| Search Strategies in Inter-Domain Traffic Engineering | K. Chandrayana, R.M. Karp, M. Roughan, S. Sen, and Y. Zhang | preprint 2004 | 2004 | Networking | |
| Routing as a Service | K. Lakshminarayanan, I. Stoica, and S. Shenker | Proceedings of the Service Architecture for Heterogeneous Access, Resources, and Applications Retreat (SAHARA 2004), Tahoe City, California | January 2004 | Networking | [PDF]
|
| Global Synchronization in Sensornets | J. Elson, R. M. Karp, C.H. Papadimitriou and S. Shenker | Proceedings of LATIN, pp. 609-624 | January 05 2004 | Networking | |
| Practical and Robust Geographic Routing in Wireless Networks | Y. Kim, R. Govindan, B. Karp, and S. Shenker | Submitted to Mobicom | January 05 2004 | Networking | |
| Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks | P. Levis, N. Patel, D. Culler, and S. Shenker | NSDI | January 05 2004 | Networking | |
| Identification of Protein Complexes by Comparative Analysis of Yeast and Bacterial Protein Interaction Data | R. Sharan, T. Ideker, B.P. Kelley, R. Shamir, and R.M. Karp | Proceedings of RECOMB 2004, pp. 282-289 | January 05 2004 | Networking | |
| Towards a Next Generation Inter-domain Routing Protocol | L. Subramanian, M. Caesar, M. Handley, M Mao, S. Shenker, and I. Stoica | Preprint 2004 | January 05 2004 | Networking | |
| RFC 3708: Using TCP DSACKs and SCTP Duplicate TSNs to Detect Spurious Retransmissions | E. Blanton and M. Allman | Request for Comments 3708, Experimental | February 2004 | Networking | [PDF]
|
| Spurring Adoption of DHTs with OpenHash, a Public DHT Service | B. Karp, S. Ratnasamy, S. Rhea, and S. Shenker | Proceedings of the Third International Workshop on Peer-to-Peer Systems, San Diego, California | February 2004 | Networking | [PDF]
|
| The SFRA: A Corner-Turn FPGA Architecture | N. Weaver, J. Hauser and J. Wawrzynek | Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12 | February 2004 | Networking | [PDF]
|
| RFC 3742: Limited Slow-Start for TCP with Large Congestion Windows | S. Floyd | Request For Comments 3742, Experimental | March 2004 | Networking | [PDF]
|
| RFC 3714: IAB Concerns Regarding Congestion Control for Voice Traffic in the Internet | S. Floyd and J. Kempf, Editors | Request For Comments 3714, Informational | March 2004 | Networking | [PDF]
|
| Listen and Whisper: Security Mechanisms for BGP | L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz | Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI '04), San Francisco, California | March 2004 | Networking | [PDF]
|
| Untangling the Web from DNS | M. Walfish, H. Balakrishnan, and S. Shenker | Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238 | March 2004 | Networking | [PDF]
|
| Modeling Wireless Links for Transport Protocols | A. Gurtov and S. Floyd | ACM Computer Communications Review, Vol. 34, No. 2, pp. 85-96 | April 2004 | Networking | [PDF]
|
| Approximation and Collusion in Multicast Cost Sharing | J. Feigenbaum, A. Archer, A. Krishnamurthy, R. Sami, and S. Shenker | Games and Economic Behavior, Vol. 47, Issue 1, pp. 36-71 | April 2004 | Networking | [PDF]
|
| Internet Indirection Infrastructure | I. Stoica, D. Adkins, S. Zhaung, S. Shenker, and S. Surana | IEEE/ACM Transactions on Networking, Vol. 12, Issue 2, pp. 205-218 | April 2004 | Networking | [PDF]
|
| RFC 3782: The NewReno Modification to TCP's Fast Recovery Algorithm | S. Floyd, T. Henderson, and A. Gurtov | Request For Comments 3782, Proposed Standard | April 05 2004 | Networking | [PDF]
|
| Fast Portscan Detection Using Sequention Hypothesis Testing | J. Jung, V. Paxson, A. Berger, and H. Balakrishnan | Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 211-225 | May 2004 | Networking | |
| A Worst-Case Worm | N. Weaver and V. Paxson | Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Towards an Economic Analysis of Trusted Systems (Position Paper) | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Towards an Economic Analysis of Trusted Systems | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Presented at the Third Annual Workshop on Economics of Information Security (WEIS04), Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being Slow | E. Friedman, M. Shor, S. Shenker, and B. Sopher | Games and Economic Behavior, Vol. 47, Issue 2, pp. 325-352 | May 2004 | Networking | |
| Reflections on Witty: Analyzing the Attacker | N. Weaver and D. Ellis | ;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37 | June 2004 | Networking | [PDF]
|
| Seamless Multimedia Communications in Heterogeneous Mobile Access Networks | P. M. Ruiz, J.A. Botia, A. Gomez-Skarmeta | Proceedings of the TERENA Networking Conference (TNC 2004), Rhodes, Greece | June 2004 | Networking | [PDF]
|
| Providing QoS through Machine Learning-Driven Adaptive Multimedia Applications | P. M. Ruiz, J. Botia, and A. Gomez-Skarmeta | IEEE Transactions on Systems, Man, and Cybernetics, Part-B, Vol. 34, No. 3, pp. 1398-1422 | June 2004 | Networking | |
| User-Aware Adaptive Applications for Enhanced Multimedia Quality in Heterogeneous Networking Environments | P. M. Ruiz, J.A. Botia, and A.Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3079 | June 2004 | Networking | [PDF]
|
| A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast | P. Radoslavov, C. Papadopoulos, R. Govindan, and D. Estrin | IEEE/ACM Transactions on Networking (TON), Volume 12, Issue 3, pp. 469-482 | June 05 2004 | Networking | |
| Brief Announcement: Prefix Hash Tree | S. Ramabhadran, S. Ratnasamy, J.M. Hellerstein, and S. Shenker | Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, p. 367 | July 2004 | Networking | [PDF]
|
| Mechanism Design for Policy Routing | J. Feigenbaum, R. Sami, and S. Shenker | Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, pp. 11-20 | July 2004 | Networking | [PDF]
|
| Maximal Source Coverage Adaptive Gateway Discovery for Hybrid Ad Hoc Networks | P. M. Ruiz and A.F. Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3158, pp. 28-41 | July 2004 | Networking | [PDF]
|
| A Layered Naming Architecture for the Internet | H. Balakrishnan, K. Lakshminaryanan, S. Ratnasamy, S. Shenker, I. Stoica, and M. Walfish | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2004), Portland, Oregon | August 2004 | Networking | [PDF]
|
| Worms vs. Perimeters: The Case for Hard-LANs | N. Weaver, D. Ellis, S. Staniford, and V. Paxson | Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12), Stanford, California, pp. 70-76 | August 2004 | Networking | [PDF]
|
| Very Fast Containment of Scanning Worms | N. Weaver, S. Staniford, and V. Paxson | Proceedings of the 13th USENIX Security Symposium, San Diego, California, pp. 29-44 | August 2004 | Networking | [PDF]
|
| RFC 3869: IAB Concerns & Recommendations Regarding Internet Research & Evolution | R. Atkinson and S. Floyd | RFC 3869 | August 2004 | Networking | [PDF]
|
| Enhancing P2P File-Sharing with an Internet-Scale Query Processor | B. Thau Loo , J. M. Hellerstein, R. Huebsch, S. Shenker, and I. Stoica | Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004), Toronto, Canada, pp. 432-443 | August 2004 | Networking | [PDF]
|
| Towards Engineering a Location-Aware Wireless Multi-Agent System | I. Nieto-Cavajal, P. M. Ruiz, J.A. Botia, and A.F. Gomez-Skarmeta | Proceedings of the Workshop on Applications of Software Agents in Engineering at the 16th European Conference on Artificial Intelligence (ECAI 2004), Valencia, Spain | August 2004 | Networking | |
| Implementation and Evaluation of a Location-Aware Wireless Multi-Agent System | I. Nieto-Carvajal, J.A. Botia, P. M. Ruiz, and A. Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3207, pp. 528-537 | August 2004 | Networking | [PDF]
|
| Integrated IP Multicast in Mobile Ad Hoc Networks with Multiple Attachments to Wired IP Networks | P. M. Ruiz and A.F. Gomez-Skarmeta | Proceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, Spain | September 2004 | Networking | [PDF]
|
| QoS and Micromobility Coupling Integrated with UMTS | L.A. Galindo and P. M. Ruiz | Proceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, Spain | September 2004 | Networking | [PDF]
|
| User-Aware Videoconference Session Control Using Software Agents | J.A. Botia, P. Ruiz, and A. Gomez-Skarmeta | Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), Beijing, China | September 2004 | Networking | |
| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks | R. Krishnan, J. Sterbenz, W. Eddy, C. Partridge, and M. Allman | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 46, Issue 3, pp. 343-362 | October 2004 | Networking | [PDF]
|
| New Techniques for Making Transport Protocols Robust to Corruption-Based Loss | W. Eddy, S. Ostermann, and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 34, Issue 5, pp. 75-88 | October 2004 | Networking | [PDF]
|
| Operational Experiences with High-Volume Network Intrusion Detection | H. Dreger, A. Feldmann, V. Paxson, and R. Sommer | Proceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004), Washington, D.C., Vol. 11, p. 2 | October 2004 | Networking | [PDF]
|
| The Top Speed of Flash Worms | S. Staniford, D. Moore, V. Paxson, and N. Weaver | Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, Virginia | October 2004 | Networking | [PDF]
|
| Preliminary Results Using ScaleDown to Explore Worm Dynamics | N. Weaver, I. Hamadeh, G. Kesidis, and V. Paxson | Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004), Fairfax, Virginia | October 2004 | Networking | [PDF]
|
| Characteristics of Internet Background Radiation | R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy | October 2004 | Networking | [PDF]
|
| Strategies for Sound Internet Measurement | V. Paxson | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy | October 2004 | Networking | [PDF]
|
| Measuring Interactions Between Transport Protocols and Middleboxes | A. Medina, M. Allman, and S. Floyd | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 336-341 | October 2004 | Networking | [PDF]
|
| Reducing Data-Overhead of Mesh-Based Ad Hoc Multicast Routing Protocols by Steiner Tree Meshes | P. M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), Santa Clara, California | October 2004 | Networking | [PDF]
|