Publication Search Results

TitleAuthorBibliographicsort ascendingDateGroupLinks
Pathlet RoutingP. B. Godfrey, S. Shenker, and I. StoicaProceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 97-102October 2008Networking[PDF]

Reducing Transient Disconnectivity Using Anomaly-Cognizant ForwardingA. Ermolinskiy and S. ShenkerProceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 91-96October 2008Networking[PDF]

Incentive-Compatible Interdomain RoutingJ. Feigenbaum, V. Ramachandran, and M. SchapiraProceedings of the 7th ACM Conference on Electronic Commerce (EC'06), Ann Arbor, Michigan, pp. 130-139June 2006Networking[PDF]

Holding the Internet AccountableD. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. ShenkerProceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, GeorgiaNovember 2007Networking[PDF]

Skilled in the Art of Being Idle: Reducing Energy Waste in Networked SystemsS. Nedevschi, J. Chandrashenkar, B. Nordman, S. Ratnasamy, and N. TaftProceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), Boston, Massachusetts, pp. 381-394April 2009Networking[PDF]

Middleboxes No Longer Considered HarmfulM. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. ShenkerProceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI '04), San Francisco, California, pp. 215-230December 2004Networking[PDF]

Distributed Algorithmic Mechanism Design: Recent Results and Future DirectionsJ. Feigenbaum and S. ShenkerProceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM'02), Atlanta, Georgia, pp. 1-13September 2002Networking[PDF]

HTTP Page Transfer Rates Over Geo-Stationary Satellite LinksH. Kruse, M. Allman, J. Griner, and D. TranProceedings of the 6th International Conference on Telecommunication Systems, Nashville, TennesseeMarch 1998Networking
A Cost Comparison of Datacenter Network ArchitecturesL. Popa, S. Ratnasamy, G. Iannaccone, A. Krishnamurthy, and I. StoicaProceedings of the 6th ACM International Conference on Emerging Networking EXperiments and Technologies, Philadelphia, Pennsylvania, article no. 16December 2010Networking[PDF]

Hidden-Action in Multi-Hop RoutingM. Feldman, J. Chuang, I. Stoica, and S. ShenkerProceedings of the 6th ACM Conference on Electronic Commerce (EC'05), Vancouver, Canada , pp. 117-126June 2005Networking[PDF]

Reducing Network Energy Consumption via Sleeping and Rate-AdaptationS. Nedevschi, L. Popa, G. Iannaccone, S. Raynasamy, and D. WetherallProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, California, pp. 323-336April 2008Networking[PDF]

Beyond Pilots: Keeping Rural Wireless Networks AliveS. Surana, R. Patra, S. Nedevschi, M. Ramos, L. Subramanian, Y. Ben-David, and E. BrewerProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, CaliforniaApril 2008Networking[PDF]

NetComplex: A Complexity Metric for Network System DesignsB.-G. Chun, S. Ratnasamy, and E. KohlerProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 393-406April 2008Networking
Detecting In-Flight Page Changes with Web TripwiresC. Reis, S. Gribble, T. Kohno, and N. WeaverProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 31-44April 2008Networking[PDF]

Why Let Resources Idle? Aggressive Cloning of Jobs with DollyG. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. StoicaProceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), Boston, MassachusettsJune 2012Networking[PDF]

Optimization Problems in Congestion ControlR.M. Karp, E. Koutsoupias, C.H. Papadimitriou, and S. ShenkerProceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS 2000), Redondo Beach, California, pp. 66-74November 2000Networking[PDF]

Peer to Peer Edge Caches Should Be FreeN. WeaverProceedings of the 37th Research Conference on Communication, Information, and Internet Policy, Arlington, VirginiaSeptember 2009Networking[PDF]

A Stochastic Process on the Hypercube with Applications to Peer-to-peer NetworksM. Adler, E. Halperin, R. M. Karp, and V VaziraniProceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC 2003), San Diego, California, pp. 575-584June 2003Networking[PDF]

An ATM Distributed Simulator for Network Management ResearchJ. L. Marzo, P. Vilà, L. Fàbrega, and D. MassaguerProceedings of the 34th Annual Simulation Symposium (SS 2001), Seattle, Washington, pp. 185-192April 2001Networking
Prudent Practices for Designing Malware Experiments: Status Quo and OutlookC. Rossow, C. J. Dietrich, C. Kreibich, C. Grier, V. Paxson, N. Pohlmann, H. Bos, and M. van SteenProceedings of the 33rd IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, California, pp. 65-79May 2012Networking[PDF]

Design and Evaluation of a Real-Time URL Spam Filtering ServiceK. Thomas, C. Grier, J. Ma, V. Paxson, and D. SongProceedings of the 32nd IEEE Symposium on Security and Privacy, Oakland, California, pp. 447-464May 2011Networking[PDF]

Sharing the Cost of Multicast TransmissionsJ. Feigenbaum, C. Papadimitriou, and S. ShenkerProceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC 2000), Portland, Oregon, pp. 218-227May 2000Networking
Enhancing P2P File-Sharing with an Internet-Scale Query ProcessorB. Thau Loo , J. M. Hellerstein, R. Huebsch, S. Shenker, and I. StoicaProceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004), Toronto, Canada, pp. 432-443August 2004Networking[PDF]

Finding a ‘Kneedle’ in a Haystack: Detecting Knee Points in System BehaviorV. Satopaa, J. Albrecht, D. Irwin, and B. RaghavanProceedings of the 30th International Conference on Distributed Computing Systems SIMPLEX Workshop (ICDCS 2010), Genoa, ItalyJune 2010Networking[PDF]

Spark: Cluster Computing with Working SetsM. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker and I. StoicaProceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, MassachusettsJune 2010Networking[PDF]

Querying the Internet with PIERR. Huebsch, J.M. Hellerstein, N. Lanham, B.T. Loo, S. Shenker, and I. StoicaProceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003), Berlin, GermanySeptember 2003Networking[PDF]

Enhanced Internet Connectivity for Hybrid Ad Hoc Networks Through Adaptive Gateway DiscoveryP. M. Ruiz and A.F. Gomez SkarmetaProceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), Tampa, FloridaNovember 2004Networking[PDF]

Trained to Accept? A Field Experiment on Consent DialogsR. Boehme and S. KoepsellProceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406April 2010Networking[PDF]

SmartSeer: Using a DHT to Process Continuous Queries over Peer-to-Peer NetworksS. Banerjee, S. Basu, J. Kannan, S. J. Lee, P. Sharma, S. Shenker, and B. YangProceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), Barcelona, Spain, pp. 1-12April 2006Networking[PDF]

The "Dresden Image Database" for Benchmarking Digital Image ForensicsT. Gloe and R. BoehmeProceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010), pp. 1584-1590, Sierre, SwitzerlandMarch 2010Networking
Open Source vs. Closed Source Software: Towards Measuring SecurityG. Schryen and R. KaduraProceedings of the 24th Annual ACM Symposium on Applied Computing (SAC 2009), Honolulu, Hawaii, pp. 2016-2023March 2009Networking[PDF]

Reliable Broadcast in Unknown Fixed-Identity NetworksL. Subramanian, R. Katz, V. Roth, S. Shenker, and I. StoicaProceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC 2005), Las Vegas, California, pp. 342-351July 2005Networking[PDF]

Mechanism Design for Policy RoutingJ. Feigenbaum, R. Sami, and S. ShenkerProceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, pp. 11-20July 2004Networking[PDF]

Brief Announcement: Prefix Hash TreeS. Ramabhadran, S. Ratnasamy, J.M. Hellerstein, and S. ShenkerProceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, p. 367July 2004Networking[PDF]

A Tool for Debugging Internet Multicast RoutingD. Agarwal and S. FloydProceedings of the 22nd Annual ACM Computer Science Conference (CSC '94), Phoenix, ArizonaMarch 1994Networking
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate ProgramsD. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. LevchenkoProceedings of the 21st USENIX Security Symposium, Bellevue, WashingtonAugust 2012Networking[PDF]

Exploiting Independent State For Network Intrusion DetectionR. Sommer and V. PaxsonProceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, pp. 59-71December 2005Networking[PDF]

A BGP-Based Mechanism for Lowest-Cost RoutingJ. Feigenbaum, C.H. Papadimitriou, R. Sami, and S. ShenkerProceedings of the 21st ACM Symposium on Principles of Distributed Computing (PODC 2002), Monterey, California, pp. 173-182.July 2002Networking[PDF]

Attested Append-Only Memory: Making Adversaries Stick to their WordB.-G. Chun, P. Maniatis, S. Shenker, and J. KubiatowiczProceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, Washington, pp. 189-204October 2007Networking[PDF]

Redirecting DNS for Ads and ProfitN. Weaver, C. Kreibich, and V. PaxsonProceedings of the 20th USENIX Security Symposium's Workshop on Free and Open Communications on the Internet (FOCI '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

Measuring Pay-per-Install: The Commoditization of Malware DistributionJ. Cabellero, C. Grier, C. Kreibich, and V. PaxsonProceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

Show Me the Money: Characterizing Spam-Advertised RevenueC. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. SavageProceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

Fathom: A Browser-based Network Measurement PlatformM. Dhawan, J. Samuel, R. Teixeira, C. Kreibich, M. Allman, N. Weaver, and V. PaxsonProceedings of the 2012 Internet Measurement Conference (IMC 2012), Boston, MassachusettsNovember 2012Networking[PDF]

GQ: Practical Containment for Measuring Modern Malware SystemsC. Kreibich, N. Weaver, C. Kanich, W. Cui, V. PaxsonProceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany. Also appeared as ICSI Technical Report TR-11-002.November 2011Networking
Suspended Accounts in Retrospect: An Analysis of Twitter SpamK. Thomas, C. Grier, V. Paxson, and D. SongProceedings of the 2011 Internet Measurement Conference (IMC), Berlin, GermanyNovember 2011Networking[PDF]

A Preliminary Analysis of TCP Performance in an Enterprise NetworkB. Nechaev, M. Allman, V. Paxson, and A. GurtovProceedings of the 2010 Internet Network Management Workshop/Workshop on Research and Enterprise Networking (INM/WREN '10), San Jose, CaliforniaApril 2010Networking[PDF]

On Dominant Characteristics of Residential Broadband Internet TrafficG. Maier, A. Feldmann, V. Paxson, and M. AllmanProceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 90-102November 2009Networking[PDF]

On Calibrating Enterprise Switch MeasurementsB. Nechaev, V. Paxson, M. Allman, and A. GurtovProceedings of the 2009 Internet Measurement Conference (IMC 2009), Chicago, Illinois, pp. 143-155November 2009Networking[PDF]

Replay Debugging for Distributed ApplicationsD. Geels, G. Altekar, S. Shenker, and I. StoicaProceedings of the 2006 USENIX Annual Technical Conference (best paper), Boston, Massachusetts, pp. 289-300May 2006Networking[PDF]

Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale EventA. Kumar, V. Paxson, and N. WeaverProceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 351-364October 2005Networking[PDF]

Pages