Publications

Found 107 results
Author Title [ Type(Desc)] Year
Filters: Author is Ion Stoica  [Clear All Filters]
Conference Paper
Lakshminarayanan, K., Caesar M., Rangan M., Anderson T., Shenker S., & Stoica I. (2007).  Achieving Convergence-Free Routing Using Failure-Carrying Packets. 241-252.
Huebsch, R., Chun B., Hellerstein J. M., Loo B. Thau, Maniatis P., Roscoe T., et al. (2005).  The Architecture of PIER: An Internet-Scale Query Processor. Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005). 28-43.
Popa, L., Rostami A.., Karp R. M., Papadimitriou C. H., & Stoica I. (2007).  Balancing the Traffic Load in Wireless Networks with Curveball Routing. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2007).
Fonseca, R., Ratnasamy S., Zhao J., Ee C. Tien, Culler D. E., Shenker S., et al. (2005).  Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 329-342.
Popa, L., Egi N.., Ratnasamy S., & Stoica I. (2010).  Building Extensible Networks with Rule-Based Forwarding. 379-391.
Ousterhout, K., Panda A., Rosen J., Venkataraman S., Xin R., Ratnasamy S., et al. (2013).  The Case for Tiny Tasks in Compute Clusters. 1-6.
Ghodsi, A., Zaharia M., Shenker S., & Stoica I. (2013).  Choosy: Max-Min Fair Sharing for Datacenter Jobs with Constraints. 365-378.
Martignoni, L., Poosankam P., Zaharia M., Han J., McCamant S., Song D., et al. (2012).  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 165-176.
Popa, L., Yu M., Ko S.. Y., Ratnasamy S., & Stoica I. (2010).  CloudPolice: Taking Access Control out of the Network.
Harren, M.., Hellerstein J. M., Huebsch R., Loo B. Thau, Shenker S., & Stoica I. (2002).  Complex Queries in DHT-based Peer-to-Peer Networks. Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS '02). 2429, 242-250.
Katz, R. H., Porter G. Manning, Shenker S., Stoica I., & Tsai M. (2005).  COPS: Quality of Service Vs. Any Service at All. Proceedings of the 13th International Workshop on Quality of Service 2005 (IWQoS 2005). 3-15.
Stoica, I., Shenker S., & Zhang H. (2003).  Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed Networks. Proceedings of the ACM's Special Interest Group on Data Communication (SIGCOMM'98). 118-130.
Popa, L., Ratnasamy S., Iannaccone G., Krishnamurthy A., & Stoica I. (2010).  A Cost Comparison of Datacenter Network Architectures.
Zaharia, M., Hindman B., Konwinski A., Ghodsi A., Joseph A. D., Katz R. H., et al. (2011).  The Datacenter Needs an Operating System. 1-5.
Koponen, T., Chawla M., Chun B-G., Ermolinskiy A., Kim K. Hyun, Shenker S., et al. (2007).  A Data-Oriented (and Beyond) Network Architecture. 181-192.
Zaharia, M., Borthakur D., Sarma J. Sen, Elmeleegy K., Shenker S., & Stoica I. (2010).  Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling. 265-278.
Chu, D., Popa L., Tavakoli A., Hellerstein J. M., Levis P., Shenker S., et al. (2007).  The Design and Implementation of a Declarative Sensor Network System. 175-188.
Anderson, T., Shenker S., Stoica I., & Wetherall D. (2002).  Design Guidelines for Robust Internet Protocols. Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I).
Zaharia, M., Das T., Li H., Shenker S., & Stoica I. (2012).  Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters. 1-6.
Ananthanarayanan, G., Ghodsi A., Shenker S., & Stoica I. (2011).  Disk-Locality in Datacenter Computing Considered Irrelevant. 1-5.
Ghodsi, A., Zaharia M., Hindman B., Konwinski A., Shenker S., & Stoica I. (2011).  Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters. 323-336.
Ananthanarayanan, G., Ghodsi A., Shenker S., & Stoica I. (2013).  Effective Straggler Mitigation: Attack of the Clones. 185-198.
Breslau, L., Knightly E. W., Shenker S., Stoica I., & Zhang H. (2000).  Endpoint Admission Control: Architectural Issues and Performance. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.
B. Loo, T., Hellerstein J. M., Huebsch R., Shenker S., & Stoica I. (2004).  Enhancing P2P File-Sharing with an Internet-Scale Query Processor. Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004). 432-443.
Kim, S., Fonseca R., Dutta P., Tavakoli A., Culler D. E., Levis P., et al. (2007).  Flush: A Reliable Bulk Transport Protocol for Multihop Wireless Networks. 351-365.

Pages