Publications

Found 390 results
Author Title [ Type(Desc)] Year
Filters: Author is Scott Shenker  [Clear All Filters]
Conference Paper
Moon, D., Casado M., Koponen T., & Shenker S. J. (2008).  Rethinking Packet Forwarding Hardware. 1-6.
Ratnasamy, S., Ermolinskiy A., & Shenker S. J. (2006).  Revisiting IP Multicast. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 15-26.
Mittal, R., Shpiner A., Panda A., Zahavi E., Krishnamurthy A., Ratnasamy S., et al. (2018).  Revisiting network support for RDMA. Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication SIGCOMM '18.
Balakrishnan, H., Banerjee S., Cidon I., Culler D. E., Estrin D., Katz-Basset E. B., et al. (2021).  Revitalizing the public internet by making it extensible. ACM SIGCOMM Computer Communication Review . 51(2), 18-24.
Heller, B., Erickson D., McKeown N., Griffith R., Ganichev I., Whyte S., et al. (2010).  Ripcord: A Modular Platform for Data Center Networking. 457-458.
Caesar, M., Condie T.., Kannan J., Lakshminarayanan K., Shenker S. J., & Stoica I. (2006).  ROFL: Routing on Flat Labels. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 363-374.
Sherry, J., Gao P. X., Basu S., Panda A., Krishnamurthy A., Maciocco C., et al. (2015).  Rollback-Recovery for Middleboxes.
Castro, I., Panda A., Raghavan B., Shenker S. J., & Gorinsky S. (2015).  Route Bazaar: Automatic Interdomain Contract Negotiation.
Ratnasamy, S., Stoica I., & Shenker S. J. (2002).  Routing Algorithms for DHTs: Some Open Questions. Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS). 45-52.
Lakshminarayanan, K., Stoica I., & Shenker S. J. (2004).  Routing as a Service. Proceedings of the Service Architecture for Heterogeneous Access, Resources, and Applications Retreat (SAHARA 2004).
Casado, M., Garfinkel T., Akella A., Freedman M. J., Boneh D.., McKeown N., et al. (2006).  SANE: A Protection Architecture for Enterprise Networks. Proceedings of the 15th USENIX Security Symposium (Security '05).
Ratnasamy, S., Francis P., Handley M., Karp R. M., & Shenker S. J. (2001).  A Scalable Content-Addressable Network. Proceedings of ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. 161-172.
Yu, H., Breslau L., & Shenker S. J. (1999).  A Scalable Web Cache Consistency Architecture. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '99). 163-174.
Phillips, G., Shenker S. J., & Tangmunarunkit H. (1999).  Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling Law. Proceedings of the ACM Annual Conference of the Special Interest Group on Data Communication (SIGCOMM). 41-51.
Willinger, W., Govindan R., Jamin S., Paxson V., & Shenker S. J. (2002).  Scaling Phenomena in the Internet: Critically Examining Criticality. Proceedings of National Academy of Science of the United States of America (PNAS). 99,
Weiser, M., Welch B., Demers A. J., & Shenker S. J. (1994).  Scheduling for Reduced CPU Energy. Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI). 13-23.
Yao, F., Demers A. J., & Shenker S. J. (1995).  A Scheduling Model for Reduced CPU Energy. Proceedings of the 36th IEEE Annual Symposium on Foundations of Computer Science (FOCS). 374-382.
Panda, A., Zheng W., Hu X., Krishnamurthy A., & Shenker S. J. (2017).  SCL: Simplifying Distributed SDN Control Planes. Proceedings of NSDI '17.
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 258-259.
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the 16th International Conference on Supercomputing (ICS-02). 84-95.
Akella, A., Karp R. M., Papadimitriou C. H., Seshan S., & Shenker S. J. (2002).  Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCP. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 117-130.
Qiu, L., Yang Y. Richard, Zhang Y., & Shenker S. J. (2003).  On Selfish Routing in Internet-Like Environments. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM). 151-162.
Stoica, I., Zhang H., & Shenker S. J. (2002).  Self-Verifying CSFQ. Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). 1, 21-30.
Balakrishnan, H., Shenker S. J., & Walfish M. (2003).  Semantic-Free Referencing in Linked Distributed Systems. Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03). 1-6.
Singh, S.., Shenker S. J., & Varghese G. (2006).  Service Portability: Why http Redirect is the Model for the Future. Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 49-54.

Pages