Publications

Found 390 results
Author Title [ Type(Asc)] Year
Filters: Author is Scott Shenker  [Clear All Filters]
Conference Paper
Rao, A., Ratnasamy S., Papadimitriou C. H., Shenker S. J., & Stoica I. (2003).  Geographic Routing Without Location Information. Proceedings of the 9th ACM Annual International Conference on Mobile Computing and Networking (MOBICOMM '03). 96-108.
Kim, Y-J., Govindan R., Karp B., & Shenker S. J. (2005).  Geographic Routing Made Practical. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 217-230.
Brown, L., Ananthanarayanan G., Katz-Basset E. B., Krishnamurthy A., Ratnasamy S., Shapira M., et al. (2020).  On the Future of Congestion Control for the Public Internet. HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 30-37.
Casado, M., McKeown N., & Shenker S. J. (2019).  From ethane to SDN and beyond. ACM SIGCOMM Computer Communication Review. 49(5), 92-95.
Stoica, I., & Shenker S. J. (2021).  From cloud computing to sky computing. HotOS '21: Proceedings of the Workshop on Hot Topics in Operating Systems. 26-32.
Kim, S., Fonseca R., Dutta P., Tavakoli A., Culler D. E., Levis P., et al. (2007).  Flush: A Reliable Bulk Transport Protocol for Multihop Wireless Networks. 351-365.
Pan, R., Breslau L., Prabhakar B., & Shenker S. J. (2002).  A Flow Table-Based Design to Approximate Fairness. Proceedings of Hot Interconnects: Tenth Symposium on High Performance Interconnects (Hot-I 2002). 37-43.
Bergemann, D., Eisenbach T.., Feigenbaum J., & Shenker S. J. (2005).  Flexibility as an Instrument in DRM Systems. Proceedings of 2005 Workshop on the Economics of Information Security (WEIS 2005).
Rhea, S., Chun B-G., Kubiatowicz J. D., & Shenker S. J. (2005).  Fixing the Embarrassing Slowness of OpenDHT on PlanetLab. Proceedings of the Second Workshop on Real, Large Distributed Systems (WORLDS '05). 25-30.
Allman, M., Blanton E., Paxson V., & Shenker S. J. (2006).  Fighting Coordinated Attackers with Cross-Organizational Information on Sharing. Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 121-126.
Friedman, E. J., Gkatzelis V., Psomas C-A., & Shenker S. J. (2019).  Fair and Efficient Memory Sharing: Confronting Free Riders. Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence.
Casado, M., Koponen T., Shenker S. J., & Tootoonchian A. (2012).  Fabric: A Retrospective on Evolving SDN. 85-90.
Pfaff, B., Pettit J., Amidon K., Casado M., Koponen T., & Shenker S. J. (2009).  Extending Networking into the Virtualization Layer. 1-6.
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. J. (2007).  Ethane: Taking Control of the Enterprise. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007). 1-12.
Demers, A. J., Greene D., Hauser C., Irish W., Larson J., Shenker S. J., et al. (1987).  Epidemic Algorithms for Replicated Database Maintenance. Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing (PODC '87). 1-12.
Liu, J., Panda A., Singla A., P. Godfrey B., Schapira M., & Shenker S. J. (2013).  Ensuring Connectivity via Data Plane Mechanisms. 113-126.
B. Loo, T., Hellerstein J. M., Huebsch R., Shenker S. J., & Stoica I. (2004).  Enhancing P2P File-Sharing with an Internet-Scale Query Processor. Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004). 432-443.
Breslau, L., Knightly E. W., Shenker S. J., Stoica I., & Zhang H. (2000).  Endpoint Admission Control: Architectural Issues and Performance. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.
McCauley, J., Harchol Y., Panda A., Raghavan B., & Shenker S. J. (2019).   Enabling a permanent revolution in internet architecture. Proceedings of the ACM Special Interest Group on Data Communication SIGCOMM '19.
Shenker, S. J. (1990).  Efficient Network Allocations with Selfish Users. Proceedings of the 14th IFIP WG 7.3 International Symposium on Computer Performance Modelling, Measurement and Evaluation (Performance '90). 279-285.
Ananthanarayanan, G., Ghodsi A., Shenker S. J., & Stoica I. (2013).  Effective Straggler Mitigation: Attack of the Clones. 185-198.
Friedman, E., Racz M. Z., & Shenker S. J. (2015).  Dynamic Budget-Constrained Pricing in the Cloud.
Bansal, D., Balakrishnan H., Floyd S., & Shenker S. J. (2001).  Dynamic Behavior of Slowly-Responsive Congestion Control Algorithms. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '01). 263-274.
Walfish, M., Balakrishnan H., Karger D. R., & Shenker S. J. (2005).  DoS: Fighting Fire with Fire. Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV).
Ghodsi, A., Zaharia M., Hindman B., Konwinski A., Shenker S. J., & Stoica I. (2011).  Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters. 323-336.

Pages