Publication Search Results

TitleAuthorBibliographicDatesort descendingGroupLinks
MultiQ: Automated Detection of Multiple Bottlenexk Capacities Along a PathS. Katti, D. Katabi, C. Blake, E. Kohler, and J. StraussProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 245-250October 2004Networking[PDF]

Exploiting Independent State For Network Intrusion DetectionR. Sommer and V. PaxsonTechnische Universität München Technical Report No. TUM-I0420, Munich, GermanyNovember 2004Networking[PDF]

Overcoming the Internet Impasse through VirtualizationL. Peterson, S. Shenker, and J.TurnerProceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

Towards a Next Generation Inter-domain Routing ProtocolL. Subramanian, M. Caesar, C. Tien Ee, M. Handley, Z. Morley Mao, S. Shenker, and I. StoicaProceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

Reduced State Routing in the InternetR. Gummadi, N. Kothari, Y.-J. Kim, R. Govindan, B. Karp, and S. ShenkerProceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

Providing Packet ObituariesK. Argyraki, P. Maniatis, D. Cheriton, and Scott ShenkerProceedings of the Third Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

Enhanced Internet Connectivity for Hybrid Ad Hoc Networks Through Adaptive Gateway DiscoveryP. M. Ruiz and A.F. Gomez SkarmetaProceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), Tampa, FloridaNovember 2004Networking[PDF]

Middleboxes No Longer Considered HarmfulM. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. ShenkerProceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI '04), San Francisco, California, pp. 215-230December 2004Networking[PDF]

Mobility-Aware Mesh Construction Algorithm for Low Data-Overhead Multicast Ad Hoc RoutingP. M. Ruiz and A.F. Gomez SkarmetaJournal of Communications and Networks (JCN), Vol. 6, No. 4, pp. 331-342December 2004Networking[PDF]

Internet Topology: Discovery and Policy Impact, Parts I and IIH. Tangmunarunkit, R. Govindan, and S. ShenkerIn The Internet as a Large-Scale Complex System, K. Park and W. Willinger, eds., pp. 121-160, Oxford University Press 2005Networking[PDF]

The Architecture of PIER: An Internet-Scale Query ProcessorR. Huebsch, B. Chun, J. M. Hellerstein, B. T. Loo, P. Maniatis, T. Roscoe, S. Shenker, I. Stoica, and A. R. YumerefendiProceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, California, pp. 28-43January 2005Networking[PDF]

OverCite: A Cooperative Digital Research LibraryJ. Stribling, I. Councill, J. Li, M. Frans Kaashoek, D. R. Karger, R. Morris, and S. ShenkerProceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 69-79February 2005Networking[PDF]

Peering Peer-to-Peer ProvidersH. Balakrishnan, S. Shenker, and M. WalfishProceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 104-114February 2005Networking[PDF]

On the Impact of Bursting on TCP PerformanceE. Blanton and M. AllmanProceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, MassachusettsMarch 2005Networking[PDF]

The Network OracleJ. Hellerstein, V. Paxson, L. Peterson, T. Roscoe, S. Shenker, and D. WetherallIEEE Data Engineering Bulletin, Vol. 28, No. 1, pp. 3-10March 2005Networking[PDF]

Measuring the Evolution of Transport Protocols in the InternetA. Medina, M. Allman, and S. FloydACM Computer Communication Review, Vol. 35, Issue 2, pp. 37-52. DOI:http://doi.acm.org/10.1145/1064413.1064418April 2005Networking[PDF]

Notes on Burst Mitigation for Transport ProtocolsM. Allman and E. BlantonACM SIGCOMM Computer Communication Review, Vol. 35, Issue 2, pp. 53-60. DOI:http://doi.acm.org/10.1145/1064413.1064419April 2005Networking[PDF]

Brooery: A Graphical Environment for Analysis of Security-Relevant Network ActivityC. KreibichProceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118April 2005Networking[PDF]

Designing Extensible IP Router SoftwareM. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. RadoslavovProceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 189-202May 2005Networking[PDF]

Geographic Routing Made PracticalY.-J. Kim, R. Govindan, B. Karp, and S. ShenkerProceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 217-230May 2005Networking[PDF]

Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless SensornetsR. Fonseca, S. Ratnasamy, J. Zhao, C. Tien Ee, D. Culler, S. Shenker, and I. StoicaProceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 329-342May 2005Networking[PDF]

Flexibility as an Instrument in DRM SystemsD. Bergemann, T. Eisenbach, J. Feigenbaum, and S. ShenkerProceedings of 2005 Workshop on the Economics of Information Security (WEIS 2005), Cambridge, MassachusettsJune 2005Networking[PDF]

Hidden-Action in Multi-Hop RoutingM. Feldman, J. Chuang, I. Stoica, and S. ShenkerProceedings of the 6th ACM Conference on Electronic Commerce (EC'05), Vancouver, Canada , pp. 117-126June 2005Networking[PDF]

Towards a Sensor Network Architecture: Lowering the WaistlineD. Culler, P. Dutta, C.T. Ee, R. Fonseca, J. Hui, P. Levis, J. Polastre, S. Shenker, I. Stoica, G. Tolle, and J. ZhaoProceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS 10), Santa Fe, New Mexico, p. 24June 2005Networking
COPS: Quality of Service Vs. Any Service at AllR. Katz, G. Porter, S. Shenker, I. Stoica, and M. TsaiProceedings of the 13th International Workshop on Quality of Service 2005 (IWQoS 2005), Passau, Germany, pp. 3-15June 2005Networking
Policy-Controlled Event Management for Distributed Intrusion DetectionC. Kreibich and R. SommerProceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05), Columbus, Ohio, Vol. 4, pp. 385-391June 2005Networking[PDF]

Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based ContextH. Dreger, C. Kreibich, V. Paxson, and R. SommerProceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005), Vienna, Austria, pp. 206-221July 2005Networking[PDF]

An Architecture for Developing Behavioral HistoryM. Allman, E. Blanton, and V. PaxsonProceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05), Cambridge, Massachusetts, p. 45-51July 2005Networking[PDF]

Reliable Broadcast in Unknown Fixed-Identity NetworksL. Subramanian, R. Katz, V. Roth, S. Shenker, and I. StoicaProceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC 2005), Las Vegas, California, pp. 342-351July 2005Networking[PDF]

Robust TCP Reassembly in the Presence of AdversariesS. Dharmapurikar and V. PaxsonProceedings of the 14th Conference on USENIX Security Symposium (Security '05), Baltimore, Maryland, pp. 65-80August 2005Networking[PDF]

HLP: A Next-Generation Interdomain Routing ProtocolL. Subramanian, M. Caesar, C. Tien Ee, M. Handley, M. Mao, S. Shenker, and I. StoicaProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 13-24August 2005Networking[PDF]

OpenDHT: A Public DHT Service and Its UsesS. Rhea, B. Godfrey, B. Karp, J. Kubiatowicz, S. Ratnasamy, S. Shenker, I. Stoica, and H. YuProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 73-84August 2005Networking[PDF]

Towards an Evolvable Internet ArchitectureS. Ratnasamy, S. Shenker, S. McCanneProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 313-324August 2005Networking[PDF]

A Case Study in Building Layered DHT ApplicationsY. Chawathe, S. Ramabhadran, S. Ratnasamy, A. LaMarca, S. Shenker, J. HellersteinProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 97-108August 2005Networking[PDF]

On the Pitfalls of Geographic Face RoutingY.-J. Kim, R. Govindan, B. Karp, and S. ShenkerProceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cologne, Germany, pp. 34-43September 2005Networking[PDF]

Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al EncaminarC.M. Yago, P. M. Ruiz, and A.F. Gomez SkarmetaProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Aproximacion de Arboles Multicast Optimos en Redes Ad Hoc InalambricasP.M. Ruiz and A.F. Gomez SkarmetaProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAMA.F. Gomez Skarmeta and P.M. RuizProceedings of the V Jornadas de Ingenieria Telematica, Vigo, SpainSeptember 2005Networking
Applying Fuzzy Logic to Model User Preferences on Multimedia SessionsJ.A. Botia, M. Valdes, P. M. Ruiz, and A.F. Gomez Skarmeta.Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy, Jaen, Spain, pp. 467-470September 2005Networking
Security Extensions to MMARP Through Cryptographically Generated AddressesF.J. Galera, P.M. Ruiz, and A.F. Gomez SkarmetaLecture Notes on Informatics, Vol. P-68, pp. 339–343September 2005Networking
Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale EventA. Kumar, V. Paxson, and N. WeaverProceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 351-364October 2005Networking[PDF]

A First Look at Modern Enterprise TrafficR. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. TierneyProceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 15-28October 2005Networking[PDF]

Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network TrafficS. Kornexl, V. Paxson, H. Dreger, A. Feldmann, and R. SommerProceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005), Berkeley, California, pp. 267-272October 2005Networking[PDF]

Heuristic Algorithms for Minimum Bandwidth Consumption Multicast Trees in Wireless Mesh NetworksP.M. Ruiz and A.F. Gomez SkarmetaLecture Notes in Computer Science, Vol. 3738, pp. 258–270October 2005Networking
Internet Connectivity for Mobile Ad Hoc Networks: Solutions and ChallengesP. M. Ruiz, F. J. Ros, and A.F. Gomez SkarmetaIEEE Communications Magazine, pp. 118–125October 2005Networking
Opportunistic Measurement: Extracting Insight from Spurious TrafficM. Casado, T. Garfinkel, W. Cui, V. Paxson, and S. SavageProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

A Unifying Link Abstraction for Wireless Sensor NetworksJ. Polastre, J. Hui, P. Levis, J. Zhao, D. Culler, S. Shenker, and I. StoicaProceedings of the Third ACM Conference on Embedded Networked Sensor Systems (Sensys 2005), San Diego, California, pp. 76-89November 2005Networking
Using Honeynets for Internet Situational AwarenessV. Yegneswaran, P. Barford, and V. PaxsonProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

Off by DefaultH. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. ShenkerProceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MarylandNovember 2005Networking[PDF]

DoS: Fighting Fire with FireM. Walfish, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, MarylandNovember 2005Networking[PDF]

Pages