Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Allman, M., & Ostermann S. (2000).  FTP Extensions for Variable Protocol Specification.
Allman, M., Paxson V., & Blanton E. (2009).  RFC 5681: TCP Congestion Control.
Allman, M. (2008).  Thoughts on Reviewing. ACM Computer Communication Review. 38(2), 47-50.
Allman, M., & Blanton E. (2005).  Notes on Burst Mitigation for Transport Protocols. ACM SIGCOMM Computer Communication Review. 35(2), 53-60.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
Allman, M. (2003).  TCP Congestion Control with Appropriate Byte Counting (ABC).
Allman, M., Hayes C., & Ostermann S. (1998).  An Evaluation of TCP with Larger Initial Windows. ACM Computer Communication Review. 28,
Allman, M. (1997).  Fixing Two BSD TCP Bugs.
Allman, M., & Ostermann S. (1999).  FTP Security Considerations.
Allman, M., Blanton E., Paxson V., & Shenker S. J. (2006).  Fighting Coordinated Attackers with Cross-Organizational Information on Sharing. Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 121-126.
Allman, M., Kruse H., & Ostermann S. (2000).  A History of the Improvement of Internet Protocols Over Satellites Using ACTS.
Allman, M. (2008).  What Ought a Program Committee to Do?.
Allman, M., Blanton E., & Paxson V. (2005).  An Architecture for Developing Behavioral History. Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
Allman, M. (2010).  On Building Special-Purpose Social Networks for Emergency Communication. ACM Computer Communication Review. 40,
Allman, M. (2003).  An Evaluation of XML-RPC. ACM Performance Evaluation Review.
Allman, M., & Ostermann S. (1997).  Multiple Data Connection FTP Extensions.
Allman, M. (2018).  Comments on DNS Robustness. ACM Internet Measurement Conference.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2007).  The Strengths of Weaker Identities: Opportunistic Personas. Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
Allman, M., Barford P., Krishnamurty B., & Wang J. (2006).  Tracking the Role of Adversaries in Measuring Unwanted Traffic. Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.
Allman, M., Floyd S., & Partridge C. (2002).  RFC 3390: Increasing TCP's Initial Window.
Allman, M., Glover D., & Sanchez L.. (1999).  Enhancing TCP Over Satellite Channels Using Standard Mechanisms..
Allman, M., & Paxson V. (2001).  On Estimating End-to-End Network Path Properties. ACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean.
Allman, M., Griner J., & Richard A.. (2000).  TCP Behavior in Networks with Dynamic Propagation Delay. Proceedings of Globecom 2000.
Allman, M., Martin L., Rabinovich M., & Atchinson K. (2008).  On Community-Oriented Internet Measurement. 112-121.
Allman, M. (2003).  On the Performance of Middleboxes. ACM SIGCOMM/Usenix Internet Measurement Conference.

Pages