| MultiQ: Automated Detection of Multiple Bottlenexk Capacities Along a Path | S. Katti, D. Katabi, C. Blake, E. Kohler, and J. Strauss | Proceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 245-250 | October 2004 | Networking | [PDF]
|
| Exploiting Independent State For Network Intrusion Detection | R. Sommer and V. Paxson | Technische Universität München Technical Report No. TUM-I0420, Munich, Germany | November 2004 | Networking | [PDF]
|
| Overcoming the Internet Impasse through Virtualization | L. Peterson, S. Shenker, and J.Turner | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Towards a Next Generation Inter-domain Routing Protocol | L. Subramanian, M. Caesar, C. Tien Ee, M. Handley, Z. Morley Mao, S. Shenker, and I. Stoica | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Reduced State Routing in the Internet | R. Gummadi, N. Kothari, Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Providing Packet Obituaries | K. Argyraki, P. Maniatis, D. Cheriton, and Scott Shenker | Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Enhanced Internet Connectivity for Hybrid Ad Hoc Networks Through Adaptive Gateway Discovery | P. M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), Tampa, Florida | November 2004 | Networking | [PDF]
|
| Middleboxes No Longer Considered Harmful | M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker | Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI '04), San Francisco, California, pp. 215-230 | December 2004 | Networking | [PDF]
|
| Mobility-Aware Mesh Construction Algorithm for Low Data-Overhead Multicast Ad Hoc Routing | P. M. Ruiz and A.F. Gomez Skarmeta | Journal of Communications and Networks (JCN), Vol. 6, No. 4, pp. 331-342 | December 2004 | Networking | [PDF]
|
| Internet Topology: Discovery and Policy Impact, Parts I and II | H. Tangmunarunkit, R. Govindan, and S. Shenker | In The Internet as a Large-Scale Complex System, K. Park and W. Willinger, eds., pp. 121-160, Oxford University Press | 2005 | Networking | [PDF]
|
| The Architecture of PIER: An Internet-Scale Query Processor | R. Huebsch, B. Chun, J. M. Hellerstein, B. T. Loo, P. Maniatis, T. Roscoe, S. Shenker, I. Stoica, and A. R. Yumerefendi | Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, California, pp. 28-43 | January 2005 | Networking | [PDF]
|
| OverCite: A Cooperative Digital Research Library | J. Stribling, I. Councill, J. Li, M. Frans Kaashoek, D. R. Karger, R. Morris, and S. Shenker | Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 69-79 | February 2005 | Networking | [PDF]
|
| Peering Peer-to-Peer Providers | H. Balakrishnan, S. Shenker, and M. Walfish | Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 104-114 | February 2005 | Networking | [PDF]
|
| On the Impact of Bursting on TCP Performance | E. Blanton and M. Allman | Proceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, Massachusetts | March 2005 | Networking | [PDF]
|
| The Network Oracle | J. Hellerstein, V. Paxson, L. Peterson, T. Roscoe, S. Shenker, and D. Wetherall | IEEE Data Engineering Bulletin, Vol. 28, No. 1, pp. 3-10 | March 2005 | Networking | [PDF]
|
| Measuring the Evolution of Transport Protocols in the Internet | A. Medina, M. Allman, and S. Floyd | ACM Computer Communication Review, Vol. 35, Issue 2, pp. 37-52. DOI:http://doi.acm.org/10.1145/1064413.1064418 | April 2005 | Networking | [PDF]
|
| Notes on Burst Mitigation for Transport Protocols | M. Allman and E. Blanton | ACM SIGCOMM Computer Communication Review, Vol. 35, Issue 2, pp. 53-60. DOI:http://doi.acm.org/10.1145/1064413.1064419 | April 2005 | Networking | [PDF]
|
| Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity | C. Kreibich | Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118 | April 2005 | Networking | [PDF]
|
| Designing Extensible IP Router Software | M. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. Radoslavov | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 189-202 | May 2005 | Networking | [PDF]
|
| Geographic Routing Made Practical | Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 217-230 | May 2005 | Networking | [PDF]
|
| Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets | R. Fonseca, S. Ratnasamy, J. Zhao, C. Tien Ee, D. Culler, S. Shenker, and I. Stoica | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 329-342 | May 2005 | Networking | [PDF]
|
| Flexibility as an Instrument in DRM Systems | D. Bergemann, T. Eisenbach, J. Feigenbaum, and S. Shenker | Proceedings of 2005 Workshop on the Economics of Information Security (WEIS 2005), Cambridge, Massachusetts | June 2005 | Networking | [PDF]
|
| Hidden-Action in Multi-Hop Routing | M. Feldman, J. Chuang, I. Stoica, and S. Shenker | Proceedings of the 6th ACM Conference on Electronic Commerce (EC'05), Vancouver, Canada , pp. 117-126 | June 2005 | Networking | [PDF]
|
| Towards a Sensor Network Architecture: Lowering the Waistline | D. Culler, P. Dutta, C.T. Ee, R. Fonseca, J. Hui, P. Levis, J. Polastre, S. Shenker, I. Stoica, G. Tolle, and J. Zhao | Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS 10), Santa Fe, New Mexico, p. 24 | June 2005 | Networking | |
| COPS: Quality of Service Vs. Any Service at All | R. Katz, G. Porter, S. Shenker, I. Stoica, and M. Tsai | Proceedings of the 13th International Workshop on Quality of Service 2005 (IWQoS 2005), Passau, Germany, pp. 3-15 | June 2005 | Networking | |
| Policy-Controlled Event Management for Distributed Intrusion Detection | C. Kreibich and R. Sommer | Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05), Columbus, Ohio, Vol. 4, pp. 385-391 | June 2005 | Networking | [PDF]
|
| Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context | H. Dreger, C. Kreibich, V. Paxson, and R. Sommer | Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005), Vienna, Austria, pp. 206-221 | July 2005 | Networking | [PDF]
|
| An Architecture for Developing Behavioral History | M. Allman, E. Blanton, and V. Paxson | Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05), Cambridge, Massachusetts, p. 45-51 | July 2005 | Networking | [PDF]
|
| Reliable Broadcast in Unknown Fixed-Identity Networks | L. Subramanian, R. Katz, V. Roth, S. Shenker, and I. Stoica | Proceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC 2005), Las Vegas, California, pp. 342-351 | July 2005 | Networking | [PDF]
|
| Robust TCP Reassembly in the Presence of Adversaries | S. Dharmapurikar and V. Paxson | Proceedings of the 14th Conference on USENIX Security Symposium (Security '05), Baltimore, Maryland, pp. 65-80 | August 2005 | Networking | [PDF]
|
| HLP: A Next-Generation Interdomain Routing Protocol | L. Subramanian, M. Caesar, C. Tien Ee, M. Handley, M. Mao, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 13-24 | August 2005 | Networking | [PDF]
|
| OpenDHT: A Public DHT Service and Its Uses | S. Rhea, B. Godfrey, B. Karp, J. Kubiatowicz, S. Ratnasamy, S. Shenker, I. Stoica, and H. Yu | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 73-84 | August 2005 | Networking | [PDF]
|
| Towards an Evolvable Internet Architecture | S. Ratnasamy, S. Shenker, S. McCanne | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 313-324 | August 2005 | Networking | [PDF]
|
| A Case Study in Building Layered DHT Applications | Y. Chawathe, S. Ramabhadran, S. Ratnasamy, A. LaMarca, S. Shenker, J. Hellerstein | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 97-108 | August 2005 | Networking | [PDF]
|
| On the Pitfalls of Geographic Face Routing | Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cologne, Germany, pp. 34-43 | September 2005 | Networking | [PDF]
|
| Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al Encaminar | C.M. Yago, P. M. Ruiz, and A.F. Gomez Skarmeta | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Aproximacion de Arboles Multicast Optimos en Redes Ad Hoc Inalambricas | P.M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAM | A.F. Gomez Skarmeta and P.M. Ruiz | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Applying Fuzzy Logic to Model User Preferences on Multimedia Sessions | J.A. Botia, M. Valdes, P. M. Ruiz, and A.F. Gomez Skarmeta. | Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy, Jaen, Spain, pp. 467-470 | September 2005 | Networking | |
| Security Extensions to MMARP Through Cryptographically Generated Addresses | F.J. Galera, P.M. Ruiz, and A.F. Gomez Skarmeta | Lecture Notes on Informatics, Vol. P-68, pp. 339–343 | September 2005 | Networking | |
| Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event | A. Kumar, V. Paxson, and N. Weaver | Proceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 351-364 | October 2005 | Networking | [PDF]
|
| A First Look at Modern Enterprise Traffic | R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. Tierney | Proceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 15-28 | October 2005 | Networking | [PDF]
|
| Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic | S. Kornexl, V. Paxson, H. Dreger, A. Feldmann, and R. Sommer | Proceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005), Berkeley, California, pp. 267-272 | October 2005 | Networking | [PDF]
|
| Heuristic Algorithms for Minimum Bandwidth Consumption Multicast Trees in Wireless Mesh Networks | P.M. Ruiz and A.F. Gomez Skarmeta | Lecture Notes in Computer Science, Vol. 3738, pp. 258–270 | October 2005 | Networking | |
| Internet Connectivity for Mobile Ad Hoc Networks: Solutions and Challenges | P. M. Ruiz, F. J. Ros, and A.F. Gomez Skarmeta | IEEE Communications Magazine, pp. 118–125 | October 2005 | Networking | |
| Opportunistic Measurement: Extracting Insight from Spurious Traffic | M. Casado, T. Garfinkel, W. Cui, V. Paxson, and S. Savage | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| A Unifying Link Abstraction for Wireless Sensor Networks | J. Polastre, J. Hui, P. Levis, J. Zhao, D. Culler, S. Shenker, and I. Stoica | Proceedings of the Third ACM Conference on Embedded Networked Sensor Systems (Sensys 2005), San Diego, California, pp. 76-89 | November 2005 | Networking | |
| Using Honeynets for Internet Situational Awareness | V. Yegneswaran, P. Barford, and V. Paxson | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| Off by Default | H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. Shenker | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| DoS: Fighting Fire with Fire | M. Walfish, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|