Publications

Found 115 results
Author [ Title(Asc)] Type Year
Filters: First Letter Of Title is N  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
N
Moody, J., & Yarvin N.. (1992).  Networks with Learned Unit Response Functions. 4, 1048-1055.
Raghavan, B., & Ma J. (2011).  Networking in the Long Emergency. 37-42.
Estrin, D., Handley M., Heidemann J., McCanne S., Xu Y.., & Yu H. (2000).  Network Visualization with the Nam, VINT Network Animator.
Tangmunarunkit, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2002).  Network Topology Generators: Degree-Based vs. Structural. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 147-159.
Handley, M., & Crowcroft J. (1997).  Network Text Editor (NTE): A scalable shared text editor for the MBone. Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
Parker, A., Reddy S., Schmid T., Chang K., Saurabh G., Srivastava M., et al. (2006).  Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications. Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 37-42.
Ferrari, D., Banerjea A., & Zhang H. (1992).  Network Support For Multimedia: A Discussion of the Tenet Approach.
Hellerstein, J. M., Paxson V., Peterson L., Roscoe T., Shenker S. J., & Wetherall D. (2005).  The Network Oracle. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. 28(1), 3-10.
Duffield, N., Presti F. Lo, Paxson V., & Towsley D. (2006).  Network Loss Tomography Using Striped Unicast Probes. IEEE/ACM Transactions on Networking. 697-710.
Handley, M., Kreibich C., & Paxson V. (2001).  Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML). Proceedings of USENIX Security Symposium 2001.
Ahmad, S., & Omohundro S. (1990).  A Network for Extracting the Locations of Point Clusters Using Selective Attention.
Shenker, S. J., & Wroclawski J. (1997).  Network Element Service Specification Template.
Fabrikant, A., Luthra A., Maneva E., Papadimitriou C. H., & Shenker S. J. (2003).  On a Network Creation Game. Proceedings of the 22nd Annual Symposium on Principles of Distributed Computing (PODC '03). 347-351.
Breuer, P.. T., A. Lopez M., & A. Ares G. (2000).  The Network Block Device. Linux Journal.
Kruse, H., Allman M., & Mallasch P.. (1998).  Network and User-Perceived Performance of Web Page Retrievals. Proceedings of the First International Conference on Telecommunications and Electronic Commerce (ICTEC).
Chun, B-G., Ratnasamy S., & Kohler E. (2008).  NetComplex: A Complexity Metric for Network System Designs. Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008). 393-406.
Panda, A., Han S., Walls M., Ratnasamy S., & Shenker S. J. (2016).  NetBricks: Taking the V out of NFV. Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16).
Kreibich, C., Weaver N., Nechaev B., & Paxson V. (2010).  Netalyzr: Illuminating The Edge Network. 246-259.
Kreibich, C., Weaver N., Nechaev B., & Paxson V. (2010).  Netalyzr: Illuminating Edge Network Neutrality, Security, and Performance.
Fillmore, C. J. (1977).  The need for a frame semantics in linguistics. 12, 5-29.
Friedrich, T., & Sauerwald T. (2009).  Near-Perfect Load Balancing by Randomized Rounding. 121-130.
Karp, R. M., McKellar A.. C., & Wong C.. K. (1975).  Near-optimal Solutions to a 2-dimensional Placement Problem. SIAM Journal on Computing. 4(3), 271-286.
El-Yaniv, R., & Karp R. M. (1997).  Nearly Optimal Competitive Online Replacement Policies. 22,
Härtig, H. (1994).  Near or Far.
Pan, V. (1992).  The NC Equivalence of Integer Linear Programming and Euclidean GCD.

Pages