Publication Search Results

Titlesort ascendingAuthorBibliographicDateGroupLinks
Large Scale Malicious Code: A Research AgendaN. Weaver, V. Paxson, S. Staniford, and R. CunninghamDARPA-sponsored report 2003Networking
Known TCP Implementation ProblemsV. Paxson, M. Allman, S. Dawson, W. Fenner, J. Griner, I. Heavens, K. Lahey, J. Semke, and B. VolzRequest for Comments 2525, Informational, March 1999.March 1999Networking
Jellyfish: Networking Data Centers RandomlyA. Singla, C.-Y. Hong, L. Popa, and P. Brighten GodfreyProceedings the Third USENIX Workshop on Hot Topics in Cloud Computing (USENIX HotCloud ‘11), Portland, OregonJune 2011Networking[PDF]

Java Security Architecture and ExtensionsV. RothDr. Dobbs Journal, 2002(335), April 2002.April 2002Networking
J. Ishac and M. AllmanOn the Performance of TCP Spoofing in Satellite NetworksIEEE Milcom. October 2001.October 2001Networking
Issues of TCP with SACKS. FloydTechnical reportJanuary 1996Networking[PDF]

Issues and Etiquette Concerning Use of Shared Measurement DataM. Allman and V. PaxsonProceedings of ACM SIGCOMM Conference on Internet Measurement (IMC 2007), San Diego, California, pp. 135-140October 2007Networking[PDF]

IPPM Metrics for Measuring ConnectivityJ. Mahdavi and V. PaxsonRequest for Comments 2678, Proposed Standard, September 1999.September 1999Networking
IPNL: A NAT-Extended Internet ArchitectureP. Francis and R. GummadiSIGCOMM 2001 2001Networking
Internetworking MultimediaJ. Crowcroft, M. Handley, and I. WakemanMorgan Kaufmann, ISBN 1-55860-584-3, 1999. 1999Networking
Internet Topology: Discovery and Policy Impact, Parts I and IIH. Tangmunarunkit, R. Govindan, and S. ShenkerIn The Internet as a Large-Scale Complex System, K. Park and W. Willinger, eds., pp. 121-160, Oxford University Press 2005Networking[PDF]

Internet Research Needs Better ModelsS. Floyd and E. Kohler.Proceedings of the First ACM Workshop on Hot Topics in Networks (HotNets-I),Princeton, New JerseyOctober 2002Networking[PDF]

Internet Research Needs Better ModelsS. Floyd and E. KohlerACM Computer Communications Review, Vol. 33, No. 1, pp. 29-34January 2003Networking[PDF]

Internet Pat Inflation Due to Policy RoutingH. Tangmunarunkit, R. Govindan, and S. ShenkerProceedings of SPIE ITCom 2001, Denver, CO. 19-24. August 2001.August 2001Networking
Internet Indirection InfrastructureI. Stoica, D. Adkins, S. Ratnasamy, S. Shenker, S. Surana, and S. ZhuangThe First International Workshop on Peer-to-Peer Systems (IPTPS): 191-202, 2002. 2002Networking
Internet Indirection InfrastructureI. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. SuranaProceedings of the annual conference of the ACM Special Interest Group on Data Communication (ACM SIGCOMM 2002), Pittsburgh, Pennsylvania, pp. 73-86August 2002Networking[PDF]

Internet Indirection InfrastructureI. Stoica, D. Adkins, S. Zhaung, S. Shenker, and S. SuranaIEEE/ACM Transactions on Networking, Vol. 12, Issue 2, pp. 205-218April 2004Networking[PDF]

Internet Connectivity for Mobile Ad Hoc Networks: Solutions and ChallengesP. M. Ruiz, F. J. Ros, and A.F. Gomez SkarmetaIEEE Communications Magazine, pp. 118–125October 2005Networking
Internet Congestion Control for High Bandwidth-Delay Product EnvironmentsD. Katabi, M. Handley, and C. RohrsProceedings of ACM SIGCOMM 2002. 2002Networking
Intelligent Design Enables Architectural EvolutionA. Ghodsi, T. Koponen, B. Raghavan, S. Shenker, A. Singla, and J. WilcoxProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

Integrated IP Multicast in Mobile Ad Hoc Networks with Multiple Attachments to Wired IP NetworksP. M. Ruiz and A.F. Gomez-SkarmetaProceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, SpainSeptember 2004Networking[PDF]

Insights from the Inside: A View of Botnet Management from InfiltrationC. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. SongProceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, CaliforniaApril 2010Networking[PDF]

Inside the Slammer WormD. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. WeaverIEEE Magazine of Security and Privacy, Vol. 1, Issue 4, pp. 33-39July 2003Networking[PDF]

Information-Centric Networking: Seeing the Forest for the TreesA. Ghodsi, T. Koponen, B. Raghavan, S. Shenker, A. Singla, and J. WilcoxProceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MassachusettsNovember 2011Networking[PDF]

Inferring Link Loss Using Striped Unicast ProbesN. Duffield, F. Lo Presti, V. Paxson, and D. TowsleyProceedings of IEEE INFOCOM, April 2001.April 2001Networking
Incremental Deployment Strategies for Router-Assisted Reliable MulticastX. He, C. Papadopoulos, and P. RadoslavovIEEE/ACM Transactions on Networking, Vol. 14, Issue 4, pp. 779-792August 2006Networking
Incentives and Internet ComputationJ. Feigenbaum and S. ShenkerDistributed Computing Column #9, SIGACT News, Vol. 33, Issue 4, pp. 37-54 2002Networking
Incentive-Compatible Interdomain RoutingJ. Feigenbaum, V. Ramachandran, and M. SchapiraProceedings of the 7th ACM Conference on Electronic Commerce (EC'06), Ann Arbor, Michigan, pp. 130-139June 2006Networking[PDF]

Incentive Compatibility and Dynamics of Congestion ControlP. B. Godfrey, M. Schapira, A. Zohar, and S. ShenkerACM SIGMETRICS Performance Evaluation Review, Vol. 36, Issue 1, pp. 95-106June 2010Networking[PDF]

IMRG Workshop on Application Classification and Identification ReportT. Strayer, M. Allman, G. Armitage, S. Bellovin, S. Jin and A. W. MooreACM Computer Communication Review (editorial contribution), Vol. 38, Issue 3, pp. 87-90July 2008Networking
Improving TCP Performance Over Satellite ChannelsM. AllmanMaster's Thesis, Ohio UniversityJune 1997Networking
Improving Delivery Ratio and Power Efficiency in Unicast Geographic Routing with a Realistic Physical Layer for Wireless Sensor NetworksJ.A. Sanchez and P. M. RuizProceedings of the 9th Euromicro Conference on Digital System Design Architectures, Methods, and Tools (DSD 2006), Drubovnid, CroatiaSeptember 2006Networking
Improved Key Management for Digital Watermark MonitoringV. Roth and M. ArnoldProceedings of SPIE, San Jose, California, January 2002.January 2002Networking
Implications of Netalyzr's DNS MeasurementsN. Weaver, C. Kreibich, B. Nechaev, and V. PaxsonProceedings of the First Workshop on Securing and Trusting Internet Names (SATIN), Teddington, United KingdomApril 2011Networking[PDF]

Implementation and Evaluation of a Location-Aware Wireless Multi-Agent SystemI. Nieto-Carvajal, J.A. Botia, P. M. Ruiz, and A. Gomez-SkarmetaLecture Notes in Computer Science, Vol. 3207, pp. 528-537August 2004Networking[PDF]

Impact of Network Dynamics on End-to-End Protocols: Case Studies in TCP and Reliable MulticastK. Varadhan, D. Estrin, and S. FloydTech report USC-CS-TR 98-672, April 1998. An abbreviated version appeared in the proceedings of the IEEE Symposium on Computers and Communications, July 1998April 1998Networking
IETF Criteria for Evaluating Reliable Multicast Transport and Application ProtocolsA. Mankin, A. Romanow, S. Bradner, and V. PaxsonRFC 2357, InformationalJune 1998Networking
Identifying the TCP Behavior of Web ServersJ. Padhye and S. FloydSIGCOMM 2001, August 2001. Or the ICSI Technical Report 01-002, February 2001. 2001Networking
Identification of Protein Complexes by Comparative Analysis of Yeast and Bacterial Protein Interaction DataR. Sharan, T. Ideker, B.P. Kelley, R. Shamir, and R.M. KarpProceedings of RECOMB 2004, pp. 282-289January 05 2004Networking
ICTD State of the Union: Where Have We Reached and Where Are We Headed?S. Nedevschi, R. Patra, and J. PalProceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2009), Doha, QatarApril 2009Networking[PDF]

IANA Allocation Guidelines For Values In the Internet Protocol and Related HeadersS. Bradner and V. PaxsonRequest for Comments 2780, Best Current Practice, March 2000.March 2000Networking
Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research CommunityM. Zaharia, S. Katti, C. Grier, V. Paxson, S. Shenker, I. Stoica and D. SongEECS Department, UC Berkeley Technical Report No. UCB/EECS-2012-12, Berkeley, CaliforniaJanuary 2012Networking[PDF]

HTTP Page Transfer Rates Over Geo-Stationary Satellite LinksH. Kruse, M. Allman, J. Griner, and D. TranProceedings of the 6th International Conference on Telecommunication Systems, Nashville, TennesseeMarch 1998Networking
HTTP as the Narrow Waist of the Future InternetL. Popa, A. Ghodsi, and I. StoicaProceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 6October 2010Networking[PDF]

How to Own the Internet in Your Spare TimeS. Staniford, V. Paxson, and N. WeaverProceedings of the Eleventh USENIX Security Symposium (Security '02), San Francisco, CaliforniaAugust 2002Networking[PDF]

How the Pursuit of Truth Led Me to Selling ViagraV. PaxsonInvited talk at the USENIX Security Symposium, Montreal, CanadaAugust 2009Networking[PDF]

Hot Data Centers vs. Cool PeersS. Nedevschi, S. Ratnasamy, and J. PadhyeProceedings of the Workshop on Power Aware Computing and Systems (HotPower '09), Big Sky, Montana, p. 8October 2009Networking[PDF]

Host Mobility Using and Internet Indirection InfrastructureS. Zhuang, K. Lai, I. Stoica, R. Katz, and S. ShenkerProceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, California, pp. 129-144May 2003Networking[PDF]

Holding the Internet AccountableD. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. ShenkerProceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, GeorgiaNovember 2007Networking[PDF]

Hold-On: Protecting Against On-Path DNS PoisoningH. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. PaxsonProceedings of the Conference on Securing and Trusting Internet Names (SATIN 2012), Teddington, United KingdomMarch 2012Networking[PDF]

Pages