Publications

Found 4041 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Allman, M. (2013).  On Changing the Culture of Empirical Internet Assessment. ACM SIGCOMM Computer Communication Review. 43(3), 78-83.
Allman, M. (1998).  On the Generation and Use of TCP Acknowledgments. ACM Computer Communication Review. 28,
Allman, M., & Ostermann S. (2000).  FTP Extensions for Variable Protocol Specification.
Allman, M., & Blanton E. (2005).  Notes on Burst Mitigation for Transport Protocols. ACM SIGCOMM Computer Communication Review. 35(2), 53-60.
Allman, M., Paxson V., & Terrell J.. (2007).  A Brief History of Scanning. 77-82.
Allman, M. (2008).  TCP Slow Start Survey: Standards and Issues.
Allman, M., Floyd S., & Partridge C. (2002).  RFC 3390: Increasing TCP's Initial Window.
Allman, M., Hayes C., & Ostermann S. (1998).  An Evaluation of TCP with Larger Initial Windows. ACM Computer Communication Review. 28,
Allman, M. (2013).  Comments on Bufferbloat. ACM SIGCOMM Computer Communication Review. 3(1), 30-37.
Allman, M., & Paxson V. (2008).  A Reactive Measurement Framework. 92-101.
Allman, M. (1997).  Fixing Two BSD TCP Bugs.
Allman, M., & Ostermann S. (1999).  FTP Security Considerations.
Allman, M. (2003).  On the Performance of Middleboxes. ACM SIGCOMM/Usenix Internet Measurement Conference.
Allman, M., Paxson V., & Blanton E. (2009).  RFC 5681: TCP Congestion Control.
Allman, M., Kruse H., & Ostermann S. (2000).  A History of the Improvement of Internet Protocols Over Satellites Using ACTS.
Allman, M., Blanton E., Paxson V., & Shenker S. (2006).  Fighting Coordinated Attackers with Cross-Organizational Information on Sharing. Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 121-126.
Allman, M., Blanton E., & Paxson V. (2005).  An Architecture for Developing Behavioral History. Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
Allman, M., & Paxson V. (2007).  Issues and Etiquette Concerning Use of Shared Measurement Data. 135-140.
Allman, M., Blanton E., & Eddy W. M. (2002).  A Scalable System for Sharing Internet Measurements. Proceedings of the Passive and Active Measurement Workshop.
Allman, M., & Ostermann S. (1997).  Multiple Data Connection FTP Extensions.
Allman, M., Barford P., Krishnamurty B., & Wang J. (2006).  Tracking the Role of Adversaries in Measuring Unwanted Traffic. Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI). 6.
Almeida, M., Finamore A., Perino D., Vallina-Rodriguez N., & Varvello M. (2017).  Dissecting DNS Stakeholders in Mobile Networks. Proceedings of CoNEXT.
Alon, N., Karp R. M., Peleg D., & West D. (1991).  A Graph-Theoretic Game and its Application to the k-Server Problem.
Alon, N., Blum M. E., Fiat A., Kannan S., Naor M., & Ostrovsky R. (1993).  Matching Nuts and Bolts.
Alon, N., Karp R. M., Peleg D., & West D. (1995).  A graph-theoretic game and its application to the k-server problem. SIAM Journal on Computing. 24(1), 78-100.

Pages