Publication Search Results

TitleAuthorBibliographicDateGroupLinkssort ascending
Flush: A Reliable Bulk Transport Protocol for Multihop Wireless NetworkS. Kim, R. Fonseca, P.K. Dutta, A. Tavakoli, D.E. Culler, P. Levis, S. Shenker, and I. StoicaEECS Department, UC Berkeley Technical Report No. UCB/EECS-2006-169, Berkeley, CaliforniaDecember 12 2006Networking
The Design and Implementation of a Declarative Sensor Network SystemD. Chu, L. Popa, A. Tavakoli, J. Hellerstein, P. Levis, S. Shenker, and I. StoicaEECS Department, UC Berkeley Technical Report No. EECS-2006-132, Berkeley, CaliforniaOctober 2006Networking
RFC 4782 Quick-Start for TCP and IPS. Floyd, M. Allman, A. Jain, and P. SarolahtiRequest For Comments 4782January 2007Networking[PDF]

Determining an Appropriate Sending Rate Over an Underutilized Network PathP. Sarolahti, M. Allman, and S. FloydComputer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 51, Issue 7, pp. 1815-1832. DOI:10.1016/j.comnet.2006.11.006May 2007Networking[PDF]

Approximate fairness through differential droppingR. Pan, L. Breslau, B. Prabhakar, and S. ShenkerComputer Communication Review, Vol. 33, Issue 2, pp. 23-39 2003Networking
Approximate Fair Allocation of Link BandwidthR. Pan, B. Prabhakar, L. Breslau, and S. ShenkerIEEE Micro Vol. 23, Issue 1, pp. 36-43 2003Networking
Service Portability: Why http Redirect is the Model for the FutureS. Singh, S. Shenker, and G. VargheseProceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 49-54November 2006Networking[PDF]

X-Trace: A Pervasive Network Tracing FrameworkR. Fonseca, G. Porter, R.H. Katz, S. Shenker, and I. StoicaProceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Cambridge, Massachusetts, pp. 271-284April 2007Networking[PDF]

A Modular Network Layer for SensornetsC.T. Ee, R. Fonseca, S. Kim, D. Moon, A. Tavakoli, D. Culler, S. Shenker, and I. StoicaProceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), Seattle, Washington, pp. 249-262November 2006Networking[PDF]

Resolving Inter-Domain Policy DisputesC. T. Ee, V. Ramachandran, B.-G. Chun, K. Lakshminarayanan, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 157-168August 2007Networking[PDF]

A Data-oriented (and Beyond) Network ArchitectureT. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. StoicaComputer Communication Review, Vol. 37, Issue 4, ACM, pp. 181-192October 2007Networking[PDF]

RFC 4828: TCP Friendly Rate Control (TFRC): the Small-Packet (SP) VariantS. Floyd and E. KohlerRFC 4828, ExperimentalApril 2007Networking[PDF]

Specifying New Congestion Control AlgorithmsS. Floyd and M. AllmanRequest For Comments 5033, Best Current Practice 133August 2007Networking[PDF]

Posted Price Profit Maximization for Multicast by Approximating Fixed PointsA. Mehta, S. Shenker, and V. VaziraniJournal of Algorithms, Vol. 58, Issue 2, pp. 150-164February 2006Networking
Mechanism Design for Policy RoutingJ. Feigenbaum, R. Sami, and S. ShenkerDistributed Computing, Vol. 18, Issue. 4, pp. 150-164March 2006Networking[PDF]

Internet Indirection InfrastructureI. Stoica, D. Adkins, S. Zhaung, S. Shenker, and S. SuranaIEEE/ACM Transactions on Networking, Vol. 12, Issue 2, pp. 205-218April 2004Networking[PDF]

Incentives and Internet ComputationJ. Feigenbaum and S. ShenkerDistributed Computing Column #9, SIGACT News, Vol. 33, Issue 4, pp. 37-54 2002Networking
Agents' Privacy In Distributed Algorithmic Mechanisms (Position Paper)J. Feigenbaum, N. Nisan, V. Ramachandran, R. Sami, and S. ShenkerFirst Workshop on Economics and Information Security, Berkeley, CaliforniaMay 2002Networking
Distributed Algorithmic Mechanism DesignJ. Feigenbaum, M. Schapira, and S. ShenkerIn Algorithmic Game Theory, N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, eds., pp. 363-384, Cambridge University Press 2007Networking
Hidden-Action in Network RoutingM. Feldman, J. Chuang, I. Stoica, and S. ShenkerIEEE Journal on Selected Areas in Communications, Vol. 25, Issue 6, pp. 1161-1172August 2007Networking[PDF]

A Declarative Sensornet ArchitectureA. Tavakoli, D. Chu, J. Hellerstein, P. Levis, and S. ShenkerProceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 55-60April 2007Networking[PDF]

A Modular Sensornet Architecture: Past, Present, and Future DirectionsA. Tavakoli, P. Dutta, J. Jeong, S. Kim, J. Ortiz, P. Levis, and S. ShenkerProceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 49-54April 2007Networking[PDF]

An Architecture for Energy Management in Wireless Sensor NetworksX. Jiang, J. Taneja, J. Ortiz, A. Tavakoli, P. Dutta, J. Jeong, D. Culler, P. Levis, and S. ShenkerProceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 31-36April 2007Networking[PDF]

Ethane: Taking Control of the EnterpriseM. Casado, M. Freedman, J. Pettit, N. McKeown, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 1-12August 2007Networking[PDF]

Achieving Convergence-Free Routing Using Failure-Carrying PacketsK. Lakshminarayanan, M. Caesar, M. Rangan, T. Anderson, S. Shenker, and I. StoicaProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 241 - 252August 2007Networking[PDF]

Loss and Delay Accountability for the InternetK. Argyraki, P. Maniatis, O. Irzak, A. Subramanian, and S. ShenkerProceedings of the 15th IEEE International Conference on Network Protocols (ICNP 2007), Beijing, China, pp. 194-205October 2007Networking[PDF]

Attested Append-Only Memory: Making Adversaries Stick to their WordB.-G. Chun, P. Maniatis, S. Shenker, and J. KubiatowiczProceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, Washington, pp. 189-204October 2007Networking[PDF]

NetComplex: A Complexity Metric for Network System DesignsB.-G. Chun, S. Ratnasamy, and E. KohlerProceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 393-406April 2008Networking
An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion PreventionV. Paxson, R. Sommer, and N. WeaverProceedings of IEEE Sarnoff Symposium, Princeton, New Jersey, pp. 1-7May 2007Networking[PDF]

On the Adaptive Real-Time Detection of Fast-Propagating Network WormsJ. Jung, R. Milito, and V. PaxsonProceedings of the Fourth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2007), Lucerne, Switzerland, pp. 175-192. Also Journal on Computer Virology, Vol. 4, No. 1, pp. 197-210, February 2008July 2007Networking[PDF]

The Strengths of Weaker Identities: Opportunistic PersonasM. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. WeaverProceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, MassachusettsAugust 2007Networking[PDF]

The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity HardwareM. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. TierneyProceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007), Queensland, AustraliaSeptember 2007Networking[PDF]

Issues and Etiquette Concerning Use of Shared Measurement DataM. Allman and V. PaxsonProceedings of ACM SIGCOMM Conference on Internet Measurement (IMC 2007), San Diego, California, pp. 135-140October 2007Networking[PDF]

A Brief History of ScanningM. Allman, V. Paxson, and J. TerrellProceedings of ACM SIGCOMM Conference on Internet Measurement, San Diego, California, pp. 77-82October 2007Networking[PDF]

Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion PreventionJ. Gonzalez, V. Paxson, and N. WeaverProceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008), Alexandria, Virginia, pp. 139-149October 2007Networking[PDF]

An Inquiry into the Nature and Causes of the Wealth of Internet MiscreantsJ. Franklin, V. Paxson, A. Perrig, and S. SavageProceedings of ACM Computer and Communication Security Conference (ACM CCS), Alexandria, Virginia, pp. 375-388October 2007Networking[PDF]

Enabling an Energy-Efficient Future Internet Through Selectively Connected End SystemsM. Allman, K. Christensen, B. Nordman, and V. PaxsonProceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, GeorgiaNovember 2007Networking[PDF]

A Reactive Measurement FrameworkM. Allman and V. PaxsonProceedings of the 9th International Conference on Passive and Active Network Measurement (PAM 2008), Cleveland, Ohio, pp. 92-101April 2008Networking[PDF]

Diverse Replication for Single-Machine Byzantine-Fault ToleranceB.-C. Chun, P. Maniatis, and S. ShenkerProceedings of the USENIX Annual Technical Conference, Boston, Massachusetts, pp. 287-292June 2008Networking[PDF]

RFC 5290: Comments on the Usefulness of Simple Best-Effort TrafficS. Floyd and M. AllmanRequest for Comments 5290, InformationalJuly 2008Networking[PDF]

IMRG Workshop on Application Classification and Identification ReportT. Strayer, M. Allman, G. Armitage, S. Bellovin, S. Jin and A. W. MooreACM Computer Communication Review (editorial contribution), Vol. 38, Issue 3, pp. 87-90July 2008Networking
On Community-Oriented Internet MeasurementM. Allman, L. Martin, M. Rabinovich, and K. AtchinsonProceedings of the Passive and Active Measurement Conference (PAM 2008), Cleveland, Ohio, pp. 112-121April 2008Networking[PDF]

What Ought a Program Committee to Do?M. AllmanProceedings of USENIX Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems (WOWCS), San Francisco, CaliforniaApril 2008Networking[PDF]

Thoughts on ReviewingM. AllmanACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50April 2008Networking[PDF]

Predicting the Resource Consumption of Network Intrusion Detection SystemsH. Dreger, A. Feldmann, V. Paxson, and R. SommerProceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2008), Cambridge, Massachusetts, pp. 135-154September 2008Networking[PDF]

Enriching Network Security Analysis with Time TravelG. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson, and F. SchneiderProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 183-194August 2008Networking[PDF]

Principles for Developing Comprehensive Network VisibilityM. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. WeaverProceedings of the Third USENIX Workshop on Hot Topics in Security (HotSec ’08), San Jose, CaliforniaJuly 2008Networking[PDF]

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection SystemsL. Juan, C. Kreibich, C.-H. Lin, and V. PaxsonProceedings of the Fifth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2008), Paris, France, pp. 267-278July 2008Networking[PDF]

On the Spam Campaign TrailC. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. SavageProceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, CaliforniaApril 2008Networking[PDF]

Efficient and Robust TCP Stream NormalizationM. Vutukuru, H. Balakrishnan, and V. PaxsonProceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 96-110May 2008Networking[PDF]

Pages