| Operational Experiences with High-Volume Network Intrusion Detection | H. Dreger, A. Feldmann, V. Paxson, and R. Sommer | Proceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004), Washington, D.C., Vol. 11, p. 2 | October 2004 | Networking | [PDF]
|
| OpenFlow: Enabling Innovation in Campus Networks | N. McKeown, T. Andershnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turneron, and H. Balakris | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 69-74 | April 2008 | Networking | [PDF]
|
| OpenDHT: A Public DHT Service and Its Uses | S. Rhea, B. Godfrey, B. Karp, J. Kubiatowicz, S. Ratnasamy, S. Shenker, I. Stoica, and H. Yu | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 73-84 | August 2005 | Networking | [PDF]
|
| Open Source vs. Closed Source Software: Towards Measuring Security | G. Schryen and R. Kadura | Proceedings of the 24th Annual ACM Symposium on Applied Computing (SAC 2009), Honolulu, Hawaii, pp. 2016-2023 | March 2009 | Networking | [PDF]
|
| Onix: A Distributed Control Platform for Large-scale Production Networks | T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, and S. Shenker | Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 351-364 | October 2010 | Networking | [PDF]
|
| Ongoing TCP Research Related to Satellites | M. Allman, S. Dawkins, D. Glover, J. Griner, D. Tran, T. Henderson, J. Heidemann, J. Touch, H. Kruse, S. Ostermann, K. Scott, and J. Semke | February 2000. Request for Comments 2760. | February 2000 | Networking | |
| ONE: The Ohio Network Emulator | M. Allman, A. Caldwell, and S. Ostermann | Technical Report TR-19972, Ohio University Computer Science Department | August 1997 | Networking | |
| On Traffic Phase Effects in Packet-Switched Gateways | S. Floyd and V. Jacobson | Internetworking: Research and Experience, Vol. 3, No. 3, pp. 115-156 | September 1992 | Networking | [PDF]
|
| On the Spam Campaign Trail | C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, California | April 2008 | Networking | [PDF]
|
| On the Potential of Proactive Domain Blacklisting | M. Felegyhazi, C. Kreibich, and V. Paxson | Proceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, California | April 2010 | Networking | [PDF]
|
| On the Pitfalls of Geographic Face Routing | Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cologne, Germany, pp. 34-43 | September 2005 | Networking | [PDF]
|
| On the Performance of TCP-Based Data Transfers on a Faded Ka-Band Satellite Link | H. Kruse, S. Ostermann, and M. Allman | Proceedings of the Sixth Ka-Band Utilization Conference, June 2000. | June 2000 | Networking | |
| On the Performance of Middleboxes | M. Allman | ACM SIGCOMM/Usenix Internet Measurement Conference, Miami, FL, USA | October 2003 | Networking | |
| On the Origin of Power Laws in Internet Topologies | A. Medina, I. Matta, and J. Byers | ACM Computer Communications Review, April 2000. Also BU-CS-TR-2000-004. January 21, 2000. | April 2000 | Networking | |
| On the Impact of Bursting on TCP Performance | E. Blanton and M. Allman | Proceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, Massachusetts | March 2005 | Networking | [PDF]
|
| On the Generation and Use of TCP Acknowledgments | M. Allman | ACM Computer Communication Review, Vol. 28, Issue 5 | October 1998 | Networking | |
| On the Effects of Registrar-Level Intervention | H. Liu, K. Levchenko, M. Felegyhazi, C. Kreibich, G. Maier, G. M. Voelker, and Stefan Savage | Proceedings of the Fourth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11), Boston, Massachusetts | March 2011 | Networking | [PDF]
|
| On the Effective Evaluation of TCP | M. Allman and A. Falk | ACM Computer Communication Review, 29(5), October 1999. | October 1999 | Networking | |
| On the Convergence of Statistical Techniques for Estimating Network Traffic Demands | A. Medina, K. Salamatian, N. Taft, I. Matta, Y. Tsang, and C. Diot | Submitted for publication 2003 | February 2003 | Networking | |
| On the Constancy of Internet Path Properties | Y. Zhang, N. Duffield, V. Paxson, and S. Shenker | Proceedings of ACM SIGCOMM Internet Measurement Workshop, November 2001. | November 2001 | Networking | |
| On the Characteristics and Origins of Internet Flow Rates | Y. Zhang, L. Breslau, V. Paxson, and S. Shenker | Proceedings of ACM SIGCOMM, August 2002. | 2002 | Networking | |
| On the Application of Formal Description Techniques to the Design of Interception Systems for GSM Mobile Terminals | M. J. Fernández, J. González, M. Llamas, J. M. Pousada, and J. Vales | Journal of Systems and Software, Vol. 60, Issue 1, pp. 49-56 | January 2002 | Networking | |
| On the Aggregatability of Multicast Forwarding State | D. Thaler and M. Handley | Proceedings of Infocom 2000. | 2000 | Networking | |
| On the Adaptive Real-Time Detection of Fast-Propagating Network Worms | J. Jung, R. Milito, and V. Paxson | Proceedings of the Fourth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2007), Lucerne, Switzerland, pp. 175-192. Also Journal on Computer Virology, Vol. 4, No. 1, pp. 197-210, February 2008 | July 2007 | Networking | [PDF]
|
| On Selfish Routing in Internet-Like Environments | L. Qiu, Y.R. Yang, Y. Zhang, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM), Karlsruhe, Germany | August 2003 | Networking | [PDF]
|
| On Scalable Internet Multimedia Conferencing Systems | M. Handley | University of London Ph.D Thesis | November 1997 | Networking | |
| On Preserving Privacy in Information-Centric Networks | S. Arianfar, T. Koponen, B. Raghavan, and S. Shenker | Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN-2011), Toronto, Canada, pp. 19-24 | August 2011 | Networking | [PDF]
|
| On Making TCP More Robust to Packet Reordering | E. Blanton and M. Allman | ACM Computer Communication Review, 32(1), January 2002. | January 2002 | Networking | |
| On Estimating End-to-End Network Path Properties | M. Allman and V. Paxson | ACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean, April 2001. This paper was originally presented at ACM SIGCOMM 1999. | April 2001 | Networking | |
| On Estimating End-to-End Network Path Properties | M. Allman and V. Paxson | ACM SIGCOMM, September 1999, Cambridge, Massachusetts. | September 1999 | Networking | |
| On Dominant Characteristics of Residential Broadband Internet Traffic | G. Maier, A. Feldmann, V. Paxson, and M. Allman | Proceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 90-102 | November 2009 | Networking | [PDF]
|
| On Controller Performance in Software-Defined Networks | A. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and R. Sherwood | Proceedings of the USENIX NSDI Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), San Jose, California | April 2012 | Networking | [PDF]
|
| On Community-Oriented Internet Measurement | M. Allman, L. Martin, M. Rabinovich, and K. Atchinson | Proceedings of the Passive and Active Measurement Conference (PAM 2008), Cleveland, Ohio, pp. 112-121 | April 2008 | Networking | [PDF]
|
| On Characterizing Network Topologies and Analyzing Their Impact on Protocol Design | P. Radoslavov, H. Tangmunarunkit, H. Yu, R. Govindan, S. Shenker, and D. Estrin | Technical Report 00-731, Computer Science Department, University of Southern California, February 2000. | February 2000 | Networking | |
| On Calibrating Measurements of Packet Transit Times | V. Paxson | Proceedings of the International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '98), Madison, Wisconsin, pp. 11-21 | June 1998 | Networking | |
| On Calibrating Enterprise Switch Measurements | B. Nechaev, V. Paxson, M. Allman, and A. Gurtov | Proceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 143-155 | November 2009 | Networking | [PDF]
|
| On Building Special-Purpose Social Networks for Emergency Communication | M. Allman | ACM Computer Communication Review, Vol. 40, Issue 5 | October 2010 | Networking | [PDF]
|
| On Building Inexpensive Network Capabilities | C. Shue, A. Kalafut, M. Allman, and C. Taylor | ACM SIGCOMM Computer Communications Review, Vol. 42, No. 2, pp. 72-79 | April 2012 | Networking | [PDF]
|
| Off by Default | H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. Shenker | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| OCALA: An Architecture for Supporting Legacy Applications Over Overlays | D. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I. Stoica, and K. Wehrle | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 267-280 | May 2006 | Networking | [PDF]
|
| Observed Structure of Addresses in IP Traffic | E. Kohler, J. Li, V. Paxson, and S. Shenker | Proceedings of ACM SIGCOMM Internet Measurement Workshop, November 2002. Also in Proceedings of the 2nd Internet Measurement Workshop (IMW) 2002. | November 2002 | Networking | |
| Observed Structure of Addresses in IP Traffic | E. Kohler, J. Li, V. Paxson, and S. Shenker | IEEE/ACM Transactions on Networking, Vol. 14, No. 6, pp. 1207-1218 | December 2006 | Networking | [PDF]
|
| Object Oriented Circuit Generators in Java | M. Chu, N. Weaver, K. Sulimma, A. DeHon, and J. Wawrzynek | Proceedings of the IEEE Symposium on Field Programmable Custom Computing Machines (FCCM) | 1998 | Networking | |
| NS-3 Project Goals | T. Henderson, S. Roy, S. Floyd, and G. Riley | Proceedings of the Workshop on NS-2 (WNS2 2006), Pisa, Italy, article 13 | October 2006 | Networking | [PDF]
|
| Ns Simulator Tests for Random Early Detection (RED) Gateways | S. Floyd | Technical Report | October 1996 | Networking | |
| NOX: Towards an Operating System for Networks | N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker | ACM SIGCOMM Computer Communications Review, Vol. 38, No. 3, pp. 105-110 | July 2008 | Networking | [PDF]
|
| Notes on Burst Mitigation for Transport Protocols | M. Allman and E. Blanton | ACM SIGCOMM Computer Communication Review, Vol. 35, Issue 2, pp. 53-60. DOI:http://doi.acm.org/10.1145/1064413.1064419 | April 2005 | Networking | [PDF]
|
| NOSIX: A Portable Switch Interface for the Network Operating System | A. Wundsam and M.Yu | ICSI Technical Report TR-12-013 | October 2012 | Networking | [PDF]
|
| New Techniques for Making Transport Protocols Robust to Corruption-Based Loss | W. Eddy, S. Ostermann, and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88 | October 2004 | Networking | [PDF]
|
| Networking in the Long Emergency | B. Raghavan and J. Ma | Proceedings of the ACM SIGCOMM Workshop on Green Networking (GreenNet '11), Ontario, Canada, pp. 37-42 | August 2011 | Networking | [PDF]
|