| Large Scale Malicious Code: A Research Agenda | N. Weaver, V. Paxson, S. Staniford, and R. Cunningham | DARPA-sponsored report | 2003 | Networking | |
| Known TCP Implementation Problems | V. Paxson, M. Allman, S. Dawson, W. Fenner, J. Griner, I. Heavens, K. Lahey, J. Semke, and B. Volz | Request for Comments 2525, Informational, March 1999. | March 1999 | Networking | |
| Jellyfish: Networking Data Centers Randomly | A. Singla, C.-Y. Hong, L. Popa, and P. Brighten Godfrey | Proceedings the Third USENIX Workshop on Hot Topics in Cloud Computing (USENIX HotCloud ‘11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| Java Security Architecture and Extensions | V. Roth | Dr. Dobbs Journal, 2002(335), April 2002. | April 2002 | Networking | |
| J. Ishac and M. Allman | On the Performance of TCP Spoofing in Satellite Networks | IEEE Milcom. October 2001. | October 2001 | Networking | |
| Issues of TCP with SACK | S. Floyd | Technical report | January 1996 | Networking | [PDF]
|
| Issues and Etiquette Concerning Use of Shared Measurement Data | M. Allman and V. Paxson | Proceedings of ACM SIGCOMM Conference on Internet Measurement (IMC 2007), San Diego, California, pp. 135-140 | October 2007 | Networking | [PDF]
|
| IPPM Metrics for Measuring Connectivity | J. Mahdavi and V. Paxson | Request for Comments 2678, Proposed Standard, September 1999. | September 1999 | Networking | |
| IPNL: A NAT-Extended Internet Architecture | P. Francis and R. Gummadi | SIGCOMM 2001 | 2001 | Networking | |
| Internetworking Multimedia | J. Crowcroft, M. Handley, and I. Wakeman | Morgan Kaufmann, ISBN 1-55860-584-3, 1999. | 1999 | Networking | |
| Internet Topology: Discovery and Policy Impact, Parts I and II | H. Tangmunarunkit, R. Govindan, and S. Shenker | In The Internet as a Large-Scale Complex System, K. Park and W. Willinger, eds., pp. 121-160, Oxford University Press | 2005 | Networking | [PDF]
|
| Internet Research Needs Better Models | S. Floyd and E. Kohler. | Proceedings of the First ACM Workshop on Hot Topics in Networks (HotNets-I),Princeton, New Jersey | October 2002 | Networking | [PDF]
|
| Internet Research Needs Better Models | S. Floyd and E. Kohler | ACM Computer Communications Review, Vol. 33, No. 1, pp. 29-34 | January 2003 | Networking | [PDF]
|
| Internet Pat Inflation Due to Policy Routing | H. Tangmunarunkit, R. Govindan, and S. Shenker | Proceedings of SPIE ITCom 2001, Denver, CO. 19-24. August 2001. | August 2001 | Networking | |
| Internet Indirection Infrastructure | I. Stoica, D. Adkins, S. Ratnasamy, S. Shenker, S. Surana, and S. Zhuang | The First International Workshop on Peer-to-Peer Systems (IPTPS): 191-202, 2002. | 2002 | Networking | |
| Internet Indirection Infrastructure | I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana | Proceedings of the annual conference of the ACM Special Interest Group on Data Communication (ACM SIGCOMM 2002), Pittsburgh, Pennsylvania, pp. 73-86 | August 2002 | Networking | [PDF]
|
| Internet Indirection Infrastructure | I. Stoica, D. Adkins, S. Zhaung, S. Shenker, and S. Surana | IEEE/ACM Transactions on Networking, Vol. 12, Issue 2, pp. 205-218 | April 2004 | Networking | [PDF]
|
| Internet Connectivity for Mobile Ad Hoc Networks: Solutions and Challenges | P. M. Ruiz, F. J. Ros, and A.F. Gomez Skarmeta | IEEE Communications Magazine, pp. 118–125 | October 2005 | Networking | |
| Internet Congestion Control for High Bandwidth-Delay Product Environments | D. Katabi, M. Handley, and C. Rohrs | Proceedings of ACM SIGCOMM 2002. | 2002 | Networking | |
| Intelligent Design Enables Architectural Evolution | A. Ghodsi, T. Koponen, B. Raghavan, S. Shenker, A. Singla, and J. Wilcox | Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, Massachusetts | November 2011 | Networking | [PDF]
|
| Integrated IP Multicast in Mobile Ad Hoc Networks with Multiple Attachments to Wired IP Networks | P. M. Ruiz and A.F. Gomez-Skarmeta | Proceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, Spain | September 2004 | Networking | [PDF]
|
| Insights from the Inside: A View of Botnet Management from Infiltration | C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song | Proceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, California | April 2010 | Networking | [PDF]
|
| Inside the Slammer Worm | D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver | IEEE Magazine of Security and Privacy, Vol. 1, Issue 4, pp. 33-39 | July 2003 | Networking | [PDF]
|
| Information-Centric Networking: Seeing the Forest for the Trees | A. Ghodsi, T. Koponen, B. Raghavan, S. Shenker, A. Singla, and J. Wilcox | Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, Massachusetts | November 2011 | Networking | [PDF]
|
| Inferring Link Loss Using Striped Unicast Probes | N. Duffield, F. Lo Presti, V. Paxson, and D. Towsley | Proceedings of IEEE INFOCOM, April 2001. | April 2001 | Networking | |
| Incremental Deployment Strategies for Router-Assisted Reliable Multicast | X. He, C. Papadopoulos, and P. Radoslavov | IEEE/ACM Transactions on Networking, Vol. 14, Issue 4, pp. 779-792 | August 2006 | Networking | |
| Incentives and Internet Computation | J. Feigenbaum and S. Shenker | Distributed Computing Column #9, SIGACT News, Vol. 33, Issue 4, pp. 37-54 | 2002 | Networking | |
| Incentive-Compatible Interdomain Routing | J. Feigenbaum, V. Ramachandran, and M. Schapira | Proceedings of the 7th ACM Conference on Electronic Commerce (EC'06), Ann Arbor, Michigan, pp. 130-139 | June 2006 | Networking | [PDF]
|
| Incentive Compatibility and Dynamics of Congestion Control | P. B. Godfrey, M. Schapira, A. Zohar, and S. Shenker | ACM SIGMETRICS Performance Evaluation Review, Vol. 36, Issue 1, pp. 95-106 | June 2010 | Networking | [PDF]
|
| IMRG Workshop on Application Classification and Identification Report | T. Strayer, M. Allman, G. Armitage, S. Bellovin, S. Jin and A. W. Moore | ACM Computer Communication Review (editorial contribution), Vol. 38, Issue 3, pp. 87-90 | July 2008 | Networking | |
| Improving TCP Performance Over Satellite Channels | M. Allman | Master's Thesis, Ohio University | June 1997 | Networking | |
| Improving Delivery Ratio and Power Efficiency in Unicast Geographic Routing with a Realistic Physical Layer for Wireless Sensor Networks | J.A. Sanchez and P. M. Ruiz | Proceedings of the 9th Euromicro Conference on Digital System Design Architectures, Methods, and Tools (DSD 2006), Drubovnid, Croatia | September 2006 | Networking | |
| Improved Key Management for Digital Watermark Monitoring | V. Roth and M. Arnold | Proceedings of SPIE, San Jose, California, January 2002. | January 2002 | Networking | |
| Implications of Netalyzr's DNS Measurements | N. Weaver, C. Kreibich, B. Nechaev, and V. Paxson | Proceedings of the First Workshop on Securing and Trusting Internet Names (SATIN), Teddington, United Kingdom | April 2011 | Networking | [PDF]
|
| Implementation and Evaluation of a Location-Aware Wireless Multi-Agent System | I. Nieto-Carvajal, J.A. Botia, P. M. Ruiz, and A. Gomez-Skarmeta | Lecture Notes in Computer Science, Vol. 3207, pp. 528-537 | August 2004 | Networking | [PDF]
|
| Impact of Network Dynamics on End-to-End Protocols: Case Studies in TCP and Reliable Multicast | K. Varadhan, D. Estrin, and S. Floyd | Tech report USC-CS-TR 98-672, April 1998. An abbreviated version appeared in the proceedings of the IEEE Symposium on Computers and Communications, July 1998 | April 1998 | Networking | |
| IETF Criteria for Evaluating Reliable Multicast Transport and Application Protocols | A. Mankin, A. Romanow, S. Bradner, and V. Paxson | RFC 2357, Informational | June 1998 | Networking | |
| Identifying the TCP Behavior of Web Servers | J. Padhye and S. Floyd | SIGCOMM 2001, August 2001. Or the ICSI Technical Report 01-002, February 2001. | 2001 | Networking | |
| Identification of Protein Complexes by Comparative Analysis of Yeast and Bacterial Protein Interaction Data | R. Sharan, T. Ideker, B.P. Kelley, R. Shamir, and R.M. Karp | Proceedings of RECOMB 2004, pp. 282-289 | January 05 2004 | Networking | |
| ICTD State of the Union: Where Have We Reached and Where Are We Headed? | S. Nedevschi, R. Patra, and J. Pal | Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2009), Doha, Qatar | April 2009 | Networking | [PDF]
|
| IANA Allocation Guidelines For Values In the Internet Protocol and Related Headers | S. Bradner and V. Paxson | Request for Comments 2780, Best Current Practice, March 2000. | March 2000 | Networking | |
| Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community | M. Zaharia, S. Katti, C. Grier, V. Paxson, S. Shenker, I. Stoica and D. Song | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2012-12, Berkeley, California | January 2012 | Networking | [PDF]
|
| HTTP Page Transfer Rates Over Geo-Stationary Satellite Links | H. Kruse, M. Allman, J. Griner, and D. Tran | Proceedings of the 6th International Conference on Telecommunication Systems, Nashville, Tennessee | March 1998 | Networking | |
| HTTP as the Narrow Waist of the Future Internet | L. Popa, A. Ghodsi, and I. Stoica | Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, California, article no. 6 | October 2010 | Networking | [PDF]
|
| How to Own the Internet in Your Spare Time | S. Staniford, V. Paxson, and N. Weaver | Proceedings of the Eleventh USENIX Security Symposium (Security '02), San Francisco, California | August 2002 | Networking | [PDF]
|
| How the Pursuit of Truth Led Me to Selling Viagra | V. Paxson | Invited talk at the USENIX Security Symposium, Montreal, Canada | August 2009 | Networking | [PDF]
|
| Hot Data Centers vs. Cool Peers | S. Nedevschi, S. Ratnasamy, and J. Padhye | Proceedings of the Workshop on Power Aware Computing and Systems (HotPower '09), Big Sky, Montana, p. 8 | October 2009 | Networking | [PDF]
|
| Host Mobility Using and Internet Indirection Infrastructure | S. Zhuang, K. Lai, I. Stoica, R. Katz, and S. Shenker | Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, California, pp. 129-144 | May 2003 | Networking | [PDF]
|
| Holding the Internet Accountable | D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker | Proceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| Hold-On: Protecting Against On-Path DNS Poisoning | H. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. Paxson | Proceedings of the Conference on Securing and Trusting Internet Names (SATIN 2012), Teddington, United Kingdom | March 2012 | Networking | [PDF]
|