| Flush: A Reliable Bulk Transport Protocol for Multihop Wireless Network | S. Kim, R. Fonseca, P.K. Dutta, A. Tavakoli, D.E. Culler, P. Levis, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2006-169, Berkeley, California | December 12 2006 | Networking | |
| Distributed Algorithmic Mechanism Design | J. Feigenbaum, M. Schapira, and S. Shenker | In Algorithmic Game Theory, N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, eds., pp. 363-384, Cambridge University Press | 2007 | Networking | |
| Very Fast Containment of Scanning Worms, Revisited | N. Weaver, S. Staniford, and V. Paxson | In Malware Detection: Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, eds., pp. 113-145, Springer | 2007 | Networking | |
| RFC 4782 Quick-Start for TCP and IP | S. Floyd, M. Allman, A. Jain, and P. Sarolahti | Request For Comments 4782 | January 2007 | Networking | [PDF]
|
| The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention | N. Weaver, V. Paxson, and J.M. Gonzalez | Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007), Monterey, California, pp. 199-206 | February 2007 | Networking | [PDF]
|
| Congestion Control Without a Startup Phase | D. Liu, M. Allman, S. Jin, and L. Wang | Proceedings of the Fifth International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet 2007), Los Angeles, California | February 2007 | Networking | [PDF]
|
| X-Trace: A Pervasive Network Tracing Framework | R. Fonseca, G. Porter, R.H. Katz, S. Shenker, and I. Stoica | Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Cambridge, Massachusetts, pp. 271-284 | April 2007 | Networking | [PDF]
|
| RFC 4828: TCP Friendly Rate Control (TFRC): the Small-Packet (SP) Variant | S. Floyd and E. Kohler | RFC 4828, Experimental | April 2007 | Networking | [PDF]
|
| A Declarative Sensornet Architecture | A. Tavakoli, D. Chu, J. Hellerstein, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 55-60 | April 2007 | Networking | [PDF]
|
| A Modular Sensornet Architecture: Past, Present, and Future Directions | A. Tavakoli, P. Dutta, J. Jeong, S. Kim, J. Ortiz, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 49-54 | April 2007 | Networking | [PDF]
|
| An Architecture for Energy Management in Wireless Sensor Networks | X. Jiang, J. Taneja, J. Ortiz, A. Tavakoli, P. Dutta, J. Jeong, D. Culler, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 31-36 | April 2007 | Networking | [PDF]
|
| Determining an Appropriate Sending Rate Over an Underutilized Network Path | P. Sarolahti, M. Allman, and S. Floyd | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 51, Issue 7, pp. 1815-1832. DOI:10.1016/j.comnet.2006.11.006 | May 2007 | Networking | [PDF]
|
| An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention | V. Paxson, R. Sommer, and N. Weaver | Proceedings of IEEE Sarnoff Symposium, Princeton, New Jersey, pp. 1-7 | May 2007 | Networking | [PDF]
|
| On the Adaptive Real-Time Detection of Fast-Propagating Network Worms | J. Jung, R. Milito, and V. Paxson | Proceedings of the Fourth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2007), Lucerne, Switzerland, pp. 175-192. Also Journal on Computer Virology, Vol. 4, No. 1, pp. 197-210, February 2008 | July 2007 | Networking | [PDF]
|
| Resolving Inter-Domain Policy Disputes | C. T. Ee, V. Ramachandran, B.-G. Chun, K. Lakshminarayanan, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 157-168 | August 2007 | Networking | [PDF]
|
| Specifying New Congestion Control Algorithms | S. Floyd and M. Allman | Request For Comments 5033, Best Current Practice 133 | August 2007 | Networking | [PDF]
|
| Hidden-Action in Network Routing | M. Feldman, J. Chuang, I. Stoica, and S. Shenker | IEEE Journal on Selected Areas in Communications, Vol. 25, Issue 6, pp. 1161-1172 | August 2007 | Networking | [PDF]
|
| Ethane: Taking Control of the Enterprise | M. Casado, M. Freedman, J. Pettit, N. McKeown, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 1-12 | August 2007 | Networking | [PDF]
|
| Achieving Convergence-Free Routing Using Failure-Carrying Packets | K. Lakshminarayanan, M. Caesar, M. Rangan, T. Anderson, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 241 - 252 | August 2007 | Networking | [PDF]
|
| The Strengths of Weaker Identities: Opportunistic Personas | M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver | Proceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, Massachusetts | August 2007 | Networking | [PDF]
|
| Stress Testing Cluster Bro | N. Weaver and R. Sommer | Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007), Boston, Massachusetts | August 2007 | Networking | [PDF]
|
| The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware | M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney | Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007), Queensland, Australia | September 2007 | Networking | [PDF]
|
| A Data-oriented (and Beyond) Network Architecture | T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. Stoica | Computer Communication Review, Vol. 37, Issue 4, ACM, pp. 181-192 | October 2007 | Networking | [PDF]
|
| Loss and Delay Accountability for the Internet | K. Argyraki, P. Maniatis, O. Irzak, A. Subramanian, and S. Shenker | Proceedings of the 15th IEEE International Conference on Network Protocols (ICNP 2007), Beijing, China, pp. 194-205 | October 2007 | Networking | [PDF]
|
| Attested Append-Only Memory: Making Adversaries Stick to their Word | B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz | Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007), Stevenson, Washington, pp. 189-204 | October 2007 | Networking | [PDF]
|
| Issues and Etiquette Concerning Use of Shared Measurement Data | M. Allman and V. Paxson | Proceedings of ACM SIGCOMM Conference on Internet Measurement (IMC 2007), San Diego, California, pp. 135-140 | October 2007 | Networking | [PDF]
|
| A Brief History of Scanning | M. Allman, V. Paxson, and J. Terrell | Proceedings of ACM SIGCOMM Conference on Internet Measurement, San Diego, California, pp. 77-82 | October 2007 | Networking | [PDF]
|
| Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention | J. Gonzalez, V. Paxson, and N. Weaver | Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008), Alexandria, Virginia, pp. 139-149 | October 2007 | Networking | [PDF]
|
| An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | J. Franklin, V. Paxson, A. Perrig, and S. Savage | Proceedings of ACM Computer and Communication Security Conference (ACM CCS), Alexandria, Virginia, pp. 375-388 | October 2007 | Networking | [PDF]
|
| Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems | M. Allman, K. Christensen, B. Nordman, and V. Paxson | Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| Personal Namespaces | M. Allman | Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| Holding the Internet Accountable | D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker | Proceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| RFC 5166: Metrics for the Evaluation of Congestion Control Mechanisms | S. Floyd | RFC 5166, Information, March 2008 | March 2008 | Networking | [PDF]
|
| Towards a Common TCP Evaluation Suite | L. Andrew, C. Marcondes, S. Floyd, L. Dunn, R. Guillier, W. Gang, L. Eggert, S. Ha, and I. Rhee | Proceedings of the International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet), Manchester, United Kingdom | March 2008 | Networking | [PDF]
|
| NetComplex: A Complexity Metric for Network System Designs | B.-G. Chun, S. Ratnasamy, and E. Kohler | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 393-406 | April 2008 | Networking | |
| A Reactive Measurement Framework | M. Allman and V. Paxson | Proceedings of the 9th International Conference on Passive and Active Network Measurement (PAM 2008), Cleveland, Ohio, pp. 92-101 | April 2008 | Networking | [PDF]
|
| On Community-Oriented Internet Measurement | M. Allman, L. Martin, M. Rabinovich, and K. Atchinson | Proceedings of the Passive and Active Measurement Conference (PAM 2008), Cleveland, Ohio, pp. 112-121 | April 2008 | Networking | [PDF]
|
| What Ought a Program Committee to Do? | M. Allman | Proceedings of USENIX Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems (WOWCS), San Francisco, California | April 2008 | Networking | [PDF]
|
| Thoughts on Reviewing | M. Allman | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50 | April 2008 | Networking | [PDF]
|
| On the Spam Campaign Trail | C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage | Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, California | April 2008 | Networking | [PDF]
|
| OpenFlow: Enabling Innovation in Campus Networks | N. McKeown, T. Andershnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turneron, and H. Balakris | ACM Computer Communication Review, Vol. 38, Issue 2, pp. 69-74 | April 2008 | Networking | [PDF]
|
| Detecting In-Flight Page Changes with Web Tripwires | C. Reis, S. Gribble, T. Kohno, and N. Weaver | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008), San Francisco, California, pp. 31-44 | April 2008 | Networking | [PDF]
|
| Reducing Network Energy Consumption via Sleeping and Rate-Adaptation | S. Nedevschi, L. Popa, G. Iannaccone, S. Raynasamy, and D. Wetherall | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, California, pp. 323-336 | April 2008 | Networking | [PDF]
|
| Beyond Pilots: Keeping Rural Wireless Networks Alive | S. Surana, R. Patra, S. Nedevschi, M. Ramos, L. Subramanian, Y. Ben-David, and E. Brewer | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, California | April 2008 | Networking | [PDF]
|
| Efficient and Robust TCP Stream Normalization | M. Vutukuru, H. Balakrishnan, and V. Paxson | Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 96-110 | May 2008 | Networking | [PDF]
|
| Diverse Replication for Single-Machine Byzantine-Fault Tolerance | B.-C. Chun, P. Maniatis, and S. Shenker | Proceedings of the USENIX Annual Technical Conference, Boston, Massachusetts, pp. 287-292 | June 2008 | Networking | [PDF]
|
| RFC 5290: Comments on the Usefulness of Simple Best-Effort Traffic | S. Floyd and M. Allman | Request for Comments 5290, Informational | July 2008 | Networking | [PDF]
|
| IMRG Workshop on Application Classification and Identification Report | T. Strayer, M. Allman, G. Armitage, S. Bellovin, S. Jin and A. W. Moore | ACM Computer Communication Review (editorial contribution), Vol. 38, Issue 3, pp. 87-90 | July 2008 | Networking | |
| Principles for Developing Comprehensive Network Visibility | M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver | Proceedings of the Third USENIX Workshop on Hot Topics in Security (HotSec ’08), San Jose, California | July 2008 | Networking | [PDF]
|
| A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems | L. Juan, C. Kreibich, C.-H. Lin, and V. Paxson | Proceedings of the Fifth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2008), Paris, France, pp. 267-278 | July 2008 | Networking | [PDF]
|