Publications

Found 4052 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Allman, M. (2013).  Comments on Bufferbloat. ACM SIGCOMM Computer Communication Review. 3(1), 30-37.
Allman, M., Eddy W. M., & Ostermann S. (2003).  Estimating Loss Rates With TCP. ACM Performance Evaluation Review.
Allman, M. (2001).  Measuring End-to-End Bulk Transfer Capacity. ACM SIGCOMM Internet Measurement Workshop.
Allman, M. (2000).  A Web Server's View of the Transport Layer.
Allman, M. (1997).  Fixing Two BSD TCP Bugs.
Allman, M., & Paxson V. (2008).  A Reactive Measurement Framework. 92-101.
Allman, M., & Paxson V. (1999).  On Estimating End-to-End Network Path Properties. ACM SIGCOMM.
Allman, M., Paxson V., & Blanton E. (2009).  RFC 5681: TCP Congestion Control.
Allman, M., Blanton E., Paxson V., & Shenker S. (2006).  Fighting Coordinated Attackers with Cross-Organizational Information on Sharing. Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 121-126.
Allman, M., Blanton E., & Paxson V. (2005).  An Architecture for Developing Behavioral History. Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
Allman, M., & Paxson V. (2007).  Issues and Etiquette Concerning Use of Shared Measurement Data. 135-140.
Allman, M., & Ostermann S. (2000).  FTP Extensions for Variable Protocol Specification.
Allman, M., & Ostermann S. (1997).  Multiple Data Connection FTP Extensions.
Allman, M. (2003).  TCP Congestion Control with Appropriate Byte Counting (ABC).
Allman, M., Barford P., Krishnamurty B., & Wang J. (2006).  Tracking the Role of Adversaries in Measuring Unwanted Traffic. Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.
Allman, M., Christensen K.., Nordman B., & Paxson V. (2007).  Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems.
Allman, M. (2008).  Thoughts on Reviewing. ACM Computer Communication Review. 38(2), 47-50.
Allman, M., & Ostermann S. (1999).  FTP Security Considerations.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
Allman, M., Kruse H., & Ostermann S. (2000).  A History of the Improvement of Internet Protocols Over Satellites Using ACTS.
Allman, M. (2010).  On Building Special-Purpose Social Networks for Emergency Communication. ACM Computer Communication Review. 40,
Almeida, M., Finamore A., Perino D., Vallina-Rodriguez N., & Varvello M. (2017).  Dissecting DNS Stakeholders in Mobile Networks. Proceedings of CoNEXT.
Alon, N., Karp R. M., Peleg D., & West D. (1991).  A Graph-Theoretic Game and its Application to the k-Server Problem.
Alon, N., Blum M. E., Fiat A., Kannan S., Naor M., & Ostrovsky R. (1993).  Matching Nuts and Bolts.
Alon, N., Karp R. M., Peleg D., & West D. (1995).  A graph-theoretic game and its application to the k-server problem. SIAM Journal on Computing. 24(1), 78-100.

Pages