| Congestion Control Principles | S. Floyd | Request for Comments 2914, Best Current Practice, September 2000. | September 2000 | Networking | |
| RFC 3649: HighSpeed TCP for Large Congestion Windows | S. Floyd | Request For Comments 3649, Experimental | December 2003 | Networking | [PDF]
|
| RFC 2914: Congestion Control Principles | S. Floyd | RFC 2914, Best Current Practice | September 2000 | Networking | [PDF]
|
| Ns Simulator Tests for Random Early Detection (RED) Gateways | S. Floyd | Technical Report | October 1996 | Networking | |
| Comments on Measurement-based Admissions Control for Controlled-Load Services | S. Floyd | Technical Report | July 1996 | Networking | |
| Issues of TCP with SACK | S. Floyd | Technical report | January 1996 | Networking | [PDF]
|
| TCP and Explicit Congestion Notification | S. Floyd | ACM Computer Communication Review, Vol. 24, No. 5, pp. 10-23 | October 1994 | Networking | [PDF]
|
| Connections with Multiple Congested Gateways in Packet-Switched Networks Part 1: One-way Traffic | S. Floyd | Computer Communication Review, Vol. 21, No. 5, pp. 30-47 | October 1991 | Networking | [PDF]
|
| RFC 4774: Specifying Alternate Semantics for the Explicit Congestion Notification (ECN) Field | S. Floyd | Request For Comments 4774, Best Current Practice | November 2006 | Networking | [PDF]
|
| RFC 5166: Metrics for the Evaluation of Congestion Control Mechanisms | S. Floyd | RFC 5166, Information, March 2008 | March 2008 | Networking | [PDF]
|
| Robust TCP Reassembly in the Presence of Adversaries | S. Dharmapurikar and V. Paxson | Proceedings of the 14th Conference on USENIX Security Symposium (Security '05), Baltimore, Maryland, pp. 65-80 | August 2005 | Networking | [PDF]
|
| Dissemination of Mutable Sets of Web Objects | S. Buchholz, S. Gobel, A. Schill, and T. Ziegert | Thirteenth IASTED International Conference on Parallel and Distributed Computing Systems, 2001. | 2001 | Networking | |
| IANA Allocation Guidelines For Values In the Internet Protocol and Related Headers | S. Bradner and V. Paxson | Request for Comments 2780, Best Current Practice, March 2000. | March 2000 | Networking | |
| RFC 4653: Improving the Robustness of TCP to Non-Congestion Events | S. Bhandarkar, A.L.N. Reddy, M. Allman, and E. Blanton | Request for Comments 4653 (Experimental) | August 2006 | Networking | |
| SmartSeer: Using a DHT to Process Continuous Queries over Peer-to-Peer Networks | S. Banerjee, S. Basu, J. Kannan, S. J. Lee, P. Sharma, S. Shenker, and B. Yang | Proceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), Barcelona, Spain, pp. 1-12 | April 2006 | Networking | [PDF]
|
| Uniform versus Priority Dropping for Layered Video | S. Bajaj, L. Breslau, and S. Shenker | ACM Computer Communication Review, Vol. 28, pp. 131-143 | September 1998 | Networking | |
| On Preserving Privacy in Information-Centric Networks | S. Arianfar, T. Koponen, B. Raghavan, and S. Shenker | Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN-2011), Toronto, Canada, pp. 19-24 | August 2011 | Networking | [PDF]
|
| A Simple Algorithm for Finding Frequent Elements in Streams and Bags | R.M. Karp, S. Shenker, and C.H. Papadimitriou | ACM Transactions on Database Systems, Vol. 28, Issue 1, pp. 51-55 | March 2003 | Networking | [PDF]
|
| Finite-Length Analysis of LT-codes | R.M. Karp, M. Luby, and A. Shokrollahi | Submitted to International Symposium on Information Theory (ISIT '04). | 2004 | Networking | |
| Optimization Problems in Congestion Control | R.M. Karp, E. Koutsoupias, C.H. Papadimitriou, and S. Shenker | Proceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS 2000), Redondo Beach, California, pp. 66-74 | November 2000 | Networking | [PDF]
|
| Algorithms for Optical Mapping | R.M. Karp and R. Shamir | Journal of Computational Biology 7(1,2) 2000. | 2000 | Networking | |
| Stream Control Transmission Protocol | R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson | Request for Comments 2960, Proposed Standard, October 2000. | October 2000 | Networking | |
| An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention | R. Sommer, N. Weaver, and V. Paxson | Concurrency and Computation: Practice and Experience, Vol. 21, Issue 10, pp. 1255-1279 | July 2009 | Networking | [PDF]
|
| Enhancing Byte-Level Network Intrusion Detection Signatures with Context | R. Sommer and V. Paxson | Proceedings of ACM CCS | 2003 | Networking | |
| Exploiting Independent State For Network Intrusion Detection | R. Sommer and V. Paxson | Technische Universität München Technical Report No. TUM-I0420, Munich, Germany | November 2004 | Networking | [PDF]
|
| Exploiting Independent State For Network Intrusion Detection | R. Sommer and V. Paxson | Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, pp. 59-71 | December 2005 | Networking | [PDF]
|
| Outside the Closed World: On Using Machine Learning for Network Intrusion Detection | R. Sommer and V. Paxson | Proceedings of the IEEE Symposium on Security and Privacy 2010, Oakland, California, pp. 305-316 | May 2010 | Networking | [PDF]
|
| Identification of Protein Complexes by Comparative Analysis of Yeast and Bacterial Protein Interaction Data | R. Sharan, T. Ideker, B.P. Kelley, R. Shamir, and R.M. Karp | Proceedings of RECOMB 2004, pp. 282-289 | January 05 2004 | Networking | |
| Proxy Caching Mechanism for Multimedia Playback Streams in the Internet | R. Rejaie, M. Handley, H. Yu, and D. Estrin | Proceedings of the Fourth International Web Caching Workshop, San Diego, California, March 31 - April 2, 1999. | March 1999 | Networking | |
| Quality Adaptation for Congestion Controlled Playback Video Over the Internet | R. Rejaie, M. Handley, and D. Estrin | Proceedings of ACM SIGCOMM '99, Cambridge, September 1999. | September 1999 | Networking | |
| RAP: An End-to-End Rate-Based Congestion Control Mechanism for Realtime Streams in the Internet | R. Rejaie, M. Handley, and D. Estrin | Proceedings of Infocom 1999. | 1999 | Networking | |
| Architectural Considerations for Playback of Quality Adaptive Video over the Internet | R. Rejaie, M. Handley, and D. Estrin | Technical report 98-686, Computer Science Department, University of Southern California | 1998 | Networking | |
| Multimedia Proxy Caching for Quality Adaptive Streaming Applications in the Internet | R. Rejaie, H. Yu, M. Handley, and D. Estrin | Proceedings of Infocom 2000. | 2000 | Networking | |
| Characteristics of Internet Background Radiation | R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy | October 2004 | Networking | [PDF]
|
| binpac: A yacc for Writing Application Protocol Parsers | R. Pang, V. Paxson, R. Sommer, and L. Peterson | Proceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 289-300 | October 2006 | Networking | [PDF]
|
| The Devil and Packet Trace Anonymization | R. Pang, M. Allman, V. Paxson, and J. Lee | Computer Communication Review, Vol. 36, Issue 1, pp. 29-38 | January 2006 | Networking | |
| A First Look at Modern Enterprise Traffic | R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. Tierney | Proceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 15-28 | October 2005 | Networking | [PDF]
|
| A High-level Programming Environment for Packet Trace Anonymization and Transformation | R. Pang and V. Paxson | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2003), Karlsruhe, Germany | August 2003 | Networking | [PDF]
|
| A Flow Table-Based Design to Approximate Fairness | R. Pan, L. Breslau, B. Prabhakar, and S. Shenker | Proceedings of Hot Interconnects: Tenth Symposium on High Performance Interconnects (Hot-I 2002), Stanford, California | August 2002 | Networking | [PDF]
|
| Approximate fairness through differential dropping | R. Pan, L. Breslau, B. Prabhakar, and S. Shenker | Computer Communication Review, Vol. 33, Issue 2, pp. 23-39 | 2003 | Networking | |
| Approximate Fair Allocation of Link Bandwidth | R. Pan, B. Prabhakar, L. Breslau, and S. Shenker | IEEE Micro Vol. 23, Issue 1, pp. 36-43 | 2003 | Networking | |
| The Click Modular Router | R. Morris, E. Kohler, J. Jannotti, and M.F. Kaashoek | Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles (SOSP '99) , Kiawah Island, South Carolina, December 1999, pages 217-231. | December 1999 | Networking | |
| Controlling High-Bandwidth Flows at the Congested Router | R. Mahajan, S. Floyd, and D. Wetherall | ICNP 2001 | 2001 | Networking | |
| Controlling High Bandwidth Aggregates in the Network | R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker | Computer Communication Review 32(3), July 2002. | July 2002 | Networking | |
| Randomized Rumor Spreading | R. M. Karp, C. Schindelhauer, S. Shenker, and B. Vocking | FOCS 2000, pp. 565-574 | 2000 | Networking | |
| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks - Summary | R. Krishnan, M. Allman, C. Partridge, J.P.G. Sterbenz, and W. Ivancic | Earth Science Technology Conference, Pasadena, California, June 2002. | June 2002 | Networking | |
| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks | R. Krishnan, M. Allman, C. Partridge, and J.P.G. Sterbenz | BBN Technologies Technical Report No. 8333 | March 2002 | Networking | [PDF]
|
| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks | R. Krishnan, J. Sterbenz, W. Eddy, C. Partridge, and M. Allman | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 46, Issue 3, pp. 343-362 | October 2004 | Networking | [PDF]
|
| COPS: Quality of Service Vs. Any Service at All | R. Katz, G. Porter, S. Shenker, I. Stoica, and M. Tsai | Proceedings of the 13th International Workshop on Quality of Service 2005 (IWQoS 2005), Passau, Germany, pp. 3-15 | June 2005 | Networking | |
| Querying the Internet with PIER | R. Huebsch, J.M. Hellerstein, N. Lanham, B.T. Loo, S. Shenker, and I. Stoica | Proceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003), Berlin, Germany | September 2003 | Networking | [PDF]
|