| On the Impact of Bursting on TCP Performance | E. Blanton and M. Allman | Proceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, Massachusetts | March 2005 | Networking | [PDF]
|
| The Network Oracle | J. Hellerstein, V. Paxson, L. Peterson, T. Roscoe, S. Shenker, and D. Wetherall | IEEE Data Engineering Bulletin, Vol. 28, No. 1, pp. 3-10 | March 2005 | Networking | [PDF]
|
| OverCite: A Cooperative Digital Research Library | J. Stribling, I. Councill, J. Li, M. Frans Kaashoek, D. R. Karger, R. Morris, and S. Shenker | Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 69-79 | February 2005 | Networking | [PDF]
|
| Peering Peer-to-Peer Providers | H. Balakrishnan, S. Shenker, and M. Walfish | Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 104-114 | February 2005 | Networking | [PDF]
|
| The Architecture of PIER: An Internet-Scale Query Processor | R. Huebsch, B. Chun, J. M. Hellerstein, B. T. Loo, P. Maniatis, T. Roscoe, S. Shenker, I. Stoica, and A. R. Yumerefendi | Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, California, pp. 28-43 | January 2005 | Networking | [PDF]
|
| Internet Topology: Discovery and Policy Impact, Parts I and II | H. Tangmunarunkit, R. Govindan, and S. Shenker | In The Internet as a Large-Scale Complex System, K. Park and W. Willinger, eds., pp. 121-160, Oxford University Press | 2005 | Networking | [PDF]
|
| Middleboxes No Longer Considered Harmful | M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker | Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI '04), San Francisco, California, pp. 215-230 | December 2004 | Networking | [PDF]
|
| Mobility-Aware Mesh Construction Algorithm for Low Data-Overhead Multicast Ad Hoc Routing | P. M. Ruiz and A.F. Gomez Skarmeta | Journal of Communications and Networks (JCN), Vol. 6, No. 4, pp. 331-342 | December 2004 | Networking | [PDF]
|
| Exploiting Independent State For Network Intrusion Detection | R. Sommer and V. Paxson | Technische Universität München Technical Report No. TUM-I0420, Munich, Germany | November 2004 | Networking | [PDF]
|
| Overcoming the Internet Impasse through Virtualization | L. Peterson, S. Shenker, and J.Turner | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Towards a Next Generation Inter-domain Routing Protocol | L. Subramanian, M. Caesar, C. Tien Ee, M. Handley, Z. Morley Mao, S. Shenker, and I. Stoica | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Reduced State Routing in the Internet | R. Gummadi, N. Kothari, Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Providing Packet Obituaries | K. Argyraki, P. Maniatis, D. Cheriton, and Scott Shenker | Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Enhanced Internet Connectivity for Hybrid Ad Hoc Networks Through Adaptive Gateway Discovery | P. M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), Tampa, Florida | November 2004 | Networking | [PDF]
|
| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks | R. Krishnan, J. Sterbenz, W. Eddy, C. Partridge, and M. Allman | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 46, Issue 3, pp. 343-362 | October 2004 | Networking | [PDF]
|
| New Techniques for Making Transport Protocols Robust to Corruption-Based Loss | W. Eddy, S. Ostermann, and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88 | October 2004 | Networking | [PDF]
|
| Operational Experiences with High-Volume Network Intrusion Detection | H. Dreger, A. Feldmann, V. Paxson, and R. Sommer | Proceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004), Washington, D.C., Vol. 11, p. 2 | October 2004 | Networking | [PDF]
|
| The Top Speed of Flash Worms | S. Staniford, D. Moore, V. Paxson, and N. Weaver | Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, Virginia | October 2004 | Networking | [PDF]
|
| Preliminary Results Using ScaleDown to Explore Worm Dynamics | N. Weaver, I. Hamadeh, G. Kesidis, and V. Paxson | Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, Virginia | October 2004 | Networking | [PDF]
|
| Characteristics of Internet Background Radiation | R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy | October 2004 | Networking | [PDF]
|
| Strategies for Sound Internet Measurement | V. Paxson | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy | October 2004 | Networking | [PDF]
|
| Measuring Interactions Between Transport Protocols and Middleboxes | A. Medina, M. Allman, and S. Floyd | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 336-341 | October 2004 | Networking | [PDF]
|
| Reducing Data-Overhead of Mesh-Based Ad Hoc Multicast Routing Protocols by Steiner Tree Meshes | P. M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), Santa Clara, California | October 2004 | Networking | [PDF]
|
| MultiQ: Automated Detection of Multiple Bottlenexk Capacities Along a Path | S. Katti, D. Katabi, C. Blake, E. Kohler, and J. Strauss | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 245-250 | October 2004 | Networking | [PDF]
|
| Integrated IP Multicast in Mobile Ad Hoc Networks with Multiple Attachments to Wired IP Networks | P. M. Ruiz and A.F. Gomez-Skarmeta | Proceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, Spain | September 2004 | Networking | [PDF]
|
| QoS and Micromobility Coupling Integrated with UMTS | L.A. Galindo and P. M. Ruiz | Proceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, Spain | September 2004 | Networking | [PDF]
|
| User-Aware Videoconference Session Control Using Software Agents | J.A. Botia, P. Ruiz, and A. Gomez-Skarmeta | Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), Beijing, China | September 2004 | Networking | |
| A Layered Naming Architecture for the Internet | H. Balakrishnan, K. Lakshminaryanan, S. Ratnasamy, S. Shenker, I. Stoica, and M. Walfish | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2004), Portland, Oregon | August 2004 | Networking | [PDF]
|
| Worms vs. Perimeters: The Case for Hard-LANs | N. Weaver, D. Ellis, S. Staniford, and V. Paxson | Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12), Stanford, California, pp. 70-76 | August 2004 | Networking | [PDF]
|
| Very Fast Containment of Scanning Worms | N. Weaver, S. Staniford, and V. Paxson | Proceedings of the 13th USENIX Security Symposium, San Diego, California, pp. 29-44 | August 2004 | Networking | [PDF]
|
| RFC 3869: IAB Concerns & Recommendations Regarding Internet Research & Evolution | R. Atkinson and S. Floyd | RFC 3869 | August 2004 | Networking | [PDF]
|
| Enhancing P2P File-Sharing with an Internet-Scale Query Processor | B. Thau Loo , J. M. Hellerstein, R. Huebsch, S. Shenker, and I. Stoica | Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004), Toronto, Canada, pp. 432-443 | August 2004 | Networking | [PDF]
|
| Towards Engineering a Location-Aware Wireless Multi-Agent System | I. Nieto-Cavajal, P. M. Ruiz, J.A. Botia, and A.F. Gomez-Skarmeta | Proceedings of the Workshop on Applications of Software Agents in Engineering at the 16th European Conference on Artificial Intelligence (ECAI 2004), Valencia, Spain | August 2004 | Networking | |
| Implementation and Evaluation of a Location-Aware Wireless Multi-Agent System | I. Nieto-Carvajal, J.A. Botia, P. M. Ruiz, and A. Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3207, pp. 528-537 | August 2004 | Networking | [PDF]
|
| Brief Announcement: Prefix Hash Tree | S. Ramabhadran, S. Ratnasamy, J.M. Hellerstein, and S. Shenker | Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, p. 367 | July 2004 | Networking | [PDF]
|
| Mechanism Design for Policy Routing | J. Feigenbaum, R. Sami, and S. Shenker | Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, pp. 11-20 | July 2004 | Networking | [PDF]
|
| Maximal Source Coverage Adaptive Gateway Discovery for Hybrid Ad Hoc Networks | P. M. Ruiz and A.F. Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3158, pp. 28-41 | July 2004 | Networking | [PDF]
|
| A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast | P. Radoslavov, C. Papadopoulos, R. Govindan, and D. Estrin | IEEE/ACM Transactions on Networking (TON), Volume 12, Issue 3, pp. 469-482 | June 05 2004 | Networking | |
| Reflections on Witty: Analyzing the Attacker | N. Weaver and D. Ellis | ;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37 | June 2004 | Networking | [PDF]
|
| Seamless Multimedia Communications in Heterogeneous Mobile Access Networks | P. M. Ruiz, J.A. Botia, A. Gomez-Skarmeta | Proceedings of the TERENA Networking Conference (TNC 2004), Rhodes, Greece | June 2004 | Networking | [PDF]
|
| Providing QoS through Machine Learning-Driven Adaptive Multimedia Applications | P. M. Ruiz, J. Botia, and A. Gomez-Skarmeta | IEEE Transactions on Systems, Man, and Cybernetics, Part-B, Vol. 34, No. 3, pp. 1398-1422 | June 2004 | Networking | |
| User-Aware Adaptive Applications for Enhanced Multimedia Quality in Heterogeneous Networking Environments | P. M. Ruiz, J.A. Botia, and A.Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3079 | June 2004 | Networking | [PDF]
|
| Fast Portscan Detection Using Sequention Hypothesis Testing | J. Jung, V. Paxson, A. Berger, and H. Balakrishnan | Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 211-225 | May 2004 | Networking | |
| A Worst-Case Worm | N. Weaver and V. Paxson | Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Towards an Economic Analysis of Trusted Systems (Position Paper) | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Towards an Economic Analysis of Trusted Systems | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Presented at the Third Annual Workshop on Economics of Information Security (WEIS04), Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being Slow | E. Friedman, M. Shor, S. Shenker, and B. Sopher | Games and Economic Behavior, Vol. 47, Issue 2, pp. 325-352 | May 2004 | Networking | |
| RFC 3782: The NewReno Modification to TCP's Fast Recovery Algorithm | S. Floyd, T. Henderson, and A. Gurtov | Request For Comments 3782, Proposed Standard | April 05 2004 | Networking | [PDF]
|
| Modeling Wireless Links for Transport Protocols | A. Gurtov and S. Floyd | ACM Computer Communications Review, Vol. 34, No. 2, pp. 85-96 | April 2004 | Networking | [PDF]
|
| Approximation and Collusion in Multicast Cost Sharing | J. Feigenbaum, A. Archer, A. Krishnamurthy, R. Sami, and S. Shenker | Games and Economic Behavior, Vol. 47, Issue 1, pp. 36-71 | April 2004 | Networking | [PDF]
|