Publication Search Results

TitleAuthorBibliographicDatesort ascendingGroupLinks
On the Impact of Bursting on TCP PerformanceE. Blanton and M. AllmanProceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, MassachusettsMarch 2005Networking[PDF]

The Network OracleJ. Hellerstein, V. Paxson, L. Peterson, T. Roscoe, S. Shenker, and D. WetherallIEEE Data Engineering Bulletin, Vol. 28, No. 1, pp. 3-10March 2005Networking[PDF]

OverCite: A Cooperative Digital Research LibraryJ. Stribling, I. Councill, J. Li, M. Frans Kaashoek, D. R. Karger, R. Morris, and S. ShenkerProceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 69-79February 2005Networking[PDF]

Peering Peer-to-Peer ProvidersH. Balakrishnan, S. Shenker, and M. WalfishProceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 104-114February 2005Networking[PDF]

The Architecture of PIER: An Internet-Scale Query ProcessorR. Huebsch, B. Chun, J. M. Hellerstein, B. T. Loo, P. Maniatis, T. Roscoe, S. Shenker, I. Stoica, and A. R. YumerefendiProceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, California, pp. 28-43January 2005Networking[PDF]

Internet Topology: Discovery and Policy Impact, Parts I and IIH. Tangmunarunkit, R. Govindan, and S. ShenkerIn The Internet as a Large-Scale Complex System, K. Park and W. Willinger, eds., pp. 121-160, Oxford University Press 2005Networking[PDF]

Middleboxes No Longer Considered HarmfulM. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. ShenkerProceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI '04), San Francisco, California, pp. 215-230December 2004Networking[PDF]

Mobility-Aware Mesh Construction Algorithm for Low Data-Overhead Multicast Ad Hoc RoutingP. M. Ruiz and A.F. Gomez SkarmetaJournal of Communications and Networks (JCN), Vol. 6, No. 4, pp. 331-342December 2004Networking[PDF]

Exploiting Independent State For Network Intrusion DetectionR. Sommer and V. PaxsonTechnische Universität München Technical Report No. TUM-I0420, Munich, GermanyNovember 2004Networking[PDF]

Overcoming the Internet Impasse through VirtualizationL. Peterson, S. Shenker, and J.TurnerProceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

Towards a Next Generation Inter-domain Routing ProtocolL. Subramanian, M. Caesar, C. Tien Ee, M. Handley, Z. Morley Mao, S. Shenker, and I. StoicaProceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

Reduced State Routing in the InternetR. Gummadi, N. Kothari, Y.-J. Kim, R. Govindan, B. Karp, and S. ShenkerProceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

Providing Packet ObituariesK. Argyraki, P. Maniatis, D. Cheriton, and Scott ShenkerProceedings of the Third Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

Enhanced Internet Connectivity for Hybrid Ad Hoc Networks Through Adaptive Gateway DiscoveryP. M. Ruiz and A.F. Gomez SkarmetaProceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), Tampa, FloridaNovember 2004Networking[PDF]

Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite NetworksR. Krishnan, J. Sterbenz, W. Eddy, C. Partridge, and M. AllmanComputer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 46, Issue 3, pp. 343-362October 2004Networking[PDF]

New Techniques for Making Transport Protocols Robust to Corruption-Based LossW. Eddy, S. Ostermann, and M. AllmanACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88October 2004Networking[PDF]

Operational Experiences with High-Volume Network Intrusion DetectionH. Dreger, A. Feldmann, V. Paxson, and R. SommerProceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004), Washington, D.C., Vol. 11, p. 2October 2004Networking[PDF]

The Top Speed of Flash WormsS. Staniford, D. Moore, V. Paxson, and N. WeaverProceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, VirginiaOctober 2004Networking[PDF]

Preliminary Results Using ScaleDown to Explore Worm DynamicsN. Weaver, I. Hamadeh, G. Kesidis, and V. PaxsonProceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, VirginiaOctober 2004Networking[PDF]

Characteristics of Internet Background RadiationR. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. PetersonProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, ItalyOctober 2004Networking[PDF]

Strategies for Sound Internet MeasurementV. PaxsonProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, ItalyOctober 2004Networking[PDF]

Measuring Interactions Between Transport Protocols and MiddleboxesA. Medina, M. Allman, and S. FloydProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 336-341October 2004Networking[PDF]

Reducing Data-Overhead of Mesh-Based Ad Hoc Multicast Routing Protocols by Steiner Tree MeshesP. M. Ruiz and A.F. Gomez SkarmetaProceedings of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), Santa Clara, CaliforniaOctober 2004Networking[PDF]

MultiQ: Automated Detection of Multiple Bottlenexk Capacities Along a PathS. Katti, D. Katabi, C. Blake, E. Kohler, and J. StraussProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 245-250October 2004Networking[PDF]

Integrated IP Multicast in Mobile Ad Hoc Networks with Multiple Attachments to Wired IP NetworksP. M. Ruiz and A.F. Gomez-SkarmetaProceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, SpainSeptember 2004Networking[PDF]

QoS and Micromobility Coupling Integrated with UMTSL.A. Galindo and P. M. RuizProceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, SpainSeptember 2004Networking[PDF]

User-Aware Videoconference Session Control Using Software AgentsJ.A. Botia, P. Ruiz, and A. Gomez-SkarmetaProceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), Beijing, ChinaSeptember 2004Networking
A Layered Naming Architecture for the InternetH. Balakrishnan, K. Lakshminaryanan, S. Ratnasamy, S. Shenker, I. Stoica, and M. WalfishProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2004), Portland, OregonAugust 2004Networking[PDF]

Worms vs. Perimeters: The Case for Hard-LANsN. Weaver, D. Ellis, S. Staniford, and V. PaxsonProceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12), Stanford, California, pp. 70-76August 2004Networking[PDF]

Very Fast Containment of Scanning WormsN. Weaver, S. Staniford, and V. PaxsonProceedings of the 13th USENIX Security Symposium, San Diego, California, pp. 29-44August 2004Networking[PDF]

RFC 3869: IAB Concerns & Recommendations Regarding Internet Research & EvolutionR. Atkinson and S. FloydRFC 3869August 2004Networking[PDF]

Enhancing P2P File-Sharing with an Internet-Scale Query ProcessorB. Thau Loo , J. M. Hellerstein, R. Huebsch, S. Shenker, and I. StoicaProceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004), Toronto, Canada, pp. 432-443August 2004Networking[PDF]

Towards Engineering a Location-Aware Wireless Multi-Agent SystemI. Nieto-Cavajal, P. M. Ruiz, J.A. Botia, and A.F. Gomez-SkarmetaProceedings of the Workshop on Applications of Software Agents in Engineering at the 16th European Conference on Artificial Intelligence (ECAI 2004), Valencia, SpainAugust 2004Networking
Implementation and Evaluation of a Location-Aware Wireless Multi-Agent SystemI. Nieto-Carvajal, J.A. Botia, P. M. Ruiz, and A. Gomez-SkarmetaLecture Notes in Computer Science, Vol. 3207, pp. 528-537August 2004Networking[PDF]

Brief Announcement: Prefix Hash TreeS. Ramabhadran, S. Ratnasamy, J.M. Hellerstein, and S. ShenkerProceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, p. 367July 2004Networking[PDF]

Mechanism Design for Policy RoutingJ. Feigenbaum, R. Sami, and S. ShenkerProceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, pp. 11-20July 2004Networking[PDF]

Maximal Source Coverage Adaptive Gateway Discovery for Hybrid Ad Hoc NetworksP. M. Ruiz and A.F. Gomez-SkarmetaLecture Notes in Computer Science, Vol. 3158, pp. 28-41July 2004Networking[PDF]

A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable MulticastP. Radoslavov, C. Papadopoulos, R. Govindan, and D. EstrinIEEE/ACM Transactions on Networking (TON), Volume 12, Issue 3, pp. 469-482June 05 2004Networking
Reflections on Witty: Analyzing the AttackerN. Weaver and D. Ellis;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37June 2004Networking[PDF]

Seamless Multimedia Communications in Heterogeneous Mobile Access NetworksP. M. Ruiz, J.A. Botia, A. Gomez-SkarmetaProceedings of the TERENA Networking Conference (TNC 2004), Rhodes, GreeceJune 2004Networking[PDF]

Providing QoS through Machine Learning-Driven Adaptive Multimedia ApplicationsP. M. Ruiz, J. Botia, and A. Gomez-SkarmetaIEEE Transactions on Systems, Man, and Cybernetics, Part-B, Vol. 34, No. 3, pp. 1398-1422June 2004Networking
User-Aware Adaptive Applications for Enhanced Multimedia Quality in Heterogeneous Networking EnvironmentsP. M. Ruiz, J.A. Botia, and A.Gomez-SkarmetaLecture Notes in Computer Science, Vol. 3079June 2004Networking[PDF]

Fast Portscan Detection Using Sequention Hypothesis TestingJ. Jung, V. Paxson, A. Berger, and H. BalakrishnanProceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 211-225May 2004Networking
A Worst-Case WormN. Weaver and V. PaxsonProceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, MinnesotaMay 2004Networking[PDF]

Towards an Economic Analysis of Trusted Systems (Position Paper)D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. SmithProceedings of the Third Workshop on Economics and Information Security, Minneapolis, MinnesotaMay 2004Networking[PDF]

Towards an Economic Analysis of Trusted SystemsD. Bergemann, J. Feigenbaum, S. Shenker, and J. M. SmithPresented at the Third Annual Workshop on Economics of Information Security (WEIS04), Minneapolis, MinnesotaMay 2004Networking[PDF]

An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being SlowE. Friedman, M. Shor, S. Shenker, and B. SopherGames and Economic Behavior, Vol. 47, Issue 2, pp. 325-352May 2004Networking
RFC 3782: The NewReno Modification to TCP's Fast Recovery AlgorithmS. Floyd, T. Henderson, and A. GurtovRequest For Comments 3782, Proposed StandardApril 05 2004Networking[PDF]

Modeling Wireless Links for Transport ProtocolsA. Gurtov and S. FloydACM Computer Communications Review, Vol. 34, No. 2, pp. 85-96April 2004Networking[PDF]

Approximation and Collusion in Multicast Cost SharingJ. Feigenbaum, A. Archer, A. Krishnamurthy, R. Sami, and S. ShenkerGames and Economic Behavior, Vol. 47, Issue 1, pp. 36-71April 2004Networking[PDF]

Pages