| Flush: A Reliable Bulk Transport Protocol for Multihop Wireless Network | S. Kim, R. Fonseca, P.K. Dutta, A. Tavakoli, D.E. Culler, P. Levis, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2006-169, Berkeley, California | December 12 2006 | Networking | |
| The Design and Implementation of a Declarative Sensor Network System | D. Chu, L. Popa, A. Tavakoli, J. Hellerstein, P. Levis, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. EECS-2006-132, Berkeley, California | October 2006 | Networking | |
| RFC 4782 Quick-Start for TCP and IP | S. Floyd, M. Allman, A. Jain, and P. Sarolahti | Request For Comments 4782 | January 2007 | Networking | [PDF]
|
| Determining an Appropriate Sending Rate Over an Underutilized Network Path | P. Sarolahti, M. Allman, and S. Floyd | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 51, Issue 7, pp. 1815-1832. DOI:10.1016/j.comnet.2006.11.006 | May 2007 | Networking | [PDF]
|
| Approximate fairness through differential dropping | R. Pan, L. Breslau, B. Prabhakar, and S. Shenker | Computer Communication Review, Vol. 33, Issue 2, pp. 23-39 | 2003 | Networking | |
| Approximate Fair Allocation of Link Bandwidth | R. Pan, B. Prabhakar, L. Breslau, and S. Shenker | IEEE Micro Vol. 23, Issue 1, pp. 36-43 | 2003 | Networking | |
| Service Portability: Why http Redirect is the Model for the Future | S. Singh, S. Shenker, and G. Varghese | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 49-54 | November 2006 | Networking | [PDF]
|
| X-Trace: A Pervasive Network Tracing Framework | R. Fonseca, G. Porter, R.H. Katz, S. Shenker, and I. Stoica | Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Cambridge, Massachusetts, pp. 271-284 | April 2007 | Networking | [PDF]
|
| A Modular Network Layer for Sensornets | C.T. Ee, R. Fonseca, S. Kim, D. Moon, A. Tavakoli, D. Culler, S. Shenker, and I. Stoica | Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), Seattle, Washington, pp. 249-262 | November 2006 | Networking | [PDF]
|
| Resolving Inter-Domain Policy Disputes | C. T. Ee, V. Ramachandran, B.-G. Chun, K. Lakshminarayanan, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 157-168 | August 2007 | Networking | [PDF]
|
| A Data-oriented (and Beyond) Network Architecture | T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. Stoica | Computer Communication Review, Vol. 37, Issue 4, ACM, pp. 181-192 | October 2007 | Networking | [PDF]
|
| RFC 4828: TCP Friendly Rate Control (TFRC): the Small-Packet (SP) Variant | S. Floyd and E. Kohler | RFC 4828, Experimental | April 2007 | Networking | [PDF]
|
| Specifying New Congestion Control Algorithms | S. Floyd and M. Allman | Request For Comments 5033, Best Current Practice 133 | August 2007 | Networking | [PDF]
|
| Posted Price Profit Maximization for Multicast by Approximating Fixed Points | A. Mehta, S. Shenker, and V. Vazirani | Journal of Algorithms, Vol. 58, Issue 2, pp. 150-164 | February 2006 | Networking | |
| Mechanism Design for Policy Routing | J. Feigenbaum, R. Sami, and S. Shenker | Distributed Computing, Vol. 18, Issue. 4, pp. 150-164 | March 2006 | Networking | [PDF]
|
| Internet Indirection Infrastructure | I. Stoica, D. Adkins, S. Zhaung, S. Shenker, and S. Surana | IEEE/ACM Transactions on Networking, Vol. 12, Issue 2, pp. 205-218 | April 2004 | Networking | [PDF]
|
| Incentives and Internet Computation | J. Feigenbaum and S. Shenker | Distributed Computing Column #9, SIGACT News, Vol. 33, Issue 4, pp. 37-54 | 2002 | Networking | |
| Agents' Privacy In Distributed Algorithmic Mechanisms (Position Paper) | J. Feigenbaum, N. Nisan, V. Ramachandran, R. Sami, and S. Shenker | First Workshop on Economics and Information Security, Berkeley, California | May 2002 | Networking | |
| Distributed Algorithmic Mechanism Design | J. Feigenbaum, M. Schapira, and S. Shenker | In Algorithmic Game Theory, N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, eds., pp. 363-384, Cambridge University Press | 2007 | Networking | |
| Hidden-Action in Network Routing | M. Feldman, J. Chuang, I. Stoica, and S. Shenker | IEEE Journal on Selected Areas in Communications, Vol. 25, Issue 6, pp. 1161-1172 | August 2007 | Networking | [PDF]
|
| A Declarative Sensornet Architecture | A. Tavakoli, D. Chu, J. Hellerstein, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 55-60 | April 2007 | Networking | [PDF]
|
| A Modular Sensornet Architecture: Past, Present, and Future Directions | A. Tavakoli, P. Dutta, J. Jeong, S. Kim, J. Ortiz, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 49-54 | April 2007 | Networking | [PDF]
|
| An Architecture for Energy Management in Wireless Sensor Networks | X. Jiang, J. Taneja, J. Ortiz, A. Tavakoli, P. Dutta, J. Jeong, D. Culler, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 31-36 | April 2007 | Networking | [PDF]
|
| Ethane: Taking Control of the Enterprise | M. Casado, M. Freedman, J. Pettit, N. McKeown, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 1-12 | August 2007 | Networking | [PDF]
|
| Achieving Convergence-Free Routing Using Failure-Carrying Packets | K. Lakshminarayanan, M. Caesar, M. Rangan, T. Anderson, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 241 - 252 | August 2007 | Networking | [PDF]
|
| Loss and Delay Accountability for the Internet | K. Argyraki, P. Maniatis, O. Irzak, A. Subramanian, and S. Shenker | Proceedings of the 15th IEEE International Conference on Network Protocols (ICNP 2007), Beijing, China, pp. 194-205 | October 2007 | Networking | [PDF]
|
| Attested Append-Only Memory: Making Adversaries Stick to their Word | B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz | Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, Washington, pp. 189-204 | October 2007 | Networking | [PDF]
|
| NetComplex: A Complexity Metric for Network System Designs | B.-G. Chun, S. Ratnasamy, and E. Kohler | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 393-406 | April 2008 | Networking | |
| An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention | V. Paxson, R. Sommer, and N. Weaver | Proceedings of IEEE Sarnoff Symposium, Princeton, New Jersey, pp. 1-7 | May 2007 | Networking | [PDF]
|
| On the Adaptive Real-Time Detection of Fast-Propagating Network Worms | J. Jung, R. Milito, and V. Paxson | Proceedings of the Fourth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2007), Lucerne, Switzerland, pp. 175-192. Also Journal on Computer Virology, Vol. 4, No. 1, pp. 197-210, February 2008 | July 2007 | Networking | [PDF]
|
| The Strengths of Weaker Identities: Opportunistic Personas | M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver | Proceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, Massachusetts | August 2007 | Networking | [PDF]
|
| The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware | M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney | Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007), Queensland, Australia | September 2007 | Networking | [PDF]
|
| Issues and Etiquette Concerning Use of Shared Measurement Data | M. Allman and V. Paxson | Proceedings of ACM SIGCOMM Conference on Internet Measurement (IMC 2007), San Diego, California, pp. 135-140 | October 2007 | Networking | [PDF]
|
| A Brief History of Scanning | M. Allman, V. Paxson, and J. Terrell | Proceedings of ACM SIGCOMM Conference on Internet Measurement, San Diego, California, pp. 77-82 | October 2007 | Networking | [PDF]
|
| Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention | J. Gonzalez, V. Paxson, and N. Weaver | Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008), Alexandria, Virginia, pp. 139-149 | October 2007 | Networking | [PDF]
|
| An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | J. Franklin, V. Paxson, A. Perrig, and S. Savage | Proceedings of ACM Computer and Communication Security Conference (ACM CCS), Alexandria, Virginia, pp. 375-388 | October 2007 | Networking | [PDF]
|
| Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems | M. Allman, K. Christensen, B. Nordman, and V. Paxson | Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| A Reactive Measurement Framework | M. Allman and V. Paxson | Proceedings of the 9th International Conference on Passive and Active Network Measurement (PAM 2008), Cleveland, Ohio, pp. 92-101 | April 2008 | Networking | [PDF]
|
| Diverse Replication for Single-Machine Byzantine-Fault Tolerance | B.-C. Chun, P. Maniatis, and S. Shenker | Proceedings of the USENIX Annual Technical Conference, Boston, Massachusetts, pp. 287-292 | June 2008 | Networking | [PDF]
|
| RFC 5290: Comments on the Usefulness of Simple Best-Effort Traffic | S. Floyd and M. Allman | Request for Comments 5290, Informational | July 2008 | Networking | [PDF]
|
| IMRG Workshop on Application Classification and Identification Report | T. Strayer, M. Allman, G. Armitage, S. Bellovin, S. Jin and A. W. Moore | ACM Computer Communication Review (editorial contribution), Vol. 38, Issue 3, pp. 87-90 | July 2008 | Networking | |
| On Community-Oriented Internet Measurement | M. Allman, L. Martin, M. Rabinovich, and K. Atchinson | Proceedings of the Passive and Active Measurement Conference (PAM 2008), Cleveland, Ohio, pp. 112-121 | April 2008 | Networking | [PDF]
|
| What Ought a Program Committee to Do? | M. Allman | Proceedings of USENIX Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems (WOWCS), San Francisco, California | April 2008 | Networking | [PDF]
|
| Thoughts on Reviewing | M. Allman | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50 | April 2008 | Networking | [PDF]
|
| Predicting the Resource Consumption of Network Intrusion Detection Systems | H. Dreger, A. Feldmann, V. Paxson, and R. Sommer | Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2008), Cambridge, Massachusetts, pp. 135-154 | September 2008 | Networking | [PDF]
|
| Enriching Network Security Analysis with Time Travel | G. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson, and F. Schneider | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 183-194 | August 2008 | Networking | [PDF]
|
| Principles for Developing Comprehensive Network Visibility | M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver | Proceedings of the Third USENIX Workshop on Hot Topics in Security (HotSec ’08), San Jose, California | July 2008 | Networking | [PDF]
|
| A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems | L. Juan, C. Kreibich, C.-H. Lin, and V. Paxson | Proceedings of the Fifth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2008), Paris, France, pp. 267-278 | July 2008 | Networking | [PDF]
|
| On the Spam Campaign Trail | C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, California | April 2008 | Networking | [PDF]
|
| Efficient and Robust TCP Stream Normalization | M. Vutukuru, H. Balakrishnan, and V. Paxson | Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 96-110 | May 2008 | Networking | [PDF]
|