Publications

Found 353 results
Author Title [ Type(Desc)] Year
Filters: Author is Scott Shenker  [Clear All Filters]
Conference Paper
Xin, R., Rosen J., Zaharia M., Franklin M. J., Shenker S., & Stoica I. (2013).  Shark: SQL and Rich Analytics at Scale. 13-24.
Nguyen, G. T. K., Agarwal R., Liu J., Caesar M., P. Godfrey B., & Shenker S. (2011).  Slick Packets. 245-256.
Banerjee, S., Basu S., Kannan J., Lee S. Ju, Sharma P., Shenker S., et al. (2006).  SmartSeer: Using a DHT to Process Continuous Queries over Peer-to-Peer Networks. Proceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM). 1-12.
Raghavan, B., Casado M., Koponen T., Ratnasamy S., Ghodsi A., & Shenker S. (2012).  Software-Defined Internet Architecture: Decoupling Architecture from Infrastructure. 43-48.
Shenker, S. (2012).  Software-Defined Networking: History, Hype, and Hope.
Shenker, S. (1987).  Some Conjectures on the Behavior of Acknowledgement-Based Transmission Control of Random Access Communication Channels. Proceedings of the 1987 ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '87). 245-255.
Zaharia, M., Chowdhury M., Franklin M. J., Shenker S., & Stoica I. (2010).  Spark: Cluster Computing with Working Sets. 1-7.
Karp, B., Ratnasamy S., Rhea S., & Shenker S. (2004).  Spurring Adoption of DHTs with OpenHash, a Public DHT Service. Proceedings of the Third International Workshop on Peer-to-Peer Systems.
Cocchi, R., Estrin D., Shenker S., & Zhang L. (1991).  A Study of Priority Pricing in Multiple Service Class Networks. Proceedings of the ACM SIGCOMM '91 Conference on Communications Architecture & Protocols. 123-130.
Mitzel, D. J., Estrin D., Shenker S., & Zhang L. (1996).  A Study of Reservation Dynamics in Integrated Services Packet Networks. Proceedings of the 15th IEEE Annual Joint Conference on Networking the Next Generation. 2, 871-879.
Clark, D. D., Shenker S., & Zhang L. (1992).  Supporting Real-Time Applications in an Integrated Services Packet Network: Architecture and Mechanism. Proceedings of the ACM SIGCOMM '92 Conference on Communications Architecture & Protocols. 14-26.
McCauley, M., Sheng A., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. (2015).  Taking an AXE to L2 Spanning Trees.
Shenker, S. (1990).  A Theoretical Analysis of Feedback Flow Control. Proceedings of the ACM SIGCOMM Symposium on Communications Architectures & Protocols. 156-165.
Chun, B-G., Maniatis P., Shenker S., & Kubiatowicz J. D. (2009).  Tiered Fault Tolerance for Long-Term Integrity. 267-282.
Ratnasamy, S., Handley M., Karp R. M., & Shenker S. (2002).  Topologically-Aware Overlay Construction and Server Selection. Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002). 3, 1190-1199.
Demmer, M., Fall K., Koponen T., & Shenker S. (2007).  Towards a Modern Communications API. Proceedings of the 6th ACM Workshop on Hot Topics in Networks (HotNets-VI). 1-7.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao Z. Morley, Shenker S., et al. (2004).  Towards a Next Generation Inter-domain Routing Protocol. Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California.
Culler, D. E., Dutta P., Ee C. Tien, Fonseca R., Hui J., Levis P., et al. (2005).  Towards a Sensor Network Architecture: Lowering the Waistline. Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS X). 10, 24-30.
Bergemann, D., Feigenbaum J., Shenker S., & Smith J. M. (2004).  Towards an Economic Analysis of Trusted Systems (Position Paper). Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota.
Ratnasamy, S., Shenker S., & McCanne S. (2005).  Towards an Evolvable Internet Architecture. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 313-324.
Chang, H., Govindan R., Jamin S., Shenker S., & Willinger W. (2002).  Towards Capturing Representative AS-Level Internet Topologies. Proceedings of the International Conference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 280-281.
Levis, P., Patel N., Culler D. E., & Shenker S. (2004).  Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 15-28.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
Shenker, S., & Breslau L. (1995).  Two Issues in Reservation Establishment. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '95). 14-26.
Polastre, J., Hui J., Levis P., Zhao J., Culler D. E., Shenker S., et al. (2005).  A Unifying Link Abstraction for Wireless Sensor Networks. Proceedings of the Third ACM Conference on Embedded Networked Sensor Systems (Sensys 2005). 76-89.

Pages