Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Conference Paper
McCauley, J., Harchol Y., Panda A., Raghavan B., & Shenker S. J. (2019).   Enabling a permanent revolution in internet architecture. Proceedings of the ACM Special Interest Group on Data Communication SIGCOMM '19.
Allman, M., Christensen K.., Nordman B., & Paxson V. (2007).  Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems.
Heppin, K.. F., & Petruck M. R. L. (2014).  Encoding of Compounds in Swedish FrameNet.
Breslau, L., Knightly E. W., Shenker S. J., Stoica I., & Zhang H. (2000).  Endpoint Admission Control: Architectural Issues and Performance. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.
Paxson, V. (1997).  End-to-End Internet Packet Dynamics. Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
Schulz, P., Ong L., Littlewood P., Abdullah B., Simsek M., & Fettweis G. (2019).  End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic. Proceedings of the IEEE International Conference on Communications 2019.
Raghavan, B., & Ma J. (2011).  The Energy and Emergy of the Internet.
Ruiz, P. M., & Gómez-Skarmeta A. (2004).  Enhanced Internet Connectivity for Hybrid Ad Hoc Networks Through Adaptive Gateway Discovery. Proceedings of the 29th Annual IEEE Conference on Local Computer Networks.
Sommer, R., & Paxson V. (2003).  Enhancing Byte-Level Network Intrusion Detection Signatures with Context. Proceedings of ACM CCS.
Wang, J., Majumdar A., & Ramchandran K. (2005).  On Enhancing MPEG Video Broadcast Over Wireless Networks with an Auxiliary Broadcast Channel. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005).
Gonzalez, J. Maria, & Paxson V. (2006).  Enhancing Network Intrusion Detection With Integrated Sampling and Filtering. Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006). 272-289.
B. Loo, T., Hellerstein J. M., Huebsch R., Shenker S. J., & Stoica I. (2004).  Enhancing P2P File-Sharing with an Internet-Scale Query Processor. Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004). 432-443.
Dreger, H., Kreibich C., Paxson V., & Sommer R. (2005).  Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005). 206-221.
Maier, G., Sommer R., Dreger H., Feldmann A., Paxson V., & Schneider F. (2008).  Enriching Network Security Analysis with Time Travel. 183-194.
Liu, J., Panda A., Singla A., P. Godfrey B., Schapira M., & Shenker S. J. (2013).  Ensuring Connectivity via Data Plane Mechanisms. 113-126.
Goebel, C., Krasnova H., Hildebrand T., Günther O., & Bidault F. (2008).  Enterprise Software Adoption and Perceived Business Performance—An Empirical Investigation in Germany and the U.S..
Magimai-Doss, M., Hakkani-Tür D., etin Ö. Ç., Shriberg E., Fung J., & Mirghafori N. (2007).  Entropy Based Classifier Combination for Sentence Segmentation. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 189-192.
Goebel, C., Tribowski C., & Günther O. (2009).  EPCIS-Based Supply Chain Event Management—A Quantitative Comparison of Candidate System Architectures. 494-499.
Demers, A. J., Greene D., Hauser C., Irish W., Larson J., Shenker S. J., et al. (1987).  Epidemic Algorithms for Replicated Database Maintenance. Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing (PODC '87). 1-12.
Fillmore, C. J. (1990).  Epistemic Stance and Grammatical Form in English Conditional Sentences. Papers from the 26th Regional Meeting of the Chicago Linguistic Society (CLS 26). 137-162.
Floyd, S., Handley M., Padhye J., & Widmer J. (2000).  Equation-Based Congestion Control for Unicast Applications. Proceedings of ACM SIGCOMM 2000.
Lopes, M.. E., Wang S.., & Mahoney M. (2018).  Error Estimation for Randomized Least-Squares Algorithms via the Bootstrap. Proceedings of the 35th ICML Conference. 3223-3232.
Allman, M., & Paxson V. (2001).  On Estimating End-to-End Network Path Properties. ACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean.
Allman, M., & Paxson V. (1999).  On Estimating End-to-End Network Path Properties. ACM SIGCOMM.
Halperin, E., & Hazan E. (2005).  Estimating Haplotype Frequencies Efficiently. Proceedings of the 9th Annual International Conference on Research in Computational Molecular Biology (RECOMB'05). 553-568.

Pages