Publications

Found 388 results
Author [ Title(Desc)] Type Year
Filters: Author is Scott J. Shenker  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Zhang, W., Fang V., Panda A., & Shenker S. J. (2020).  Kappa: a programming framework for serverless computing. SoCC '20: Proceedings of the 11th ACM Symposium on Cloud Computing. 328-343.
Sankararaman, S., Chun B-G., Yatin C.., & Shenker S. J. (2005).  Key Consistency in DHTs.
L
Balakrishnan, H., Lakshminarayanan K., Ratnasamy S., Shenker S. J., Stoica I., & Walfish M. (2004).  A Layered Naming Architecture for the Internet. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2004). 343-352.
Kim, Y-J., Govindan R., Karp B., & Shenker S. J. (2006).  Lazy Cross-Link Removal for Geographic Routing. Proceedings of the 4th International Conference on Embedded Networked Sensor Systems (SenSys '06). 112-124.
Greenwald, A., Friedman E., & Shenker S. J. (2001).  Learning in Network Contexts: Experimental Results from Simulations. Games and Economic Behavior. 35(1), 80-123.
Fayazbakhsh, S. Kaveh, Lin Y., Tootoonchian A., Ghodsi A., Koponen T., Maggs B. M., et al. (2013).  Less Pain, Most of the Gain: Incrementally Deployable ICN. 147-158.
Heller, B., Scott C., McKeown N., Shenker S. J., Wundsam A., Zeng H., et al. (2013).  Leveraging SDN Layering to Systematically Troubleshoot Networks.
Subramanian, L., Roth V., Stoica I., Shenker S. J., & Katz R. H. (2004).  Listen and Whisper: Security Mechanisms for BGP. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 127-140.
Liu, C-G., Estrin D., Shenker S. J., & Zhang L. (1998).  Local error recovery in SRM: comparison of two approaches. Proceedings of IEEE/ACM Transactions on Networking. 6, 686-699.
Argyraki, K., Maniatis P., Irzak O.., Subramanian A.., & Shenker S. J. (2007).  Loss and Delay Accountability for the Internet. 194-205.
M
Bharghavan, V., Demers A. J., Shenker S. J., & Zhang L. (1994).  MACAW: A Media Access Protocol for Wireless LAN's. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94). 212-225.
Harchol, Y., Mushtaq A., Fang V., McCauley J. Murphy, Panda A., & Shenker S. J. (2020).  Making edge-computing resilient. SoCC '20: Proceedings of the 11th ACM Symposium on Cloud Computing. 253-266.
Chawathe, Y., Ratnasamy S., Breslau L., & Shenker S. J. (2003).  Making Gnutella-Like P2P Systems Scalable. Proceedings of ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM). 407-418.
Shenker, S. J. (1995).  Making Greed Work in Networks: A Game-Theoretic Analysis of Switch Service Disciplines. IEEE/ACM Transactions on Networking. 3(6), 819-831.
Raghavan, B., Koponen T., Ghodsi A., Brajkovic V., & Shenker S. J. (2012).  Making the Internet More Evolvable.
Shenker, S. J., Weinrib A., & Schooler E. (1994).  Managing Shared Ephemeral Teleconferencing State: Policy and Mechanism. Proceedings of the International COST 237 Workshop on Multimedia Transport and Teleservices. 69-88.
Jamin, S., Danzig P. B., Shenker S. J., & Zhang L. (1997).  A Measurement-Based Admission Control Algorithm for Integrated Services Packet Network. IEEE/ACM Transactions on Networking. 5(1), 56-70.
Feigenbaum, J., Sami R., & Shenker S. J. (2003).  Mechanism Design for Policy Routing.
Feigenbaum, J., Sami R., & Shenker S. J. (2004).  Mechanism Design for Policy Routing. Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004). 11-20.
Feigenbaum, J., Sami R., & Shenker S. J. (2006).  Mechanism Design for Policy Routing. Distributed Computing. 18, 11-20.
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A. D., Katz R. H., et al. (2010).  Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center.
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A. D., Katz R. H., et al. (2011).  Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center. 1-14.
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A. D., Katz R. H., et al. (2011).  Mesos: Flexible Resource Sharing for the Cloud. USENIX ;login:. 36(4), 37-45.
Walfish, M., Stribling J., Krohn M., Balakrishnan H., Morris R., & Shenker S. J. (2004).  Middleboxes No Longer Considered Harmful. Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI '04). 215-230.

Pages