Publications

Found 388 results
Author Title [ Type(Desc)] Year
Filters: Author is Scott J. Shenker  [Clear All Filters]
Conference Paper
Walfish, M., Vutukuru M., Balakrishnan H., Karger D. R., & Shenker S. J. (2006).  DDoS Defense by Offense. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 303-314.
Tavakoli, A., Chu D., Hellerstein J. M., Levis P., & Shenker S. J. (2007).  A Declarative Sensornet Architecture. 55-60.
Alizadeh, M., Yang S., Katti S., McKeown N., Prabhakar B., & Shenker S. J. (2012).  Deconstructing Datacenter Packet Transport. 133-138.
McCauley, M., Zhao M., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. J. (2016).  The Deforestation of L2.
Zaharia, M., Borthakur D., Sarma J. Sen, Elmeleegy K., Shenker S. J., & Stoica I. (2010).  Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling. 265-278.
Chu, D., Popa L., Tavakoli A., Hellerstein J. M., Levis P., Shenker S. J., et al. (2007).  The Design and Implementation of a Declarative Sensor Network System. 175-188.
Anderson, T., Shenker S. J., Stoica I., & Wetherall D. (2002).  Design Guidelines for Robust Internet Protocols. Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I).
Greenstein, B., Estrin D., Govindan R., Ratnasamy S., & Shenker S. J. (2003).  DIFS: A Distributed Index for Features in Sensor Networks. Proceedings of the First IEEE Workshop on Sensor Networks Protocols and Applications 2003 (SNPA). 163-173.
Zaharia, M., Das T., Li H., Shenker S. J., & Stoica I. (2012).  Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters. 1-6.
Ananthanarayanan, G., Ghodsi A., Shenker S. J., & Stoica I. (2011).  Disk-Locality in Datacenter Computing Considered Irrelevant. 1-5.
Feigenbaum, J., & Shenker S. J. (2002).  Distributed Algorithmic Mechanism Design: Recent Results and Future Directions. Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM'02). 1-13.
Walfish, M., Zamfirescu J.. D., Balakrishnan H., Karger D. R., & Shenker S. J. (2006).  Distributed Quota Enforcement for Spam Control. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 281-296.
Zheng, C., Shen G., Li S., & Shenker S. J. (2006).  Distributed Segment Tree: Support Range Query and Cover Query over DHT. Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS).
Chun, B-G., Maniatis P., & Shenker S. J. (2008).  Diverse Replication for Single-Machine Byzantine-Fault Tolerance. 287-292.
Ghodsi, A., Zaharia M., Hindman B., Konwinski A., Shenker S. J., & Stoica I. (2011).  Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters. 323-336.
Walfish, M., Balakrishnan H., Karger D. R., & Shenker S. J. (2005).  DoS: Fighting Fire with Fire. Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV).
Bansal, D., Balakrishnan H., Floyd S., & Shenker S. J. (2001).  Dynamic Behavior of Slowly-Responsive Congestion Control Algorithms. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '01). 263-274.
Friedman, E., Racz M. Z., & Shenker S. J. (2015).  Dynamic Budget-Constrained Pricing in the Cloud.
Ananthanarayanan, G., Ghodsi A., Shenker S. J., & Stoica I. (2013).  Effective Straggler Mitigation: Attack of the Clones. 185-198.
Shenker, S. J. (1990).  Efficient Network Allocations with Selfish Users. Proceedings of the 14th IFIP WG 7.3 International Symposium on Computer Performance Modelling, Measurement and Evaluation (Performance '90). 279-285.
McCauley, J., Harchol Y., Panda A., Raghavan B., & Shenker S. J. (2019).   Enabling a permanent revolution in internet architecture. Proceedings of the ACM Special Interest Group on Data Communication SIGCOMM '19.
Breslau, L., Knightly E. W., Shenker S. J., Stoica I., & Zhang H. (2000).  Endpoint Admission Control: Architectural Issues and Performance. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.
B. Loo, T., Hellerstein J. M., Huebsch R., Shenker S. J., & Stoica I. (2004).  Enhancing P2P File-Sharing with an Internet-Scale Query Processor. Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004). 432-443.
Liu, J., Panda A., Singla A., P. Godfrey B., Schapira M., & Shenker S. J. (2013).  Ensuring Connectivity via Data Plane Mechanisms. 113-126.
Demers, A. J., Greene D., Hauser C., Irish W., Larson J., Shenker S. J., et al. (1987).  Epidemic Algorithms for Replicated Database Maintenance. Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing (PODC '87). 1-12.

Pages