Publication Search Results

TitleAuthorBibliographicDateGroupLinkssort ascending
Polylogarithmic InapproximabilityE. Halperin and R. KrauthgamerProceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC), 585-594 2003Algorithms
A Gambling Game and its Application to the Analysis of Adaptive Randomized RoundingR.M. Karp and C. KenyonSpringer-Verlag Lecture Notes in Computer Science, Volume 2764 (RANDOM 03), 329-340 2003Algorithms
Load Balancing in Structured P2P SystemsR.M. Karp, A. Rao, K. Lakshminarayanan, S. Surana, and I. StoicaProceedings of the Second International Workshop on Peer-to-Peer Systems 2003Algorithms
A Simple Algorithm for Finding Frequent Elements in Streams and BagsR.M. Karp, S. Shenker, and C.H. PapadimitriouTransactions on Database Systems 2003Algorithms
Conserved Pathways Within Bacteria and Yeast as Revealed by Global Protein Network AlignmentB. P. Kelley, R. Sharan, R. M. Karp, E.T. Sittler, D. E. Root, B. R. Stockwell, and T. IdekerProceedings of the National Academy of Sciences of the United States of America, Vol. 100, No. 20, pp. 11394-11399. DOI:10.1073/pnas.1534710100.September 2003Algorithms[PDF]

Idetifying Blocks and Sub-Populations in Noisy SNP DataG. Kimmel, R. Sharan, and R. ShamirProceedings of the Third Workshop on Algorithms in Bioinformatics (WABI'03), pp. 303-319 2003Algorithms
Regularizers and Priors for Feed-Forward NetworksJ. Moody and T. RognvaldssonSubmitted for publication 2003 2003Algorithms
Detecting Excess Radical Replacements in Phylogenetic TreesT. Pupko, R. Sharan, M. Hasegawa, R. Shamir, and D. GraurGene, 319, pp. 127-135 2003Algorithms
Load Balancing in Structured P2P SystemsA. Rao, K. Lakshminarayanan, S. Surana, R.M. Karp, and I. StoicaSecond International Workshop on Peer-to-Peer Systems 2003Algorithms
CLICK and EXPANDER: A System for Clustering and Visualizing Gene Expression DataR. Sharan, A. Maron-Katz, and R. ShamirBioinformatics, 19, pp. 1787-1799 2003Algorithms
CRÈME: A Framework for Identifying Cis-Regulatory Modules in Human-Mouse Conserved SegmentsR. Sharan, I. Ovcharenko, A. Ben-Hur, and R. M. KarpProceedings of the Eleventh International Conference on Intelligent Systems for Molecular Biology (ISMB'03), Bioinformatics 19, Supplement 1, pp. 1283-1291 2003Algorithms
LOGOS: A Modular Bayesian Model for de Novo Motif DetectionE.P. Xing, W. Wu, M. Jordan, and R.M. KarpProceedings of IEEE Computer Society Bioinformatic Conference IPTPS 2003Algorithms
The SFRA: A Corner-Turn FPGA ArchitectureN. Weaver, J. Hauser and J. WawrzynekProceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12February 2004Networking[PDF]

Achieving Fairness Through Selective Early DroppingJ. Scott and R.M. Karppreprint 2004. 2004Networking
Finite-Length Analysis of LT-codesR.M. Karp, M. Luby, and A. ShokrollahiSubmitted to International Symposium on Information Theory (ISIT '04). 2004Networking
Load Balancing in Dynamic Structured P2P SystemsB. Godfrey, R.M. Karp, K. Lakshminarayanan, S. Surana, and I. StoicaProceedings of INFOCOMM, 2004 2004Networking
New Techniques for Making Transport Protocols Robust to Corruption-Based LossW. Eddy, S. Ostermann, and M. AllmanACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88October 2004Networking[PDF]

Search Strategies in Inter-Domain Traffic EngineeringK. Chandrayana, R.M. Karp, M. Roughan, S. Sen, and Y. Zhangpreprint 2004 2004Networking
A Stochastic Process on the Hypercube with Applications to Peer-to-peer NetworksM. Adler, E. Halperin, R. M. Karp, and V VaziraniProceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC 2003), San Diego, California, pp. 575-584June 2003Networking[PDF]

On the Performance of MiddleboxesM. AllmanACM SIGCOMM/Usenix Internet Measurement Conference, Miami, FL, USAOctober 2003Networking
An Evaluation of XML-RPCM. AllmanACM Performance Evaluation Review, 30(4)March 2003Networking
TCP Congestion Control with Appropriate Byte Counting (ABC)M. AllmanRFC 3465February 2003Networking
Estimating Loss Rates With TCPM. Allman, W. Eddy, and S. OstermannACM Performance Evaluation Review, 31(3)December 2003Networking
A Conservative Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm for TCPE. Blanton, M. Allman, K. Fall, and L. WangRFC 3517April 2003Networking
Making Gnutella-Like P2P Systems ScalableY. Chawathe, S. Ratnasamy, L. Breslau, and S. ShenkerProceedings of ACM SIGCOMM 2003Networking
A Comparison of RED's Byte and Packet ModesW. Eddy and M. AllmanComputer Networks, 42(2)June 2003Networking
Mechanism Design for Policy RoutingJ. Feigenbaum, R. Sami, and S. ShenkerYale University Technical Report YALEU/DCS/TR-1258November 2003Networking
Pktd: A Packet Capture and Injection DaemonJ. Gonzalez and V. PaxsonProceedings of Passive and Active Measurement Workshop (PAM-2003), La Jolla, California, pp. 87-96April 2003Networking[PDF]

DIFS: A Distributed Index for Features in Sensor NetworksB. Greenstein, D. Estrin, R. Govindan, S. Ratnasamy, and S. ShenkerElsevier Journal of Ad Hoc Networks, 2003. (Also in the First IEEE Workshop on Sensor Networks Protocols and Applications, SNPA, 2003) 2003Networking
The Impact of DHT Routing Geometry on Resilience and ProximityK. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. StoicaProceedings of ACM SIGCOMM 2003, Karlruhe, GermanyAugust 2003Networking
Modeling Wireless Links for Transport ProtocolsA. Gurtov and S. FloydACM Computer Communications Review, Vol. 34, No. 2, pp. 85-96April 2004Networking[PDF]

RFC 3448: TCP Friendly Rate Control (TFRC): Protocol SpecificationM. Handley, S. Floyd, J. Pahdye, and J. WidmerRFC 3448, Proposed StandardJanuary 2003Networking[PDF]

A Framework for Incremental Deployment Strategies for Router-Assisted ServicesX. He, C. Papadopoulos, and P. RadoslavovProceedings of the IEEE Infocom 2003. San Francisco, California, USAApril 2003Networking
Querying the Internet with PIERR. Huebsch, J.M. Hellerstein, N. Lanham, B.T. Loo, S. Shenker, and I. StoicaProceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003), Berlin, GermanySeptember 2003Networking[PDF]

A Simple Algorithm for Finding Frequent Elements in Streams and BagsR.M. Karp, S. Shenker, and C.H. PapadimitriouACM Transactions on Database Systems, Vol. 28, Issue 1, pp. 51-55March 2003Networking[PDF]

Designing DCCP: Congestion Control Without ReliabilityE. Kohler, M. Handley, and S. FloydMay 2003May 2003Networking[PDF]

On the Convergence of Statistical Techniques for Estimating Network Traffic DemandsA. Medina, K. Salamatian, N. Taft, I. Matta, Y. Tsang, and C. DiotSubmitted for publication 2003February 2003Networking
Inside the Slammer WormD. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. WeaverIEEE Magazine of Security and Privacy, Vol. 1, Issue 4, pp. 33-39July 2003Networking[PDF]

The Spread of the Sapphire/Slammer WormD. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. WeaverThe Cooperative Association for Internet Data Analysis Technical ReportFebruary 2003Networking
A High-level Programming Environment for Packet Trace Anonymization and TransformationR. Pang and V. PaxsonProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2003), Karlsruhe, GermanyAugust 2003Networking[PDF]

On Selfish Routing in Internet-Like EnvironmentsL. Qiu, Y.R. Yang, Y. Zhang, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM), Karlsruhe, GermanyAugust 2003Networking[PDF]

Load Balancing in Structured P2P SystemsA. Rao, K. Lakshminaryanan, S. Surana, R. M. Karp, and I. StoicaProceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, CaliforniaFebruary 2003Networking[PDF]

Geographic Routing Without Location InformationA. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, and I. StoicaProceedings of ACM MOBICOMM 2003, San Diego, CaliforniaSeptember 2003Networking
Range Queries Over DHTsS. Ratnasamy, J. M. Hellerstein, and S. ShenkerIntel Research Technical Report, IRB-TR-03-011June 25 2003Networking
Data-Centric Storage in Sensornets with GHT, a Geographic Hash TableS. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Gvoindan, L. Yin, and F. YuACM MONET 2003Networking
Active Mapping: Resisting NIDS Evasion Without Altering TrafficU. Shankar and V. PaxsonProceedings of the IEEE Symposium on Security and Privacy, Oakland, CaliforniaMay 2003Networking[PDF]

Enhancing Byte-Level Network Intrusion Detection Signatures with ContextR. Sommer and V. PaxsonProceedings of ACM CCS 2003Networking
Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed NetworksI. Stoica, S. Shenker, and H. ZhangIEEE/ACM Transactions on Networking, Vol. 11, Issue 1, pp. 33-46. (A previous version appeared in the proceedings of the ACM's Special Interest Group on Data Communication (SIGCOMM'98), Vancouver, Canada, August 1998, pp. 118-130.)February 2003Networking[PDF]

Post Placement C-Slow Retiming for the Xilinx Virtex FPGAN. Weaver, Y. Markovskiy, Y. Patel, and J. WawrzynekEleventh ACM Symposium of Field Programmable Gate Arrays (FPGA) 2003Networking[PDF]

A Taxonomy of Computer WormsN. Weaver, V. Paxson, S. Staniford, and R. CunninghamProceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003), Washington, DC, pp. 11-18October 2003Networking[PDF]

Pages