| Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems | V. Paxson and C. Saltmarsh | Proceedings of the 1993 Winter USENIX Technical Conference, San Diego, California | January 1993 | Networking | |
| Global Synchronization in Sensornets | J. Elson, R. M. Karp, C.H. Papadimitriou and S. Shenker | Proceedings of LATIN, pp. 609-624 | January 05 2004 | Networking | |
| GMR: Geographic Multicast Routing for Wireless Sensor Networks | J.A. Sanchez, P. M. Ruiz, and I. Stojmenovic | Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Networks (IEEE SECON 2006), Reston, Virginia | September 2006 | Networking | |
| GPSR: Greedy Perimeter Stateless Routing for Wireless networks | B. Karp and H.T. Kung | MOBICOM, 2000. | 2001 | Networking | |
| GQ: Practical Containment for Measuring Modern Malware Systems | C. Kreibich, N. Weaver, C. Kanich, W. Cui, V. Paxson | Proceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany. Also appeared as ICSI Technical Report TR-11-002. | November 2011 | Networking | |
| Group Therapy for Systems: Using link attestations to manage failures | M. J. Freedman, I. Stoica, D. Mazieres, and S. Shenker | Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS 2006), Santa Barbara, California | February 2006 | Networking | [PDF]
|
| Growth Trends in Wide-Area TCP Connections | V. Paxson | IEEE Network, Vol. 8 No. 4, pp. 8-17 | June 1994 | Networking | |
| Hardness Results for Multicast Cost Sharing | J. Feigenbaum, A. Krishnamurthy, R. Sami, and S. Shenker | Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2002), Kanpur, India, pp. 133-144 | December 2002 | Networking | |
| Hardness Results for Multicast Cost Sharing | J. Feigenbaum, A. Krishnamurthy, R. Sami, and S. Shenker | Theoretical Computer Science, Vol. 304, Issues 1-3, pp. 215-236 | July 2003 | Networking | |
| Hedera: Dynamic Flow Scheduling for Data Center Networks | M. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. Vahdat | Proceedings of the USENIX/ACM SIGCOMM Symposium on Networked Systems Design and Implementation (NSDI), San Jose, California | April 2010 | Networking | [PDF]
|
| Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web | D. Akhawe, B. Amann, M. Vallentin, and R. Sommer | To appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, Brazil | May 2013 | Networking | |
| Heuristic Algorithms for Minimum Bandwidth Consumption Multicast Trees in Wireless Mesh Networks | P.M. Ruiz and A.F. Gomez Skarmeta | Lecture Notes in Computer Science, Vol. 3738, pp. 258–270 | October 2005 | Networking | |
| Hidden-Action in Multi-Hop Routing | M. Feldman, J. Chuang, I. Stoica, and S. Shenker | Proceedings of the 6th ACM Conference on Electronic Commerce (EC'05), Vancouver, Canada , pp. 117-126 | June 2005 | Networking | [PDF]
|
| Hidden-Action in Network Routing | M. Feldman, J. Chuang, I. Stoica, and S. Shenker | IEEE Journal on Selected Areas in Communications, Vol. 25, Issue 6, pp. 1161-1172 | August 2007 | Networking | [PDF]
|
| HLP: A Next-Generation Interdomain Routing Protocol | L. Subramanian, M. Caesar, C. Tien Ee, M. Handley, M. Mao, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 13-24 | August 2005 | Networking | [PDF]
|
| Hold-On: Protecting Against On-Path DNS Poisoning | H. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. Paxson | Proceedings of the Conference on Securing and Trusting Internet Names (SATIN 2012), Teddington, United Kingdom | March 2012 | Networking | [PDF]
|
| Holding the Internet Accountable | D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker | Proceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| Host Mobility Using and Internet Indirection Infrastructure | S. Zhuang, K. Lai, I. Stoica, R. Katz, and S. Shenker | Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, California, pp. 129-144 | May 2003 | Networking | [PDF]
|
| Hot Data Centers vs. Cool Peers | S. Nedevschi, S. Ratnasamy, and J. Padhye | Proceedings of the Workshop on Power Aware Computing and Systems (HotPower '09), Big Sky, Montana, p. 8 | October 2009 | Networking | [PDF]
|
| How the Pursuit of Truth Led Me to Selling Viagra | V. Paxson | Invited talk at the USENIX Security Symposium, Montreal, Canada | August 2009 | Networking | [PDF]
|
| How to Own the Internet in Your Spare Time | S. Staniford, V. Paxson, and N. Weaver | Proceedings of the Eleventh USENIX Security Symposium (Security '02), San Francisco, California | August 2002 | Networking | [PDF]
|
| HTTP as the Narrow Waist of the Future Internet | L. Popa, A. Ghodsi, and I. Stoica | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 6 | October 2010 | Networking | [PDF]
|
| HTTP Page Transfer Rates Over Geo-Stationary Satellite Links | H. Kruse, M. Allman, J. Griner, and D. Tran | Proceedings of the 6th International Conference on Telecommunication Systems, Nashville, Tennessee | March 1998 | Networking | |
| Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community | M. Zaharia, S. Katti, C. Grier, V. Paxson, S. Shenker, I. Stoica and D. Song | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2012-12, Berkeley, California | January 2012 | Networking | [PDF]
|
| IANA Allocation Guidelines For Values In the Internet Protocol and Related Headers | S. Bradner and V. Paxson | Request for Comments 2780, Best Current Practice, March 2000. | March 2000 | Networking | |
| ICTD State of the Union: Where Have We Reached and Where Are We Headed? | S. Nedevschi, R. Patra, and J. Pal | Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2009), Doha, Qatar | April 2009 | Networking | [PDF]
|
| Identification of Protein Complexes by Comparative Analysis of Yeast and Bacterial Protein Interaction Data | R. Sharan, T. Ideker, B.P. Kelley, R. Shamir, and R.M. Karp | Proceedings of RECOMB 2004, pp. 282-289 | January 05 2004 | Networking | |
| Identifying the TCP Behavior of Web Servers | J. Padhye and S. Floyd | SIGCOMM 2001, August 2001. Or the ICSI Technical Report 01-002, February 2001. | 2001 | Networking | |
| IETF Criteria for Evaluating Reliable Multicast Transport and Application Protocols | A. Mankin, A. Romanow, S. Bradner, and V. Paxson | RFC 2357, Informational | June 1998 | Networking | |
| Impact of Network Dynamics on End-to-End Protocols: Case Studies in TCP and Reliable Multicast | K. Varadhan, D. Estrin, and S. Floyd | Tech report USC-CS-TR 98-672, April 1998. An abbreviated version appeared in the proceedings of the IEEE Symposium on Computers and Communications, July 1998 | April 1998 | Networking | |
| Implementation and Evaluation of a Location-Aware Wireless Multi-Agent System | I. Nieto-Carvajal, J.A. Botia, P. M. Ruiz, and A. Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3207, pp. 528-537 | August 2004 | Networking | [PDF]
|
| Implications of Netalyzr's DNS Measurements | N. Weaver, C. Kreibich, B. Nechaev, and V. Paxson | Proceedings of the First Workshop on Securing and Trusting Internet Names (SATIN), Teddington, United Kingdom | April 2011 | Networking | [PDF]
|
| Improved Key Management for Digital Watermark Monitoring | V. Roth and M. Arnold | Proceedings of SPIE, San Jose, California, January 2002. | January 2002 | Networking | |
| Improving Delivery Ratio and Power Efficiency in Unicast Geographic Routing with a Realistic Physical Layer for Wireless Sensor Networks | J.A. Sanchez and P. M. Ruiz | Proceedings of the 9th Euromicro Conference on Digital System Design Architectures, Methods, and Tools (DSD 2006), Drubovnid, Croatia | September 2006 | Networking | |
| Improving TCP Performance Over Satellite Channels | M. Allman | Master's Thesis, Ohio University | June 1997 | Networking | |
| IMRG Workshop on Application Classification and Identification Report | T. Strayer, M. Allman, G. Armitage, S. Bellovin, S. Jin and A. W. Moore | ACM Computer Communication Review (editorial contribution), Vol. 38, Issue 3, pp. 87-90 | July 2008 | Networking | |
| Incentive Compatibility and Dynamics of Congestion Control | P. B. Godfrey, M. Schapira, A. Zohar, and S. Shenker | ACM SIGMETRICS Performance Evaluation Review, Vol. 36, Issue 1, pp. 95-106 | June 2010 | Networking | [PDF]
|
| Incentive-Compatible Interdomain Routing | J. Feigenbaum, V. Ramachandran, and M. Schapira | Proceedings of the 7th ACM Conference on Electronic Commerce (EC'06), Ann Arbor, Michigan, pp. 130-139 | June 2006 | Networking | [PDF]
|
| Incentives and Internet Computation | J. Feigenbaum and S. Shenker | Distributed Computing Column #9, SIGACT News, Vol. 33, Issue 4, pp. 37-54 | 2002 | Networking | |
| Incremental Deployment Strategies for Router-Assisted Reliable Multicast | X. He, C. Papadopoulos, and P. Radoslavov | IEEE/ACM Transactions on Networking, Vol. 14, Issue 4, pp. 779-792 | August 2006 | Networking | |
| Inferring Link Loss Using Striped Unicast Probes | N. Duffield, F. Lo Presti, V. Paxson, and D. Towsley | Proceedings of IEEE INFOCOM, April 2001. | April 2001 | Networking | |
| Information-Centric Networking: Seeing the Forest for the Trees | A. Ghodsi, T. Koponen, B. Raghavan, S. Shenker, A. Singla, and J. Wilcox | Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, Massachusetts | November 2011 | Networking | [PDF]
|
| Inside the Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | IEEE Magazine of Security and Privacy, Vol. 1, Issue 4, pp. 33-39 | July 2003 | Networking | [PDF]
|
| Insights from the Inside: A View of Botnet Management from Infiltration | C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song | Proceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, California | April 2010 | Networking | [PDF]
|
| Integrated IP Multicast in Mobile Ad Hoc Networks with Multiple Attachments to Wired IP Networks | P. M. Ruiz and A.F. Gomez-Skarmeta | Proceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, Spain | September 2004 | Networking | [PDF]
|
| Intelligent Design Enables Architectural Evolution | A. Ghodsi, T. Koponen, B. Raghavan, S. Shenker, A. Singla, and J. Wilcox | Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, Massachusetts | November 2011 | Networking | [PDF]
|
| Internet Congestion Control for High Bandwidth-Delay Product Environments | D. Katabi, M. Handley, and C. Rohrs | Proceedings of ACM SIGCOMM 2002. | 2002 | Networking | |
| Internet Connectivity for Mobile Ad Hoc Networks: Solutions and Challenges | P. M. Ruiz, F. J. Ros, and A.F. Gomez Skarmeta | IEEE Communications Magazine, pp. 118–125 | October 2005 | Networking | |
| Internet Indirection Infrastructure | I. Stoica, D. Adkins, S. Ratnasamy, S. Shenker, S. Surana, and S. Zhuang | The First International Workshop on Peer-to-Peer Systems (IPTPS): 191-202, 2002. | 2002 | Networking | |
| Internet Indirection Infrastructure | I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana | Proceedings of the annual conference of the ACM Special Interest Group on Data Communication (ACM SIGCOMM 2002), Pittsburgh, Pennsylvania, pp. 73-86 | August 2002 | Networking | [PDF]
|