Found 377 results
Author Title [ Type(Desc)] Year
Filters: Author is Scott Shenker  [Clear All Filters]
Conference Paper
Mehta, A., Shenker S., & Vazirani V. V. (2003).  Profit Maximizing Multicast Pricing by Approximating Fixed Points (Extended Abstract). Proceedings of the Fourth ACM Conference on Electronic Commerce (EC '03). 218-219.
Argyraki, K., Maniatis P., Cheriton D., & Shenker S. (2004).  Providing Packet Obituaries. Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III).
Chun, B., Hellerstein J. M., Huebsch R., Jeffery S. R., Loo B. Thau, Mardanbeigi S., et al. (2004).  Querying at Internet Scale. Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '04). 935-936.
Huebsch, R., Hellerstein J. M., Lanham N.., Loo B. Thau, Shenker S., & Stoica I. (2003).  Querying the Internet with PIER. Proceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003). 321-332.
Karp, R. M., Schindelhauer C., Shenker S., & Vocking B.. (2000).  Randomized Rumor Spreading. Proceedings of the IEEE 41st Annual Symposium on Foundations of Computer Science (FOCS 2000). 565-574.
Gummadi, R., Kothari N., Kim Y-J., Govindan R., Karp B., & Shenker S. (2004).  Reduced State Routing in the Internet. Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III).
Ermolinskiy, A., & Shenker S. (2008).  Reducing Transient Disconnectivity Using Anomaly-Cognizant Forwarding. 91-96.
Subramanian, L., Katz R. H., Roth V., Shenker S., & Stoica I. (2005).  Reliable Broadcast in Unknown Fixed-Identity Networks. Proceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC 2005). 342-351.
Geels, D.., Altekar G.., Shenker S., & Stoica I. (2006).  Replay Debugging for Distributed Applications. Proceedings of the 2006 USENIX Annual Technical Conference. 289-300.
Cohen, E., & Shenker S. (2002).  Replication Strategies in Unstructured Peer-to-Peer Networks. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 177-190.
Feigenbaum, J., P. Godfrey B., Panda A., Schapira M., Shenker S., & Singla A. (2012).  On the Resilience of Routing Tables. 1-7.
Zaharia, M., Chowdhury M., Das T., Dave A., Ma J., McCauley M., et al. (2012).  Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. 1-14.
Ee, C. Tien, Ramachandran V., Chun B-G., Lakshminarayanan K., & Shenker S. (2007).  Resolving Inter-Domain Policy Disputes. 157-168.
Tootoonchian, A., Panda A., Lan C., Walls M., Argyraki K., Ratnasamy S., et al. (2018).  ResQ: Enabling SLOs in Network Function Virtualization. Proceedings of NSDI 2018.
Moon, D., Casado M., Koponen T., & Shenker S. (2008).  Rethinking Packet Forwarding Hardware. 1-6.
Ratnasamy, S., Ermolinskiy A., & Shenker S. (2006).  Revisiting IP Multicast. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 15-26.
Mittal, R., Shpiner A., Panda A., Zahavi E., Krishnamurthy A., Ratnasamy S., et al. (2018).  Revisiting network support for RDMA. Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication SIGCOMM '18.
Heller, B., Erickson D., McKeown N., Griffith R., Ganichev I., Whyte S., et al. (2010).  Ripcord: A Modular Platform for Data Center Networking. 457-458.
Caesar, M., Condie T.., Kannan J., Lakshminarayanan K., Shenker S., & Stoica I. (2006).  ROFL: Routing on Flat Labels. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 363-374.
Sherry, J., Gao P. X., Basu S., Panda A., Krishnamurthy A., Maciocco C., et al. (2015).  Rollback-Recovery for Middleboxes.
Castro, I., Panda A., Raghavan B., Shenker S., & Gorinsky S. (2015).  Route Bazaar: Automatic Interdomain Contract Negotiation.
Ratnasamy, S., Stoica I., & Shenker S. (2002).  Routing Algorithms for DHTs: Some Open Questions. Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS). 45-52.
Lakshminarayanan, K., Stoica I., & Shenker S. (2004).  Routing as a Service. Proceedings of the Service Architecture for Heterogeneous Access, Resources, and Applications Retreat (SAHARA 2004).
Casado, M., Garfinkel T., Akella A., Freedman M. J., Boneh D.., McKeown N., et al. (2006).  SANE: A Protection Architecture for Enterprise Networks. Proceedings of the 15th USENIX Security Symposium (Security '05).
Ratnasamy, S., Francis P., Handley M., Karp R. M., & Shenker S. (2001).  A Scalable Content-Addressable Network. Proceedings of ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. 161-172.