The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Paul Barford: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, Raghu Ramakrishnan
    Toward a Query Language for Network Attack Data. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2006, pp:28- [Conf]
  2. Paul Barford, Jeffery Kline, David Plonka, Amos Ron
    A signal analysis of network traffic anomalies. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2002, pp:71-82 [Conf]
  3. Joel Sommers, Paul Barford
    Self-configuring network traffic generation. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2004, pp:68-81 [Conf]
  4. Joel Sommers, Vinod Yegneswaran, Paul Barford
    A framework for malicious workload generation. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2004, pp:82-87 [Conf]
  5. Yolanda Tsang, Mehmet Can Yildiz, Paul Barford, Robert D. Nowak
    Network radar: tomography from round trip time measurements. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2004, pp:175-180 [Conf]
  6. Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry L. Peterson
    Characteristics of internet background radiation. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2004, pp:27-40 [Conf]
  7. Paul Barford, Azer Bestavros, John W. Byers, Mark Crovella
    On the marginal utility of network topology measurements. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2001, pp:5-17 [Conf]
  8. Paul Barford, David Plonka
    Characteristics of network traffic flow anomalies. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2001, pp:69-73 [Conf]
  9. Mark Crovella, Paul Barford
    The Network Effects of Prefetching. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1998, pp:1232-1239 [Conf]
  10. Joel Sommers, Paul Barford, Walter Willinger
    A Proposed Framework for Calibration of Available Bandwidth Estimation Tools. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:709-718 [Conf]
  11. Shilpi Agarwal, Joel Sommers, Paul Barford
    Scalable Network Path Emulation. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2005, pp:219-228 [Conf]
  12. Vinod Yegneswaran, Paul Barford, Somesh Jha
    Global Intrusion Detection in the DOMINO Overlay System. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  13. Vinod Yegneswaran, Paul Barford, David Plonka
    On the Design and Use of Internet Sinks for Network Abuse Monitoring. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:146-165 [Conf]
  14. Paul Barford, Mark Crovella
    Critical path analysis of TCP transactions. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2000, pp:127-138 [Conf]
  15. Joel Sommers, Paul Barford, Nick G. Duffield, Amos Ron
    Improving accuracy in end-to-end packet loss measurement. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2005, pp:157-168 [Conf]
  16. Paul Barford, Mark Crovella
    Generating Representative Web Workloads for Network and Server Performance Evaluation. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1998, pp:151-160 [Conf]
  17. Paul Barford, Mark Crovella
    A Performance Evaluation of Hyper Text Transfer Protocols. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1999, pp:188-197 [Conf]
  18. Joel Sommers, Hyungsuk Kim, Paul Barford
    Harpoon: a flow-level traffic generator for router and network tests. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2004, pp:392- [Conf]
  19. Vinod Yegneswaran, Paul Barford, Johannes Ullrich
    Internet intrusions: global characteristics and prevalence. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2003, pp:138-147 [Conf]
  20. Lei Chen 0003, Raghu Ramakrishnan, Paul Barford, Bee-Chung Chen, Vinod Yegneswaran
    Composite Subset Measures. [Citation Graph (0, 0)][DBLP]
    VLDB, 2006, pp:403-414 [Conf]
  21. Paul Barford, Lawrence H. Landweber
    Bench-style network research in an Internet Instance Laboratory. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:3, pp:21-26 [Journal]
  22. Jim Gast, Paul Barford
    Representing the Internet as a succinct forest. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:45, n:1, pp:35-44 [Journal]
  23. Paul Barford, Joel Sommers
    Comparing Probe- and Router-Based Packet-Loss Measurement. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2004, v:8, n:5, pp:50-56 [Journal]
  24. Paul Barford, Mark Crovella
    Measuring Web performance in the wide area. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS Performance Evaluation Review, 1999, v:27, n:2, pp:37-48 [Journal]
  25. Paul Barford, Mark Crovella
    Critical path analysis of TCP transactions. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2001, v:9, n:3, pp:238-248 [Journal]
  26. Paul Barford, Azer Bestavros, Adam Bradley, Mark Crovella
    Changes in Web Client Access Patterns: Characteristics and Caching Implications. [Citation Graph (0, 0)][DBLP]
    World Wide Web, 1999, v:2, n:1-2, pp:15-28 [Journal]
  27. Joel Sommers, Paul Barford, Walter Willinger
    Laboratory-based calibration of available bandwidth estimation tools. [Citation Graph (0, 0)][DBLP]
    Microprocessors and Microsystems, 2007, v:31, n:4, pp:222-235 [Journal]
  28. Joel Sommers, Paul Barford, Nick G. Duffield, Amos Ron
    A Framework for Multi-Objective SLA Compliance Monitoring. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2446-2450 [Conf]
  29. Joel Sommers, Paul Barford, Nick G. Duffield, Amos Ron
    Accurate and efficient SLA compliance monitoring. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:109-120 [Conf]
  30. Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin Zhu
    A machine learning approach to TCP throughput prediction. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2007, pp:97-108 [Conf]

  31. An Attacker-Defender Game for Honeynets. [Citation Graph (, )][DBLP]


  32. An active measurement system for shared environments. [Citation Graph (, )][DBLP]


  33. Context-aware clustering of DNS query traffic. [Citation Graph (, )][DBLP]


  34. Learning network structure from passive measurements. [Citation Graph (, )][DBLP]


  35. Power Awareness in Network Design and Routing. [Citation Graph (, )][DBLP]


  36. Spatial-Temporal Characteristics of Internet Malicious Sources. [Citation Graph (, )][DBLP]


  37. Network Performance Anomaly Detection and Localization. [Citation Graph (, )][DBLP]


  38. Estimating Hop Distance Between Arbitrary Host Pairs. [Citation Graph (, )][DBLP]


  39. Toward the Practical Use of Network Tomography for Internet Topology Discovery. [Citation Graph (, )][DBLP]


  40. A Learning-Based Approach for IP Geolocation. [Citation Graph (, )][DBLP]


  41. Router primitives for programmable active measurement. [Citation Graph (, )][DBLP]


  42. Network discovery from passive measurements. [Citation Graph (, )][DBLP]


  43. Critical path analysis of TCP transactions. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002