| The Architecture of PIER: An Internet-Scale Query Processor | R. Huebsch, B. Chun, J. M. Hellerstein, B. T. Loo, P. Maniatis, T. Roscoe, S. Shenker, I. Stoica, and A. R. Yumerefendi | Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, California, pp. 28-43 | January 2005 | Networking | [PDF]
|
| Reduced State Routing in the Internet | R. Gummadi, N. Kothari, Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Estimating Router ICMP Generation Delays | R. Govindan and V. Paxson | Proceedings of Passive & Active Measurement: PAM-2002. | 2002 | Networking | |
| An Analysis of The Internal Structure of Large Autonomous Systems | R. Govindan and P. Radoslavov | Computer Science Department, University of Southern California Technical Report No. 02-777, Los Angeles, California | November 2002 | Networking | |
| Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets | R. Fonseca, S. Ratnasamy, J. Zhao, C. Tien Ee, D. Culler, S. Shenker, and I. Stoica | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 329-342 | May 2005 | Networking | [PDF]
|
| X-Trace: A Pervasive Network Tracing Framework | R. Fonseca, G. Porter, R.H. Katz, S. Shenker, and I. Stoica | Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Cambridge, Massachusetts, pp. 271-284 | April 2007 | Networking | [PDF]
|
| The Iterated Weakest Link | R. Böhme and T. Moore | IEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55 | January 2010 | Networking | [PDF]
|
| Privacy in Online Social Lending | R. Boehme and S. Poetzsch | Proceedings of the AAAI 2010 Spring Symposium on Intelligent Information Privacy Management, Palo Alto, California, pp. 23-28 | March 2010 | Networking | [PDF]
|
| Trained to Accept? A Field Experiment on Consent Dialogs | R. Boehme and S. Koepsell | Proceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406 | April 2010 | Networking | [PDF]
|
| Optimal Information Security Investment with Penetration Testing | R. Boehme and M. Felegyhazi | Proceedings of the Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany, 21-37 | November 2010 | Networking | [PDF]
|
| Modeling Cyber-Insurance: Towards a Unifying Framework | R. Boehme and G. Schwartz | Proceedings of the 9th Workshop on the Economics of Information Security (WEIS 2010), Cambridge, Massachusetts | June 2010 | Networking | [PDF]
|
| Towards Insurable Network Architectures | R. Boehme | Journal of Information Technology, Vol. 52, No. 5, pp. 290-293 | September 2010 | Networking | |
| Findings and Implications from Data Mining the IMC Review Process | R. Beverly and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 3, No. 1, pp. 23-29 | January 2013 | Networking | [PDF]
|
| RFC 3869: IAB Concerns & Recommendations Regarding Internet Research & Evolution | R. Atkinson and S. Floyd | RFC 3869 | August 2004 | Networking | [PDF]
|
| Can Heterogeneity Make Gnutella Scalable? | Q. Lv, S. Ratnasamy, and S. Shenker | The First International Workshop on Peer-to-Peer Systems (IPTPS): 94-103, 2002. | 2002 | Networking | |
| Search and Replication in Unstructured Peer-to-Peer Networks | Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker | Proceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002), Marina Del Rey, California, pp. 258-259 | June 2002 | Networking | |
| Search and Replication in Unstructured Peer-to-Peer Networks | Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker | Proceedings of the 16th International Conference on Supercomputing (ICS-02), New York, New York, pp. 84-95 | June 2002 | Networking | [PDF]
|
| The Origin of Power-Laws in Internet Topologies Revisited | Q. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger | INFOCOM, 2002. | 2002 | Networking | |
| Aproximacion de Arboles Multicast Optimos en Redes Ad Hoc Inalambricas | P.M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Heuristic Algorithms for Minimum Bandwidth Consumption Multicast Trees in Wireless Mesh Networks | P.M. Ruiz and A.F. Gomez Skarmeta | Lecture Notes in Computer Science, Vol. 3738, pp. 258–270 | October 2005 | Networking | |
| The Network Block Device | P. T. Breuer, A. Marín Lopez, and A. García Ares | Linux Journal, Vol. 73 | May 2000 | Networking | |
| Scalable Timers for Soft State Protocols | P. Sharma, D. Estrin, S. Floyd, and V. Jacobson | Proceedings of the Conference on Computer Communications, 16th Annual Joint Conference of the IEEE Computer and Communications Societies, Driving the Information Revolution (IEEE INFOCOM 1997), Kobe, Japan, pp. 222-229 | April 1997 | Networking | |
| Scalable Session Messages in SRM | P. Sharma, D. Estrin, S. Floyd, and L. Zhang | Technical report | February 1998 | Networking | |
| Determining an Appropriate Sending Rate Over an Underutilized Network Path | P. Sarolahti, M. Allman, and S. Floyd | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 51, Issue 7, pp. 1815-1832. DOI:10.1016/j.comnet.2006.11.006 | May 2007 | Networking | [PDF]
|
| Topology-Informed Internet Replica Placement | P. Radoslavov, R. Govindan, and D. Estrin | Proceedings of the Sixth International Workshop on Web Caching and Content Distribution, Boston University, Boston, Massachusetts, USA, June 20-22, 2001. | June 20 2001 | Networking | |
| On Characterizing Network Topologies and Analyzing Their Impact on Protocol Design | P. Radoslavov, H. Tangmunarunkit, H. Yu, R. Govindan, S. Shenker, and D. Estrin | Technical Report 00-731, Computer Science Department, University of Southern California, February 2000. | February 2000 | Networking | |
| The Multicast Address-Set Claim (MASC) Protocol | P. Radoslavov, D. Estrin, R. Govindan, M. Handley, S. Kumar, and D. Thaler | Request for Comments 2909, Experimental, September 2000. | September 2000 | Networking | |
| Exploiting the Bandwidth-Memory Tradeoff in Multicast State Aggregation | P. Radoslavov, D. Estrin, and R. Govindan | Technical Report 99-697, Computer Science Department, University of Southern California, July 1999. | July 1999 | Networking | |
| A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast | P. Radoslavov, C. Papadopoulos, R. Govindan, and D. Estrin | IEEE/ACM Transactions on Networking (TON), Volume 12, Issue 3, pp. 469-482 | June 05 2004 | Networking | |
| A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast | P. Radoslavov, C. Papadopoulos, R. Govindan, and D. Estrin | Proceedings of the IEEE Infocom 2001, Anchorage, Alaska, USA, April 22-26, 2001. | April 22 2001 | Networking | |
| An Algorithm for Cost-Delay Balanced Trees and Its Application to Wide Area Network Multicast | P. Radoslavov and T. Tokuda | Proceedings of the First International Conference on Worldwide Computing and Its Applications, Tsukuba, Japan | March 1997 | Networking | |
| The Relationship Between Topology and Protocol Performance: Case Studies | P. Radoslavov | PhD Dissertation, Computer Science Department, University of Southern California, December 2001. | December 2001 | Networking | |
| Securing Mediated Trace Access Using Black-Box Permutation Analysis | P. Mittal, V. Paxson, R. Sommer, and M. Winterrowd | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| User-Aware Adaptive Applications for Enhanced Multimedia Quality in Heterogeneous Networking Environments | P. M. Ruiz, J.A. Botia, and A.Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3079 | June 2004 | Networking | [PDF]
|
| Seamless Multimedia Communications in Heterogeneous Mobile Access Networks | P. M. Ruiz, J.A. Botia, A. Gomez-Skarmeta | Proceedings of the TERENA Networking Conference (TNC 2004), Rhodes, Greece | June 2004 | Networking | [PDF]
|
| Providing QoS through Machine Learning-Driven Adaptive Multimedia Applications | P. M. Ruiz, J. Botia, and A. Gomez-Skarmeta | IEEE Transactions on Systems, Man, and Cybernetics, Part-B, Vol. 34, No. 3, pp. 1398-1422 | June 2004 | Networking | |
| Internet Connectivity for Mobile Ad Hoc Networks: Solutions and Challenges | P. M. Ruiz, F. J. Ros, and A.F. Gomez Skarmeta | IEEE Communications Magazine, pp. 118–125 | October 2005 | Networking | |
| Integrated IP Multicast in Mobile Ad Hoc Networks with Multiple Attachments to Wired IP Networks | P. M. Ruiz and A.F. Gomez-Skarmeta | Proceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, Spain | September 2004 | Networking | [PDF]
|
| Maximal Source Coverage Adaptive Gateway Discovery for Hybrid Ad Hoc Networks | P. M. Ruiz and A.F. Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3158, pp. 28-41 | July 2004 | Networking | [PDF]
|
| Mobility-Aware Mesh Construction Algorithm for Low Data-Overhead Multicast Ad Hoc Routing | P. M. Ruiz and A.F. Gomez Skarmeta | Journal of Communications and Networks (JCN), Vol. 6, No. 4, pp. 331-342 | December 2004 | Networking | [PDF]
|
| Reducing Data-Overhead of Mesh-Based Ad Hoc Multicast Routing Protocols by Steiner Tree Meshes | P. M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), Santa Clara, California | October 2004 | Networking | [PDF]
|
| Enhanced Internet Connectivity for Hybrid Ad Hoc Networks Through Adaptive Gateway Discovery | P. M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), Tampa, Florida | November 2004 | Networking | [PDF]
|
| Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks | P. Levis, N. Patel, D. Culler, and S. Shenker | NSDI | January 05 2004 | Networking | |
| Pathlet Routing | P. Godfrey, I. Ganichev, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2009), Barcelona, Spain, pp. 111-122 | August 2009 | Networking | [PDF]
|
| An Architecture for a Global Internet Host Distance Estimation Service | P. Francis, S. Jamin, V. Paxson, L. Zhang, D. Gryniewicz, and Y. Jin | Proceedings of IEEE INFOCOM, March 1999. | March 1999 | Networking | |
| IPNL: A NAT-Extended Internet Architecture | P. Francis and R. Gummadi | SIGCOMM 2001 | 2001 | Networking | |
| An Optimal Algorithm for Monte-Carlo Estimation | P. Dagum, R. M. Karp, M. Luby, and S. Ross | SIAM Journal of Computing, Vol. 29, No. 5, pp. 1484-1496 | 2000 | Networking | |
| Minimizing Churn in Distributed Systems | P. B. Godfrey, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 147-158 | September 2006 | Networking | [PDF]
|
| Pathlet Routing | P. B. Godfrey, S. Shenker, and I. Stoica | Proceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 97-102 | October 2008 | Networking | [PDF]
|
| Incentive Compatibility and Dynamics of Congestion Control | P. B. Godfrey, M. Schapira, A. Zohar, and S. Shenker | ACM SIGMETRICS Performance Evaluation Review, Vol. 36, Issue 1, pp. 95-106 | June 2010 | Networking | [PDF]
|