Publications

Found 388 results
Author Title [ Type(Asc)] Year
Filters: Author is Scott Shenker  [Clear All Filters]
Conference Paper
Martignoni, L., Poosankam P., Zaharia M., Han J., McCamant S., Song D., et al. (2012).  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 165-176.
Ghodsi, A., Zaharia M., Shenker S. J., & Stoica I. (2013).  Choosy: Max-Min Fair Sharing for Datacenter Jobs with Constraints. 365-378.
Zhang, Y., Breslau L., Paxson V., & Shenker S. J. (2002).  On the Characteristics and Origins of Internet Flow Rates. Proceedings of the ACM SIGCOMM Conference. 309-322.
Harchol, Y., Mushtaq A., McCauley J., Panda A., & Shenker S. J. (2018).  CESSNA: Resilient Edge-Computing. Proceedings of the 2018 Workshop on Mobile Edge Communications.
Chawathe, Y., Ramabhadran S., Ratnasamy S., LaMarca A., Shenker S. J., & Hellerstein J. M. (2005).  A Case Study in Building Layered DHT Applications. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 97-108.
Ousterhout, K., Panda A., Rosen J., Venkataraman S., Xin R., Ratnasamy S., et al. (2013).  The Case for Tiny Tasks in Compute Clusters. 1-6.
Panda, A., Scott C., Ghodsi A., Koponen T., & Shenker S. J. (2013).  CAP for Networks. 91-96.
Amaro, E., Branner-Augmon C., Luo Z., Ousterhout A., Aguilera M. K., Panda A., et al. (2020).  Can far memory improve job throughput?. EuroSys '20: Proceedings of the Fifteenth European Conference on Computer Systems. 1-16.
Vasuna, J., Scott C., Buettner M., Piatek M., Krishnamurthy A., & Shenker S. J. (2016).  Caching Doesn't Improve Mobile Web Performance (Much). Proceedings of the 2016 USENIX Annual Technical Conference (USENIC ATC ’16).
Whitlock, S., Scott C., & Shenker S. J. (2013).  Brief Announcement: Techniques for Programmatically Troubleshooting Distributed Systems. 1-3.
Ramabhadran, S., Ratnasamy S., Hellerstein J. M., & Shenker S. J. (2004).  Brief Announcement: Prefix Hash Tree. Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004). 367.
Feigenbaum, J., P. Godfrey B., Panda A., Schapira M., Shenker S. J., & Singla A. (2012).  Brief Announcement: On the Resilience of Routing Tables. 237-238.
Iyer, A. Padmanabha, Panda A., Venkataraman S., Chowdhury M., Akella A., Shenker S. J., et al. (2018).  Bridging the GAP: towards approximate graph analytics. Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA).
Feigenbaum, J., Papadimitriou C. H., Sami R., & Shenker S. J. (2002).  A BGP-Based Mechanism for Lowest-Cost Routing. Proceedings of the 21st ACM Symposium on Principles of Distributed Computing (PODC 2002). 173-182.
Narayan, A., Panda A., Alizadeh M., Balakrishnan H., Krishnamurthy A., & Shenker S. J. (2020).  Bertha: Tunneling through the Network API. HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 53-59.
Fonseca, R., Ratnasamy S., Zhao J., Ee C. Tien, Culler D. E., Shenker S. J., et al. (2005).  Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 329-342.
Chun, B-G., Maniatis P., Shenker S. J., & Kubiatowicz J. D. (2007).  Attested Append-Only Memory: Making Adversaries Stick to their Word. 189-204.
Greenberg, A.., Shenker S. J., & Stolyar A.. (1996).  Asynchronous Updates in Large Parallel Systems. Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. 91-103.
Dutta, P., Culler D. E., & Shenker S. J. (2008).  Asynchronous Neighbor Discovery: Finding Needles of Connectivity in Haystacks of Time. 531-532.
Mitzel, D. J., & Shenker S. J. (1994).  Asymptotic Resource Consumption in Multicast Reservation Styles. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94). 226-233.
Raman, S., McCanne S., & Shenker S. J. (1998).  Asymptotic Behavior of Global Recovery in SRM. Proceedings of the 1998 ACM SIGMETRICS Joint International Conference on Measurement and Modeling of Computer Systems. 90-99.
Shenker, S. J., & Weinrib A. (1988).  Asymptotic Analysis of Large Heterogeneous Queuing Systems. Proceedings of the 1988 ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '88). 56-62.
Huebsch, R., Chun B., Hellerstein J. M., Loo B. Thau, Maniatis P., Roscoe T., et al. (2005).  The Architecture of PIER: An Internet-Scale Query Processor. Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005). 28-43.
Jiang, X., Taneja J., Ortiz J., Tavakoli A., Dutta P., Jeong J., et al. (2007).  An Architecture for Energy Management in Wireless Sensor Networks. 31-36.
Mitzel, D. J., Estrin D., Shenker S. J., & Zhang L. (1994).  An Architectural Comparison of ST-II and RSVP. Proceedings of the 13th IEEE Conference on Networking for Global Communications (INFOCOM '94). 2, 716-725.

Pages