Search
for Author
All Reviews
Shenker, Scott
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
5
of
6
reviews
Less pain, most of the gain: incrementally deployable ICN
Fayazbakhsh S., Lin Y., Tootoonchian A., Ghodsi A., Koponen T., Maggs B., Ng K., Sekar V., Shenker S. SIGCOMM 2013 (Proceedings of the ACM SIGCOMM 2013 Conference, Hong Kong, China, Aug 12-16, 2013) 147-158, 2013. Type: Proceedings
Information-centric networking (ICN) is a promising research field. Most network users wish to fetch data, but do not care about connecting to a specific host. By decoupling the data a user wants to access from the delivery method, ICN...
...
Dec 26 2013
Fabric: a retrospective on evolving SDN
Casado M., Koponen T., Shenker S., Tootoonchian A. HotSDN 2012 (Proceedings of the 1st Workshop on Hot Topics in Software Defined Networks, Helsinki, Finland, Aug 13, 2012) 85-90, 2012. Type: Proceedings
The story of software-defined networking (SDN) is truly epic. Many of the premises supporting SDN go back to the late 1980s and the collection of telephone operating companies of that time. They were captive to a small number of equipm...
...
Feb 4 2013
DDoS defense by offense
Walfish M., Vutukuru M., Balakrishnan H., Karger D., Shenker S. ACM Transactions on Computer Systems 28(1): 1-54, 2010. Type: Article
Two methods are usually used to defend against distributed denial-of-service (DDoS) attacks: the first method provides lots of resources to satisfy requests, so that services cannot be denied; the other method builds a blacklist for de...
...
Jul 9 2010
The emergence of a networking primitive in wireless sensor networks
Levis P., Brewer E., Culler D., Gay D., Madden S., Patel N., Polastre J., Shenker S., Szewczyk R., Woo A. Communications of the ACM 51(7): 99-106, 2008. Type: Article
According to the authors, wireless embedded networks are limited by four fundamental constraints: low power, small memory, unattended operation, and lossy network behavior. Historically, network protocol designers had to choose between...
...
Sep 9 2008
Sharing the “cost” of multicast trees: an axiomatic analysis
Herzog S., Shenker S., Estrin D. IEEE/ACM Transactions on Networking 5(6): 847-860, 1997. Type: Article
Gone are the days when the Internet was the domain of the military and academics. It is now dominated by business. This commercialization has made issues of cost recovery and profit incentives relevant to discussions about the future o...
...
Aug 1 1998
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy