| Adapting Social Spam Infrastructure for Political Censorship | K. Thomas, C. Grier, and V. Paxson | Proceedings of the Fifth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12), San Jose, California | April 2012 | Networking | [PDF]
|
| Design and Evaluation of a Real-Time URL Spam Filtering Service | K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song | Proceedings of the 32nd IEEE Symposium on Security and Privacy, Oakland, California, pp. 447-464 | May 2011 | Networking | [PDF]
|
| Suspended Accounts in Retrospect: An Analysis of Twitter Spam | K. Thomas, C. Grier, V. Paxson, and D. Song | Proceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany | November 2011 | Networking | [PDF]
|
| Impact of Network Dynamics on End-to-End Protocols: Case Studies in TCP and Reliable Multicast | K. Varadhan, D. Estrin, and S. Floyd | Tech report USC-CS-TR 98-672, April 1998. An abbreviated version appeared in the proceedings of the IEEE Symposium on Computers and Communications, July 1998 | April 1998 | Networking | |
| A Proposal to Add Explicit Congestion Notification (ECN) to IP | K.K. Ramakrishnan and S. Floyd | Request for Comments 2481, Experimental, January 1999. Obsoleted by RFC 3168, Proposed Standard. | January 1999 | Networking | |
| RFC 3168: The Addition of Explicit Congestion Notification (ECN) to IP | K.K. Ramakrishnan, S. Floyd, and D. Black | RFC 3168, Proposed Standard, September 2001. | September 2001 | Networking | |
| Towards a Common TCP Evaluation Suite | L. Andrew, C. Marcondes, S. Floyd, L. Dunn, R. Guillier, W. Gang, L. Eggert, S. Ha, and I. Rhee | Proceedings of the International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet), Manchester, United Kingdom | March 2008 | Networking | [PDF]
|
| Best-Effort versus Reservations: A Simple Comparative Analysis | L. Breslau and S. Shenker | ACM Computer Communication Review, Vol. 28, pp. 3-16 | September 1998 | Networking | |
| Endpoint Admission Control: Architectural Issues and Performance | L. Breslau, E.W. Knightly, S. Shenker, I. Stoica, and H. Zhang | ACM SIGCOMM 2000, pages 57-69, Stockholm, Sweeden, October 2000. | October 2000 | Networking | |
| Advances in Network Simulation | L. Breslau, et al. | IEEE Computer, May 2000, pp. 59-67. Or the technical report: Technical Report 99-702, University of Southern California, March 1999. | May 2000 | Networking | |
| Web Caching and Zipf-Like Distributions: Evidence and Implications | L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker | Proceedings of Infocom 1999. | 1999 | Networking | |
| Comments on the Performance of Measurement-Based Admission Control Algorithms | L. Breslau, S. Jamin, and S. Shenker | INFOCOM 2000, Tel Aviv, Israel, March 2000. | March 2000 | Networking | |
| Barter Trade Improves Message Delivery in Opportunistic Networks | L. Buttyan, L. Dora, M. Felegyhazi, and I. Vajda | Ad Hoc Networks, Vol. 8, Issue 1, pp. 1-14 | January 2010 | Networking | [PDF]
|
| Probe and Pray: Using UPnP for Home Network Measurements | L. DiCioccio, R. Teixeira, M. May, and C. Kreibich | Proceedings of the 13th Passive and Active Measurement Conference (PAM 2012), pp. 96-105, Vienna, Austria | March 2012 | Networking | [PDF]
|
| An Admission Control Approach for Elastic Flows in the Internet | L. Fàbrega, T. Jové, A. Bueno, and J. L. Marzo | Proceedings of the 9th IFIP Working Conference on Performance Modeling and Evaluation of ATM and IP Networks (IFIP ATM and IP 2001), Budapest, Hungary | June 2001 | Networking | |
| A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems | L. Juan, C. Kreibich, C.-H. Lin, and V. Paxson | Proceedings of the Fifth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2008), Paris, France, pp. 267-278 | July 2008 | Networking | [PDF]
|
| Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems | L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica | Proceedings of the USENIX Annual Technical Conference (ATC), Boston, MA | June 2012 | Networking | [PDF]
|
| Overcoming the Internet Impasse through Virtualization | L. Peterson, S. Shenker, and J.Turner | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| HTTP as the Narrow Waist of the Future Internet | L. Popa, A. Ghodsi, and I. Stoica | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 6 | October 2010 | Networking | [PDF]
|
| CloudPolice: Taking Access Control out of the Network | L. Popa, M. Yu, S. Y. Ko, S. Ratnasamy, and I. Stoica | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 7 | October 2010 | Networking | [PDF]
|
| Building Extensible Networks with Rule-Based Forwarding | L. Popa, N. Egi, S. Ratnasamy, and I. Stoica | Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 379-391 | October 2010 | Networking | [PDF]
|
| A Cost Comparison of Datacenter Network Architectures | L. Popa, S. Ratnasamy, G. Iannaccone, A. Krishnamurthy, and I. Stoica | Proceedings of the 6th ACM International Conference on Emerging Networking EXperiments and Technologies, Philadelphia, Pennsylvania, article no. 16 | December 2010 | Networking | [PDF]
|
| On Selfish Routing in Internet-Like Environments | L. Qiu, Y.R. Yang, Y. Zhang, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM), Karlsruhe, Germany | August 2003 | Networking | [PDF]
|
| HLP: A Next-Generation Interdomain Routing Protocol | L. Subramanian, M. Caesar, C. Tien Ee, M. Handley, M. Mao, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 13-24 | August 2005 | Networking | [PDF]
|
| Towards a Next Generation Inter-domain Routing Protocol | L. Subramanian, M. Caesar, C. Tien Ee, M. Handley, Z. Morley Mao, S. Shenker, and I. Stoica | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Towards a Next Generation Inter-domain Routing Protocol | L. Subramanian, M. Caesar, M. Handley, M Mao, S. Shenker, and I. Stoica | Preprint 2004 | January 05 2004 | Networking | |
| Reliable Broadcast in Unknown Fixed-Identity Networks | L. Subramanian, R. Katz, V. Roth, S. Shenker, and I. Stoica | Proceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC 2005), Las Vegas, California, pp. 342-351 | July 2005 | Networking | [PDF]
|
| Listen and Whisper: Security Mechanisms for BGP | L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz | Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI '04), San Francisco, California | March 2004 | Networking | [PDF]
|
| An Investigation of the Internet’s IP-Layer Connectivity | L. Tang, J. Li, Y. Li, and S. Shenker | Computer Communications, Vol. 32, No. 5, pp. 913-926 | March 2009 | Networking | |
| Adaptive Web Caching: Towards a New Global Caching Architecture | L. Zhang, S. Michel, K. Nguyen, A. Rosenstein, S. Floyd, and V. Jacobson | Proceedings of the Third International WWW Caching Workshop | June 1998 | Networking | |
| QoS and Micromobility Coupling Integrated with UMTS | L.A. Galindo and P. M. Ruiz | Proceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, Spain | September 2004 | Networking | [PDF]
|
| A Stochastic Process on the Hypercube with Applications to Peer-to-peer Networks | M. Adler, E. Halperin, R. M. Karp, and V Vazirani | Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC 2003), San Diego, California, pp. 575-584 | June 2003 | Networking | [PDF]
|
| Parallel Sorting with Limited Bandwidth | M. Adler, J. Byers, and R. M. Karp | SIAM Journal of Computing Vol. 29, No. 6, pp. 1997-2015 | 2000 | Networking | |
| Hedera: Dynamic Flow Scheduling for Data Center Networks | M. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. Vahdat | Proceedings of the USENIX/ACM SIGCOMM Symposium on Networked Systems Design and Implementation (NSDI), San Jose, California | April 2010 | Networking | [PDF]
|
| On the Performance of Middleboxes | M. Allman | ACM SIGCOMM/Usenix Internet Measurement Conference, Miami, FL, USA | October 2003 | Networking | |
| An Evaluation of XML-RPC | M. Allman | ACM Performance Evaluation Review, 30(4) | March 2003 | Networking | |
| TCP Congestion Control with Appropriate Byte Counting (ABC) | M. Allman | RFC 3465 | February 2003 | Networking | |
| Measuring End-to-End Bulk Transfer Capacity | M. Allman | ACM SIGCOMM Internet Measurement Workshop. November 2001. | November 2001 | Networking | |
| A Web Server's View of the Transport Layer | M. Allman | ACM Computer Communication Review, 30(5), October 2000. | October 2000 | Networking | |
| TCP Byte Counting Refinements | M. Allman | ACM Computer Communication Review, 29(3), July 1999. | July 1999 | Networking | |
| On the Generation and Use of TCP Acknowledgments | M. Allman | ACM Computer Communication Review, Vol. 28, Issue 5 | October 1998 | Networking | |
| Fixing Two BSD TCP Bugs | M. Allman | Technical Report CR-204151, NASA Lewis Research Center | October 1997 | Networking | |
| Improving TCP Performance Over Satellite Channels | M. Allman | Master's Thesis, Ohio University | June 1997 | Networking | |
| What Ought a Program Committee to Do? | M. Allman | Proceedings of USENIX Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems (WOWCS), San Francisco, California | April 2008 | Networking | [PDF]
|
| Thoughts on Reviewing | M. Allman | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50 | April 2008 | Networking | [PDF]
|
| TCP Slow Start Survey: Standards and Issues | M. Allman | IETF Internet-Draft, Draft-ietf-tcpm-early-rexmt-00.txt, in progress | August 2008 | Networking | [PDF]
|
| Comments on Selecting Ephemeral Ports | M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 39, Issue 2, pp. 13-19 | April 2009 | Networking | [PDF]
|
| Personal Namespaces | M. Allman | Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| On Building Special-Purpose Social Networks for Emergency Communication | M. Allman | ACM Computer Communication Review, Vol. 40, Issue 5 | October 2010 | Networking | [PDF]
|
| Comments on Bufferbloat | M. Allman | ACM SIGCOMM Computer Communications, Vol. 3, No. 1, pp. 30-37 | January 2013 | Networking | [PDF]
|