Publication Search Results

Titlesort ascendingAuthorBibliographicDateGroupLinks
Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAMA.F. Gomez Skarmeta and P.M. RuizProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Recommendations on queue management and congestion avoidance in the internetB. Braden, D. Clark, J. Crowcroft, B. Davie, S. Deering, D. Estrin, S. Floyd, V. Jacobson, G. Minshall, C. Partridge, L. Peterson, K. Ramakrishnan, S. Shenker, J. Wroclawski, and L. ZhangRequest for Comments (Informational) 2309, Internet Engineering Task ForceApril 1998Networking
RAP: An End-to-End Rate-Based Congestion Control Mechanism for Realtime Streams in the InternetR. Rejaie, M. Handley, and D. EstrinProceedings of Infocom 1999. 1999Networking
Range Queries Over DHTsS. Ratnasamy, J. M. Hellerstein, and S. ShenkerIntel Research Technical Report, IRB-TR-03-011June 25 2003Networking
Randomized Rumor SpreadingR. M. Karp, C. Schindelhauer, S. Shenker, and B. VockingFOCS 2000, pp. 565-574 2000Networking
Random Early Detection Gateways for Congestion AvoidanceS. Floyd and V. JacobsonIEEE/ACM Transactions on Networking, Vol. 1, No. 4, pp. 397-413August 1993Networking
Querying the Internet with PIERR. Huebsch, J.M. Hellerstein, N. Lanham, B.T. Loo, S. Shenker, and I. StoicaProceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003), Berlin, GermanySeptember 2003Networking[PDF]

Quality Adaptation for Congestion Controlled Playback Video Over the InternetR. Rejaie, M. Handley, and D. EstrinProceedings of ACM SIGCOMM '99, Cambridge, September 1999.September 1999Networking
QoS and Micromobility Coupling Integrated with UMTSL.A. Galindo and P. M. RuizProceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, SpainSeptember 2004Networking[PDF]

Prudent Practices for Designing Malware Experiments: Status Quo and OutlookC. Rossow, C. J. Dietrich, C. Kreibich, C. Grier, V. Paxson, N. Pohlmann, H. Bos, and M. van SteenProceedings of the 33rd IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, California, pp. 65-79May 2012Networking[PDF]

Proxy Caching Mechanism for Multimedia Playback Streams in the InternetR. Rejaie, M. Handley, H. Yu, and D. EstrinProceedings of the Fourth International Web Caching Workshop, San Diego, California, March 31 - April 2, 1999.March 1999Networking
Providing QoS through Machine Learning-Driven Adaptive Multimedia ApplicationsP. M. Ruiz, J. Botia, and A. Gomez-SkarmetaIEEE Transactions on Systems, Man, and Cybernetics, Part-B, Vol. 34, No. 3, pp. 1398-1422June 2004Networking
Providing Packet ObituariesK. Argyraki, P. Maniatis, D. Cheriton, and Scott ShenkerProceedings of the Third Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

Protocol-Independent Adaptive Replay of Application DialogW. Cui, V. Paxson, N. Weaver, and R.H. KatzProceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06), San Diego, CaliforniaFebruary 2006Networking[PDF]

Promoting the Use of End-to-End Congestion Control in the InternetS. Floyd and K. FallIEEE/ACM Transactions on Networking, August 1999. Winner of the Communications Society William R. Bennett Prize Paper Award, 1999.August 1999Networking
Prolac: a language for protocol compilationE. KohlerMaster's thesis, Massachusetts Institute of TechnologySeptember 1997Networking
Programming Language Techniques for Modular Router ConfigurationsE. Kohler, B. Chen, M.F. Kaashoek, R. Morris, and M. PolettoMIT Laboratory for Computer Science technical report MIT-LCS-TR-812, August 2000.August 2000Networking
Programming Language Optimizations for Modular Router ConfigurationsE. Kohler, R. Morris, and B. ChenProceedings of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, California, October 2002, pages 251-263.October 2002Networking
Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, GermanyC. Kreibich and M. Jahnke, eds.Springer 2010Networking
Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, CanadaS. Jha, R. Sommer, and C. Kreibich, eds.Springer VerlagSeptember 2010Networking
Probe and Pray: Using UPnP for Home Network MeasurementsL. DiCioccio, R. Teixeira, M. May, and C. KreibichProceedings of the 13th Passive and Active Measurement Conference (PAM 2012), pp. 96-105, Vienna, AustriaMarch 2012Networking[PDF]

Privacy in Online Social LendingR. Boehme and S. PoetzschProceedings of the AAAI 2010 Spring Symposium on Intelligent Information Privacy Management, Palo Alto, California, pp. 23-28March 2010Networking[PDF]

Principles for Developing Comprehensive Network VisibilityM. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. WeaverProceedings of the Third USENIX Workshop on Hot Topics in Security (HotSec ’08), San Jose, CaliforniaJuly 2008Networking[PDF]

Priceless: The Role of Payments in Abuse-Advertised GoodsD. McCoy, H. Dharmdasani, C. Kreibich, G. M. Voelker, and S. SavageProceedings of the 19th ACM Conference on Computer and Communications Society (CCS 2012), pp. 845-856, Raleigh, North CarolinaOctober 2012Networking
Preliminary Results Using ScaleDown to Explore Worm DynamicsN. Weaver, I. Hamadeh, G. Kesidis, and V. PaxsonProceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, VirginiaOctober 2004Networking[PDF]

Predicting the Resource Consumption of Network Intrusion Detection SystemsH. Dreger, A. Feldmann, V. Paxson, and R. SommerProceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2008), Cambridge, Massachusetts, pp. 135-154September 2008Networking[PDF]

Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in EstoniaG. SchryenProceedings of the Workshop on e-Business (WEB 2008), Paris, France, pp. 37-50December 2008Networking[PDF]

Practical Declarative Network ManagementT. L. Hinrichs, N. S. Gude, M. Casado, J. C. Mitchell, and S. ShenkerProceedings of the First ACM Workshop on Research on Enterprise Networking (WREN 2009), Barcelona, Spain, pp. 1-10. DOI:http://doi.acm.org/10.1145/1592681.1592683August 2009Networking[PDF]

Practical Data-Centric StorageC. T. Ee, S. Ratnasamy, and S. ShenkerProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 325-338May 2006Networking[PDF]

Practical and Robust Geographic Routing in Wireless NetworksY. Kim, R. Govindan, B. Karp, and S. ShenkerSubmitted to MobicomJanuary 05 2004Networking
Posted Price Profit Maximization for Multicast by Approximating Fixed PointsA. Mehta, S. Shenker, and V. VaziraniJournal of Algorithms, Vol. 58, Issue 2, pp. 150-164February 2006Networking
Post Placement C-Slow Retiming for the Xilinx Virtex FPGAN. Weaver, Y. Markovskiy, Y. Patel, and J. WawrzynekEleventh ACM Symposium of Field Programmable Gate Arrays (FPGA) 2003Networking[PDF]

Policy-Controlled Event Management for Distributed Intrusion DetectionC. Kreibich and R. SommerProceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05), Columbus, Ohio, Vol. 4, pp. 385-391June 2005Networking[PDF]

Pktd: A Packet Capture and Injection DaemonJ. Gonzalez and V. PaxsonProceedings of Passive and Active Measurement Workshop (PAM-2003), La Jolla, California, pp. 87-96April 2003Networking[PDF]

PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate ProgramsD. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. LevchenkoProceedings of the 21st USENIX Security Symposium, Bellevue, WashingtonAugust 2012Networking[PDF]

Petri Net Based Performance Evaluation of USAIA's Bandwidth Partitioning for the Wireless Cell LevelJ. Sokol and D. TutschPNPN Petri nets and Performance Models, September 2001.September 2001Networking
Personal NamespacesM. AllmanProceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, GeorgiaNovember 2007Networking[PDF]

Peering Peer-to-Peer ProvidersH. Balakrishnan, S. Shenker, and M. WalfishProceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 104-114February 2005Networking[PDF]

Peer to Peer Edge Caches Should Be FreeN. WeaverProceedings of the 37th Research Conference on Communication, Information, and Internet Policy, Arlington, VirginiaSeptember 2009Networking[PDF]

Pathlet RoutingP. B. Godfrey, S. Shenker, and I. StoicaProceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 97-102October 2008Networking[PDF]

Pathlet RoutingP. Godfrey, I. Ganichev, S. Shenker, and I. StoicaProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2009), Barcelona, Spain, pp. 111-122August 2009Networking[PDF]

Parallel Sorting with Limited BandwidthM. Adler, J. Byers, and R. M. KarpSIAM Journal of Computing Vol. 29, No. 6, pp. 1997-2015 2000Networking
PACMan: Coordinated Memory Caching for Parallel JobsG. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. StoicaProceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, CaliforniaApril 2012Networking[PDF]

Packet Caches on Routers: The Implications of Universal Redundant Traffic EliminationA. Anand, A. Gupta, A. Akella, S. Seshan, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), San Diego, California, pp. 219-230August 2008Networking[PDF]

Overcoming the Internet Impasse through VirtualizationL. Peterson, S. Shenker, and J.TurnerProceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

OverCite: A Cooperative Digital Research LibraryJ. Stribling, I. Councill, J. Li, M. Frans Kaashoek, D. R. Karger, R. Morris, and S. ShenkerProceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 69-79February 2005Networking[PDF]

Outside the Closed World: On Using Machine Learning for Network Intrusion DetectionR. Sommer and V. PaxsonProceedings of the IEEE Symposium on Security and Privacy 2010, Oakland, California, pp. 305-316May 2010Networking[PDF]

Optimization Problems in Congestion ControlR.M. Karp, E. Koutsoupias, C.H. Papadimitriou, and S. ShenkerProceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS 2000), Redondo Beach, California, pp. 66-74November 2000Networking[PDF]

Optimal Information Security Investment with Penetration TestingR. Boehme and M. FelegyhaziProceedings of the Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany, 21-37November 2010Networking[PDF]

Opportunistic Measurement: Extracting Insight from Spurious TrafficM. Casado, T. Garfinkel, W. Cui, V. Paxson, and S. SavageProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

Pages