Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Caselli, M., Zambon E., Amann J., Sommer R., & Kargl F. (2016).  Specification Mining for Intrusion Detection in Networked Control Systems. Proceedings of the 25th USENIX Security Symposium. 790-806.
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. J. (2007).  Ethane: Taking Control of the Enterprise. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007). 1-12.
Casado, M., McKeown N., & Shenker S. J. (2019).  From ethane to SDN and beyond. ACM SIGCOMM Computer Communication Review. 49(5), 92-95.
Casado, M., Koponen T., Shenker S. J., & Tootoonchian A. (2012).  Fabric: A Retrospective on Evolving SDN. 85-90.
Casado, M., Freedman M. J., Pettit J., Luo J.., Gude N. S., McKeown N., et al. (2009).  Rethinking Enterprise Network Control. IEEE/ACM Transactions on Networking. 17(4), 1270-1283.
Casado, M., Garfinkel T., Akella A., Freedman M. J., Boneh D.., McKeown N., et al. (2006).  SANE: A Protection Architecture for Enterprise Networks. Proceedings of the 15th USENIX Security Symposium (Security '05).
Casado, M., Garfinkel T., Cui W., Paxson V., & Savage S. (2005).  Opportunistic Measurement: Extracting Insight from Spurious Traffic. Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. J. (2007).  Ethane: Taking Control of the Enterprise. ACM SIGCOMM Computer Communication Review. 37(4), 1-12.
Casado, M., Koponen T., Ramanathan R., & Shenker S. J. (2010).  Virtualizing the Network Forwarding Plane. 1-6.
Caputo, B., Hayman E., Fritz M., & Eklundh J-O. (2010).  Classifying Materials in the Real World. Image and Vision Computing. 28(1), 150-163.
Cao, L., Friedland G., & Xie L. (2014).  GeoMM 2014: The Third ACM Multimedia Workshop on Geotagging and its Applications in Multimedia. 1251-1252.
Cantone, D., & Cutello V. (1991).  On the Decidability Problem for a Topological Syllogistic Involving the Notion of Topological Product.
Cantone, D., & Cutello V. (1992).  Decision Procedures for Flat Set-Theorectical Syllogistics.I. General Union, Powerset and Singleton Operators.
Callejo, P., Cuevas R., Vallina-Rodriguez N., & Cuevas A. (2019).  Measuring the Global Recursive DNS Infrastructure: A View From the Edge. IEEE Access.
Callejo, P., Kelton C., Vallina-Rodriguez N., Cuevas R., Gasser O., Kreibich C., et al. (2017).  Opportunities and Challenges of Ad-based Measurements from the Edge of the Network. Proceedings of HotNets 2017.
Calle, E., Jové T., Vilà P., & Marzo J. L. (2001).  A Dynamic Multilevel MPLS Protection Domain. Proceedings of the Third International Workshop on Design of Reliable Communication Networks (DRCN 2001).
Callahan, T., Allman M., & Rabinovich M. (2013).  On Modern DNS Behavior and Properties. ACM SIGCOMM Computer Communication Review. 43(3), 8-15.
Callahan, T., Allman M., & Rabinovich M. (2012).  Psst, Over Here: Communicating Without Fixed Infrastructure.
Callahan, T., Allman M., & Paxson V. (2010).  A Longitudinal View of HTTP Traffic.
Callahan, T., Allman M., & Rabinovich M. (2012).  Psst, Over Here: Communicating Without Fixed Infrastructure.
Caglioti, V.. (1993).  On a Criterion for Minimum Uncertainty Sensing.
Caesar, M., Condie T.., Kannan J., Lakshminarayanan K., Shenker S. J., & Stoica I. (2006).  ROFL: Routing on Flat Labels. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 363-374.
Caesar, M., Casado M., Koponen T., Rexford J., & Shenker S. J. (2010).  Dynamic Route Recomputation Considered Harmful. ACM Computer Communication Review. 40(2), 66-71.
Cáceres, R. (1991).  Efficiency of Asynchronous Transfer Mode Networks in Transporting Wide-Area Data Traffic.
Cáceres, R. (1989).  Separating Abstraction from Implementation in Communication Network Design.

Pages