The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Scott Shenker: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alan J. Demers, Daniel H. Greene, Carl Hauser, Wes Irish, John Larson, Scott Shenker, Howard E. Sturgis, Daniel C. Swinehart, Douglas B. Terry
    Epidemic Algorithms for Replicated Database Maintenance. [Citation Graph (11, 0)][DBLP]
    PODC, 1987, pp:1-12 [Conf]
  2. Hans-Juergen Boehm, Alan J. Demers, Scott Shenker
    Mostly Parallel Garbage Collection. [Citation Graph (1, 0)][DBLP]
    PLDI, 1991, pp:157-164 [Conf]
  3. David D. Clark, Scott Shenker, Lixia Zhang
    Supporting Real-Time Applications in an Integrated Services Packet Network: Architecture and Mechanism. [Citation Graph (1, 0)][DBLP]
    SIGCOMM, 1992, pp:14-26 [Conf]
  4. Ryan Huebsch, Brent N. Chun, Joseph M. Hellerstein, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Scott Shenker, Ion Stoica, Aydan R. Yumerefendi
    The Architecture of PIER: an Internet-Scale Query Processor. [Citation Graph (0, 0)][DBLP]
    CIDR, 2005, pp:28-43 [Conf]
  5. Scott Shenker, Abel Weinrib, Eve M. Schooler
    Managing Shared Ephemeral Teleconferencing State: Policy and Mechanism. [Citation Graph (0, 0)][DBLP]
    COST 237 Workshop, 1994, pp:69-88 [Conf]
  6. Joan Feigenbaum, Scott Shenker
    Distributed algorithmic mechanism design: recent results and future directions. [Citation Graph (0, 0)][DBLP]
    DIAL-M, 2002, pp:1-13 [Conf]
  7. Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker
    On the pitfalls of geographic face routing. [Citation Graph (0, 0)][DBLP]
    DIALM-POMC, 2005, pp:34-43 [Conf]
  8. Richard M. Karp, Elias Koutsoupias, Christos H. Papadimitriou, Scott Shenker
    Optimization Problems in Congestion Control. [Citation Graph (0, 0)][DBLP]
    FOCS, 2000, pp:66-74 [Conf]
  9. Richard M. Karp, Christian Schindelhauer, Scott Shenker, Berthold Vöcking
    Randomized Rumor Spreading. [Citation Graph (0, 0)][DBLP]
    FOCS, 2000, pp:565-574 [Conf]
  10. F. Frances Yao, Alan J. Demers, Scott Shenker
    A Scheduling Model for Reduced CPU Energy. [Citation Graph (0, 0)][DBLP]
    FOCS, 1995, pp:374-382 [Conf]
  11. Joan Feigenbaum, Arvind Krishnamurthy, Rahul Sami, Scott Shenker
    Hardness Results for Multicast Cost Sharing. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 2002, pp:133-144 [Conf]
  12. Qin Lv, Pei Cao, Edith Cohen, Kai Li, Scott Shenker
    Search and replication in unstructured peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    ICS, 2002, pp:84-95 [Conf]
  13. Eddie Kohler, Jinyang Li, Vern Paxson, Scott Shenker
    Observed structure of addresses in IP traffic. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2002, pp:253-266 [Conf]
  14. Lee Breslau, Pei Cao, Li Fan, Graham Phillips, Scott Shenker
    Web Caching and Zipf-like Distributions: Evidence and Implications. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1999, pp:126-134 [Conf]
  15. Lee Breslau, Sugih Jamin, Scott Shenker
    Comments on the Performance of Measurement-Based Admission Control Algorithms. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:1233-1242 [Conf]
  16. Qian Chen, Hyunseok Chang, Ramesh Govindan, Sugih Jamin, Scott Shenker, Walter Willinger
    The Origin of Power-Laws in Internet Topologies Revisited. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2002, pp:- [Conf]
  17. Sugih Jamin, Scott Shenker, Peter B. Danzig
    Comparison of Measurement-Based Call Admission Control Algorithms for Controlled-Load Service. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1997, pp:973-980 [Conf]
  18. Danny J. Mitzel, Deborah Estrin, Scott Shenker, Lixia Zhang
    An Architectural Comparison of ST-II and RSVP. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1994, pp:716-725 [Conf]
  19. Danny J. Mitzel, Deborah Estrin, Scott Shenker, Lixia Zhang
    A Study of Reservation Dynamics in Integrated Services Packet Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1996, pp:871-879 [Conf]
  20. Sylvia Ratnasamy, Mark Handley, Richard M. Karp, Scott Shenker
    Topologically-Aware Overlay Construction and Server Selection. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2002, pp:- [Conf]
  21. Ion Stoica, Hui Zhang, Scott Shenker
    Self-Verifying CSFQ. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2002, pp:- [Conf]
  22. Hongsuda Tangmunarunkit, Ramesh Govindan, Scott Shenker, Deborah Estrin
    The Impact of Routing Policy on Internet Paths. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:736-742 [Conf]
  23. Qin Lv, Sylvia Ratnasamy, Scott Shenker
    Can Heterogeneity Make Gnutella Scalable? [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:94-103 [Conf]
  24. Sylvia Ratnasamy, Ion Stoica, Scott Shenker
    Routing Algorithms for DHTs: Some Open Questions. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:45-52 [Conf]
  25. Hari Balakrishnan, Scott Shenker, Michael Walfish
    Semantic-Free Referencing in Linked Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2003, pp:197-206 [Conf]
  26. Hari Balakrishnan, Scott Shenker, Michael Walfish
    Peering Peer-to-Peer Providers. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2005, pp:104-114 [Conf]
  27. Ion Stoica, Daniel Adkins, Sylvia Ratnasamy, Scott Shenker, Sonesh Surana, Shelley Zhuang
    Internet Indirection Infrastructure. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:191-202 [Conf]
  28. Jeremy Stribling, Isaac G. Councill, Jinyang Li, M. Frans Kaashoek, David R. Karger, Robert Morris, Scott Shenker
    OverCite: A Cooperative Digital Research Library. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2005, pp:69-79 [Conf]
  29. Matthew Harren, Joseph M. Hellerstein, Ryan Huebsch, Boon Thau Loo, Scott Shenker, Ion Stoica
    Complex Queries in DHT-based Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:242-259 [Conf]
  30. Brad Karp, Sylvia Ratnasamy, Sean C. Rhea, Scott Shenker
    Spurring Adoption of DHTs with OpenHash, a Public DHT Service. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2004, pp:195-205 [Conf]
  31. Randy H. Katz, George Porter, Scott Shenker, Ion Stoica, Mel Tsai
    COPS: Quality of Service vs. Any Service at All. [Citation Graph (0, 0)][DBLP]
    IWQoS, 2005, pp:3-15 [Conf]
  32. Jeremy Elson, Richard M. Karp, Christos H. Papadimitriou, Scott Shenker
    Global Synchronization in Sensornets. [Citation Graph (0, 0)][DBLP]
    LATIN, 2004, pp:609-624 [Conf]
  33. Ananth Rao, Christos H. Papadimitriou, Scott Shenker, Ion Stoica
    Geographic routing without location information. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2003, pp:96-108 [Conf]
  34. Sylvia Ratnasamy, Brad Karp, Li Yin, Fang Yu, Deborah Estrin, Ramesh Govindan, Scott Shenker
    GHT: a geographic hash table for data-centric storage. [Citation Graph (0, 0)][DBLP]
    WSNA, 2002, pp:78-87 [Conf]
  35. Deepak Ganesan, Ramesh Govindan, Scott Shenker, Deborah Estrin
    Highly-resilient, energy-efficient multipath routing in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2001, pp:251-254 [Conf]
  36. Shelley Zhuang, Kevin Lai, Ion Stoica, Randy H. Katz, Scott Shenker
    Host Mobility Using an Internet Indirection Infrastructure. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2003, pp:- [Conf]
  37. Sylvia Ratnasamy, Mark Handley, Richard M. Karp, Scott Shenker
    Application-Level Multicast Using Content-Addressable Networks. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 2001, pp:14-29 [Conf]
  38. Sugih Jamin, Scott Shenker, Lixia Zhang, David D. Clark
    An Admission Control Algorithm for Predictive Real-Time Service (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    NOSSDAV, 1992, pp:349-356 [Conf]
  39. Philip Levis, Neil Patel, David E. Culler, Scott Shenker
    Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP]
    NSDI, 2004, pp:15-28 [Conf]
  40. Lakshminarayanan Subramanian, Volker Roth, Ion Stoica, Scott Shenker, Randy H. Katz
    Listen and Whisper: Security Mechanisms for BGP (Awarded Best Student Paper!). [Citation Graph (0, 0)][DBLP]
    NSDI, 2004, pp:127-140 [Conf]
  41. Michael Walfish, Jeremy Stribling, Maxwell N. Krohn, Hari Balakrishnan, Robert Morris, Scott Shenker
    Middleboxes No Longer Considered Harmful. [Citation Graph (0, 0)][DBLP]
    OSDI, 2004, pp:215-230 [Conf]
  42. Mark Weiser, Brent B. Welch, Alan J. Demers, Scott Shenker
    Scheduling for Reduced CPU Energy. [Citation Graph (0, 0)][DBLP]
    OSDI, 1994, pp:13-23 [Conf]
  43. Cheng Tien Ee, Rodrigo Fonseca, Sukun Kim, Daekyeong Moon, Arsalan Tavakoli, David E. Culler, Scott Shenker, Ion Stoica
    A Modular Network Layer for Sensornets. [Citation Graph (0, 0)][DBLP]
    OSDI, 2006, pp:249-262 [Conf]
  44. Scott Shenker
    Efficient Network Allocations with Selfish Users. [Citation Graph (0, 0)][DBLP]
    Performance, 1990, pp:279-285 [Conf]
  45. Alex Fabrikant, Ankur Luthra, Elitza N. Maneva, Christos H. Papadimitriou, Scott Shenker
    On a network creation game. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:347-351 [Conf]
  46. Joan Feigenbaum, Christos H. Papadimitriou, Rahul Sami, Scott Shenker
    A BGP-based mechanism for lowest-cost routing. [Citation Graph (0, 0)][DBLP]
    PODC, 2002, pp:173-182 [Conf]
  47. Joan Feigenbaum, Rahul Sami, Scott Shenker
    Mechanism design for policy routing. [Citation Graph (0, 0)][DBLP]
    PODC, 2004, pp:11-20 [Conf]
  48. Sriram Ramabhadran, Sylvia Ratnasamy, Joseph M. Hellerstein, Scott Shenker
    Brief announcement: prefix hash tree. [Citation Graph (0, 0)][DBLP]
    PODC, 2004, pp:368- [Conf]
  49. Lakshminarayanan Subramanian, Randy H. Katz, Volker Roth, Scott Shenker, Ion Stoica
    Reliable broadcast in unknown fixed-identity networks. [Citation Graph (0, 0)][DBLP]
    PODC, 2005, pp:342-351 [Conf]
  50. Alan J. Demers, Mark Weiser, Barry Hayes, Hans-Juergen Boehm, Daniel G. Bobrow, Scott Shenker
    Combining Generational and Conservative Garbage Collection: Framework and Implementations. [Citation Graph (0, 0)][DBLP]
    POPL, 1990, pp:261-269 [Conf]
  51. Fang Bian, Ramesh Govindan, Scott Shenker, Xin Li
    Using hierarchical location names for scalable routing and rendezvous in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2004, pp:305-306 [Conf]
  52. Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker
    Practical and robust geographic routing in wireless networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2004, pp:295-296 [Conf]
  53. Joseph Polastre, Jonathan Hui, Philip Levis, Jerry Zhao, David E. Culler, Scott Shenker, Ion Stoica
    A unifying link abstraction for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2005, pp:76-89 [Conf]
  54. Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker
    Lazy cross-link removal for geographic routing. [Citation Graph (0, 0)][DBLP]
    SenSys, 2006, pp:112-124 [Conf]
  55. Lee Breslau, Edward W. Knightly, Scott Shenker, Ion Stoica, Hui Zhang
    Endpoint admission control: Architectural issues and performance. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2000, pp:57-69 [Conf]
  56. Lee Breslau, Scott Shenker
    Best-Effort versus Reservations: A Simple Comparative Analysis. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1998, pp:3-16 [Conf]
  57. Aditya Akella, Srinivasan Seshan, Richard M. Karp, Scott Shenker, Christos H. Papadimitriou
    Selfish behavior and stability of the internet: a game-theoretic analysis of TCP. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2002, pp:117-130 [Conf]
  58. Sandeep Bajaj, Lee Breslau, Scott Shenker
    Uniform versus Priority Dropping for Layered Video. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1998, pp:131-143 [Conf]
  59. Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, Michael Walfish
    A layered naming architecture for the internet. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2004, pp:343-352 [Conf]
  60. Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nick Lanham, Scott Shenker
    Making gnutella-like P2P systems scalable. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2003, pp:407-418 [Conf]
  61. Yatin Chawathe, Sriram Ramabhadran, Sylvia Ratnasamy, Anthony LaMarca, Scott Shenker, Joseph M. Hellerstein
    A case study in building layered DHT applications. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2005, pp:97-108 [Conf]
  62. Deepak Bansal, Hari Balakrishnan, Sally Floyd, Scott Shenker
    Dynamic behavior of slowly-responsive congestion control algorithms. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2001, pp:263-274 [Conf]
  63. Vaduvur Bharghavan, Alan J. Demers, Scott Shenker, Lixia Zhang
    MACAW: A Media Access Protocol for Wireless LAN's. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1994, pp:212-225 [Conf]
  64. Ron Cocchi, Deborah Estrin, Scott Shenker, Lixia Zhang
    A Study of Priority Pricing in Multiple Service Class Networks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1991, pp:123-130 [Conf]
  65. Edith Cohen, Scott Shenker
    Replication strategies in unstructured peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2002, pp:177-190 [Conf]
  66. Alan J. Demers, Srinivasan Keshav, Scott Shenker
    Analysis and Simulation of a Fair Queueing Algorithm. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1989, pp:1-12 [Conf]
  67. Brighten Godfrey, Scott Shenker, Ion Stoica
    Minimizing churn in distributed systems. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:147-158 [Conf]
  68. P. Krishna Gummadi, Ramakrishna Gummadi, Steven D. Gribble, Sylvia Ratnasamy, Scott Shenker, Ion Stoica
    The impact of DHT routing geometry on resilience and proximity. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2003, pp:381-394 [Conf]
  69. Shai Herzog, Scott Shenker, Deborah Estrin
    Sharing the ``Cost'' of Multicast Trees: An Axiomatic Analysis. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1995, pp:315-327 [Conf]
  70. Sugih Jamin, Peter B. Danzig, Scott Shenker, Lixia Zhang
    A Measurement-Based Admission Control Algorithm for Integrated Services Packet Networks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1995, pp:2-13 [Conf]
  71. Graham Phillips, Scott Shenker, Hongsuda Tangmunarunkit
    Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling Law. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1999, pp:41-51 [Conf]
  72. Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker
    On selfish routing in internet-like environments. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2003, pp:151-162 [Conf]
  73. Danny J. Mitzel, Scott Shenker
    Asymptotic Resource Consumption in Multicast Reservation Styles. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1994, pp:226-233 [Conf]
  74. Sylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenker
    Revisiting IP multicast. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:15-26 [Conf]
  75. Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard M. Karp, Scott Shenker
    A scalable content-addressable network. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2001, pp:161-172 [Conf]
  76. Sylvia Ratnasamy, Scott Shenker, Steven McCanne
    Towards an evolvable internet architecture. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2005, pp:313-324 [Conf]
  77. Sean C. Rhea, Brighten Godfrey, Brad Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, Harlan Yu
    OpenDHT: a public DHT service and its uses. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2005, pp:73-84 [Conf]
  78. Scott Shenker
    A Theoretical Analysis of Feedback Flow Control. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1990, pp:156-165 [Conf]
  79. Scott Shenker
    Making Greed Work in Networks: A Game-Theoretic Analysis of Switch Service Disciplines. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1994, pp:47-57 [Conf]
  80. Scott Shenker, Lee Breslau
    Two Issues in Reservation Establishment. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1995, pp:14-26 [Conf]
  81. Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana
    Internet indirection infrastructure. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2002, pp:73-86 [Conf]
  82. Ion Stoica, Scott Shenker, Hui Zhang
    Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1998, pp:118-130 [Conf]
  83. Lakshminarayanan Subramanian, Matthew Caesar, Cheng Tien Ee, Mark Handley, Zhuoqing Morley Mao, Scott Shenker, Ion Stoica
    HLP: a next generation inter-domain routing protocol. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2005, pp:13-24 [Conf]
  84. Hongsuda Tangmunarunkit, Ramesh Govindan, Sugih Jamin, Scott Shenker, Walter Willinger
    Network topology generators: degree-based vs. structural. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2002, pp:147-159 [Conf]
  85. Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David R. Karger, Scott Shenker
    DDoS defense by offense. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:303-314 [Conf]
  86. Yin Zhang, Lee Breslau, Vern Paxson, Scott Shenker
    On the characteristics and origins of internet flow rates. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2002, pp:309-322 [Conf]
  87. Lixia Zhang, Scott Shenker, David D. Clark
    Observations on the Dynamics of a Congestion Control Algorithm: The Effects of Two-Way Traffic. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1991, pp:133-147 [Conf]
  88. Haobo Yu, Lee Breslau, Scott Shenker
    A Scalable Web Cache Consistency Architecture. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1999, pp:163-174 [Conf]
  89. Joan Feigenbaum, Arvind Krishnamurthy, Rahul Sami, Scott Shenker
    Approximation and collusion in multicast cost sharing (extended abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2001, pp:253-255 [Conf]
  90. Joan Feigenbaum, Arvind Krishnamurthy, Rahul Sami, Scott Shenker
    Approximation and collusion in multicast cost sharing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2003, pp:280- [Conf]
  91. Michal Feldman, John Chuang, Ion Stoica, Scott Shenker
    Hidden-action in multi-hop routing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2005, pp:117-126 [Conf]
  92. Aranyak Mehta, Scott Shenker, Vijay V. Vazirani
    Profit-maximizing multicast pricing by approximating fixed points. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2003, pp:218-219 [Conf]
  93. Sandeep Bajaj, Lee Breslau, Scott Shenker
    Is Service Priority Useful in Networks? [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1998, pp:66-77 [Conf]
  94. Hyunseok Chang, Ramesh Govindan, Sugih Jamin, Scott Shenker, Walter Willinger
    Towards capturing representative AS-level Internet topologies. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2002, pp:280-281 [Conf]
  95. Albert G. Greenberg, Scott Shenker, Alexander L. Stolyar
    Asynchronous Updates in Large Parallel Systems. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1996, pp:91-103 [Conf]
  96. Qin Lv, Pei Cao, Edith Cohen, Kai Li, Scott Shenker
    Search and replication in unstructured peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2002, pp:258-259 [Conf]
  97. Suchitra Raman, Steven McCanne, Scott Shenker
    Asymptotic Behavior of Global Recovery in SRM. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1998, pp:90-99 [Conf]
  98. Scott Shenker
    Some Conjectures on the Behavior of Acknowledgment-Based Transmission Control of Random Access Communication Channels. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1987, pp:245-255 [Conf]
  99. Scott Shenker
    Making Flow Control Work in Networks: A Control-Theoretic Analysis of Gateway Service Disciplines. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1990, pp:239-240 [Conf]
  100. Scott Shenker
    Making Greed Work in Networks: A Game-Theoretic Analysis of Gateway Service Disciplines. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1990, pp:241-242 [Conf]
  101. Scott Shenker, Abel Weinrib
    Asymptotic Analysis of Large Heterogeneous Queueing Systems. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1988, pp:56-62 [Conf]
  102. Brent N. Chun, Joseph M. Hellerstein, Ryan Huebsch, Shawn R. Jeffery, Boon Thau Loo, Sam Mardanbeigi, Timothy Roscoe, Sean C. Rhea, Scott Shenker, Ion Stoica
    Querying at Internet-Scale. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2004, pp:935-936 [Conf]
  103. Joan Feigenbaum, Christos H. Papadimitriou, Scott Shenker
    Sharing the cost of muliticast transmissions (preliminary version). [Citation Graph (0, 0)][DBLP]
    STOC, 2000, pp:218-227 [Conf]
  104. Dennis Geels, Gautam Altekar, Scott Shenker, Ion Stoica
    Replay Debugging for Distributed Applications (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2006, pp:289-300 [Conf]
  105. Ryan Huebsch, Joseph M. Hellerstein, Nick Lanham, Boon Thau Loo, Scott Shenker, Ion Stoica
    Querying the Internet with PIER. [Citation Graph (0, 0)][DBLP]
    VLDB, 2003, pp:321-332 [Conf]
  106. Boon Thau Loo, Joseph M. Hellerstein, Ryan Huebsch, Scott Shenker, Ion Stoica
    Enhancing P2P File-Sharing with an Internet-Scale Query Processor. [Citation Graph (0, 0)][DBLP]
    VLDB, 2004, pp:432-443 [Conf]
  107. Scott Shenker
    The Data-Centric Revolution in Networking. [Citation Graph (0, 0)][DBLP]
    VLDB, 2003, pp:15- [Conf]
  108. Benjamin Greenstein, Sylvia Ratnasamy, Scott Shenker, Ramesh Govindan, Deborah Estrin
    DIFS: a distributed index for features in sensor networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2003, v:1, n:2-3, pp:333-349 [Journal]
  109. Thomas E. Anderson, Scott Shenker, Ion Stoica, David Wetherall
    Design guidelines for robust Internet protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:125-130 [Journal]
  110. Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker
    Aggregate congestion control. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:1, pp:69- [Journal]
  111. Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker
    Controlling high bandwidth aggregates in the network. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:3, pp:62-73 [Journal]
  112. Rong Pan, Lee Breslau, Balaji Prabhakar, Scott Shenker
    Approximate fairness through differential dropping (summary). [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:1, pp:72- [Journal]
  113. Rong Pan, Lee Breslau, Balaji Prabhakar, Scott Shenker
    Approximate fairness through differential dropping. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:2, pp:23-39 [Journal]
  114. Scott Shenker, Sylvia Ratnasamy, Brad Karp, Ramesh Govindan, Deborah Estrin
    Data-centric storage in sensornets. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:137-142 [Journal]
  115. Hongsuda Tangmunarunkit, Ramesh Govindan, Sugih Jamin, Scott Shenker, Walter Willinger
    Network topologies, power laws, and hierarchy. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:1, pp:76- [Journal]
  116. Hyunseok Chang, Ramesh Govindan, Sugih Jamin, Scott Shenker, Walter Willinger
    Towards capturing representative AS-level Internet topologies. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:44, n:6, pp:737-755 [Journal]
  117. Karthik Lakshminarayanan, Ananth Rao, Ion Stoica, Scott Shenker
    End-host controlled multicast routing. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:6, pp:807-825 [Journal]
  118. Thomas E. Anderson, Larry L. Peterson, Scott Shenker, Jonathan S. Turner
    Overcoming the Internet Impasse through Virtualization. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2005, v:38, n:4, pp:34-41 [Journal]
  119. Joan Feigenbaum, Christos H. Papadimitriou, Rahul Sami, Scott Shenker
    A BGP-based mechanism for lowest-cost routing. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2005, v:18, n:1, pp:61-72 [Journal]
  120. Joan Feigenbaum, Rahul Sami, Scott Shenker
    Mechanism design for policy routing. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2006, v:18, n:4, pp:293-305 [Journal]
  121. Joseph M. Hellerstein, Vern Paxson, Larry L. Peterson, Timothy Roscoe, Scott Shenker, David Wetherall
    The Network Oracle. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 2005, v:28, n:1, pp:3-10 [Journal]
  122. Joan Feigenbaum, Scott Shenker
    Distributed algorithmic mechanism design: recent results and future directions, Distributed Computing Column. [Citation Graph (0, 0)][DBLP]
    Bulletin of the EATCS, 2003, v:79, n:, pp:101-121 [Journal]
  123. Aranyak Mehta, Scott Shenker, Vijay V. Vazirani
    Posted price profit maximization for multicast by approximating fixed points. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 2006, v:58, n:2, pp:150-164 [Journal]
  124. Joan Feigenbaum, Christos H. Papadimitriou, Scott Shenker
    Sharing the Cost of Multicast Transmissions. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2001, v:63, n:1, pp:21-41 [Journal]
  125. Scott Shenker
    Fundamental Design Issues for the Future Internet (Invited Paper). [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1995, v:13, n:7, pp:1176-1188 [Journal]
  126. Rong Pan, Balaji Prabhakar, Lee Breslau, Scott Shenker
    Approximate Fair Allocation of Link Bandwidth. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2003, v:23, n:1, pp:36-43 [Journal]
  127. Sylvia Ratnasamy, Brad Karp, Scott Shenker, Deborah Estrin, Ramesh Govindan, Li Yin, Fang Yu
    Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table. [Citation Graph (0, 0)][DBLP]
    MONET, 2003, v:8, n:4, pp:427-442 [Journal]
  128. Deepak Ganesan, Ramesh Govindan, Scott Shenker, Deborah Estrin
    Highly-resilient, energy-efficient multipath routing in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2001, v:5, n:4, pp:11-25 [Journal]
  129. Alan J. Demers, Daniel H. Greene, Carl Hauser, Wes Irish, John Larson, Scott Shenker, Howard E. Sturgis, Daniel C. Swinehart, Douglas B. Terry
    Epidemic Algorithms for Replicated Database Maintenance. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1988, v:22, n:1, pp:8-32 [Journal]
  130. Scott Shenker, Abel Weinrib
    The Optimal Control of Heterogeneous Queueing Systems: A Paradigm for Load-Sharing and Routing. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1989, v:38, n:12, pp:1724-1735 [Journal]
  131. Joan Feigenbaum, Arvind Krishnamurthy, Rahul Sami, Scott Shenker
    Hardness results for multicast cost sharing. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:1, n:304, pp:215-236 [Journal]
  132. Richard M. Karp, Scott Shenker, Christos H. Papadimitriou
    A simple algorithm for finding frequent elements in streams and bags. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Database Syst., 2003, v:28, n:, pp:51-55 [Journal]
  133. Ron Cocchi, Scott Shenker, Deborah Estrin, Lixia Zhang
    Pricing in computer networks: motivation, formulation, and example. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1993, v:1, n:6, pp:614-627 [Journal]
  134. Shai Herzog, Scott Shenker, Deborah Estrin
    Sharing the ``cost'' of multicast trees: an axiomatic analysis. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1997, v:5, n:6, pp:847-860 [Journal]
  135. Sugih Jamin, Peter B. Danzig, Scott Shenker, Lixia Zhang
    A measurement-based admission control algorithm for integrated service packet networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1997, v:5, n:1, pp:56-70 [Journal]
  136. Ching-Gung Liu, Deborah Estrin, Scott Shenker, Lixia Zhang
    Local error recovery in SRM: comparison of two approaches. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1998, v:6, n:6, pp:686-699 [Journal]
  137. Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana
    Internet indirection infrastructure. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:2, pp:205-218 [Journal]
  138. Ion Stoica, Scott Shenker, Hui Zhang
    Core-stateless fair queueing: a scalable architecture to approximate fair bandwidth allocations in high-speed networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2003, v:11, n:1, pp:33-46 [Journal]
  139. Scott Shenker
    Making greed work in networks a game-theoretic analysis of switch service disciplines. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1995, v:3, n:6, pp:819-831 [Journal]
  140. Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker
    On selfish routing in internet-like environments. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2006, v:14, n:4, pp:725-738 [Journal]
  141. Eddie Kohler, Jinyang Li, Vern Paxson, Scott Shenker
    Observed structure of addresses in IP traffic. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2006, v:16, n:6, pp:1207-1218 [Journal]
  142. Shelley Zhuang, Kevin Lai, Ion Stoica, Randy H. Katz, Scott Shenker
    Host Mobility Using an Internet Indirection Infrastructure. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2005, v:11, n:6, pp:741-756 [Journal]
  143. Jayanthkumar Kannan, Beverly Yang, Scott Shenker, Puneet Sharma, Sujata Banerjee, Sujoy Basu, Sung-Ju Lee
    SmartSeer: Using a DHT to Process Continuous Queries Over Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  144. Michael Walfish, J. D. Zamfirescu, Hari Balakrishnan, David R. Karger, Scott Shenker
    Distributed Quota Enforcement for Spam Control. [Citation Graph (0, 0)][DBLP]
    NSDI, 2006, pp:- [Conf]
  145. Cheng Tien Ee, Sylvia Ratnasamy, Scott Shenker
    Practical Data-Centric Storage. [Citation Graph (0, 0)][DBLP]
    NSDI, 2006, pp:- [Conf]
  146. Rodrigo Fonseca, Sylvia Ratnasamy, Jerry Zhao, Cheng Tien Ee, David E. Culler, Scott Shenker, Ion Stoica
    Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets. [Citation Graph (0, 0)][DBLP]
    NSDI, 2005, pp:- [Conf]
  147. Rodrigo Fonseca, George Porter, Randy H. Katz, Scott Shenker, Ion Stoica
    X-Trace: A Pervasive Network Tracing Framework. [Citation Graph (0, 0)][DBLP]
    NSDI, 2007, pp:- [Conf]
  148. Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott Shenker
    Geographic Routing Made Practical. [Citation Graph (0, 0)][DBLP]
    NSDI, 2005, pp:- [Conf]
  149. Martin Casado, Michael J. Freedman, Justin Pettit, Jianying Luo, Nick McKeown, Scott Shenker
    Ethane: taking control of the enterprise. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:1-12 [Conf]
  150. Cheng Tien Ee, Vijay Ramachandran, Byung-Gon Chun, Kaushik Lakshminarayanan, Scott Shenker
    Resolving inter-domain policy disputes. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:157-168 [Conf]
  151. Teemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolinskiy, Kye Hyun Kim, Scott Shenker, Ion Stoica
    A data-oriented (and beyond) network architecture. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:181-192 [Conf]
  152. Karthik Lakshminarayanan, Matthew Caesar, Murali Rangan, Tom Anderson, Scott Shenker, Ion Stoica
    Achieving convergence-free routing using failure-carrying packets. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:241-252 [Conf]
  153. Byung-Gon Chun, Petros Maniatis, Scott Shenker, John Kubiatowicz
    Attested append-only memory: making adversaries stick to their word. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:189-204 [Conf]

  154. Tiered Fault Tolerance for Long-Term Integrity. [Citation Graph (, )][DBLP]


  155. Minuet: Rethinking Concurrency Control in Storage Area Networks. [Citation Graph (, )][DBLP]


  156. A Flow Table-Based Design to Approximate Fairness. [Citation Graph (, )][DBLP]


  157. Towards a Sensor Network Architecture: Lowering the Waistline. [Citation Graph (, )][DBLP]


  158. Loss and Delay Accountability for the Internet. [Citation Graph (, )][DBLP]


  159. Asynchronous Neighbor Discovery: Finding Needles of Connectivity in Haystacks of Time. [Citation Graph (, )][DBLP]


  160. Flush: a reliable bulk transport protocol for multihop wireless networks. [Citation Graph (, )][DBLP]


  161. The design and implementation of a declarative sensor network system. [Citation Graph (, )][DBLP]


  162. Packet caches on routers: the implications of universal redundant traffic elimination. [Citation Graph (, )][DBLP]


  163. Accountable internet protocol (aip). [Citation Graph (, )][DBLP]


  164. Pathlet routing. [Citation Graph (, )][DBLP]


  165. Practical declarative network management. [Citation Graph (, )][DBLP]


  166. Ripcord: a modular platform for data center networking. [Citation Graph (, )][DBLP]


  167. Incentive compatibility and dynamics of congestion control. [Citation Graph (, )][DBLP]


  168. Diverse Replication for Single-Machine Byzantine-Fault Tolerance. [Citation Graph (, )][DBLP]


  169. Delay scheduling: a simple technique for achieving locality and fairness in cluster scheduling. [Citation Graph (, )][DBLP]


  170. The emergence of a networking primitive in wireless sensor networks. [Citation Graph (, )][DBLP]


  171. OpenFlow: enabling innovation in campus networks. [Citation Graph (, )][DBLP]


  172. NOX: towards an operating system for networks. [Citation Graph (, )][DBLP]


  173. Does AS size determine degree in as topology? [Citation Graph (, )][DBLP]


  174. Dynamic route recomputation considered harmful. [Citation Graph (, )][DBLP]


  175. An investigation of the Internet's IP-layer connectivity. [Citation Graph (, )][DBLP]


Search in 0.020secs, Finished in 0.714secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002