Publications

Found 376 results
Author [ Title(Desc)] Type Year
Filters: Author is Scott Shenker  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao Z. Morley, Shenker S., et al. (2004).  Towards a Next Generation Inter-domain Routing Protocol. Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California.
Culler, D. E., Dutta P., Ee C. Tien, Fonseca R., Hui J., Levis P., et al. (2005).  Towards a Sensor Network Architecture: Lowering the Waistline. Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS X). 10, 24-30.
Bergemann, D., Feigenbaum J., Shenker S., & Smith J. M. (2004).  Towards an Economic Analysis of Trusted Systems.
Bergemann, D., Feigenbaum J., Shenker S., & Smith J. M. (2004).  Towards an Economic Analysis of Trusted Systems (Position Paper). Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota.
Ratnasamy, S., Shenker S., & McCanne S. (2005).  Towards an Evolvable Internet Architecture. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 313-324.
Chang, H., Govindan R., Jamin S., Shenker S., & Willinger W. (2004).  Towards Capturing Representative AS-Level Internet Topologies. Computer Networks. 44(6), 737-755.
Chang, H., Govindan R., Jamin S., Shenker S., & Willinger W. (2002).  Towards Capturing Representative AS-Level Internet Topologies. Proceedings of the International Conference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 280-281.
Ermolinskiy, A., Katti S., Shenker S., Fowler L. L., & McCauley M. (2010).  Towards Practical Taint Tracking.
S. McCormick, T., Pinedo M. L., Shenker S., & Wolf B. (1991).  Transient Behavior in a Flexible Assembly System. International Journal of Flexible Manufacturing Systems. 27-44.
Levis, P., Patel N., Culler D. E., & Shenker S. (2004).  Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 15-28.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
Shenker, S., & Breslau L. (1995).  Two Issues in Reservation Establishment. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '95). 14-26.
U
Bajaj, S., Breslau L., & Shenker S. (1998).  Uniform versus Priority Dropping for Layered Video. ACM Computer Communication Review. 28, 131-143.
Polastre, J., Hui J., Levis P., Zhao J., Culler D. E., Shenker S., et al. (2005).  A Unifying Link Abstraction for Wireless Sensor Networks. Proceedings of the Third ACM Conference on Embedded Networked Sensor Systems (Sensys 2005). 76-89.
Walfish, M., Balakrishnan H., & Shenker S. (2004).  Untangling the Web from DNS. Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004). 225-238.
Bian, F.., Li X.., Govindan R., & Shenker S. (2006).  Using Hierarchical Location Names for Scalable Routing and Rendevous in Wireless Sensor Networks. International Journal of Ad Hoc and Ubiquitous Computing. 1(4), 179-193.
X
Fonseca, R., Porter G. Manning, Katz R. H., Shenker S., & Stoica I. (2007).  X-Trace: A Pervasive Network Tracing Framework. Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007). 271-284.
Y
Ganichev, I., Dai B., P. Godfrey B., & Shenker S. (2010).  YAMR: Yet Another Multipath Routing Protocol. ACM SIGCOMM Computer Communication Review. 40(5), 13-19.

Pages