| Promoting the Use of End-to-End Congestion Control in the Internet | S. Floyd and K. Fall | IEEE/ACM Transactions on Networking, August 1999. Winner of the Communications Society William R. Bennett Prize Paper Award, 1999. | August 1999 | Networking | |
| Protocol-Independent Adaptive Replay of Application Dialog | W. Cui, V. Paxson, N. Weaver, and R.H. Katz | Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06), San Diego, California | February 2006 | Networking | [PDF]
|
| Providing Packet Obituaries | K. Argyraki, P. Maniatis, D. Cheriton, and Scott Shenker | Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Providing QoS through Machine Learning-Driven Adaptive Multimedia Applications | P. M. Ruiz, J. Botia, and A. Gomez-Skarmeta | IEEE Transactions on Systems, Man, and Cybernetics, Part-B, Vol. 34, No. 3, pp. 1398-1422 | June 2004 | Networking | |
| Proxy Caching Mechanism for Multimedia Playback Streams in the Internet | R. Rejaie, M. Handley, H. Yu, and D. Estrin | Proceedings of the Fourth International Web Caching Workshop, San Diego, California, March 31 - April 2, 1999. | March 1999 | Networking | |
| Prudent Practices for Designing Malware Experiments: Status Quo and Outlook | C. Rossow, C. J. Dietrich, C. Kreibich, C. Grier, V. Paxson, N. Pohlmann, H. Bos, and M. van Steen | Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, California, pp. 65-79 | May 2012 | Networking | [PDF]
|
| QoS and Micromobility Coupling Integrated with UMTS | L.A. Galindo and P. M. Ruiz | Proceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004), Barcelona, Spain | September 2004 | Networking | [PDF]
|
| Quality Adaptation for Congestion Controlled Playback Video Over the Internet | R. Rejaie, M. Handley, and D. Estrin | Proceedings of ACM SIGCOMM '99, Cambridge, September 1999. | September 1999 | Networking | |
| Querying the Internet with PIER | R. Huebsch, J.M. Hellerstein, N. Lanham, B.T. Loo, S. Shenker, and I. Stoica | Proceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003), Berlin, Germany | September 2003 | Networking | [PDF]
|
| Random Early Detection Gateways for Congestion Avoidance | S. Floyd and V. Jacobson | IEEE/ACM Transactions on Networking, Vol. 1, No. 4, pp. 397-413 | August 1993 | Networking | |
| Randomized Rumor Spreading | R. M. Karp, C. Schindelhauer, S. Shenker, and B. Vocking | FOCS 2000, pp. 565-574 | 2000 | Networking | |
| Range Queries Over DHTs | S. Ratnasamy, J. M. Hellerstein, and S. Shenker | Intel Research Technical Report, IRB-TR-03-011 | June 25 2003 | Networking | |
| RAP: An End-to-End Rate-Based Congestion Control Mechanism for Realtime Streams in the Internet | R. Rejaie, M. Handley, and D. Estrin | Proceedings of Infocom 1999. | 1999 | Networking | |
| Recommendations on queue management and congestion avoidance in the internet | B. Braden, D. Clark, J. Crowcroft, B. Davie, S. Deering, D. Estrin, S. Floyd, V. Jacobson, G. Minshall, C. Partridge, L. Peterson, K. Ramakrishnan, S. Shenker, J. Wroclawski, and L. Zhang | Request for Comments (Informational) 2309, Internet Engineering Task Force | April 1998 | Networking | |
| Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAM | A.F. Gomez Skarmeta and P.M. Ruiz | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Redirecting DNS for Ads and Profit | N. Weaver, C. Kreibich, and V. Paxson | Proceedings of the 20th USENIX Security Symposium's Workshop on Free and Open Communications on the Internet (FOCI '11), San Francisco, California | August 2011 | Networking | [PDF]
|
| Reduced State Routing in the Internet | R. Gummadi, N. Kothari, Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Reducing Data-Overhead of Mesh-Based Ad Hoc Multicast Routing Protocols by Steiner Tree Meshes | P. M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), Santa Clara, California | October 2004 | Networking | [PDF]
|
| Reducing Network Energy Consumption via Sleeping and Rate-Adaptation | S. Nedevschi, L. Popa, G. Iannaccone, S. Raynasamy, and D. Wetherall | Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), San Francisco, California, pp. 323-336 | April 2008 | Networking | [PDF]
|
| Reducing Transient Disconnectivity Using Anomaly-Cognizant Forwarding | A. Ermolinskiy and S. Shenker | Proceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 91-96 | October 2008 | Networking | [PDF]
|
| Reflections on Measurement Research: Crooked Lines, Straight Lines, and Moneyshots | V. Paxson | Keynote talk at the ACM Special Interest Group on Data Communications Conference (SIGCOMM 2011), Toronto, Canada | August 2011 | Networking | |
| Reflections on Witty: Analyzing the Attacker | N. Weaver and D. Ellis | ;login: The USENIX Magazine, Vol. 29, No. 3, pp. 34-37 | June 2004 | Networking | [PDF]
|
| Reliable Broadcast in Unknown Fixed-Identity Networks | L. Subramanian, R. Katz, V. Roth, S. Shenker, and I. Stoica | Proceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC 2005), Las Vegas, California, pp. 342-351 | July 2005 | Networking | [PDF]
|
| Reliable Multicast Transport Building Blocks for One-to-Many Bulk-Data Transfer | B Whetton, L. Vicisano, R. Kermode, M. Handley, S. Floyd, and M. Luby | Experimental Request for Comments, October 2000. | October 2000 | Networking | |
| Replay Debugging for Distributed Applications | D. Geels, G. Altekar, S. Shenker, and I. Stoica | Proceedings of the 2006 USENIX Annual Technical Conference (best paper), Boston, Massachusetts, pp. 289-300 | May 2006 | Networking | [PDF]
|
| Replication Strategies in Unstructured Peer-to-Peer Networks | E. Cohen and S. Shenker | Proceedings ACM SIGCOMM 2002. | 2002 | Networking | |
| Report of the NSF Scalable Information Infrastructure Workshop | C. Partridge, et al. | | October 07 1998 | Networking | |
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. Franklin, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2011-82, Berkeley, California | July 2011 | Networking | [PDF]
|
| Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing | M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M.J. Franklin, S. Shenker, and I. Stoica | Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), San Jose, CA | April 2012 | Networking | [PDF]
|
| Resolving Inter-Domain Policy Disputes | C. T. Ee, V. Ramachandran, B.-G. Chun, K. Lakshminarayanan, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 157-168 | August 2007 | Networking | [PDF]
|
| Rethinking Enterprise Network Control | M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. Gude, N. McKeown, and S. Shenker | IEEE/ACM Transactions on Networking, Vol. 17, No. 4, pp. 1270-1283 | August 2009 | Networking | [PDF]
|
| Rethinking Hardware Support for Network Analysis and Intrusion Prevention | V. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, and N. Weaver | Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06), Vancouver, Canada | August 2006 | Networking | [PDF]
|
| Rethinking Packet Forwarding Hardware | D. Moon, M. Casado, T. Koponen, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 1-6 | October 2008 | Networking | [PDF]
|
| Revisiting IP Multicast | S. Ratnasamy, A. Ermolinskiy, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 15-26 | September 2006 | Networking | [PDF]
|
| Revocation Games in Ephemeral Networks | M. Raya, M. H. Manshaei, M. Felegyhazi, and J.-P. Hubaux | Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 199-210 | October 2008 | Networking | [PDF]
|
| RFC 2018: TCP Selective Acknowledgment Options | M. Mathis, J. Mahdavi, S. Floyd, and A. Romanow | RFC 2018, Proposed Standard | April 1996 | Networking | |
| RFC 2914: Congestion Control Principles | S. Floyd | RFC 2914, Best Current Practice | September 2000 | Networking | [PDF]
|
| RFC 3042: Enhancing TCP's Loss Recovery Using Limited Transmit | M. Allman, H. Balakrishnan, and S. Floyd | RFC 3042, Proposed Standard, January 2001 | January 2001 | Networking | |
| RFC 3048: Reliable Multicast Transport Building Blocks for One-to-Many Bulk-Data Transfer | B. Whetten, L. Vicisano, R. Kermode, M. Handley, S. Floyd, and M. Luby | Request for Comments 3048, Informational, January 2001. | January 2001 | Networking | |
| RFC 3168: The Addition of Explicit Congestion Notification (ECN) to IP | K.K. Ramakrishnan, S. Floyd, and D. Black | RFC 3168, Proposed Standard, September 2001. | September 2001 | Networking | |
| RFC 3238: IAB Architectural and Policy Considerations for Open Pluggable Edge Services | S. Floyd and L. Daigle, editors | RFC 3238, Informational, January 2002. Also an excerpt, the ISOC Member Briefing #5 on OPES. | January 2002 | Networking | [PDF]
|
| RFC 3360: Inappropriate TCP Resets Considered Harmful | S. Floyd | Request for Comments 3360, Best Current Practices | August 2002 | Networking | [PDF]
|
| RFC 3390: Increasing TCP's Initial Window | M. Allman, S. Floyd, and C. Partridge | RFC 3390, October 2002. Proposed Standard. Obsoletes RFC 2414 (Experimental). | October 2002 | Networking | [PDF]
|
| RFC 3426: General Architectural and Policy Considerations | S. Floyd, editor | Request for Comments 3426, Informational. | November 2002 | Networking | [PDF]
|
| RFC 3448: TCP Friendly Rate Control (TFRC): Protocol Specification | M. Handley, S. Floyd, J. Pahdye, and J. Widmer | RFC 3448, Proposed Standard | January 2003 | Networking | [PDF]
|
| RFC 3649: HighSpeed TCP for Large Congestion Windows | S. Floyd | Request For Comments 3649, Experimental | December 2003 | Networking | [PDF]
|
| RFC 3708: Using TCP DSACKs and SCTP Duplicate TSNs to Detect Spurious Retransmissions | E. Blanton and M. Allman | Request for Comments 3708, Experimental | February 2004 | Networking | [PDF]
|
| RFC 3714: IAB Concerns Regarding Congestion Control for Voice Traffic in the Internet | S. Floyd and J. Kempf, Editors | Request For Comments 3714, Informational | March 2004 | Networking | [PDF]
|
| RFC 3742: Limited Slow-Start for TCP with Large Congestion Windows | S. Floyd | Request For Comments 3742, Experimental | March 2004 | Networking | [PDF]
|
| RFC 3782: The NewReno Modification to TCP's Fast Recovery Algorithm | S. Floyd, T. Henderson, and A. Gurtov | Request For Comments 3782, Proposed Standard | April 05 2004 | Networking | [PDF]
|