Publication Search Results

TitleAuthorsort descendingBibliographicDateGroupLinks
Can Heterogeneity Make Gnutella Scalable?Q. Lv, S. Ratnasamy, and S. ShenkerThe First International Workshop on Peer-to-Peer Systems (IPTPS): 94-103, 2002. 2002Networking
RFC 3869: IAB Concerns & Recommendations Regarding Internet Research & EvolutionR. Atkinson and S. FloydRFC 3869August 2004Networking[PDF]

Findings and Implications from Data Mining the IMC Review ProcessR. Beverly and M. AllmanACM SIGCOMM Computer Communication Review, Vol. 3, No. 1, pp. 23-29January 2013Networking[PDF]

Towards Insurable Network ArchitecturesR. BoehmeJournal of Information Technology, Vol. 52, No. 5, pp. 290-293September 2010Networking
Modeling Cyber-Insurance: Towards a Unifying FrameworkR. Boehme and G. SchwartzProceedings of the 9th Workshop on the Economics of Information Security (WEIS 2010), Cambridge, MassachusettsJune 2010Networking[PDF]

Optimal Information Security Investment with Penetration TestingR. Boehme and M. FelegyhaziProceedings of the Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany, 21-37November 2010Networking[PDF]

Trained to Accept? A Field Experiment on Consent DialogsR. Boehme and S. KoepsellProceedings of the 28th ACM Conference on Human Factors in Computing Systems (CHI 2010), Atlanta, Georgia, pp. 2403-2406April 2010Networking[PDF]

Privacy in Online Social LendingR. Boehme and S. PoetzschProceedings of the AAAI 2010 Spring Symposium on Intelligent Information Privacy Management, Palo Alto, California, pp. 23-28March 2010Networking[PDF]

The Iterated Weakest LinkR. Böhme and T. MooreIEEE Security and Privacy, Vol. 9, Issue 1, pp. 53-55January 2010Networking[PDF]

X-Trace: A Pervasive Network Tracing FrameworkR. Fonseca, G. Porter, R.H. Katz, S. Shenker, and I. StoicaProceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Cambridge, Massachusetts, pp. 271-284April 2007Networking[PDF]

Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless SensornetsR. Fonseca, S. Ratnasamy, J. Zhao, C. Tien Ee, D. Culler, S. Shenker, and I. StoicaProceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 329-342May 2005Networking[PDF]

An Analysis of The Internal Structure of Large Autonomous SystemsR. Govindan and P. RadoslavovComputer Science Department, University of Southern California Technical Report No. 02-777, Los Angeles, CaliforniaNovember 2002Networking
Estimating Router ICMP Generation DelaysR. Govindan and V. PaxsonProceedings of Passive & Active Measurement: PAM-2002. 2002Networking
Reduced State Routing in the InternetR. Gummadi, N. Kothari, Y.-J. Kim, R. Govindan, B. Karp, and S. ShenkerProceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, CaliforniaNovember 2004Networking[PDF]

The Architecture of PIER: An Internet-Scale Query ProcessorR. Huebsch, B. Chun, J. M. Hellerstein, B. T. Loo, P. Maniatis, T. Roscoe, S. Shenker, I. Stoica, and A. R. YumerefendiProceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, California, pp. 28-43January 2005Networking[PDF]

Querying the Internet with PIERR. Huebsch, J.M. Hellerstein, N. Lanham, B.T. Loo, S. Shenker, and I. StoicaProceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003), Berlin, GermanySeptember 2003Networking[PDF]

COPS: Quality of Service Vs. Any Service at AllR. Katz, G. Porter, S. Shenker, I. Stoica, and M. TsaiProceedings of the 13th International Workshop on Quality of Service 2005 (IWQoS 2005), Passau, Germany, pp. 3-15June 2005Networking
Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite NetworksR. Krishnan, J. Sterbenz, W. Eddy, C. Partridge, and M. AllmanComputer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 46, Issue 3, pp. 343-362October 2004Networking[PDF]

Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite NetworksR. Krishnan, M. Allman, C. Partridge, and J.P.G. SterbenzBBN Technologies Technical Report No. 8333March 2002Networking[PDF]

Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks - SummaryR. Krishnan, M. Allman, C. Partridge, J.P.G. Sterbenz, and W. IvancicEarth Science Technology Conference, Pasadena, California, June 2002.June 2002Networking
Randomized Rumor SpreadingR. M. Karp, C. Schindelhauer, S. Shenker, and B. VockingFOCS 2000, pp. 565-574 2000Networking
Controlling High Bandwidth Aggregates in the NetworkR. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. ShenkerComputer Communication Review 32(3), July 2002.July 2002Networking
Controlling High-Bandwidth Flows at the Congested RouterR. Mahajan, S. Floyd, and D. WetherallICNP 2001 2001Networking
The Click Modular RouterR. Morris, E. Kohler, J. Jannotti, and M.F. KaashoekProceedings of the Seventeenth ACM Symposium on Operating Systems Principles (SOSP '99) , Kiawah Island, South Carolina, December 1999, pages 217-231.December 1999Networking
Approximate Fair Allocation of Link BandwidthR. Pan, B. Prabhakar, L. Breslau, and S. ShenkerIEEE Micro Vol. 23, Issue 1, pp. 36-43 2003Networking
A Flow Table-Based Design to Approximate FairnessR. Pan, L. Breslau, B. Prabhakar, and S. ShenkerProceedings of Hot Interconnects: Tenth Symposium on High Performance Interconnects (Hot-I 2002), Stanford, CaliforniaAugust 2002Networking[PDF]

Approximate fairness through differential droppingR. Pan, L. Breslau, B. Prabhakar, and S. ShenkerComputer Communication Review, Vol. 33, Issue 2, pp. 23-39 2003Networking
A High-level Programming Environment for Packet Trace Anonymization and TransformationR. Pang and V. PaxsonProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2003), Karlsruhe, GermanyAugust 2003Networking[PDF]

A First Look at Modern Enterprise TrafficR. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. TierneyProceedings of the 2005 Internet Measurement Conference (IMC 2005), Berkeley, California, pp. 15-28October 2005Networking[PDF]

The Devil and Packet Trace AnonymizationR. Pang, M. Allman, V. Paxson, and J. LeeComputer Communication Review, Vol. 36, Issue 1, pp. 29-38January 2006Networking
binpac: A yacc for Writing Application Protocol ParsersR. Pang, V. Paxson, R. Sommer, and L. PetersonProceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 289-300October 2006Networking[PDF]

Characteristics of Internet Background RadiationR. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. PetersonProceedings of the 2004 Internet Measurement Conference (IMC 2004), Taormina, ItalyOctober 2004Networking[PDF]

Multimedia Proxy Caching for Quality Adaptive Streaming Applications in the InternetR. Rejaie, H. Yu, M. Handley, and D. EstrinProceedings of Infocom 2000. 2000Networking
Quality Adaptation for Congestion Controlled Playback Video Over the InternetR. Rejaie, M. Handley, and D. EstrinProceedings of ACM SIGCOMM '99, Cambridge, September 1999.September 1999Networking
RAP: An End-to-End Rate-Based Congestion Control Mechanism for Realtime Streams in the InternetR. Rejaie, M. Handley, and D. EstrinProceedings of Infocom 1999. 1999Networking
Architectural Considerations for Playback of Quality Adaptive Video over the InternetR. Rejaie, M. Handley, and D. EstrinTechnical report 98-686, Computer Science Department, University of Southern California 1998Networking
Proxy Caching Mechanism for Multimedia Playback Streams in the InternetR. Rejaie, M. Handley, H. Yu, and D. EstrinProceedings of the Fourth International Web Caching Workshop, San Diego, California, March 31 - April 2, 1999.March 1999Networking
Identification of Protein Complexes by Comparative Analysis of Yeast and Bacterial Protein Interaction DataR. Sharan, T. Ideker, B.P. Kelley, R. Shamir, and R.M. KarpProceedings of RECOMB 2004, pp. 282-289January 05 2004Networking
Enhancing Byte-Level Network Intrusion Detection Signatures with ContextR. Sommer and V. PaxsonProceedings of ACM CCS 2003Networking
Exploiting Independent State For Network Intrusion DetectionR. Sommer and V. PaxsonTechnische Universität München Technical Report No. TUM-I0420, Munich, GermanyNovember 2004Networking[PDF]

Exploiting Independent State For Network Intrusion DetectionR. Sommer and V. PaxsonProceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, pp. 59-71December 2005Networking[PDF]

Outside the Closed World: On Using Machine Learning for Network Intrusion DetectionR. Sommer and V. PaxsonProceedings of the IEEE Symposium on Security and Privacy 2010, Oakland, California, pp. 305-316May 2010Networking[PDF]

An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion PreventionR. Sommer, N. Weaver, and V. PaxsonConcurrency and Computation: Practice and Experience, Vol. 21, Issue 10, pp. 1255-1279July 2009Networking[PDF]

Stream Control Transmission ProtocolR. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. PaxsonRequest for Comments 2960, Proposed Standard, October 2000.October 2000Networking
Algorithms for Optical MappingR.M. Karp and R. ShamirJournal of Computational Biology 7(1,2) 2000. 2000Networking
Optimization Problems in Congestion ControlR.M. Karp, E. Koutsoupias, C.H. Papadimitriou, and S. ShenkerProceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS 2000), Redondo Beach, California, pp. 66-74November 2000Networking[PDF]

Finite-Length Analysis of LT-codesR.M. Karp, M. Luby, and A. ShokrollahiSubmitted to International Symposium on Information Theory (ISIT '04). 2004Networking
A Simple Algorithm for Finding Frequent Elements in Streams and BagsR.M. Karp, S. Shenker, and C.H. PapadimitriouACM Transactions on Database Systems, Vol. 28, Issue 1, pp. 51-55March 2003Networking[PDF]

On Preserving Privacy in Information-Centric NetworksS. Arianfar, T. Koponen, B. Raghavan, and S. ShenkerProceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN-2011), Toronto, Canada, pp. 19-24August 2011Networking[PDF]

Uniform versus Priority Dropping for Layered VideoS. Bajaj, L. Breslau, and S. ShenkerACM Computer Communication Review, Vol. 28, pp. 131-143September 1998Networking

Pages