Publication Search Results

Titlesort ascendingAuthorBibliographicDateGroupLinks
Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite NetworksR. Krishnan, M. Allman, C. Partridge, and J.P.G. SterbenzBBN Technologies Technical Report No. 8333March 2002Networking[PDF]

Experimentation and Modeling of HTTP Over Satellite ChannelsH. Kruse, M. Allman, J. Griner, and D. TranInternational Journal of Satellite Communications, 19(1), January/February 2001.January 2001Networking
Experiences with NIMIV. Paxson, A. Adams, and M. MathisProceedings of Passive & Active Measurement: PAM-2000. 2000Networking
Experiences with NIMIV. Paxson, A. Adams, and M. MathisProceedings of the Passive & Active Measurement (PAM 2000), Hamilton, New ZealandApril 2000Networking[PDF]

Experiences from Netalyzr with Engaging Users in End-System MeasurementC. Kreibich, N. Weaver, G. Maier, B. Nechaev, and V. PaxsonProceedings of ACM SIGCOMM Workshop on Measurements Up the Stack (W-MUST), pp. 25-30, Toronto, Canada.August 2011Networking[PDF]

Evolving Software with an Application-Specific LanguageE. Kohler, M, Poletto, and D.R. MontgomeryWorkshop Record of WCSSS '99: The 2nd ACM SIGPLAN Workshop on Compiler Support for Systems Software, Atlanta, Georgia, May 1999, pages 94-102.May 1999Networking
Ethane: Taking Control of the EnterpriseM. Casado, M. Freedman, J. Pettit, N. McKeown, and S. ShenkerProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 1-12August 2007Networking[PDF]

Estimating Router ICMP Generation DelaysR. Govindan and V. PaxsonProceedings of Passive & Active Measurement: PAM-2002. 2002Networking
Estimating Loss Rates With TCPM. Allman, W. Eddy, and S. OstermannACM Performance Evaluation Review, 31(3)December 2003Networking
Estimating Arrival Rates from the RED Packet Drop HistoryS. Floyd, K. Fall, and K. TieuApril 1998Networking
Equation-Based Congestion Control for Unicast ApplicationsS. Floyd, M. Handley, J. Padhye and J. WidmerProceedings of ACM SIGCOMM 2000. 2000Networking
Enriching Network Security Analysis with Time TravelG. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson, and F. SchneiderProceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 183-194August 2008Networking[PDF]

Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based ContextH. Dreger, C. Kreibich, V. Paxson, and R. SommerProceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005), Vienna, Austria, pp. 206-221July 2005Networking[PDF]

Enhancing TCP Over Satellite Channels Using Standard Mechanisms.M. Allman, D. Glover, and L. SanchezRequest forComments 2488, BCP 28, January 1999.January 1999Networking
Enhancing P2P File-Sharing with an Internet-Scale Query ProcessorB. Thau Loo , J. M. Hellerstein, R. Huebsch, S. Shenker, and I. StoicaProceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004), Toronto, Canada, pp. 432-443August 2004Networking[PDF]

Enhancing Network Intrusion Detection With Integrated Sampling and FilteringJ. Gonzalez and V. PaxsonProceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006), Hamburg, Germany, pp. 272-289September 2006Networking[PDF]

Enhancing Byte-Level Network Intrusion Detection Signatures with ContextR. Sommer and V. PaxsonProceedings of ACM CCS 2003Networking
Enhanced Internet Connectivity for Hybrid Ad Hoc Networks Through Adaptive Gateway DiscoveryP. M. Ruiz and A.F. Gomez SkarmetaProceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), Tampa, FloridaNovember 2004Networking[PDF]

Energy-Efficient Routing on the Virtual SpannerH. Tejeda, E. Chavez, J.A. Sanchez, and P. M. RuizLecture Notes in Computer Science, Vol. 4104, pp. 101–113July 2006Networking
Endpoint Admission Control: Architectural Issues and PerformanceL. Breslau, E.W. Knightly, S. Shenker, I. Stoica, and H. ZhangACM SIGCOMM 2000, pages 57-69, Stockholm, Sweeden, October 2000.October 2000Networking
End-to-End Routing Behavior in the InternetV. PaxsonIEEE/ACM Transactions on Networking, Vol. 5, No. 5, pp. 601-615. An earlier version appeared in the proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '96), August 1996, Stanford, CaliforniaOctober 1997Networking
End-to-End Internet Packet DynamicsV. PaxsonIEEE/ACM Transactions on Networking, Vol.7, No.3, pp. 277-292, June 1999. An earlier version appeared in Proc. ACM SIGCOMM '97, September 1997, Cannes, France.June 1999Networking
End-to-End Internet Packet DynamicsV. PaxsonProceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Cannes, FranceSeptember 1997Networking
End-Host Controlled Multicast RoutingK. Lakshminarayanan, A. Rao, I. Stoica, and S. ShenkerElsevier Computer Networks, Special Issue on Overlay Distribution Structures and their Applications, Vol. 5, Issue 6, pp. 807-825. DOI:10.1016/j.comnet.2005.07.019April 2006Networking[PDF]

Enabling Innovation Below the Communication APIG. Ananthanarayanan, K. Heimerl, M. Zaharia, M. Demmer, T. Koponen, A. Tavakoli, S. Shenker, and I. StoicaUC Berkeley Technical Report, UCB/EECS-2009-141October 2009Networking[PDF]

Enabling an Energy-Efficient Future Internet Through Selectively Connected End SystemsM. Allman, K. Christensen, B. Nordman, and V. PaxsonProceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, GeorgiaNovember 2007Networking[PDF]

Empowering mobile software agentsV. RothIn N. Suri, editor, Proceedings 6th IEEE Mobile Agents Conference, volume 2535 of Lecture Notes in Computer Science, pages 47-63. Springer Verlag, October 2002.October 2002Networking
Empirically-Derived Analytic Models of Wide-Area TCP ConnectionsV. PaxsonIEEE/ACM Transactions on Networking, Vol. 2, No. 4August 1994Networking
Elektronische Wahlen: Verifizierung vs. ZertifizierungM. Volkamer, G. Schryen, L. Langer, A. Schmitt, and J. BuchmannPresented at the 39th Jahrestagung der Gesellschaft für Informatik e.V. (Informatik 2009), Lübeck, GermanySeptember 2009Networking
Efficient Application Placement in a Dynamic Hosting PlatformZ. Al-Qudah, H. Alzoubi, M. Allman, M. Rabinovich, and V. LiberatoreProceedings of the 18th International World Wide Web Conference (WWW 2009), Madrid, Spain, pp. 281-290April 2009Networking[PDF]

Efficient and Robust TCP Stream NormalizationM. Vutukuru, H. Balakrishnan, and V. PaxsonProceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 96-110May 2008Networking[PDF]

Effective Straggler Mitigation: Attack of the ClonesG. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. StoicaTo appear in the Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’13), Lombard, IllinoisApril 2013Networking
Editorial: Architecting for InnovationT. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, B. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, and D. KuptsovACM SIGCOMM Computer Communications Review, Vol. 41, No. 3July 2011Networking[PDF]

Dynamics of TCP Traffic over ATM NetworksS. Floyd and A. RomanowIEEE Journal on Selected Areas in Communication, Vol. 13, No. 4, pp. 633-641May 1995Networking[PDF]

Dynamic Route Recomputation Considered HarmfulM. Caesar, M. Casado, T. Koponen, J. Rexford, and S. ShenkerComputer Communication Review, Vol. 40, Issue 2April 2010Networking[PDF]

Dynamic Behavior of Slowly-Responsive Congestion Control AlgorithmsD. Bansal, H. Balakrishnan, S. Floyd, and S. ShenkerSIGCOMM 2001 2001Networking
Dynamic Application-Layer Protocol Analysis for Network Intrusion DetectionH. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. SommerProceedings of the 15th USENIX Security Symposium (Security '06), Vancouver, CanadaAugust 2006Networking[PDF]

DoS: Fighting Fire with FireM. Walfish, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, MarylandNovember 2005Networking[PDF]

Dominant Resource Fairness: Fair Allocation of Multiple Resources in DatacentersA. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski, S. Shenker, and I. StoicaProceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011), Boston, MassachusettsMarch 2011Networking[PDF]

Does AS Size Determine Degree in AS Topology?H. Tangmunarunkit, J. Doyle, R. Govindan, S. Jamin, S. Shenker, and W. WillingerACM Computer Communication Review, October 2001.October 2001Networking
Diverse Replication for Single-Machine Byzantine-Fault ToleranceB.-C. Chun, P. Maniatis, and S. ShenkerProceedings of the USENIX Annual Technical Conference, Boston, Massachusetts, pp. 287-292June 2008Networking[PDF]

Distributed Segment Tree: Support Range Query and Cover Query over DHTC. Zheng, G. Shen, S. Li, and S. ShenkerProceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, CaliforniaFebruary 2006Networking[PDF]

Distributed Quota Enforcement for Spam ControlM. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. ShenkerProceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 281-296May 2006Networking[PDF]

Distributed Algorithmic Mechanism Design: Recent Results and Future DirectionsJ. Feigenbaum and S. ShenkerProceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM'02), Atlanta, Georgia, pp. 1-13September 2002Networking[PDF]

Distributed Algorithmic Mechanism DesignJ. Feigenbaum, M. Schapira, and S. ShenkerIn Algorithmic Game Theory, N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, eds., pp. 363-384, Cambridge University Press 2007Networking
Dissemination of Mutable Sets of Web ObjectsS. Buchholz, S. Gobel, A. Schill, and T. ZiegertThirteenth IASTED International Conference on Parallel and Distributed Computing Systems, 2001. 2001Networking
Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-EngineeringJ. Caballero, P. Poosankam, C. Kreibich, and D. SongProceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, Illinois, pp. 621-634November 2009Networking[PDF]

Disk-Locality in Datacenter Computing Considered IrrelevantG. Anantharayanan, A. Ghodsi, S. Shenker, and I. StoicaProceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), Napa, CaliforniaMay 2011Networking[PDF]

Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. ResnickW. Willinger and V. PaxsonAnnals of Statistics, Vol. 25, No. 5, pp. 1805-1869 1997Networking
Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large ClustersM. Zaharia, T. Das, H. Li, S. Shenker and I. StoicaIn the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MAJune 2012Networking[PDF]

Pages