Publication Search Results

TitleAuthorsort ascendingBibliographicDateGroupLinks
An Inquiry into the Nature and Causes of the Wealth of Internet MiscreantsJ. Franklin, V. Paxson, A. Perrig, and S. SavageProceedings of ACM Computer and Communication Security Conference (ACM CCS), Alexandria, Virginia, pp. 375-388October 2007Networking[PDF]

Incentive-Compatible Interdomain RoutingJ. Feigenbaum, V. Ramachandran, and M. SchapiraProceedings of the 7th ACM Conference on Electronic Commerce (EC'06), Ann Arbor, Michigan, pp. 130-139June 2006Networking[PDF]

Mechanism Design for Policy RoutingJ. Feigenbaum, R. Sami, and S. ShenkerYale University Technical Report YALEU/DCS/TR-1258November 2003Networking
Mechanism Design for Policy RoutingJ. Feigenbaum, R. Sami, and S. ShenkerDistributed Computing, Vol. 18, Issue. 4, pp. 150-164March 2006Networking[PDF]

Agents' Privacy In Distributed Algorithmic Mechanisms (Position Paper)J. Feigenbaum, N. Nisan, V. Ramachandran, R. Sami, and S. ShenkerFirst Workshop on Economics and Information Security, Berkeley, CaliforniaMay 2002Networking
Distributed Algorithmic Mechanism DesignJ. Feigenbaum, M. Schapira, and S. ShenkerIn Algorithmic Game Theory, N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, eds., pp. 363-384, Cambridge University Press 2007Networking
A BGP-Based Mechanism for Lowest-Cost RoutingJ. Feigenbaum, C.H. Papadimitriou, R. Sami, and S. ShenkerProceedings of the 21st ACM Symposium on Principles of Distributed Computing (PODC 2002), Monterey, California, pp. 173-182.July 2002Networking[PDF]

Sharing the Cost of Multicast TransmissionsJ. Feigenbaum, C. Papadimitriou, and S. ShenkerJournal of Computer and System Sciences, Vol. 63, Issue 1, pp. 21-41, 2001August 2001Networking[PDF]

Sharing the Cost of Multicast TransmissionsJ. Feigenbaum, C. Papadimitriou, and S. ShenkerThirty-Second Annual ACM Symposium on Theory of Computing (STOC00), May 2000.May 2000Networking
Sharing the Cost of Multicast TransmissionsJ. Feigenbaum, C. Papadimitriou, and S. ShenkerProceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC 2000), Portland, Oregon, pp. 218-227May 2000Networking
Hardness Results for Multicast Cost SharingJ. Feigenbaum, A. Krishnamurthy, R. Sami, and S. ShenkerProceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2002), Kanpur, India, pp. 133-144December 2002Networking
Approximation and Collusion in Multicast Cost SharingJ. Feigenbaum, A. Krishnamurthy, R. Sami, and S. ShenkerProceedings of the Third ACM Conference on Electronic Commerce (ACM-EE 2001), Tampa, Florida, pp. 253-255October 2001Networking
Hardness Results for Multicast Cost SharingJ. Feigenbaum, A. Krishnamurthy, R. Sami, and S. ShenkerTheoretical Computer Science, Vol. 304, Issues 1-3, pp. 215-236July 2003Networking
Approximation and Collusion in Multicast Cost SharingJ. Feigenbaum, A. Archer, A. Krishnamurthy, R. Sami, and S. ShenkerGames and Economic Behavior, Vol. 47, Issue 1, pp. 36-71April 2004Networking[PDF]

Incentives and Internet ComputationJ. Feigenbaum and S. ShenkerDistributed Computing Column #9, SIGACT News, Vol. 33, Issue 4, pp. 37-54 2002Networking
Distributed Algorithmic Mechanism Design: Recent Results and Future DirectionsJ. Feigenbaum and S. ShenkerProceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM'02), Atlanta, Georgia, pp. 1-13September 2002Networking[PDF]

Global Synchronization in SensornetsJ. Elson, R. M. Karp, C.H. Papadimitriou and S. ShenkerProceedings of LATIN, pp. 609-624January 05 2004Networking
Internetworking MultimediaJ. Crowcroft, M. Handley, and I. WakemanMorgan Kaufmann, ISBN 1-55860-584-3, 1999. 1999Networking
Measuring Pay-per-Install: The Commoditization of Malware DistributionJ. Cabellero, C. Grier, C. Kreibich, and V. PaxsonProceedings of the 20th USENIX Security Symposium (Security '11), San Francisco, CaliforniaAugust 2011Networking[PDF]

Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-EngineeringJ. Caballero, P. Poosankam, C. Kreibich, and D. SongProceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, Illinois, pp. 621-634November 2009Networking[PDF]

Mechanism Design for Policy RoutingJ. Feigenbaum, R. Sami, and S. ShenkerProceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), St. John's, Canada, pp. 11-20July 2004Networking[PDF]

Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed NetworksI. Stoica, S. Shenker, and H. ZhangIEEE/ACM Transactions on Networking, Vol. 11, Issue 1, pp. 33-46. (A previous version appeared in the proceedings of the ACM's Special Interest Group on Data Communication (SIGCOMM'98), Vancouver, Canada, August 1998, pp. 118-130.)February 2003Networking[PDF]

Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed NetworksI. Stoica, S. Shenker, and H. ZhangACM Computer Communication Review, Vol. 28, pp. 118-130September 1998Networking
Self-Verifying CSFQI. Stoica, H. Zhang, and S. ShenkerINFOCOM, 2002. 2002Networking
Internet Indirection InfrastructureI. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. SuranaProceedings of the annual conference of the ACM Special Interest Group on Data Communication (ACM SIGCOMM 2002), Pittsburgh, Pennsylvania, pp. 73-86August 2002Networking[PDF]

Internet Indirection InfrastructureI. Stoica, D. Adkins, S. Zhaung, S. Shenker, and S. SuranaIEEE/ACM Transactions on Networking, Vol. 12, Issue 2, pp. 205-218April 2004Networking[PDF]

Routing Algorithms in DHTs: Some Open QuestionsI. Stoica, D. Adkins, S. Ratnasamy, S. Surana, S. Shenker, and S. ZhuangProceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS) 2002, March 2002.March 2002Networking
Internet Indirection InfrastructureI. Stoica, D. Adkins, S. Ratnasamy, S. Shenker, S. Surana, and S. ZhuangThe First International Workshop on Peer-to-Peer Systems (IPTPS): 191-202, 2002. 2002Networking
Towards Engineering a Location-Aware Wireless Multi-Agent SystemI. Nieto-Cavajal, P. M. Ruiz, J.A. Botia, and A.F. Gomez-SkarmetaProceedings of the Workshop on Applications of Software Agents in Engineering at the 16th European Conference on Artificial Intelligence (ECAI 2004), Valencia, SpainAugust 2004Networking
Implementation and Evaluation of a Location-Aware Wireless Multi-Agent SystemI. Nieto-Carvajal, J.A. Botia, P. M. Ruiz, and A. Gomez-SkarmetaLecture Notes in Computer Science, Vol. 3207, pp. 528-537August 2004Networking[PDF]

YAMR: Yet Another Multipath Routing ProtocolI. Ganichev, B. Dai, B. Godfrey, and S. ShenkerACM SIGCOMM Computer Communication Review, Vol. 40, Issue 5October 2010Networking[PDF]

A Scalable Web Cache Consistency ArchitectureH. Yu, L. Breslau, and S. ShenkerProceedings of ACM SIGCOMM'99, Cambridge, September 1999.September 1999Networking
A Virtual Spanner for Efficient Face Routing in Multihop Wireless NetworksH. Tejeda, E. Chavez, J.A. Sanchez, and P. M. RuizLecture Notes in Computer Science, Vol. 4217, pp. 459–470September 2006Networking
Energy-Efficient Routing on the Virtual SpannerH. Tejeda, E. Chavez, J.A. Sanchez, and P. M. RuizLecture Notes in Computer Science, Vol. 4104, pp. 101–113July 2006Networking
The Impact of Routing Policy on Internet PathsH. Tangmunarunkit, R. Govindan, S. Shenker, and D. EstrinINFOCOM 2001: 736-742. 2001Networking
Network Topology Generators: Degree-Based vs. StructuralH. Tangmunarunkit, R. Govindan, S. Jamin, S. Shenker, and W. WillingerProceedings ACM SIGCOMM 2002. 2002Networking
Internet Pat Inflation Due to Policy RoutingH. Tangmunarunkit, R. Govindan, and S. ShenkerProceedings of SPIE ITCom 2001, Denver, CO. 19-24. August 2001.August 2001Networking
Internet Topology: Discovery and Policy Impact, Parts I and IIH. Tangmunarunkit, R. Govindan, and S. ShenkerIn The Internet as a Large-Scale Complex System, K. Park and W. Willinger, eds., pp. 121-160, Oxford University Press 2005Networking[PDF]

Does AS Size Determine Degree in AS Topology?H. Tangmunarunkit, J. Doyle, R. Govindan, S. Jamin, S. Shenker, and W. WillingerACM Computer Communication Review, October 2001.October 2001Networking
Gatekeeper: Supporting Bandwidth Guarantees for Multi-Tenant Datacenter NetworksH. Rodrigues, J.R. Santos, Y. Turner, P. Soares, and D. GuedesProceedings of the Third Workshop on I/O Virtualization (WIOV '11), Portland, OregonJune 2011Networking[PDF]

On the Effects of Registrar-Level InterventionH. Liu, K. Levchenko, M. Felegyhazi, C. Kreibich, G. Maier, G. M. Voelker, and Stefan SavageProceedings of the Fourth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11), Boston, MassachusettsMarch 2011Networking[PDF]

On the Performance of TCP-Based Data Transfers on a Faded Ka-Band Satellite LinkH. Kruse, S. Ostermann, and M. AllmanProceedings of the Sixth Ka-Band Utilization Conference, June 2000.June 2000Networking
Satellite Network Performance Measurements Using Simulated Multi-User Internet TrafficH. Kruse, M. Allman, J. Griner, S. Ostermann, and E. HelveyProceedings of the Seventh International Conference on Telecommunication Systems. March 1999.March 1999Networking
Experimentation and Modeling of HTTP Over Satellite ChannelsH. Kruse, M. Allman, J. Griner, and D. TranInternational Journal of Satellite Communications, 19(1), January/February 2001.January 2001Networking
HTTP Page Transfer Rates Over Geo-Stationary Satellite LinksH. Kruse, M. Allman, J. Griner, and D. TranProceedings of the 6th International Conference on Telecommunication Systems, Nashville, TennesseeMarch 1998Networking
Network and User-Perceived Performance of Web Page RetrievalsH. Kruse, M. Allman, and P. MallaschProceedings of the First International Conference on Telecommunications and Electronic Commerce (ICTEC)November 1998Networking
Hold-On: Protecting Against On-Path DNS PoisoningH. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. PaxsonProceedings of the Conference on Securing and Trusting Internet Names (SATIN 2012), Teddington, United KingdomMarch 2012Networking[PDF]

Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based ContextH. Dreger, C. Kreibich, V. Paxson, and R. SommerProceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005), Vienna, Austria, pp. 206-221July 2005Networking[PDF]

Operational Experiences with High-Volume Network Intrusion DetectionH. Dreger, A. Feldmann, V. Paxson, and R. SommerProceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004), Washington, D.C., Vol. 11, p. 2October 2004Networking[PDF]

Predicting the Resource Consumption of Network Intrusion Detection SystemsH. Dreger, A. Feldmann, V. Paxson, and R. SommerProceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2008), Cambridge, Massachusetts, pp. 135-154September 2008Networking[PDF]

Pages