| HLP: A Next-Generation Interdomain Routing Protocol | L. Subramanian, M. Caesar, C. Tien Ee, M. Handley, M. Mao, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), Philadelphia, Pennsylvania, pp. 13-24 | August 2005 | Networking | [PDF]
|
| Hidden-Action in Network Routing | M. Feldman, J. Chuang, I. Stoica, and S. Shenker | IEEE Journal on Selected Areas in Communications, Vol. 25, Issue 6, pp. 1161-1172 | August 2007 | Networking | [PDF]
|
| Hidden-Action in Multi-Hop Routing | M. Feldman, J. Chuang, I. Stoica, and S. Shenker | Proceedings of the 6th ACM Conference on Electronic Commerce (EC'05), Vancouver, Canada , pp. 117-126 | June 2005 | Networking | [PDF]
|
| Heuristic Algorithms for Minimum Bandwidth Consumption Multicast Trees in Wireless Mesh Networks | P.M. Ruiz and A.F. Gomez Skarmeta | Lecture Notes in Computer Science, Vol. 3738, pp. 258–270 | October 2005 | Networking | |
| Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web | D. Akhawe, B. Amann, M. Vallentin, and R. Sommer | To appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, Brazil | May 2013 | Networking | |
| Hedera: Dynamic Flow Scheduling for Data Center Networks | M. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. Vahdat | Proceedings of the USENIX/ACM SIGCOMM Symposium on Networked Systems Design and Implementation (NSDI), San Jose, California | April 2010 | Networking | [PDF]
|
| Hardness Results for Multicast Cost Sharing | J. Feigenbaum, A. Krishnamurthy, R. Sami, and S. Shenker | Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2002), Kanpur, India, pp. 133-144 | December 2002 | Networking | |
| Hardness Results for Multicast Cost Sharing | J. Feigenbaum, A. Krishnamurthy, R. Sami, and S. Shenker | Theoretical Computer Science, Vol. 304, Issues 1-3, pp. 215-236 | July 2003 | Networking | |
| Growth Trends in Wide-Area TCP Connections | V. Paxson | IEEE Network, Vol. 8 No. 4, pp. 8-17 | June 1994 | Networking | |
| Group Therapy for Systems: Using link attestations to manage failures | M. J. Freedman, I. Stoica, D. Mazieres, and S. Shenker | Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS 2006), Santa Barbara, California | February 2006 | Networking | [PDF]
|
| GQ: Practical Containment for Measuring Modern Malware Systems | C. Kreibich, N. Weaver, C. Kanich, W. Cui, V. Paxson | Proceedings of the 2011 Internet Measurement Conference (IMC), Berlin, Germany. Also appeared as ICSI Technical Report TR-11-002. | November 2011 | Networking | |
| GPSR: Greedy Perimeter Stateless Routing for Wireless networks | B. Karp and H.T. Kung | MOBICOM, 2000. | 2001 | Networking | |
| GMR: Geographic Multicast Routing for Wireless Sensor Networks | J.A. Sanchez, P. M. Ruiz, and I. Stojmenovic | Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Networks (IEEE SECON 2006), Reston, Virginia | September 2006 | Networking | |
| Global Synchronization in Sensornets | J. Elson, R. M. Karp, C.H. Papadimitriou and S. Shenker | Proceedings of LATIN, pp. 609-624 | January 05 2004 | Networking | |
| Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems | V. Paxson and C. Saltmarsh | Proceedings of the 1993 Winter USENIX Technical Conference, San Diego, California | January 1993 | Networking | |
| Glish: A Software Bus for High-Level Control | V. Paxson | Proceedings of the 1993 International Conference on Accelerator and Large Experimental Physics Control Systems, Berlin, Germany | October 1993 | Networking | |
| GHT: A Geographic Hash-table for Data-centric Storage in Sensornets | S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker | First ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), September 2002. | September 2002 | Networking | |
| Geographic Routing Without Location Information | A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, and I. Stoica | Proceedings of ACM MOBICOMM 2003, San Diego, California | September 2003 | Networking | |
| Geographic Routing Made Practical | Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 217-230 | May 2005 | Networking | [PDF]
|
| General characterization parameters for integrated service network elements. | S. Shenker and J. Wroclawski | Request for Comments (Proposed Standard) 2215, Internet Engineering Task Force | September 1997 | Networking | |
| Gatekeeper: Supporting Bandwidth Guarantees for Multi-Tenant Datacenter Networks | H. Rodrigues, J.R. Santos, Y. Turner, P. Soares, and D. Guedes | Proceedings of the Third Workshop on I/O Virtualization (WIOV '11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| FTP Security Considerations | M. Allman and S. Ostermann | Request for Comments 2577, May 1999. | May 1999 | Networking | |
| FTP Extensions for Variable Protocol Specification | M. Allman and S. Ostermann | Technical Report CR-209414, NASA Glenn Research Center, February 2000. | February 2000 | Networking | |
| FTP Extensions for IPv6 and NATs | M. Allman, S. Ostermann and C. Metz | RFC 2428 | September 1998 | Networking | |
| From Protocol Stack to Protocol Heap - Role-Based Architecture | B. Braden, T. Faber, and M. Handley | Proceedings of the First Workshop on Hot Topics in Networking (HotNets-I), Princeton, New Jersey | October 2002 | Networking | [PDF]
|
| From Complex Specifications to a Working Prototype: A Protocol Engineering Case Study | M. J. Fernández, J. González, J. M. Pousada, M. Llamas, and A. Romero | In Lecture Notes in Computer Science, Vol. 2021, pp. 436-448, Springer Verlag | 2001 | Networking | |
| Framework for IP Performance Metrics | V. Paxson, G. Almes, J. Mahdavi, and M. Mathis. | RFC 2330, Informational | May 1998 | Networking | |
| FrameNet as a Resource for Paraphrase Research | Y. Hasegawa, R. Lee-Goldman, A. Kong, and K. Akita | Constructions and Frames, Special Issue on Advances in Frame Semantics, Vol. 3, Issue 1, pp. 104-127 | August 2011 | Networking | |
| Flush: A Reliable Bulk Transport Protocol for Multihop Wireless Network | S. Kim, R. Fonseca, P.K. Dutta, A. Tavakoli, D.E. Culler, P. Levis, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2006-169, Berkeley, California | December 12 2006 | Networking | |
| Flexibility as an Instrument in DRM Systems | D. Bergemann, T. Eisenbach, J. Feigenbaum, and S. Shenker | Proceedings of 2005 Workshop on the Economics of Information Security (WEIS 2005), Cambridge, Massachusetts | June 2005 | Networking | [PDF]
|
| Fixing Two BSD TCP Bugs | M. Allman | Technical Report CR-204151, NASA Lewis Research Center | October 1997 | Networking | |
| Fixing the Embarrassing Slowness of OpenDHT on PlanetLab | S. Rhea, B.-G. Chun, J. Kubiatowicz, and S. Shenker | Proceedings of the Second Workshop on Real, Large Distributed Systems (WORLDS '05), San Francisco, California, pp. 25-30 | December 2005 | Networking | [PDF]
|
| Finite-Length Analysis of LT-codes | R.M. Karp, M. Luby, and A. Shokrollahi | Submitted to International Symposium on Information Theory (ISIT '04). | 2004 | Networking | |
| Findings and Implications from Data Mining the IMC Review Process | R. Beverly and M. Allman | ACM SIGCOMM Computer Communication Review, Vol. 3, No. 1, pp. 23-29 | January 2013 | Networking | [PDF]
|
| Finding a ‘Kneedle’ in a Haystack: Detecting Knee Points in System Behavior | V. Satopaa, J. Albrecht, D. Irwin, and B. Raghavan | Proceedings of the 30th International Conference on Distributed Computing Systems SIMPLEX Workshop (ICDCS 2010), Genoa, Italy | June 2010 | Networking | [PDF]
|
| Fighting Coordinated Attackers with Cross-Organizational Information on Sharing | M. Allman, E. Blanton, V. Paxson, and S. Shenker | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California | November 2006 | Networking | [PDF]
|
| Fathom: A Browser-based Network Measurement Platform | M. Dhawan, J. Samuel, R. Teixeira, C. Kreibich, M. Allman, N. Weaver, and V. Paxson | Proceedings of the 2012 Internet Measurement Conference (IMC 2012), Boston, Massachusetts | November 2012 | Networking | [PDF]
|
| Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic | V. Paxson | Computer Communications Review, Vol. 27, No. 5, pp. 5-18. This paper is a minor revision of Fast Approximation of Self-Similar Network Traffic, an April 1995 technical report. | October 1997 | Networking | |
| Fast Portscan Detection Using Sequention Hypothesis Testing | J. Jung, V. Paxson, A. Berger, and H. Balakrishnan | Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 211-225 | May 2004 | Networking | |
| Fast and Interactive Analytics Over Hadoop Data with Spark | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | USENIX ;login:, Vol. 34, No. 4, pp. 45-51 | August 2012 | Networking | [PDF]
|
| Fabric: A Retrospective on Evolving SDN | M. Casado, T. Koponen, S. Shenker, and A. Tootoonchian | Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Helsinki, Finland | August 2012 | Networking | [PDF]
|
| Extending Networking into the Virtualization Layer | B. Pfaff, J. Pettit, K. Amidon, M. Casado, T. Koponen, and S. Shenker | Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, New York | October 2009 | Networking | [PDF]
|
| Extending Equation-Based Congestion Control to Multicast Applications | J. Widmer and M. Handley | Proceedings of ACM SIGCOMM 2001. | 2001 | Networking | |
| Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event | A. Kumar, V. Paxson, and N. Weaver | Proceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 351-364 | October 2005 | Networking | [PDF]
|
| Exploiting the Bandwidth-Memory Tradeoff in Multicast State Aggregation | P. Radoslavov, D. Estrin, and R. Govindan | Technical Report 99-697, Computer Science Department, University of Southern California, July 1999. | July 1999 | Networking | |
| Exploiting Innocuous Activity for Correlating Users Across Sites | O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. Teixeira | To appear in the proceedings of the World Wide Web Conference (WWW), Rio de Janeiro, Brazil | May 2013 | Networking | |
| Exploiting Independent State For Network Intrusion Detection | R. Sommer and V. Paxson | Technische Universität München Technical Report No. TUM-I0420, Munich, Germany | November 2004 | Networking | [PDF]
|
| Exploiting Independent State For Network Intrusion Detection | R. Sommer and V. Paxson | Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, pp. 59-71 | December 2005 | Networking | [PDF]
|
| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks - Summary | R. Krishnan, M. Allman, C. Partridge, J.P.G. Sterbenz, and W. Ivancic | Earth Science Technology Conference, Pasadena, California, June 2002. | June 2002 | Networking | |
| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks | R. Krishnan, J. Sterbenz, W. Eddy, C. Partridge, and M. Allman | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 46, Issue 3, pp. 343-362 | October 2004 | Networking | [PDF]
|