Publications

Found 390 results
Author [ Title(Asc)] Type Year
Filters: Author is Scott Shenker  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
X
Fonseca, R., Porter G. Manning, Katz R. H., Shenker S. J., & Stoica I. (2007).  X-Trace: A Pervasive Network Tracing Framework. Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007). 271-284.
U
Bian, F.., Li X.., Govindan R., & Shenker S. J. (2006).  Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor Networks. International Journal of Ad Hoc and Ubiquitous Computing. 1(4), 179-193.
Walfish, M., Balakrishnan H., & Shenker S. J. (2004).  Untangling the Web from DNS. Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004). 225-238.
Polastre, J., Hui J., Levis P., Zhao J., Culler D. E., Shenker S. J., et al. (2005).  A Unifying Link Abstraction for Wireless Sensor Networks. Proceedings of the Third ACM Conference on Embedded Networked Sensor Systems (Sensys 2005). 76-89.
Bajaj, S., Breslau L., & Shenker S. J. (1998).  Uniform versus Priority Dropping for Layered Video. ACM Computer Communication Review. 28, 131-143.
T
Shenker, S. J., & Breslau L. (1995).  Two Issues in Reservation Establishment. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '95). 14-26.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
Levis, P., Patel N., Culler D. E., & Shenker S. J. (2004).  Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 15-28.
S. McCormick, T., Pinedo M. L., Shenker S. J., & Wolf B. (1991).  Transient Behavior in a Flexible Assembly System. International Journal of Flexible Manufacturing Systems. 27-44.
Ermolinskiy, A., Katti S., Shenker S. J., Fowler L. L., & McCauley M. (2010).  Towards Practical Taint Tracking.
Chang, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2004).  Towards Capturing Representative AS-Level Internet Topologies. Computer Networks. 44(6), 737-755.
Chang, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2002).  Towards Capturing Representative AS-Level Internet Topologies. Proceedings of the International Conference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 280-281.
Ratnasamy, S., Shenker S. J., & McCanne S. (2005).  Towards an Evolvable Internet Architecture. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 313-324.
Bergemann, D., Feigenbaum J., Shenker S. J., & Smith J. M. (2004).  Towards an Economic Analysis of Trusted Systems (Position Paper). Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota.
Bergemann, D., Feigenbaum J., Shenker S. J., & Smith J. M. (2004).  Towards an Economic Analysis of Trusted Systems.
Culler, D. E., Dutta P., Ee C. Tien, Fonseca R., Hui J., Levis P., et al. (2005).  Towards a Sensor Network Architecture: Lowering the Waistline. Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS X). 10, 24-30.

Pages