Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Shenker, Scott Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 5 of 6 reviews    
  Less pain, most of the gain: incrementally deployable ICN
Fayazbakhsh S., Lin Y., Tootoonchian A., Ghodsi A., Koponen T., Maggs B., Ng K., Sekar V., Shenker S.  SIGCOMM 2013 (Proceedings of the ACM SIGCOMM 2013 Conference, Hong Kong, China, Aug 12-16, 2013) 147-158, 2013.  Type: Proceedings

Information-centric networking (ICN) is a promising research field. Most network users wish to fetch data, but do not care about connecting to a specific host. By decoupling the data a user wants to access from the delivery method, ICN...
...
Dec 26 2013  
  Fabric: a retrospective on evolving SDN
Casado M., Koponen T., Shenker S., Tootoonchian A.  HotSDN 2012 (Proceedings of the 1st Workshop on Hot Topics in Software Defined Networks, Helsinki, Finland, Aug 13, 2012) 85-90, 2012.  Type: Proceedings

The story of software-defined networking (SDN) is truly epic. Many of the premises supporting SDN go back to the late 1980s and the collection of telephone operating companies of that time. They were captive to a small number of equipm...
...
Feb 4 2013  
  DDoS defense by offense
Walfish M., Vutukuru M., Balakrishnan H., Karger D., Shenker S. ACM Transactions on Computer Systems 28(1): 1-54, 2010.  Type: Article

Two methods are usually used to defend against distributed denial-of-service (DDoS) attacks: the first method provides lots of resources to satisfy requests, so that services cannot be denied; the other method builds a blacklist for de...
...
Jul 9 2010  
  The emergence of a networking primitive in wireless sensor networks
Levis P., Brewer E., Culler D., Gay D., Madden S., Patel N., Polastre J., Shenker S., Szewczyk R., Woo A. Communications of the ACM 51(7): 99-106, 2008.  Type: Article

According to the authors, wireless embedded networks are limited by four fundamental constraints: low power, small memory, unattended operation, and lossy network behavior. Historically, network protocol designers had to choose between...
...
Sep 9 2008  
  Sharing the “cost” of multicast trees: an axiomatic analysis
Herzog S., Shenker S., Estrin D. IEEE/ACM Transactions on Networking 5(6): 847-860, 1997.  Type: Article

Gone are the days when the Internet was the domain of the military and academics. It is now dominated by business. This commercialization has made issues of cost recovery and profit incentives relevant to discussions about the future o...
...
Aug 1 1998  

 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy