Search the dblp DataBase
Scott Shenker :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Alan J. Demers , Daniel H. Greene , Carl Hauser , Wes Irish , John Larson , Scott Shenker , Howard E. Sturgis , Daniel C. Swinehart , Douglas B. Terry Epidemic Algorithms for Replicated Database Maintenance. [Citation Graph (11, 0)][DBLP ] PODC, 1987, pp:1-12 [Conf ] Hans-Juergen Boehm , Alan J. Demers , Scott Shenker Mostly Parallel Garbage Collection. [Citation Graph (1, 0)][DBLP ] PLDI, 1991, pp:157-164 [Conf ] David D. Clark , Scott Shenker , Lixia Zhang Supporting Real-Time Applications in an Integrated Services Packet Network: Architecture and Mechanism. [Citation Graph (1, 0)][DBLP ] SIGCOMM, 1992, pp:14-26 [Conf ] Ryan Huebsch , Brent N. Chun , Joseph M. Hellerstein , Boon Thau Loo , Petros Maniatis , Timothy Roscoe , Scott Shenker , Ion Stoica , Aydan R. Yumerefendi The Architecture of PIER: an Internet-Scale Query Processor. [Citation Graph (0, 0)][DBLP ] CIDR, 2005, pp:28-43 [Conf ] Scott Shenker , Abel Weinrib , Eve M. Schooler Managing Shared Ephemeral Teleconferencing State: Policy and Mechanism. [Citation Graph (0, 0)][DBLP ] COST 237 Workshop, 1994, pp:69-88 [Conf ] Joan Feigenbaum , Scott Shenker Distributed algorithmic mechanism design: recent results and future directions. [Citation Graph (0, 0)][DBLP ] DIAL-M, 2002, pp:1-13 [Conf ] Young-Jin Kim , Ramesh Govindan , Brad Karp , Scott Shenker On the pitfalls of geographic face routing. [Citation Graph (0, 0)][DBLP ] DIALM-POMC, 2005, pp:34-43 [Conf ] Richard M. Karp , Elias Koutsoupias , Christos H. Papadimitriou , Scott Shenker Optimization Problems in Congestion Control. [Citation Graph (0, 0)][DBLP ] FOCS, 2000, pp:66-74 [Conf ] Richard M. Karp , Christian Schindelhauer , Scott Shenker , Berthold Vöcking Randomized Rumor Spreading. [Citation Graph (0, 0)][DBLP ] FOCS, 2000, pp:565-574 [Conf ] F. Frances Yao , Alan J. Demers , Scott Shenker A Scheduling Model for Reduced CPU Energy. [Citation Graph (0, 0)][DBLP ] FOCS, 1995, pp:374-382 [Conf ] Joan Feigenbaum , Arvind Krishnamurthy , Rahul Sami , Scott Shenker Hardness Results for Multicast Cost Sharing. [Citation Graph (0, 0)][DBLP ] FSTTCS, 2002, pp:133-144 [Conf ] Qin Lv , Pei Cao , Edith Cohen , Kai Li , Scott Shenker Search and replication in unstructured peer-to-peer networks. [Citation Graph (0, 0)][DBLP ] ICS, 2002, pp:84-95 [Conf ] Eddie Kohler , Jinyang Li , Vern Paxson , Scott Shenker Observed structure of addresses in IP traffic. [Citation Graph (0, 0)][DBLP ] Internet Measurement Workshop, 2002, pp:253-266 [Conf ] Lee Breslau , Pei Cao , Li Fan , Graham Phillips , Scott Shenker Web Caching and Zipf-like Distributions: Evidence and Implications. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1999, pp:126-134 [Conf ] Lee Breslau , Sugih Jamin , Scott Shenker Comments on the Performance of Measurement-Based Admission Control Algorithms. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2000, pp:1233-1242 [Conf ] Qian Chen , Hyunseok Chang , Ramesh Govindan , Sugih Jamin , Scott Shenker , Walter Willinger The Origin of Power-Laws in Internet Topologies Revisited. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2002, pp:- [Conf ] Sugih Jamin , Scott Shenker , Peter B. Danzig Comparison of Measurement-Based Call Admission Control Algorithms for Controlled-Load Service. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1997, pp:973-980 [Conf ] Danny J. Mitzel , Deborah Estrin , Scott Shenker , Lixia Zhang An Architectural Comparison of ST-II and RSVP. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1994, pp:716-725 [Conf ] Danny J. Mitzel , Deborah Estrin , Scott Shenker , Lixia Zhang A Study of Reservation Dynamics in Integrated Services Packet Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1996, pp:871-879 [Conf ] Sylvia Ratnasamy , Mark Handley , Richard M. Karp , Scott Shenker Topologically-Aware Overlay Construction and Server Selection. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2002, pp:- [Conf ] Ion Stoica , Hui Zhang , Scott Shenker Self-Verifying CSFQ. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2002, pp:- [Conf ] Hongsuda Tangmunarunkit , Ramesh Govindan , Scott Shenker , Deborah Estrin The Impact of Routing Policy on Internet Paths. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2001, pp:736-742 [Conf ] Qin Lv , Sylvia Ratnasamy , Scott Shenker Can Heterogeneity Make Gnutella Scalable? [Citation Graph (0, 0)][DBLP ] IPTPS, 2002, pp:94-103 [Conf ] Sylvia Ratnasamy , Ion Stoica , Scott Shenker Routing Algorithms for DHTs: Some Open Questions. [Citation Graph (0, 0)][DBLP ] IPTPS, 2002, pp:45-52 [Conf ] Hari Balakrishnan , Scott Shenker , Michael Walfish Semantic-Free Referencing in Linked Distributed Systems. [Citation Graph (0, 0)][DBLP ] IPTPS, 2003, pp:197-206 [Conf ] Hari Balakrishnan , Scott Shenker , Michael Walfish Peering Peer-to-Peer Providers. [Citation Graph (0, 0)][DBLP ] IPTPS, 2005, pp:104-114 [Conf ] Ion Stoica , Daniel Adkins , Sylvia Ratnasamy , Scott Shenker , Sonesh Surana , Shelley Zhuang Internet Indirection Infrastructure. [Citation Graph (0, 0)][DBLP ] IPTPS, 2002, pp:191-202 [Conf ] Jeremy Stribling , Isaac G. Councill , Jinyang Li , M. Frans Kaashoek , David R. Karger , Robert Morris , Scott Shenker OverCite: A Cooperative Digital Research Library. [Citation Graph (0, 0)][DBLP ] IPTPS, 2005, pp:69-79 [Conf ] Matthew Harren , Joseph M. Hellerstein , Ryan Huebsch , Boon Thau Loo , Scott Shenker , Ion Stoica Complex Queries in DHT-based Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP ] IPTPS, 2002, pp:242-259 [Conf ] Brad Karp , Sylvia Ratnasamy , Sean C. Rhea , Scott Shenker Spurring Adoption of DHTs with OpenHash, a Public DHT Service. [Citation Graph (0, 0)][DBLP ] IPTPS, 2004, pp:195-205 [Conf ] Randy H. Katz , George Porter , Scott Shenker , Ion Stoica , Mel Tsai COPS: Quality of Service vs. Any Service at All. [Citation Graph (0, 0)][DBLP ] IWQoS, 2005, pp:3-15 [Conf ] Jeremy Elson , Richard M. Karp , Christos H. Papadimitriou , Scott Shenker Global Synchronization in Sensornets. [Citation Graph (0, 0)][DBLP ] LATIN, 2004, pp:609-624 [Conf ] Ananth Rao , Christos H. Papadimitriou , Scott Shenker , Ion Stoica Geographic routing without location information. [Citation Graph (0, 0)][DBLP ] MOBICOM, 2003, pp:96-108 [Conf ] Sylvia Ratnasamy , Brad Karp , Li Yin , Fang Yu , Deborah Estrin , Ramesh Govindan , Scott Shenker GHT: a geographic hash table for data-centric storage. [Citation Graph (0, 0)][DBLP ] WSNA, 2002, pp:78-87 [Conf ] Deepak Ganesan , Ramesh Govindan , Scott Shenker , Deborah Estrin Highly-resilient, energy-efficient multipath routing in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] MobiHoc, 2001, pp:251-254 [Conf ] Shelley Zhuang , Kevin Lai , Ion Stoica , Randy H. Katz , Scott Shenker Host Mobility Using an Internet Indirection Infrastructure. [Citation Graph (0, 0)][DBLP ] MobiSys, 2003, pp:- [Conf ] Sylvia Ratnasamy , Mark Handley , Richard M. Karp , Scott Shenker Application-Level Multicast Using Content-Addressable Networks. [Citation Graph (0, 0)][DBLP ] Networked Group Communication, 2001, pp:14-29 [Conf ] Sugih Jamin , Scott Shenker , Lixia Zhang , David D. Clark An Admission Control Algorithm for Predictive Real-Time Service (Extended Abstract). [Citation Graph (0, 0)][DBLP ] NOSSDAV, 1992, pp:349-356 [Conf ] Philip Levis , Neil Patel , David E. Culler , Scott Shenker Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP ] NSDI, 2004, pp:15-28 [Conf ] Lakshminarayanan Subramanian , Volker Roth , Ion Stoica , Scott Shenker , Randy H. Katz Listen and Whisper: Security Mechanisms for BGP (Awarded Best Student Paper!). [Citation Graph (0, 0)][DBLP ] NSDI, 2004, pp:127-140 [Conf ] Michael Walfish , Jeremy Stribling , Maxwell N. Krohn , Hari Balakrishnan , Robert Morris , Scott Shenker Middleboxes No Longer Considered Harmful. [Citation Graph (0, 0)][DBLP ] OSDI, 2004, pp:215-230 [Conf ] Mark Weiser , Brent B. Welch , Alan J. Demers , Scott Shenker Scheduling for Reduced CPU Energy. [Citation Graph (0, 0)][DBLP ] OSDI, 1994, pp:13-23 [Conf ] Cheng Tien Ee , Rodrigo Fonseca , Sukun Kim , Daekyeong Moon , Arsalan Tavakoli , David E. Culler , Scott Shenker , Ion Stoica A Modular Network Layer for Sensornets. [Citation Graph (0, 0)][DBLP ] OSDI, 2006, pp:249-262 [Conf ] Scott Shenker Efficient Network Allocations with Selfish Users. [Citation Graph (0, 0)][DBLP ] Performance, 1990, pp:279-285 [Conf ] Alex Fabrikant , Ankur Luthra , Elitza N. Maneva , Christos H. Papadimitriou , Scott Shenker On a network creation game. [Citation Graph (0, 0)][DBLP ] PODC, 2003, pp:347-351 [Conf ] Joan Feigenbaum , Christos H. Papadimitriou , Rahul Sami , Scott Shenker A BGP-based mechanism for lowest-cost routing. [Citation Graph (0, 0)][DBLP ] PODC, 2002, pp:173-182 [Conf ] Joan Feigenbaum , Rahul Sami , Scott Shenker Mechanism design for policy routing. [Citation Graph (0, 0)][DBLP ] PODC, 2004, pp:11-20 [Conf ] Sriram Ramabhadran , Sylvia Ratnasamy , Joseph M. Hellerstein , Scott Shenker Brief announcement: prefix hash tree. [Citation Graph (0, 0)][DBLP ] PODC, 2004, pp:368- [Conf ] Lakshminarayanan Subramanian , Randy H. Katz , Volker Roth , Scott Shenker , Ion Stoica Reliable broadcast in unknown fixed-identity networks. [Citation Graph (0, 0)][DBLP ] PODC, 2005, pp:342-351 [Conf ] Alan J. Demers , Mark Weiser , Barry Hayes , Hans-Juergen Boehm , Daniel G. Bobrow , Scott Shenker Combining Generational and Conservative Garbage Collection: Framework and Implementations. [Citation Graph (0, 0)][DBLP ] POPL, 1990, pp:261-269 [Conf ] Fang Bian , Ramesh Govindan , Scott Shenker , Xin Li Using hierarchical location names for scalable routing and rendezvous in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2004, pp:305-306 [Conf ] Young-Jin Kim , Ramesh Govindan , Brad Karp , Scott Shenker Practical and robust geographic routing in wireless networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2004, pp:295-296 [Conf ] Joseph Polastre , Jonathan Hui , Philip Levis , Jerry Zhao , David E. Culler , Scott Shenker , Ion Stoica A unifying link abstraction for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2005, pp:76-89 [Conf ] Young-Jin Kim , Ramesh Govindan , Brad Karp , Scott Shenker Lazy cross-link removal for geographic routing. [Citation Graph (0, 0)][DBLP ] SenSys, 2006, pp:112-124 [Conf ] Lee Breslau , Edward W. Knightly , Scott Shenker , Ion Stoica , Hui Zhang Endpoint admission control: Architectural issues and performance. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2000, pp:57-69 [Conf ] Lee Breslau , Scott Shenker Best-Effort versus Reservations: A Simple Comparative Analysis. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1998, pp:3-16 [Conf ] Aditya Akella , Srinivasan Seshan , Richard M. Karp , Scott Shenker , Christos H. Papadimitriou Selfish behavior and stability of the internet: a game-theoretic analysis of TCP. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2002, pp:117-130 [Conf ] Sandeep Bajaj , Lee Breslau , Scott Shenker Uniform versus Priority Dropping for Layered Video. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1998, pp:131-143 [Conf ] Hari Balakrishnan , Karthik Lakshminarayanan , Sylvia Ratnasamy , Scott Shenker , Ion Stoica , Michael Walfish A layered naming architecture for the internet. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2004, pp:343-352 [Conf ] Yatin Chawathe , Sylvia Ratnasamy , Lee Breslau , Nick Lanham , Scott Shenker Making gnutella-like P2P systems scalable. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2003, pp:407-418 [Conf ] Yatin Chawathe , Sriram Ramabhadran , Sylvia Ratnasamy , Anthony LaMarca , Scott Shenker , Joseph M. Hellerstein A case study in building layered DHT applications. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2005, pp:97-108 [Conf ] Deepak Bansal , Hari Balakrishnan , Sally Floyd , Scott Shenker Dynamic behavior of slowly-responsive congestion control algorithms. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2001, pp:263-274 [Conf ] Vaduvur Bharghavan , Alan J. Demers , Scott Shenker , Lixia Zhang MACAW: A Media Access Protocol for Wireless LAN's. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1994, pp:212-225 [Conf ] Ron Cocchi , Deborah Estrin , Scott Shenker , Lixia Zhang A Study of Priority Pricing in Multiple Service Class Networks. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1991, pp:123-130 [Conf ] Edith Cohen , Scott Shenker Replication strategies in unstructured peer-to-peer networks. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2002, pp:177-190 [Conf ] Alan J. Demers , Srinivasan Keshav , Scott Shenker Analysis and Simulation of a Fair Queueing Algorithm. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1989, pp:1-12 [Conf ] Brighten Godfrey , Scott Shenker , Ion Stoica Minimizing churn in distributed systems. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2006, pp:147-158 [Conf ] P. Krishna Gummadi , Ramakrishna Gummadi , Steven D. Gribble , Sylvia Ratnasamy , Scott Shenker , Ion Stoica The impact of DHT routing geometry on resilience and proximity. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2003, pp:381-394 [Conf ] Shai Herzog , Scott Shenker , Deborah Estrin Sharing the ``Cost'' of Multicast Trees: An Axiomatic Analysis. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1995, pp:315-327 [Conf ] Sugih Jamin , Peter B. Danzig , Scott Shenker , Lixia Zhang A Measurement-Based Admission Control Algorithm for Integrated Services Packet Networks. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1995, pp:2-13 [Conf ] Graham Phillips , Scott Shenker , Hongsuda Tangmunarunkit Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling Law. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1999, pp:41-51 [Conf ] Lili Qiu , Yang Richard Yang , Yin Zhang , Scott Shenker On selfish routing in internet-like environments. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2003, pp:151-162 [Conf ] Danny J. Mitzel , Scott Shenker Asymptotic Resource Consumption in Multicast Reservation Styles. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1994, pp:226-233 [Conf ] Sylvia Ratnasamy , Andrey Ermolinskiy , Scott Shenker Revisiting IP multicast. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2006, pp:15-26 [Conf ] Sylvia Ratnasamy , Paul Francis , Mark Handley , Richard M. Karp , Scott Shenker A scalable content-addressable network. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2001, pp:161-172 [Conf ] Sylvia Ratnasamy , Scott Shenker , Steven McCanne Towards an evolvable internet architecture. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2005, pp:313-324 [Conf ] Sean C. Rhea , Brighten Godfrey , Brad Karp , John Kubiatowicz , Sylvia Ratnasamy , Scott Shenker , Ion Stoica , Harlan Yu OpenDHT: a public DHT service and its uses. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2005, pp:73-84 [Conf ] Scott Shenker A Theoretical Analysis of Feedback Flow Control. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1990, pp:156-165 [Conf ] Scott Shenker Making Greed Work in Networks: A Game-Theoretic Analysis of Switch Service Disciplines. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1994, pp:47-57 [Conf ] Scott Shenker , Lee Breslau Two Issues in Reservation Establishment. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1995, pp:14-26 [Conf ] Ion Stoica , Daniel Adkins , Shelley Zhuang , Scott Shenker , Sonesh Surana Internet indirection infrastructure. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2002, pp:73-86 [Conf ] Ion Stoica , Scott Shenker , Hui Zhang Core -Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1998, pp:118-130 [Conf ] Lakshminarayanan Subramanian , Matthew Caesar , Cheng Tien Ee , Mark Handley , Zhuoqing Morley Mao , Scott Shenker , Ion Stoica HLP: a next generation inter-domain routing protocol. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2005, pp:13-24 [Conf ] Hongsuda Tangmunarunkit , Ramesh Govindan , Sugih Jamin , Scott Shenker , Walter Willinger Network topology generators: degree-based vs. structural. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2002, pp:147-159 [Conf ] Michael Walfish , Mythili Vutukuru , Hari Balakrishnan , David R. Karger , Scott Shenker DDoS defense by offense. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2006, pp:303-314 [Conf ] Yin Zhang , Lee Breslau , Vern Paxson , Scott Shenker On the characteristics and origins of internet flow rates. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2002, pp:309-322 [Conf ] Lixia Zhang , Scott Shenker , David D. Clark Observations on the Dynamics of a Congestion Control Algorithm: The Effects of Two-Way Traffic. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1991, pp:133-147 [Conf ] Haobo Yu , Lee Breslau , Scott Shenker A Scalable Web Cache Consistency Architecture. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1999, pp:163-174 [Conf ] Joan Feigenbaum , Arvind Krishnamurthy , Rahul Sami , Scott Shenker Approximation and collusion in multicast cost sharing (extended abstract). [Citation Graph (0, 0)][DBLP ] ACM Conference on Electronic Commerce, 2001, pp:253-255 [Conf ] Joan Feigenbaum , Arvind Krishnamurthy , Rahul Sami , Scott Shenker Approximation and collusion in multicast cost sharing. [Citation Graph (0, 0)][DBLP ] ACM Conference on Electronic Commerce, 2003, pp:280- [Conf ] Michal Feldman , John Chuang , Ion Stoica , Scott Shenker Hidden-action in multi-hop routing. [Citation Graph (0, 0)][DBLP ] ACM Conference on Electronic Commerce, 2005, pp:117-126 [Conf ] Aranyak Mehta , Scott Shenker , Vijay V. Vazirani Profit-maximizing multicast pricing by approximating fixed points. [Citation Graph (0, 0)][DBLP ] ACM Conference on Electronic Commerce, 2003, pp:218-219 [Conf ] Sandeep Bajaj , Lee Breslau , Scott Shenker Is Service Priority Useful in Networks? [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1998, pp:66-77 [Conf ] Hyunseok Chang , Ramesh Govindan , Sugih Jamin , Scott Shenker , Walter Willinger Towards capturing representative AS-level Internet topologies. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2002, pp:280-281 [Conf ] Albert G. Greenberg , Scott Shenker , Alexander L. Stolyar Asynchronous Updates in Large Parallel Systems. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1996, pp:91-103 [Conf ] Qin Lv , Pei Cao , Edith Cohen , Kai Li , Scott Shenker Search and replication in unstructured peer-to-peer networks. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2002, pp:258-259 [Conf ] Suchitra Raman , Steven McCanne , Scott Shenker Asymptotic Behavior of Global Recovery in SRM. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1998, pp:90-99 [Conf ] Scott Shenker Some Conjectures on the Behavior of Acknowledgment-Based Transmission Control of Random Access Communication Channels. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1987, pp:245-255 [Conf ] Scott Shenker Making Flow Control Work in Networks: A Control-Theoretic Analysis of Gateway Service Disciplines. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1990, pp:239-240 [Conf ] Scott Shenker Making Greed Work in Networks: A Game-Theoretic Analysis of Gateway Service Disciplines. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1990, pp:241-242 [Conf ] Scott Shenker , Abel Weinrib Asymptotic Analysis of Large Heterogeneous Queueing Systems. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1988, pp:56-62 [Conf ] Brent N. Chun , Joseph M. Hellerstein , Ryan Huebsch , Shawn R. Jeffery , Boon Thau Loo , Sam Mardanbeigi , Timothy Roscoe , Sean C. Rhea , Scott Shenker , Ion Stoica Querying at Internet-Scale. [Citation Graph (0, 0)][DBLP ] SIGMOD Conference, 2004, pp:935-936 [Conf ] Joan Feigenbaum , Christos H. Papadimitriou , Scott Shenker Sharing the cost of muliticast transmissions (preliminary version). [Citation Graph (0, 0)][DBLP ] STOC, 2000, pp:218-227 [Conf ] Dennis Geels , Gautam Altekar , Scott Shenker , Ion Stoica Replay Debugging for Distributed Applications (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2006, pp:289-300 [Conf ] Ryan Huebsch , Joseph M. Hellerstein , Nick Lanham , Boon Thau Loo , Scott Shenker , Ion Stoica Querying the Internet with PIER. [Citation Graph (0, 0)][DBLP ] VLDB, 2003, pp:321-332 [Conf ] Boon Thau Loo , Joseph M. Hellerstein , Ryan Huebsch , Scott Shenker , Ion Stoica Enhancing P2P File-Sharing with an Internet-Scale Query Processor. [Citation Graph (0, 0)][DBLP ] VLDB, 2004, pp:432-443 [Conf ] Scott Shenker The Data-Centric Revolution in Networking. [Citation Graph (0, 0)][DBLP ] VLDB, 2003, pp:15- [Conf ] Benjamin Greenstein , Sylvia Ratnasamy , Scott Shenker , Ramesh Govindan , Deborah Estrin DIFS: a distributed index for features in sensor networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2003, v:1, n:2-3, pp:333-349 [Journal ] Thomas E. Anderson , Scott Shenker , Ion Stoica , David Wetherall Design guidelines for robust Internet protocols. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2003, v:33, n:1, pp:125-130 [Journal ] Ratul Mahajan , Steven M. Bellovin , Sally Floyd , John Ioannidis , Vern Paxson , Scott Shenker Aggregate congestion control. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:1, pp:69- [Journal ] Ratul Mahajan , Steven M. Bellovin , Sally Floyd , John Ioannidis , Vern Paxson , Scott Shenker Controlling high bandwidth aggregates in the network. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:3, pp:62-73 [Journal ] Rong Pan , Lee Breslau , Balaji Prabhakar , Scott Shenker Approximate fairness through differential dropping (summary). [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:1, pp:72- [Journal ] Rong Pan , Lee Breslau , Balaji Prabhakar , Scott Shenker Approximate fairness through differential dropping. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2003, v:33, n:2, pp:23-39 [Journal ] Scott Shenker , Sylvia Ratnasamy , Brad Karp , Ramesh Govindan , Deborah Estrin Data-centric storage in sensornets. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2003, v:33, n:1, pp:137-142 [Journal ] Hongsuda Tangmunarunkit , Ramesh Govindan , Sugih Jamin , Scott Shenker , Walter Willinger Network topologies, power laws, and hierarchy. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:1, pp:76- [Journal ] Hyunseok Chang , Ramesh Govindan , Sugih Jamin , Scott Shenker , Walter Willinger Towards capturing representative AS-level Internet topologies. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:44, n:6, pp:737-755 [Journal ] Karthik Lakshminarayanan , Ananth Rao , Ion Stoica , Scott Shenker End-host controlled multicast routing. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2006, v:50, n:6, pp:807-825 [Journal ] Thomas E. Anderson , Larry L. Peterson , Scott Shenker , Jonathan S. Turner Overcoming the Internet Impasse through Virtualization. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2005, v:38, n:4, pp:34-41 [Journal ] Joan Feigenbaum , Christos H. Papadimitriou , Rahul Sami , Scott Shenker A BGP-based mechanism for lowest-cost routing. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 2005, v:18, n:1, pp:61-72 [Journal ] Joan Feigenbaum , Rahul Sami , Scott Shenker Mechanism design for policy routing. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 2006, v:18, n:4, pp:293-305 [Journal ] Joseph M. Hellerstein , Vern Paxson , Larry L. Peterson , Timothy Roscoe , Scott Shenker , David Wetherall The Network Oracle. [Citation Graph (0, 0)][DBLP ] IEEE Data Eng. Bull., 2005, v:28, n:1, pp:3-10 [Journal ] Joan Feigenbaum , Scott Shenker Distributed algorithmic mechanism design: recent results and future directions, Distributed Computing Column. [Citation Graph (0, 0)][DBLP ] Bulletin of the EATCS, 2003, v:79, n:, pp:101-121 [Journal ] Aranyak Mehta , Scott Shenker , Vijay V. Vazirani Posted price profit maximization for multicast by approximating fixed points. [Citation Graph (0, 0)][DBLP ] J. Algorithms, 2006, v:58, n:2, pp:150-164 [Journal ] Joan Feigenbaum , Christos H. Papadimitriou , Scott Shenker Sharing the Cost of Multicast Transmissions. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 2001, v:63, n:1, pp:21-41 [Journal ] Scott Shenker Fundamental Design Issues for the Future Internet (Invited Paper). [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1995, v:13, n:7, pp:1176-1188 [Journal ] Rong Pan , Balaji Prabhakar , Lee Breslau , Scott Shenker Approximate Fair Allocation of Link Bandwidth. [Citation Graph (0, 0)][DBLP ] IEEE Micro, 2003, v:23, n:1, pp:36-43 [Journal ] Sylvia Ratnasamy , Brad Karp , Scott Shenker , Deborah Estrin , Ramesh Govindan , Li Yin , Fang Yu Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table. [Citation Graph (0, 0)][DBLP ] MONET, 2003, v:8, n:4, pp:427-442 [Journal ] Deepak Ganesan , Ramesh Govindan , Scott Shenker , Deborah Estrin Highly-resilient, energy-efficient multipath routing in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2001, v:5, n:4, pp:11-25 [Journal ] Alan J. Demers , Daniel H. Greene , Carl Hauser , Wes Irish , John Larson , Scott Shenker , Howard E. Sturgis , Daniel C. Swinehart , Douglas B. Terry Epidemic Algorithms for Replicated Database Maintenance. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1988, v:22, n:1, pp:8-32 [Journal ] Scott Shenker , Abel Weinrib The Optimal Control of Heterogeneous Queueing Systems: A Paradigm for Load-Sharing and Routing. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1989, v:38, n:12, pp:1724-1735 [Journal ] Joan Feigenbaum , Arvind Krishnamurthy , Rahul Sami , Scott Shenker Hardness results for multicast cost sharing. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2003, v:1, n:304, pp:215-236 [Journal ] Richard M. Karp , Scott Shenker , Christos H. Papadimitriou A simple algorithm for finding frequent elements in streams and bags. [Citation Graph (0, 0)][DBLP ] ACM Trans. Database Syst., 2003, v:28, n:, pp:51-55 [Journal ] Ron Cocchi , Scott Shenker , Deborah Estrin , Lixia Zhang Pricing in computer networks: motivation, formulation, and example. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1993, v:1, n:6, pp:614-627 [Journal ] Shai Herzog , Scott Shenker , Deborah Estrin Sharing the ``cost'' of multicast trees: an axiomatic analysis. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1997, v:5, n:6, pp:847-860 [Journal ] Sugih Jamin , Peter B. Danzig , Scott Shenker , Lixia Zhang A measurement-based admission control algorithm for integrated service packet networks. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1997, v:5, n:1, pp:56-70 [Journal ] Ching-Gung Liu , Deborah Estrin , Scott Shenker , Lixia Zhang Local error recovery in SRM: comparison of two approaches. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1998, v:6, n:6, pp:686-699 [Journal ] Ion Stoica , Daniel Adkins , Shelley Zhuang , Scott Shenker , Sonesh Surana Internet indirection infrastructure. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2004, v:12, n:2, pp:205-218 [Journal ] Ion Stoica , Scott Shenker , Hui Zhang Core -stateless fair queueing: a scalable architecture to approximate fair bandwidth allocations in high-speed networks. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2003, v:11, n:1, pp:33-46 [Journal ] Scott Shenker Making greed work in networks a game-theoretic analysis of switch service disciplines. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1995, v:3, n:6, pp:819-831 [Journal ] Lili Qiu , Yang Richard Yang , Yin Zhang , Scott Shenker On selfish routing in internet-like environments. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2006, v:14, n:4, pp:725-738 [Journal ] Eddie Kohler , Jinyang Li , Vern Paxson , Scott Shenker Observed structure of addresses in IP traffic. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2006, v:16, n:6, pp:1207-1218 [Journal ] Shelley Zhuang , Kevin Lai , Ion Stoica , Randy H. Katz , Scott Shenker Host Mobility Using an Internet Indirection Infrastructure. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2005, v:11, n:6, pp:741-756 [Journal ] Jayanthkumar Kannan , Beverly Yang , Scott Shenker , Puneet Sharma , Sujata Banerjee , Sujoy Basu , Sung-Ju Lee SmartSeer: Using a DHT to Process Continuous Queries Over Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Michael Walfish , J. D. Zamfirescu , Hari Balakrishnan , David R. Karger , Scott Shenker Distributed Quota Enforcement for Spam Control. [Citation Graph (0, 0)][DBLP ] NSDI, 2006, pp:- [Conf ] Cheng Tien Ee , Sylvia Ratnasamy , Scott Shenker Practical Data-Centric Storage. [Citation Graph (0, 0)][DBLP ] NSDI, 2006, pp:- [Conf ] Rodrigo Fonseca , Sylvia Ratnasamy , Jerry Zhao , Cheng Tien Ee , David E. Culler , Scott Shenker , Ion Stoica Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets. [Citation Graph (0, 0)][DBLP ] NSDI, 2005, pp:- [Conf ] Rodrigo Fonseca , George Porter , Randy H. Katz , Scott Shenker , Ion Stoica X-Trace: A Pervasive Network Tracing Framework. [Citation Graph (0, 0)][DBLP ] NSDI, 2007, pp:- [Conf ] Young-Jin Kim , Ramesh Govindan , Brad Karp , Scott Shenker Geographic Routing Made Practical. [Citation Graph (0, 0)][DBLP ] NSDI, 2005, pp:- [Conf ] Martin Casado , Michael J. Freedman , Justin Pettit , Jianying Luo , Nick McKeown , Scott Shenker Ethane: taking control of the enterprise. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2007, pp:1-12 [Conf ] Cheng Tien Ee , Vijay Ramachandran , Byung-Gon Chun , Kaushik Lakshminarayanan , Scott Shenker Resolving inter-domain policy disputes. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2007, pp:157-168 [Conf ] Teemu Koponen , Mohit Chawla , Byung-Gon Chun , Andrey Ermolinskiy , Kye Hyun Kim , Scott Shenker , Ion Stoica A data-oriented (and beyond) network architecture. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2007, pp:181-192 [Conf ] Karthik Lakshminarayanan , Matthew Caesar , Murali Rangan , Tom Anderson , Scott Shenker , Ion Stoica Achieving convergence-free routing using failure-carrying packets. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2007, pp:241-252 [Conf ] Byung-Gon Chun , Petros Maniatis , Scott Shenker , John Kubiatowicz Attested append-only memory: making adversaries stick to their word. [Citation Graph (0, 0)][DBLP ] SOSP, 2007, pp:189-204 [Conf ] Tiered Fault Tolerance for Long-Term Integrity. [Citation Graph (, )][DBLP ] Minuet: Rethinking Concurrency Control in Storage Area Networks. [Citation Graph (, )][DBLP ] A Flow Table-Based Design to Approximate Fairness. [Citation Graph (, )][DBLP ] Towards a Sensor Network Architecture: Lowering the Waistline. [Citation Graph (, )][DBLP ] Loss and Delay Accountability for the Internet. [Citation Graph (, )][DBLP ] Asynchronous Neighbor Discovery: Finding Needles of Connectivity in Haystacks of Time. [Citation Graph (, )][DBLP ] Flush: a reliable bulk transport protocol for multihop wireless networks. [Citation Graph (, )][DBLP ] The design and implementation of a declarative sensor network system. [Citation Graph (, )][DBLP ] Packet caches on routers: the implications of universal redundant traffic elimination. [Citation Graph (, )][DBLP ] Accountable internet protocol (aip). [Citation Graph (, )][DBLP ] Pathlet routing. [Citation Graph (, )][DBLP ] Practical declarative network management. [Citation Graph (, )][DBLP ] Ripcord: a modular platform for data center networking. [Citation Graph (, )][DBLP ] Incentive compatibility and dynamics of congestion control. [Citation Graph (, )][DBLP ] Diverse Replication for Single-Machine Byzantine-Fault Tolerance. [Citation Graph (, )][DBLP ] Delay scheduling: a simple technique for achieving locality and fairness in cluster scheduling. [Citation Graph (, )][DBLP ] The emergence of a networking primitive in wireless sensor networks. [Citation Graph (, )][DBLP ] OpenFlow: enabling innovation in campus networks. [Citation Graph (, )][DBLP ] NOX: towards an operating system for networks. [Citation Graph (, )][DBLP ] Does AS size determine degree in as topology? [Citation Graph (, )][DBLP ] Dynamic route recomputation considered harmful. [Citation Graph (, )][DBLP ] An investigation of the Internet's IP-layer connectivity. [Citation Graph (, )][DBLP ] Search in 0.090secs, Finished in 0.098secs