Publications

Found 376 results
Author Title [ Type(Asc)] Year
Filters: Author is Scott Shenker  [Clear All Filters]
Conference Paper
Phillips, G., Shenker S., & Tangmunarunkit H. (1999).  Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling Law. Proceedings of the ACM Annual Conference of the Special Interest Group on Data Communication (SIGCOMM). 41-51.
Yu, H., Breslau L., & Shenker S. (1999).  A Scalable Web Cache Consistency Architecture. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '99). 163-174.
Ratnasamy, S., Francis P., Handley M., Karp R. M., & Shenker S. (2001).  A Scalable Content-Addressable Network. Proceedings of ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. 161-172.
Casado, M., Garfinkel T., Akella A., Freedman M. J., Boneh D.., McKeown N., et al. (2006).  SANE: A Protection Architecture for Enterprise Networks. Proceedings of the 15th USENIX Security Symposium (Security '05).
Lakshminarayanan, K., Stoica I., & Shenker S. (2004).  Routing as a Service. Proceedings of the Service Architecture for Heterogeneous Access, Resources, and Applications Retreat (SAHARA 2004).
Ratnasamy, S., Stoica I., & Shenker S. (2002).  Routing Algorithms for DHTs: Some Open Questions. Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS). 45-52.
Castro, I., Panda A., Raghavan B., Shenker S., & Gorinsky S. (2015).  Route Bazaar: Automatic Interdomain Contract Negotiation.
Sherry, J., Gao P. X., Basu S., Panda A., Krishnamurthy A., Maciocco C., et al. (2015).  Rollback-Recovery for Middleboxes.
Caesar, M., Condie T.., Kannan J., Lakshminarayanan K., Shenker S., & Stoica I. (2006).  ROFL: Routing on Flat Labels. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 363-374.
Heller, B., Erickson D., McKeown N., Griffith R., Ganichev I., Whyte S., et al. (2010).  Ripcord: A Modular Platform for Data Center Networking. 457-458.
Mittal, R., Shpiner A., Panda A., Zahavi E., Krishnamurthy A., Ratnasamy S., et al. (2018).  Revisiting network support for RDMA. Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication SIGCOMM '18.
Ratnasamy, S., Ermolinskiy A., & Shenker S. (2006).  Revisiting IP Multicast. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 15-26.
Moon, D., Casado M., Koponen T., & Shenker S. (2008).  Rethinking Packet Forwarding Hardware. 1-6.
Tootoonchian, A., Panda A., Lan C., Walls M., Argyraki K., Ratnasamy S., et al. (2018).  ResQ: Enabling SLOs in Network Function Virtualization. Proceedings of NSDI 2018.
Ee, C. Tien, Ramachandran V., Chun B-G., Lakshminarayanan K., & Shenker S. (2007).  Resolving Inter-Domain Policy Disputes. 157-168.
Zaharia, M., Chowdhury M., Das T., Dave A., Ma J., McCauley M., et al. (2012).  Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. 1-14.
Feigenbaum, J., P. Godfrey B., Panda A., Schapira M., Shenker S., & Singla A. (2012).  On the Resilience of Routing Tables. 1-7.
Cohen, E., & Shenker S. (2002).  Replication Strategies in Unstructured Peer-to-Peer Networks. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 177-190.
Geels, D.., Altekar G.., Shenker S., & Stoica I. (2006).  Replay Debugging for Distributed Applications. Proceedings of the 2006 USENIX Annual Technical Conference. 289-300.
Subramanian, L., Katz R. H., Roth V., Shenker S., & Stoica I. (2005).  Reliable Broadcast in Unknown Fixed-Identity Networks. Proceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC 2005). 342-351.
Ermolinskiy, A., & Shenker S. (2008).  Reducing Transient Disconnectivity Using Anomaly-Cognizant Forwarding. 91-96.
Gummadi, R., Kothari N., Kim Y-J., Govindan R., Karp B., & Shenker S. (2004).  Reduced State Routing in the Internet. Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III).
Karp, R. M., Schindelhauer C., Shenker S., & Vocking B.. (2000).  Randomized Rumor Spreading. Proceedings of the IEEE 41st Annual Symposium on Foundations of Computer Science (FOCS 2000). 565-574.
Huebsch, R., Hellerstein J. M., Lanham N.., Loo B. Thau, Shenker S., & Stoica I. (2003).  Querying the Internet with PIER. Proceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003). 321-332.
Chun, B., Hellerstein J. M., Huebsch R., Jeffery S. R., Loo B. Thau, Mardanbeigi S., et al. (2004).  Querying at Internet Scale. Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '04). 935-936.

Pages