Publication Search Results

TitleAuthorsort descendingBibliographicDateGroupLinks
Strawman Specification for TCP Friendly (Reliable) Multicast Congestion Control (TFMCC)M. Handley and S. FloydReliable Multicast Research GroupDecember 1998Networking
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML)M. Handley, C. Kreibich, and V. PaxsonProceedings of USENIX Security Symposium 2001. 2001Networking
Session Announcement ProtocolM. Handley, C. Perkins, E. WhelanRequest for Comments 2974, Experimental, October 2000.October 2002Networking
Multicast-Scope Zone Announcement Protocol (MZAP)M. Handley, D. Thaler, and R. KermodeRequest for Comments 2776, Proposed Standard, February 2000.February 2000Networking
Designing Extensible IP Router SoftwareM. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. RadoslavovProceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 189-202May 2005Networking[PDF]

Very Large Conferences on the Internet: the Internet Multimedia Conferencing ArchitectureM. Handley, J. Crowcroft, C. Bormann, and J. OttComputer Networks and ISDN Systems, Special Issue on Internet Telephony 1998Networking
TCP Congestion Window ValidationM. Handley, J. Padhye, and S. FloydRequest for Comments 2861, Experimental, June 2000. Also UMass CMPSCI Technical Report No. 99-77, September 1999.June 2000Networking
XORP: An Open Platform for Network ResearchM. Handley, O. Hodson, and E. KohlerFirst Workshop on Hot Topics in Networking, October 2002.October 2002Networking
The Reliable Multicast Design Space for Bulk Data TransferM. Handley, S, Floyd, B. Whetten, R. Kermode, L. Vicisano, and M. LubyRequest for Comments 2887, Informational, August 2000.August 2000Networking
TCP Congestion Window ValidationM. Handley, S. Floyd, and J. PadhyeRequest for Comments 2861, Experimental, June 2000.June 2000Networking
RFC 3448: TCP Friendly Rate Control (TFRC): Protocol SpecificationM. Handley, S. Floyd, J. Pahdye, and J. WidmerRFC 3448, Proposed StandardJanuary 2003Networking[PDF]

Complex Queries in DHT-based Peer-to-Peer NetworksM. Harren, J.M. Hellerstein, R. Huebsch, B.T. Loo, S. Shenker, and I. StoicaThe First International Workshop on Peer-to-Peer Systems (IPTPS): 242-259, 2002. 2002Networking
From Complex Specifications to a Working Prototype: A Protocol Engineering Case StudyM. J. Fernández, J. González, J. M. Pousada, M. Llamas, and A. RomeroIn Lecture Notes in Computer Science, Vol. 2021, pp. 436-448, Springer Verlag 2001Networking
On the Application of Formal Description Techniques to the Design of Interception Systems for GSM Mobile TerminalsM. J. Fernández, J. González, M. Llamas, J. M. Pousada, and J. ValesJournal of Systems and Software, Vol. 60, Issue 1, pp. 49-56January 2002Networking
DelfosnetX: A Workbench for XML-Based Information Retrieval SystemsM. J. Fernández, P. Pavón, J. Rodríguez, L. Anido, and M. LlamasProceedings of he 7th International Symposium on String Processing and Information Retrieval, A Coruna, Spain, pp. 87-95September 2000Networking
Group Therapy for Systems: Using link attestations to manage failuresM. J. Freedman, I. Stoica, D. Mazieres, and S. ShenkerProceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS 2006), Santa Barbara, CaliforniaFebruary 2006Networking[PDF]

A Framework for Defining Empirical Bulk Transfer Capacity MetricsM. Mathis and M. AllmanRFC 3148. July 2001.July 2001Networking
RFC 2018: TCP Selective Acknowledgment OptionsM. Mathis, J. Mahdavi, S. Floyd, and A. RomanowRFC 2018, Proposed StandardApril 1996Networking
Revocation Games in Ephemeral NetworksM. Raya, M. H. Manshaei, M. Felegyhazi, and J.-P. HubauxProceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 199-210October 2008Networking[PDF]

Spam Detection Using Web Page Content: A New BattlegroundM. Ribeiro, P. Guerra, L. Vilela, A. Veloso, D. Guedes, W. Meira Jr., M. Chaves, K. Steding-Jessen, and C. HoepersProceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011), Perth, Australia.September 2011Networking[PDF]

Adaptive Power Control for Ad-Hoc NetworksM. SanchezProceedings of Fifth International Conference on Sytemics Cybernetics and Informatics (SCI), 2001 2001Networking
Wireless Urban Sensing SystemsM. Srivastava, M. Hansen, J. Burke, A. Parker, S. Reddy, G. Saurabh, M. Allman, V. Paxson, and D. EstrinCenter for Embedded Network Sensing, UC Los Angeles Technical Report No. 65, Los Angeles, CaliforniaApril 2006Networking[PDF]

The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity HardwareM. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. TierneyProceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007), Queensland, AustraliaSeptember 2007Networking[PDF]

Elektronische Wahlen: Verifizierung vs. ZertifizierungM. Volkamer, G. Schryen, L. Langer, A. Schmitt, and J. BuchmannPresented at the 39th Jahrestagung der Gesellschaft für Informatik e.V. (Informatik 2009), Lübeck, GermanySeptember 2009Networking
Efficient and Robust TCP Stream NormalizationM. Vutukuru, H. Balakrishnan, and V. PaxsonProceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 96-110May 2008Networking[PDF]

Untangling the Web from DNSM. Walfish, H. Balakrishnan, and S. ShenkerProceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238March 2004Networking[PDF]

DoS: Fighting Fire with FireM. Walfish, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, MarylandNovember 2005Networking[PDF]

Distributed Quota Enforcement for Spam ControlM. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 281-296May 2006Networking[PDF]

Middleboxes No Longer Considered HarmfulM. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. ShenkerProceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI '04), San Francisco, California, pp. 215-230December 2004Networking[PDF]

DDoS Defense by OffenseM. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 303-314September 2006Networking[PDF]

DDoS Defense by OffenseM. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. ShenkerACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3March 2010Networking[PDF]

The Datacenter Needs an Operating SystemM. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. StoicaProceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, OregonJune 2011Networking[PDF]

Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster SchedulingM. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. StoicaProceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278April 2010Networking[PDF]

Spark: Cluster Computing with Working SetsM. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker and I. StoicaProceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, MassachusettsJune 2010Networking[PDF]

Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingM. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. Franklin, S. Shenker, and I. StoicaEECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-82, Berkeley, CaliforniaJuly 2011Networking[PDF]

Fast and Interactive Analytics Over Hadoop Data with SparkM. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. StoicaUSENIX ;login:, Vol. 34, No. 4, pp. 45-51August 2012Networking[PDF]

Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster ComputingM. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. StoicaProceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), San Jose, CAApril 2012Networking[PDF]

Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research CommunityM. Zaharia, S. Katti, C. Grier, V. Paxson, S. Shenker, I. Stoica and D. SongEECS Department, UC Berkeley Technical Report No. UCB/EECS-2012-12, Berkeley, CaliforniaJanuary 2012Networking[PDF]

Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large ClustersM. Zaharia, T. Das, H. Li, S. Shenker and I. StoicaIn the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MAJune 2012Networking[PDF]

RR-TCP: A Reordering-Robust TCP with DSACKM. Zhang, B. Karp, S. Floyd, and L. PetersonICSI Technical Report TR-02-006July 2002Networking[PDF]

Inferring Link Loss Using Striped Unicast ProbesN. Duffield, F. Lo Presti, V. Paxson, and D. TowsleyProceedings of IEEE INFOCOM, April 2001.April 2001Networking
Network Loss Tomography Using Striped Unicast ProbesN. Duffield, F. Lo Presti, V. Paxson, and D. TowsleyIEEE/ACM Transactions on Networking, Vol. 14 Issue 4, pp. 697-710August 2006Networking[PDF]

NOX: Towards an Operating System for NetworksN. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. ShenkerACM SIGCOMM Computer Communications Review, Vol. 38, No. 3, pp. 105-110July 2008Networking[PDF]

OpenFlow: Enabling Innovation in Campus NetworksN. McKeown, T. Andershnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turneron, and H. BalakrisACM Computer Communication Review, Vol. 38, Issue 2, pp. 69-74April 2008Networking[PDF]

Competitive Cyber-Insurance and Internet SecurityN. Shetty, G. Schwartz. M. Felegyhazi, and J. WalrandProceedings of the Workshop on Economics of Information Security (WEIS 2009), London, United KingdomJune 2009Networking[PDF]

Peer to Peer Edge Caches Should Be FreeN. WeaverProceedings of the 37th Research Conference on Communication, Information, and Internet Policy, Arlington, VirginiaSeptember 2009Networking[PDF]

Reflections on Witty: Analyzing the AttackerN. Weaver and D. Ellis;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37June 2004Networking[PDF]

A Comparison of the AES Candidates Amenability to FPGA ImplementationN. Weaver and J. WawrzynekThe Third Advanced Encryption Standard (AES) Candidate Conference, 2000. 2000Networking
Stress Testing Cluster BroN. Weaver and R. SommerProceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007), Boston, MassachusettsAugust 2007Networking[PDF]

A Worst-Case WormN. Weaver and V. PaxsonProceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, MinnesotaMay 2004Networking[PDF]

Pages