| Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks | R. Krishnan, M. Allman, C. Partridge, and J.P.G. Sterbenz | BBN Technologies Technical Report No. 8333 | March 2002 | Networking | [PDF]
|
| Experimentation and Modeling of HTTP Over Satellite Channels | H. Kruse, M. Allman, J. Griner, and D. Tran | International Journal of Satellite Communications, 19(1), January/February 2001. | January 2001 | Networking | |
| Experiences with NIMI | V. Paxson, A. Adams, and M. Mathis | Proceedings of Passive & Active Measurement: PAM-2000. | 2000 | Networking | |
| Experiences with NIMI | V. Paxson, A. Adams, and M. Mathis | Proceedings of the Passive & Active Measurement (PAM 2000), Hamilton, New Zealand | April 2000 | Networking | [PDF]
|
| Experiences from Netalyzr with Engaging Users in End-System Measurement | C. Kreibich, N. Weaver, G. Maier, B. Nechaev, and V. Paxson | Proceedings of ACM SIGCOMM Workshop on Measurements Up the Stack (W-MUST), pp. 25-30, Toronto, Canada. | August 2011 | Networking | [PDF]
|
| Evolving Software with an Application-Specific Language | E. Kohler, M, Poletto, and D.R. Montgomery | Workshop Record of WCSSS '99: The 2nd ACM SIGPLAN Workshop on Compiler Support for Systems Software, Atlanta, Georgia, May 1999, pages 94-102. | May 1999 | Networking | |
| Ethane: Taking Control of the Enterprise | M. Casado, M. Freedman, J. Pettit, N. McKeown, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007), Kyoto, Japan, pp. 1-12 | August 2007 | Networking | [PDF]
|
| Estimating Router ICMP Generation Delays | R. Govindan and V. Paxson | Proceedings of Passive & Active Measurement: PAM-2002. | 2002 | Networking | |
| Estimating Loss Rates With TCP | M. Allman, W. Eddy, and S. Ostermann | ACM Performance Evaluation Review, 31(3) | December 2003 | Networking | |
| Estimating Arrival Rates from the RED Packet Drop History | S. Floyd, K. Fall, and K. Tieu | | April 1998 | Networking | |
| Equation-Based Congestion Control for Unicast Applications | S. Floyd, M. Handley, J. Padhye and J. Widmer | Proceedings of ACM SIGCOMM 2000. | 2000 | Networking | |
| Enriching Network Security Analysis with Time Travel | G. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson, and F. Schneider | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 183-194 | August 2008 | Networking | [PDF]
|
| Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context | H. Dreger, C. Kreibich, V. Paxson, and R. Sommer | Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005), Vienna, Austria, pp. 206-221 | July 2005 | Networking | [PDF]
|
| Enhancing TCP Over Satellite Channels Using Standard Mechanisms. | M. Allman, D. Glover, and L. Sanchez | Request forComments 2488, BCP 28, January 1999. | January 1999 | Networking | |
| Enhancing P2P File-Sharing with an Internet-Scale Query Processor | B. Thau Loo , J. M. Hellerstein, R. Huebsch, S. Shenker, and I. Stoica | Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004), Toronto, Canada, pp. 432-443 | August 2004 | Networking | [PDF]
|
| Enhancing Network Intrusion Detection With Integrated Sampling and Filtering | J. Gonzalez and V. Paxson | Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006), Hamburg, Germany, pp. 272-289 | September 2006 | Networking | [PDF]
|
| Enhancing Byte-Level Network Intrusion Detection Signatures with Context | R. Sommer and V. Paxson | Proceedings of ACM CCS | 2003 | Networking | |
| Enhanced Internet Connectivity for Hybrid Ad Hoc Networks Through Adaptive Gateway Discovery | P. M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), Tampa, Florida | November 2004 | Networking | [PDF]
|
| Energy-Efficient Routing on the Virtual Spanner | H. Tejeda, E. Chavez, J.A. Sanchez, and P. M. Ruiz | Lecture Notes in Computer Science, Vol. 4104, pp. 101–113 | July 2006 | Networking | |
| Endpoint Admission Control: Architectural Issues and Performance | L. Breslau, E.W. Knightly, S. Shenker, I. Stoica, and H. Zhang | ACM SIGCOMM 2000, pages 57-69, Stockholm, Sweeden, October 2000. | October 2000 | Networking | |
| End-to-End Routing Behavior in the Internet | V. Paxson | IEEE/ACM Transactions on Networking, Vol. 5, No. 5, pp. 601-615. An earlier version appeared in the proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '96), August 1996, Stanford, California | October 1997 | Networking | |
| End-to-End Internet Packet Dynamics | V. Paxson | IEEE/ACM Transactions on Networking, Vol.7, No.3, pp. 277-292, June 1999. An earlier version appeared in Proc. ACM SIGCOMM '97, September 1997, Cannes, France. | June 1999 | Networking | |
| End-to-End Internet Packet Dynamics | V. Paxson | Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97), Cannes, France | September 1997 | Networking | |
| End-Host Controlled Multicast Routing | K. Lakshminarayanan, A. Rao, I. Stoica, and S. Shenker | Elsevier Computer Networks, Special Issue on Overlay Distribution Structures and their Applications, Vol. 5, Issue 6, pp. 807-825. DOI:10.1016/j.comnet.2005.07.019 | April 2006 | Networking | [PDF]
|
| Enabling Innovation Below the Communication API | G. Ananthanarayanan, K. Heimerl, M. Zaharia, M. Demmer, T. Koponen, A. Tavakoli, S. Shenker, and I. Stoica | UC Berkeley Technical Report, UCB/EECS-2009-141 | October 2009 | Networking | [PDF]
|
| Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems | M. Allman, K. Christensen, B. Nordman, and V. Paxson | Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia | November 2007 | Networking | [PDF]
|
| Empowering mobile software agents | V. Roth | In N. Suri, editor, Proceedings 6th IEEE Mobile Agents Conference, volume 2535 of Lecture Notes in Computer Science, pages 47-63. Springer Verlag, October 2002. | October 2002 | Networking | |
| Empirically-Derived Analytic Models of Wide-Area TCP Connections | V. Paxson | IEEE/ACM Transactions on Networking, Vol. 2, No. 4 | August 1994 | Networking | |
| Elektronische Wahlen: Verifizierung vs. Zertifizierung | M. Volkamer, G. Schryen, L. Langer, A. Schmitt, and J. Buchmann | Presented at the 39th Jahrestagung der Gesellschaft für Informatik e.V. (Informatik 2009), Lübeck, Germany | September 2009 | Networking | |
| Efficient Application Placement in a Dynamic Hosting Platform | Z. Al-Qudah, H. Alzoubi, M. Allman, M. Rabinovich, and V. Liberatore | Proceedings of the 18th International World Wide Web Conference (WWW 2009), Madrid, Spain, pp. 281-290 | April 2009 | Networking | [PDF]
|
| Efficient and Robust TCP Stream Normalization | M. Vutukuru, H. Balakrishnan, and V. Paxson | Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 96-110 | May 2008 | Networking | [PDF]
|
| Effective Straggler Mitigation: Attack of the Clones | G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica | To appear in the Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’13), Lombard, Illinois | April 2013 | Networking | |
| Editorial: Architecting for Innovation | T. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, B. Godfrey, N. McKeown, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, and D. Kuptsov | ACM SIGCOMM Computer Communications Review, Vol. 41, No. 3 | July 2011 | Networking | [PDF]
|
| Dynamics of TCP Traffic over ATM Networks | S. Floyd and A. Romanow | IEEE Journal on Selected Areas in Communication, Vol. 13, No. 4, pp. 633-641 | May 1995 | Networking | [PDF]
|
| Dynamic Route Recomputation Considered Harmful | M. Caesar, M. Casado, T. Koponen, J. Rexford, and S. Shenker | Computer Communication Review, Vol. 40, Issue 2 | April 2010 | Networking | [PDF]
|
| Dynamic Behavior of Slowly-Responsive Congestion Control Algorithms | D. Bansal, H. Balakrishnan, S. Floyd, and S. Shenker | SIGCOMM 2001 | 2001 | Networking | |
| Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection | H. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. Sommer | Proceedings of the 15th USENIX Security Symposium (Security '06), Vancouver, Canada | August 2006 | Networking | [PDF]
|
| DoS: Fighting Fire with Fire | M. Walfish, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), College Park, Maryland | November 2005 | Networking | [PDF]
|
| Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters | A. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski, S. Shenker, and I. Stoica | Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2011), Boston, Massachusetts | March 2011 | Networking | [PDF]
|
| Does AS Size Determine Degree in AS Topology? | H. Tangmunarunkit, J. Doyle, R. Govindan, S. Jamin, S. Shenker, and W. Willinger | ACM Computer Communication Review, October 2001. | October 2001 | Networking | |
| Diverse Replication for Single-Machine Byzantine-Fault Tolerance | B.-C. Chun, P. Maniatis, and S. Shenker | Proceedings of the USENIX Annual Technical Conference, Boston, Massachusetts, pp. 287-292 | June 2008 | Networking | [PDF]
|
| Distributed Segment Tree: Support Range Query and Cover Query over DHT | C. Zheng, G. Shen, S. Li, and S. Shenker | Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, California | February 2006 | Networking | [PDF]
|
| Distributed Quota Enforcement for Spam Control | M. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 281-296 | May 2006 | Networking | [PDF]
|
| Distributed Algorithmic Mechanism Design: Recent Results and Future Directions | J. Feigenbaum and S. Shenker | Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM'02), Atlanta, Georgia, pp. 1-13 | September 2002 | Networking | [PDF]
|
| Distributed Algorithmic Mechanism Design | J. Feigenbaum, M. Schapira, and S. Shenker | In Algorithmic Game Theory, N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, eds., pp. 363-384, Cambridge University Press | 2007 | Networking | |
| Dissemination of Mutable Sets of Web Objects | S. Buchholz, S. Gobel, A. Schill, and T. Ziegert | Thirteenth IASTED International Conference on Parallel and Distributed Computing Systems, 2001. | 2001 | Networking | |
| Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-Engineering | J. Caballero, P. Poosankam, C. Kreibich, and D. Song | Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, Illinois, pp. 621-634 | November 2009 | Networking | [PDF]
|
| Disk-Locality in Datacenter Computing Considered Irrelevant | G. Anantharayanan, A. Ghodsi, S. Shenker, and I. Stoica | Proceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), Napa, California | May 2011 | Networking | [PDF]
|
| Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. Resnick | W. Willinger and V. Paxson | Annals of Statistics, Vol. 25, No. 5, pp. 1805-1869 | 1997 | Networking | |
| Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters | M. Zaharia, T. Das, H. Li, S. Shenker and I. Stoica | In the Proceedings of the 4th USENIX Conference on Hot Topics in Cloud Computing (HotCloud ’12), Boston, MA | June 2012 | Networking | [PDF]
|