Systems and Networking Publications
2015 │ 2014 │ 2013 │ 2012 │ 2011 │ 2010 │ 2009 │ 2008 │ 2007 │ 2006 │ 2005 │ 2004 │ 2003 │ 2002 │ 2001 │ 2000 │ 1999
2015

Scheduling for Data Center Networks with Reconfiguration Delay, Chang-Heng Wang, Tara Javidi, and George Porter, Proceedings of the IEEE Infocom Conference, Hong Kong, China, April 2015, pages 1-9.

Too LeJIT to Quit: Extending JIT Spraying to ARM, Wilson Lian, Hovav Shacham, and Stefan Savage, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2015.

2014

Characterizing Large-Scale Click Fraud in ZeroAccess, Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security, Scottsdale, Arizona, November 2014.

On The Security of Mobile Cockpit Information Systems, Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan Mast, Stephen Checkoway, Stefan Savage, Alex C. Snoeren, and Kirill Levchenko, Proceedings of the ACM Conference on Computer and Communications Security, Scottsdale, Arizona, November 2014.

Deniable Liaisons, Abhinav Narain, Nick Feamster, and Alex C. Snoeren, Proceedings of the ACM Conference on Computer and Communications Security, Scottsdale, Arizona, November 2014.

Algebraic MACs and Keyed-Verification Anonymous Credentials, Melissa Chase, Sarah Meiklejohn, and Greg Zaverucha, Proceedings of the ACM Conference on Computer and Communications Security, Scottsdale, Arizona, November 2014.

Search + Seizure: The Effectiveness of Interventions on SEO Campaigns, David Wang, Matthew Der, Mohammad Karami, Lawrence Saul, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference, Vancouver, BC, Canada, November 2014.

Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild, Borbala Benko, Elie Bursztein, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference, Vancouver, BC, Canada, November 2014.

Towards Network-level Efficiency for Cloud Storage Services, Zhenhua Li, Cheng Jin, Tianyin Xu, Christo Wilson, Yao Liu, Linsong Cheng, Yunhao Liu, Yafei Dai, and Zhi-Li Zhang, Proceedings of the ACM Internet Measurement Conference, Vancouver, BC, Canada, November 2014.

Challenges in Inferring Internet Interdomain Congestion, Matthew Luckie, Amogh Dhamdhere, David Clark, Bradley Huffaker, and kc claffy, Proceedings of the ACM Internet Measurement Conference, Vancouver, BC, Canada, November 2014.

Inferring Complex AS Relationships, Vasileios Giotsas, Matthew Luckie, Bradley Huffaker, and kc claffy, Proceedings of the ACM Internet Measurement Conference, Vancouver, BC, Canada, November 2014.

Willow: A Programmable SSD, Sundaram Bhaskaran, Trevor Bunker, Arup De, Mark Gahagan, Yanqin Jin, Robert Liu, Sudharsan Seshadri, and Steven Swanson, Proceedings of the 10th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), broomfield, CO, October 2014.

Blender: Upgrading Tenant-based Data Center Networking, Kevin C. Webb, Arjun Roy, Kenneth Yocum, and Alex C. Snoeren, Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Marina del Rey, CA, October 2014.

Enfold: Downclocking OFDM in WiFi, Feng Lu, Patrick Ling, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Maui, HI, September 2014.

Cutting the Cord: a Robust Wireless Facilities Network for Data Centers, Yibo Zhu, Xia Zhou, Zengbin Zhang, Lin Zhou, Amin Vahdat, Ben Y. Zhao, and Haitao Zheng, Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Maui, HI, September 2014.

DREAM: Dynamic Resource Allocation for Software-defined Measurement, Masoud Moshref, Minlan Yu, Ramesh Govindan, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Chicago, IL, August 2014.

Hulk: Eliciting Malicious Behavior in Browser Extensions, Alexandros Kapravelos, Chris Grier, Neha Chachra, Chris Kruegel, Giovanni Vigna, and Vern Paxson, Proceedings of the USENIX Security Symposium, San Diego, CA, August 2014.

Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise, Matthew Der, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGKDD Conference, New York, NY, August 2014.

A Spectral Algorithm for Learning Class-Based n-gram Models of Natural Language, Karl Stratos, Do-kyum Kim, Daniel Hsu, and Michael Collins, Proceedings of the 30th Conference on Uncertainty in Artificial Intelligence (UAI 2014), Quebec City, Canada, July 2014.

Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting, Neha Chachra, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the Workshop on the Economics of Information Security (WEIS), State College, PA, June 2014, pages 4:1:1-4:1:13.

Managing Contention with Medley, Feng Lu, Geoffrey M. Voelker, and Alex C. Snoeren, IEEE Transcations on Mobile Computing 13, June 2014.

Performance Regression Testing Target Prioritization via Performance Risk Analysis, Peng Huang, Xiao Ma, Dongcai Shen, and Yuanyuan Zhou, Proceedings of the International Conference on Software Engineering (ICSE), Hyderabad, India, May 2014.

Achieving Congestion Diversity in Multi-hop Wireless Mesh Networks, Abhijeet A. Bhorkar, Tara Javidi, and Alex C. Snoeren, IEEE Transcations on Mobile Computing 13, May 2014.

WCMP: Weighted Cost Multipathing for Improved Fairness in Data Centers, Junlan Zhou, Malveeka Tewari, Min Zhu, Abdul Kabbani, Leon Poutievski, Arjun Singh, and Amin Vahdat, Proceedings of the ACM European Conference in Computer Systems (EuroSys), Amsterdam, The Netherlands, April 2014.

A Gaussian Latent Variable Model for Large Margin Classification of Labeled and Unlabeled Data, Do-kyum Kim, Matthew Der, and Lawrence K. Saul, Proceedings of the 17th International Conference on Artificial Intelligence and Statistics (AISTATS), Reykjavik, Iceland, April 2014.

XXXtortion? Inferring Registration Intent in the .XXX TLD, Tristan Halvorson, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the International World Wide Web Conference (WWW)`, Seoul, Korea, April 2014, pages 901-912.

SENIC: A Scalable NIC for End-Host Rate Limiting, Sivasankar Radhakrishnan, Yilong Geng, Vimalkumar Jeyakumar, Abdul Kabbani, George Porter, and Amin Vahdat, Proceedings of the 11th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, April 2014.

Circuit Switching Under the Radar with REACToR, He Liu, Feng Lu, Alex Forencich, Rishi Kapoor, Malveeka Tewari, Geoffrey M. Voelker, George Papen, Alex C. Snoeren, and George Porter, Proceedings of the 11th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, April 2014, pages 1-15.

Libra: Divide and Conquer to Verify Formading Tables in Huge Networks, Hongyi Zeng, Shidong Zhang, Fei Ye, Vimalkumar Jeyakumar, Mickey Ju, Junda Liu, Nick McKeown, and Amin Vahdat, Proceedings of the 11th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, April 2014.

Exposing Inconsistent Web Search Results with Bobble, Xinyu Xing, Wei Meng, Dan Doozan, Nick Feamster, Wenke Lee, and Alex C. Snoeren, Proceedings of the Passive and Active Measurement Conference (PAM), Los Angeles, CA, March 2014.

EnCore: Exploiting System Environment and Correlation Information for Misconfiguration Detection, Jiaqi Zhang, Lakshminarayanan Renganarayana, Xiaolan Zhang, Niyu Ge, Vasanth Bala, Tianyin Xu, and Yuanyuan Zhou, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Salt Lake City, UT, March 2014.

Botcoin: Monetizing Stolen Cycles, Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, and Kirill Levchenko, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.

DSpin: Detecting Automatically Spun Content on the Web, Qing Zhang, David Wang, and Geoffrey M. Voelker, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014, pages 4:1:1-4:1:16.

SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks, Dongseok Jang, Zachary Tatlock, and Sorin Lerner, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2014.

2013

A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, USENIX ;login: 38(6), December 2013.

Views and Transactional Storage for Large Graphs, Michael Lee, Indrajit Roy, Alvin AuYoung, Vanish Talwar, K.R. Jayaram, and Yuanyuan Zhou, Proceedings of the ACM/IFIP/USENIX Middleware Conference, Bejing, China, December 2013. (Best paper).

Directing Data Center Traffic, Yeshaiahu Fainman and George Porter, Science 342(6155):202-203, 2013.

Aspen Trees: Balancing Data Center Fault Tolerance, Scalability and Cost, Meg Walraed-Sullivan, Amin Vahdat, and Keith Marzullo, Proceedings of ACM CoNEXT, Santa Barbara, CA, December 2013.

Bullet Trains: A Study of NIC Burst Behavior at Microsecond Timescales, Rishi Kapoor, Alex C. Snoeren, Geoffrey M. Voelker, and George Porter, Proceedings of ACM CoNEXT, Santa Barbara, CA, December 2013, pages 133-138.

FasTrak: Enabling Express Lanes in Multi-Tenant Data Centers, Radhika Niranjan Mysore, George Porter, and Amin Vahdat, Proceedings of ACM CoNEXT, Santa Barbara, CA, December 2013.

Do Not Blame Users for Misconfigurations, Tianyin Xu, Jiaqi Zhang, Peng Huang, Jing Zheng, Tianwei Sheng, Ding Yuan, Yuanyuan Zhou, and Shankar Pasupathy, Proceedings of the 24th ACM Symposium on Operating Systems Principles (SOSP), Nemacolin Woodlands Resort, Pennsylvania, November 2013.

From ARIES to MARS:Transaction Support for Next-Generation Solid-State Drives, Joel Coburn, Trevor Bunker, Meir Shwarz, Rajesh K. Gupta, and Steven Swanson, Proceedings of the 24th ACM Symposium on Operating Systems Principles (SOSP), Nemacolin Woodlands Resort, Pennsylvania, November 2013.

Scalable Coordination of a Tightly-Coupled Service in the Wide Area, Kevin C. Webb, Bhanu C. Vattikonda, Kenneth Yocum, and Alex C. Snoeren, Proceedings of the ACM Conference on Timely Results in Operating Systems, Farmington, PA, November 2013.

ViceROI: Catching Click-Spam in Search Ad Networks, Vacha Dave, Saikat Guha, and Yin Zhang, Proceedings of the ACM Conference on Computer and Communications Security, Berlin, Germany, November 2013.

Dahu: Commodity Switches for Direct Connect Data Center Networks, Sivasankar Radhakrishnan, Malveeka Tewari, Rishi Kapoor, George Porter, and Amin Vahdat, Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), San Jose, CA, October 2013.

A Multiport Microsecond Optical Circuit Switch for Data Center Networking, Nathan Farrington, Alex Forencich, George Porter, Pang-Chen Sun, Joseph Ford, Yeshaiahu Fainman, George C. Papen, and Amin Vahdat, IEEE Photonics Technology Letters 25(16):1589-1592, 2013.

A Comparison of Syslog and IS-IS for Monitoring Link State, Daniel Turner, Kirill Levchenko, Stefan Savage, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference, Barcelona, Spain, October 2013.

A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference, Barcelona, Spain, October 2013, pages 127-140.

Internet Nameserver IPv4 and IPv6 Address Relationships, Arthur Berger, Nicholas Weaver, Robert Beverly, and Larry Campbell, Proceedings of the ACM Internet Measurement Conference, Barcelona, Spain, October 2013.

Speedtrap: Internet-Scale IPv6 Alias Resolution, Matthew Luckie, Robert Beverly, William Brinkmeyer, and kc claffy, Proceedings of the ACM Internet Measurement Conference, Barcelona, Spain, October 2013.

AS Relationships, Customer Cones, and Validation, Matthew Luckie, Bradley Huffaker, Amogh Dhamdhere, Vasileous Giotsas, and kc claffy, Proceedings of the ACM Internet Measurement Conference, Barcelona, Spain, October 2013.

Scalable Lineage Capture for Debugging DISC Analytics, Kenneth Yocum, Dionysios Logothetis, and Soumyarupa De, Proceedings of the ACM Symposium on Cloud Computing (SOCC), San Jose, CA, October 2013.

High-Fidelity Switch Models for Software-Defined Network Emulation, Danny Yuxing Huang, Ken Yocum, and Alex C. Snoeren, Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Hong Kong, China, August 2013.

B4: Experience with a Globally Deployed Software Defined WAN, Sushant Jain, Alok Kumar, Subhasree Mandal, Joon Ong, Leon Poutievski, Arjun Singh, Subbaiah Venkata, Jim Wanderer, Junlan Zhou, Min Zhu, Jonathan Zolla, Urs Hölzle, Stephen Stuart, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Hong Kong, China, August 2013.

Integrating Microsecond Circuit Switching into the Data Center, George Porter, Richard Strong, Nathan Farrington, Alex Forencich, Pang-Chen Sun, Tajana Rosing, Yeshaiahu Fainman, George Papen, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Hong Kong, China, August 2013.

Fast Programmable Match-Action Processing in Hardware for SDN, Pat Bosshart, Glen Gibb, Hun-Seok Kim, George Varghese, Nick McKeown, Martin Izzard, Fernando Mujica, and Mark Horowitz, Proceedings of the ACM SIGCOMM Conference, Hong Kong, China, August 2013.

Take This Personally: Pollution Attacks on Personalized Services, Xinyu Xing, Wei Ming, Dan Doozan, Alex C. Snoeren, Nick Feamster, and Wenke Lee, Proceedings of the USENIX Security Symposium, Washington D.C., August 2013.

Measuring the Practical Impact of DNSSEC Deployment, Wilson Lian, Eric Rescorla, Hovav Shacham, and Stefan Savage, Proceedings of the USENIX Security Symposium, Washington D.C., August 2013.

Practical Comprehensive Bounds on Surreptitious Communication over DNS, Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula Rao, Reiner Sailer, Doug Shales, Mark Stoecklin, Kurt Thomas, Wietse Venema, and Nicholas Weaver, Proceedings of the USENIX Security Symposium, Washington D.C., August 2013.

Challenges in the Emulation of Large Scale Software Defined Networks, Arjun Roy, Kenneth Yocum, and Alex C. Snoeren, Proceedings of the 4th Asia-Pacific Workshop on Systems (APSys), Singapore, July 2013.

Optical/Electrical Hybrid Switching for Datacenter Communications, Nathan Farrington, George Porter, Alex Forencich, Joseph Ford, Yeshaiahu Fainman, Amin Vahdat, and George Papen, Proceedings of the 18th OptoElectronics and Communications Conference (OECC2013) / Photonics in Switching 2013 (PS2013), Kyoto, Japan, July 2013.

NicPic: Scalable and Accurate End-Host Rate Limiting, Sivasankar Radhakrishnan, Vimalkumar Jeyakumar, Abdul Kabbani, George Porter, and Amin Vahdat, Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud-V), San Jose, CA, June 2013.

Bug Characteristics in Open Source Software, Lin Tan, Chen Liu, Zhenmin Li, Xuanhui Wang, Yuanyuan Zhou, and Chengxiang Zhai, Springer Journal of Empirical Software Engineering, June 2013.

Quantifying the Benefits of Joint Content and Network Routing, Vaytautas Valancius, Bharath Ravi, Nick Feamster, and Alex C. Snoeren, Proceedings of the ACM SIGMETRICS Conference, Pittsburgh, PA, June 2013.

ProtectMyPrivacy: Detecting and Mitigating Privacy Leaks on iOS Devices Using Crowsourcing, Yuvraj Agarwal and Malcom Hall, Proceedings of the ACM Conference on Mobile Systems, Appliations and Services (MobiSys), Taipei, Taiwan, June 2013.

A Variational Approximation for Topic Modeling of Hierarchical Corpora, Do-kyum Kim, Geoffrey M. Voelker, and Lawrence K. Saul, Proceedings of the International Conference on Machine Learning, Atlanta, GA, June 2013, pages 2:55-2:63.

SloMo: Downclocking WiFi Communication, Feng Lu, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the 10th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Lombard, IL, April 2013, pages 245-258.

eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones, Xiao Ma, Peng Huang, Xinxin Jin, Pei Wang, Soyeon Park, Dongcai Shen, Yuanyuan Zhou, Lawrence K. Saul, and Geoffrey M. Voelker, Proceedings of the 10th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Lombard, IL, April 2013, pages 57-70.

Real Time Network Policy Checking Using Header Space Analysis, Peyman Kazemian, Michael Chang, Hongyi Zeng, George Varghese, Nick McKeown, and Scott Whyte, Proceedings of the 10th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Lombard, IL, April 2013.

See Straight Through Data Center Bandwidth Limitations with X-Rays, George Porter, Proceedings of TinyTOCS, Reconfigurable wireless X-Ray links in data centers could deliver 40 Pb/sec, but would have to be turned off while operators are present, April 2013.

The Day After Patch Tuesday: Effects Observable in IP Darkspace Traffic, Tanja Zseby, Alistair King, Nevil Borwnlee, and kc claffy, Proceedings of the Passive and Active Measurement Conference, Hong Kong, China, March 2013.

A Coordinated View of the Temporal Evolution of Large-scale Internet Events, Alistair King, Bradley Huffaker, Alberto Dainotti, and kc claffy, Proceedings of the Passive and Active Measurement Conference, Hong Kong, China, March 2013.

A 10 us Hybrid Optical-Circuit/Electrical-Packet Network for Data Centers, Nathan Farrington, Alex Forencich, Pang-Chen Sun, Shaya Fainman, Joe Ford, Amin Vahdat, George Porter, and George C. Papen, Proceedings of OFC/NFOEC, Anaheim, CA, March 2013.

Scalability vs. Fault Tolerance in Aspen Trees, Meg Walraed-Sullivan, Keith Marzullo, and Amin Vahdat, Microsoft Research technical report MSR-TR-2013-21, February 2013.

TritonSort: A balanced and energy-efficient large-scale sorting system, Alexander Rasmussen, George Porter, Michael Conley, Harsha Madhyastha, Radhika Niranjan Mysore, Alexander Pucher, and Amin Vahdat, ACM Transactions on Computer Systems 31(1), February 2013.

Juice: A Longitudinal Study of an SEO Campaign, David Wang, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2013, pages 7:4:1-7:4:17.

2012

Taster's Choice: A Comparative Analysis of Spam Feeds, Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference, Boston, MA, November 2012, pages 427-440.

Analyis of a '/0' Stealth Scan from a Botnet, Alberto Dainotti, Alistair King, kc claffy, Ferdinando Papale, and Antonio Pescapé, Proceedings of the ACM Internet Measurement Conference, Boston, MA, November 2012.

Fathom: A Browser-based Network Measurement Platform, Mohan Dhawan, Justin Samuel, Renata Teixeira, Christian Kreibich, Mark Allman, Nicholas Weaver, and Vern Paxson, Proceedings of the ACM Internet Measurement Conference, Boston, MA, November 2012.

Hunting Mice with Microsecond Circuit Switches, Nathan Farrington, George Porter, Yeshaiahu Fainman, George Papen, and Amin Vahdat, Proceedings of the 11th ACM Workshop on Hot Topics in Networks (HotNets-XI), Redmond, WA, October 2012.

Chronos: Predictable Low Latency for Data Center Applications, Rishi Kapoor, George Porter, Malveeka Tewari, Geoffrey M. Voelker, and Amin Vahdat, Proceedings of the ACM Symposium on Cloud Computing (SOCC), San Jose, CA, October 2012, pages 9:1-9:14.

Themis: An I/O-Efficient MapReduce, Alexander Rasmussen, Michael Conley, Rishi Kapoor, Vinh The Lam, George Porter, and Amin Vahdat, Proceedings of the ACM Symposium on Cloud Computing (SOCC), San Jose, CA, October 2012.

xOMB: Extensible Open Middleboxes with Commodity Servers, James William Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat, Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Austin, Texas, October 2012.

NetBump: User-extensible Active Queue Management with Bumps on the Wire, Mohammad Al-Fares, Rishi Kapoor, George Porter, Sambit Das, Hakim Weatherspoon, Balaji Prabhakar, and Amin Vahdat, Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Austin, Texas, October 2012.

Torchestra: Reducing Interactive Traffic Delays over Tor, Deepika Gopal and Nadia Heninger, Proceedings of the Workshop on Privacy in the Electronic Society (WPES), Raleigh, NC, October 2012.

Priceless: The Role of Payments in Abuse-advertised Goods, Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, October 2012, pages 845-856.

Manufacturing Compromise: The Emergence of Exploit-as-a-Service, Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, October 2012, pages 821-832.

Be Conservative: Enhancing Failure Diagnosis with Proactive Logging, Ding Yuan, Soyeon Park, Peng Huang, Yang Liu, Michael Lee, Xiaoming Tang, Yuanyuan Zhou, and Stefan Savage, Proceedings of the 9th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Hollywood, CA, October 2012.

Accurate Characterization of Variability in Power Consumption in Modern Computing Platforms, Bharathan Balaji, John McCullough, Rajesh Gupta, and Yuvraj Agarwal, Workshop on Power-Aware Computing and Systems (HotPower), Hollywood, CA, October 2012.

TinyTOCS as an Experimental Laboratory, George Porter, Proceedings of TinyTOCS, When rethinking academic publishing, don't retrofit a cathedral onto what should be a bazaar, September 2012.

RadioJockey: Mining Program Execution to Optimize Cellular Radio Usage, Pavan K Athivarapu, Ranjita Bhagwan, Saikat Guha, Vishna Navda, Ramachandran Ramjee, Dushyant Arora, Venkata N. Padmanabhan, and George Varghese, Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Istanbul, Turkey, August 2012.

A Demonstration of Ultra-low Latency Data Center Optical Circuit Switching (Demo session), Nathan Farrington, George Porter, Pang-Chen Sun, Alex Forencich, Joseph Ford, Yeshaiahu Fainman, George Papen, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Helsinki, Finland, August 2012.

NetPilot: Automating Datacenter Network Failure Mitigation, Xin Wi, Daniel Turner, George Chen, Dave Maltz, Xiaowei Yang, Lihua Yuan, and Ming Zhang, Proceedings of the ACM SIGCOMM Conference, Helsinki, Finland, August 2012.

Mirror Mirror on the Ceiling: Flexible Wireless Links for Data Centers, Xia Zhou, Zengbin Zhang, Yibo Li, Saipriya Kumar, Amin Vahdat, Ben Y. Zhao, and Haitao Zheng, Proceedings of the ACM SIGCOMM Conference, Helsinki, Finland, August 2012.

PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs, Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, and Kirill Levchenko, Proceedings of the USENIX Security Symposium, Bellevue, WA, August 2012, pages 1-16.

Establishing Browser Security Guarantees through Formal Shim Verification, Dongseok Jang, Zachary Tatlock, and Sorin Lerner, Proceedings of the USENIX Security Symposium, Bellevue, WA, August 2012.

When Good Services Go Wild: Reassembling Web Services for Unintended Purposes, Feng Lu, Jiaqi Zhang, and Stefan Savage, Proceedings of the USENIX Workshop on Hot Topics in Security, Bellevue, WA, August 2012.

NetShare and Stochastic NetShare: Predictable Bandwidth Allocation for Data Centers, Vinh The Lam, Sivasankar Radhakrishnan, Amin Vahdat, George Varghese, and Rang Pan, ACM SIGCOMM Computer Communication Review 42(3), July 2012.

scc: Cluster Storage Provisioning Informed by Application Characteristics and SLAs, Harsha V. Madhyastha, John C. McCullough, George Porter, Rishi Kapoor, Stefan Savage, Alex C. Snoeren, and Amin Vahdat, USENIX ;login: 37(3), June 2012.

Economic Analysis of Cybercrime in Crowdsourced Labor Markets, Vaibhav Garg, Chris Kanich, and L. Jean Camp, Proceedings of the Workshop on the Economics of Information Security (WEIS), Berlin, Germany, June 2012.

Measuring the Cost of Cybercrime, Ross Anderson, Chris Barton, Rainer Boehme, Richard Clayton, Michel J.G. van Eeten, Michael Levi, Tyler Moore, and Stefan Savage, Proceedings of the Workshop on the Economics of Information Security (WEIS), Berlin, Germany, June 2012.

Router Support for Fine-Grained Latency Measurements, Ramana Rao Kompella, Kirill Levchenko, Alex C Snoeren, and George Varghese, IEEE/ACM Transactions on Networking 20(3):811-824, June 2012.

When You Don't Trust Clients: Byzantine Proposer Fast Paxos, Hein Meling, Keith Marzullo, and Alessandro Mei, Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Macau, China, June 2012.

Software Abstractions for Trusted Sensors, He Liu, Stefan Saroiu, Alex Wolman, and Humanshu Raj, Proceedings of the ACM Conference on Mobile Systems, Appliations and Services (MobiSys), Low Wood Bay, Lake District, UK, June 2012.

Characterizing Logging Practices in Open-Source Software, Ding Yuan, Soyeon Park, and Yuanyuan Zhou, Proceedings of the International Conference on Software Engineering (ICSE), Zurich, Switzerland, June 2012.

Internet-Scale IPv4 Alias Resolution with MIDAR, Ken Keys, Young Hyun, Matthew Luckie, and kc claffy, IEEE/ACM Transactions on Networking 21(2), April 2012.

Practical TDMA for Datacenter Ethernet, Bhanu Vattikonda, George Porter, Amin Vahdat, and Alex C. Snoeren, Proceedings of the ACM European Conference in Computer Systems (EuroSys), Bern, Switzerland, April 2012.

Less is More: Trading a little Bandwidth for Ultra-Low Latency in the Data Center, Mohammad Alizadeh, Abdul Kabbani, Tom Edsall, Balaji Prabhakar, Amin Vahdat, and Masato Yasuda, Proceedings of the 9th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2012.

Header Space Analysis: Static Checking for Networks, Peyman Kazemian, George Varghese, and Nick McKeown, Proceedings of the 9th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2012.

Weighted Fair Queuing with Differential Dropping, Feng Lu, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the IEEE Infocom Conference, Orlando, FL, April 2012. (Mini-conference).

Return-Oriented Programming: Systems, Languages and Applications, Ryan Roemer, Erik Buchanan, Hovav Shacham, and Stefan Savage, ACM Transactions on Information and System Security 15(1), March 2012.

The BIZ Top-Level Domain: Ten Years Later, Tristan Halvorson, Janos Szurdi, Gregor Maier, Mark Felegyhazi, Christian Kreibich, Nicholas Weaver, Kirill Levchenko, and Vern Paxson, Proceedings of the Passive and Active Measurement Conference, Vienna, Austria, March 2012.

Improving Software Diagnosability via Log Enhancement, Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, and Stefan Savage, ACM Transactions on Computer Systems 30(1), February 2012.

BlueSky: A Cloud-Backed File System for the Enterprise, Michael Vrable, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2012, pages 19:1-19:14.

scc: Cluster Storage Provisioning Informed by Application Characteristics and SLAs, Harsha V. Madhyastha, John C. McCullough, George Porter, Rishi Kapoor, Stefan Savage, Alex C. Snoeren, and Amin Vahdat, Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2012.

Limitations of scanned human copresence encounters for modelling proximity-borne malware, James Mitchell, Eamonn O'Neill, Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, and Per Johansson, Proceedings of the International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, January 2012, pages F1.1.4:1--F1.1.5:10.

Extracting benefit from harm: using malware pollution to analyze the impac of political and geophysical events on the Internet, Alberto Dainotti, Roman Amman, Emil Aben, and kc claffy, ACM SIGCOMM Computer Communication Review 42(1), January 2012.

2011

In-situ MapReduce for Log Processing, Dionysios Logothetis, Chris Trezzo, Kevin C. Webb, and Kenneth Yocum, Proceedings of the USENIX Annual Technical Conference, Portland, OR, June 2011.

In Planning Digital Defenses, the Biggest Obstacle is Human Ingenuity, Stefan Savage, New York Times, Dec 6 2011.

TCP Fast Open, Sivasankar Radhakrishnan, Yuchung Cheng, Jerry Chu, Arvind Jain, and Barath Raghavan, Proceedings of ACM CoNEXT, Tokyo, Japan, December 2011.

Distributed Application Configuration, Management, and Visualization with Plush, Jeannie Albrecht, Ryan Braud, Darren Dao, Nikolay Topilski, Christopher Tuttle, Alex C. Snoeren, and Amin Vahdat, ACM Transactions on Internet Technology (TOIT) 11(2), Dec 2011.

GQ: Practical Containment for Measuring Modern Malware Systems, Christian Kreibich, Nicholas Weaver, Chris Kanich, Weidong Cui, and Vern Paxson, Proceedings of the ACM Internet Measurement Conference, Berlin, CA, November 2011.

An Analysis of Underground Forums, Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference, Berlin, CA, November 2011, pages 71-80.

Analysis of Country-wide Internet Outages Caused by Censorship, Alberto Dainotti, Claudio Squarcella, Emile Aben, kc claffy, Marco Chiesa, Michele Russo, and Antonio Pescapé, Proceedings of the ACM Internet Measurement Conference, Berlin, CA, November 2011.

ALIAS: Scalable, Decentralized Label Assignment for Data Centers, Meg Walraed-Sullivan, Radhika Niranjan Mysore, Malveeka Tewari, Ying Zhang, Keith Marzullo, and Amin Vahdat, Proceedings of the ACM Symposium on Cloud Computing (SOCC), Cascais, Portugal, October 2011.

Switching the Optical Divide: Fundamental Challenges for Hybrid Electrical/Optical Datacenter Networks, Hamid Hajabdolali Bazzaz, Malveeka Tewari, Guohui Wang, George Porter, T. S. Eugene Ng, David G. Andersen, Michael Kaminsky, Michael A. Kozuch, and Amin Vahdat, Proceedings of the ACM Symposium on Cloud Computing (SOCC), Cascais, Portugal, October 2011.

An Empirical Study on Configuration Errors in Commercial and Open Source Systems, Zuoning Yin, Xiao Ma, Jing Zheng, Yuanyuan Zhou, Lakshmi Bairavasundaram, and Shankar Pasupathy, Proceedings of the 23th ACM Symposium on Operating Systems Principles (SOSP), Cascais, Portugal, October 2011.

A Characterization of Node Update Distributions in the PlanetLab Test Bed, Hakon Verespej and Joseph Pasquale, Proceedings of the IEEE Symposium on Reliable Distributed Systems (SRDS), Madrid, Spain, October 2011.

Judging a site by its content: learning the textual, structural, and visual features of malicious Web pages, Sushma Nagesh Bannur, Lawrence K. Saul, and Stefan Savage, Proceedings of the ACM Workshop on Artificial Intelligence and Security (AISEC), Chicago, IL, October 2011.

Topic Modeling of Freelance Job Postings to Monitor Web Service Abuse, Do-kyum Kim, Marti Motoyama, Geoffrey M. Voelker, and Lawrence K. Saul, Proceedings of the ACM Workshop on Artificial Intelligence and Security (AISEC), Chicago, IL, October 2011, pages 11-20.

Cloak and Dagger: Dynamics of Web Search Cloaking, David Wang, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Computer and Communications Security, Chicago, IL, October 2011, pages 477-490.

On the Empirical Performance of Self-calibrating WiFi Location Systems, Daniel Turner, Stefan Savage, and Alex C. Snoeren, Proceedings of IEEE Conference on Local Computer Networks (LCN), Bonn, Germany, October 2011.

How Do Fixes Become Bugs? -- A Comprehensive Characteristic Study on Incorrect Fixes in Commercial and Open Source Operating Systems, Zuoning Yin, Ding Yuan, Yuanyuan Zhou, Shankar Pasupathy, and Lakshmi N. Bairavasundaram, Proceedings of the European Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE), Szeged, Hungary, September 2011.

What's the Difference? Efficient Set Reconciliation without Prior Context, David Eppstein, Michael T. Goodrich, Frank Uyeda, and George Varghese, Proceedings of the ACM SIGCOMM Conference, Toronto, Canada, August 2011.

Interview with Stefan Savage: On the Spam Payment Trail, Rik Farrow and Stefan Savage, USENIX ;login: 36(4):7-20, August 2011.

Putting Out a HIT: Crowdsourcing Malware Installs, Chris Kanich, Stephen Checkoway, and Keaton Mowery, Proceedings of Workshop On Offensive Technologies (WOOT), August 2011.

Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks, Keaton Mowery, Sarah Meiklejohn, and Stefan Savage, Proceedings of Workshop On Offensive Technologies (WOOT), August 2011.

No Plan Survives Contact: Experience with Cybercrime Measurement, Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2011, pages 2:1-2:8.

ExperimenTor: A Testbed for Safe Realistic Tor Experimentation, Kevin Bauer, Micah Sherr, Damon McCoy, and Dirk Grunwald, Proceedings of Workshop on Cyber Security Experimentation and Test (CSET), August 2011.

Show Me the Money: Characterizing Spam-advertised Revenue, Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011, pages 219-234.

Dirty Jobs: The Role of Freelance Labor in Web Service Abuse, Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011, pages 203-218.

Comprehensive Experimental Analyses of Automotive Attack Surfaces, Stephen Checkoway, Damon McCoy, Danny Anderson, Brian Kantor, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno, Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011.

The Phantom Tollbooth: Privacy-preserving Electronic Toll Collection in the Presence of Driver Collusion, Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, and Hovav Shacham, Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011.

DefenestraTor: Throwing out Windows in Tor, Mashael AlSabah, Kevin Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker, Privacy Enhancing Technologies Symposium, Waterloo, Canada, July 2011, pages 134-154.

DieCast: Testing Distributed Systems with an Accurate Scale Model, Diwaker Gupta, Kashi V. Vishwanath, Marvin McNett, Amin Vahdat, Ken Yocum, Alex C. Snoeren, and Geoffrey M. Voelker, ACM Transactions on Computer Systems 29(2):4:1-4:48, May 2011.

Evaluating the Effectiveness of Model-Based Power Characterization, John McCullough, Yuvraj Agarwal, Jaideep Chandrashekhar, Sathyanarayan Kuppuswamy, Alex C. Snoeren, and Rajesh Gupta, Proceedings of the USENIX Annual Technical Conference, Portland, OR, June 2011.

Context-based Online Configuration-Error Detection, Ding Yuan, Yinglian Xie, Rina Panigrahy, Junfeng Yang, Chad Verbowski, and Arunvijay Kumar, Proceedings of the USENIX Annual Technical Conference, Portland, OR, June 2011.

In-situ MapReduce for Log Processing, Dionysios Logothetis, Chris Trezzo, Kevin C. Webb, and Kenneth Yocum, Proceedings of the USENIX Annual Technical Conference, Portland, OR, June 2011.

Fine-Grained Latency and Loss Measurements in the Presence of Reordering, Myunglin Lee, Sharon Goldberg, Ramana Rao Kompella, and George Varghese, Proceedings of the ACM SIGMETRICS Conference, San Jose, CA, June 2011.

Privacy-preserving Network Forensics, Mikhail Afanasyev, Tadayoshi Kohno, Justin Ma, Nick Murphy, Stefan Savage, Alex C. Snoeren, and Geoffrey M. Voelker, Communications of the Association for Computing Machinery 54(5):78-87, May 2011.

Click Trajectories: End-to-End Analysis of the Spam Value Chain, Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2011, pages 431-446.

aComment: Mining Annotations from Comments and Code to Detect Interrupt-Related Concurrency Bugs, Lin Tan, Yuanyuan Zhou, and Yoan Papioleau, Proceedings of the International Conference on Software Engineering (ICSE), Honolulu, HI, May 2011.

Learning to Detect Malicious URLs, Justin Ma, Lawrence K Saul, Stefan Savage, and Geoffrey M Voelker, ACM Transactions on Intelligent Systems and Technology (TIST) 2(3):30:1-30:24, April 2011.

Dissemination in Opportunistic Mobile Ad-hoc Networks: the Power of the Crowd, Gjergji Zyba, Geoffrey M. Voelker, Stratis Ioannidis, and Christophe Diot, Proceedings of the IEEE Infocom Conference, Shanghai, China, April 2011, pages 1179-1187.

Achieving Congestion Diversity in Wireless Ad-hoc Networks, Abhijeet A. Bhorkar, Tara Javidi, and Alex C. Snoeren, Proceedings of the IEEE Infocom Conference, Shanghai, China, April 2011. (Mini-conference).

The Emerging Optical Data Center, Amin Vahdat, Hong Liu, Xiaoxue Zhao, and Chris Johnson, Proceedings of OFC/NFOEC, Los Angeles, CA, March 2011.

Hardware Requirements for Optical Circuit Switched Data Center Networks, Nathan Farrington, Yeshaiahu Fainman, Hong Liu, George Papen, and Amin Vahdat, Proceedings of OFC/NFOEC, Los Angeles, CA, March 2011.

TritonSort: A Balanced Large-Scale Sorting System, Alexander Rasmussen, George Porter, Michael Conley, Harsha V. Madhyastha, Radhika Niranjan Mysore, Alexander Pucher, and Amin Vahdat, Proceedings of the 8th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, March 2011.

Efficiently Measuring Bandwidth at All Time Scales, Frank Uyeda, Luca Foschini, Subhash Suri, and George Varghese, Proceedings of the 8th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, March 2011.

On the Effects of Registrar-level Intervention, He Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, March 2011, pages 1-8.

Topology Switching for Data Center Networks, Kevin Webb, Alex C. Snoeren, and Kenneth Yocum, USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services, Boston, MA, March 2011.

Got Traffic? An Evaluation of Click Traffic Providers, Qing Zhang, Thomas Ristenpart, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the WICOM/AIRWeb Workshop on Web Quality (WebQuality), Hyderabad, India, March 2011, pages 19-26.

Improving Software Diagnosability via Log Enhancement, Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, and Stefan Savage, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Newport Beach, CA, March 2011.

Proximax: Fighting Censorship with an Adaptive System for Distribution of Open Proxies, Damon McCoy, Jose Andre Morales, and Kirill Levchenko, Proceedings of the International Conference on Financial Cryptography and Data Security, St Lucia, February 2011.

Sora: High-performance Software Radio using General-purpose Multi-core Processors, Kun Tan, He Liu, Jiansong Zhang, Yongguang Zhang, Ji Fang, and Geoffrey M. Voelker, Communications of the Association for Computing Machinery 54(1):99-107, January 2011.

Measured Impact of Crooked Traceroute, Matthew Luckie, Amogh Dhamdhere, kc claffy, and David Murrell, ACM SIGCOMM Computer Communication Review 41(1), January 2011.

2010

Knowledge File System -- A principled approach to personal information management, Kuiyu Chang, I Wayan Tresna Perdana, Bramandia Ramadhana, Kailash Sethuraman, Truc Viet Le, and Neha Chachra, IEEE ICDM Workshop on Data Mining for Services, Sydney, Australia, December 2010, pages 1037-1044.

Scale-Out Networking in the Data Center, Amin Vahdat, Mohammad Al-Fares, Nathan Farrington, Radhika Niranjan Mysore, George Porter, and Sivasankar Radhakrishnan, IEEE MICRO 30(4):29-41, August 2010.

Practical Defenses for Evil Twin Attacks in 802.11, Harold Gonzales, Kevin Bauer, Janne Lindqvist, and Damon McCoy, Proceedings of IEEE GlobeCom 2010, Miami, FL, December 2010.

Toward Improving Path Selection in Tor, Fallon T. Chen and Joseph Pasquale, Proceedings of IEEE GlobeCom 2010, Miami, FL, December 2010.

VNC in High-Latency Environments and Techniques for Improvement, Taurin Tan-atichat and Joseph Pasquale, Proceedings of IEEE GlobeCom 2010, Miami, FL, December 2010.

Resolving IP Aliases with Prespecified Timestamps, Justine Sherry, Ethan Katz-Bassett, Mary Pimenova, Harsha V. Madhyastha, Arvind Krishnamurthy, and Thomas Anderson, Proceedings of the ACM Internet Measurement Conference, Melbourne, Australia, November 2010.

How to Tell an Airport from a Home: Techniques and Applications, Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martin Abadi, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets-IX), Monterey, CA, October 2010, pages 13:1-13:6.

Fault Localization via Risk Modeling, Ramana Rao Kompella, Jennifer Yates, Albert Greenberg, and Alex C. Snoeren, IEEE Transactions on Dependable and Secure Computing 7(4):396-409, October 2010.

Difference Engine: Harnessing Memory Redundancy in Virtual Machines, Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat, Communications of the Association for Computing Machinery 53(10):85-93, October 2010.

Usage Patterns in an Urban WiFi Network, Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, and Alex C. Snoeren, IEEE/ACM Transactions on Networking 18(5):1359-1372, October 2010.

Ad Hoc Synchronization Considered Harmful, Weiwei Xiong, Soyeon Park, Jiaqi Zhang, Yuanyuan Zhou, and Zhiqiang Ma, Proceedings of the 9th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Vancouver, Canada, October 2010.

Do I Use the Wrong Definition? DefUse: Definition-Use Invariants for Detecting Concurrency and Sequential Bugs, Yao Shi, Soyeon Park, Suoning Yin, Shan Lu, Yuanyuan Zhou, Wenguang Chen, and Weimin Zheng, Proceedings of the Conference on Object-Oriented Programming: Systems, Languages, and Applications (OOPSLA), October 2010.

Hyperbolic Geometry of Complex Networks, Dmitri Krioukov, Fragkiskos Papadopoulos, Maksim Kitsak, Amin Vahdat, and Marian Boguna, Physical Review E 82(3), September 2010.

Helios: A Hybrid Electrical/Optical Switch Architecture for Modular Data Centers, Nathan Farrington, George Porter, Sivasankar Radhakrishnan, Hamid Bazzaz, Vikram Subramanya, Yeshaiahu Fainman, George Papen, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, New Delhi, India, August 2010.

California Fault Lines: Understanding the Causes and Impact of Network Failures, Daniel Turner, Kirill Levchenko, Alex C. Snoeren, and Stefan Savage, Proceedings of the ACM SIGCOMM Conference, New Delhi, India, August 2010.

Re: CAPTCHAs -- Understanding CAPTCHA-Solving from an Economic Context, Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the USENIX Security Symposium, Washington, D.C., August 2010, pages 435-452.

Beyond Heuristics: Learning to Classify Vulnerabilities and Predict Exploits, Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGKDD Conference, Washington D.C., July 2010, pages 105-114.

Towards Understanding Bugs in Open Source Router Software, Zuoning Yin, Matthew Caesar, and Yuanyuan Zhou, ACM SIGCOMM Computer Communication Review 40(3), July 2010.

Improving HTTP-based Video Performance using Network Flow Buffering, Jesse Steinberg and Joseph Pasquale, Proceedings of the 15th IEEE Symposium on Computers and Communications (ISCC), Riccione, Italy, June 2010.

SecondLife: a Social Network of Humans and Bots, Matteo Varvello and Geoffrey M. Voelker, Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Amsterdam, the Netherlands, June 2010, pages 9-14.

Measuring Online Service Availability Using Twitter, Marti Motoyama, Brendan Meeder, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker, Proceedings of ACM Workshop on Online Social Networks (WOSN), Boston, MA, June 2010, pages 13:1-13:9.

Stout: An Adaptive Interface to Scalable Cloud Storage, John C. McCullough, John Dunagan, Alec Wolman, and Alex C. Snoeren, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2010.

SleepServer: A Software-Only Approach for Reducing the Energy Consumption of PCs within Enterprise Environments, Yuvraj Agarwal, Stefan Savage, and Rajesh Gupta, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2010.

Stateful Bulk Processing for Incremental Algorithms, Dionysios Logothetis, Christopher Olston, Benjamin Reed, Kevin C. Webb, and Ken Yocum, Proceedings of the ACM Symposium on Cloud Computing (SOCC), Indianapolis, IN, June 2010.

Fluxo: A System for Internet Service Programming by Non-expert Developers, Emre Kiciman, Benjamin Livshits, Madanlal Musuvathi, and Kevin C. Webb, Proceedings of the ACM Symposium on Cloud Computing (SOCC), Indianapolis, IN, June 2010.

Improving Video Performance in VNC Under Latency Conditions, Cynthia Taylor and Joseph Pasquale, Proceedings of the International Symposium on Collaborative Technologies and Systems (CTS), Chicago, May 2010.

Experimental Security Analysis of a Modern Automobile, Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage, Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2010.

Exploiting Feature Covariance in High-Dimensional Online Learning, Justin Ma, Alex Kulesza, Mark Dredze, Koby Crammer, Lawrence K. Saul, and Fernando Pereira, Proceedings of the International Conference on Artificial Intelligence and Statistics (AISTATS), Sardinia, Italy, May 2010.

Analysis of Durability of Replicated Distributed Storage Systems, Sriram Ramabhadran and Joseph Pasquale, Proceedings of the International Parallel and Distributed Processing Symposium, Atlanta, GA, April 2010.

SlimGene: Compressing Genomic Sequences using SLIMGENE, Christos Kozanitis, Chris Saunders, Semyon Krugylak, Vineet Bafna, and George Varghese, Proceedings of the International Conference on Research in Computational Molecular Biology, Lisbon, Portugal, April 2010.

Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer, Stephen Checkoway, Hovav Shacham, and Eric Rescorla, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Jose, CA, April 2010.

Experiences with Tracing Causality in Networked Services, Rodrigo Fonseca, Michael J. Freedman, and George Porter, Proceedings of the Internet Network Management Workshop / Workshop on Research on Enterprise Networking (INM/WREN), San Jose, CA, April 2010.

Hedera: Dynamic Flow Scheduling for Data Center Networks, Mohammad Al-Fares, Sivasankar Radhakrishnan, Barath Raghavan, Nelson Huang, and Amin Vahdat, Proceedings of the 7th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2010.

Carousel: Scalable Logging for Intrusion Prevention Systems, Terry Lam, Michael Mitzenmacher, and George Varghese, Proceedings of the 7th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2010.

SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies, Jayaram Mudigonda, Praveen Yalagandula, Mohammad Al-Fares, and Jeffrey C. Mogul, Proceedings of the 7th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2010.

Reverse Traceroute, Ethan Katz-Bassett, Harsha V. Madhyastha, Vijay Kumar Adhikari, Colin Scott, Justine Sherry, Peter van Wesep, Thomas Anderson, and Arvind Krishnamurthy, Proceedings of the 7th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2010.

EndRE: An End-System Redundancy Elimination Service for Enterprises, Bhavish Aggarwal, Aditya Akella, Ashok Anand, Pushkar Chitnis, Chitra Muthukrishnan, Athula Nair, Ramachandran Ramjee, and George Varghese, Proceedings of the 7th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, April 2010.

Operator and Radio Resource Sharing in Multi-Carrier Environments, Pongsakorn Teeraparpwong, Per Johansson, Harsha V. Madhyastha, and Amin Vahdat, Proceedings of the 12th IEEE/IFIP Network Operations and Management Symposium (NOMS'10), April 2010.

Towards a Proximal Resource-based Architecture to Support Augmented Reality Applications, Cynthia Taylor and Joseph Pasquale, Proceedings of the Workshop on Cloud-Mobile Convergence for Virtual Reality (CMCVR), Waltham, MA, March 2010.

Neon: System Support for Derived Data Management, Qing Zhang, John McCullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Pittsburgh, PA, March 2010, pages 63-74.

Leaping Multiple Headers in a Single Bound: Wire Speed Parsing using the Kangaroo System, Christos Kozanitis, John Huber, Sushil Singh, and George Varghese, Proceedings of the IEEE Infocom Conference, San Diego, CA, March 2010.

Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces, Fragkiskos Papadopoulos, Dmitri Krioukov, Marian Boguna, and Amin Vahdat, Proceedings of the IEEE Infocom Conference, San Diego, CA, March 2010.

SherLog: Error Diagnosis by Connecting Clues from Run-time Logs, Ding Yuan, Haohui Mai, Weiwei Xiong, Lin Tan, Yuanyuan Zhou, and Shankar Pasupathy, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Pittsburgh, PA, March 2010.

Botnet Judo: Fighting Spam with Itself, Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, and Stefan Savage, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2010.

Covenant: An Architecture for Cooperative Scheduling in 802.11 Wireless Networks, Iswhar Ramani, Ramana Rao Kompella, Sriram Ramabhadran, and Alex C. Snoeren, IEEE Transactions on Wireless Communications(1), January 2010.

Towards Decoupling Storage and Computation in Hadoop with SuperDataNodes, George Porter, ACM SIGOPS Operating Systems Review 44(2):41-46, April 2010.

2009

Cumulus: Filesystem Backup to the Cloud, Michael Vrable, Stefan Savage, and Geoffrey M. Voelker, ACM Transaction on Storage 5(4):1-28, December 2009.

mPlane: An Architecture For Scalable Fault Localization, Ramana Rao Kompella, Alex C. Snoeren, and George Varghese, Proceedings of the ACM CoNext Workshop on Re-Architecting the Internet, Rome, Italy, December 2009.

Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security, Chicago, IL, November 2009.

When Private Keys are Public: Results from the 2008 Debian OpenSSL Debacle, Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, and Stefan Savage, Proceedings of the ACM Internet Measurement Conference, Chicago, IL, November 2009.

The Importance of Being Overheard: Throughput Gains in Wireless Mesh Neworks, Mikhail Afanasyev and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference, Chicago, IL, November 2009.

Moving Beyond End-to-End Path Information to Optimize CDN Performance, Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srinivasan, Sushant Jain, Arvind Krishnamurthy, Thomas Anderson, and Jie Gao, Proceedings of the ACM Internet Measurement Conference, Chicago, IL, November 2009. (Best paper).

Understanding the Efficacy of Deployed Internet Source Address Validation Filtering, Robert Beverly, Arthur Berger, Young Hyun, and k claffy, Proceedings of the ACM Internet Measurement Conference, Chicago, IL, November 2009.

I Seek Uou: Searching and Matching Individuals in Social Networks, Marti Motoyama and George Varghese, Proceedings of the ACM Workshop on Web Information and Data Management (WIDM), November 2009.

Evaluating the Impact of Inaccurate Information in Utility-Based Scheduling, Alvin AuYoung, Amin Vahdat, and Alex C. Snoeren, Proceedings of the ACM Conference on High Performance Computing and Networking, Portland, OR, November 2009.

Two Auction-Based Resource Allocation Environments: Design and Experience, Alvin AuYoung, Phil Buonadonna, Brent N. Chun, Chaki Ng, David C. Parkes, Jeff Shneidman, Alex C. Snoeren, and Amin Vahdat, In Market Oriented Grid and Utility Computing. Rajkumar Buyya and Kris Bubendorfer, editor. Wiley, 2009.

Pitfalls for ISP-friendly P2P Design, Michael Piatek, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, and Thomas Anderson, Proceedings of the 8th ACM Workshop on Hot Topics in Networks (HotNets-VIII), New York City, NY, October 2009.

GT: picking up the truth from the ground for Internet traffic, F. Rgringoli, L. Salgarelli, M. Dusa, N. Cascarano, F. Risso, and k claffy, ACM SIGCOMM Computer Communication Review 39(5), October 2009.

PRES: Probabilistic Replay with Execution Sketching on Multiprocessors, Soyeon Park, Weiwei Xiong, Zuoning Yin, Rini Kaushik, Kyu H. Lee, Shan Lu, and Yuanyuan Zhou, Proceedings of the 22th ACM Symposium on Operating Systems Principles (SOSP), Big Sky, MT, October 2009.

Curvature and Temperature of Complex Networks, Dmitri Krioukov, Fragkiskos Papadopoulos, Amin Vahdat, and Marián Boguñá, Physical Review E 80(3):035101, September 2009.

SAM: Enabling Practical Spatial Multiple Access in Wireless LAN, Kun Tan, He Liu, Ji Fang, Wei Wang, Jiansong Zhang, Mi Chen, and Geoffrey M. Voelker, Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Beijing, China, September 2009.

Spamalytics: An Empirical Analysis of Spam Marketing Conversion, Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, Communications of the Association for Computing Machinery 52(9):99-107, September 2009.

Graph Annotations in Modeling Complex Network Topologies, Xenofontas Dimitropoulos, Dmitri Krioukov, Amin Vahdat, and George Riley, Transactions on Modeling and Computer Simulation 19(4), September 2009.

Every Microsecond Counts: Tracking Fine-Grain Latencies with a Lossy Difference Aggregator, Ramana Rao Kompella, Kirill Levchenko, Alex C. Snoeren, and George Varghese, Proceedings of the ACM SIGCOMM Conference, Barcelona, Spain, August 2009.

PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric, Radhika Niranjan Mysore, Andreas Pamboris, Nathan Farrington, Nelson Huang, Pardis Miri, Sivasankar Radhakrishnan, Vikram Subramanya, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Barcelona, Spain, August 2009.

Detailed Diagnosis in Enterprise Networks, Srikanth Kandula, Ratul Mahajan, Patrick Verkaik, Sharad Agarwal, Jitu Padhye, and Paramvir Bahl, Proceedings of the ACM SIGCOMM Conference, Barcelona, Spain, August 2009.

Cumulus: filesystem backup to the Cloud, Michael Vrable, Stefan Savage, and Geoffrey M. Voelker, USENIX ;login: 34(4):7-13, August 2009.

Data Center Switch Architecture in the Age of Merchant Silicon, Nathan Farrington, Erik Rubow, and Amin Vahdat, Proceedings of the IEEE Symposium on Hot Interconnects, August 2009.

GrassRoots: Socially-Driven Web Sites for the Masses, Frank Uyeda, Diwaker Gupta, Amin Vahdat, and George Varghese, Proceedings of ACM Workshop on Online Social Networks (WOSN), Barcelona, Spain, August 2009.

MobiClique Middleware for Mobile Social Networking, Anna-Kaisa Pietilainen, Earl Oliver, Jason LeBrun, George Varghese, and Christophe Diot, Proceedings of ACM Workshop on Online Social Networks (WOSN), Barcelona, Spain, August 2009.

CrossTalk: Scalably Interconnecting Instant Messenger Networks, Marti Motoyama and George Varghese, Proceedings of ACM Workshop on Online Social Networks (WOSN), Barcelona, Spain, August 2009.

Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default, Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren, and David Wetherall, Privacy Enhancing Technologies Symposium, Seattle, Washington, August 2009.

Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage, Stephen Checkoway, Ariel J. Feldman, Brian Kantor, J. Alex Halderman, Edward W. Felten, and Hovav Shacham, Proceedings of EVT 2009, Montreal, Canada, July 2009.

Storage System Problem Troubleshooting and System Logs, Weihang Jiang, Chongfeng Hu, Shankar Pasupathy, Arkady Kanevsky, and Yuanyuan Zhou, USENIX ;login: 34(3), June 2009.

Realistic and Responsive Network Traffic Generation, Kashi Vishwanath and Amin Vahdat, IEEE/ACM Transactions on Networking 17(3):712-725, June 2009.

Secure and Policy-Compliant Source Routing, Barath Raghavan, Patrick Verkaik, and Alex C. Snoeren, IEEE/ACM Transactions on Networking 17(3):764-777, June 2009.

Towards Low Latency State Machine Replication for Uncivil Wide-area Networks, Yanhua Mao, Flavio P. Junqueira, and Keith Marzullo, Fifth Workshop on Hot Topics in System Dependability (HotDep), Estoril, Lisbon, Portugal, June 2009.

Identifying Suspicious URLs: An Application of Large-Scale Online Learning, Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the International Conference on Machine Learning, Montreal, Quebec, June 2009, pages 681-688.

Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs, Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGKDD Conference, Paris, France, June 2009, pages 1245-1254.

Defending Mobile Phones from Proximity Malware, Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, and Per Johansson, Proceedings of the IEEE Infocom Conference, Rio de Janeiro, Brazil, April 2009, pages 1503-1511.

Greedy Forwarding in Scale-Free Networks Embedded in Hyperbolic Metric Spaces, Dmitri Krioukov, Fragkiskos Papadopoulos, Marian Boguna, and Amin Vahdat, 11th ACM SIGMETRICS Workshop on Mathematical Performance Modeling and Analysis, June 2009.

Spamcraft: An Inside Look at Spam Campaign Orchestration, Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, April 2009, pages 4:1-4:9.

Difference Engine, Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat, USENIX ;login: 34(2):24-31, April 2009.

Softspeak: Making VoIP Play Well in Existing 802.11 Deployments, Patrick Verkaik, Yuvraj Agarwal, Rajesh Gupta, and Alex C. Snoeren, Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009.

iPlane Nano: Path Prediction for Peer-to-Peer Applications, Harsha V. Madhyastha, Ethan Katz-Bassett, Thomas Anderson, Arvind Krishnamurthy, and Arun Venkataramani, Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009.

Somniloquy: Augmenting Network Interfaces to Reduce PC Energy Usage, Yuvraj Agarwal, Ranveer Chandra, Steve Hodges, James Scott, Paramvir Bahl, and Rajesh Gupta, Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009.

Cimbiosys: A platform for content-based partial replication, Venugopalan Ramasubramanian, Thomas L. Rodeheffer, Douglas B. Terry, Meg Walraed-Sullivan, Ted Wobber, Cathy Marshall, and Amin Vahdat, Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009.

NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge, Bhavish Aggarwal, Ranjita Bhagwan, Tathagata Das, Siddharth Eswaran, Venkata N. Padmanabhan, and Geoffrey M. Voelker, Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009, pages 349-364.

Sora: High Performance Software Radio Using General Purpose Multi-core Processors, Kun Tan, Jiansong Zhang, Haitao Wu, Fang Ji, He Liu, Yusheng Ye, Shen Wang, Yongguang Zhang, Wei Wang, and Geoffrey M. Voelker, Proceedings of the 6th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, April 2009, pages 75-90. (Award paper).

Short Paper: Improving the Responsiveness of Internet Services with Automatic Cache Placement, Alexander Rasmussen, Emre Kiciman, Benjamin Livshits, and Madanlal Musuvathi, Proceedings of the ACM European Conference in Computer Systems (EuroSys), Nuremberg, Bermany, March 2009.

Memory Resource Allocation for File System Prefetching -- From a Supply Chain Management Perspective, Zhe Zhang, Amit Kulkarni, Xiaosong Ma, and Yuanyuan Zhou, Proceedings of the ACM European Conference in Computer Systems (EuroSys), Nuremberg, Bermany, March 2009.

CTrigger: Exposing Atomicity Violation Bugs from Their Hiding Places, Soyeon Park, Shan Lu, and Yuanyuan Zhou, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Washington, DC, March 2009.

Efficient On-line Validation with Delta Execution, Joseph Tucek, Weiwei Xiong, and Yuanyuan Zhou, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Washington, DC, March 2009.

Live Debugging of Distributed Systems, Darren Dao, Jeannie Albrecht, Charles Killian, and Amin Vahdat, Proceedings of the International Conference on Compiler Construction, March 2009.

Detecting Malicious Packet Losses, Alper Mizrak, Stefan Savage, and Keith Marzullo, IEEE Transactions on Parallel and Distributed Systems 20(2), February 2009.

Understanding Customer Problem Troubleshooting from Storage System Logs, Weihang Jiang, Chongfeng Hu, Shankar Pasupathy, Arkady Kanevsky, Zhenmin Li, and Yuanyuan Zhou, Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), San Francisco, CA, February 2009, pages 43-56.

Cumulus: Filesystem Backup to the Cloud, Michael Vrable, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), San Francisco, CA, February 2009, pages 225-238.

MPIWiz: Subgroup Reproducible Replay of MPI Applications, Ruini Xue, Xuezheng Liu, Ming Wu, Zhenyu Guo, Wenguang Chen, Weimin Zheng, Zheng Zhang, and Geoffrey M. Voelker, Proceedings of the 14th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP), Raleigh, North Carolina, USA, February 2009, pages 251-260.

Towards Decoupling Storage and Computation in Hadoop with SuperDataNodes, George Porter, Proceedings of the International Workshop on Large-Scale Distributed Systems and Middleware (LADIS), Big Sky, MT, October 2009.

2008

Difference Engine: Harnessing Memory Redundancy in Virtual Machines, Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat, Proceedings of the 8th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, December 2008, pages 309-322. (Award paper).

Mencius: Building Efficient Replicated State Machines for WANs, Yanhua Mao, Flavio Junqueira, and Keith Marzullo, Proceedings of the 8th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, December 2008.

Towards Automatic Inference of Task Hierarchies in Complex Systems, Haohui Mai, Chongnan Gao, Xuezheng Liu, Xi Wang, and Geoffrey M. Voelker, Fourth Workshop on Hot Topics in System Dependability (HotDep), San Diego, CA, USA, December 2008, pages 7:1-7:6.

Internet Traffic Classification Demystified: Myths, Caveats, and the Best Practices, Hyun-chil Kim, k claff, Marino Fomenkov, Dhiman Barman, Michalis Faloutsos, and KiYoung Lee, Proceedings of ACM CoNEXT, Madrid, Spain, December 2008.

Are Disks the Dominant Contributor for Storage Failures - A Comprehensive Study of Storage Subsystem Failure Characteristics, Weihang Jiang, Chongfeng Hu, Yuanyuan Zhou, and Arkady Kanevsky, ACM Transaction on Storage 4(3), November 2008.

Spamalytics: an Empirical Analysis of Spam Marketing Conversion, Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, October 2008, pages 3-14.

Reconsidering Physical Key Secrecy: Teleduplication via Optical Decoding, Benjamin Laxton, Kai Wang, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, October 2008.

When Good Instructions Go Bad: Generalizing Return-oriented Programming to the SPARC, Erik Buchanan, Ryan Roemer, Hovav Shacham, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, October 2008.

Analysis of a Mixed-Use Urban WiFi Network: When Metropolitan becomes Neapolitan, Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, and Alex C. Snoeren, Proceedings of the ACM Internet Measurement Conference, Vouliagmeni, Greece, October 2008, pages 85-98.

Design and Implementation Tradeoffs for Wide-Area Resource Discovery, Jeannie Albrecht, David Oppenheimer, David Patterson, and Amin Vahdat, ACM Transactions on Internet Technology (TOIT) 8(4), Sep 2008.

XL: An Efficient Network Routing Algorithm, Kirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, and Stefan Savage, Proceedings of the ACM SIGCOMM Conference, Seattle, WA, August 2008.

A Scalable, Commodity, Data Center Network Architecture, Mohammad Al-Fares, Alex Loukissas, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Seattle, WA, August 2008.

Storm: When Researchers Collide, Brandon Enright, Geoff Voelker, Stefan Savage, Chris Kanich, and Kirill Levchenko, USENIX ;login: 33(4):6-13, August 2008.

Flexible Resource Allocation and Composition Across GSM/3G Networks and WLANs, Mohammad Al-Fares, Martin Johnsson, Per Johansson, and Amin Vahdat, Proceedings of the International Workshop on Mobility in the Evolving Internet Architecture (MobiArch), August 2008.

Google's Deep-Web Crawl, Jayant Madhavan, David Ko, Lucja Kot, Vignesh Ganapathy, Alexander Rasmussen, and Alon Halevy, Proceedings of the 34th Internation Conference on Very Large Data Bases (VLDB), Auckland, New Zealand, August 2008.

Ad-Hoc Data Processing in the Cloud (demo), Dionysios Logothetis and Ken Yocum, Proceedings of the 34th Internation Conference on Very Large Data Bases (VLDB), Auckland, New Zealand, August 2008.

AutoISES: Automatically Inferring Security Specifications and Detecting Violations, Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, and Yuanyuan Zhou, Proceedings of the USENIX Security Symposium, San Jose, CA, August 2008.

Trace-based Microarchitecture-level Diagnosis of Permanent Hardware Faults, Man-Lap Li, Pradeep Ramachandran, Swarup Kumar Sahoo, Sarita V. Adve, Vikram S. Adve, and Yuanyuan Zhou, Proceedings of the IEEE Conference on Dependable Systems and Networks (DSN), Anchorage, AK, June 2008, pages 22-31.

Using Likely Program Invariants to Detect Hardware Errors, Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandran, Sarita V. Adve, Vikram S. Adve, and Yuanyuan Zhou, Proceedings of the IEEE Conference on Dependable Systems and Networks (DSN), Anchorage, AK, June 2008, pages 70-79.

Evaluating Distributed Systems: Does Background Traffic Matter?, Kashi Vishwanath and Amin Vahdat, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2008.

Wide-Scale Data Stream Management, Dionysios Logothetis and Ken Yocum, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2008.

Improving Scalability and Fault Tolerance in an Application Management Infrastructure, Nick Topilski, Jeannie Albrecht, and Amin Vahdat, Proceedings of the USENIX Workshop on Large-Scale Computing (LASCO), Boston, MA, June 2008.

Automatic Request Categorization in Internet Services, Abhishek Sharma, Ranjita Bhagwan, Monojit Choudhury, Leana Golubchik, Ramesh Govindan, and Geoffrey M. Voelker, Proceedings of the First Workshop on Hot Topics in Measurement and Modeling of Computer Systems (HotMetrics), Annapolis, MD, June 2008.

CISpan: Comprehensive Incremental Mining Algorithms of Closed Sequential Patterns for Multi-Versional Software Mining, Yuanyuan Zhou Ding Yuan, Kyuhyung Lee Hong Cheng Gopal Krishna Zhenmin Li Xiao Ma and Jiawei Han, Proceedings of the 2008 SIAM International Conference on Data Mining, April 2008.

DieCast: Testing Distributed Systems with an Accurate Scale Model, Diwaker Gupta, Kashi Vishwanath, and Amin Vahdat, Proceedings of the 5th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, April 2008.

Efficiency through Eavesdropping: Link-layer Packet Caching, Mikhail Afanasyev, David G. Andersen, and Alex C. Snoeren, Proceedings of the 5th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, April 2008.

On the Spam Campaign Trail, Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Franciso, CA, April 2008.

The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Franciso, CA, April 2008.

Banal: Because Format Checking Is So Trite, Geoffrey M. Voelker, Proceedings of USENIX Workshop on Organizing Workshops, Conferences and Symposia for Computer Systems (WOWCS), San Francisco, CA, April 2008.

Web Service Access Management for Integration with Agent Systems, Benno Overeinger, Patrick Verkaik, and Francis Brazier, Proceedings of ACM Symposium on Applied Computing (SAC), Forteleza, Ceara, Brazil, March 2008.

Detecting Compromised Routers via Packet Forwarding Behavior, Alper Mizrak, Stefan Savage, and Keith Marzullo, IEEE Network 22(2), March 2008.

Learning from Mistakes --- A Comprehensive Study on Real World Concurrency Bug Characteristics, Shan Lu, Soyeon Park, Eunsoo Seo, and Yuanyuan Zhou, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Seattle, WA, March 2008.

Understanding the propagation of hard faults to software and its implications on Resilient Systems Design, Man-Lap Li, Pradeep Ramachandran, Sarita Adve, Vikram Adve, and Yuanyuan Zhou, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Seattle, WA, March 2008.

Dual Frame Motion Compensation with Uneven Quality Assignment, Vijay Chellappa, Pamela C. Cosman, and Geoffrey M. Voelker, IEEE Transactions on Circuits and Systems for Video Technology 18(2):249-256, February 2008.

Are Disks the Dominant Contributor for Storage Failures? A Comprehensive Study of Storage Subsystem Failure Characteristics, Weihang Jiang, Chongfeng Hu, Yuanyuan Zhou, and Arkady Kanevsky, Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, February 2008, pages 111-125.

High Bandwidth Data Dissemination for Large-scale Distrbuted Systems, Dejan Kostić, Alex C. Snoeren, Amin Vahdat, Ryan Braud, Charles Killian, Jeannie Albrecht, James W. Anderson, Adolfo Rodriguez, and Erik VandeKieft, ACM Transactions on Computer Systems 26(1), February 2008.

Remote Control: Distributed Application Configuration, Management, and Visualization with Plush, Jeannie Albrecht, Ryan Braud, Darren Dao, Nikolay Topilski, Christopher Tuttle, Alex C. Snoeren, and Amin Vahdat, USENIX ;login: 33(1), February 2008.

2007

Curing Regular Expressions Matching Algorithms from Insomnia, Amnesia, and Acalculia, Sailesh Kumar, Balakrishnan Chandrasekaran, Jonathan S. Turner, and George Varghese, Proceedings of the ACM/IEEE Symposium on Architecture for Networking and Communications Systems (ANCS), Orlando, FL, December 2007.

Can You Infect Me Now? Malware Propagation in Mobile Phone Networks, Chris Fleizach, Michael Liljenstam, Per Johansson, Geoffrey M. Voelker, and András Méhes, Proceedings of the ACM Workshop on Recurring Malcode (WORM), Washington D.C., November 2007.

Usher: An Extensible Framework for Managing Clusters of Virtual Machines, Marvin McNett, Diwaker Gupta, Amin Vahdat, and Geoffrey M. Voelker, Proceedings of the 21st USENIX Large Installation System Administration Conference (LISA), Dallas, TX, November 2007.

/* iComment: Bugs or Bad Comments? */, Lin Tan, Ding Yuan, Gopal Krishna, and Yuanyuan Zhou, Proceedings of the 21th ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, October 2007.

MUVI: Automatically Inferring Multi-Variable Access Correlations and Detecting Related Semantic and Concurrency Bugs, Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weihang Jiang, Zhenmin Li, Raluca A. Popa, and Yuanyuan Zhou, Proceedings of the 21th ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, October 2007.

Triage: Diagnosing Production Run Failures at the User's Site, Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, and Yuanyuan Zhou, Proceedings of the 21th ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, October 2007.

10 network papers that changed the world, George Varghese, ACM SIGCOMM Computer Communication Review 37(5), October 2007.

Remote Control: Distributed Application Configuration, Management, and Visualization with Plush, Jeannie Albrecht, Ryan Braud, Darren Dao, Nikolay Topilski, Christopher Tuttle, Alex C. Snoeren, and Amin Vahdat, Proceedings of the 21st USENIX Large Installation System Administration Conference (LISA), Dallas, TX, November 2007.

An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants, Jason Franklin, Vern Paxson, Adrian Perrig, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, October 2007.

The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86), Hovav Shacham, Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, October 2007.

Network Monitoring using Traffic Dispersion Graphs (TDGs), Marios Iliofotou, Prashanth Pappu, Michalis Faloutsos, Michael Mitzenmacher, Sumeet Singh, and George Varghese, Proceedings of the ACM Internet Measurement Conference, San Diego, CA, October 2007.

A study of interleaving coverage criteria, Shan Lu, Weihang Jiang, and Yuanyuan Zhou, Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering (short paper) (ESEC-FSE'07), Dubrovnik, Croatia, September 2007, pages 533-536.

Comparison of the Three CPU Schedulers in Xen, Diwaker Gupta, Lucy Cherkasova, and Amin Vahdat, ACM SIGMETRICS Performance Evaluation Review (PER) 35(2):42-51, September 2007.

Cross-component Energy Management: Joint Adaptation of Processor and Memory, Xiaodong Li, Ritu Gupta, Sarita V. Adve, and Yuanyuan Zhou, ACM Transactions on Architecture and Code Optimization 4(3), September 2007.

Slicing Spam with Occam's Razor, Chris Fleizach, Geoffrey M. Voelker, and Stefan Savage, Proceedings of Conference on Email and Anti-Spam (CEAS), Mountain View, CA, August 2007.

Orbis: Rescaling Degree Correlations to Generate Annotated Internet Topologies, Priya Mahadevan, Calvin Hubble, Bradley Huffaker, Dimitri Krioukov, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Kyoto, Japan, August 2007.

Cloud Control with Distributed Rate Limiting, Barath Raghavan, Kashi Vishwanath, Sriram Ramabhadran, Kenneth Yocum, and Alex C. Snoeren, Proceedings of the ACM SIGCOMM Conference, Kyoto, Japan, August 2007. (Best student paper).

Automating Cross-Layer Diagnosis of Enterprise Wireless Networks, Yu-Chung Cheng, Mikhail Afanasyev, Patrick Verkaik, Péter Benkö, Jennifer Chiang, Alex C. Snoeren, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM SIGCOMM Conference, Kyoto, Japan, August 2007.

Spamscatter: Characterizing Internet Scam Hosting Infrastructure, David S. Anderson, Chris Fleizach, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the USENIX Security Symposium, Boston, MA, August 2007.

Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks, Periklis Akritidis, Chin Wee Yung, Vinh The Lam, Stelios Sidiroglou, and Kostas G. Anagnostakis, Proceedings of the USENIX Security Symposium, Boston, MA, August 2007.

Wresting Control from BGP: Scalable Fine-grained Route Control, Patrick Verkaik, Dan Pei, Tom Scholl, Aman Shaikh, Alex C. Snoeren, and Jacobus van der Merwe, Proceedings of the USENIX Annual Technical Conference, Santa Clara, CA, June 2007, pages 295-308.

Detection and Localization of Network Black Holes, Ramana Rao Kompella, Jennifer Yates, Albert Greenberg, and Alex C. Snoeren, Proceedings of the IEEE Infocom Conference, Anchorage, AK, May 2007, pages 2180-2188.

A Time-Optimal Self-Stabilizing Synchronizer Using A Phase Clock, Baruch Awerbuch, Shay Kutten, Yishay Mansour, Boaz Patt-Shamir, and George Varghese, IEEE Transactions on Dependable and Secure Computing 4(3), July 2007.

Managing Energy-Performance Tradeoffs for Multithreaded Applications on Multiprocessor Architectures, Soyeon Park, Weihang Jiang, Yuanyuan Zhou, and Sarita Adve, Proceedings of the ACM SIGMETRICS Conference, San Diego, CA, USA, June 2007.

Enhancing Game-Server AI with Distributed Client Computation, John Douceur, Jacob Lorch, Frank Uyeda, and Randall Wood, Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), San Francisco, CA, June 2007.

Delta Execution for Software Reliability, Yuanyuan Zhou, Darko Marinov, William Sanders, Craig Zilles, Marcelo d'Amorim, Steven Lauterburg, Ryan M. Lefever, and Joseph Tucek, Third Workshop on Hot Topics in System Dependability (HotDep), Edinburgh, UK, June 2007.

Classic Paxos vs. Fast Paxos: Caveat Emptor, Flavio Junqueira, Yanhua Mao, and Keith Marzullo, Third Workshop on Hot Topics in System Dependability (HotDep), Edinburgh, UK, June 2007.

Mace: Language Support for Building Distributed Systems, Charles Killian, James W. Anderson, Ryan Braud, Ranjit Jhala, and Amin Vahdat, Proceedings of Programming Languages Design and Implementation (PLDI), June 2007.

How to Design Computer Security Experiments, Sean Peisert and Matt Bishop, World Conference on Information Security Education (WISE), June 2007.

Improving Wireless Access of Video Over the Internet, Jesse Steinberg and Joseph Pasquale, Proceedings of the Third International Conference on Networking and Services, Athens, Greece, June 2007.

Hotcomments: How to Make Program Comments More Useful?, Lin Tan, Ding Yuan, and Yuanyuan Zhou, Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems (HotOS-XI), San Diego, CA, May 2007.

X-Trace: A Pervasive Network Tracing Facility, Rodrigo Fonseca, George Porter, Randy H. Katz, Scott Shenker, and Ion Stoica, Proceedings of the 4th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Cambridge, MA, April 2007.

Life, Death, and the Critical Transition: Finding Liveness Bugs in Systems Code, Charles Killian, James W. Anderson, Ranjit Jhala, and Amin Vahdat, Proceedings of the 4th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Cambridge, MA, April 2007. (Best paper).

Toward Models for Forensic Analysis, Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Proceedings of the International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), Seattle, WA, April 2007.

Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons, Barath Raghavan, Saraubh Panjwani, and Anton Mityagin, ACM SIGCOMM Computer Communication Review 37(2), April 2007.

Analysis of Computer Intrusions using Sequences of Function Calls, Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, IEEE Transactions on Dependable and Secure Computing 4(2):137-150, April 2007.

Achieving Efficiency and Accuracy in the ALPS Application-level Proportional-share Scheduler, Travis Newhouse and Joseph Pasquale, Journal of Grid Computing, Long Beach, CA, March 2007, pages 251-270.

A Performance Analysis of Indirect Routing, Joshua Opos, Sriram Ramabhadran, Andrew Terry, Joe Pasquale, Alex C. Snoeren, and Amin Vahdat, Proceedings of the IEEE International Parallel and Distributed Processing Symposium, Long Beach, CA, March 2007.

A Resource Allocation Problem in Replicated P2P Storage Systems, Sriram Ramabhadran and Joseph Pasquale, Fourth International Workshop on Hot Topics in Peer-to-Peer Systems (Hot-P2P), Long Beach, CA, March 2007.

Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms, Joseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, and Dawn Song, Proceedings of the ACM European Conference in Computer Systems (EuroSys), Lisbon, Portugal, March 2007.

On Scalable Attack Detection in the Network, Ramana Rao Kompella, Sumeet Singh, and George Varghese, IEEE/ACM Transactions on Networking 15(1), February 2007.

HARD: Hardware-Assisted Lockset-based Race Detection, Pin Zhou, Radu Teodorescu, and Yuanyuan Zhou, Proceedings of IEEE International Symposium on High-Performance Computer Architecture, Phoenix, AZ, February 2007, pages 121-132.

Scaling Peer-to-Peer Games in Low-Bandwidth Environments, Jeffrey Pang, Frank Uyeda, and Jacob Lorch, Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Bellvue, WA, February 2007.

Modeling and Generating Realistic Streaming Media Server Workloads , Wenting Tang, Yun Fu, and Amin Vahdat, Computer Networks 51(1):336-356, January 2007.

AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants, Shan Lu, Joseph Tucek, Feng Qin, and Yuanyuan Zhou, IEEE MICRO 27(1):26-35, January 2007.

Declarative Resource Naming for Macroprogramming Wireless Networks of Embedded Systems, Chalermek Intanagonwiwat, Rajesh Gupta, and Amin Vahdat, Lecture Notes in Computer Science 4240/2006:192-199, January 2007.

2006

PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection, Shan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, and Josep Torrellas, Proceedings of the Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Orlando, FL, December 2006.

LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks, Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yuanyuan Zhou, and Youfeng Wu, Proceedings of the Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Orlando, FL, December 2006, pages 135-148.

A Study of End-to-End Web Access Failures, Venkata N. Padmanabhan, Sriram Ramabhadran, Sharad Agarwal, and Jitendra Padhye, Proceedings of CoNEXT, Lisboa, Portugal, December 2006.

Characterization of a Large Web Site Population with Implications for Content Delivery, Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, and Zhen Xiao, World Wide Web Journal 9(4):505-536, December 2006.

Maximizing Data Locality in Distributed Systems, Fan Chung, Ronald Graham, Ranjita Bhagwan, Geoffrey M. Voelker, and Stefan Savage, Journal of Computer and System Sciences 72(8), December 2006.

The Stratified Round Robin Scheduler: Design, Analysis and Implementation, Sriram Ramabhadran and Joseph Pasquale, IEEE/ACM Transactions on Networking, December 2006.

Optimizing Grid Site Manager Performance with Virtual Machines, Ludmila Cherkasova, Diwaker Gupta, Eygene Ryabinkin, Roman Kurakin, Vladimir Dobretsov, and Amin Vahdat, Proceedings of the 3rd USENIX Workshop on Real, Large Distributed Systems (WORLDS), Seattle, WA, December 2006.

Decongestion Control, Barath Raghavan and Alex C. Snoeren, Proceedings of the 5th ACM Workshop on Hot Topics in Networks (HotNets-V), Irvine, CA, November 2006, pages 61-66.

Service Portability: Why HTTP Redirect is the Model for the Future, Sumeet Singh, Scott Shenker, and George Varghese, Proceedings of the 5th ACM Workshop on Hot Topics in Networks (HotNets-V), Irvine, CA, November 2006.

Glavlit: Preventing Exfiltration at Wire Speed, Nabil Schear, Carmelo Kintana, Qing Zhang, and Amin Vahdat, Proceedings of the 5th ACM Workshop on Hot Topics in Networks (HotNets-V), Irvine, CA, November 2006.

Fast packet classification for two-dimensional conflict-free filters, Florin Baboescu, Priyank Ramesh Warkhede, Subhash Suri, and George Varghese, Computer Networks 50(11):1831-1842, November 2006.

Parallelism versus Memory Allocation in Pipelined Router Forwarding Engines, Fan Chung, Ronald Graham, Jia Mao, and George Varghese, Theory of Computing Systems 39(6), November 2006.

Enforcing Performance Isolation Across Virtual Machines in Xen, Diwaker Gupta, Ludmila Cherkasova, and Amin Vahdat, Proceedings of the ACM/IFIP/USENIX Middleware Conference, Melbourne, Australia, November 2006.

Asgard: Software Guards for System Address Spaces, Martin Abadi, Mihiai Budiu, Ulfar Erlingsson, George Necula, and Michael Vrable, Proceedings of the 7th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Seattle, WA, November 2006.

Automatic Online Failure Diagnosis at the End-User Site, Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, and Yuanyuan Zhou, Second Workshop on Hot Topics in System Dependability (HotDep), Seattle, WA, USA, November 2006.

AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants, Shan Lu, Joe Tucek, Feng Qin, and Yuanyuan Zhou, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), San Jose, CA, October 2006.

Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure, Periklis Akritidis, Chin Wee Yung, Vinh The Lam, Stelios Sidiroglou, and Kostas G. Anagnostakis, Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, October 2006.

Bitmap algorithms for counting active flows on high-speed links, Cristian Estan, George Varghese, and Michael E. Fisk, IEEE/ACM Transactions on Networking 14(5):925-937, October 2006.

Automated Protocol Inference: Unexpected Means of Identifying Protocols, Justin Ma, Kirill Levchenko, Cristian Kriebich, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.

Finding Diversity in Remote Code Injection Exploits, Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the ACM Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.

Source and channel coding trade-offs for a pulsed quality video encoder, Vijay Chellappa, Pamela C. Cosman, and Geoffrey M. Voelker, Proceedings of the 40th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, October 2006.

An Improved Construction for Counting Bloom filters, Flavio Bonomi, Michael Mitzenmacher, Rina Panigrahy, Sushil Singh, and George Varghese, Proceedings of the European Symposium on Algorithms (ESA), Zurich, SWitzerland, September 2006.

Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis, Yu-Chung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006, pages 39-50.

Systematic Topology Analysis and Generation Using Degree Correlations, Priya Mahadevan, Dmitri Krioukov, Kevin Fall, and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006.

Detecting Evasion Attacks at High Speeds without Reassembly, George Varghese, Andy Fingerhut, and Flavio Bonomi, Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006.

Realistic and Responsive Network Traffic Generation, Kashi Vishwanath and Amin Vahdat, Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006.

Beyond Bloom Filters: From Approximate Membership Checks to Approximate State Machines, Flavio Bonomi, Michael Mitzenmacher, Rina Panigrahy, Sushil Singh, and George Varghese, Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, September 2006.

PRIMED: Community-of-Interest-Based DDoS Mitigation, Patrick Verkaik, Oliver Spatscheck, Jacobus van der Merwe, and Alex C. Snoeren, Proceedings of the ACM SIGCOMM Workshop on Large Scale Attack Defense, Pisa, Italy, September 2006, pages 147-154.

Fatih: Detecting and Isolating Malicious Routers via Traffic Validation, Alper Mizrak, Yu-Chung Cheng, Keith Marzullo, and Stefan Savage, IEEE Transactions on Dependable and Secure Computing 3(3), July 2006.

Replicating Nondeterministic Services on Grid Environments, Xianan Zhang, Flavio Junqueira, Matti Hitunen, Keith Marzullo, and Rick Schlichting, Proceedings of the IEEE Symposium on High Performance Distributed Compuuting (HPDC), Paris, France, June 2006.

ALPS: An Application-Level Proportional-Share Scheduler, Travis Newhouse and Joseph Pasquale, Proceedings of the IEEE Symposium on High Performance Distributed Compuuting (HPDC), Paris, France, June 2006.

Service Contracts and Aggregate Utility Functions, Alvin AuYoung, Laura Grit, Janet Wiener, and John Wilkes, Proceedings of the IEEE Symposium on High Performance Distributed Compuuting (HPDC), Paris, France, June 2006.

Loose Synchronization for Large-Scale Networked Systems, Jeannie Albrecht, Christopher Tuttle, Alex C. Snoeren, and Amin Vahdat, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2006, pages 301-314.

Service Placement in Shared Wide-Area Platforms, David Oppenheimer, Brent Chun, David Patterson, Alex C. Snoeren, and Amin Vahdat, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2006, pages 273-288.

Distributed Network Querying with Bounded Approximate Caching, Badrish Chandramouli, Jun Yang, and Amin Vahdat, 11th International Conference on Database Systems for Advanced Applications (DASFAA), June 2006.

Inferring Internet Denial-of-Service Activity, David Moore, Colleen Shannon, Doug Brown, Geoffrey M. Voelker, and Stefan Savage, ACM Transactions on Computer Systems 24(2):115-139, May 2006.

WAP5: Black-box Performance Debugging for Wide-Area Systems, Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogul, Marcos K. Aguilera, and Amin Vahdat, Proceedings of the 15th International World Wide Web Conference, May 2006.

To Infinity and Beyond: Time-Warped Network Emulation, Diwaker Gupta, Kenneth Yocum, Marvin McNett, Alex C. Snoeren, Amin Vahdat, and Geoffrey M. Voelker, Proceedings of the 3rd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, May 2006, pages 87-100.

Pip: Detecting the Unexpected in Distributed Systems, Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogul, Mehul A. Shah, Charles Killian, and Amin Vahdat, Proceedings of the 3rd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, May 2006.

ReAgents: Behavior-based Remote Agents and Their Performance, Eugene Hung and Joseph Pasquale, Fifth International Joint Conference on Autonomous Agents & MultiAgent Systems, Hakodate, Japan, May 2006.

MobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks, Priya Mahadevan, Adolfo Rodriguez, David Becker, and Amin Vahdat, Mobile Computing and Communications Review (MC2R), April 2006.

Analysis of Long-Running Replicated Systems, Sriram Ramabhadran and Joseph Pasquale, Proceedings of the IEEE Infocom Conference, Barcelona, Spain, April 2006.

CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code, Zhenmin Li, Shan Lu, Suvda Myagmar, and Yuanyuan Zhou, IEEE Transactions on Software Engineering 32(3):176-192, March 2006.

On Object Maintenance in Peer-to-Peer Systems, Kiran Tati and Geoffrey M. Voelker, Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Santa Barbara, CA, February 2006.

DMA-aware memory energy management, Vivek Pandey, Weihang Jiang, Yuanyuan Zhou, and Ricardo Bianchini, Proceedings of IEEE International Symposium on High-Performance Computer Architecture, Austin, TX, February 2006, pages 133-144.

Wireless Security and Internetworking, Minho Shin, Justin Ma, Arunesh Mishra, and William A. Arbaugh, Proceedings of the IEEE 94(2), February 2006.

Multiple Job Scheduling in a Connection-Limited Data Parallel System, Alessandro Amoroso and Keith Marzullo, IEEE Transactions on Parallel and Distributed Systems 17(2):125-134, February 2006.

The Costs and Limits of Availability for Replicated Services, Haifeng Yu and Amin Vahdat, ACM Transactions on Computer Systems 24(2):70-113, February 2006.

PlanetLab Application Management Using Plush, Jeannie Albrecht, Christopher Tuttle, Alex C. Snoeren, and Amin Vahdat, ACM SIGOPS Operating Systems Review 40(1):33-40, January 2006.

Experiences With Resource Allocators for Large-Scale Multiuser Testbeds, Robert Ricci, David Oppenheimer, Jay Lepreau, and Amin Vahdat, ACM SIGOPS Operating Systems Review 40(1):41-48, January 2006.

The Internet AS-Level Topology: Three Data Sources and One Definiteve Metric, Priya Mahadevan, Dmitri Krioukov, Marina Fomenkov, Brad Huffaker, Xenofontas Dimitripoulos, kc claffy, and Amin Vahdat, ACM SIGCOMM Computer Communication Review, January 2006.

Self Managed Systems and Services: Effective Web Service Load Balancing Through Statistical Monitoring, George Porter and Randy H. Katz, Communications of the Association for Computing Machinery 49(3):48-54, March 2006.

2005

Opportunistic Measurement: Extracting Insight from Spurious Traffic, Martin Casado, Tal Garfinkel, Weidong Cui, Vern Paxson, and Stefan Savage, Proceedings of the 4th ACM Workshop on Hot Topics in Networks (HotNets-IV), College Park, MD, November 2005.

Cross-layer Visibility as a Service, Ramana Rao Kompella, Albert Greenberg, Jennifer Rexford, Alex C. Snoeren, and Jennifer Yates, Proceedings of the 4th ACM Workshop on Hot Topics in Networks (HotNets-IV), College Park, MD, November 2005.

ReSlice: Selective Re-Execution of Long-Retired Misspeculated Instructions Using Forward Slicing, Smruti R. Sarangi, Wei Liu, Josep Torrellas, and Yuanyuan Zhou, Proceedings of the Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Barcelona, Spain, November 2005.

Self-stopping Worms, Justin Ma, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the ACM Workshop on Rapid Malcode (WORM), Washington D.C., November 2005, pages 12-21.

Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse, Rob Sherwood, Bobby Bhattacharjee, and Ryan Braud, Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, October 2005.

Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm, Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik VandeKieft, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005, pages 148-162.

Rx: Treating Bugs as Allergies---a Safe Method to Survive Software Failure, Feng Qin, Joe Tucek, Jagadeesan Sundaresan, and Yuanyuan Zhou, Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005. (Award paper).

Hibernator: Helping Disk Arrays Sleep through the Winter, Qingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, Kimberley Keeton, and John Wilkes, Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005.

TIE Breaking: Tunable Interdomain Egress Selection, Renata Teixeira, Tim Griffin, Mauricio G. C. Resende, and Jennifer Rexford, Proceedings of CoNEXT, Toulouse, France, October 2005.

The Power of Slicing in Internet Flow Measurement, Ramana Rao Kompella and Cristian Estan, Proceedings of the USENIX/ACM Internet Measurement Conference, New Orleans, LA, October 2005.

Java Active Extensions: Scalable Middleware for Performance-Isolated Remote Execution, Travis Newhouse and Joseph Pasquale, Elsevier Computer Communications Journal 28(14):1680-1691, September 2005.

Principles-Driven Forensic Analysis, Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo, Proceedings of the New Security Paradigms Workshop (NSPW), Lake Arrowhead, CA, September 2005.

Coterie Availability in Sites, Flavio Junqueira and Keith Marzullo, Proceedings of the International Symposium on Distributed Computing (DISC), Cracow, Poland, September 2005.

PR-Miner: Automatically Extracting Implicit Programming Rules and Detecting Violations in Large Software Code, Zhenmin Li and Yuanyuan Zhou, ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), September 2005.

Replication predicates for dependent-failure algorithms, Flavio P. Junqueira and Keith Marzullo, Proceedings of the 11th International Conference on Parallel and Distributed Computing (Euro-Par), August 2005. (Award paper).

Performance Directed Energy Management for Main Memory and Disks, Xiaodong Li, Zhenmin Li, Yuanyuan Zhou, and Sarita Adve, ACM Transaction on Storage 1(3):346-380, 2005.

A Case Study in Building Layered DHT Applications, Yatin Chawathe, Sriram Ramabhadran, Sylvia Ratnasamy, Anthony LaMarca, Joseph Hellerstein, and Scott Shenker, Proceedings of the ACM SIGCOMM Conference, Philadelphia, PA, August 2005.

Addressing Strategic Behavior in a Deployed Microeconomic Resource Allocator, Chaki Ng, Philip Buonadonna, Brent N. Chun, Alex C. Snoeren, and Amin Vahdat, Proceedings of the Third Workshop on Economics of Peer-to-Peer Systems, Philadelphia, PA, August 2005, pages 99-104.

Cooperative Packet Scheduling via Pipelining in 802.11 Wireless Networks, Ramana Rao Kompella, Sriram Ramabhadran, Ishwar Ramani, and Alex C. Snoeren, Proceedings of the Workshop on Experimental Approaches to Wireless Network Design and Analysis (E-WIND), Philadelphia, PA, August 2005, pages 35-40.

Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network, Ju Wang, Xin Liu, and Andrew Chien, Proceedings of the USENIX Security Symposium, Baltimore, MD, August 2005.

Brief Announcement: The Overlay Network Content Distribution Problem, Chip Killian, Michael Vrable, Alex C. Snoeren, Amin Vahdat, and Joseph Pasquale, Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), Las Vegas, NV, July 2005, page 98.

Append-Only Signatures, Eike Kiltz, Anton Mityagin, Saurabh Panjwani, and Barath Raghavan, Proceedings of the International Colloquium on Automata, Languages and Programming (ICALP), Lisboa, Portugal, July 2005.

Design and Implementation Tradeoffs for Wide-Area Resource Discovery, David Oppenheimer, Jeannie Albrecht, David Patterson, and Amin Vahdat, Proceedings of the IEEE Symposium on High Performance Distributed Compuuting (HPDC), Research Triangle Park, NC, July 2005.

Why Markets Could (But Don't Currently) Solve Resource Allocation Problems in Systems, Jeffrey Shneidman, Chaki Ng, David C. Parkes, Alvin AuYoung, Alex C. Snoeren, Amin Vahdat, and Brent N. Chun, Proceedings of the 10th USENIX Workshop on Hot Topics in Operating Systems (HotOS-X), Santa Fe, NM, June 2005, pages 37-42.

Treating Bugs as Allergies: A Safe Method for Surviving Software Failures, Feng Qin, Joseph Tucek, and Yuanyuan Zhou, Proceedings of the 10th USENIX Workshop on Hot Topics in Operating Systems (HotOS-X), Santa Fe, NM, June 2005.

The Virtue of Dependent Failures in Multi-site Systems, Flavio Junqueira and Keith Marzullo, Proceedings of the IEEE Workshop on Hot Topics in System Dependability (HotDep), Yokohama, Japan, June 2005.

Managing Self-inflicted Nondeterminism, Dmitrii Zagorodnov and Keith Marzullo, Proceedings of the IEEE Workshop on Hot Topics in System Dependability (HotDep), Yokohama, Japan, June 2005.

The Entropia Virtual Machine for Destop Grids, Brad Calder, Andrew Chien, Ju Wang, and Dan Yang, Proceedings of the ACM/USENIX Conference on Virtual Execution Environments (VEE), Chicago, IL, June 2005.

Fatih: Detecting and Isolating Malicious Routers, Alper Mizrak, Yu-Chung Cheng, Keith Marzullo, and Stefan Savage, Proceedings of the IEEE Conference on Dependable Systems and Networks (DSN), Yokohama, Japan, June 2005, pages 538-547. (Award paper).

A Tree-based Router Search Engine Architecture with Single Port Memories, Florin Baboescu, Dean Tullsen, Grigore Rosu, and Sumeet Singh, Proceedings of the 32nd International Symposium on Computer Architecture (ISCA), Madison, WI, June 2005.

MobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks, Priya Mahadevan, Adolfo Rodriguez, David Becker, and Amin Vahdat, International Workshop on Wireless Traffic Measurements and Modeling, June 2005.

Accuracy Characterization for Metropolitan-scale Wi-Fi Localization, Yu-Chung Cheng, Yatin Chawathe, Anthony Lamarca, and John Krumm, Proceedings of the ACM Conference on Mobile Systems, Appliations and Services (MobiSys), Seattle, WA, June 2005.

Empirical Evaluation of Multi-level Buffer Cache Collaboration for Storage Systems, Zhifeng Chen, Yan Zhang, Yuanyuan Zhou, Heidi Scott, and Berni Schiefer, Proceedings of the ACM SIGMETRICS Conference, Banff, Alberta, Canada, June 2005.

A Robust System for Accurate Real-time Summaries of Internet Traffic, Ken Keys, David Moore, and Christian Estan, Proceedings of the ACM SIGMETRICS Conference, Banff, Alberta, Canada, June 2005.

Mining Block Correlations to Improve Storage Performance, Zhenmin Li, Zhifeng Chen, and Yuanyuan Zhou, ACM Transaction on Storage 1(2):213-245, 2005.

Mirage: A Microeconomic Resource Allocation System for Sensornet Testbeds, Brent N. Chun, Philip Buonadonna, Alvin AuYoung, Chaki Ng, David C. Parkes, Jeffrey Shneidman, Alex C. Snoeren, and Amin Vahdat, Proceedings of the 2nd IEEE Workshop on Embedded Networked Sensors (EmNetS-II), Sydney, Australia, May 2005, pages 19-28.

Power Aware Storage Cache Management, Qingbo Zhu and Yuanyuan Zhou, IEEE Transactions on Computers 54(5):587-602, May 2005.

IP Fault Localization Via Risk Modeling, Ramana Rao Kompella, Jennifer Yates, Albert Greenberg, and Alex C. Snoeren, Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, May 2005, pages 57-70.

Remote Physical Device Fingerprinting, Tadayoshi Kohno, Andre Brodio, and kc claffy, Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2005. (Award paper).

Remote Physical Device Fingerprinting, Tadayoshi Kohno, Andre Brodio, and kc claffy, IEEE Transactions on Dependable and Secure Computing 2(2):93-108, April 2005.

Access and Mobility of Wireless PDA Users, Marvin McNett and Geoffrey M. Voelker, Mobile Computing and Communications Review (MC2R) 9(2):40-55, April 2005.

Maintaining High Bandwidth under Dynamic Network Conditions, Dejan Kostić, Ryan Braud, Charles Killian, Erik VandeKieft, James W. Anderson, Alex C. Snoeren, and Amin Vahdat, Proceedings of the USENIX Annual Technical Conference, Anaheim, CA, April 2005, pages 193-208.

Surviving Internet Catastrophes, Flavio Junqueira, Ranjita Bhagwan, Alejandro Hevia, Keith Marzullo, and Geoffrey M. Voelker, Proceedings of the USENIX Annual Technical Conference, Anaheim, CA, April 2005.

Traffic Matrix Reloaded: Impact of Routing Changes, Renata Teixeira, Nick Duffield, and Jennifer Rexford, Proceedings of the Passive and Active Measurement Workshop, Boston, MA, March 2005.

Comparison of Public End-to-end Bandwidth Estimation Tools on High-Speed Links, Alok Shriram, Margaret Murray, Young Hyun, Nevil Brownlee, Andre Broido, Marina Fomenkov, and kc claffy, Proceedings of the Passive and Active Measurement Workshop, Boston, MA, March 2005.

A Study of Burstiness in TCP Flows, Srinivas Shakkotai, Nevil Brownlee, and kc claffy, Proceedings of the Passive and Active Measurement Workshop, Boston, MA, March 2005.

Spectroscopy of traceroute Delays, Andre Brodio, Young Hyun, and kc claffy, Proceedings of the Passive and Active Measurement Workshop, Boston, MA, March 2005.

Efficient and Flexible Architectural Support for Dynamic Monitoring, Yuanyuan Zhou, Pin Zhou, Feng Qin, Wei Liu, and Josep Torrellas, ACM Transaction on Architecture and Code Generation 2(1):3-33, March 2005.

SyncScan: Practical Fast Handoff for 802.11 Infrastructure Networks, Ishwar Ramani and Stefan Savage, Proceedings of the IEEE Infocom Conference, Miami, FL, March 2005.

Designing Incentives for Peer-to-Peer Routing, Alberto Blanc, Yi-Kai Liu, and Amin Vahdat, Proceedings of the IEEE Infocom Conference, Miami, FL, March 2005.

Error Concealment for Dual Frame Video Coding with Uneven Quality, Vijay Chellappa, Pamela C. Cosman, and Geoffrey M. Voelker, Proceedings of the Data Compression Conference (DCC), Snowbird, UT, March 2005.

NetProfiler: Profiling Wide-Area Networks Using Peer Cooperation, Venkata Padmanabhan, Sriram Ramabhadran, and Jitu Padhye, Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Ithaca, NY, February 2005.

Consistent and Automatic Replica Regeneration, Haifeng Yu and Amin Vahdat, ACM Transactions on Storage 1(1):3-37, February 2005.

Scalable Packet Classification, Florin Baboescu and George Varghese, IEEE/ACM Transactions on Networking 13(1), February 2005.

A Lower Bound for Multicast Key Distribution, Jack Snoeyink, Subhash Suri, and George Varghese, Computer Networks 47(3):429-441, February 2005.

SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs, Feng Qin, Shan Lu, and Yuanyuan Zhou, Proceedings of IEEE International Symposium on High-Performance Computer Architecture, San Francisco, CA, February 2005.

MediaGuard: a Model-based Framework for Building Streaming Media Services, Ludmila Cherkasova, Wenting Tang, and Amin Vahdat, Proceedings of the SPIE Conference on Multi-Media Computing and Networking (MMCN), San Jose, CA, January 2005.

VI-Attached Database Storage, Yuanyuan Zhou, Angelos Bilas, Suresh Jagannathan, Dimitrios Xinidis, Cezary Dubnicki, and Kai Li, IEEE Transactions on Parallel and Distributed Systems 16(1):35-50, 2005.

Wireless Hotspots: Current Challenges and Future Directions, Anand Balachandran, Geoffrey M. Voelker, and Paramvir Bahl, Mobile Networks and Applications 10(3):265-274, January 2005.

Effective Small-site Web Load Balancing Through Statistical Monitoring, George Porter and Randy H. Katz, Proceedings of the IEEE/IFIP International Workshop on Self-Managed Systems and Services (SelfMan), Nice, France, May 2005.

COPS: Quality of Service vs. Any Service at All, Randy H. Katz, George Porter, Scott Shenker, Ion Stoica, and Mel Tsai, Proceedings of the International Workshop on Quality of Service (IWQoS), June 2005.

2004

Automated Worm Fingerprinting, Sumeet Singh, Cristian Estan, George Varghese, and Stefan Savage, Proceedings of the 6th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Francisco, CA, December 2004, pages 45-60.

CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code, Zhenmin Li, Shan Lu, Suvda Myagmar, and Yuanyuan Zhou, Proceedings of the 6th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Francisco, CA, December 2004, pages 289-302.

FUSE: Lightweight Guaranteed Distributed Failure Notification, John Dunagan, Nicholas J. A. Harvey, Michael B. Jones, Dejan Kostić, Marvin Theimer, and Alec Wolman, Proceedings of the 6th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Francisco, CA, December 2004.

Distributed Resource Discovery on PlanetLab with SWORD, David Oppenheimer, Jeannie Albrecht, David Patterson, and Amin Vahdat, Proceedings of the ACM/USENIX Workshop on Real, Large Distributed Systems (WORLDS), San Francisco, CA, December 2004.

AccMon: Automatically Detecting Memory-related Bugs via Program Counter-based Invariants, Pin Zhou, Wei Liu, Long Fei, Shan Lu, Feng Qin, Yuanyuan Zhou, Samuel Midkiff, and Josep Torrellas, Proceedings of the Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Portland, OR, December 2004.

iWatcher: Simple, General Architectural Support for Software Debugging, Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, and Josep Torrellas, IEEE MICRO(6), December 2004.

Performance-Directed Energy Management for Storage Systems, Xiaodong Li, Zhenmin Li, Pin Zhou, Yuanyuan Zhou, Sarita Adve, and Sanjeev Kumar, IEEE MICRO(6), December 2004.

Packet-Dispersion Techniques and a Capacity-Estimation Methodology, Constantinos Dovrolis, Parameswaran Ramanathan, and David Moore, IEEE/ACM Transactions on Networking 12(6), December 2004.

Is P2P Dying or Just Hiding?, Thomas Karagiannis, Andre Brodio, Nevil Brownlee, kc claffy, and Michalis Faloutsos, Proceedings of the 9th IEEE Global Internet Symposium and Next Generation Networks(GlobeCom), Dallas, TX, November 2004.

On the Difficulty of Scalably Detecting Network Attacks, Kirill Levchenko, Ramamohan Paturi, and George Varghese, Proceedings of the ACM Conference on Computer and Communications Security, Washington, D.C., October 2004.

On the Effectiveness of Address-Space Randomization, Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh, Proceedings of the ACM Conference on Computer and Communications Security, Washington, D.C., October 2004, pages 298-307.

The Top Speed of Flash Worms, Stuart Staniford, David Moore, Vern Paxson, and Nick Weaver, Proceedings of the ACM Workshop on Rapid Malcode (WORM), Washington, D.C., October 2004.

On Scalable Attack Detection in the Network, Ramana Rao Kompella, Sumeet Singh, and George Varghese, Proceedings of the USENIX/ACM Internet Measurement Conference, Taormina, Sicily, Italy, October 2004.

Transport Layer Identification of P2P Traffic, Thomas Karagiannis, Andre Brodio, Michalis Faloutsos, and kc claffy, Proceedings of the USENIX/ACM Internet Measurement Conference, Taormina, Sicily, Italy, October 2004.

Online Identification of Hierarchical Heavy Hitters: Algorithms, Evaluation and Application, Yin Zhang, Sumeet Singh, Subhabrata Sen, Nick Duffield, and Carsten Lund, Proceedings of the USENIX/ACM Internet Measurement Conference, Taormina, Sicily, Italy, October 2004.

Performance Directed Energy Management for Main Memory and Disks, Xiaodong Li, Zhenmin Li, Francis David, Pin Zhou, Yuanyuan Zhou, Sarita Adve, and Sanjeev Kumar, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), Boston, MA, October 2004.

Realistic Large Scale Online Network Simulation, Xin Liu and Andrew Chien, Proceedings of the ACM Conference on High Performance Computing and Networking, Pittsburgh, PA, November 2004.

Realistic Modeling and Synthesis of Resources for Computational Grids, Yang-Suk Kee, Henri Casanova, and Andrew Chien, Proceedings of the ACM Conference on High Performance Computing and Networking, Pittsburgh, PA, November 2004.

Resource Management for Rapid Application Turnaround on Enterprise Desktop Grids, Derrick Kondo, Andrew Chien, and Henri Casanova, Proceedings of the ACM Conference on High Performance Computing and Networking, Pittsburgh, PA, November 2004.

ShortCuts: Using Soft State To Improve DHT Routing, Kiran Tati and Geoffrey M. Voelker, Proceedings of the 9th International Workshop on Web Content Caching and Distribution (WCW), Beijing, China, October 2004.

Towards Informed Web Content Delivery, Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, and Zhen Xiao, Proceedings of the 9th International Workshop on Web Content Caching and Distribution (WCW), Beijing, China, October 2004. (Best student paper).

Resource Allocation in Federated Distributed Computing Infrastructures, Alvin AuYoung, Brent N. Chun, Alex C. Snoeren, and Amin Vahdat, Proceedings of the 1st Workshop on Operating System and Architectural Support for the on demand IT InfraStructure, Boston, MA, October 2004.

Routing in an Internet-Scale Network Emulator, Jay Chen, Diwaker Gupta, Kashi V. Vishwanath, Alex C. Snoeren, and Amin Vahdat, Proceedings of the IEEE/ACM International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Volendam, The Netherlands, October 2004, pages 275-283.

The Lonely NATed Node, Chad Yoshikawa, Brent Chun, and Amin Vahdat, Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, September 2004.

A System for Authenticated Policy-Compliant Routing, Barath Raghavan and Alex C. Snoeren, Proceedings of the ACM SIGCOMM Conference, Portland, OR, September 2004, pages 167-178.

Building a Better NetFlow, Cristian Estan, Ken Keys, David Moore, and George Varghese, Proceedings of the ACM SIGCOMM Conference, Portland, OR, September 2004.

Network Sensitivity to Hot-Potato Disruptions, Renata Teixeira, Aman Shaikh, Tim Griffin, and Geoffrey M. Voelker, Proceedings of the ACM SIGCOMM Conference, Portland, OR, September 2004.

A Measurement Framework for Pinpointing Routing Changes, Renata Teixeira and Jennifer Rexford, Proceedings of the ACM SIGCOMM Workshop on Network Troubleshooting, Portland, OR, September 2004.

A User-Level Framework for Scheduling within Service Execution Environments, Travis Newhouse and Joseph Pasquale, Proceedings of the IEEE International Conference on Services Computing, Shanghai, China, September 2004.

Using Behavior Templates to Design Remotely-executing Agents for Wireless Clients, Eugene Hung and Joseph Pasquale, Proceedings of the 4th IEEE Workshop on Applications and Services in Wireless Networks, Boston, MA, August 2004.

Resource-controlled Remote Execution to Enhance Wireless Network Applications, Travis Newhouse and Joseph Pasquale, Proceedings of the 4th IEEE Workshop on Applications and Services in Wireless Networks, Boston, MA, August 2004.

Flexible Architecture for Customizing Streams for Wireless Clients, Jesse Steinberg and Joseph Pasquale, Proceedings of the 4th IEEE Workshop on Applications and Services in Wireless Networks, Boston, MA, August 2004.

The Spread of the Witty Worm, Colleen Shannon and David Moore, IEEE Security and Privacy 2(4), July 2004.

UCLog: A Unified, Correlated Logging Architecture for Intrusion Detection, Zhenmin Li, Jed Taylor, Elizabeth Partridge, Yuanyuan Zhou, William Yurcik, Cristina Abad, James J. Barlow, and Jeff Rosendale, International Conference on Telecommunication Systems - Modeling and Analysis (ICTSM), July 2004.

Light-weight Multicast Services (LMS): a Router-assisted Scheme for Reliable Multicast, Christos Papadopoulos, Guru Parulkar, and George Varghese, IEEE/ACM Transactions on Networking 12(3), June 2004.

PB-LRU: a self-tuning power aware storage cache replacement algorithm for conserving disk energy, Qingbo Zhu, Asim Shankar, and Yuanyuan Zhou, Proceedings of the 18th Annual International Conference on Supercomputing(ICS), St Malo, France, June 2004, pages 79-88.

iWatcher: Efficient Architectural Support for Software Debugging, Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, and Josep Torrellas, Proceedings of the 31st International Symposium on Computer Architecture (ISCA), Munnchen, Germany, June 2004, pages 224-235.

Parallelism versus Memory Allocation in Pipelined Router Forwarding Engines, Fan Chung Graham, Ron Graham and George Varghese, Proceedings of the ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), Barcelona, Spain, June 2004.

Fault-Tolerant Forwarding in the Face of Malicious Routers, Alper Mizrak, Keith Marzullo, and Stefan Savage, Proceedings of the International Workshop on the Future Directions in Distributed Computing (FuDiCo), Bertinoro, Italy, June 2004.

Reduced State Fair Queuing for Edge and Core Routers, Ramana Rao Kompella and George Varghese, Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Kinsale, County Cork, Ireland, June 2004.

Evaluation of Rate-based Transport Protocols for Lambda-Grids, Ryan Wu and Andrew Chien, Proceedings of the IEEE Symposium on High Performance Distributed Compuuting (HPDC), Honolulu, HI, June 2004.

Dynamics of Hot-Potato Routing in IP Networks, Renata Teixeira, Aman Shaikh, Tim Griffin, and Jennifer Rexford, Proceedings of the ACM SIGMETRICS Conference, New York, NY, June 2004.

Second-Level Buffer Cache Management, Yuanyuan Zhou, Zhifeng Chen, and Kai Li, IEEE Transactions on Parallel and Distributed Systems 15(6):505-519, June 2004.

Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging, Sudarshan M. Srinivasan, Srikanth Kandula, Christopher R. Andrews, and Yuanyuan Zhou, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2004.

Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying, Yu-Chung Cheng, Urs Hoelzle, Neal Cardwell, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2004, pages 87-98.

Web Customization Using Behavior-Based Remote Executing Agents, Eugene Hung and Joseph Pasquale, Proceedings of the International World Wide Web Conference (WWW), New York, NY, May 2004.

Characterization of a Large Web Site Population with Implications for Content Delivery, Leeann Bent, Michael Rabinovich, Geoffrey M. Voelker, and Zhen Xiao, Proceedings of the International World Wide Web Conference (WWW), New York, NY, May 2004.

A Uniform Projection Method for Motif Discovery in DNA Sequences, Benjamin Raphael, Lung-Tien Liu, and George Varghese, IEEE Transactions on Bioinformatics and Computational Biology 1(2), April 2004.

Tree bitmap: Hardware/Software IP Lookups with Incremental Updates, Will Etherton, George Varghese, and Zubin Dittia, ACM SIGCOMM Computer Communication Review 34(2):97-122, April 2004.

Measurements and Laboratory Simulations of the Upper DNS Hierarchy, Duane Wessels, Marina Fomenkov, Nevil Brownlee, and kc claffy, Proceedings of the Passive and Active Measurement Workshop, Antibes Juan-les-Pins, France, April 2004.

Their share: diversity and disparity in IP traffic, Andre Broido, Young Hyun, kc claffy, and Ruomei Gao, Proceedings of the Passive and Active Measurement Workshop, Antibes Juan-les-Pins, France, April 2004.

TotalRecall: System Support for Automated Availability Management, Ranjita Bhagwan, Kiran Tati, Yu-Chung Cheng, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 1st ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, March 2004, pages 337-350.

MACEDON: Methodology for Automatically Creating, Evaluating, and Designing Overlay Networks, Adolfo Rodriguez, Charles Killian, Sooraj Bhat, Dejan Kostić, and Amin Vahdat, Proceedings of the 1st ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, March 2004.

Consistent and Automatic Service Regeneration, Haifeng Yu and Amin Vahdat, Proceedings of the 1st ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, March 2004.

C-Miner: Mining Block Correlations in Storage Systems, Zhenmin Li, Zhifeng Chen, Sudarshan M. Srinivasan, and Yuanyuan Zhou, Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST), San Francisco, CA, March 2004, pages 173-186.

The Spread of the Witty Worm, Colleen Shannon and David Moore, CAIDA Report, March 2004.

Dual Frame Motion Compensation with Uneven Quality Assignment, Vijay Chellappa, Pamela C. Cosman, and Geoffrey M. Voelker, Proceedings of the Data Compression Conference (DCC), Snowbird, UT, March 2004.

Scalability in Adaptive Multi-Metric Overlays, Adolfo Rodriguez, Dejan Kostić, and Amin Vahdat, Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Tokyo, Japan, March 2004.

Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection, Nathan Tuck, Timothy Sherwood, Brad Calder, and George Varghese, Proceedings of the IEEE Infocom Conference, Hong Kong, China, March 2004.

Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management, Qingbo Zhu, Francis M. David, Christo F. Devaraj, Zhenmin Li, Yuanyuan Zhou, and Pei Cao, Proceedings of IEEE International Symposium on High-Performance Computer Architecture, Madrid, Spain, February 2004, pages 118-129.

Longitudinal study of Internet traffic from 1998-2003, Marina Fomenkov, Ken Keys, David Moore, and kc claffy, Proceedings of the Winter Interational Symposium on Information and Communication Technologies, Cancun, Mexico, January 2004.

Delta Routing: Improving the Price-Performance of Hybrid Private Networks, George Porter and Minwen Ji, Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS), Seoul, Korea, April 2004.

2003

Double Hashing with Multiple Passbits, Paul M. Martini and Walter A. Burkhard, International Journal of Foundations of Computer Science 14(6):1165-1182, December 2003.

Workload and Failure Characterization on a Large-Scale Federated Testbed, Brent Chun and Amin Vahdat, Intel Research Berkeley technical report IRB-TR-03-040, November 2003.

Dual frame motion compensation for a rate switching network, Vijay Chellappa, Pamela C. Cosman, and Geoffrey M. Voelker, Proceedings of the 37th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, November 2003.

Bandwidth estimation: metrics, measurement techniques, and tools, Constantinos Dovrolis, Ravi Prasad, Margaret Murray, and kc claffy, IEEE Network 17(6):27-35, November 2003.

Decoupling Policy from Mechanism in Internet Routing, Alex C. Snoeren and Barath Raghavan, Proceedings of the 2nd ACM Workshop on Hot Topics in Networks (HotNets-II), Cambridge, MA, November 2003, pages 81-86.

The Measurement Manifesto, George Varghese and Cristian Estan, Proceedings of the 2nd ACM Workshop on Hot Topics in Networks (HotNets-II), Cambridge, MA, November 2003.

Practical Lazy Scheduling in Sensor Networks, Ramana Rao Kompella and Alex C. Snoeren, Proceedings of the ACM Conference on Embedded Networked Sensor Systems (SenSys), Los Angeles, CA, November 2003, pages 280-291.

Traffic-based Load Balance for Scalable Network Emulation, Xin Liu and Andrew A. Chien, Proceedings of Supercomputing Conference, Phoenix, AZ, November 2003.

The OptiPuter, L. Smarr, A. Chien, T. DeFanti, J. Leigh, and P. Papadopoulos, Communications of the Association for Computing Machinery 47(11), November 2003.

Transport Protocols for High Performance: Whither TCP?, T. Faber, A. Falk, J. Bannister, A. Chien, R. Grossman, and J. Leigh, Communications of the Association for Computing Machinery 47(11), November 2003.

Measuring and Characterizing End-to-End Internet Service Performance, Lucy Cherkasova, Yun Fu, Wenting Tang, and Amin Vahdat, ACM Transactions on Internet Technology (TOIT) 3(4), November 2003.

Bitmap Algorithms for Counting Active Flows on High Speed Links, Cristian Estan, George Varghese, and Mike Fisk, Proceedings of the USENIX/ACM Internet Measurement Conference, Miami, FL, October 2003.

Best-Path vs. Multi-Path Overlay Routing, David G. Andersen, Alex C. Snoeren, and Hari Balakrishnan, Proceedings of the USENIX/ACM Internet Measurement Conference, Miami, FL, October 2003, pages 91-100.

In Search of Path Diversity in ISP Networks, Renata Teixeira, Keith Marzullo, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the USENIX/ACM Internet Measurement Conference, Miami, FL, October 2003, pages 313-318.

End-to-End differentiation of congestion and wireless losses, Song Cen, Pamela C. Cosman, and Geoffrey M. Voelker, IEEE/ACM Transactions on Networking 11(5):703-717, October 2003.

Bullet: High Bandwidth Data Dissemination Using an Overlay Mesh, Dejan Kostić, Adolfo Rodriguez, Jeannie Albrecht, and Amin Vahdat, Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, October 2003.

SHARP: An Architecture for Secure Resource Peering, Yun Fu, Jeffrey S. Chase, Brent Chun, Stephen Schwab, and Amin Vahdat, Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, October 2003.

Toward Scaling Network Emulation using Topology Partitioning, Ken Yocum, Ethan Eade, Julius Degesys, David Becker, Jeff Chase, and Amin Vahdat, Proceedings of the Eleventh IEEE/ACM International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Orlando, FL, October 2003.

Tolerating Denial-of-Service Attacks Using Overlay Networks - Impact of Overlay Network Topology, Ju Wang, Linyuan Lu, and Andrew A. Chien, Proceeding of ACM Workshop on Survivable and Self-Regenerative Systems, October 2003.

Wireless Hotspots: Current Challenges and Future Directions, Anand Balachandran, Geoffrey M. Voelker, and Paramvir Bahl, Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH), San Diego, CA, September 2003.

Automatically Inferring Patterns of Resource Consumption in Network Traffic, Cristian Estan, Stefan Savage, and George Varghese, Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, August 2003, pages 137-148.

Stratified Round Robin: A Low Complexity Packet Scheduler with Bandwidth Fairness and Bounded Delay, Sriram Ramabhadran and Joseph Pasquale, Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, August 2003.

Packet Classification Using Multidimensional Cutting, Sumeet Singh, Florin Baboescu, George Varghese, and Jia Wang, Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, August 2003.

The Impact of Address Allocation and Routing on the Structure and Implementation of Routing Tables, Harsha Narayan, Ramesh Govindan, and George Varghese, Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, August 2003.

802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions, John Bellardo and Stefan Savage, Proceedings of the USENIX Security Symposium, Washington, D.C., August 2003, pages 15-28.

Dynamic Detection and Prevention of Race Conditions in File Accesses, Eugene Tsyrklevich and Bennet Yee, Proceedings of the USENIX Security Symposium, Washington, D.C., August 2003.

Fast and Scalable Conflict Detection for Packet Classifiers, Florin Baboescu and George Varghese, Computer Networks 42(6):717-735, August 2003.

New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice, Cristian Estan and George Varghese, ACM Transactions on Computer Systems 21(3), August 2003.

Inside the Slammer Worm, David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas Weaver, IEEE Security and Privacy 1(4):33-39, July 2003.

Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup, Alper Mizrak, Yu-Chung Cheng, Vineet Kumar, and Stefan Savage, Proceedings of the 4th IEEE Workshop on Internet Applications, San Jose, CA, June 2003, pages 104-111.

A Pipelined Memory Architecture for High Throughput Network Processors, Timothy Sherwood, George Varghese, and Brad Calder, Proceedings of the 30th International Symposium on Computer Architecture (ISCA), San Diego, CA, June 2003.

Efficient Implementation of a Statistics Counter Architecture, Sriram Ramabhadran and George Varghese, Proceedings of the ACM SIGMETRICS Conference, San Diego, CA, June 2003.

Engineering fault-tolerant TCP/IP services using FT-TCP, Dmitrii Zagorodnov, Keith Marzullo, Lorenzo Alvisi, and Thomas Bressoud, Proceedings of the IEEE Conference on Dependable Systems and Networks (DSN), San Francisco, CA, June 2003.

Priority Forwarding in Ad Hoc Networks with Self-Interested Parties, Barath Raghavan and Alex C. Snoeren, Proceedings of the First Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, June 2003.

The Case for Service Provider Deployment of Super-Peers in Peer-to-Peer Networks, Sumeet Singh, Sriram Ramabhadran, Florin Baboescu, and Alex C. Snoeren, Proceedings of the First Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, June 2003.

Bootstrapping a Distributed Computational Economy with Peer-to-Peer Bartering, Brent N. Chun, Yun Fu, and Amin Vahdat, Proceedings of the First Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, June 2003.

MediSyn: A Synthetic Streaming Media Service Workload Generator, Wenting Tang, Yun Fu, Ludmila Cherkasova, and Amin Vahdat, Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Monterey, CA, June 2003.

Efficient Peer-to-Peer Keyword Searching, Patrick Reynolds and Amin Vahdat, Proceeding of the ACM/IFIP/USENIX Middleware Conference, Rio de Janeiro, Brazil, June 2003.

Currentcy: A Unifying Abstraction for Expressing Energy Management Policies, Heng Zeng, Carla S. Ellis, Alvin R. Lebeck, and Amin Vahdat, Proceedings of the USENIX Annual Technical Conference, San Antonio, TX, June 2003.

Eviction-Based Cache Placement for Storage Caches, Zhifeng Chen, Yuanyuan Zhou, and Kai Li, Proceedings of the USENIX Annual Technical Conference, San Antonio, TX, June 2003.

Scalable Data Management Alternatives to Support Data Mining Heterogeneous Logs for Computer Network Security, William Yurcik, Jim Barlow, Yuanyuan Zhou, Hrishikesh Raje, Yifan Li, Xiaoxin Yin, Mike Haberman, Jeff Rosendale, Dora Cai, and Duane Searsmith, 2003 SIAM Workshop on Data Mining for Counter Terrorism and Security, June 2003.

The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe, Flavio Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS-IX), Lihue, HI, May 2003, pages 73-78.

Synchronous Consensus for Dependent Process Failures, Flavio Junqueira and Keith Marzullo, Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Providence, RI, May 2003.

Group Membership and Wide-Area Master Worker Computations, Kjetil Jacobsen, Xianan Zhang, and Keith Marzullo, Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Providence, RI, May 2003.

Entropia: Architecture and Performance of an Enterprise Desktop Grid System, Andrew Chien, Brad Calder, Steve Elbert, and Karan Bhatia, Journal of Parallel and Distributed Computing 63(5):597-610, May 2003.

Internet Quarantine: Requirements for Containing Self-Propagating Code, David Moore, Colleen Shannon, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the IEEE Infocom Conference, San Francisco, CA, April 2003, pages 1901-1910.

Packet Classification for Core Routers: Is There an Alternative to CAMs?, Florin Baboescu, Sumeet Singh, and George Varghese, Proceedings of the IEEE Infocom Conference, San Francisco, CA, April 2003.

Anypoint: Extensible Transport Switching on the Edge, Ken Yocum, Darrell Anderson, Jeffrey S. Chase, and Amin Vahdat, Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS), Seattle, WA, March 2003.

TESLA: A Transparent, Extensible Session-Layer Architecture for End-to-end Network Services, Jon Salz, Alex C. Snoeren, and Hari Balakrishnan, Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS), Seattle, WA, March 2003, pages 221-232.

Model-Based Resource Provisioning in a Web Service Utility, Ron Doyle, Jeffrey S. Chase, Omer Asad, and Amin Vahdat, Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS), Seattle, WA, March 2003.

Using Random Subsets to Build Scalable Network Services, Dejan Kostić, Adolfo Rodriguez, Jeannie Albrecht, Abhijeet Bhirud, and Amin Vahdat, Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS), Seattle, WA, March 2003.

Traceback of Single IP Packets using SPIE, W. Timothy Strayer, Christine E. Jones, Fabrice Tchakountio, Alex C. Snoeren, Beverly Schwartz, Robert C. Clements, Matthew Condell, and Craig Partridge, Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX), Washington, DC, April 2003, pages 266-270.

Understanding Availability, Ranjita Bhagwan, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Berkeley, CA, February 2003, pages 256-267.

Catching Accurate Profiles in Hardware, Satish Narayanasamy, Timothy Sherwood, Suleyman Sair, Brad Calder, and George Varghese, Proceedings of IEEE International Symposium on High-Performance Computer Architecture, Anaheim, CA, February 2003.

The Spread of the Sapphire/Slammer Worm, David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas Weaver, CAIDA Report, January 2003.

The Bancomat Problem: An Example of Resource Allocation in a Partitionable Asynchronous Systems, Jeremy Sussman and Keith Marzullo, Journal of Theoretical Computer Science 291(1), January 2003.

2002

Single-Packet IP Traceback, Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Beverly Schwartz, Stephen T. Kent, and W. Timothy Strayer, IEEE/ACM Transactions on Networking 10(6):721-734, December 2002.

Beyond Folklore: Observations on Fragmented Traffic, Colleen Shannon, David Moore, and kc Claffy, IEEE/ACM Transactions on Networking 10(6), December 2002.

Scalability and Accuracy in a Large-Scale Network Emulator, Amin Vahdat, Ken Yocum, Kesvin Walsh, Priya Mahadevan, Dejan Kostić, Jeffrey Chase, and David Becker, Proceedings of the 5th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), Boston, MA, December 2002.

Fast and Scalable Conflict Detection for Packet Classifiers, Florin Baboescu and George Varghese, Proceedings of the 10th International Conference on Network Protocols (ICNP), Paris, France, November 2002.

Measuring Packet Reordering, John Bellardo and Stefan Savage, Proceedings of the ACM/USENIX Internet Measurement Workshop (IMW), Marseille, France, November 2002, pages 97-105.

Code-Red: a Case Study on the Spread and Victims of an Internet Worm, David Moore, Colleen Shannon, and Jeffrey Brown, Proceedings of the ACM/USENIX Internet Measurement Workshop (IMW), Marseille, France, November 2002.

Agile and Scalable Analysis of Network Events, Mike Fisk and George Varghese, Proceedings of the ACM/USENIX Internet Measurement Workshop (IMW), Marseille, France, November 2002.

Automated Measurement of High-Volume Traffic Clusters, Cristian Estan, Stefan Savage, and George Varghese, Proceedings of the ACM/USENIX Internet Measurement Workshop (IMW), Marseille, France, November 2002, pages 77-78.

ECOSystem: Managing Energy as a First Class Operating System Resource, Heng Zeng, Xiaobo Fan, Carla S. Ellis, Alvin Lebeck, and Amin Vahdat, Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), San Jose, CA, October 2002.

Breaking the Barriers: High Performance Security for High Performance Computing, Kay Connelly and Andrew Chien, Proceedings of the New Security Paradigms Workshop, Virginia Beach, VA, September 2002.

Back to the Future: Dependable Computing through Dynamic Provisioning of Service Utilities, Jeffrey S. Chase, Amin Vahdat, and John Wilkes, Proceedings of the 10th ACM SIGOPS European Workshop, Saint Emilion, France, September 2002.

New Directions in Traffic Measurement and Accounting, Cristian Estan and George Varghese, Proceedings of the ACM SIGCOMM Conference, Pittsburgh, PA, August 2002.

Route Flap Damping Exacerbates Internet Routing Convergence, Zhuoqing Morley Mao, Ramesh Govindan, George Varghese, and Randy Katz, Proceedings of the ACM SIGCOMM Conference, Pittsburgh, PA, August 2002.

Design and Evaluation of a Conit-based Continuous Consistency Model for Replicated Services, Haifeng Yu and Amin Vahdat, ACM Transactions on Computer Systems 20(3):239-282, August 2002.

Moshe: A group membership service for WANs, Idit Keidar, Jeremy B. Sussman, Keith Marzullo, and Danny Dolev, ACM Transactions on Computer Systems 20(3):191-238, August 2002.

Whole Page Performance, Leeann Bent and Geoffrey M. Voelker, Proceedings of the 7th International Web Caching Workshop (WCW), Boulder, CO, August 2002.

Service Level Agreement Based Distributed Resource Allocation for Streaming Hosting System, Yun Fu and Amin Vahdat, Proceedings of the 7th International Web Caching Workshop (WCW), Boulder, CO, August 2002.

High-Performance Cluster Storage Server, Keith Bell, Andrew Chien, and Mario Lauria, Proceedings of the IEEE Interational Conference on Multimedia Communications and Systems (ICMCS), Edinburgh, United Kingdom, July 2002.

Minimal Cost Replication for Availability, Haifeng Yu and Amin Vahdat, Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), Monterey, CA, July 2002.

A Framework for Application-specific Customization of Network Services, Sriram Ramabhadran and Joseph Pasquale, Proceedings of the International Workshop on Active Middleware Services, Edinburgh, United Kingdom, July 2002.

Characterizing User Behavior and Network Performance in a Public Wireless LAN, Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl, and Venkat Rangan, Proceedings of the ACM SIGMETRICS Conference, Marina Del Rey, CA, June 2002.

Symbiotic Jobscheduling with Priorities for a Simultaneous Multithreading Processor, Allan Snavely, Dean Tullsen, and Geoffrey M. Voelker, Proceedings of the ACM SIGMETRICS Conference, Marina Del Rey, CA, June 2002.

Experiences with VI communication for database storage, Yuanyuan Zhou, Angelos Bilas, Suresh Jagannathan, Cezary Dubnicki, James F. Philbin, and Kai Li, Proceedings of the 29th International Symposium on Computer Architecture (ISCA), Anchorage, AK, May 2002, pages 257-268.

Hot-Spot Congestion Relief in Public-Area Wireless Networks, Anand Balachandran, Geoffrey M. Voelker, and Paramvir Bahl, Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), Callicoon, NY, June 2002.

Replication Strategies for Highly Available Peer-to-Peer Storage, Ranjita Bhagwan, David Moore, Stefan Savage, and Geoffrey M. Voelker, Proceedings of the International Workshop on the Future Directions in Distributed Computing (FuDiCo), Bertinoro, Italy, June 2002.

Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality, Amin Vahdat, Proceedings of the International Workshop on the Future Directions in Distributed Computing (FuDiCo), Bertinoro, Italy, June 2002.

Opus: An Overlay Peer Utility Service, Rebecca Braynard, Dejan Kostić, Adolfo Rodriguez, Jeffrey S. Chase, and Amin Vahdat, Proceedings of the 5th International Conference on Open Architectures and Network Programming (OPENARCH), New York, NY, June 2002.

Application-specific Network Management for Energy-aware Streaming of Popular Multimedia Formats, Surendar Chandra and Amin Vahdat, Proceedings of the USENIX Annual Technical Conference, Monterey, CA, June 2002.

EtE: Passive End-to-End Internet Service Performance, Yun Fu, Ludmila Cherkasova, Wenting Tang, and Amin Vahdat, Proceedings of the USENIX Annual Technical Conference, Monterey, CA, June 2002. (Best student paper).

A Web Middleware Architecture for Dynamic Customization of Content for Wireless Clients, Jesse Steinberg and Joseph Pasquale, Proceedings of the International World Wide Web Conference (WWW), Honolulu, HI, May 2002.

Tracking Mobile Units for Dependable Message Delivery, Amy Murphy, Gruia-Catalin Roman, and George Varghese, IEEE Transactions on Software Engineering 28(5):433-448, May 2002.

Architecture of the Entropia Distributed Computing System, Andrew Chien, Proceedings of the International Parallel and Distributed Processing Symposium, Ft. Lauderdale, FL, April 2002.

Self-organizing Subsets: From Each According to His Abilities, To Each According to His Needs, Amin Vahdat, Jeffrey S. Chase, Rebecca Braynard, Dejan Kostić, Patrick Reynolds, and Adolfo Rodriguez, Proceedings of the International Workshop on Peer To Peer Systems (IPTPS), Cambridge, MA, March 2002.

Causality tracking in causal message-logging protocols, Lorenzo Alvisi, Karan Bhatia, and Keith Marzullo, Distributed Computing 15(1), February 2002.

Interposed Request Routing for Scalable Network Storage, Darrell Anderson, Jeffrey S. Chase, and Amin Vahdat, ACM Transactions on Computer Systems 20(1):25-48, February 2002.

PAWNs: Satisfying the Need for Ubiquitous Secure Connectivity and Location Services, Paramvir Bahl, Wilf Russell, Yi-Min Wang, Anand Balachandran, Geoffrey M. Voelker, and Allen Miu, IEEE Wireless Communications 9(1):40-48, February 2002.

Improving Wireless Access to the Internet by Extending the Client/Server Model, Joseph Pasquale, Eugene Hung, Travis Newhouse, Jessee Steinberg, and Sriram Ramabhadran, Proceedings of the European Wireless Conference, Florance, Italy, February 2002.

End-to-end Differentiation of Congestion and Wireless Losses, Song Cen, Pamela Cosman, and Geoffrey M. Voelker, Proceedings of the SPIE Conference on Multi-Media Computing and Networking (MMCN), San Jose, CA, January 2002.

Coarse-Grained Network Simulation for Wide-Area Distributed Systems, Syam Gadde, Jeffrey S. Chase, and Amin Vahdat, Proceedings of Communication Networks and Distributed Systems Modeling and Simulation, Phoenix, AZ, January 2002.

The Apprentice Challenge, J Strother Moore and George Porter, ACM Transactions on Programming Languages and Systems (TOPLAS) 24(3):193-216, May 2002.

The SAHARA Model for Service Composition Across Multiple Providers, Bhaskaran Raman, Sharad Agarwal, Yan Chen, Matthew Caesar, Weidong Cui, Per Johansoon, Kevin Lai, Tal Lavian, Sridhar Machiraju, Z Morley Mao, George Porter, Timothy Roscoe, Mukund Seshadri, Jimmy Shih, Keith Sklower, Lakshmi Subramanian, Takashi Suzuki, Shelley Zhuang, Anthony Joseph, Randy H. Katz, and Ion Stoica, Proceedings of the International Conference on Pervasive Computing (Pervasive), August 2002.

Providing Quality of Service for Wireless Links in Wireless/Wired Networks, Norival Figueira and Joseph Pasquale, IEEE Personal Communications 6(5), October 2002.

2001

Robust Congestion Signaling, David Ely, Neil Spring, David Wetherall, Stefan Savage, and Tom Anderson, Proceedings of the 9th International Conference on Network Protocols (ICNP), Riverside, CA, November 2001, pages 332-341.

Fast Firewall Implementations for Software and Hardware Based Routers, Lili Qiu, George Varghese, and Subash Suri, Proceedings of the 9th International Conference on Network Protocols (ICNP), Riverside, CA, November 2001.

Multiway Range Trees: Scalable IP lookups with Fast Updates, Subhash Suri, George Varghese, and Priyank Warkhede, Proceedings of the 6th IEEE Global Internet Symposium (GlobeCom), San Antonio, TX, November 2001.

Scalable High-speed Prefix Matching, Marcel Waldvogel, George Varghese, Jon Turner, and Bernhard Plattner, ACM Transactions on Computer Systems 19(4):440-482, November 2001.

The GrADS Project: Software Support for High-Level Grid Application Development, Francine Berman, Andrew Chien, Keith Cooper, Jack Dongarra, Ian Foster, Dennis Gannon, Lennart Johnsson, Ken Kennedy, Carl Kesselman, John Mellor-Crummey, Dan Reed, Linda Torczon, and Rich Wolski, International Journal of High Performance Computing Applications 15(4):327-344, November 2001.

Mesh Based Content Routing using XML, Alex C. Snoeren, Kenneth Conley, and David K. Gifford, Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), Banff, Canada, October 2001, pages 160-173.

Managing Energy and Server Resources in Hosting Centers, Jeffrey S. Chase, Darrell Anderson, Prachi Thakar, Amin Vahdat, and Ronald Doyle, Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), Banff, Canada, October 2001.

The Costs and Limits of Availability for Replicated Services, Haifeng Yu and Amin Vahdat, Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), Banff, Canada, October 2001.

Inferring Internet Denial of Service Activity, David Moore, Geoffrey M. Voelker, and Stefan Savage, Proceedings of the USENIX Security Symposium, Washington, D.C., August 2001, pages 9-22. (Best paper).

Hash-Based IP Traceback, Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, and W. Timothy Strayer, Proceedings of the ACM SIGCOMM Conference, San Diego, CA, August 2001, pages 3-14. (Best student paper).

Scalable Packet Classification, Florin Baboescu and George Varghese, Proceedings of the ACM SIGCOMM Conference, San Diego, CA, August 2001.

Scalable Causal Message Logging for Wide-Area Environments, Karan Bhatia, Keith Marzullo, and Lorenzo Alvisi, European conference on Parallel Computing (Euro-Par), Manchester, United Kingdom, August 2001.

Segmented Information Dispersal (SID) Data Layouts for Digital Video Servers, Ariel Cohen and Walter A. Burkhard, IEEE Transactions on Knowledge and Data Engineering 13(4):593-606, July 2001.

Exploring the Benefits of a Continuous Consistency Model for Wireless Web Portals, Jagadeeswaran Rajendiran, Jaidev Patwardhan, Vijay Abhijit, Rahul Lakhotia, and Amin Vahdat, Proceedings of the 2nd IEEE Workshop on Internet Applications, San Jose, CA, July 2001.

Scalable and Self-Organizing (Meta) Data Dissemination for Ubiquitous Computing, Amin Vahdat, Proceedings of the 2nd IEEE Workshop on Internet Applications, San Jose, CA, July 2001.

Network Support for IP Traceback, Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson, IEEE/ACM Transactions on Networking 9(3):226-237, June 2001.

Hardware Support for a Hash-Based IP Traceback, Luis A. Sanchez, Walter C. Milliken, Alex C. Snoeren, Fabrice Tchakountio, Christine E. Jones, Stephen T. Kent, Craig Partridge, and W. Timothy Strayer, Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX), Anaheim, CA, June 2001.

The Multi-Queue Replacement Algorithm for Second Level Buffer Caches, Yuanyuan Zhou, James Philbin, and Kai Li, Proceedings of the USENIX Annual Technical Conference, Boston, MA, June 2001.

The Trickle-Down Effect: Web Caching and Server Request Distribution, Ronald P. Doyle, Jeffrey S. Chase, Syam Gadde, and Amin Vahdat, Proceedings of the 6th International Web Caching Workshop (WCW), Boston, MA, June 2001.

The Medusa Proxy: A Tool for Exploring User-Perceived Web Performance, Mimika Koletsou and Geoffrey M. Voelker, Proceedings of the 6th International Web Caching Workshop (WCW), Boston, MA, June 2001.

Reconsidering Internet Mobility, Alex C. Snoeren, Hari Balakishnan, and M. Frans Kaashoek, Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII), Schloss Elmau, Germany, May 2001, pages 41-46.

Position Summary: Anypoint Communication Protocol, Ken Yocum, Darrell Anderson, Jeffrey S. Chase, and Amin Vahdat, Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII), Schloss Elmau, Germany, May 2001.

On the Placement of Web Server Replicas, Lili Qiu, Venkata N. Padmanabhan, and Geoffrey M. Voelker, Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.

Wrapping Server-Side TCP to Mask Connection Failures, Lorenzo Alvisi, Thomas Bressoud, Ayman El-Khashab, Keith Marzullo, and Dmitrii Zagorodnov, Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.

Fast Packet Classification for Two-Dimensional Conflict-Free Filters, Priyank Warkhede, Subhash Suriand, and George Varghese, Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.

Reducing Web Latency Using Reference Point Caching, Girish P. Chandranmenon and George Varghese, Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.

A Lower Bound for Multicast Key Distribution, Jack Snoeyink, Subhash Suri, and George Varghese, Proceedings of IEEE Infocom Conference, Anchorage, AK, April 2001.

Alpine: A User-Level Infrastructure for Network Protocol Development, David Ely, Stefan Savage, and David Wetherall, Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS), San Francisco, CA, March 2001, pages 171-183.

Measurement and Analysis of a Streaming Media Workload, Maureen Chesire, Alec Wolman, Geoffrey M. Voelker, and Henry M. Levy, Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS), San Francisco, CA, March 2001. (Best paper).

Fine-Grained Failover Using Connection Migration, Alex C. Snoeren, David G. Andersen, and Hari Balakrishnan, Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS), San Francisco, CA, March 2001, pages 221-232.

FIRE: Flexible Intra-AS Routing Environment, Craig Partridge, Alex C. Snoeren, W. Timothy Strayer, Beverly Schwartz, Matthew Condell, and Isidro Castiñeyra, IEEE Journal on Selected Areas in Communication 19(3):410-425, March 2001.

TOS: Kernel Support for Distributed Systems Management, Kåre J. Lauvset, Dag Johansen, and Keith Marzullo, Proceedings of the ACM Symposium on Applied Computing (SAC), Las Vegas, NV, March 2001.

A Chat Room Assignment for Teaching Network Security, William Mitchener and Amin Vahdat, Proceedings of the 32nd Technical Symposium on Computer Science Education, Charlotte, NC, February 2001.

Transcoding Characteristics of Web Images, Surendar Chandra, Ashish Gehani, Carla S. Ellis, and Amin Vahdat, Proceedings of the SPIE Conference on Multi-Media Computing and Networking (MMCN), San Jose, CA, January 2001.

Formal Models of Java at the JVM Level--a Survey from the ACL2 Perspective, J Strother Moore, Robert Krug, Hanbing Liu, and George Porter, Proceedings of Workshop on Formal Techniques for Java Programs / ECOOP, Budapest, Hungary, June 2001.

An Executable Formal Java Virtual Machine Thread Model, J Strother Moore and George Porter, Proceedings of the USENIX Java Virtual Machine Symposium (JVM), Monterey, CA, April 2001.

Combining Generality and Practicality in a Conit-Based Continuous Consistency Model for Wide-Area Replication, Haifeng Yu and Amin Vahdat, Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Phoenix, AZ, April 2001.

2000

Application-Level Differentiated Multimedia Web Services Using Quality Aware Transcoding, Surendar Chandra, Carla S. Ellis, and Amin Vahdat, IEEE Journal on Selected Areas in Communication 18(12):2544-2564, December 2000.

Optimistic Virtual Synchrony, Jeremy B. Sussman, Idit Keidar, and Keith Marzullo, Proceedings of the IEEE Symposium on Reliable Distributed Systems (SRDS), Nurnberg, Germany, October 2000.

Gossip versus Deterministically Constrained Flooding on Small Networks, Meng-Jang Lin, Keith Marzullo, and Stefano Masini, Proceedings of the International Symposium on Distributed Computing (DISC), Toledo, Spain, October 2000.

Design and Evaluation of a Continuous Consistency Model for Replicated Services, Haifeng Yu and Amin Vahdat, Proceedings of the 4th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, October 2000.

Interposed Request Routing for Scalable Network Storage, Darrell Anderson, Jeffrey S. Chase, and Amin Vahdat, Proceedings of the 4th ACM/USENIX Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, October 2000. (Award paper).

Every Joule is Precious: The Case for Revisiting Operating System Design for Energy Efficiency, Amin Vahdat, Alvin Lebeck, and Carla S. Ellis, Proceedings of the 9th ACM SIGOPS European Workshop, Kolding, Denmark, September 2000.

Efficient Numerical Bounding for Replicated Network Services, Haifeng Yu and Amin Vahdat, Proceedings of the 26th International Conference on Very Large Databases (VLDB), Cairo, Egypt, September 2000.

Practical Network Support for IP Traceback, Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson, Proceedings of the ACM SIGCOMM Conference, Stockholm, Sweden, August 2000, pages 295-306.

Memory Efficient State Lookups with Fast Updates, Sandeep Sikka and George Varghese, Proceedings of the ACM SIGCOMM Conference, Stockholm, Sweden, August 2000.

FIRE: Flexible Intra-AS Routing Environment, Craig Partridge, Alex C. Snoeren, W. Timothy Strayer, Beverly Schwartz, Matthew Condell, and Isidro Castiñeyra, Proceedings of the ACM SIGCOMM Conference, Stockholm, Sweden, August 2000, pages 191-203.

An End-to-End Approach to Host Mobility, Alex C. Snoeren and Hari Balakrishnan, Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom), Boston, MA, August 2000, pages 155-166.

Managing the Storage and Battery Resources in an Image Capture Device (Digital Camera) using Dynamic Transcoding, Surendar Chandra, Carla S. Ellis, and Amin Vahdat, Proceedings of the 3rd ACM/IEEE International Workshop on Wireless and Mobile Multimedia (WoWMoM), Boston, MA, August 2000.

Epidemic Routing for Partially Connected Ad Hoc Networks, Amin Vahdat and David Becker, Duke University technical report , July 2000.

A Predictive Block Sampling Algorithm for Desktop Multimedia Video Applications, Joseph Pasquale, T. Nguyen, and J. Kay, Proceedings of IEEE International Conference on Multimedia and Expo, New York, NY, July 2000.

An Automatic Object Inlining Optimization and its Evaluation, Julian Dolby and Andrew Chien, Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI), Vancouver, Canada, June 2000.

Building Replicated Internet Services Using TACT: Tunable Availability/Consistency Tradeoffs, Haifeng Yu and Amin Vahdat, Proceedings of the 2nd International Workshop on Advanced issues of E-Commerce and Web-Based Information Systems (WECWIS), Milpitas, CA, June 2000.

A Client-Server Oriented Algorithm for Virtually Synchronous Group Membership in WANs, Idit Keidar, Jeremy B. Sussman, Keith Marzullo, and Danny Dolev, Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Taipei, Taiwan, April 2000.

Self-Stabilization by Counter Flushing, George Varghese, SIAM Journal of Computing 30(2):486-510, April 2000.

The Fault Span of Crash Failures, George Varghese and Mahesh Jayaram, Journal of the ACM 47(2):244-293, March 2000.

Modeling TCP Latency, Neal Cardwell, Stefan Savage, and Tom Anderson, Proceedings of IEEE Infocom Conference, Tel-Aviv, Israel, March 2000, pages 1742-1751.

Fast and Scalable Priority Queue Architecture for High-Speed Network Switches, Ranjita Bhagwan and Bill Lin, Proceedings of IEEE Infocom Conference, Tel-Aviv, Israel, March 2000.

Understanding the Performance of TCP Pacing, Amit Aggarwal, Stefan Savage, and Tom Anderson, Proceedings of IEEE Infocom Conference, Tel-Aviv, Israel, March 2000, pages 1157-1165.

Differentiated Multimedia Web Services Using Quality Aware Transcoding, Surendar Chandra, Carla S. Ellis, and Amin Vahdat, Proceedings of IEEE Infocom Conference, Tel-Aviv, Israel, March 2000.

1999

On the Scale and Performance of Cooperative Web Proxy Caching, Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Anna Karlin, and Henry M. Levy, Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP), Kiawah Island, SC, December 1999.

Adaptive Inverse Multiplexing for Wide-Area Wireless Networks, Alex C. Snoeren, Proceedings of the 4th IEEE Global Internet Symposium (GlobeCom), Rio de Janiero, Brazil, December 1999, pages 1665-1672.

An Architecture for Packet-Striping Protocols, Hari Adiseshu, George Varghese, and Guru Parulkar, ACM Transactions on Computer Systems 17(4), November 1999.

TCP Congestion Control with a Misbehaving Receiver, Stefan Savage, Neal Cardwell, David Wetherall, and Tom Anderson, ACM SIGCOMM Computer Communication Review 29(5):71-78, October 1999.

Toward Automatic State Management for Dynamic Web Services, Geoff C. Berry, Jeffrey S. Chase, Geoff A. Cohen, Landon P. Cox, and Amin Vahdat, Proceedings of the 1999 Network Storage Symposium (Netstore), Seattle, WA, October 1999.

Sting: a TCP-based Network Measurement Tool, Stefan Savage, Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS), Boulder, CO, October 1999, pages 71-79. (Best student paper).

Active Names: Flexible Location and Transport of Wide-Area Resources, Amin Vahdat, Michael Dahlin, Thomas Anderson, and Amit Aggarwal, Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS), Boulder, CO, October 1999.

Organization-Based Analysis of Web-Object Sharing and Caching, Alec Wolman, Geoffrey M. Voelker, Nitin Sharma, Neal Cardwell, Molly Brown, Tashana Landray, Denise Pinnel, Anna Karlin, and Henry Levy, Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems (USITS), Boulder, CO, October 1999.

The End-to-end Effects of Internet Path Selection, Stefan Savage, Andy Collins, Eric Hoffman, John Snell, and Tom Anderson, Proceedings of the ACM SIGCOMM Conference, Cambridge, MA, September 1999, pages 289-299.

Packet Classification Using Tuple Space Search, Venkatachary Srinivasan, Subhash Suri, and George Varghese, Proceedings of the ACM SIGCOMM Conference, Cambridge, MA, September 1999.

Multimedia Web Services for Mobile Clients Using Quality Aware Transcoding, Surendar Chandra, Carla S. Ellis, and Amin Vahdat, Proceedings of the 2nd ACM/IEEE International Workshop on Wireless and Mobile Multimedia (WoWMoM), Seattle, WA, August 1999.

IP Lookups Using Multiway and Multicolumn Search, Butler Lampson, Venkatachary Srinivasan, and George Varghese, IEEE/ACM Transactions on Networking 7(3), June 1999.

VirtualQueue: A Technique for Packet Voice Stream Reconstruction, Norival R. Figueira and Joseph Pasquale, Proceedings of the IEEE Interational Conference on Multimedia Communications and Systems (ICMCS), Florence, Italy, June 1999.

NAP: Practical Fault-Tolerance for Itinerant Computations, Dag Johansen, Keith Marzullo, Fred B. Schneider, Kjetil Jacobsen, and Dmitrii Zagorodnov, Proceedings of the International Conference on Distributed Computing Systems (ICDCS), Austin, TX, June 1999.

Toward Wide-Area Resource Allocation, Amin Vahdat, Proceedings of Parallel and Distributed Processing Techniques and Applications (PDPTA), Las Vegas, NV, June 1999.

Potentials and Limitations of Fault-Based Markov Prefetching for Virtual Memory Pages, Gretta Bartels, Anna Karlin, Henry M. Levy, Geoffrey M. Voelker, Darrell Anderson, and Jeffrey S. Chase, Proceedings of the ACM SIGMETRICS Conference, Atlanta, GA, May 1999, pages 206-207.

The Case for Informed Transport Protocols, Stefan Savage, Neal Cardwell, and Tom Anderson, Proceedings of the 7th IEEE Workshop on Hot Topics in Operating Systems (HotOS-VII), Rio Rico, AZ, March 1999, pages 58-63.

Fast Address Lookups Using Controlled Prefix Expansion, Venkatachary Srinivasan and George Varghese, ACM Transactions on Computer Systems 17(1), February 1999.

Detour: a Case for Informed Internet Routing and Transport, Stefan Savage, Tom Anderson, Amit Aggarwal, David Becker, Neal Cardwell, Andy Collins, Eric Hoffman, John Snell, Amin Vahdat, Geoffrey M. Voelker, and John Zahorjan, IEEE Micro 19(1):50-59, January 1999.

Packet Filtering in High Speed Networks, Subhash Suri and George Varghese, Proceedings of the ACM/SIAM Symposium on Discrete Algorithms (SODA), Baltimore, MD, January 1999.

Permutation Development Data Layout (PDDL), Thomas Schwarz, Jesse Steinberg, and Walter A. Burkhard, Proceedings of IEEE International Symposium on High-Performance Computer Architecture, Orlando, FL, January 1999.