Publications

Found 26 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is C and Author is Scott J. Shenker  [Clear All Filters]
Conference Paper
Vasuna, J., Scott C., Buettner M., Piatek M., Krishnamurthy A., & Shenker S. J. (2016).  Caching Doesn't Improve Mobile Web Performance (Much). Proceedings of the 2016 USENIX Annual Technical Conference (USENIC ATC ’16).
Amaro, E., Branner-Augmon C., Luo Z., Ousterhout A., Aguilera M. K., Panda A., et al. (2020).  Can far memory improve job throughput?. EuroSys '20: Proceedings of the Fifteenth European Conference on Computer Systems. 1-16.
Panda, A., Scott C., Ghodsi A., Koponen T., & Shenker S. J. (2013).  CAP for Networks. 91-96.
Ousterhout, K., Panda A., Rosen J., Venkataraman S., Xin R., Ratnasamy S., et al. (2013).  The Case for Tiny Tasks in Compute Clusters. 1-6.
Chawathe, Y., Ramabhadran S., Ratnasamy S., LaMarca A., Shenker S. J., & Hellerstein J. M. (2005).  A Case Study in Building Layered DHT Applications. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 97-108.
Harchol, Y., Mushtaq A., McCauley J., Panda A., & Shenker S. J. (2018).  CESSNA: Resilient Edge-Computing. Proceedings of the 2018 Workshop on Mobile Edge Communications.
Zhang, Y., Breslau L., Paxson V., & Shenker S. J. (2002).  On the Characteristics and Origins of Internet Flow Rates. Proceedings of the ACM SIGCOMM Conference. 309-322.
Ghodsi, A., Zaharia M., Shenker S. J., & Stoica I. (2013).  Choosy: Max-Min Fair Sharing for Datacenter Jobs with Constraints. 365-378.
Martignoni, L., Poosankam P., Zaharia M., Han J., McCamant S., Song D., et al. (2012).  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 165-176.
Demers, A. J., Weiser M., Hayes B., Boehm H-J.., Bobrow D., & Shenker S. J. (1990).  Combining Generational and Conservative Garbage Collection: Framework and Implementations. Proceedings of the 17th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL). 261-269.
Breslau, L., Jamin S., & Shenker S. J. (2000).  Comments on the Performance of Measurement-Based Admission Control Algorithms. Proceedings of the Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2000). 3, 1233-1242.
Jamin, S., Shenker S. J., & Danzig P. B. (1997).  Comparison of Measurement-Based Admission Control Algorithms for Controlled-Load Service. Proceedings of the Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). 3, 973-980.
Harren, M.., Hellerstein J. M., Huebsch R., Loo B. Thau, Shenker S. J., & Stoica I. (2002).  Complex Queries in DHT-based Peer-to-Peer Networks. Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS '02). 2429, 242-250.
Zhang, Y., Duffield N., Paxson V., & Shenker S. J. (2001).  On the Constancy of Internet Path Properties. Proceedings of the 1st ACM SIGCOMM Internet Measurement Workshop (IMW '01). 197-211.
Katz, R. H., Porter G. Manning, Shenker S. J., Stoica I., & Tsai M. (2005).  COPS: Quality of Service Vs. Any Service at All. Proceedings of the 13th International Workshop on Quality of Service 2005 (IWQoS 2005). 3-15.
Stoica, I., Shenker S. J., & Zhang H. (2003).  Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed Networks. Proceedings of the ACM's Special Interest Group on Data Communication (SIGCOMM'98). 118-130.

Pages