Found 376 results
Author Title [ Type(Asc)] Year
Filters: Author is Scott Shenker  [Clear All Filters]
Conference Paper
Kohler, E., Li J., Paxson V., & Shenker S. (2002).  Observed Structure of Addresses in IP Traffic. Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop (IMW). 253-266.
Zhang, L., Shenker S., & Clark D. D. (1991).  Observations on the Dynamics of a Congestion Control Algorithm: The Effects of Two-Way Traffic. Proceedings of the ACM SIGCOMM '91 Conference on Communications Architecture & Protocols. 133-147.
Gupta, D., Segal A., Panda A., Segev G., Schapira M., Feigenbaum J., et al. (2012).  A New Approach to Interdomain Routing Based on Secure Multi-Party Computation. 37-42.
Tangmunarunkit, H., Govindan R., Jamin S., Shenker S., & Willinger W. (2002).  Network Topology Generators: Degree-Based vs. Structural. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 147-159.
Fabrikant, A., Luthra A., Maneva E., Papadimitriou C. H., & Shenker S. (2003).  On a Network Creation Game. Proceedings of the 22nd Annual Symposium on Principles of Distributed Computing (PODC '03). 347-351.
Panda, A., Han S., Walls M., Ratnasamy S., & Shenker S. (2016).  NetBricks: Taking the V out of NFV. Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16).
Ghodsi, A., Koponen T., Rajahalme J., Sarolahti P., & Shenker S. (2011).  Naming in Content-Oriented Architectures. 1-6.
Boehm, H-J.., Demers A. J., & Shenker S. (1991).  Mostly Parallel Garbage Collection. Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI '91). 157-164.
Ousterhout, K., Canel C., Ratnasamy S., & Shenker S. (2017).  Monotasks: Architecting for Performance Clarity in Data Analytics Frameworks. Proceedings of the 26th Symposium on Operating Systems Principles SOSP '17.
Iyer, A. Pamanabha, Panda A., Chowdhury M., Akella A., Shenker S., & Stoica I. (2018).  Monarch: Gaining Command on Geo-Distributed Graph Analytics.. Proceedings of HotCloud 2018.
Tavakoli, A., Dutta P., Jeong J., Kim S., Ortiz J., Levis P., et al. (2007).  A Modular Sensornet Architecture: Past, Present, and Future Directions. 49-54.
Ee, C. Tien, Fonseca R., Kim S., Moon D., Tavakoli A., Culler D. E., et al. (2006).  A Modular Network Layer for Sensornets. Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06). 249-262.
Ermolinskiy, A., Moon D., Chun B-G., & Shenker S. (2009).  Minuet: Rethinking Concurrency Control in Storage Area Networks. 311-324.
P. Godfrey, B., Shenker S., & Stoica I. (2006).  Minimizing Churn in Distributed Systems. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 147-158.
Walfish, M., Stribling J., Krohn M., Balakrishnan H., Morris R., & Shenker S. (2004).  Middleboxes No Longer Considered Harmful. Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI '04). 215-230.
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A. D., Katz R. H., et al. (2011).  Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center. 1-14.
Feigenbaum, J., Sami R., & Shenker S. (2004).  Mechanism Design for Policy Routing. Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004). 11-20.
Shenker, S., Weinrib A., & Schooler E. (1994).  Managing Shared Ephemeral Teleconferencing State: Policy and Mechanism. Proceedings of the International COST 237 Workshop on Multimedia Transport and Teleservices. 69-88.
Chawathe, Y., Ratnasamy S., Breslau L., & Shenker S. (2003).  Making Gnutella-Like P2P Systems Scalable. Proceedings of ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM). 407-418.
Bharghavan, V., Demers A. J., Shenker S., & Zhang L. (1994).  MACAW: A Media Access Protocol for Wireless LAN's. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94). 212-225.
Argyraki, K., Maniatis P., Irzak O.., Subramanian A.., & Shenker S. (2007).  Loss and Delay Accountability for the Internet. 194-205.
Liu, C-G., Estrin D., Shenker S., & Zhang L. (1998).  Local error recovery in SRM: comparison of two approaches. Proceedings of IEEE/ACM Transactions on Networking. 6, 686-699.
Subramanian, L., Roth V., Stoica I., Shenker S., & Katz R. H. (2004).  Listen and Whisper: Security Mechanisms for BGP. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 127-140.
Heller, B., Scott C., McKeown N., Shenker S., Wundsam A., Zeng H., et al. (2013).  Leveraging SDN Layering to Systematically Troubleshoot Networks.
Fayazbakhsh, S. Kaveh, Lin Y., Tootoonchian A., Ghodsi A., Koponen T., Maggs B. M., et al. (2013).  Less Pain, Most of the Gain: Incrementally Deployable ICN. 147-158.