Publications

Found 377 results
Author Title [ Type(Desc)] Year
Filters: Author is Scott Shenker  [Clear All Filters]
Conference Paper
Jin, Y., Scott C., Dhamdhere A., Giotsas V., Krishnamurthy A., & Shenker S. (2019).  Stable and Practical AS Relationship Inference with ProbLink. Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’19).
Cocchi, R., Estrin D., Shenker S., & Zhang L. (1991).  A Study of Priority Pricing in Multiple Service Class Networks. Proceedings of the ACM SIGCOMM '91 Conference on Communications Architecture & Protocols. 123-130.
Mitzel, D. J., Estrin D., Shenker S., & Zhang L. (1996).  A Study of Reservation Dynamics in Integrated Services Packet Networks. Proceedings of the 15th IEEE Annual Joint Conference on Networking the Next Generation. 2, 871-879.
Clark, D. D., Shenker S., & Zhang L. (1992).  Supporting Real-Time Applications in an Integrated Services Packet Network: Architecture and Mechanism. Proceedings of the ACM SIGCOMM '92 Conference on Communications Architecture & Protocols. 14-26.
McCauley, M., Sheng A., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. (2015).  Taking an AXE to L2 Spanning Trees.
Shenker, S. (1990).  A Theoretical Analysis of Feedback Flow Control. Proceedings of the ACM SIGCOMM Symposium on Communications Architectures & Protocols. 156-165.
Chun, B-G., Maniatis P., Shenker S., & Kubiatowicz J. D. (2009).  Tiered Fault Tolerance for Long-Term Integrity. 267-282.
Ratnasamy, S., Handley M., Karp R. M., & Shenker S. (2002).  Topologically-Aware Overlay Construction and Server Selection. Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002). 3, 1190-1199.
Demmer, M., Fall K., Koponen T., & Shenker S. (2007).  Towards a Modern Communications API. Proceedings of the 6th ACM Workshop on Hot Topics in Networks (HotNets-VI). 1-7.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao Z. Morley, Shenker S., et al. (2004).  Towards a Next Generation Inter-domain Routing Protocol. Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California.
Culler, D. E., Dutta P., Ee C. Tien, Fonseca R., Hui J., Levis P., et al. (2005).  Towards a Sensor Network Architecture: Lowering the Waistline. Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS X). 10, 24-30.
Bergemann, D., Feigenbaum J., Shenker S., & Smith J. M. (2004).  Towards an Economic Analysis of Trusted Systems (Position Paper). Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota.
Ratnasamy, S., Shenker S., & McCanne S. (2005).  Towards an Evolvable Internet Architecture. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 313-324.
Chang, H., Govindan R., Jamin S., Shenker S., & Willinger W. (2002).  Towards Capturing Representative AS-Level Internet Topologies. Proceedings of the International Conference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 280-281.
Levis, P., Patel N., Culler D. E., & Shenker S. (2004).  Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 15-28.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
Shenker, S., & Breslau L. (1995).  Two Issues in Reservation Establishment. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '95). 14-26.
Polastre, J., Hui J., Levis P., Zhao J., Culler D. E., Shenker S., et al. (2005).  A Unifying Link Abstraction for Wireless Sensor Networks. Proceedings of the Third ACM Conference on Embedded Networked Sensor Systems (Sensys 2005). 76-89.
Walfish, M., Balakrishnan H., & Shenker S. (2004).  Untangling the Web from DNS. Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004). 225-238.
Panda, A., Sagiv M., & Shenker S. (2017).  Verification in the Age of Microservices. Proceedings of the 16th Workshop on Hot Topics in Operating Systems HotOS'17.
Panda, A., Lahav O., Argyraki K. J., Sagiv M., & Shenker S. (2017).  Verifying Reachability in Networks with Mutable Datapaths. Proceedings of NSDI '17.
Casado, M., Koponen T., Ramanathan R., & Shenker S. (2010).  Virtualizing the Network Forwarding Plane. 1-6.
Breslau, L., Cao P., Fan L., Phillips G., & Shenker S. (1999).  Web Caching and Zipf-Like Distributions: Evidence and Implications. Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '99). 1, 126-134.
Ananthanarayanan, G., Ghodsi A., Shenker S., & Stoica I. (2012).  Why Let Resources Idle? Aggressive Cloning of Jobs with Dolly. 1-6.
Fonseca, R., Porter G. Manning, Katz R. H., Shenker S., & Stoica I. (2007).  X-Trace: A Pervasive Network Tracing Framework. Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007). 271-284.

Pages