
Stream Control Transmission ProtocolR. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. PaxsonRequest for Comments 2960, Proposed Standard, October 2000.October 2000Networking
An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion PreventionR. Sommer, N. Weaver, and V. PaxsonConcurrency and Computation: Practice and Experience, Vol. 21, Issue 10, pp. 1255-1279July 2009Networking[PDF]

Enhancing Byte-Level Network Intrusion Detection Signatures with ContextR. Sommer and V. PaxsonProceedings of ACM CCS 2003Networking
Exploiting Independent State For Network Intrusion DetectionR. Sommer and V. PaxsonTechnische Universität München Technical Report No. TUM-I0420, Munich, GermanyNovember 2004Networking[PDF]

Exploiting Independent State For Network Intrusion DetectionR. Sommer and V. PaxsonProceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, pp. 59-71December 2005Networking[PDF]

Outside the Closed World: On Using Machine Learning for Network Intrusion DetectionR. Sommer and V. PaxsonProceedings of the IEEE Symposium on Security and Privacy 2010, Oakland, California, pp. 305-316May 2010Networking[PDF]

Identification of Protein Complexes by Comparative Analysis of Yeast and Bacterial Protein Interaction DataR. Sharan, T. Ideker, B.P. Kelley, R. Shamir, and R.M. KarpProceedings of RECOMB 2004, pp. 282-289January 05 2004Networking
Proxy Caching Mechanism for Multimedia Playback Streams in the InternetR. Rejaie, M. Handley, H. Yu, and D. EstrinProceedings of the Fourth International Web Caching Workshop, San Diego, California, March 31 - April 2, 1999.March 1999Networking
Quality Adaptation for Congestion Controlled Playback Video Over the InternetR. Rejaie, M. Handley, and D. EstrinProceedings of ACM SIGCOMM '99, Cambridge, September 1999.September 1999Networking
RAP: An End-to-End Rate-Based Congestion Control Mechanism for Realtime Streams in the InternetR. Rejaie, M. Handley, and D. EstrinProceedings of Infocom 1999. 1999Networking
Architectural Considerations for Playback of Quality Adaptive Video over the InternetR. Rejaie, M. Handley, and D. EstrinTechnical report 98-686, Computer Science Department, University of Southern California 1998Networking
Multimedia Proxy Caching for Quality Adaptive Streaming Applications in the InternetR. Rejaie, H. Yu, M. Handley, and D. EstrinProceedings of Infocom 2000. 2000Networking
Characteristics of Internet Background RadiationR. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. PetersonProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, ItalyOctober 2004Networking[PDF]

binpac: A yacc for Writing Application Protocol ParsersR. Pang, V. Paxson, R. Sommer, and L. PetersonProceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 289-300October 2006Networking[PDF]

The Devil and Packet Trace AnonymizationR. Pang, M. Allman, V. Paxson, and J. LeeComputer Communication Review, Vol. 36, Issue 1, pp. 29-38January 2006Networking
A First Look at Modern Enterprise TrafficR. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. TierneyProceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 15-28October 2005Networking[PDF]

A High-level Programming Environment for Packet Trace Anonymization and TransformationR. Pang and V. PaxsonProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2003), Karlsruhe, GermanyAugust 2003Networking[PDF]

A Flow Table-Based Design to Approximate FairnessR. Pan, L. Breslau, B. Prabhakar, and S. ShenkerProceedings of Hot Interconnects: Tenth Symposium on High Performance Interconnects (Hot-I 2002), Stanford, CaliforniaAugust 2002Networking[PDF]

Approximate fairness through differential droppingR. Pan, L. Breslau, B. Prabhakar, and S. ShenkerComputer Communication Review, Vol. 33, Issue 2, pp. 23-39 2003Networking
Approximate Fair Allocation of Link BandwidthR. Pan, B. Prabhakar, L. Breslau, and S. ShenkerIEEE Micro Vol. 23, Issue 1, pp. 36-43 2003Networking
The Click Modular RouterR. Morris, E. Kohler, J. Jannotti, and M.F. KaashoekProceedings of the Seventeenth ACM Symposium on Operating Systems Principles (SOSP '99) , Kiawah Island, South Carolina, December 1999, pages 217-231.December 1999Networking
Controlling High-Bandwidth Flows at the Congested RouterR. Mahajan, S. Floyd, and D. WetherallICNP 2001 2001Networking
Controlling High Bandwidth Aggregates in the NetworkR. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. ShenkerComputer Communication Review 32(3), July 2002.July 2002Networking
Randomized Rumor SpreadingR. M. Karp, C. Schindelhauer, S. Shenker, and B. VockingFOCS 2000, pp. 565-574 2000Networking
Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks - SummaryR. Krishnan, M. Allman, C. Partridge, J.P.G. Sterbenz, and W. IvancicEarth Science Technology Conference, Pasadena, California, June 2002.June 2002Networking
Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite NetworksR. Krishnan, M. Allman, C. Partridge, and J.P.G. SterbenzBBN Technologies Technical Report No. 8333March 2002Networking[PDF]

Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite NetworksR. Krishnan, J. Sterbenz, W. Eddy, C. Partridge, and M. AllmanComputer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 46, Issue 3, pp. 343-362October 2004Networking[PDF]

COPS: Quality of Service Vs. Any Service at AllR. Katz, G. Porter, S. Shenker, I. Stoica, and M. TsaiProceedings of the 13th International Workshop on Quality of Service 2005 (IWQoS 2005), Passau, Germany, pp. 3-15June 2005Networking
Querying the Internet with PIERR. Huebsch, J.M. Hellerstein, N. Lanham, B.T. Loo, S. Shenker, and I. StoicaProceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003), Berlin, GermanySeptember 2003Networking[PDF]

Pages