Publications

Found 364 results
Author [ Title(Desc)] Type Year
Filters: Author is Scott Shenker  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Caesar, M., Casado M., Koponen T., Rexford J., & Shenker S. (2010).  Dynamic Route Recomputation Considered Harmful. ACM Computer Communication Review. 40(2), 66-71.
E
Koponen, T., Shenker S., Balakrishnan H., Feamster N., Ganichev I., Ghodsi A., et al. (2011).  Editorial: Architecting for Innovation. ACM SIGCOMM Computer Communication Review. 41(3), 24-36.
Ananthanarayanan, G., Ghodsi A., Shenker S., & Stoica I. (2013).  Effective Straggler Mitigation: Attack of the Clones. 185-198.
Shenker, S. (1990).  Efficient Network Allocations with Selfish Users. Proceedings of the 14th IFIP WG 7.3 International Symposium on Computer Performance Modelling, Measurement and Evaluation (Performance '90). 279-285.
Woo, S., Sherry J., Han S., Moon S., Ratnasamy S., & Shenker S. (2018).  Elastic Scaling of Stateful Network Functions. Proceedings of NSDI '18.
Levis, P., Brewer E., Culler D. E., Gay D., Madden S., Patel N., et al. (2008).  The Emergence of a Networking Primitive in Wireless Sensor Networks. Communications of the ACM. 51(7), 99-106.
McCauley, J., Harchol Y., Panda A., Raghavan B., & Shenker S. (2019).   Enabling a permanent revolution in internet architecture. Proceedings of the ACM Special Interest Group on Data Communication SIGCOMM '19.
Ananthanarayanan, G., Heimerl K., Zaharia M., Demmer M., Koponen T., Tavakoli A., et al. (2009).  Enabling Innovation Below the Communication API.
Hasan, S., Ben-David Y., Scott C., Brewer E., & Shenker S. (2012).  Enabling Rural Connectivity with SDN.
Lakshminarayanan, K., Rao A., Stoica I., & Shenker S. (2006).  End-Host Controlled Multicast Routing. Elsevier Computer Networks. 5(6), 807-825.
Breslau, L., Knightly E. W., Shenker S., Stoica I., & Zhang H. (2000).  Endpoint Admission Control: Architectural Issues and Performance. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.
B. Loo, T., Hellerstein J. M., Huebsch R., Shenker S., & Stoica I. (2004).  Enhancing P2P File-Sharing with an Internet-Scale Query Processor. Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004). 432-443.
Liu, J., Panda A., Singla A., P. Godfrey B., Schapira M., & Shenker S. (2013).  Ensuring Connectivity via Data Plane Mechanisms. 113-126.
Demers, A. J., Greene D., Hauser C., Irish W., Larson J., Shenker S., et al. (1987).  Epidemic Algorithms for Replicated Database Maintenance. Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing (PODC '87). 1-12.
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. (2007).  Ethane: Taking Control of the Enterprise. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007). 1-12.
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. (2007).  Ethane: Taking Control of the Enterprise. ACM SIGCOMM Computer Communication Review. 37(4), 1-12.
Friedman, E., Shor M.., Shenker S., & Sopher B.. (2004).  An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being Slow. Games and Economic Behavior. 47(2), 325-352.
Pfaff, B., Pettit J., Amidon K., Casado M., Koponen T., & Shenker S. (2009).  Extending Networking into the Virtualization Layer. 1-6.
F
Casado, M., Koponen T., Shenker S., & Tootoonchian A. (2012).  Fabric: A Retrospective on Evolving SDN. 85-90.
Friedman, E. J., Gkatzelis V., Psomas C-A., & Shenker S. (2019).  Fair and Efficient Memory Sharing: Confronting Free Riders. Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence.
Zaharia, M., Chowdhury M., Das T., Dave A., Ma J., McCauley M., et al. (2012).  Fast and Interactive Analytics Over Hadoop Data with Spark. USENIX ;login:. 34(4), 45-51.
Zaharia, M., Bolosky W. J., Curtis K., Fox A., Patterson D., Shenker S., et al. (2011).  Faster and More Accurate Sequence Alignment with SNAP.
Allman, M., Blanton E., Paxson V., & Shenker S. (2006).  Fighting Coordinated Attackers with Cross-Organizational Information on Sharing. Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 121-126.
Rhea, S., Chun B-G., Kubiatowicz J. D., & Shenker S. (2005).  Fixing the Embarrassing Slowness of OpenDHT on PlanetLab. Proceedings of the Second Workshop on Real, Large Distributed Systems (WORLDS '05). 25-30.
Bergemann, D., Eisenbach T.., Feigenbaum J., & Shenker S. (2005).  Flexibility as an Instrument in DRM Systems. Proceedings of 2005 Workshop on the Economics of Information Security (WEIS 2005).

Pages