Publications

Found 1886 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
Technical Report
Ee, C. Tien, Lee J., Maltz D., Shenker S. J., & Subramanian L. (2007).  Simplifying Access Control in Enterprise Networks.
Ee, C. Tien, Lee J., Maltz D., Shenker S. J., & Subramanian L. (2007).  Simplifying Access Control in Enterprise Networks.
Chasins, S., Cheung A., Crooks N., Ghodsi A., Goldberg K., Gonzalez J. E., et al. (2022).  The Sky Above the Clouds: A Berkeley View on the Future of Cloud Computing. arxiv.org.
Chasins, S., Cheung A., Crooks N., Ghodsi A., Goldberg K., Gonzalez J. E., et al. (2022).  The Sky Above the Clouds: A Berkeley View on the Future of Cloud Computing. arxiv.org.
Chasins, S., Cheung A., Crooks N., Ghodsi A., Goldberg K., Gonzalez J. E., et al. (2022).  The Sky Above the Clouds: A Berkeley View on the Future of Cloud Computing. arxiv.org.
Chasins, S., Cheung A., Crooks N., Ghodsi A., Goldberg K., Gonzalez J. E., et al. (2022).  The Sky Above the Clouds: A Berkeley View on the Future of Cloud Computing. arxiv.org.
Kannan, J., Yang B., Shenker S. J., Sharma P., Banerjee S., Basu S., et al. (2005).  Smartseer: Continuous Queries over Citeseer.
Kannan, J., Yang B., Shenker S. J., Sharma P., Banerjee S., Basu S., et al. (2005).  Smartseer: Continuous Queries over Citeseer.
Baraldi, A., & Schenato L.. (1999).  Soft-to-Hard Model Transition in Clustering: A Review.
Sperduti, A. (1993).  On Some Stability Properties of the LRAAM Model.
Zaharia, M., Chowdhury M., Franklin M. J., Shenker S. J., & Stoica I. (2010).  Spark: Cluster Computing with Working Sets.
Zaharia, M., Chowdhury M., Franklin M. J., Shenker S. J., & Stoica I. (2010).  Spark: Cluster Computing with Working Sets.
Shastri, L., & Chang S. (1999).  A Spatiotemporal Connectionist Model of Algebraic Rule-Learning.
Sachs, S. R., Freitas C. M. Dal Sas, Markowitz V., Talis A., Chen I-M.. A., Szeto E., et al. (1997).  The Spectro-Microscopy Electronic Notebook.
Sachs, S. R., Freitas C. M. Dal Sas, Markowitz V., Talis A., Chen I-M.. A., Szeto E., et al. (1997).  The Spectro-Microscopy Electronic Notebook.
Sommer, R., Amann J., & Hall S. (2015).  Spicy: A Unified Deep Packet Inspection Framework Dissecting All Your Data. ICSI Technical Report.
Moore, D., Paxson V., Savage S., Shannon C., Staniford S., & Weaver N. (2003).  The Spread of the Sapphire/Slammer Worm.
Moore, D., Paxson V., Savage S., Shannon C., Staniford S., & Weaver N. (2003).  The Spread of the Sapphire/Slammer Worm.
Moore, D., Paxson V., Savage S., Shannon C., Staniford S., & Weaver N. (2003).  The Spread of the Sapphire/Slammer Worm.
Anderson, D. P., Herrtwich R. Guido, & Schaefer C. (1990).  SRP: A Resource Reservation Protocol for Guaranteed-Performance Communication in the Internet.
Rössner, C., & Schnorr C. P. (1994).  A Stable Integer Relation Algorithm.
Shin, K. G., & Peng D-T. (1988).  Static Allocation of Periodic Tasks with Precedence Restraints in Distributed Systems.
Zhang, Y., Paxson V., & Shenker S. J. (2000).  The Stationarity of Internet Path Properties: Routing, Loss, and Throughput.
Lukyanenko, A., Nikolaevskiy I., Kuptsov D., Gurtov A., Ghodsi A., & Shenker S. J. (2014).  STEM+: Allocating Bandwidth Fairly To Tasks.
Thiébaux, S., Hertzberg J., Shoaff W., & Schneider M. (1993).  A Stochastic Model of Actions and Plans for Anytime Planning Under Uncertainty.

Pages