Publication Search Results

TitleAuthorBibliographicsort descendingDateGroupLinks
Efficient and Robust TCP Stream NormalizationM. Vutukuru, H. Balakrishnan, and V. PaxsonProceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 96-110May 2008Networking[PDF]

Local error recovery in SRM: comparison of two approachesC.G. Liu, D. Estrin, S. Shenker, and L. ZhangProceedings of IEEE/ACM Transactions on Networking, Vol. 6, pp. 686-699December 1998Networking
Web Caching and Zipf-Like Distributions: Evidence and ImplicationsL. Breslau, P. Cao, L. Fan, G. Phillips, and S. ShenkerProceedings of Infocom 1999. 1999Networking
A Dynamic Bootstrap Mechanism for Rendezvous-Based Multicast RoutingD. Estrin, M. Handley, A. Helmy, P. Huang, and D. ThalerProceedings of Infocom 1999. 1999Networking
RAP: An End-to-End Rate-Based Congestion Control Mechanism for Realtime Streams in the InternetR. Rejaie, M. Handley, and D. EstrinProceedings of Infocom 1999. 1999Networking
Multimedia Proxy Caching for Quality Adaptive Streaming Applications in the InternetR. Rejaie, H. Yu, M. Handley, and D. EstrinProceedings of Infocom 2000. 2000Networking
On the Aggregatability of Multicast Forwarding StateD. Thaler and M. HandleyProceedings of Infocom 2000. 2000Networking
Load Balancing in Dynamic Structured P2P SystemsB. Godfrey, R.M. Karp, K. Lakshminarayanan, S. Surana, and I. StoicaProceedings of INFOCOMM, 2004 2004Networking
The Shunt: An FPGA-Based Accelerator for Network Intrusion PreventionN. Weaver, V. Paxson, and J.M. GonzalezProceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007), Monterey, California, pp. 199-206February 2007Networking[PDF]

Global Synchronization in SensornetsJ. Elson, R. M. Karp, C.H. Papadimitriou and S. ShenkerProceedings of LATIN, pp. 609-624January 05 2004Networking
BRITE: An Approach to Universal Topology GenerationA. Medina, A. Lakhina, I. Matta, and J. ByersProceedings of MASCOTS 2001. IEEE Computer Society, August 2001.August 2001Networking
Scaling Phenomena in the Internet: Critically Examining CriticalityW. Willinger, R. Govindan, S. Jamin, V. Paxson, and S. ShenkerProceedings of National Academy of Science USA, Vol. 99, Suppl. 1, 2573-2580, February 19, 2002.February 19 2002Networking
Experiences with NIMIV. Paxson, A. Adams, and M. MathisProceedings of Passive & Active Measurement: PAM-2000. 2000Networking
Estimating Router ICMP Generation DelaysR. Govindan and V. PaxsonProceedings of Passive & Active Measurement: PAM-2002. 2002Networking
Pktd: A Packet Capture and Injection DaemonJ. Gonzalez and V. PaxsonProceedings of Passive and Active Measurement Workshop (PAM-2003), La Jolla, California, pp. 87-96April 2003Networking[PDF]

Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable DelayD. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. StanifordProceedings of RAID, 2002. 2002Networking
Identification of Protein Complexes by Comparative Analysis of Yeast and Bacterial Protein Interaction DataR. Sharan, T. Ideker, B.P. Kelley, R. Shamir, and R.M. KarpProceedings of RECOMB 2004, pp. 282-289January 05 2004Networking
The Architecture of PIER: An Internet-Scale Query ProcessorR. Huebsch, B. Chun, J. M. Hellerstein, B. T. Loo, P. Maniatis, T. Roscoe, S. Shenker, I. Stoica, and A. R. YumerefendiProceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, California, pp. 28-43January 2005Networking[PDF]

Traffic Matrix Estimation Techniques: Existing Techniques Compared and New DirectionsA. Medina, N. Taft, K.Salamatian, S. Bhattacharyyam, and C. DiotProceedings of SIGCOMM 2002, Pittsburgh, Pennsylvania. August 2002.August 2002Networking
Internet Pat Inflation Due to Policy RoutingH. Tangmunarunkit, R. Govindan, and S. ShenkerProceedings of SPIE ITCom 2001, Denver, CO. 19-24. August 2001.August 2001Networking
Improved Key Management for Digital Watermark MonitoringV. Roth and M. ArnoldProceedings of SPIE, San Jose, California, January 2002.January 2002Networking
Information-Centric Networking: Seeing the Forest for the TreesA. Ghodsi, T. Koponen, B. Raghavan, S. Shenker, A. Singla, and J. WilcoxProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

Intelligent Design Enables Architectural EvolutionA. Ghodsi, T. Koponen, B. Raghavan, S. Shenker, A. Singla, and J. WilcoxProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

The Energy and Emergy of the InternetB. Raghavan and J. MaProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

Data-Driven Network ConnectivityJ. Liu, S. Shenker, M. Schapira, and B. YangProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

Towards a Sensor Network Architecture: Lowering the WaistlineD. Culler, P. Dutta, C.T. Ee, R. Fonseca, J. Hui, P. Levis, J. Polastre, S. Shenker, I. Stoica, G. Tolle, and J. ZhaoProceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS 10), Santa Fe, New Mexico, p. 24June 2005Networking
Operational Experiences with High-Volume Network Intrusion DetectionH. Dreger, A. Feldmann, V. Paxson, and R. SommerProceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004), Washington, D.C., Vol. 11, p. 2October 2004Networking[PDF]

A First Look at Mobile Hand-held Device TrafficG. Maier, F. Schneider, and A. FeldmannProceedings of the 11th International Conference on Passive and Active Network Measurement (PAM 2010), Zurich, Switzerland, pp. 161-170April 2010Networking[PDF]

A Longitudinal View of HTTP TrafficT. Callahan, M. Allman, and V. PaxsonProceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, SwitzerlandApril 2010Networking[PDF]

Web Timeouts and Their ImplicationsZ. Al-Qudah, M. Rabinovich, and M. AllmanProceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, SwitzerlandApril 2010Networking[PDF]

The SFRA: A Corner-Turn FPGA ArchitectureN. Weaver, J. Hauser and J. WawrzynekProceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12February 2004Networking[PDF]

Worms vs. Perimeters: The Case for Hard-LANsN. Weaver, D. Ellis, S. Staniford, and V. PaxsonProceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12), Stanford, California, pp. 70-76August 2004Networking[PDF]

NAT Usage in Residential Broadband NetworksG. Maier, F. Schneider, and A. FeldmannProceedings of the 12th International Conference on Passive and Active Network Measurement (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?T. Ouyang, S. Ray, M. Rabinovich, and M. AllmanProceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Detecting and Analyzing Automated Activity on TwitterC. M. Zhang and V. PaxsonProceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Protocol-Independent Adaptive Replay of Application DialogW. Cui, V. Paxson, N. Weaver, and R.H. KatzProceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06), San Diego, CaliforniaFebruary 2006Networking[PDF]

Probe and Pray: Using UPnP for Home Network MeasurementsL. DiCioccio, R. Teixeira, M. May, and C. KreibichProceedings of the 13th Passive and Active Measurement Conference (PAM 2012), pp. 96-105, Vienna, AustriaMarch 2012Networking[PDF]

The BIZ Top-Level Domain: Ten Years LaterT. Halvorson, J. Szurdi, G. Maier, M. Felegyhazi, C. Kreibich, N. Weaver, K. Levchenko, and V. PaxsonProceedings of the 13th Passive and Active Measurement Conference, Vienna, AustriaMarch 2012Networking[PDF]

Very Fast Containment of Scanning WormsN. Weaver, S. Staniford, and V. PaxsonProceedings of the 13th USENIX Security Symposium, San Diego, California, pp. 29-44August 2004Networking[PDF]

Disk-Locality in Datacenter Computing Considered IrrelevantG. Anantharayanan, A. Ghodsi, S. Shenker, and I. StoicaProceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), Napa, CaliforniaMay 2011Networking[PDF]

Robust TCP Reassembly in the Presence of AdversariesS. Dharmapurikar and V. PaxsonProceedings of the 14th Conference on USENIX Security Symposium (Security '05), Baltimore, Maryland, pp. 65-80August 2005Networking[PDF]

Revocation Games in Ephemeral NetworksM. Raya, M. H. Manshaei, M. Felegyhazi, and J.-P. HubauxProceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 199-210October 2008Networking[PDF]

Spamalytics: An Empirical Analysis of Spam Marketing ConversionC. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 3-14. Also appeared in the Communications of the ACM, Vol. 52, No. 9, pp. 99-107, September 2009October 2008Networking[PDF]

Security of Open Source and Closed Source Software: An Empirical Comparison of Published VulnerabilitiesG. SchryenProceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), San Francisco, California, paper 387August 2009Networking[PDF]

Loss and Delay Accountability for the InternetK. Argyraki, P. Maniatis, O. Irzak, A. Subramanian, and S. ShenkerProceedings of the 15th IEEE International Conference on Network Protocols (ICNP 2007), Beijing, China, pp. 194-205October 2007Networking[PDF]

Integrated IP Multicast in Mobile Ad Hoc Networks with Multiple Attachments to Wired IP NetworksP. M. Ruiz and A.F. Gomez-SkarmetaProceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, SpainSeptember 2004Networking[PDF]

QoS and Micromobility Coupling Integrated with UMTSL.A. Galindo and P. M. RuizProceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, SpainSeptember 2004Networking[PDF]

A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time IntelligenceB. Amann, R. Sommer, A. Sharma, and S. HallProceedings of the 15th International Symposium on Attacks, Intrusions, and Detections (RAID 2012), pp. 314-333, Amsterdam, the NetherlandsSeptember 2012Networking
SANE: A Protection Architecture for Enterprise NetworksM. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. ShenkerProceedings of the 15th USENIX Security Symposium (Security '05), Vancouver, Canada, pp. 137–151August 2006Networking[PDF]

Dynamic Application-Layer Protocol Analysis for Network Intrusion DetectionH. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. SommerProceedings of the 15th USENIX Security Symposium (Security '06), Vancouver, CanadaAugust 2006Networking[PDF]

Pages