Publications

Found 388 results
Author Title [ Type(Desc)] Year
Filters: Author is Scott J. Shenker  [Clear All Filters]
Conference Paper
Kim, Y-J., Govindan R., Karp B., & Shenker S. J. (2005).  On the Pitfalls of Geographic Face Routing. Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing. 34-43.
Seehra, A.., Naous J.., Walfish M., Mazieres D.., Nicolosi A.., & Shenker S. J. (2009).  A Policy Framework for the Future Internet. 1-6.
Ee, C. Tien, Ratnasamy S., & Shenker S. J. (2006).  Practical Data-Centric Storage. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 325-338.
Hinrichs, T. L., Gude N. S., Casado M., Mitchell J. C., & Shenker S. J. (2009).  Practical Declarative Network Management. 1-10.
Hu, X., Gupta A., Feamster N., Panda A., & Shenker S. J. (2018).  Preserving Privacy at IXPs. Proceedings of the 2nd Asia-Pacific Workshop on Networking APNet '18.
Arianfar, S., Koponen T., Raghavan B., & Shenker S. J. (2011).  On Preserving Privacy in Information-Centric Networks. 19-24.
Asharov, G., Demmler D., Sachapira M., Schneider T., Segev G., Shenker S. J., et al. (2017).  Privacy-Preserving Interdomain Routing at Internet Scale. Proceedings of PoPETs 2017.
Dutta, P., Culler D. E., & Shenker S. J. (2007).  Procrastination Might Lead to a Longer and More Useful Life. 1-7.
Mehta, A., Shenker S. J., & Vazirani V. V. (2003).  Profit Maximizing Multicast Pricing by Approximating Fixed Points (Extended Abstract). Proceedings of the Fourth ACM Conference on Electronic Commerce (EC '03). 218-219.
Argyraki, K., Maniatis P., Cheriton D., & Shenker S. J. (2004).  Providing Packet Obituaries. Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III).
Harchol, Y., Bergemann D., Feamster N., Friedman E., Krishnamurthy A., Panda A., et al. (2020).  A Public Option for the Core. SIGCOMM '20: Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication. 377-39.
Chun, B., Hellerstein J. M., Huebsch R., Jeffery S. R., Loo B. Thau, Mardanbeigi S., et al. (2004).  Querying at Internet Scale. Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '04). 935-936.
Huebsch, R., Hellerstein J. M., Lanham N.., Loo B. Thau, Shenker S. J., & Stoica I. (2003).  Querying the Internet with PIER. Proceedings of the 29th International Conference on Very Large Data Bases (VLDB 2003). 321-332.
Karp, R. M., Schindelhauer C., Shenker S. J., & Vocking B.. (2000).  Randomized Rumor Spreading. Proceedings of the IEEE 41st Annual Symposium on Foundations of Computer Science (FOCS 2000). 565-574.
Gummadi, R., Kothari N., Kim Y-J., Govindan R., Karp B., & Shenker S. J. (2004).  Reduced State Routing in the Internet. Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III).
Ermolinskiy, A., & Shenker S. J. (2008).  Reducing Transient Disconnectivity Using Anomaly-Cognizant Forwarding. 91-96.
Subramanian, L., Katz R. H., Roth V., Shenker S. J., & Stoica I. (2005).  Reliable Broadcast in Unknown Fixed-Identity Networks. Proceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC 2005). 342-351.
Amaro, E., Luo Z., Ousterhout A., Krishnamurthy A., Panda A., Ratnasamy S., et al. (2020).  Remote Memory Calls. HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 38-44.
Geels, D.., Altekar G.., Shenker S. J., & Stoica I. (2006).  Replay Debugging for Distributed Applications. Proceedings of the 2006 USENIX Annual Technical Conference. 289-300.
Cohen, E., & Shenker S. J. (2002).  Replication Strategies in Unstructured Peer-to-Peer Networks. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 177-190.
Feigenbaum, J., P. Godfrey B., Panda A., Schapira M., Shenker S. J., & Singla A. (2012).  On the Resilience of Routing Tables. 1-7.
Zaharia, M., Chowdhury M., Das T., Dave A., Ma J., McCauley M., et al. (2012).  Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. 1-14.
Ee, C. Tien, Ramachandran V., Chun B-G., Lakshminarayanan K., & Shenker S. J. (2007).  Resolving Inter-Domain Policy Disputes. 157-168.
Tootoonchian, A., Panda A., Lan C., Walls M., Argyraki K., Ratnasamy S., et al. (2018).  ResQ: Enabling SLOs in Network Function Virtualization. Proceedings of NSDI 2018.
Moon, D., Casado M., Koponen T., & Shenker S. J. (2008).  Rethinking Packet Forwarding Hardware. 1-6.

Pages