Publications

Found 376 results
Author Title [ Type(Desc)] Year
Filters: Author is Scott Shenker  [Clear All Filters]
Conference Paper
Phillips, G., Shenker S., & Tangmunarunkit H. (1999).  Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling Law. Proceedings of the ACM Annual Conference of the Special Interest Group on Data Communication (SIGCOMM). 41-51.
Willinger, W., Govindan R., Jamin S., Paxson V., & Shenker S. (2002).  Scaling Phenomena in the Internet: Critically Examining Criticality. Proceedings of National Academy of Science of the United States of America (PNAS). 99,
Weiser, M., Welch B., Demers A. J., & Shenker S. (1994).  Scheduling for Reduced CPU Energy. Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI). 13-23.
Yao, F., Demers A. J., & Shenker S. (1995).  A Scheduling Model for Reduced CPU Energy. Proceedings of the 36th IEEE Annual Symposium on Foundations of Computer Science (FOCS). 374-382.
Panda, A., Zheng W., Hu X., Krishnamurthy A., & Shenker S. (2017).  SCL: Simplifying Distributed SDN Control Planes. Proceedings of NSDI '17.
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 258-259.
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the 16th International Conference on Supercomputing (ICS-02). 84-95.
Akella, A., Karp R. M., Papadimitriou C. H., Seshan S., & Shenker S. (2002).  Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCP. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 117-130.
Qiu, L., Yang Y. Richard, Zhang Y., & Shenker S. (2003).  On Selfish Routing in Internet-Like Environments. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM). 151-162.
Stoica, I., Zhang H., & Shenker S. (2002).  Self-Verifying CSFQ. Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). 1, 21-30.
Balakrishnan, H., Shenker S., & Walfish M. (2003).  Semantic-Free Referencing in Linked Distributed Systems. Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03). 1-6.
Singh, S.., Shenker S., & Varghese G. (2006).  Service Portability: Why http Redirect is the Model for the Future. Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 49-54.
Bajaj, S., Breslau L., & Shenker S. (1998).  Is Service Priority Useful in Networks?. Proceedings of the 1998 ACM SIGMETRICS Joint International Conference on Measurement and Modeling of Computer Systems. 66-77.
Shenker, S., Clark D. D., & Zhang L. (1994).  Services or Infrastructure: Why We Need a Network Service Model. Proceedings of the 1st International Workshop on Community Networking Integrated Multimedia Services to the Home. 145-149.
Feigenbaum, J., Papadimitriou C. H., & Shenker S. (2000).  Sharing the Cost of Multicast Transmissions. Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC 2000). 218-227.
Engle, C., Lupher A., Xin R., Zaharia M., Franklin M. J., Shenker S., et al. (2012).  Shark: Fast Data Analysis Using Coarse-grained Distributed Memory.
Xin, R., Rosen J., Zaharia M., Franklin M. J., Shenker S., & Stoica I. (2013).  Shark: SQL and Rich Analytics at Scale. 13-24.
Nguyen, G. T. K., Agarwal R., Liu J., Caesar M., P. Godfrey B., & Shenker S. (2011).  Slick Packets. 245-256.
Banerjee, S., Basu S., Kannan J., Lee S. Ju, Sharma P., Shenker S., et al. (2006).  SmartSeer: Using a DHT to Process Continuous Queries over Peer-to-Peer Networks. Proceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM). 1-12.
Raghavan, B., Casado M., Koponen T., Ratnasamy S., Ghodsi A., & Shenker S. (2012).  Software-Defined Internet Architecture: Decoupling Architecture from Infrastructure. 43-48.
Shenker, S. (2012).  Software-Defined Networking: History, Hype, and Hope.
Shenker, S. (1987).  Some Conjectures on the Behavior of Acknowledgement-Based Transmission Control of Random Access Communication Channels. Proceedings of the 1987 ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '87). 245-255.
Zaharia, M., Chowdhury M., Franklin M. J., Shenker S., & Stoica I. (2010).  Spark: Cluster Computing with Working Sets. 1-7.
Karp, B., Ratnasamy S., Rhea S., & Shenker S. (2004).  Spurring Adoption of DHTs with OpenHash, a Public DHT Service. Proceedings of the Third International Workshop on Peer-to-Peer Systems.
Jin, Y., Scott C., Dhamdhere A., Giotsas V., Krishnamurthy A., & Shenker S. (2019).  Stable and Practical AS Relationship Inference with ProbLink. Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’19).

Pages