| Proxy Caching Mechanism for Multimedia Playback Streams in the Internet | R. Rejaie, M. Handley, H. Yu, and D. Estrin | Proceedings of the Fourth International Web Caching Workshop, San Diego, California, March 31 - April 2, 1999. | March 1999 | Networking | |
| Policy-Controlled Event Management for Distributed Intrusion Detection | C. Kreibich and R. Sommer | Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05), Columbus, Ohio, Vol. 4, pp. 385-391 | June 2005 | Networking | [PDF]
|
| Peering Peer-to-Peer Providers | H. Balakrishnan, S. Shenker, and M. Walfish | Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 104-114 | February 2005 | Networking | [PDF]
|
| OverCite: A Cooperative Digital Research Library | J. Stribling, I. Councill, J. Li, M. Frans Kaashoek, D. R. Karger, R. Morris, and S. Shenker | Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05), Ithaca, New York, pp. 69-79 | February 2005 | Networking | [PDF]
|
| X-Trace: A Pervasive Network Tracing Framework | R. Fonseca, G. Porter, R.H. Katz, S. Shenker, and I. Stoica | Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Cambridge, Massachusetts, pp. 271-284 | April 2007 | Networking | [PDF]
|
| On the Effects of Registrar-Level Intervention | H. Liu, K. Levchenko, M. Felegyhazi, C. Kreibich, G. Maier, G. M. Voelker, and Stefan Savage | Proceedings of the Fourth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11), Boston, Massachusetts | March 2011 | Networking | [PDF]
|
| Opportunistic Measurement: Extracting Insight from Spurious Traffic | M. Casado, T. Garfinkel, W. Cui, V. Paxson, and S. Savage | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| Using Honeynets for Internet Situational Awareness | V. Yegneswaran, P. Barford, and V. Paxson | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| Off by Default | H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. Shenker | Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| DoS: Fighting Fire with Fire | M. Walfish, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| Hardness Results for Multicast Cost Sharing | J. Feigenbaum, A. Krishnamurthy, R. Sami, and S. Shenker | Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2002), Kanpur, India, pp. 133-144 | December 2002 | Networking | |
| A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast | P. Radoslavov, C. Papadopoulos, R. Govindan, and D. Estrin | Proceedings of the IEEE Infocom 2001, Anchorage, Alaska, USA, April 22-26, 2001. | April 22 2001 | Networking | |
| A Framework for Incremental Deployment Strategies for Router-Assisted Services | X. He, C. Papadopoulos, and P. Radoslavov | Proceedings of the IEEE Infocom 2003. San Francisco, California, USA | April 2003 | Networking | |
| Object Oriented Circuit Generators in Java | M. Chu, N. Weaver, K. Sulimma, A. DeHon, and J. Wawrzynek | Proceedings of the IEEE Symposium on Field Programmable Custom Computing Machines (FCCM) | 1998 | Networking | |
| Outside the Closed World: On Using Machine Learning for Network Intrusion Detection | R. Sommer and V. Paxson | Proceedings of the IEEE Symposium on Security and Privacy 2010, Oakland, California, pp. 305-316 | May 2010 | Networking | [PDF]
|
| Active Mapping: Resisting NIDS Evasion Without Altering Traffic | U. Shankar and V. Paxson | Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California | May 2003 | Networking | [PDF]
|
| Click Trajectories: End-to-End Analysis of the Spam Value Chain | K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage | Proceedings of the IEEE Symposium on Security and Privacy, pp. 431-446, Oakland, California | May 2011 | Networking | [PDF]
|
| User-Aware Videoconference Session Control Using Software Agents | J.A. Botia, P. Ruiz, and A. Gomez-Skarmeta | Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), Beijing, China | September 2004 | Networking | |
| Search and Replication in Unstructured Peer-to-Peer Networks | Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker | Proceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002), Marina Del Rey, California, pp. 258-259 | June 2002 | Networking | |
| ICTD State of the Union: Where Have We Reached and Where Are We Headed? | S. Nedevschi, R. Patra, and J. Pal | Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2009), Doha, Qatar | April 2009 | Networking | [PDF]
|
| On Calibrating Measurements of Packet Transit Times | V. Paxson | Proceedings of the International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '98), Madison, Wisconsin, pp. 11-21 | June 1998 | Networking | |
| Towards QoS in IP-Based Core Networks: A Survey on Performance Management, MPLS Case | J. L. Marzo, P. Maryni, and P. Vilà | Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'2001), Orlando, Florida | July 2001 | Networking | |
| The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware | M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney | Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007), Queensland, Australia | September 2007 | Networking | [PDF]
|
| Predicting the Resource Consumption of Network Intrusion Detection Systems | H. Dreger, A. Feldmann, V. Paxson, and R. Sommer | Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2008), Cambridge, Massachusetts, pp. 135-154 | September 2008 | Networking | [PDF]
|
| Towards a Common TCP Evaluation Suite | L. Andrew, C. Marcondes, S. Floyd, L. Dunn, R. Guillier, W. Gang, L. Eggert, S. Ha, and I. Rhee | Proceedings of the International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet), Manchester, United Kingdom | March 2008 | Networking | [PDF]
|
| An Architecture for Energy Management in Wireless Sensor Networks | X. Jiang, J. Taneja, J. Ortiz, A. Tavakoli, P. Dutta, J. Jeong, D. Culler, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 31-36 | April 2007 | Networking | [PDF]
|
| A Modular Sensornet Architecture: Past, Present, and Future Directions | A. Tavakoli, P. Dutta, J. Jeong, S. Kim, J. Ortiz, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 49-54 | April 2007 | Networking | [PDF]
|
| A Declarative Sensornet Architecture | A. Tavakoli, D. Chu, J. Hellerstein, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 55-60 | April 2007 | Networking | [PDF]
|
| Netalyzr: Illuminating The Edge Network | C. Kreibich, N. Weaver, B. Nechaev, and V. Paxson | Proceedings of the Internet Measurement Conference (IMC 2010), Melbourne, Australia, pp. 246-259 | November 2010 | Networking | [PDF]
|
| Semi-Automated Discovery of Application Session Structure | J. Kannan, J. Jung, V. Paxson, and C. Koksal | Proceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 119-132 | October 2006 | Networking | [PDF]
|
| binpac: A yacc for Writing Application Protocol Parsers | R. Pang, V. Paxson, R. Sommer, and L. Peterson | Proceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 289-300 | October 2006 | Networking | [PDF]
|
| Creating a Scalable Architecture for Internet Measurement | A. Adams, J. Mahdavi, M. Mathis, and V. Paxson | Proceedings of the Internet Summit (INET '98), Geneva, Switzerland | July 1998 | Networking | |
| Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy | G. Friedland, G. Maier, R. Sommer, and N. Weaver | Proceedings of the New Security Paradigms Workshop (NSPW), Marin County, California | September 2011 | Networking | [PDF]
|
| Detecting Backdoors | Y. Zhang and V. Paxson | Proceedings of the Ninth USENIX Security Symposium, August 2000. | August 2000 | Networking | |
| Detecting Stepping Stones | Y. Zhang and V. Paxson | Proceedings of the Ninth USENIX Security Symposium, August 2000. | August 2000 | Networking | |
| Experiences with NIMI | V. Paxson, A. Adams, and M. Mathis | Proceedings of the Passive & Active Measurement (PAM 2000), Hamilton, New Zealand | April 2000 | Networking | [PDF]
|
| On Community-Oriented Internet Measurement | M. Allman, L. Martin, M. Rabinovich, and K. Atchinson | Proceedings of the Passive and Active Measurement Conference (PAM 2008), Cleveland, Ohio, pp. 112-121 | April 2008 | Networking | [PDF]
|
| A Scalable System for Sharing Internet Measurements | M. Allman, E. Blanton, and W. Eddy | Proceedings of the Passive and Active Measurement Workshop, March 2002 | March 2002 | Networking | |
| Tracking the Role of Adversaries in Measuring Unwanted Traffic | M. Allman, P. Barford, B. Krishnamurty, and J. Wang | Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI), San Jose, California, p. 6 | July 2006 | Networking | [PDF]
|
| Load Balancing in Structured P2P Systems | A. Rao, K. Lakshminaryanan, S. Surana, R. M. Karp, and I. Stoica | Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, California | February 2003 | Networking | [PDF]
|
| Semantic-Free Referencing in Linked Distributed Systems | H. Balakrishnan, S. Shenker, and M. Walfish | Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, California | February 2003 | Networking | [PDF]
|
| Designing Extensible IP Router Software | M. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. Radoslavov | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 189-202 | May 2005 | Networking | [PDF]
|
| Geographic Routing Made Practical | Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 217-230 | May 2005 | Networking | [PDF]
|
| Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets | R. Fonseca, S. Ratnasamy, J. Zhao, C. Tien Ee, D. Culler, S. Shenker, and I. Stoica | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 329-342 | May 2005 | Networking | [PDF]
|
| Spamcraft: An Inside Look At Spam Campaign Orchestration | C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’09), Boston, Massachusetts | April 2009 | Networking | [PDF]
|
| Fixing the Embarrassing Slowness of OpenDHT on PlanetLab | S. Rhea, B.-G. Chun, J. Kubiatowicz, and S. Shenker | Proceedings of the Second Workshop on Real, Large Distributed Systems (WORLDS '05), San Francisco, California, pp. 25-30 | December 2005 | Networking | [PDF]
|
| Routing as a Service | K. Lakshminarayanan, I. Stoica, and S. Shenker | Proceedings of the Service Architecture for Heterogeneous Access, Resources, and Applications Retreat (SAHARA 2004), Tahoe City, California | January 2004 | Networking | [PDF]
|
| The Click Modular Router | R. Morris, E. Kohler, J. Jannotti, and M.F. Kaashoek | Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles (SOSP '99) , Kiawah Island, South Carolina, December 1999, pages 217-231. | December 1999 | Networking | |
| Satellite Network Performance Measurements Using Simulated Multi-User Internet Traffic | H. Kruse, M. Allman, J. Griner, S. Ostermann, and E. Helvey | Proceedings of the Seventh International Conference on Telecommunication Systems. March 1999. | March 1999 | Networking | |
| Topology-Informed Internet Replica Placement | P. Radoslavov, R. Govindan, and D. Estrin | Proceedings of the Sixth International Workshop on Web Caching and Content Distribution, Boston University, Boston, Massachusetts, USA, June 20-22, 2001. | June 20 2001 | Networking | |