| Distributed Algorithmic Mechanism Design: Recent Results and Future Directions | J. Feigenbaum and S. Shenker | Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM'02), Atlanta, Georgia, pp. 1-13 | September 2002 | Networking | [PDF]
|
| Approximation and Collusion in Multicast Cost Sharing | J. Feigenbaum, A. Archer, A. Krishnamurthy, R. Sami, and S. Shenker | Games and Economic Behavior, Vol. 47, Issue 1, pp. 36-71 | April 2004 | Networking | [PDF]
|
| Hardness Results for Multicast Cost Sharing | J. Feigenbaum, A. Krishnamurthy, R. Sami, and S. Shenker | Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2002), Kanpur, India, pp. 133-144 | December 2002 | Networking | |
| Approximation and Collusion in Multicast Cost Sharing | J. Feigenbaum, A. Krishnamurthy, R. Sami, and S. Shenker | Proceedings of the Third ACM Conference on Electronic Commerce (ACM-EE 2001), Tampa, Florida, pp. 253-255 | October 2001 | Networking | |
| Hardness Results for Multicast Cost Sharing | J. Feigenbaum, A. Krishnamurthy, R. Sami, and S. Shenker | Theoretical Computer Science, Vol. 304, Issues 1-3, pp. 215-236 | July 2003 | Networking | |
| Sharing the Cost of Multicast Transmissions | J. Feigenbaum, C. Papadimitriou, and S. Shenker | Journal of Computer and System Sciences, Vol. 63, Issue 1, pp. 21-41, 2001 | August 2001 | Networking | [PDF]
|
| Sharing the Cost of Multicast Transmissions | J. Feigenbaum, C. Papadimitriou, and S. Shenker | Thirty-Second Annual ACM Symposium on Theory of Computing (STOC00), May 2000. | May 2000 | Networking | |
| Sharing the Cost of Multicast Transmissions | J. Feigenbaum, C. Papadimitriou, and S. Shenker | Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC 2000), Portland, Oregon, pp. 218-227 | May 2000 | Networking | |
| A BGP-Based Mechanism for Lowest-Cost Routing | J. Feigenbaum, C.H. Papadimitriou, R. Sami, and S. Shenker | Proceedings of the 21st ACM Symposium on Principles of Distributed Computing (PODC 2002), Monterey, California, pp. 173-182. | July 2002 | Networking | [PDF]
|
| Distributed Algorithmic Mechanism Design | J. Feigenbaum, M. Schapira, and S. Shenker | In Algorithmic Game Theory, N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, eds., pp. 363-384, Cambridge University Press | 2007 | Networking | |
| Agents' Privacy In Distributed Algorithmic Mechanisms (Position Paper) | J. Feigenbaum, N. Nisan, V. Ramachandran, R. Sami, and S. Shenker | First Workshop on Economics and Information Security, Berkeley, California | May 2002 | Networking | |
| Mechanism Design for Policy Routing | J. Feigenbaum, R. Sami, and S. Shenker | Yale University Technical Report YALEU/DCS/TR-1258 | November 2003 | Networking | |
| Mechanism Design for Policy Routing | J. Feigenbaum, R. Sami, and S. Shenker | Distributed Computing, Vol. 18, Issue. 4, pp. 150-164 | March 2006 | Networking | [PDF]
|
| Incentive-Compatible Interdomain Routing | J. Feigenbaum, V. Ramachandran, and M. Schapira | Proceedings of the 7th ACM Conference on Electronic Commerce (EC'06), Ann Arbor, Michigan, pp. 130-139 | June 2006 | Networking | [PDF]
|
| An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | J. Franklin, V. Paxson, A. Perrig, and S. Savage | Proceedings of ACM Computer and Communication Security Conference (ACM CCS), Alexandria, Virginia, pp. 375-388 | October 2007 | Networking | [PDF]
|
| Pktd: A Packet Capture and Injection Daemon | J. Gonzalez and V. Paxson | Proceedings of Passive and Active Measurement Workshop (PAM-2003), La Jolla, California, pp. 87-96 | April 2003 | Networking | [PDF]
|
| Enhancing Network Intrusion Detection With Integrated Sampling and Filtering | J. Gonzalez and V. Paxson | Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006), Hamburg, Germany, pp. 272-289 | September 2006 | Networking | [PDF]
|
| Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention | J. Gonzalez, V. Paxson, and N. Weaver | Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008), Alexandria, Virginia, pp. 139-149 | October 2007 | Networking | [PDF]
|
| Building Efficient Wireless Sensor Networks With Low-Level Naming | J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. Ganesan | Proceedings of the Symposium on Operating Systems Principles, Banff, Canada, October 2001. | October 2001 | Networking | |
| The Network Oracle | J. Hellerstein, V. Paxson, L. Peterson, T. Roscoe, S. Shenker, and D. Wetherall | IEEE Data Engineering Bulletin, Vol. 28, No. 1, pp. 3-10 | March 2005 | Networking | [PDF]
|
| Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-Reduce | J. Hendrik Boese, A. Andrzejak, and M. Hoegqvist | Proceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010), Raleigh, North Carolina, Article No. 3 | April 2010 | Networking | |
| On the Adaptive Real-Time Detection of Fast-Propagating Network Worms | J. Jung, R. Milito, and V. Paxson | Proceedings of the Fourth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2007), Lucerne, Switzerland, pp. 175-192. Also Journal on Computer Virology, Vol. 4, No. 1, pp. 197-210, February 2008 | July 2007 | Networking | [PDF]
|
| Fast Portscan Detection Using Sequention Hypothesis Testing | J. Jung, V. Paxson, A. Berger, and H. Balakrishnan | Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 211-225 | May 2004 | Networking | |
| Detecting Hidden Causality in Network Connections | J. Kannan, J. Jung, V. Paxson, and C. E. Koksal | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2005-30, Berkeley, California | December 2005 | Networking | [PDF]
|
| Semi-Automated Discovery of Application Session Structure | J. Kannan, J. Jung, V. Paxson, and C. Koksal | Proceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 119-132 | October 2006 | Networking | [PDF]
|
| Securing Web Content | J. Koskela, N. Weaver, A. Gurtov, and M. Allman | Proceedings of the ACM CoNext Workshop on Re-Architecting the Internet (ReArch 2009), Rome, Italy, pp. 7-12 | December 2009 | Networking | [PDF]
|
| Towards QoS in IP-Based Core Networks: A Survey on Performance Management, MPLS Case | J. L. Marzo, P. Maryni, and P. Vilà | Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'2001), Orlando, Florida | July 2001 | Networking | |
| An ATM Distributed Simulator for Network Management Research | J. L. Marzo, P. Vilà, L. Fàbrega, and D. Massaguer | Proceedings of the 34th Annual Simulation Symposium (SS 2001), Seattle, Washington, pp. 185-192 | April 2001 | Networking | |
| Data-Driven Network Connectivity | J. Liu, S. Shenker, M. Schapira, and B. Yang | Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, Massachusetts | November 2011 | Networking | [PDF]
|
| IPPM Metrics for Measuring Connectivity | J. Mahdavi and V. Paxson | Request for Comments 2678, Proposed Standard, September 1999. | September 1999 | Networking | |
| Identifying the TCP Behavior of Web Servers | J. Padhye and S. Floyd | SIGCOMM 2001, August 2001. Or the ICSI Technical Report 01-002, February 2001. | 2001 | Networking | |
| A Unifying Link Abstraction for Wireless Sensor Networks | J. Polastre, J. Hui, P. Levis, J. Zhao, D. Culler, S. Shenker, and I. Stoica | Proceedings of the Third ACM Conference on Embedded Networked Sensor Systems (Sensys 2005), San Diego, California, pp. 76-89 | November 2005 | Networking | |
| Achieving Fairness Through Selective Early Dropping | J. Scott and R.M. Karp | preprint 2004. | 2004 | Networking | |
| Petri Net Based Performance Evaluation of USAIA's Bandwidth Partitioning for the Wireless Cell Level | J. Sokol and D. Tutsch | PNPN Petri nets and Performance Models, September 2001. | September 2001 | Networking | |
| OverCite: A Cooperative Digital Research Library | J. Stribling, I. Councill, J. Li, M. Frans Kaashoek, D. R. Karger, R. Morris, and S. Shenker | Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 69-79 | February 2005 | Networking | [PDF]
|
| Extending Equation-Based Congestion Control to Multicast Applications | J. Widmer and M. Handley | Proceedings of ACM SIGCOMM 2001. | 2001 | Networking | |
| Applying Fuzzy Logic to Model User Preferences on Multimedia Sessions | J.A. Botia, M. Valdes, P. M. Ruiz, and A.F. Gomez Skarmeta. | Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy, Jaen, Spain, pp. 467-470 | September 2005 | Networking | |
| User-Aware Videoconference Session Control Using Software Agents | J.A. Botia, P. Ruiz, and A. Gomez-Skarmeta | Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), Beijing, China | September 2004 | Networking | |
| Improving Delivery Ratio and Power Efficiency in Unicast Geographic Routing with a Realistic Physical Layer for Wireless Sensor Networks | J.A. Sanchez and P. M. Ruiz | Proceedings of the 9th Euromicro Conference on Digital System Design Architectures, Methods, and Tools (DSD 2006), Drubovnid, Croatia | September 2006 | Networking | |
| GMR: Geographic Multicast Routing for Wireless Sensor Networks | J.A. Sanchez, P. M. Ruiz, and I. Stojmenovic | Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Networks (IEEE SECON 2006), Reston, Virginia | September 2006 | Networking | |
| Providing Packet Obituaries | K. Argyraki, P. Maniatis, D. Cheriton, and Scott Shenker | Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Loss and Delay Accountability for the Internet | K. Argyraki, P. Maniatis, O. Irzak, A. Subramanian, and S. Shenker | Proceedings of the 15th IEEE International Conference on Network Protocols (ICNP 2007), Beijing, China, pp. 194-205 | October 2007 | Networking | [PDF]
|
| Can Software Routers Scale? | K. Argyraki, S. Baset, B. Chun, K. Fall, G. Iannaccone, A. Knies, E. Kohler, M. Manesh, S. Nedevschi, and S. Ratnasamy | Proceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO'08), Seattle, Washington | August 2008 | Networking | [PDF]
|
| Search Strategies in Inter-Domain Traffic Engineering | K. Chandrayana, R.M. Karp, M. Roughan, S. Sen, and Y. Zhang | preprint 2004 | 2004 | Networking | |
| Simulation-based Comparisons of Tahoe, Reno, and SACK TCP | K. Fall and S. Floyd | Computer Communication Review, Vol. 26, No. 3, pp. 5-21 | July 1996 | Networking | [PDF]
|
| The Impact of DHT Routing Geometry on Resilience and Proximity | K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica | Proceedings of ACM SIGCOMM 2003, Karlruhe, Germany | August 2003 | Networking | |
| End-Host Controlled Multicast Routing | K. Lakshminarayanan, A. Rao, I. Stoica, and S. Shenker | Elsevier Computer Networks, Special Issue on Overlay Distribution Structures and their Applications, Vol. 5, Issue 6, pp. 807-825. DOI:10.1016/j.comnet.2005.07.019 | April 2006 | Networking | [PDF]
|
| Routing as a Service | K. Lakshminarayanan, I. Stoica, and S. Shenker | Proceedings of the Service Architecture for Heterogeneous Access, Resources, and Applications Retreat (SAHARA 2004), Tahoe City, California | January 2004 | Networking | [PDF]
|
| Achieving Convergence-Free Routing Using Failure-Carrying Packets | K. Lakshminarayanan, M. Caesar, M. Rangan, T. Anderson, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 241 - 252 | August 2007 | Networking | [PDF]
|
| Click Trajectories: End-to-End Analysis of the Spam Value Chain | K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage | Proceedings of the IEEE Symposium on Security and Privacy, pp. 431-446, Oakland, California | May 2011 | Networking | [PDF]
|