| Why Let Resources Idle? Aggressive Cloning of Jobs with Dolly | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12), Boston, Massachusetts | June 2012 | Networking | [PDF]
|
| Detecting In-Flight Page Changes with Web Tripwires | C. Reis, S. Gribble, T. Kohno, and N. Weaver | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 31-44 | April 2008 | Networking | [PDF]
|
| NetComplex: A Complexity Metric for Network System Designs | B.-G. Chun, S. Ratnasamy, and E. Kohler | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 393-406 | April 2008 | Networking | |
| Beyond Pilots: Keeping Rural Wireless Networks Alive | S. Surana, R. Patra, S. Nedevschi, M. Ramos, L. Subramanian, Y. Ben-David, and E. Brewer | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, California | April 2008 | Networking | [PDF]
|
| Reducing Network Energy Consumption via Sleeping and Rate-Adaptation | S. Nedevschi, L. Popa, G. Iannaccone, S. Raynasamy, and D. Wetherall | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, California, pp. 323-336 | April 2008 | Networking | [PDF]
|
| Hidden-Action in Multi-Hop Routing | M. Feldman, J. Chuang, I. Stoica, and S. Shenker | Proceedings of the 6th ACM Conference on Electronic Commerce (EC'05), Vancouver, Canada , pp. 117-126 | June 2005 | Networking | [PDF]
|
| A Cost Comparison of Datacenter Network Architectures | L. Popa, S. Ratnasamy, G. Iannaccone, A. Krishnamurthy, and I. Stoica | Proceedings of the 6th ACM International Conference on Emerging Networking EXperiments and Technologies, Philadelphia, Pennsylvania, article no. 16 | December 2010 | Networking | [PDF]
|
| HTTP Page Transfer Rates Over Geo-Stationary Satellite Links | H. Kruse, M. Allman, J. Griner, and D. Tran | Proceedings of the 6th International Conference on Telecommunication Systems, Nashville, Tennessee | March 1998 | Networking | |
| Distributed Algorithmic Mechanism Design: Recent Results and Future Directions | J. Feigenbaum and S. Shenker | Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM'02), Atlanta, Georgia, pp. 1-13 | September 2002 | Networking | [PDF]
|
| Middleboxes No Longer Considered Harmful | M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker | Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI '04), San Francisco, California, pp. 215-230 | December 2004 | Networking | [PDF]
|
| Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems | S. Nedevschi, J. Chandrashenkar, B. Nordman, S. Ratnasamy, and N. Taft | Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), Boston, Massachusetts, pp. 381-394 | April 2009 | Networking | [PDF]
|
| Holding the Internet Accountable | D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker | Proceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| Incentive-Compatible Interdomain Routing | J. Feigenbaum, V. Ramachandran, and M. Schapira | Proceedings of the 7th ACM Conference on Electronic Commerce (EC'06), Ann Arbor, Michigan, pp. 130-139 | June 2006 | Networking | [PDF]
|
| Reducing Transient Disconnectivity Using Anomaly-Cognizant Forwarding | A. Ermolinskiy and S. Shenker | Proceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 91-96 | October 2008 | Networking | [PDF]
|
| Pathlet Routing | P. B. Godfrey, S. Shenker, and I. Stoica | Proceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 97-102 | October 2008 | Networking | [PDF]
|
| TCP Fast Open | S. Radhakrishnan, Y. Cheng, J. Chu, A. Jain, and B. Raghavan | Proceedings of the 7th International Conference on emerging Network EXperiments and Technologies (ACM CoNEXT 2011), Tokyo, Japan | December 2011 | Networking | [PDF]
|
| A Modular Network Layer for Sensornets | C.T. Ee, R. Fonseca, S. Kim, D. Moon, A. Tavakoli, D. Culler, S. Shenker, and I. Stoica | Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), Seattle, Washington, pp. 249-262 | November 2006 | Networking | [PDF]
|
| Minuet: Rethinking Concurrency Control in Storage Area Networks | A. Ermolinskiy, D. Moon, B. Chun, and S. Shenker | Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California | February 2009 | Networking | [PDF]
|
| Tiered Fault Tolerance for Long-Term Integrity | B. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz | Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST '09), San Francisco, California, pp. 267-282 | February 2009 | Networking | [PDF]
|
| Bro: A System for Detecting Network Intruders in Real-Time | V. Paxson | Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas | January 1998 | Networking | |
| Securing Mediated Trace Access Using Black-Box Permutation Analysis | P. Mittal, V. Paxson, R. Sommer, and M. Winterrowd | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| A Policy Framework for the Future Internet | A. Seehra, J. Naous, M. Walfish, D. Maziéres, A. Nicolosi, and S. Shenker | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| Extending Networking into the Virtualization Layer | B. Pfaff, J. Pettit, K. Amidon, M. Casado, T. Koponen, and S. Shenker | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| Applying NOX to the Datacenter | A. Tavakoli, M. Casado, T. Koponen, and S. Shenker | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| Spam Detection Using Web Page Content: A New Battleground | M. Ribeiro, P. Guerra, L. Vilela, A. Veloso, D. Guedes, W. Meira Jr., M. Chaves, K. Steding-Jessen, and C. Hoepers | Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011), Perth, Australia. | September 2011 | Networking | [PDF]
|
| What's Clicking What? Techniques and Innovations of Today's Clickbots | B. Miller, P. Pearce, C. Grier, C. Kreibich, and V. Paxson | Proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp. 164-183 | July 2011 | Networking | [PDF]
|
| An Assessment of Overt Malicious Activity Manifest in Residential Networks | G. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. Vallentin | Proceedings of the 8th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2011), Amsterdam, The Netherlands, pp 144-163 | July 2011 | Networking | [PDF]
|
| Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters | A. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski, S. Shenker, and I. Stoica | Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011), Boston, Massachusetts | March 2011 | Networking | [PDF]
|
| Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center | B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. Stoica | Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011), Boston, Massachusetts | March 2011 | Networking | [PDF]
|
| HTTP as the Narrow Waist of the Future Internet | L. Popa, A. Ghodsi, and I. Stoica | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 6 | October 2010 | Networking | [PDF]
|
| CloudPolice: Taking Access Control out of the Network | L. Popa, M. Yu, S. Y. Ko, S. Ratnasamy, and I. Stoica | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 7 | October 2010 | Networking | [PDF]
|
| Using Strongly Typed Networking to Architect for Tussle | C. Muthukrishnan, V. Paxson, M. Allman, and A. Akella | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 9 | October 2010 | Networking | [PDF]
|
| Improving Delivery Ratio and Power Efficiency in Unicast Geographic Routing with a Realistic Physical Layer for Wireless Sensor Networks | J.A. Sanchez and P. M. Ruiz | Proceedings of the 9th Euromicro Conference on Digital System Design Architectures, Methods, and Tools (DSD 2006), Drubovnid, Croatia | September 2006 | Networking | |
| An Admission Control Approach for Elastic Flows in the Internet | L. Fàbrega, T. Jové, A. Bueno, and J. L. Marzo | Proceedings of the 9th IFIP Working Conference on Performance Modeling and Evaluation of ATM and IP Networks (IFIP ATM and IP 2001), Budapest, Hungary | June 2001 | Networking | |
| A Reactive Measurement Framework | M. Allman and V. Paxson | Proceedings of the 9th International Conference on Passive and Active Network Measurement (PAM 2008), Cleveland, Ohio, pp. 92-101 | April 2008 | Networking | [PDF]
|
| Enhancing Network Intrusion Detection With Integrated Sampling and Filtering | J. Gonzalez and V. Paxson | Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006), Hamburg, Germany, pp. 272-289 | September 2006 | Networking | [PDF]
|
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), San Jose, CA | April 2012 | Networking | [PDF]
|
| PACMan: Coordinated Memory Caching for Parallel Jobs | G. Ananthanarayanan, A. Ghodsi, A. Wang, D. Borthakur, S. Kandula, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’12), San Jose, California | April 2012 | Networking | [PDF]
|
| Onix: A Distributed Control Platform for Large-scale Production Networks | T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, and S. Shenker | Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 351-364 | October 2010 | Networking | [PDF]
|
| Building Extensible Networks with Rule-Based Forwarding | L. Popa, N. Egi, S. Ratnasamy, and I. Stoica | Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), Vancouver, Canada, pp. 379-391 | October 2010 | Networking | [PDF]
|
| Modeling Cyber-Insurance: Towards a Unifying Framework | R. Boehme and G. Schwartz | Proceedings of the 9th Workshop on the Economics of Information Security (WEIS 2010), Cambridge, Massachusetts | June 2010 | Networking | [PDF]
|
| Privacy in Online Social Lending | R. Boehme and S. Poetzsch | Proceedings of the AAAI 2010 Spring Symposium on Intelligent Information Privacy Management, Palo Alto, California, pp. 23-28 | March 2010 | Networking | [PDF]
|
| A Taxonomy of Computer Worms | N. Weaver, V. Paxson, S. Staniford, and R. Cunningham | Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003), Washington, DC, pp. 11-18 | October 2003 | Networking | [PDF]
|
| Securing Web Content | J. Koskela, N. Weaver, A. Gurtov, and M. Allman | Proceedings of the ACM CoNext Workshop on Re-Architecting the Internet (ReArch 2009), Rome, Italy, pp. 7-12 | December 2009 | Networking | [PDF]
|
| A Readable TCP in the Prolac Protocol Language | E. Kohler, M.F. Kaashoek, and D.R. Montgomery | Proceedings of the ACM SIGCOMM '99 Conference: Applications, Technologies, Architectures, and Protocols for Computer Communication, Cambridge, Massachusetts, August 1999, pages 3-13. | August 1999 | Networking | |
| Route Flap Dampening Exacerbates Internet Routing Convergence | Z.M. Mao, R. Govindan, G. Varghese, and R. Katz | Proceedings of the ACM SIGCOMM 2002. | 2002 | Networking | |
| Networking in the Long Emergency | B. Raghavan and J. Ma | Proceedings of the ACM SIGCOMM Workshop on Green Networking (GreenNet '11), Ontario, Canada, pp. 37-42 | August 2011 | Networking | [PDF]
|
| Fabric: A Retrospective on Evolving SDN | M. Casado, T. Koponen, S. Shenker, and A. Tootoonchian | Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Helsinki, Finland | August 2012 | Networking | [PDF]
|
| Naming in Content-Oriented Architectures | A. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti, and S. Shenker | Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN 2011), Toronto, ON, Canada | August 2011 | Networking | [PDF]
|
| On Preserving Privacy in Information-Centric Networks | S. Arianfar, T. Koponen, B. Raghavan, and S. Shenker | Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN-2011), Toronto, Canada, pp. 19-24 | August 2011 | Networking | [PDF]
|