Publication Search Results

TitleAuthorBibliographicsort ascendingDateGroupLinks
A First Look at Modern Enterprise TrafficR. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. TierneyProceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 15-28October 2005Networking[PDF]

Measuring Interactions Between Transport Protocols and MiddleboxesA. Medina, M. Allman, and S. FloydProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 336-341October 2004Networking[PDF]

MultiQ: Automated Detection of Multiple Bottlenexk Capacities Along a PathS. Katti, D. Katabi, C. Blake, E. Kohler, and J. StraussProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, Italy, pp. 245-250October 2004Networking[PDF]

Characteristics of Internet Background RadiationR. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. PetersonProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, ItalyOctober 2004Networking[PDF]

Strategies for Sound Internet MeasurementV. PaxsonProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, ItalyOctober 2004Networking[PDF]

Priceless: The Role of Payments in Abuse-Advertised GoodsD. McCoy, H. Dharmdasani, C. Kreibich, G. M. Voelker, and S. SavageProceedings of the 19th ACM Conference on Computer and Communications Society (CCS 2012), pp. 845-856, Raleigh, North CarolinaOctober 2012Networking
Manufacturing Compromise: The Emergence of Exploit-as-a-ServiceC. Grier, L. Ballard, J. Caballero, N. Chachra, C. J. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, M. Zubair Rafique, M. Abu Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, and G. M. VoelkerProceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012), pp. 821-832, Raleigh, North CarolinaOctober 2012Networking[PDF]

Glish: A User-Level Software Bus for Loosely-Coupled Distributed SystemsV. Paxson and C. SaltmarshProceedings of the 1993 Winter USENIX Technical Conference, San Diego, CaliforniaJanuary 1993Networking
Glish: A Software Bus for High-Level ControlV. PaxsonProceedings of the 1993 International Conference on Accelerator and Large Experimental Physics Control Systems, Berlin, GermanyOctober 1993Networking
Efficient Application Placement in a Dynamic Hosting PlatformZ. Al-Qudah, H. Alzoubi, M. Allman, M. Rabinovich, and V. LiberatoreProceedings of the 18th International World Wide Web Conference (WWW 2009), Madrid, Spain, pp. 281-290April 2009Networking[PDF]

Botnet Judo: Fighting Spam with ItselfA. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. SavageProceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS Symposiom 2010), San Diego, CaliforniaFebruary 2010Networking[PDF]

@spam: The Underground on 140 Characters or LessC. Grier, K. Thomas, V. Paxson, and M. ZhangProceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, Illinois, pp. 27-37October 2010Networking[PDF]

Search and Replication in Unstructured Peer-to-Peer NetworksQ. Lv, P. Cao, E. Cohen, K. Li, and S. ShenkerProceedings of the 16th International Conference on Supercomputing (ICS-02), New York, New York, pp. 84-95June 2002Networking[PDF]

Detecting Forged TCP Reset PacketsN. Weaver, R. Sommer, and V. PaxsonProceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, CaliforniaFebruary 2009Networking[PDF]

Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-EngineeringJ. Caballero, P. Poosankam, C. Kreibich, and D. SongProceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, Illinois, pp. 621-634November 2009Networking[PDF]

Dynamic Application-Layer Protocol Analysis for Network Intrusion DetectionH. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. SommerProceedings of the 15th USENIX Security Symposium (Security '06), Vancouver, CanadaAugust 2006Networking[PDF]

SANE: A Protection Architecture for Enterprise NetworksM. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. ShenkerProceedings of the 15th USENIX Security Symposium (Security '05), Vancouver, Canada, pp. 137–151August 2006Networking[PDF]

A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time IntelligenceB. Amann, R. Sommer, A. Sharma, and S. HallProceedings of the 15th International Symposium on Attacks, Intrusions, and Detections (RAID 2012), pp. 314-333, Amsterdam, the NetherlandsSeptember 2012Networking
Integrated IP Multicast in Mobile Ad Hoc Networks with Multiple Attachments to Wired IP NetworksP. M. Ruiz and A.F. Gomez-SkarmetaProceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, SpainSeptember 2004Networking[PDF]

QoS and Micromobility Coupling Integrated with UMTSL.A. Galindo and P. M. RuizProceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, SpainSeptember 2004Networking[PDF]

Loss and Delay Accountability for the InternetK. Argyraki, P. Maniatis, O. Irzak, A. Subramanian, and S. ShenkerProceedings of the 15th IEEE International Conference on Network Protocols (ICNP 2007), Beijing, China, pp. 194-205October 2007Networking[PDF]

Security of Open Source and Closed Source Software: An Empirical Comparison of Published VulnerabilitiesG. SchryenProceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), San Francisco, California, paper 387August 2009Networking[PDF]

Spamalytics: An Empirical Analysis of Spam Marketing ConversionC. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 3-14. Also appeared in the Communications of the ACM, Vol. 52, No. 9, pp. 99-107, September 2009October 2008Networking[PDF]

Revocation Games in Ephemeral NetworksM. Raya, M. H. Manshaei, M. Felegyhazi, and J.-P. HubauxProceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 199-210October 2008Networking[PDF]

Robust TCP Reassembly in the Presence of AdversariesS. Dharmapurikar and V. PaxsonProceedings of the 14th Conference on USENIX Security Symposium (Security '05), Baltimore, Maryland, pp. 65-80August 2005Networking[PDF]

Disk-Locality in Datacenter Computing Considered IrrelevantG. Anantharayanan, A. Ghodsi, S. Shenker, and I. StoicaProceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), Napa, CaliforniaMay 2011Networking[PDF]

Very Fast Containment of Scanning WormsN. Weaver, S. Staniford, and V. PaxsonProceedings of the 13th USENIX Security Symposium, San Diego, California, pp. 29-44August 2004Networking[PDF]

The BIZ Top-Level Domain: Ten Years LaterT. Halvorson, J. Szurdi, G. Maier, M. Felegyhazi, C. Kreibich, N. Weaver, K. Levchenko, and V. PaxsonProceedings of the 13th Passive and Active Measurement Conference, Vienna, AustriaMarch 2012Networking[PDF]

Probe and Pray: Using UPnP for Home Network MeasurementsL. DiCioccio, R. Teixeira, M. May, and C. KreibichProceedings of the 13th Passive and Active Measurement Conference (PAM 2012), pp. 96-105, Vienna, AustriaMarch 2012Networking[PDF]

Protocol-Independent Adaptive Replay of Application DialogW. Cui, V. Paxson, N. Weaver, and R.H. KatzProceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06), San Diego, CaliforniaFebruary 2006Networking[PDF]

Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?T. Ouyang, S. Ray, M. Rabinovich, and M. AllmanProceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Detecting and Analyzing Automated Activity on TwitterC. M. Zhang and V. PaxsonProceedings of the 12th Passive and Active Measurement Conference (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

NAT Usage in Residential Broadband NetworksG. Maier, F. Schneider, and A. FeldmannProceedings of the 12th International Conference on Passive and Active Network Measurement (PAM 2011), Atlanta, GeorgiaMarch 2011Networking[PDF]

Worms vs. Perimeters: The Case for Hard-LANsN. Weaver, D. Ellis, S. Staniford, and V. PaxsonProceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12), Stanford, California, pp. 70-76August 2004Networking[PDF]

The SFRA: A Corner-Turn FPGA ArchitectureN. Weaver, J. Hauser and J. WawrzynekProceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004), Monterey, California, pp. 3-12February 2004Networking[PDF]

A Longitudinal View of HTTP TrafficT. Callahan, M. Allman, and V. PaxsonProceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, SwitzerlandApril 2010Networking[PDF]

Web Timeouts and Their ImplicationsZ. Al-Qudah, M. Rabinovich, and M. AllmanProceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, SwitzerlandApril 2010Networking[PDF]

A First Look at Mobile Hand-held Device TrafficG. Maier, F. Schneider, and A. FeldmannProceedings of the 11th International Conference on Passive and Active Network Measurement (PAM 2010), Zurich, Switzerland, pp. 161-170April 2010Networking[PDF]

Operational Experiences with High-Volume Network Intrusion DetectionH. Dreger, A. Feldmann, V. Paxson, and R. SommerProceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004), Washington, D.C., Vol. 11, p. 2October 2004Networking[PDF]

Towards a Sensor Network Architecture: Lowering the WaistlineD. Culler, P. Dutta, C.T. Ee, R. Fonseca, J. Hui, P. Levis, J. Polastre, S. Shenker, I. Stoica, G. Tolle, and J. ZhaoProceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS 10), Santa Fe, New Mexico, p. 24June 2005Networking
Information-Centric Networking: Seeing the Forest for the TreesA. Ghodsi, T. Koponen, B. Raghavan, S. Shenker, A. Singla, and J. WilcoxProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

Intelligent Design Enables Architectural EvolutionA. Ghodsi, T. Koponen, B. Raghavan, S. Shenker, A. Singla, and J. WilcoxProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

The Energy and Emergy of the InternetB. Raghavan and J. MaProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

Data-Driven Network ConnectivityJ. Liu, S. Shenker, M. Schapira, and B. YangProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

Improved Key Management for Digital Watermark MonitoringV. Roth and M. ArnoldProceedings of SPIE, San Jose, California, January 2002.January 2002Networking
Internet Pat Inflation Due to Policy RoutingH. Tangmunarunkit, R. Govindan, and S. ShenkerProceedings of SPIE ITCom 2001, Denver, CO. 19-24. August 2001.August 2001Networking
Traffic Matrix Estimation Techniques: Existing Techniques Compared and New DirectionsA. Medina, N. Taft, K.Salamatian, S. Bhattacharyyam, and C. DiotProceedings of SIGCOMM 2002, Pittsburgh, Pennsylvania. August 2002.August 2002Networking
The Architecture of PIER: An Internet-Scale Query ProcessorR. Huebsch, B. Chun, J. M. Hellerstein, B. T. Loo, P. Maniatis, T. Roscoe, S. Shenker, I. Stoica, and A. R. YumerefendiProceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, California, pp. 28-43January 2005Networking[PDF]

Identification of Protein Complexes by Comparative Analysis of Yeast and Bacterial Protein Interaction DataR. Sharan, T. Ideker, B.P. Kelley, R. Shamir, and R.M. KarpProceedings of RECOMB 2004, pp. 282-289January 05 2004Networking
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable DelayD. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. StanifordProceedings of RAID, 2002. 2002Networking

Pages