| Software-Defined Networking: History, Hype, and Hope | S. Shenker | Proceedings of the Conference on Large-Scale Distributed Systems and Middleware (LADIS 2012), Madeira, Portugal. Also in the proceedings of the Brazilian Symposium on Computer Networks and Distributed Systems (SBRC 2012), Ouro Preto, Brazil, April 2012. | July 2012 | Networking | |
| Optimal Information Security Investment with Penetration Testing | R. Boehme and M. Felegyhazi | Proceedings of the Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany, 21-37 | November 2010 | Networking | [PDF]
|
| Scalable Timers for Soft State Protocols | P. Sharma, D. Estrin, S. Floyd, and V. Jacobson | Proceedings of the Conference on Computer Communications, 16th Annual Joint Conference of the IEEE Computer and Communications Societies, Driving the Information Revolution (IEEE INFOCOM 1997), Kobe, Japan, pp. 222-229 | April 1997 | Networking | |
| Comparison of Measurement-based Admission Control Algorithms for Controlled-Load Service | S. Jamin, S.J. Shenker, and P.B. Danzig | Proceedings of the Conference on Computer Communications (IEEE Infocom), Kobe, Japan | April 1997 | Networking | |
| The MASC/BGMP Architecture for Inter-Domain Multicast Routing | S. Kumar, P. Radoslavov, D. Thaler, C. Alaettinoglu, D. Estrin, and M. Handley | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (SIGCOMM '98), Vancouver, British Columbia, Canada | August 1998 | Networking | |
| Session Directories and Scalable Internet Multicast Address Allocation | M. Handley | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM 98), September 1998, Vancouver, Canada | September 1998 | Networking | |
| End-to-End Internet Packet Dynamics | V. Paxson | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Cannes, France | September 1997 | Networking | |
| Automated Packet Trace Analysis of TCP Implementations | V. Paxson | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Cannes, France | September 1997 | Networking | |
| Network Text Editor (NTE): A scalable shared text editor for the MBone | M. Handley and J. Crowcroft | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Canne, France | September 1997 | Networking | |
| Internet Indirection Infrastructure | I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana | Proceedings of the annual conference of the ACM Special Interest Group on Data Communication (ACM SIGCOMM 2002), Pittsburgh, Pennsylvania, pp. 73-86 | August 2002 | Networking | [PDF]
|
| The Top Speed of Flash Worms | S. Staniford, D. Moore, V. Paxson, and N. Weaver | Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, Virginia | October 2004 | Networking | [PDF]
|
| Preliminary Results Using ScaleDown to Explore Worm Dynamics | N. Weaver, I. Hamadeh, G. Kesidis, and V. Paxson | Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, Virginia | October 2004 | Networking | [PDF]
|
| Can Software Routers Scale? | K. Argyraki, S. Baset, B. Chun, K. Fall, G. Iannaccone, A. Knies, E. Kohler, M. Manesh, S. Nedevschi, and S. Ratnasamy | Proceedings of the ACM Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO'08), Seattle, Washington | August 2008 | Networking | [PDF]
|
| Software-Defined Internet Architecture | B. Raghavan, T. Koponen, M. Casado, A. Ghodsi, S. Ratnasamy, and S. Shenker | Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets-XII), Seattle, Washington | October 2012 | Networking | [PDF]
|
| Automating Analysis of Large-Scale Botnet Probing Events | Z. Li, A. Goyal, Y. Chen, and V. Paxson | Proceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, pp. 11-22 | March 2009 | Networking | [PDF]
|
| On Preserving Privacy in Information-Centric Networks | S. Arianfar, T. Koponen, B. Raghavan, and S. Shenker | Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN-2011), Toronto, Canada, pp. 19-24 | August 2011 | Networking | [PDF]
|
| Naming in Content-Oriented Architectures | A. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti, and S. Shenker | Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN 2011), Toronto, ON, Canada | August 2011 | Networking | [PDF]
|
| Fabric: A Retrospective on Evolving SDN | M. Casado, T. Koponen, S. Shenker, and A. Tootoonchian | Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Helsinki, Finland | August 2012 | Networking | [PDF]
|
| Networking in the Long Emergency | B. Raghavan and J. Ma | Proceedings of the ACM SIGCOMM Workshop on Green Networking (GreenNet '11), Ontario, Canada, pp. 37-42 | August 2011 | Networking | [PDF]
|
| Route Flap Dampening Exacerbates Internet Routing Convergence | Z.M. Mao, R. Govindan, G. Varghese, and R. Katz | Proceedings of the ACM SIGCOMM 2002. | 2002 | Networking | |
| A Readable TCP in the Prolac Protocol Language | E. Kohler, M.F. Kaashoek, and D.R. Montgomery | Proceedings of the ACM SIGCOMM '99 Conference: Applications, Technologies, Architectures, and Protocols for Computer Communication, Cambridge, Massachusetts, August 1999, pages 3-13. | August 1999 | Networking | |
| Securing Web Content | J. Koskela, N. Weaver, A. Gurtov, and M. Allman | Proceedings of the ACM CoNext Workshop on Re-Architecting the Internet (ReArch 2009), Rome, Italy, pp. 7-12 | December 2009 | Networking | [PDF]
|
| A Taxonomy of Computer Worms | N. Weaver, V. Paxson, S. Staniford, and R. Cunningham | Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003), Washington, DC, pp. 11-18 | October 2003 | Networking | [PDF]
|
| Privacy in Online Social Lending | R. Boehme and S. Poetzsch | Proceedings of the AAAI 2010 Spring Symposium on Intelligent Information Privacy Management, Palo Alto, California, pp. 23-28 | March 2010 | Networking | [PDF]
|
| Modeling Cyber-Insurance: Towards a Unifying Framework | R. Boehme and G. Schwartz | Proceedings of the 9th Workshop on the Economics of Information Security (WEIS 2010), Cambridge, Massachusetts | June 2010 | Networking | [PDF]
|
| Building Extensible Networks with Rule-Based Forwarding | L. Popa, N. Egi, S. Ratnasamy, and I. Stoica | Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 379-391 | October 2010 | Networking | [PDF]
|
| Onix: A Distributed Control Platform for Large-scale Production Networks | T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, and S. Shenker | Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 351-364 | October 2010 | Networking | [PDF]
|
| PACMan: Coordinated Memory Caching for Parallel Jobs | G. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, California | April 2012 | Networking | [PDF]
|
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), San Jose, CA | April 2012 | Networking | [PDF]
|
| Enhancing Network Intrusion Detection With Integrated Sampling and Filtering | J. Gonzalez and V. Paxson | Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006), Hamburg, Germany, pp. 272-289 | September 2006 | Networking | [PDF]
|
| A Reactive Measurement Framework | M. Allman and V. Paxson | Proceedings of the 9th International Conference on Passive and Active Network Measurement (PAM 2008), Cleveland, Ohio, pp. 92-101 | April 2008 | Networking | [PDF]
|
| An Admission Control Approach for Elastic Flows in the Internet | L. Fàbrega, T. Jové, A. Bueno, and J. L. Marzo | Proceedings of the 9th IFIP Working Conference on Performance Modeling and Evaluation of ATM and IP Networks (IFIP ATM and IP 2001), Budapest, Hungary | June 2001 | Networking | |
| Improving Delivery Ratio and Power Efficiency in Unicast Geographic Routing with a Realistic Physical Layer for Wireless Sensor Networks | J.A. Sanchez and P. M. Ruiz | Proceedings of the 9th Euromicro Conference on Digital System Design Architectures, Methods, and Tools (DSD 2006), Drubovnid, Croatia | September 2006 | Networking | |
| Using Strongly Typed Networking to Architect for Tussle | C. Muthukrishnan, V. Paxson, M. Allman, and A. Akella | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 9 | October 2010 | Networking | [PDF]
|
| CloudPolice: Taking Access Control out of the Network | L. Popa, M. Yu, S. Y. Ko, S. Ratnasamy, and I. Stoica | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 7 | October 2010 | Networking | [PDF]
|
| HTTP as the Narrow Waist of the Future Internet | L. Popa, A. Ghodsi, and I. Stoica | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 6 | October 2010 | Networking | [PDF]
|
| Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters | A. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski, S. Shenker, and I. Stoica | Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011), Boston, Massachusetts | March 2011 | Networking | [PDF]
|
| Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center | B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. Stoica | Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011), Boston, Massachusetts | March 2011 | Networking | [PDF]
|
| An Assessment of Overt Malicious Activity Manifest in Residential Networks | G. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. Vallentin | Proceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp 144-163 | July 2011 | Networking | [PDF]
|
| What's Clicking What? Techniques and Innovations of Today's Clickbots | B. Miller, P. Pearce, C. Grier, C. Kreibich, and V. Paxson | Proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp. 164-183 | July 2011 | Networking | [PDF]
|
| Spam Detection Using Web Page Content: A New Battleground | M. Ribeiro, P. Guerra, L. Vilela, A. Veloso, D. Guedes, W. Meira Jr., M. Chaves, K. Steding-Jessen, and C. Hoepers | Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011), Perth, Australia. | September 2011 | Networking | [PDF]
|
| Securing Mediated Trace Access Using Black-Box Permutation Analysis | P. Mittal, V. Paxson, R. Sommer, and M. Winterrowd | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| A Policy Framework for the Future Internet | A. Seehra, J. Naous, M. Walfish, D. Maziéres, A. Nicolosi, and S. Shenker | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| Extending Networking into the Virtualization Layer | B. Pfaff, J. Pettit, K. Amidon, M. Casado, T. Koponen, and S. Shenker | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| Applying NOX to the Datacenter | A. Tavakoli, M. Casado, T. Koponen, and S. Shenker | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| Bro: A System for Detecting Network Intruders in Real-Time | V. Paxson | Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas | January 1998 | Networking | |
| Tiered Fault Tolerance for Long-Term Integrity | B. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz | Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California, pp. 267-282 | February 2009 | Networking | [PDF]
|
| Minuet: Rethinking Concurrency Control in Storage Area Networks | A. Ermolinskiy, D. Moon, B. Chun, and S. Shenker | Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California | February 2009 | Networking | [PDF]
|
| A Modular Network Layer for Sensornets | C.T. Ee, R. Fonseca, S. Kim, D. Moon, A. Tavakoli, D. Culler, S. Shenker, and I. Stoica | Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), Seattle, Washington, pp. 249-262 | November 2006 | Networking | [PDF]
|
| TCP Fast Open | S. Radhakrishnan, Y. Cheng, J. Chu, A. Jain, and B. Raghavan | Proceedings of the 7th International Conference on emerging Network EXperiments and Technologies (ACM CoNEXT 2011), Tokyo, Japan | December 2011 | Networking | [PDF]
|