| Strawman Specification for TCP Friendly (Reliable) Multicast Congestion Control (TFMCC) | M. Handley and S. Floyd | Reliable Multicast Research Group | December 1998 | Networking | |
| Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML) | M. Handley, C. Kreibich, and V. Paxson | Proceedings of USENIX Security Symposium 2001. | 2001 | Networking | |
| Session Announcement Protocol | M. Handley, C. Perkins, E. Whelan | Request for Comments 2974, Experimental, October 2000. | October 2002 | Networking | |
| Multicast-Scope Zone Announcement Protocol (MZAP) | M. Handley, D. Thaler, and R. Kermode | Request for Comments 2776, Proposed Standard, February 2000. | February 2000 | Networking | |
| Designing Extensible IP Router Software | M. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. Radoslavov | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 189-202 | May 2005 | Networking | [PDF]
|
| Very Large Conferences on the Internet: the Internet Multimedia Conferencing Architecture | M. Handley, J. Crowcroft, C. Bormann, and J. Ott | Computer Networks and ISDN Systems, Special Issue on Internet Telephony | 1998 | Networking | |
| TCP Congestion Window Validation | M. Handley, J. Padhye, and S. Floyd | Request for Comments 2861, Experimental, June 2000. Also UMass CMPSCI Technical Report No. 99-77, September 1999. | June 2000 | Networking | |
| XORP: An Open Platform for Network Research | M. Handley, O. Hodson, and E. Kohler | First Workshop on Hot Topics in Networking, October 2002. | October 2002 | Networking | |
| The Reliable Multicast Design Space for Bulk Data Transfer | M. Handley, S, Floyd, B. Whetten, R. Kermode, L. Vicisano, and M. Luby | Request for Comments 2887, Informational, August 2000. | August 2000 | Networking | |
| TCP Congestion Window Validation | M. Handley, S. Floyd, and J. Padhye | Request for Comments 2861, Experimental, June 2000. | June 2000 | Networking | |
| RFC 3448: TCP Friendly Rate Control (TFRC): Protocol Specification | M. Handley, S. Floyd, J. Pahdye, and J. Widmer | RFC 3448, Proposed Standard | January 2003 | Networking | [PDF]
|
| Complex Queries in DHT-based Peer-to-Peer Networks | M. Harren, J.M. Hellerstein, R. Huebsch, B.T. Loo, S. Shenker, and I. Stoica | The First International Workshop on Peer-to-Peer Systems (IPTPS): 242-259, 2002. | 2002 | Networking | |
| From Complex Specifications to a Working Prototype: A Protocol Engineering Case Study | M. J. Fernández, J. González, J. M. Pousada, M. Llamas, and A. Romero | In Lecture Notes in Computer Science, Vol. 2021, pp. 436-448, Springer Verlag | 2001 | Networking | |
| On the Application of Formal Description Techniques to the Design of Interception Systems for GSM Mobile Terminals | M. J. Fernández, J. González, M. Llamas, J. M. Pousada, and J. Vales | Journal of Systems and Software, Vol. 60, Issue 1, pp. 49-56 | January 2002 | Networking | |
| DelfosnetX: A Workbench for XML-Based Information Retrieval Systems | M. J. Fernández, P. Pavón, J. Rodríguez, L. Anido, and M. Llamas | Proceedings of he 7th International Symposium on String Processing and Information Retrieval, A Coruna, Spain, pp. 87-95 | September 2000 | Networking | |
| Group Therapy for Systems: Using link attestations to manage failures | M. J. Freedman, I. Stoica, D. Mazieres, and S. Shenker | Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS 2006), Santa Barbara, California | February 2006 | Networking | [PDF]
|
| A Framework for Defining Empirical Bulk Transfer Capacity Metrics | M. Mathis and M. Allman | RFC 3148. July 2001. | July 2001 | Networking | |
| RFC 2018: TCP Selective Acknowledgment Options | M. Mathis, J. Mahdavi, S. Floyd, and A. Romanow | RFC 2018, Proposed Standard | April 1996 | Networking | |
| Revocation Games in Ephemeral Networks | M. Raya, M. H. Manshaei, M. Felegyhazi, and J.-P. Hubaux | Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 199-210 | October 2008 | Networking | [PDF]
|
| Spam Detection Using Web Page Content: A New Battleground | M. Ribeiro, P. Guerra, L. Vilela, A. Veloso, D. Guedes, W. Meira Jr., M. Chaves, K. Steding-Jessen, and C. Hoepers | Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011), Perth, Australia. | September 2011 | Networking | [PDF]
|
| Adaptive Power Control for Ad-Hoc Networks | M. Sanchez | Proceedings of Fifth International Conference on Sytemics Cybernetics and Informatics (SCI), 2001 | 2001 | Networking | |
| Wireless Urban Sensing Systems | M. Srivastava, M. Hansen, J. Burke, A. Parker, S. Reddy, G. Saurabh, M. Allman, V. Paxson, and D. Estrin | Center for Embedded Network Sensing, UC Los Angeles Technical Report No. 65, Los Angeles, California | April 2006 | Networking | [PDF]
|
| The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware | M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney | Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007), Queensland, Australia | September 2007 | Networking | [PDF]
|
| Elektronische Wahlen: Verifizierung vs. Zertifizierung | M. Volkamer, G. Schryen, L. Langer, A. Schmitt, and J. Buchmann | Presented at the 39th Jahrestagung der Gesellschaft für Informatik e.V. (Informatik 2009), Lübeck, Germany | September 2009 | Networking | |
| Efficient and Robust TCP Stream Normalization | M. Vutukuru, H. Balakrishnan, and V. Paxson | Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 96-110 | May 2008 | Networking | [PDF]
|
| Untangling the Web from DNS | M. Walfish, H. Balakrishnan, and S. Shenker | Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, California, pp. 225-238 | March 2004 | Networking | [PDF]
|
| DoS: Fighting Fire with Fire | M. Walfish, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| Distributed Quota Enforcement for Spam Control | M. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 281-296 | May 2006 | Networking | [PDF]
|
| Middleboxes No Longer Considered Harmful | M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker | Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI '04), San Francisco, California, pp. 215-230 | December 2004 | Networking | [PDF]
|
| DDoS Defense by Offense | M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 303-314 | September 2006 | Networking | [PDF]
|
| DDoS Defense by Offense | M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker | ACM Transactions on Computer Systems, Vol. 28, Issue 1, No. 3 | March 2010 | Networking | [PDF]
|
| The Datacenter Needs an Operating System | M. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. Stoica | Proceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling | M. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. Stoica | Proceedings of the Fifth European Conference on Computer Systems (EuroSys 2010), Paris, France, pp. 265-278 | April 2010 | Networking | [PDF]
|
| Spark: Cluster Computing with Working Sets | M. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker and I. Stoica | Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, Massachusetts | June 2010 | Networking | [PDF]
|
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. Franklin, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-82, Berkeley, California | July 2011 | Networking | [PDF]
|
| Fast and Interactive Analytics Over Hadoop Data with Spark | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | USENIX ;login:, Vol. 34, No. 4, pp. 45-51 | August 2012 | Networking | [PDF]
|
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), San Jose, CA | April 2012 | Networking | [PDF]
|
| Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community | M. Zaharia, S. Katti, C. Grier, V. Paxson, S. Shenker, I. Stoica and D. Song | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2012-12, Berkeley, California | January 2012 | Networking | [PDF]
|
| Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters | M. Zaharia, T. Das, H. Li, S. Shenker and I. Stoica | In the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MA | June 2012 | Networking | [PDF]
|
| RR-TCP: A Reordering-Robust TCP with DSACK | M. Zhang, B. Karp, S. Floyd, and L. Peterson | ICSI Technical Report TR-02-006 | July 2002 | Networking | [PDF]
|
| Inferring Link Loss Using Striped Unicast Probes | N. Duffield, F. Lo Presti, V. Paxson, and D. Towsley | Proceedings of IEEE INFOCOM, April 2001. | April 2001 | Networking | |
| Network Loss Tomography Using Striped Unicast Probes | N. Duffield, F. Lo Presti, V. Paxson, and D. Towsley | IEEE/ACM Transactions on Networking, Vol. 14 Issue 4, pp. 697-710 | August 2006 | Networking | [PDF]
|
| NOX: Towards an Operating System for Networks | N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker | ACM SIGCOMM Computer Communications Review, Vol. 38, No. 3, pp. 105-110 | July 2008 | Networking | [PDF]
|
| OpenFlow: Enabling Innovation in Campus Networks | N. McKeown, T. Andershnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turneron, and H. Balakris | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 69-74 | April 2008 | Networking | [PDF]
|
| Competitive Cyber-Insurance and Internet Security | N. Shetty, G. Schwartz. M. Felegyhazi, and J. Walrand | Proceedings of the Workshop on Economics of Information Security (WEIS 2009), London, United Kingdom | June 2009 | Networking | [PDF]
|
| Peer to Peer Edge Caches Should Be Free | N. Weaver | Proceedings of the 37th Research Conference on Communication, Information, and Internet Policy, Arlington, Virginia | September 2009 | Networking | [PDF]
|
| Reflections on Witty: Analyzing the Attacker | N. Weaver and D. Ellis | ;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37 | June 2004 | Networking | [PDF]
|
| A Comparison of the AES Candidates Amenability to FPGA Implementation | N. Weaver and J. Wawrzynek | The Third Advanced Encryption Standard (AES) Candidate Conference, 2000. | 2000 | Networking | |
| Stress Testing Cluster Bro | N. Weaver and R. Sommer | Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007), Boston, Massachusetts | August 2007 | Networking | [PDF]
|
| A Worst-Case Worm | N. Weaver and V. Paxson | Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|