| Network Visualization with the Nam, VINT Network Animator | D. Estrin, M. Handley, J. Heidemann, S. McCanne, Y. Xu, and H. Yu | IEEE Computer, 33(11), 63-68, November 2000. | November 2000 | Networking | |
| Network Topology Generators: Degree-Based vs. Structural | H. Tangmunarunkit, R. Govindan, S. Jamin, S. Shenker, and W. Willinger | Proceedings ACM SIGCOMM 2002. | 2002 | Networking | |
| Network Text Editor (NTE): A scalable shared text editor for the MBone | M. Handley and J. Crowcroft | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Canne, France | September 1997 | Networking | |
| Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications | A. Parker, S. Reddy, T. Schmid, K. Chang, G. Saurabh, M. Srivastava, M. Hansen, J. Burke, D. Estrin, M. Allman, and V. Paxson | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 37-42 | November 2006 | Networking | [PDF]
|
| Network Loss Tomography Using Striped Unicast Probes | N. Duffield, F. Lo Presti, V. Paxson, and D. Towsley | IEEE/ACM Transactions on Networking, Vol. 14 Issue 4, pp. 697-710 | August 2006 | Networking | [PDF]
|
| Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML) | M. Handley, C. Kreibich, and V. Paxson | Proceedings of USENIX Security Symposium 2001. | 2001 | Networking | |
| Network element service specification template | S. Shenker and J. Wroclawski | Request for Comments (Informational) 2216, Internet Engineering Task Force | September 1997 | Networking | |
| Network and User-Perceived Performance of Web Page Retrievals | H. Kruse, M. Allman, and P. Mallasch | Proceedings of the First International Conference on Telecommunications and Electronic Commerce (ICTEC) | November 1998 | Networking | |
| NetComplex: A Complexity Metric for Network System Designs | B.-G. Chun, S. Ratnasamy, and E. Kohler | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 393-406 | April 2008 | Networking | |
| Netalyzr: Illuminating The Edge Network | C. Kreibich, N. Weaver, B. Nechaev, and V. Paxson | Proceedings of the Internet Measurement Conference (IMC 2010), Melbourne, Australia, pp. 246-259 | November 2010 | Networking | [PDF]
|
| NAT Usage in Residential Broadband Networks | G. Maier, F. Schneider, and A. Feldmann | Proceedings of the 12th International Conference on Passive and Active Network Measurement (PAM 2011), Atlanta, Georgia | March 2011 | Networking | [PDF]
|
| Naming in Content-Oriented Architectures | A. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti, and S. Shenker | Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN 2011), Toronto, ON, Canada | August 2011 | Networking | [PDF]
|
| Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay | D. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford | Proceedings of RAID, 2002. | 2002 | Networking | |
| MultiQ: Automated Detection of Multiple Bottlenexk Capacities Along a Path | S. Katti, D. Katabi, C. Blake, E. Kohler, and J. Strauss | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 245-250 | October 2004 | Networking | [PDF]
|
| Multiple Data Connection FTP Extensions | M. Allman and S. Ostermann | Technical Report TR-19971, Ohio University Computer Science | February 1997 | Networking | |
| Multimedia Proxy Caching for Quality Adaptive Streaming Applications in the Internet | R. Rejaie, H. Yu, M. Handley, and D. Estrin | Proceedings of Infocom 2000. | 2000 | Networking | |
| Multicast-Scope Zone Announcement Protocol (MZAP) | M. Handley, D. Thaler, and R. Kermode | Request for Comments 2776, Proposed Standard, February 2000. | February 2000 | Networking | |
| Modular Components for Network Address Translation | E. Kohler, R. Morris, and M. Poletto | Proceedings of the Fifth International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50.Proceedings of the 5th International Conference on Open Architectures and Network Programming (OPENARCH '02), New York, New York, June 2002, pages 39-50. | June 2002 | Networking | |
| Modeling Wireless Links for Transport Protocols | A. Gurtov and S. Floyd | ACM Computer Communications Review, Vol. 34, No. 2, pp. 85-96 | April 2004 | Networking | [PDF]
|
| Modeling Cyber-Insurance: Towards a Unifying Framework | R. Boehme and G. Schwartz | Proceedings of the 9th Workshop on the Economics of Information Security (WEIS 2010), Cambridge, Massachusetts | June 2010 | Networking | [PDF]
|
| Mobility-Aware Mesh Construction Algorithm for Low Data-Overhead Multicast Ad Hoc Routing | P. M. Ruiz and A.F. Gomez Skarmeta | Journal of Communications and Networks (JCN), Vol. 6, No. 4, pp. 331-342 | December 2004 | Networking | [PDF]
|
| Mobile Agent Interoperability Patterns and Practice | U. Pinsdorf and V. Roth | Proceedings Ninth Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, Lund, Sweden, April 2002. | April 2002 | Networking | |
| Minuet: Rethinking Concurrency Control in Storage Area Networks | A. Ermolinskiy, D. Moon, B. Chun, and S. Shenker | Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California | February 2009 | Networking | [PDF]
|
| Minimizing Churn in Distributed Systems | P. B. Godfrey, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 147-158 | September 2006 | Networking | [PDF]
|
| Middleboxes No Longer Considered Harmful | M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker | Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI '04), San Francisco, California, pp. 215-230 | December 2004 | Networking | [PDF]
|
| Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al Encaminar | C.M. Yago, P. M. Ruiz, and A.F. Gomez Skarmeta | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Mesos: Flexible Resource Sharing for the Cloud | B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A.D. Joseph, R. Katz, S. Shenker and I. Stoica | USENIX ;login:, Vol. 36, No. 4, pp. 37-45 | August 2011 | Networking | [PDF]
|
| Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center | B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. Stoica | Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011), Boston, Massachusetts | March 2011 | Networking | [PDF]
|
| Mechanism Design for Policy Routing | J. Feigenbaum, R. Sami, and S. Shenker | Yale University Technical Report YALEU/DCS/TR-1258 | November 2003 | Networking | |
| Mechanism Design for Policy Routing | J. Feigenbaum, R. Sami, and S. Shenker | Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, pp. 11-20 | July 2004 | Networking | [PDF]
|
| Mechanism Design for Policy Routing | J. Feigenbaum, R. Sami, and S. Shenker | Distributed Computing, Vol. 18, Issue. 4, pp. 150-164 | March 2006 | Networking | [PDF]
|
| Measuring the Evolution of Transport Protocols in the Internet | A. Medina, M. Allman, and S. Floyd | ACM Computer Communication Review, Vol. 35, Issue 2, pp. 37-52. DOI:http://doi.acm.org/10.1145/1064413.1064418 | April 2005 | Networking | [PDF]
|
| Measuring Pay-per-Install: The Commoditization of Malware Distribution | J. Cabellero, C. Grier, C. Kreibich, and V. Paxson | Proceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, California | August 2011 | Networking | [PDF]
|
| Measuring Interactions Between Transport Protocols and Middleboxes | A. Medina, M. Allman, and S. Floyd | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 336-341 | October 2004 | Networking | [PDF]
|
| Measuring End-to-End Bulk Transfer Capacity | M. Allman | ACM SIGCOMM Internet Measurement Workshop. November 2001. | November 2001 | Networking | |
| Measuring Access Connectivity Characteristics with Netalyzr | N. Weaver, C. Kreibich, and V. Paxson | Presented at the meeting of the North American Network Operators' Group (NANOG49), San Francisco, California | June 2010 | Networking | [PDF]
|
| Measurements and Analysis of End-to-End Internet Dynamics | V. Paxson | Ph.D. dissertation | 1997 | Networking | |
| Maximal Source Coverage Adaptive Gateway Discovery for Hybrid Ad Hoc Networks | P. M. Ruiz and A.F. Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3158, pp. 28-41 | July 2004 | Networking | [PDF]
|
| Manufacturing Compromise: The Emergence of Exploit-as-a-Service | C. Grier, L. Ballard, J. Caballero, N. Chachra, C. J. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, M. Zubair Rafique, M. Abu Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, and G. M. Voelker | Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012), pp. 821-832, Raleigh, North Carolina | October 2012 | Networking | [PDF]
|
| Making the Internet More Evolvable | B. Raghavan, T. Koponen, A. Ghodsi, V. Brajkovic, and S. Shenker | ICSI Technical Report TR-12-011 | September 2012 | Networking | [PDF]
|
| Making Gnutella-Like P2P Systems Scalable | Y. Chawathe, S. Ratnasamy, L. Breslau, and S. Shenker | Proceedings of ACM SIGCOMM | 2003 | Networking | |
| Loss and Delay Accountability for the Internet | K. Argyraki, P. Maniatis, O. Irzak, A. Subramanian, and S. Shenker | Proceedings of the 15th IEEE International Conference on Network Protocols (ICNP 2007), Beijing, China, pp. 194-205 | October 2007 | Networking | [PDF]
|
| Long-Range Dependence and Data Network Traffic | W. Willinger, V. Paxson, R.H. Riedi, and M.S. Taqqu | Long-Range Dependence: Theory and Applications, P. Doukhan, G. Oppenheim and M. S. Taqqu, eds., Birkhauser, 2002. | 2002 | Networking | |
| Logically Centralized? State Distribution Tradeoffs in Software Defined Networks | D. Levin, A. Wundsam, B. Heller, N. Handigol, and A. Feldmann | Proceedings of the Workshop on Hot Topics in Software Defined Networks (HotSDN '12) at ACM SIGCOMM 2012, Helsinki, Finland | August 2012 | Networking | [PDF]
|
| Local error recovery in SRM: comparison of two approaches | C.G. Liu, D. Estrin, S. Shenker, and L. Zhang | Proceedings of IEEE/ACM Transactions on Networking, Vol. 6, pp. 686-699 | December 1998 | Networking | |
| Load Balancing in Structured P2P Systems | A. Rao, K. Lakshminaryanan, S. Surana, R. M. Karp, and I. Stoica | Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, California | February 2003 | Networking | [PDF]
|
| Load Balancing in Dynamic Structured P2P Systems | B. Godfrey, R.M. Karp, K. Lakshminarayanan, S. Surana, and I. Stoica | Proceedings of INFOCOMM, 2004 | 2004 | Networking | |
| Listen and Whisper: Security Mechanisms for BGP | L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz | Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI '04), San Francisco, California | March 2004 | Networking | [PDF]
|
| Link-sharing and Resource Management Models for Packet Networks | S. Floyd and V. Jacobson | IEEE/ACM Transactions on Networking, Vol. 3, No. 4, pp. 365-386 | August 1995 | Networking | [PDF]
|
| Learning Heuristic Functions for State-Space Planing | B. Satzger and O. Kramer | Proceedings of the Fifth IASTED International Conference on Computational Intelligence (CI 2010), Maui, Hawaii | August 2010 | Networking | |