Publications

Found 128 results
Author [ Title(Asc)] Type Year
Filters: Author is Mark Allman  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Callahan, T., Allman M., & Rabinovich M. (2012).  Psst, Over Here: Communicating Without Fixed Infrastructure.
Callahan, T., Allman M., & Rabinovich M. (2012).  Psst, Over Here: Communicating Without Fixed Infrastructure.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
Richter, P., Allman M., Bush R., & Paxson V. (2015).  A Primer on IPv4 Scarcity. ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
Nechaev, B., Allman M., Paxson V., & Gurtov A. (2010).  A Preliminary Analysis of TCP Performance in an Enterprise Network.
Sargent, M., Czyz J., Allman M., & Bailey M. (2015).  On The Power and Limitations of Detecting Network Filtering via Passive Observation. Proceedings of the Passive and Active Management Conference (PAM 2015).
Sargent, M., Kristoff J., Paxson V., & Allman M. (2017).  On the Potential Abuse of IGMP. ACM Computer Communication Review. 47(1), 
Allman, M. (2007).  Personal Namespaces. Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VI).
Sargent, M., & Allman M. (2014).  Performance Within A Fiber-To-The-Home Network. ACM SIGCOMM Computer Communication Review. 44(3), 23-30.
Kruse, H., Ostermann S., & Allman M. (2000).  On the Performance of TCP-Based Data Transfers on a Faded Ka-Band Satellite Link. Proceedings of the Sixth Ka-Band Utilization Conference.
Ishac, J., & Allman M. (2001).  On the Performance of TCP Spoofing in Satellite Networks.
Allman, M. (2003).  On the Performance of Middleboxes. ACM SIGCOMM/Usenix Internet Measurement Conference.
N
Allman, M., & Blanton E. (2005).  Notes on Burst Mitigation for Transport Protocols. ACM SIGCOMM Computer Communication Review. 35(2), 53-60.
Eddy, W. M., Ostermann S., & Allman M. (2004).  New Techniques for Making Transport Protocols Robust to Corruption-Based Loss. ACM SIGCOMM Computer Communication Review. 34(5), 75-88.

Pages