| Polylogarithmic Inapproximability | E. Halperin and R. Krauthgamer | Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC), 585-594 | 2003 | Algorithms | |
| A Gambling Game and its Application to the Analysis of Adaptive Randomized Rounding | R.M. Karp and C. Kenyon | Springer-Verlag Lecture Notes in Computer Science, Volume 2764 (RANDOM 03), 329-340 | 2003 | Algorithms | |
| Load Balancing in Structured P2P Systems | R.M. Karp, A. Rao, K. Lakshminarayanan, S. Surana, and I. Stoica | Proceedings of the Second International Workshop on Peer-to-Peer Systems | 2003 | Algorithms | |
| A Simple Algorithm for Finding Frequent Elements in Streams and Bags | R.M. Karp, S. Shenker, and C.H. Papadimitriou | Transactions on Database Systems | 2003 | Algorithms | |
| Conserved Pathways Within Bacteria and Yeast as Revealed by Global Protein Network Alignment | B. P. Kelley, R. Sharan, R. M. Karp, E.T. Sittler, D. E. Root, B. R. Stockwell, and T. Ideker | Proceedings of the National Academy of Sciences of the United States of America, Vol. 100, No. 20, pp. 11394-11399. DOI:10.1073/pnas.1534710100. | September 2003 | Algorithms | [PDF]
|
| Idetifying Blocks and Sub-Populations in Noisy SNP Data | G. Kimmel, R. Sharan, and R. Shamir | Proceedings of the Third Workshop on Algorithms in Bioinformatics (WABI'03), pp. 303-319 | 2003 | Algorithms | |
| Regularizers and Priors for Feed-Forward Networks | J. Moody and T. Rognvaldsson | Submitted for publication 2003 | 2003 | Algorithms | |
| Detecting Excess Radical Replacements in Phylogenetic Trees | T. Pupko, R. Sharan, M. Hasegawa, R. Shamir, and D. Graur | Gene, 319, pp. 127-135 | 2003 | Algorithms | |
| Load Balancing in Structured P2P Systems | A. Rao, K. Lakshminarayanan, S. Surana, R.M. Karp, and I. Stoica | Second International Workshop on Peer-to-Peer Systems | 2003 | Algorithms | |
| CLICK and EXPANDER: A System for Clustering and Visualizing Gene Expression Data | R. Sharan, A. Maron-Katz, and R. Shamir | Bioinformatics, 19, pp. 1787-1799 | 2003 | Algorithms | |
| CRÈME: A Framework for Identifying Cis-Regulatory Modules in Human-Mouse Conserved Segments | R. Sharan, I. Ovcharenko, A. Ben-Hur, and R. M. Karp | Proceedings of the Eleventh International Conference on Intelligent Systems for Molecular Biology (ISMB'03), Bioinformatics 19, Supplement 1, pp. 1283-1291 | 2003 | Algorithms | |
| LOGOS: A Modular Bayesian Model for de Novo Motif Detection | E.P. Xing, W. Wu, M. Jordan, and R.M. Karp | Proceedings of IEEE Computer Society Bioinformatic Conference IPTPS | 2003 | Algorithms | |
| The SFRA: A Corner-Turn FPGA Architecture | N. Weaver, J. Hauser and J. Wawrzynek | Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12 | February 2004 | Networking | [PDF]
|
| Achieving Fairness Through Selective Early Dropping | J. Scott and R.M. Karp | preprint 2004. | 2004 | Networking | |
| Finite-Length Analysis of LT-codes | R.M. Karp, M. Luby, and A. Shokrollahi | Submitted to International Symposium on Information Theory (ISIT '04). | 2004 | Networking | |
| Load Balancing in Dynamic Structured P2P Systems | B. Godfrey, R.M. Karp, K. Lakshminarayanan, S. Surana, and I. Stoica | Proceedings of INFOCOMM, 2004 | 2004 | Networking | |
| New Techniques for Making Transport Protocols Robust to Corruption-Based Loss | W. Eddy, S. Ostermann, and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88 | October 2004 | Networking | [PDF]
|
| Search Strategies in Inter-Domain Traffic Engineering | K. Chandrayana, R.M. Karp, M. Roughan, S. Sen, and Y. Zhang | preprint 2004 | 2004 | Networking | |
| A Stochastic Process on the Hypercube with Applications to Peer-to-peer Networks | M. Adler, E. Halperin, R. M. Karp, and V Vazirani | Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC 2003), San Diego, California, pp. 575-584 | June 2003 | Networking | [PDF]
|
| On the Performance of Middleboxes | M. Allman | ACM SIGCOMM/Usenix Internet Measurement Conference, Miami, FL, USA | October 2003 | Networking | |
| An Evaluation of XML-RPC | M. Allman | ACM Performance Evaluation Review, 30(4) | March 2003 | Networking | |
| TCP Congestion Control with Appropriate Byte Counting (ABC) | M. Allman | RFC 3465 | February 2003 | Networking | |
| Estimating Loss Rates With TCP | M. Allman, W. Eddy, and S. Ostermann | ACM Performance Evaluation Review, 31(3) | December 2003 | Networking | |
| A Conservative Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm for TCP | E. Blanton, M. Allman, K. Fall, and L. Wang | RFC 3517 | April 2003 | Networking | |
| Making Gnutella-Like P2P Systems Scalable | Y. Chawathe, S. Ratnasamy, L. Breslau, and S. Shenker | Proceedings of ACM SIGCOMM | 2003 | Networking | |
| A Comparison of RED's Byte and Packet Modes | W. Eddy and M. Allman | Computer Networks, 42(2) | June 2003 | Networking | |
| Mechanism Design for Policy Routing | J. Feigenbaum, R. Sami, and S. Shenker | Yale University Technical Report YALEU/DCS/TR-1258 | November 2003 | Networking | |
| Pktd: A Packet Capture and Injection Daemon | J. Gonzalez and V. Paxson | Proceedings of Passive and Active Measurement Workshop (PAM-2003), La Jolla, California, pp. 87-96 | April 2003 | Networking | [PDF]
|
| DIFS: A Distributed Index for Features in Sensor Networks | B. Greenstein, D. Estrin, R. Govindan, S. Ratnasamy, and S. Shenker | Elsevier Journal of Ad Hoc Networks, 2003. (Also in the First IEEE Workshop on Sensor Networks Protocols and Applications, SNPA, 2003) | 2003 | Networking | |
| The Impact of DHT Routing Geometry on Resilience and Proximity | K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica | Proceedings of ACM SIGCOMM 2003, Karlruhe, Germany | August 2003 | Networking | |
| Modeling Wireless Links for Transport Protocols | A. Gurtov and S. Floyd | ACM Computer Communications Review, Vol. 34, No. 2, pp. 85-96 | April 2004 | Networking | [PDF]
|
| RFC 3448: TCP Friendly Rate Control (TFRC): Protocol Specification | M. Handley, S. Floyd, J. Pahdye, and J. Widmer | RFC 3448, Proposed Standard | January 2003 | Networking | [PDF]
|
| A Framework for Incremental Deployment Strategies for Router-Assisted Services | X. He, C. Papadopoulos, and P. Radoslavov | Proceedings of the IEEE Infocom 2003. San Francisco, California, USA | April 2003 | Networking | |
| Querying the Internet with PIER | R. Huebsch, J.M. Hellerstein, N. Lanham, B.T. Loo, S. Shenker, and I. Stoica | Proceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003), Berlin, Germany | September 2003 | Networking | [PDF]
|
| A Simple Algorithm for Finding Frequent Elements in Streams and Bags | R.M. Karp, S. Shenker, and C.H. Papadimitriou | ACM Transactions on Database Systems, Vol. 28, Issue 1, pp. 51-55 | March 2003 | Networking | [PDF]
|
| Designing DCCP: Congestion Control Without Reliability | E. Kohler, M. Handley, and S. Floyd | May 2003 | May 2003 | Networking | [PDF]
|
| On the Convergence of Statistical Techniques for Estimating Network Traffic Demands | A. Medina, K. Salamatian, N. Taft, I. Matta, Y. Tsang, and C. Diot | Submitted for publication 2003 | February 2003 | Networking | |
| Inside the Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | IEEE Magazine of Security and Privacy, Vol. 1, Issue 4, pp. 33-39 | July 2003 | Networking | [PDF]
|
| The Spread of the Sapphire/Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | The Cooperative Association for Internet Data Analysis Technical Report | February 2003 | Networking | |
| A High-level Programming Environment for Packet Trace Anonymization and Transformation | R. Pang and V. Paxson | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2003), Karlsruhe, Germany | August 2003 | Networking | [PDF]
|
| On Selfish Routing in Internet-Like Environments | L. Qiu, Y.R. Yang, Y. Zhang, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM), Karlsruhe, Germany | August 2003 | Networking | [PDF]
|
| Load Balancing in Structured P2P Systems | A. Rao, K. Lakshminaryanan, S. Surana, R. M. Karp, and I. Stoica | Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, California | February 2003 | Networking | [PDF]
|
| Geographic Routing Without Location Information | A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, and I. Stoica | Proceedings of ACM MOBICOMM 2003, San Diego, California | September 2003 | Networking | |
| Range Queries Over DHTs | S. Ratnasamy, J. M. Hellerstein, and S. Shenker | Intel Research Technical Report, IRB-TR-03-011 | June 25 2003 | Networking | |
| Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table | S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Gvoindan, L. Yin, and F. Yu | ACM MONET | 2003 | Networking | |
| Active Mapping: Resisting NIDS Evasion Without Altering Traffic | U. Shankar and V. Paxson | Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California | May 2003 | Networking | [PDF]
|
| Enhancing Byte-Level Network Intrusion Detection Signatures with Context | R. Sommer and V. Paxson | Proceedings of ACM CCS | 2003 | Networking | |
| Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed Networks | I. Stoica, S. Shenker, and H. Zhang | IEEE/ACM Transactions on Networking, Vol. 11, Issue 1, pp. 33-46. (A previous version appeared in the proceedings of the ACM's Special Interest Group on Data Communication (SIGCOMM'98), Vancouver, Canada, August 1998, pp. 118-130.) | February 2003 | Networking | [PDF]
|
| Post Placement C-Slow Retiming for the Xilinx Virtex FPGA | N. Weaver, Y. Markovskiy, Y. Patel, and J. Wawrzynek | Eleventh ACM Symposium of Field Programmable Gate Arrays (FPGA) | 2003 | Networking | [PDF]
|
| A Taxonomy of Computer Worms | N. Weaver, V. Paxson, S. Staniford, and R. Cunningham | Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003), Washington, DC, pp. 11-18 | October 2003 | Networking | [PDF]
|