Publication Search Results

TitleAuthorBibliographicDatesort descendingGroupLinks
Exploiting Independent State For Network Intrusion DetectionR. Sommer and V. PaxsonProceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, pp. 59-71December 2005Networking[PDF]

Fixing the Embarrassing Slowness of OpenDHT on PlanetLabS. Rhea, B.-G. Chun, J. Kubiatowicz, and S. ShenkerProceedings of the Second Workshop on Real, Large Distributed Systems (WORLDS '05), San Francisco, California, pp. 25-30December 2005Networking[PDF]

Detecting Hidden Causality in Network ConnectionsJ. Kannan, J. Jung, V. Paxson, and C. E. KoksalEECS Department, UC Berkeley Technical Report No. UCB/EECS-2005-30, Berkeley, CaliforniaDecember 2005Networking[PDF]

Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor NetworksF. Bian, X. Li, R. Govindan, and S. ShenkerInternational Journal of Ad Hoc and Ubiquitous Computing (special issue on wireless sensor networks), Vol. 1, No. 4, pp. 179-193January 2006Networking[PDF]

The Devil and Packet Trace AnonymizationR. Pang, M. Allman, V. Paxson, and J. LeeComputer Communication Review, Vol. 36, Issue 1, pp. 29-38January 2006Networking
Protocol-Independent Adaptive Replay of Application DialogW. Cui, V. Paxson, N. Weaver, and R.H. KatzProceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06), San Diego, CaliforniaFebruary 2006Networking[PDF]

Distributed Segment Tree: Support Range Query and Cover Query over DHTC. Zheng, G. Shen, S. Li, and S. ShenkerProceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, CaliforniaFebruary 2006Networking[PDF]

Group Therapy for Systems: Using link attestations to manage failuresM. J. Freedman, I. Stoica, D. Mazieres, and S. ShenkerProceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS 2006), Santa Barbara, CaliforniaFebruary 2006Networking[PDF]

Posted Price Profit Maximization for Multicast by Approximating Fixed PointsA. Mehta, S. Shenker, and V. VaziraniJournal of Algorithms, Vol. 58, Issue 2, pp. 150-164February 2006Networking
RFC 4440: IAB Thoughts on the Role of the Internet Research Task Force (IRTF)S. Floyd, V. Paxson, and A. Falk, editorsRequest For Comments 4440March 2006Networking[PDF]

RFC 4342: Profile for Datagram Congestion Control Protocol (DCCP) Congestion Control ID 3: TCP-Friendly Rate Control (TFRC)S. Floyd, E. Kohler, and J. PadhyeRequest For Comments 4342, Proposed StandardMarch 2006Networking[PDF]

RFC 4341: Profile for Datagram Congestion Control Protocol (DCCP) Congestion Control ID 2: TCP-like Congestion ControlS. Floyd and E. KohlerRequest For Comments 4341, Proposed StandardMarch 2006Networking[PDF]

RFC 4340: Datagram Congestion Control Protocol (DCCP)E. Kohler, M. Handley, and S. FloydRequest For Comments 4340, Proposed StandardMarch 2006Networking[PDF]

RFC 4336: Problem Statement for the Datagram Congestion Control Protocol (DCCP)S. Floyd, M. Handley, and E. KohlerRFC 4336, InformationalMarch 2006Networking[PDF]

Mechanism Design for Policy RoutingJ. Feigenbaum, R. Sami, and S. ShenkerDistributed Computing, Vol. 18, Issue. 4, pp. 150-164March 2006Networking[PDF]

End-Host Controlled Multicast RoutingK. Lakshminarayanan, A. Rao, I. Stoica, and S. ShenkerElsevier Computer Networks, Special Issue on Overlay Distribution Structures and their Applications, Vol. 5, Issue 6, pp. 807-825. DOI:10.1016/j.comnet.2005.07.019April 2006Networking[PDF]

SmartSeer: Using a DHT to Process Continuous Queries over Peer-to-Peer NetworksS. Banerjee, S. Basu, J. Kannan, S. J. Lee, P. Sharma, S. Shenker, and B. YangProceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), Barcelona, Spain, pp. 1-12April 2006Networking[PDF]

Wireless Urban Sensing SystemsM. Srivastava, M. Hansen, J. Burke, A. Parker, S. Reddy, G. Saurabh, M. Allman, V. Paxson, and D. EstrinCenter for Embedded Network Sensing, UC Los Angeles Technical Report No. 65, Los Angeles, CaliforniaApril 2006Networking[PDF]

OCALA: An Architecture for Supporting Legacy Applications Over OverlaysD. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I. Stoica, and K. WehrleProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 267-280May 2006Networking[PDF]

Distributed Quota Enforcement for Spam ControlM. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 281-296May 2006Networking[PDF]

Practical Data-Centric StorageC. T. Ee, S. Ratnasamy, and S. ShenkerProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 325-338May 2006Networking[PDF]

Replay Debugging for Distributed ApplicationsD. Geels, G. Altekar, S. Shenker, and I. StoicaProceedings of the 2006 USENIX Annual Technical Conference (best paper), Boston, Massachusetts, pp. 289-300May 2006Networking[PDF]

Incentive-Compatible Interdomain RoutingJ. Feigenbaum, V. Ramachandran, and M. SchapiraProceedings of the 7th ACM Conference on Electronic Commerce (EC'06), Ann Arbor, Michigan, pp. 130-139June 2006Networking[PDF]

Tracking the Role of Adversaries in Measuring Unwanted TrafficM. Allman, P. Barford, B. Krishnamurty, and J. WangProceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI), San Jose, California, p. 6July 2006Networking[PDF]

Energy-Efficient Routing on the Virtual SpannerH. Tejeda, E. Chavez, J.A. Sanchez, and P. M. RuizLecture Notes in Computer Science, Vol. 4104, pp. 101–113July 2006Networking
Rethinking Hardware Support for Network Analysis and Intrusion PreventionV. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, and N. WeaverProceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06), Vancouver, CanadaAugust 2006Networking[PDF]

Dynamic Application-Layer Protocol Analysis for Network Intrusion DetectionH. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. SommerProceedings of the 15th USENIX Security Symposium (Security '06), Vancouver, CanadaAugust 2006Networking[PDF]

Incremental Deployment Strategies for Router-Assisted Reliable MulticastX. He, C. Papadopoulos, and P. RadoslavovIEEE/ACM Transactions on Networking, Vol. 14, Issue 4, pp. 779-792August 2006Networking
SANE: A Protection Architecture for Enterprise NetworksM. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. ShenkerProceedings of the 15th USENIX Security Symposium (Security '05), Vancouver, Canada, pp. 137–151August 2006Networking[PDF]

RFC 4653: Improving the Robustness of TCP to Non-Congestion EventsS. Bhandarkar, A.L.N. Reddy, M. Allman, and E. BlantonRequest for Comments 4653 (Experimental)August 2006Networking
Network Loss Tomography Using Striped Unicast ProbesN. Duffield, F. Lo Presti, V. Paxson, and D. TowsleyIEEE/ACM Transactions on Networking, Vol. 14 Issue 4, pp. 697-710August 2006Networking[PDF]

Designing DCCP: Congestion Control Without ReliabilityE. Kohler, M. Handley, and S. FloydProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 27-38September 2006Networking[PDF]

Enhancing Network Intrusion Detection With Integrated Sampling and FilteringJ. Gonzalez and V. PaxsonProceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006), Hamburg, Germany, pp. 272-289September 2006Networking[PDF]

Revisiting IP MulticastS. Ratnasamy, A. Ermolinskiy, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 15-26September 2006Networking[PDF]

Minimizing Churn in Distributed SystemsP. B. Godfrey, S. Shenker, and I. StoicaProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 147-158September 2006Networking[PDF]

ROFL: Routing on Flat LabelsM. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, S. Shenker, and I. StoicaProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 363-374September 2006Networking[PDF]

DDoS Defense by OffenseM. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 303-314September 2006Networking[PDF]

Improving Delivery Ratio and Power Efficiency in Unicast Geographic Routing with a Realistic Physical Layer for Wireless Sensor NetworksJ.A. Sanchez and P. M. RuizProceedings of the 9th Euromicro Conference on Digital System Design Architectures, Methods, and Tools (DSD 2006), Drubovnid, CroatiaSeptember 2006Networking
A Virtual Spanner for Efficient Face Routing in Multihop Wireless NetworksH. Tejeda, E. Chavez, J.A. Sanchez, and P. M. RuizLecture Notes in Computer Science, Vol. 4217, pp. 459–470September 2006Networking
GMR: Geographic Multicast Routing for Wireless Sensor NetworksJ.A. Sanchez, P. M. Ruiz, and I. StojmenovicProceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Networks (IEEE SECON 2006), Reston, VirginiaSeptember 2006Networking
NS-3 Project GoalsT. Henderson, S. Roy, S. Floyd, and G. RileyProceedings of the Workshop on NS-2 (WNS2 2006), Pisa, Italy, article 13October 2006Networking[PDF]

binpac: A yacc for Writing Application Protocol ParsersR. Pang, V. Paxson, R. Sommer, and L. PetersonProceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 289-300October 2006Networking[PDF]

Semi-Automated Discovery of Application Session StructureJ. Kannan, J. Jung, V. Paxson, and C. KoksalProceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 119-132October 2006Networking[PDF]

The Design and Implementation of a Declarative Sensor Network SystemD. Chu, L. Popa, A. Tavakoli, J. Hellerstein, P. Levis, S. Shenker, and I. StoicaEECS Department, UC Berkeley Technical Report No. EECS-2006-132, Berkeley, CaliforniaOctober 2006Networking
Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing ApplicationsA. Parker, S. Reddy, T. Schmid, K. Chang, G. Saurabh, M. Srivastava, M. Hansen, J. Burke, D. Estrin, M. Allman, and V. PaxsonProceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 37-42November 2006Networking[PDF]

Fighting Coordinated Attackers with Cross-Organizational Information on SharingM. Allman, E. Blanton, V. Paxson, and S. ShenkerProceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, CaliforniaNovember 2006Networking[PDF]

RFC 4774: Specifying Alternate Semantics for the Explicit Congestion Notification (ECN) FieldS. FloydRequest For Comments 4774, Best Current PracticeNovember 2006Networking[PDF]

Service Portability: Why http Redirect is the Model for the FutureS. Singh, S. Shenker, and G. VargheseProceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 49-54November 2006Networking[PDF]

A Modular Network Layer for SensornetsC.T. Ee, R. Fonseca, S. Kim, D. Moon, A. Tavakoli, D. Culler, S. Shenker, and I. StoicaProceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), Seattle, Washington, pp. 249-262November 2006Networking[PDF]

Observed Structure of Addresses in IP TrafficE. Kohler, J. Li, V. Paxson, and S. ShenkerIEEE/ACM Transactions on Networking, Vol. 14, No. 6, pp. 1207-1218December 2006Networking[PDF]

Pages