Publications

Found 353 results
Author [ Title(Desc)] Type Year
Filters: Author is Scott Shenker  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Widom, M., & Shenker S. (1984).  Topological Phase Transitions. 46-51.
Ratnasamy, S., Handley M., Karp R. M., & Shenker S. (2002).  Topologically-Aware Overlay Construction and Server Selection. Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002). 3, 1190-1199.
Demmer, M., Fall K., Koponen T., & Shenker S. (2007).  Towards a Modern Communications API. Proceedings of the 6th ACM Workshop on Hot Topics in Networks (HotNets-VI). 1-7.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao Z. Morley, Shenker S., et al. (2004).  Towards a Next Generation Inter-domain Routing Protocol. Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California.
Subramanian, L., Caesar M., Handley M., Mao M., Shenker S., & Stoica I. (2004).  Towards a Next Generation Inter-domain Routing Protocol.
Culler, D. E., Dutta P., Ee C. Tien, Fonseca R., Hui J., Levis P., et al. (2005).  Towards a Sensor Network Architecture: Lowering the Waistline. Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS X). 10, 24-30.
Bergemann, D., Feigenbaum J., Shenker S., & Smith J. M. (2004).  Towards an Economic Analysis of Trusted Systems.
Bergemann, D., Feigenbaum J., Shenker S., & Smith J. M. (2004).  Towards an Economic Analysis of Trusted Systems (Position Paper). Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota.
Ratnasamy, S., Shenker S., & McCanne S. (2005).  Towards an Evolvable Internet Architecture. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 313-324.
Chang, H., Govindan R., Jamin S., Shenker S., & Willinger W. (2002).  Towards Capturing Representative AS-Level Internet Topologies. Proceedings of the International Conference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 280-281.
Chang, H., Govindan R., Jamin S., Shenker S., & Willinger W. (2004).  Towards Capturing Representative AS-Level Internet Topologies. Computer Networks. 44(6), 737-755.
Ermolinskiy, A., Katti S., Shenker S., Fowler L. L., & McCauley M. (2010).  Towards Practical Taint Tracking.
S. McCormick, T., Pinedo M. L., Shenker S., & Wolf B. (1991).  Transient Behavior in a Flexible Assembly System. International Journal of Flexible Manufacturing Systems. 27-44.
Levis, P., Patel N., Culler D. E., & Shenker S. (2004).  Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 15-28.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
Shenker, S., & Breslau L. (1995).  Two Issues in Reservation Establishment. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '95). 14-26.
U
Bajaj, S., Breslau L., & Shenker S. (1998).  Uniform versus Priority Dropping for Layered Video. ACM Computer Communication Review. 28, 131-143.
Polastre, J., Hui J., Levis P., Zhao J., Culler D. E., Shenker S., et al. (2005).  A Unifying Link Abstraction for Wireless Sensor Networks. Proceedings of the Third ACM Conference on Embedded Networked Sensor Systems (Sensys 2005). 76-89.
Walfish, M., Balakrishnan H., & Shenker S. (2004).  Untangling the Web from DNS. Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004). 225-238.
Bian, F.., Li X.., Govindan R., & Shenker S. (2006).  Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor Networks. International Journal of Ad Hoc and Ubiquitous Computing. 1(4), 179-193.

Pages