Publication Search Results

Titlesort ascendingAuthorBibliographicDateGroupLinks
Operational Experiences with High-Volume Network Intrusion DetectionH. Dreger, A. Feldmann, V. Paxson, and R. SommerProceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004), Washington, D.C., Vol. 11, p. 2October 2004Networking[PDF]

OpenFlow: Enabling Innovation in Campus NetworksN. McKeown, T. Andershnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turneron, and H. BalakrisACM Computer Communication Review, Vol. 38, Issue 2, pp. 69-74April 2008Networking[PDF]

OpenDHT: A Public DHT Service and Its UsesS. Rhea, B. Godfrey, B. Karp, J. Kubiatowicz, S. Ratnasamy, S. Shenker, I. Stoica, and H. YuProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 73-84August 2005Networking[PDF]

Open Source vs. Closed Source Software: Towards Measuring SecurityG. Schryen and R. KaduraProceedings of the 24th Annual ACM Symposium on Applied Computing (SAC 2009), Honolulu, Hawaii, pp. 2016-2023March 2009Networking[PDF]

Onix: A Distributed Control Platform for Large-scale Production NetworksT. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, and S. ShenkerProceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 351-364October 2010Networking[PDF]

Ongoing TCP Research Related to SatellitesM. Allman, S. Dawkins, D. Glover, J. Griner, D. Tran, T. Henderson, J. Heidemann, J. Touch, H. Kruse, S. Ostermann, K. Scott, and J. SemkeFebruary 2000. Request for Comments 2760.February 2000Networking
ONE: The Ohio Network EmulatorM. Allman, A. Caldwell, and S. OstermannTechnical Report TR-19972, Ohio University Computer Science DepartmentAugust 1997Networking
On Traffic Phase Effects in Packet-Switched GatewaysS. Floyd and V. JacobsonInternetworking: Research and Experience, Vol. 3, No. 3, pp. 115-156September 1992Networking[PDF]

On the Spam Campaign TrailC. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, CaliforniaApril 2008Networking[PDF]

On the Potential of Proactive Domain BlacklistingM. Felegyhazi, C. Kreibich, and V. PaxsonProceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, CaliforniaApril 2010Networking[PDF]

On the Pitfalls of Geographic Face RoutingY.-J. Kim, R. Govindan, B. Karp, and S. ShenkerProceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cologne, Germany, pp. 34-43September 2005Networking[PDF]

On the Performance of TCP-Based Data Transfers on a Faded Ka-Band Satellite LinkH. Kruse, S. Ostermann, and M. AllmanProceedings of the Sixth Ka-Band Utilization Conference, June 2000.June 2000Networking
On the Performance of MiddleboxesM. AllmanACM SIGCOMM/Usenix Internet Measurement Conference, Miami, FL, USAOctober 2003Networking
On the Origin of Power Laws in Internet TopologiesA. Medina, I. Matta, and J. ByersACM Computer Communications Review, April 2000. Also BU-CS-TR-2000-004. January 21, 2000.April 2000Networking
On the Impact of Bursting on TCP PerformanceE. Blanton and M. AllmanProceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, MassachusettsMarch 2005Networking[PDF]

On the Generation and Use of TCP AcknowledgmentsM. AllmanACM Computer Communication Review, Vol. 28, Issue 5October 1998Networking
On the Effects of Registrar-Level InterventionH. Liu, K. Levchenko, M. Felegyhazi, C. Kreibich, G. Maier, G. M. Voelker, and Stefan SavageProceedings of the Fourth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11), Boston, MassachusettsMarch 2011Networking[PDF]

On the Effective Evaluation of TCPM. Allman and A. FalkACM Computer Communication Review, 29(5), October 1999.October 1999Networking
On the Convergence of Statistical Techniques for Estimating Network Traffic DemandsA. Medina, K. Salamatian, N. Taft, I. Matta, Y. Tsang, and C. DiotSubmitted for publication 2003February 2003Networking
On the Constancy of Internet Path PropertiesY. Zhang, N. Duffield, V. Paxson, and S. ShenkerProceedings of ACM SIGCOMM Internet Measurement Workshop, November 2001.November 2001Networking
On the Characteristics and Origins of Internet Flow RatesY. Zhang, L. Breslau, V. Paxson, and S. ShenkerProceedings of ACM SIGCOMM, August 2002. 2002Networking
On the Application of Formal Description Techniques to the Design of Interception Systems for GSM Mobile TerminalsM. J. Fernández, J. González, M. Llamas, J. M. Pousada, and J. ValesJournal of Systems and Software, Vol. 60, Issue 1, pp. 49-56January 2002Networking
On the Aggregatability of Multicast Forwarding StateD. Thaler and M. HandleyProceedings of Infocom 2000. 2000Networking
On the Adaptive Real-Time Detection of Fast-Propagating Network WormsJ. Jung, R. Milito, and V. PaxsonProceedings of the Fourth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2007), Lucerne, Switzerland, pp. 175-192. Also Journal on Computer Virology, Vol. 4, No. 1, pp. 197-210, February 2008July 2007Networking[PDF]

On Selfish Routing in Internet-Like EnvironmentsL. Qiu, Y.R. Yang, Y. Zhang, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM), Karlsruhe, GermanyAugust 2003Networking[PDF]

On Scalable Internet Multimedia Conferencing SystemsM. HandleyUniversity of London Ph.D ThesisNovember 1997Networking
On Preserving Privacy in Information-Centric NetworksS. Arianfar, T. Koponen, B. Raghavan, and S. ShenkerProceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN-2011), Toronto, Canada, pp. 19-24August 2011Networking[PDF]

On Making TCP More Robust to Packet ReorderingE. Blanton and M. AllmanACM Computer Communication Review, 32(1), January 2002.January 2002Networking
On Estimating End-to-End Network Path PropertiesM. Allman and V. PaxsonACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean, April 2001. This paper was originally presented at ACM SIGCOMM 1999.April 2001Networking
On Estimating End-to-End Network Path PropertiesM. Allman and V. PaxsonACM SIGCOMM, September 1999, Cambridge, Massachusetts.September 1999Networking
On Dominant Characteristics of Residential Broadband Internet TrafficG. Maier, A. Feldmann, V. Paxson, and M. AllmanProceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 90-102November 2009Networking[PDF]

On Controller Performance in Software-Defined NetworksA. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and R. SherwoodProceedings of the USENIX NSDI Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), San Jose, CaliforniaApril 2012Networking[PDF]

On Community-Oriented Internet MeasurementM. Allman, L. Martin, M. Rabinovich, and K. AtchinsonProceedings of the Passive and Active Measurement Conference (PAM 2008), Cleveland, Ohio, pp. 112-121April 2008Networking[PDF]

On Characterizing Network Topologies and Analyzing Their Impact on Protocol DesignP. Radoslavov, H. Tangmunarunkit, H. Yu, R. Govindan, S. Shenker, and D. EstrinTechnical Report 00-731, Computer Science Department, University of Southern California, February 2000.February 2000Networking
On Calibrating Measurements of Packet Transit TimesV. PaxsonProceedings of the International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '98), Madison, Wisconsin, pp. 11-21June 1998Networking
On Calibrating Enterprise Switch MeasurementsB. Nechaev, V. Paxson, M. Allman, and A. GurtovProceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 143-155November 2009Networking[PDF]

On Building Special-Purpose Social Networks for Emergency CommunicationM. AllmanACM Computer Communication Review, Vol. 40, Issue 5October 2010Networking[PDF]

On Building Inexpensive Network CapabilitiesC. Shue, A. Kalafut, M. Allman, and C. TaylorACM SIGCOMM Computer Communications Review, Vol. 42, No. 2, pp. 72-79April 2012Networking[PDF]

Off by DefaultH. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. ShenkerProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

OCALA: An Architecture for Supporting Legacy Applications Over OverlaysD. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I. Stoica, and K. WehrleProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 267-280May 2006Networking[PDF]

Observed Structure of Addresses in IP TrafficE. Kohler, J. Li, V. Paxson, and S. ShenkerProceedings of ACM SIGCOMM Internet Measurement Workshop, November 2002. Also in Proceedings of the 2nd Internet Measurement Workshop (IMW) 2002.November 2002Networking
Observed Structure of Addresses in IP TrafficE. Kohler, J. Li, V. Paxson, and S. ShenkerIEEE/ACM Transactions on Networking, Vol. 14, No. 6, pp. 1207-1218December 2006Networking[PDF]

Object Oriented Circuit Generators in JavaM. Chu, N. Weaver, K. Sulimma, A. DeHon, and J. WawrzynekProceedings of the IEEE Symposium on Field Programmable Custom Computing Machines (FCCM) 1998Networking
NS-3 Project GoalsT. Henderson, S. Roy, S. Floyd, and G. RileyProceedings of the Workshop on NS-2 (WNS2 2006), Pisa, Italy, article 13October 2006Networking[PDF]

Ns Simulator Tests for Random Early Detection (RED) GatewaysS. FloydTechnical ReportOctober 1996Networking
NOX: Towards an Operating System for NetworksN. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. ShenkerACM SIGCOMM Computer Communications Review, Vol. 38, No. 3, pp. 105-110July 2008Networking[PDF]

Notes on Burst Mitigation for Transport ProtocolsM. Allman and E. BlantonACM SIGCOMM Computer Communication Review, Vol. 35, Issue 2, pp. 53-60. DOI:http://doi.acm.org/10.1145/1064413.1064419April 2005Networking[PDF]

NOSIX: A Portable Switch Interface for the Network Operating SystemA. Wundsam and M.YuICSI Technical Report TR-12-013October 2012Networking[PDF]

New Techniques for Making Transport Protocols Robust to Corruption-Based LossW. Eddy, S. Ostermann, and M. AllmanACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88October 2004Networking[PDF]

Networking in the Long EmergencyB. Raghavan and J. MaProceedings of the ACM SIGCOMM Workshop on Green Networking (GreenNet '11), Ontario, Canada, pp. 37-42August 2011Networking[PDF]

Pages