| Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAM | A.F. Gomez Skarmeta and P.M. Ruiz | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Recommendations on queue management and congestion avoidance in the internet | B. Braden, D. Clark, J. Crowcroft, B. Davie, S. Deering, D. Estrin, S. Floyd, V. Jacobson, G. Minshall, C. Partridge, L. Peterson, K. Ramakrishnan, S. Shenker, J. Wroclawski, and L. Zhang | Request for Comments (Informational) 2309, Internet Engineering Task Force | April 1998 | Networking | |
| RAP: An End-to-End Rate-Based Congestion Control Mechanism for Realtime Streams in the Internet | R. Rejaie, M. Handley, and D. Estrin | Proceedings of Infocom 1999. | 1999 | Networking | |
| Range Queries Over DHTs | S. Ratnasamy, J. M. Hellerstein, and S. Shenker | Intel Research Technical Report, IRB-TR-03-011 | June 25 2003 | Networking | |
| Randomized Rumor Spreading | R. M. Karp, C. Schindelhauer, S. Shenker, and B. Vocking | FOCS 2000, pp. 565-574 | 2000 | Networking | |
| Random Early Detection Gateways for Congestion Avoidance | S. Floyd and V. Jacobson | IEEE/ACM Transactions on Networking, Vol. 1, No. 4, pp. 397-413 | August 1993 | Networking | |
| Querying the Internet with PIER | R. Huebsch, J.M. Hellerstein, N. Lanham, B.T. Loo, S. Shenker, and I. Stoica | Proceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003), Berlin, Germany | September 2003 | Networking | [PDF]
|
| Quality Adaptation for Congestion Controlled Playback Video Over the Internet | R. Rejaie, M. Handley, and D. Estrin | Proceedings of ACM SIGCOMM '99, Cambridge, September 1999. | September 1999 | Networking | |
| QoS and Micromobility Coupling Integrated with UMTS | L.A. Galindo and P. M. Ruiz | Proceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, Spain | September 2004 | Networking | [PDF]
|
| Prudent Practices for Designing Malware Experiments: Status Quo and Outlook | C. Rossow, C. J. Dietrich, C. Kreibich, C. Grier, V. Paxson, N. Pohlmann, H. Bos, and M. van Steen | Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, California, pp. 65-79 | May 2012 | Networking | [PDF]
|
| Proxy Caching Mechanism for Multimedia Playback Streams in the Internet | R. Rejaie, M. Handley, H. Yu, and D. Estrin | Proceedings of the Fourth International Web Caching Workshop, San Diego, California, March 31 - April 2, 1999. | March 1999 | Networking | |
| Providing QoS through Machine Learning-Driven Adaptive Multimedia Applications | P. M. Ruiz, J. Botia, and A. Gomez-Skarmeta | IEEE Transactions on Systems, Man, and Cybernetics, Part-B, Vol. 34, No. 3, pp. 1398-1422 | June 2004 | Networking | |
| Providing Packet Obituaries | K. Argyraki, P. Maniatis, D. Cheriton, and Scott Shenker | Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Protocol-Independent Adaptive Replay of Application Dialog | W. Cui, V. Paxson, N. Weaver, and R.H. Katz | Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06), San Diego, California | February 2006 | Networking | [PDF]
|
| Promoting the Use of End-to-End Congestion Control in the Internet | S. Floyd and K. Fall | IEEE/ACM Transactions on Networking, August 1999. Winner of the Communications Society William R. Bennett Prize Paper Award, 1999. | August 1999 | Networking | |
| Prolac: a language for protocol compilation | E. Kohler | Master's thesis, Massachusetts Institute of Technology | September 1997 | Networking | |
| Programming Language Techniques for Modular Router Configurations | E. Kohler, B. Chen, M.F. Kaashoek, R. Morris, and M. Poletto | MIT Laboratory for Computer Science technical report MIT-LCS-TR-812, August 2000. | August 2000 | Networking | |
| Programming Language Optimizations for Modular Router Configurations | E. Kohler, R. Morris, and B. Chen | Proceedings of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, California, October 2002, pages 251-263. | October 2002 | Networking | |
| Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, Germany | C. Kreibich and M. Jahnke, eds. | Springer | 2010 | Networking | |
| Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Canada | S. Jha, R. Sommer, and C. Kreibich, eds. | Springer Verlag | September 2010 | Networking | |
| Probe and Pray: Using UPnP for Home Network Measurements | L. DiCioccio, R. Teixeira, M. May, and C. Kreibich | Proceedings of the 13th Passive and Active Measurement Conference (PAM 2012), pp. 96-105, Vienna, Austria | March 2012 | Networking | [PDF]
|
| Privacy in Online Social Lending | R. Boehme and S. Poetzsch | Proceedings of the AAAI 2010 Spring Symposium on Intelligent Information Privacy Management, Palo Alto, California, pp. 23-28 | March 2010 | Networking | [PDF]
|
| Principles for Developing Comprehensive Network Visibility | M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver | Proceedings of the Third USENIX Workshop on Hot Topics in Security (HotSec ’08), San Jose, California | July 2008 | Networking | [PDF]
|
| Priceless: The Role of Payments in Abuse-Advertised Goods | D. McCoy, H. Dharmdasani, C. Kreibich, G. M. Voelker, and S. Savage | Proceedings of the 19th ACM Conference on Computer and Communications Society (CCS 2012), pp. 845-856, Raleigh, North Carolina | October 2012 | Networking | |
| Preliminary Results Using ScaleDown to Explore Worm Dynamics | N. Weaver, I. Hamadeh, G. Kesidis, and V. Paxson | Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, Virginia | October 2004 | Networking | [PDF]
|
| Predicting the Resource Consumption of Network Intrusion Detection Systems | H. Dreger, A. Feldmann, V. Paxson, and R. Sommer | Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2008), Cambridge, Massachusetts, pp. 135-154 | September 2008 | Networking | [PDF]
|
| Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia | G. Schryen | Proceedings of the Workshop on e-Business (WEB 2008), Paris, France, pp. 37-50 | December 2008 | Networking | [PDF]
|
| Practical Declarative Network Management | T. L. Hinrichs, N. S. Gude, M. Casado, J. C. Mitchell, and S. Shenker | Proceedings of the First ACM Workshop on Research on Enterprise Networking (WREN 2009), Barcelona, Spain, pp. 1-10. DOI:http://doi.acm.org/10.1145/1592681.1592683 | August 2009 | Networking | [PDF]
|
| Practical Data-Centric Storage | C. T. Ee, S. Ratnasamy, and S. Shenker | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 325-338 | May 2006 | Networking | [PDF]
|
| Practical and Robust Geographic Routing in Wireless Networks | Y. Kim, R. Govindan, B. Karp, and S. Shenker | Submitted to Mobicom | January 05 2004 | Networking | |
| Posted Price Profit Maximization for Multicast by Approximating Fixed Points | A. Mehta, S. Shenker, and V. Vazirani | Journal of Algorithms, Vol. 58, Issue 2, pp. 150-164 | February 2006 | Networking | |
| Post Placement C-Slow Retiming for the Xilinx Virtex FPGA | N. Weaver, Y. Markovskiy, Y. Patel, and J. Wawrzynek | Eleventh ACM Symposium of Field Programmable Gate Arrays (FPGA) | 2003 | Networking | [PDF]
|
| Policy-Controlled Event Management for Distributed Intrusion Detection | C. Kreibich and R. Sommer | Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05), Columbus, Ohio, Vol. 4, pp. 385-391 | June 2005 | Networking | [PDF]
|
| Pktd: A Packet Capture and Injection Daemon | J. Gonzalez and V. Paxson | Proceedings of Passive and Active Measurement Workshop (PAM-2003), La Jolla, California, pp. 87-96 | April 2003 | Networking | [PDF]
|
| PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs | D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. Levchenko | Proceedings of the 21st USENIX Security Symposium, Bellevue, Washington | August 2012 | Networking | [PDF]
|
| Petri Net Based Performance Evaluation of USAIA's Bandwidth Partitioning for the Wireless Cell Level | J. Sokol and D. Tutsch | PNPN Petri nets and Performance Models, September 2001. | September 2001 | Networking | |
| Personal Namespaces | M. Allman | Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| Peering Peer-to-Peer Providers | H. Balakrishnan, S. Shenker, and M. Walfish | Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 104-114 | February 2005 | Networking | [PDF]
|
| Peer to Peer Edge Caches Should Be Free | N. Weaver | Proceedings of the 37th Research Conference on Communication, Information, and Internet Policy, Arlington, Virginia | September 2009 | Networking | [PDF]
|
| Pathlet Routing | P. B. Godfrey, S. Shenker, and I. Stoica | Proceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 97-102 | October 2008 | Networking | [PDF]
|
| Pathlet Routing | P. Godfrey, I. Ganichev, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2009), Barcelona, Spain, pp. 111-122 | August 2009 | Networking | [PDF]
|
| Parallel Sorting with Limited Bandwidth | M. Adler, J. Byers, and R. M. Karp | SIAM Journal of Computing Vol. 29, No. 6, pp. 1997-2015 | 2000 | Networking | |
| PACMan: Coordinated Memory Caching for Parallel Jobs | G. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, California | April 2012 | Networking | [PDF]
|
| Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination | A. Anand, A. Gupta, A. Akella, S. Seshan, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), San Diego, California, pp. 219-230 | August 2008 | Networking | [PDF]
|
| Overcoming the Internet Impasse through Virtualization | L. Peterson, S. Shenker, and J.Turner | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| OverCite: A Cooperative Digital Research Library | J. Stribling, I. Councill, J. Li, M. Frans Kaashoek, D. R. Karger, R. Morris, and S. Shenker | Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 69-79 | February 2005 | Networking | [PDF]
|
| Outside the Closed World: On Using Machine Learning for Network Intrusion Detection | R. Sommer and V. Paxson | Proceedings of the IEEE Symposium on Security and Privacy 2010, Oakland, California, pp. 305-316 | May 2010 | Networking | [PDF]
|
| Optimization Problems in Congestion Control | R.M. Karp, E. Koutsoupias, C.H. Papadimitriou, and S. Shenker | Proceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS 2000), Redondo Beach, California, pp. 66-74 | November 2000 | Networking | [PDF]
|
| Optimal Information Security Investment with Penetration Testing | R. Boehme and M. Felegyhazi | Proceedings of the Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany, 21-37 | November 2010 | Networking | [PDF]
|
| Opportunistic Measurement: Extracting Insight from Spurious Traffic | M. Casado, T. Garfinkel, W. Cui, V. Paxson, and S. Savage | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|