Publication Search Results

TitleAuthorBibliographicDatesort ascendingGroupLinks
RFC 4440: IAB Thoughts on the Role of the Internet Research Task Force (IRTF)S. Floyd, V. Paxson, and A. Falk, editorsRequest For Comments 4440March 2006Networking[PDF]

RFC 4342: Profile for Datagram Congestion Control Protocol (DCCP) Congestion Control ID 3: TCP-Friendly Rate Control (TFRC)S. Floyd, E. Kohler, and J. PadhyeRequest For Comments 4342, Proposed StandardMarch 2006Networking[PDF]

RFC 4341: Profile for Datagram Congestion Control Protocol (DCCP) Congestion Control ID 2: TCP-like Congestion ControlS. Floyd and E. KohlerRequest For Comments 4341, Proposed StandardMarch 2006Networking[PDF]

RFC 4340: Datagram Congestion Control Protocol (DCCP)E. Kohler, M. Handley, and S. FloydRequest For Comments 4340, Proposed StandardMarch 2006Networking[PDF]

RFC 4336: Problem Statement for the Datagram Congestion Control Protocol (DCCP)S. Floyd, M. Handley, and E. KohlerRFC 4336, InformationalMarch 2006Networking[PDF]

Mechanism Design for Policy RoutingJ. Feigenbaum, R. Sami, and S. ShenkerDistributed Computing, Vol. 18, Issue. 4, pp. 150-164March 2006Networking[PDF]

Protocol-Independent Adaptive Replay of Application DialogW. Cui, V. Paxson, N. Weaver, and R.H. KatzProceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06), San Diego, CaliforniaFebruary 2006Networking[PDF]

Distributed Segment Tree: Support Range Query and Cover Query over DHTC. Zheng, G. Shen, S. Li, and S. ShenkerProceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, CaliforniaFebruary 2006Networking[PDF]

Group Therapy for Systems: Using link attestations to manage failuresM. J. Freedman, I. Stoica, D. Mazieres, and S. ShenkerProceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS 2006), Santa Barbara, CaliforniaFebruary 2006Networking[PDF]

Posted Price Profit Maximization for Multicast by Approximating Fixed PointsA. Mehta, S. Shenker, and V. VaziraniJournal of Algorithms, Vol. 58, Issue 2, pp. 150-164February 2006Networking
Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor NetworksF. Bian, X. Li, R. Govindan, and S. ShenkerInternational Journal of Ad Hoc and Ubiquitous Computing (special issue on wireless sensor networks), Vol. 1, No. 4, pp. 179-193January 2006Networking[PDF]

The Devil and Packet Trace AnonymizationR. Pang, M. Allman, V. Paxson, and J. LeeComputer Communication Review, Vol. 36, Issue 1, pp. 29-38January 2006Networking
Exploiting Independent State For Network Intrusion DetectionR. Sommer and V. PaxsonProceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, pp. 59-71December 2005Networking[PDF]

Fixing the Embarrassing Slowness of OpenDHT on PlanetLabS. Rhea, B.-G. Chun, J. Kubiatowicz, and S. ShenkerProceedings of the Second Workshop on Real, Large Distributed Systems (WORLDS '05), San Francisco, California, pp. 25-30December 2005Networking[PDF]

Detecting Hidden Causality in Network ConnectionsJ. Kannan, J. Jung, V. Paxson, and C. E. KoksalEECS Department, UC Berkeley Technical Report No. UCB/EECS-2005-30, Berkeley, CaliforniaDecember 2005Networking[PDF]

Opportunistic Measurement: Extracting Insight from Spurious TrafficM. Casado, T. Garfinkel, W. Cui, V. Paxson, and S. SavageProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

A Unifying Link Abstraction for Wireless Sensor NetworksJ. Polastre, J. Hui, P. Levis, J. Zhao, D. Culler, S. Shenker, and I. StoicaProceedings of the Third ACM Conference on Embedded Networked Sensor Systems (Sensys 2005), San Diego, California, pp. 76-89November 2005Networking
Using Honeynets for Internet Situational AwarenessV. Yegneswaran, P. Barford, and V. PaxsonProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

Off by DefaultH. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. ShenkerProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

DoS: Fighting Fire with FireM. Walfish, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, MarylandNovember 2005Networking[PDF]

Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale EventA. Kumar, V. Paxson, and N. WeaverProceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 351-364October 2005Networking[PDF]

A First Look at Modern Enterprise TrafficR. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. TierneyProceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 15-28October 2005Networking[PDF]

Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network TrafficS. Kornexl, V. Paxson, H. Dreger, A. Feldmann, and R. SommerProceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005), Berkeley, California, pp. 267-272October 2005Networking[PDF]

Heuristic Algorithms for Minimum Bandwidth Consumption Multicast Trees in Wireless Mesh NetworksP.M. Ruiz and A.F. Gomez SkarmetaLecture Notes in Computer Science, Vol. 3738, pp. 258–270October 2005Networking
Internet Connectivity for Mobile Ad Hoc Networks: Solutions and ChallengesP. M. Ruiz, F. J. Ros, and A.F. Gomez SkarmetaIEEE Communications Magazine, pp. 118–125October 2005Networking
On the Pitfalls of Geographic Face RoutingY.-J. Kim, R. Govindan, B. Karp, and S. ShenkerProceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cologne, Germany, pp. 34-43September 2005Networking[PDF]

Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al EncaminarC.M. Yago, P. M. Ruiz, and A.F. Gomez SkarmetaProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Aproximacion de Arboles Multicast Optimos en Redes Ad Hoc InalambricasP.M. Ruiz and A.F. Gomez SkarmetaProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAMA.F. Gomez Skarmeta and P.M. RuizProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Applying Fuzzy Logic to Model User Preferences on Multimedia SessionsJ.A. Botia, M. Valdes, P. M. Ruiz, and A.F. Gomez Skarmeta.Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy, Jaen, Spain, pp. 467-470September 2005Networking
Security Extensions to MMARP Through Cryptographically Generated AddressesF.J. Galera, P.M. Ruiz, and A.F. Gomez SkarmetaLecture Notes on Informatics, Vol. P-68, pp. 339–343September 2005Networking
Robust TCP Reassembly in the Presence of AdversariesS. Dharmapurikar and V. PaxsonProceedings of the 14th Conference on USENIX Security Symposium (Security '05), Baltimore, Maryland, pp. 65-80August 2005Networking[PDF]

HLP: A Next-Generation Interdomain Routing ProtocolL. Subramanian, M. Caesar, C. Tien Ee, M. Handley, M. Mao, S. Shenker, and I. StoicaProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 13-24August 2005Networking[PDF]

OpenDHT: A Public DHT Service and Its UsesS. Rhea, B. Godfrey, B. Karp, J. Kubiatowicz, S. Ratnasamy, S. Shenker, I. Stoica, and H. YuProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 73-84August 2005Networking[PDF]

Towards an Evolvable Internet ArchitectureS. Ratnasamy, S. Shenker, S. McCanneProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 313-324August 2005Networking[PDF]

A Case Study in Building Layered DHT ApplicationsY. Chawathe, S. Ramabhadran, S. Ratnasamy, A. LaMarca, S. Shenker, J. HellersteinProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 97-108August 2005Networking[PDF]

Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based ContextH. Dreger, C. Kreibich, V. Paxson, and R. SommerProceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005), Vienna, Austria, pp. 206-221July 2005Networking[PDF]

An Architecture for Developing Behavioral HistoryM. Allman, E. Blanton, and V. PaxsonProceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05), Cambridge, Massachusetts, p. 45-51July 2005Networking[PDF]

Reliable Broadcast in Unknown Fixed-Identity NetworksL. Subramanian, R. Katz, V. Roth, S. Shenker, and I. StoicaProceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC 2005), Las Vegas, California, pp. 342-351July 2005Networking[PDF]

Flexibility as an Instrument in DRM SystemsD. Bergemann, T. Eisenbach, J. Feigenbaum, and S. ShenkerProceedings of 2005 Workshop on the Economics of Information Security (WEIS 2005), Cambridge, MassachusettsJune 2005Networking[PDF]

Hidden-Action in Multi-Hop RoutingM. Feldman, J. Chuang, I. Stoica, and S. ShenkerProceedings of the 6th ACM Conference on Electronic Commerce (EC'05), Vancouver, Canada , pp. 117-126June 2005Networking[PDF]

Towards a Sensor Network Architecture: Lowering the WaistlineD. Culler, P. Dutta, C.T. Ee, R. Fonseca, J. Hui, P. Levis, J. Polastre, S. Shenker, I. Stoica, G. Tolle, and J. ZhaoProceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS 10), Santa Fe, New Mexico, p. 24June 2005Networking
COPS: Quality of Service Vs. Any Service at AllR. Katz, G. Porter, S. Shenker, I. Stoica, and M. TsaiProceedings of the 13th International Workshop on Quality of Service 2005 (IWQoS 2005), Passau, Germany, pp. 3-15June 2005Networking
Policy-Controlled Event Management for Distributed Intrusion DetectionC. Kreibich and R. SommerProceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05), Columbus, Ohio, Vol. 4, pp. 385-391June 2005Networking[PDF]

Designing Extensible IP Router SoftwareM. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. RadoslavovProceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 189-202May 2005Networking[PDF]

Geographic Routing Made PracticalY.-J. Kim, R. Govindan, B. Karp, and S. ShenkerProceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 217-230May 2005Networking[PDF]

Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless SensornetsR. Fonseca, S. Ratnasamy, J. Zhao, C. Tien Ee, D. Culler, S. Shenker, and I. StoicaProceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 329-342May 2005Networking[PDF]

Measuring the Evolution of Transport Protocols in the InternetA. Medina, M. Allman, and S. FloydACM Computer Communication Review, Vol. 35, Issue 2, pp. 37-52. DOI:http://doi.acm.org/10.1145/1064413.1064418April 2005Networking[PDF]

Notes on Burst Mitigation for Transport ProtocolsM. Allman and E. BlantonACM SIGCOMM Computer Communication Review, Vol. 35, Issue 2, pp. 53-60. DOI:http://doi.acm.org/10.1145/1064413.1064419April 2005Networking[PDF]

Brooery: A Graphical Environment for Analysis of Security-Relevant Network ActivityC. KreibichProceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118April 2005Networking[PDF]

Pages