Publications

Found 17 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is E and Author is Scott Shenker  [Clear All Filters]
Conference Paper
Ananthanarayanan, G., Ghodsi A., Shenker S. J., & Stoica I. (2013).  Effective Straggler Mitigation: Attack of the Clones. 185-198.
Shenker, S. J. (1990).  Efficient Network Allocations with Selfish Users. Proceedings of the 14th IFIP WG 7.3 International Symposium on Computer Performance Modelling, Measurement and Evaluation (Performance '90). 279-285.
McCauley, J., Harchol Y., Panda A., Raghavan B., & Shenker S. J. (2019).   Enabling a permanent revolution in internet architecture. Proceedings of the ACM Special Interest Group on Data Communication SIGCOMM '19.
Breslau, L., Knightly E. W., Shenker S. J., Stoica I., & Zhang H. (2000).  Endpoint Admission Control: Architectural Issues and Performance. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.
B. Loo, T., Hellerstein J. M., Huebsch R., Shenker S. J., & Stoica I. (2004).  Enhancing P2P File-Sharing with an Internet-Scale Query Processor. Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004). 432-443.
Liu, J., Panda A., Singla A., P. Godfrey B., Schapira M., & Shenker S. J. (2013).  Ensuring Connectivity via Data Plane Mechanisms. 113-126.
Demers, A. J., Greene D., Hauser C., Irish W., Larson J., Shenker S. J., et al. (1987).  Epidemic Algorithms for Replicated Database Maintenance. Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing (PODC '87). 1-12.
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. J. (2007).  Ethane: Taking Control of the Enterprise. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007). 1-12.
Pfaff, B., Pettit J., Amidon K., Casado M., Koponen T., & Shenker S. J. (2009).  Extending Networking into the Virtualization Layer. 1-6.
Journal Article
Koponen, T., Shenker S. J., Balakrishnan H., Feamster N., Ganichev I., Ghodsi A., et al. (2011).  Editorial: Architecting for Innovation. ACM SIGCOMM Computer Communication Review. 41(3), 24-36.
Levis, P., Brewer E., Culler D. E., Gay D., Madden S., Patel N., et al. (2008).  The Emergence of a Networking Primitive in Wireless Sensor Networks. Communications of the ACM. 51(7), 99-106.
Lakshminarayanan, K., Rao A., Stoica I., & Shenker S. J. (2006).  End-Host Controlled Multicast Routing. Elsevier Computer Networks. 5(6), 807-825.
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. J. (2007).  Ethane: Taking Control of the Enterprise. ACM SIGCOMM Computer Communication Review. 37(4), 1-12.
Friedman, E., Shor M.., Shenker S. J., & Sopher B.. (2004).  An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being Slow. Games and Economic Behavior. 47(2), 325-352.