var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fdblp.org%2Fpid%2Fr%2FDanRubenstein.bib&jsonp=1&noBootstrap=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fdblp.org%2Fpid%2Fr%2FDanRubenstein.bib&jsonp=1&noBootstrap=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fdblp.org%2Fpid%2Fr%2FDanRubenstein.bib&jsonp=1&noBootstrap=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2025\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Physical Visualization Design: Decoupling Interface and System Design.\n \n \n \n \n\n\n \n Chen, Y.; Li, X.; Tao, J.; Ramjit, L.; Mitra, S.; Ghaderi, J.; Netravali, R.; Parameswaran, A. G.; Rubenstein, D.; and Wu, E.\n\n\n \n\n\n\n Proc. ACM Manag. Data, 3(3): 197:1–197:27. 2025.\n \n\n\n\n
\n\n\n\n \n \n \"PhysicalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/pacmmod/ChenLTRMGNPRW25,\n  author       = {Yiru Chen and\n                  Xupeng Li and\n                  Jeffrey Tao and\n                  Lana Ramjit and\n                  Subrata Mitra and\n                  Javad Ghaderi and\n                  Ravi Netravali and\n                  Aditya G. Parameswaran and\n                  Dan Rubenstein and\n                  Eugene Wu},\n  title        = {Physical Visualization Design: Decoupling Interface and System Design},\n  journal      = {Proc. {ACM} Manag. Data},\n  volume       = {3},\n  number       = {3},\n  pages        = {197:1--197:27},\n  year         = {2025},\n  url          = {https://doi.org/10.1145/3725334},\n  doi          = {10.1145/3725334},\n  timestamp    = {Sat, 09 Aug 2025 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/pacmmod/ChenLTRMGNPRW25.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Real-Time Risk Scoring of Ongoing Cyber Attacks.\n \n \n \n \n\n\n \n Kim, H.; Zuluaga, F. Z.; Evans, C.; Dalal, S. R.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In IEEE Conference on Communications and Network Security, CNS 2025, Avignon, France, September 8-11, 2025, pages 1–6, 2025. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"Real-TimePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cns/KimZEDMR25,\n  author       = {Heeyun Kim and\n                  Fabian Zuluaga Zuluaga and\n                  Collins Evans and\n                  Siddhartha R. Dalal and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Real-Time Risk Scoring of Ongoing Cyber Attacks},\n  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2025,\n                  Avignon, France, September 8-11, 2025},\n  pages        = {1--6},\n  publisher    = {{IEEE}},\n  year         = {2025},\n  url          = {https://doi.org/10.1109/CNS66487.2025.11195057},\n  doi          = {10.1109/CNS66487.2025.11195057},\n  timestamp    = {Sun, 16 Nov 2025 10:09:14 +0100},\n  biburl       = {https://dblp.org/rec/conf/cns/KimZEDMR25.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Path-Oblivious Entanglement Swapping for the Quantum Internet.\n \n \n \n \n\n\n \n Mutolo, V.; Parekh, R.; and Rubenstein, D.\n\n\n \n\n\n\n In Liu, A. Z.; Godfrey, P. B.; and Raghavan, B., editor(s), Proceedings of the 24th ACM Workshop on Hot Topics in Networks, HotNets 2025, UMD Campus, College Park, MD, USA, November 17-18, 2025, pages 1–9, 2025. ACM\n \n\n\n\n
\n\n\n\n \n \n \"Path-ObliviousPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/hotnets/MutoloPR25,\n  author       = {Vincent Mutolo and\n                  Rhea Parekh and\n                  Dan Rubenstein},\n  editor       = {Alan Zaoxing Liu and\n                  Philip Brighten Godfrey and\n                  Barath Raghavan},\n  title        = {Path-Oblivious Entanglement Swapping for the Quantum Internet},\n  booktitle    = {Proceedings of the 24th {ACM} Workshop on Hot Topics in Networks,\n                  HotNets 2025, {UMD} Campus, College Park, MD, USA, November 17-18,\n                  2025},\n  pages        = {1--9},\n  publisher    = {{ACM}},\n  year         = {2025},\n  url          = {https://doi.org/10.1145/3772356.3772412},\n  doi          = {10.1145/3772356.3772412},\n  timestamp    = {Fri, 26 Dec 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/hotnets/MutoloPR25.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Quantum Computer Fingerprinting using Error Syndromes.\n \n \n \n \n\n\n \n Mutolo, V.; Campbell, D.; Manning, Q.; Dubourg, H. W.; Lyu, R.; Sethumadhavan, S.; Rubenstein, D.; and Stolfo, S. J.\n\n\n \n\n\n\n CoRR, abs/2506.16614. 2025.\n \n\n\n\n
\n\n\n\n \n \n \"QuantumPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2506-16614,\n  author       = {Vincent Mutolo and\n                  Devon Campbell and\n                  Quinn Manning and\n                  Henri Witold Dubourg and\n                  Ruibin Lyu and\n                  Simha Sethumadhavan and\n                  Dan Rubenstein and\n                  Salvatore J. Stolfo},\n  title        = {Quantum Computer Fingerprinting using Error Syndromes},\n  journal      = {CoRR},\n  volume       = {abs/2506.16614},\n  year         = {2025},\n  url          = {https://doi.org/10.48550/arXiv.2506.16614},\n  doi          = {10.48550/ARXIV.2506.16614},\n  eprinttype    = {arXiv},\n  eprint       = {2506.16614},\n  timestamp    = {Tue, 16 Dec 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2506-16614.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Conducting Mission-Critical Voice Experiments with Automated Speech Recognition and Crowdsourcing.\n \n \n \n \n\n\n \n Janak, J.; Dozier, K.; Berny, L.; Hu, L.; Rubenstein, D.; Jennings, C.; and Schulzrinne, H.\n\n\n \n\n\n\n CoRR, abs/2509.13724. 2025.\n \n\n\n\n
\n\n\n\n \n \n \"ConductingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2509-13724,\n  author       = {Jan Janak and\n                  Kahlil Dozier and\n                  Lauren Berny and\n                  Liang Hu and\n                  Dan Rubenstein and\n                  Charles Jennings and\n                  Henning Schulzrinne},\n  title        = {Conducting Mission-Critical Voice Experiments with Automated Speech\n                  Recognition and Crowdsourcing},\n  journal      = {CoRR},\n  volume       = {abs/2509.13724},\n  year         = {2025},\n  url          = {https://doi.org/10.48550/arXiv.2509.13724},\n  doi          = {10.48550/ARXIV.2509.13724},\n  eprinttype    = {arXiv},\n  eprint       = {2509.13724},\n  timestamp    = {Thu, 16 Oct 2025 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2509-13724.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Path-Oblivious Entanglement Swapping for the Quantum Internet.\n \n \n \n \n\n\n \n Mutolo, V.; Parekh, R.; and Rubenstein, D.\n\n\n \n\n\n\n CoRR, abs/2509.13993. 2025.\n \n\n\n\n
\n\n\n\n \n \n \"Path-ObliviousPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2509-13993,\n  author       = {Vincent Mutolo and\n                  Rhea Parekh and\n                  Dan Rubenstein},\n  title        = {Path-Oblivious Entanglement Swapping for the Quantum Internet},\n  journal      = {CoRR},\n  volume       = {abs/2509.13993},\n  year         = {2025},\n  url          = {https://doi.org/10.48550/arXiv.2509.13993},\n  doi          = {10.48550/ARXIV.2509.13993},\n  eprinttype    = {arXiv},\n  eprint       = {2509.13993},\n  timestamp    = {Tue, 16 Dec 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2509-13993.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2024\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Analysis of False Negative Rates for Recycling Bloom Filters (Yes, They Happen!).\n \n \n \n \n\n\n \n Dozier, K.; Salamatian, L.; and Rubenstein, D.\n\n\n \n\n\n\n Proc. ACM Meas. Anal. Comput. Syst., 8(2): 21:1–21:34. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"AnalysisPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/pomacs/DozierSR24,\n  author       = {Kahlil Dozier and\n                  Loqman Salamatian and\n                  Dan Rubenstein},\n  title        = {Analysis of False Negative Rates for Recycling Bloom Filters (Yes,\n                  They Happen!)},\n  journal      = {Proc. {ACM} Meas. Anal. Comput. Syst.},\n  volume       = {8},\n  number       = {2},\n  pages        = {21:1--21:34},\n  year         = {2024},\n  url          = {https://doi.org/10.1145/3656005},\n  doi          = {10.1145/3656005},\n  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/pomacs/DozierSR24.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Toward Applying Quantum Computing to Network Verification.\n \n \n \n \n\n\n \n Dozier, K.; Beltran, J.; Berg, K.; Matousek, H.; Salamatian, L.; Katz-Bassett, E.; and Rubenstein, D.\n\n\n \n\n\n\n In Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, HOTNETS 2024, Irvine, CA, USA, November 18-19, 2024, pages 221–228, 2024. ACM\n \n\n\n\n
\n\n\n\n \n \n \"TowardPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/hotnets/DozierBBMSKR24,\n  author       = {Kahlil Dozier and\n                  Justin Beltran and\n                  Kylie Berg and\n                  Hugo Matousek and\n                  Loqman Salamatian and\n                  Ethan Katz{-}Bassett and\n                  Dan Rubenstein},\n  title        = {Toward Applying Quantum Computing to Network Verification},\n  booktitle    = {Proceedings of the 23rd {ACM} Workshop on Hot Topics in Networks,\n                  {HOTNETS} 2024, Irvine, CA, USA, November 18-19, 2024},\n  pages        = {221--228},\n  publisher    = {{ACM}},\n  year         = {2024},\n  url          = {https://doi.org/10.1145/3696348.3696891},\n  doi          = {10.1145/3696348.3696891},\n  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/hotnets/DozierBBMSKR24.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Modeling Average False Positive Rates of Recycling Bloom Filters.\n \n \n \n \n\n\n \n Dozier, K.; Salamatian, L.; and Rubenstein, D.\n\n\n \n\n\n\n In IEEE INFOCOM 2024 - IEEE Conference on Computer Communications, Vancouver, BC, Canada, May 20-23, 2024, pages 1970–1979, 2024. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"ModelingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/infocom/DozierSR24,\n  author       = {Kahlil Dozier and\n                  Loqman Salamatian and\n                  Dan Rubenstein},\n  title        = {Modeling Average False Positive Rates of Recycling Bloom Filters},\n  booktitle    = {{IEEE} {INFOCOM} 2024 - {IEEE} Conference on Computer Communications,\n                  Vancouver, BC, Canada, May 20-23, 2024},\n  pages        = {1970--1979},\n  publisher    = {{IEEE}},\n  year         = {2024},\n  url          = {https://doi.org/10.1109/INFOCOM52122.2024.10621226},\n  doi          = {10.1109/INFOCOM52122.2024.10621226},\n  timestamp    = {Tue, 20 Aug 2024 13:54:36 +0200},\n  biburl       = {https://dblp.org/rec/conf/infocom/DozierSR24.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Analysis of False Negative Rates for Recycling Bloom Filters (Yes, They Happen!).\n \n \n \n \n\n\n \n Dozier, K.; Salamatian, L.; and Rubenstein, D.\n\n\n \n\n\n\n In Garetto, M.; Marin, A.; Ciucu, F.; Fanti, G.; and Righter, R., editor(s), Abstracts of the 2024 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS/PERFORMANCE 2024, Venice, Italy, June 10-14, 2024, pages 17–18, 2024. ACM\n \n\n\n\n
\n\n\n\n \n \n \"AnalysisPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigmetrics/DozierSR24,\n  author       = {Kahlil Dozier and\n                  Loqman Salamatian and\n                  Dan Rubenstein},\n  editor       = {Michele Garetto and\n                  Andrea Marin and\n                  Florin Ciucu and\n                  Giulia Fanti and\n                  Rhonda Righter},\n  title        = {Analysis of False Negative Rates for Recycling Bloom Filters (Yes,\n                  They Happen!)},\n  booktitle    = {Abstracts of the 2024 {ACM} {SIGMETRICS/IFIP} {PERFORMANCE} Joint\n                  International Conference on Measurement and Modeling of Computer Systems,\n                  {SIGMETRICS/PERFORMANCE} 2024, Venice, Italy, June 10-14, 2024},\n  pages        = {17--18},\n  publisher    = {{ACM}},\n  year         = {2024},\n  url          = {https://doi.org/10.1145/3652963.3655044},\n  doi          = {10.1145/3652963.3655044},\n  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sigmetrics/DozierSR24.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Technical Report: Modeling Average False Positive Rates of Recycling Bloom Filters.\n \n \n \n \n\n\n \n Dozier, K.; Salamatian, L.; and Rubenstein, D.\n\n\n \n\n\n\n CoRR, abs/2401.02647. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"TechnicalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2401-02647,\n  author       = {Kahlil Dozier and\n                  Loqman Salamatian and\n                  Dan Rubenstein},\n  title        = {Technical Report: Modeling Average False Positive Rates of Recycling\n                  Bloom Filters},\n  journal      = {CoRR},\n  volume       = {abs/2401.02647},\n  year         = {2024},\n  url          = {https://doi.org/10.48550/arXiv.2401.02647},\n  doi          = {10.48550/ARXIV.2401.02647},\n  eprinttype    = {arXiv},\n  eprint       = {2401.02647},\n  timestamp    = {Tue, 23 Jan 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-02647.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Technical Report: Toward Applying Quantum Computing to Network Verification.\n \n \n \n \n\n\n \n Dozier, K.; Beltran, J.; Berg, K.; Matousek, H.; Salamatian, L.; Katz-Bassett, E.; and Rubenstein, D.\n\n\n \n\n\n\n CoRR, abs/2410.17184. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"TechnicalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2410-17184,\n  author       = {Kahlil Dozier and\n                  Justin Beltran and\n                  Kylie Berg and\n                  Hugo Matousek and\n                  Loqman Salamatian and\n                  Ethan Katz{-}Bassett and\n                  Dan Rubenstein},\n  title        = {Technical Report: Toward Applying Quantum Computing to Network Verification},\n  journal      = {CoRR},\n  volume       = {abs/2410.17184},\n  year         = {2024},\n  url          = {https://doi.org/10.48550/arXiv.2410.17184},\n  doi          = {10.48550/ARXIV.2410.17184},\n  eprinttype    = {arXiv},\n  eprint       = {2410.17184},\n  timestamp    = {Fri, 29 Nov 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2410-17184.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Big Winners and Small Losers of Zero-rating.\n \n \n \n \n\n\n \n Bayat, N.; Ma, R. T. B.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n ACM Trans. Model. Perform. Evaluation Comput. Syst., 7(1): 1:1–1:24. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"BigPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tompecs/BayatMMR22,\n  author       = {Niloofar Bayat and\n                  Richard T. B. Ma and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Big Winners and Small Losers of Zero-rating},\n  journal      = {{ACM} Trans. Model. Perform. Evaluation Comput. Syst.},\n  volume       = {7},\n  number       = {1},\n  pages        = {1:1--1:24},\n  year         = {2022},\n  url          = {https://doi.org/10.1145/3539731},\n  doi          = {10.1145/3539731},\n  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tompecs/BayatMMR22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Bandwidth Allocation Games.\n \n \n \n \n\n\n \n Bayat, N.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n CoRR, abs/2204.12588. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"BandwidthPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2204-12588,\n  author       = {Niloofar Bayat and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Bandwidth Allocation Games},\n  journal      = {CoRR},\n  volume       = {abs/2204.12588},\n  year         = {2022},\n  url          = {https://doi.org/10.48550/arXiv.2204.12588},\n  doi          = {10.48550/ARXIV.2204.12588},\n  eprinttype    = {arXiv},\n  eprint       = {2204.12588},\n  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-12588.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Down for failure: Active power status monitoring.\n \n \n \n \n\n\n \n Bayat, N.; Mahajan, K.; Denton, S.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n Future Gener. Comput. Syst., 125: 629–640. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"DownPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fgcs/BayatMDMR21,\n  author       = {Niloofar Bayat and\n                  Kunal Mahajan and\n                  Sam Denton and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Down for failure: Active power status monitoring},\n  journal      = {Future Gener. Comput. Syst.},\n  volume       = {125},\n  pages        = {629--640},\n  year         = {2021},\n  url          = {https://doi.org/10.1016/j.future.2021.06.055},\n  doi          = {10.1016/J.FUTURE.2021.06.055},\n  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/fgcs/BayatMDMR21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Zero-Rating and Net Neutrality: Who Wins, Who Loses?.\n \n \n \n \n\n\n \n Bayat, N.; Ma, R. T. B.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n SIGMETRICS Perform. Evaluation Rev., 48(3): 130–135. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"Zero-RatingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sigmetrics/BayatMMR20,\n  author       = {Niloofar Bayat and\n                  Richard T. B. Ma and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Zero-Rating and Net Neutrality: Who Wins, Who Loses?},\n  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},\n  volume       = {48},\n  number       = {3},\n  pages        = {130--135},\n  year         = {2020},\n  url          = {https://doi.org/10.1145/3453953.3453983},\n  doi          = {10.1145/3453953.3453983},\n  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sigmetrics/BayatMMR20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Zero-Rating and Net Neutrality: Who Wins, Who Loses?.\n \n \n \n \n\n\n \n Bayat, N.; Ma, R. T. B.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n CoRR, abs/2003.13371. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"Zero-RatingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2003-13371,\n  author       = {Niloofar Bayat and\n                  Richard T. B. Ma and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Zero-Rating and Net Neutrality: Who Wins, Who Loses?},\n  journal      = {CoRR},\n  volume       = {abs/2003.13371},\n  year         = {2020},\n  url          = {https://arxiv.org/abs/2003.13371},\n  eprinttype    = {arXiv},\n  eprint       = {2003.13371},\n  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-13371.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Exploiting content similarity to address cold start in container deployments.\n \n \n \n \n\n\n \n Mahajan, K.; Mahajan, S.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2019, Companion Volume, Orlando, FL, USA, December 9-12, 2019, pages 37–39, 2019. ACM\n \n\n\n\n
\n\n\n\n \n \n \"ExploitingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/conext/MahajanMMR19,\n  author       = {Kunal Mahajan and\n                  Saket Mahajan and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Exploiting content similarity to address cold start in container deployments},\n  booktitle    = {Proceedings of the 15th International Conference on emerging Networking\n                  EXperiments and Technologies, CoNEXT 2019, Companion Volume, Orlando,\n                  FL, USA, December 9-12, 2019},\n  pages        = {37--39},\n  publisher    = {{ACM}},\n  year         = {2019},\n  url          = {https://doi.org/10.1145/3360468.3366781},\n  doi          = {10.1145/3360468.3366781},\n  timestamp    = {Thu, 19 Feb 2026 15:52:49 +0100},\n  biburl       = {https://dblp.org/rec/conf/conext/MahajanMMR19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Optimal Pricing for Serverless Computing.\n \n \n \n \n\n\n \n Mahajan, K.; Figueiredo, D. R.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In 2019 IEEE Global Communications Conference, GLOBECOM 2019, Waikoloa, HI, USA, December 9-13, 2019, pages 1–6, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"OptimalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/globecom/MahajanFMR19,\n  author       = {Kunal Mahajan and\n                  Daniel R. Figueiredo and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Optimal Pricing for Serverless Computing},\n  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,\n                  HI, USA, December 9-13, 2019},\n  pages        = {1--6},\n  publisher    = {{IEEE}},\n  year         = {2019},\n  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9013156},\n  doi          = {10.1109/GLOBECOM38437.2019.9013156},\n  timestamp    = {Tue, 18 May 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/globecom/MahajanFMR19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Virtual Wires: Rethinking WiFi networks.\n \n \n \n \n\n\n \n Yang, Y.; Jiang, Y.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In IEEE International Symposium on Local and Metropolitan Area Networks, LANMAN 2019, Paris, France, July 1-3, 2019, pages 1–6, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"VirtualPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/lanman/YangJMR19,\n  author       = {Yudong Yang and\n                  Yuming Jiang and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Virtual Wires: Rethinking WiFi networks},\n  booktitle    = {{IEEE} International Symposium on Local and Metropolitan Area Networks,\n                  {LANMAN} 2019, Paris, France, July 1-3, 2019},\n  pages        = {1--6},\n  publisher    = {{IEEE}},\n  year         = {2019},\n  url          = {https://doi.org/10.1109/LANMAN.2019.8846977},\n  doi          = {10.1109/LANMAN.2019.8846977},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/lanman/YangJMR19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Down for Failure: Active Power Status Monitoring.\n \n \n \n \n\n\n \n Bayat, N.; Mahajan, K.; Denton, S.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n CoRR, abs/1912.03357. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"DownPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1912-03357,\n  author       = {Niloofar Bayat and\n                  Kunal Mahajan and\n                  Sam Denton and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Down for Failure: Active Power Status Monitoring},\n  journal      = {CoRR},\n  volume       = {abs/1912.03357},\n  year         = {2019},\n  url          = {http://arxiv.org/abs/1912.03357},\n  eprinttype    = {arXiv},\n  eprint       = {1912.03357},\n  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-03357.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A Modeling Approach to Classifying Malicious Cloud Users via Shuffling.\n \n \n \n \n\n\n \n Yang, Y.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n SIGMETRICS Perform. Evaluation Rev., 46(2): 6–8. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sigmetrics/YangMR18,\n  author       = {Yudong Yang and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {A Modeling Approach to Classifying Malicious Cloud Users via Shuffling},\n  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},\n  volume       = {46},\n  number       = {2},\n  pages        = {6--8},\n  year         = {2018},\n  url          = {https://doi.org/10.1145/3305218.3305222},\n  doi          = {10.1145/3305218.3305222},\n  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sigmetrics/YangMR18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Maximizing Broadcast Throughput Under Ultra-Low-Power Constraints.\n \n \n \n \n\n\n \n Chen, T.; Ghaderi, J.; Rubenstein, D.; and Zussman, G.\n\n\n \n\n\n\n IEEE/ACM Trans. Netw., 26(2): 779–792. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"MaximizingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ton/ChenGRZ18,\n  author       = {Tingjun Chen and\n                  Javad Ghaderi and\n                  Dan Rubenstein and\n                  Gil Zussman},\n  title        = {Maximizing Broadcast Throughput Under Ultra-Low-Power Constraints},\n  journal      = {{IEEE/ACM} Trans. Netw.},\n  volume       = {26},\n  number       = {2},\n  pages        = {779--792},\n  year         = {2018},\n  url          = {http://doi.ieeecomputersociety.org/10.1109/TNET.2018.2805185},\n  doi          = {10.1109/TNET.2018.2805185},\n  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/ton/ChenGRZ18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Performance Evaluation of Energy-Constrained Broadcast (EconCast) in Wireless Networks.\n \n \n \n \n\n\n \n Chen, T.; Ghaderi, J.; Rubenstein, D.; and Zussman, G.\n\n\n \n\n\n\n In 2017 IEEE Wireless Communications and Networking Conference Workshops, WCNC Workshops 2017, San Francisco, CA, USA, March 19-22, 2017, pages 1–5, 2017. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"PerformancePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/wcnc/ChenGRZ17,\n  author       = {Tingjun Chen and\n                  Javad Ghaderi and\n                  Dan Rubenstein and\n                  Gil Zussman},\n  title        = {Performance Evaluation of Energy-Constrained Broadcast (EconCast)\n                  in Wireless Networks},\n  booktitle    = {2017 {IEEE} Wireless Communications and Networking Conference Workshops,\n                  {WCNC} Workshops 2017, San Francisco, CA, USA, March 19-22, 2017},\n  pages        = {1--5},\n  publisher    = {{IEEE}},\n  year         = {2017},\n  url          = {https://doi.org/10.1109/WCNCW.2017.7919063},\n  doi          = {10.1109/WCNCW.2017.7919063},\n  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/wcnc/ChenGRZ17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Coding with asymmetric prior knowledge.\n \n \n \n \n\n\n \n Andoni, A.; Ghaderi, J.; Hsu, D. J.; Rubenstein, D.; and Weinstein, O.\n\n\n \n\n\n\n CoRR, abs/1707.04875. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"CodingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/AndoniGHRW17,\n  author       = {Alexandr Andoni and\n                  Javad Ghaderi and\n                  Daniel J. Hsu and\n                  Dan Rubenstein and\n                  Omri Weinstein},\n  title        = {Coding with asymmetric prior knowledge},\n  journal      = {CoRR},\n  volume       = {abs/1707.04875},\n  year         = {2017},\n  url          = {http://arxiv.org/abs/1707.04875},\n  eprinttype    = {arXiv},\n  eprint       = {1707.04875},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/AndoniGHRW17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Joint-family: Adaptive bitrate video-on-demand streaming over peer-to-peer networks with realistic abandonment patterns.\n \n \n \n \n\n\n \n Hwang, K.; Gopalakrishnan, V.; Jana, R.; Lee, S.; Misra, V.; Ramakrishnan, K. K.; and Rubenstein, D.\n\n\n \n\n\n\n Comput. Networks, 106: 226–244. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"Joint-family:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/cn/HwangGJLMRR16,\n  author       = {Kyung{-}Wook Hwang and\n                  Vijay Gopalakrishnan and\n                  Rittwik Jana and\n                  Seungjoon Lee and\n                  Vishal Misra and\n                  K. K. Ramakrishnan and\n                  Dan Rubenstein},\n  title        = {Joint-family: Adaptive bitrate video-on-demand streaming over peer-to-peer\n                  networks with realistic abandonment patterns},\n  journal      = {Comput. Networks},\n  volume       = {106},\n  pages        = {226--244},\n  year         = {2016},\n  url          = {https://doi.org/10.1016/j.comnet.2016.06.006},\n  doi          = {10.1016/J.COMNET.2016.06.006},\n  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/cn/HwangGJLMRR16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Panda: Neighbor Discovery on a Power Harvesting Budget.\n \n \n \n \n\n\n \n Margolies, R.; Grebla, G.; Chen, T.; Rubenstein, D.; and Zussman, G.\n\n\n \n\n\n\n IEEE J. Sel. Areas Commun., 34(12): 3606–3619. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"Panda:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jsac/MargoliesGCRZ16,\n  author       = {Robert Margolies and\n                  Guy Grebla and\n                  Tingjun Chen and\n                  Dan Rubenstein and\n                  Gil Zussman},\n  title        = {Panda: Neighbor Discovery on a Power Harvesting Budget},\n  journal      = {{IEEE} J. Sel. Areas Commun.},\n  volume       = {34},\n  number       = {12},\n  pages        = {3606--3619},\n  year         = {2016},\n  url          = {https://doi.org/10.1109/JSAC.2016.2611984},\n  doi          = {10.1109/JSAC.2016.2611984},\n  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jsac/MargoliesGCRZ16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Maximizing Broadcast Throughput Under Ultra-Low-Power Constraints.\n \n \n \n \n\n\n \n Chen, T.; Ghaderi, J.; Rubenstein, D.; and Zussman, G.\n\n\n \n\n\n\n In Markopoulou, A.; Faloutsos, M.; Sekar, V.; and Kostic, D., editor(s), Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, CoNEXT 2016, Irvine, California, USA, December 12-15, 2016, pages 457–471, 2016. ACM\n \n\n\n\n
\n\n\n\n \n \n \"MaximizingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/conext/ChenGRZ16,\n  author       = {Tingjun Chen and\n                  Javad Ghaderi and\n                  Dan Rubenstein and\n                  Gil Zussman},\n  editor       = {Athina Markopoulou and\n                  Michalis Faloutsos and\n                  Vyas Sekar and\n                  Dejan Kostic},\n  title        = {Maximizing Broadcast Throughput Under Ultra-Low-Power Constraints},\n  booktitle    = {Proceedings of the 12th International on Conference on emerging Networking\n                  EXperiments and Technologies, CoNEXT 2016, Irvine, California, USA,\n                  December 12-15, 2016},\n  pages        = {457--471},\n  publisher    = {{ACM}},\n  year         = {2016},\n  url          = {https://doi.org/10.1145/2999572.2999608},\n  doi          = {10.1145/2999572.2999608},\n  timestamp    = {Thu, 19 Feb 2026 15:52:49 +0100},\n  biburl       = {https://dblp.org/rec/conf/conext/ChenGRZ16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Panda: Neighbor discovery on a power harvesting budget.\n \n \n \n \n\n\n \n Margolies, R.; Grebla, G.; Chen, T.; Rubenstein, D.; and Zussman, G.\n\n\n \n\n\n\n In 35th Annual IEEE International Conference on Computer Communications, INFOCOM 2016, San Francisco, CA, USA, April 10-14, 2016, pages 1–9, 2016. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"Panda:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/infocom/MargoliesGCRZ16,\n  author       = {Robert Margolies and\n                  Guy Grebla and\n                  Tingjun Chen and\n                  Dan Rubenstein and\n                  Gil Zussman},\n  title        = {Panda: Neighbor discovery on a power harvesting budget},\n  booktitle    = {35th Annual {IEEE} International Conference on Computer Communications,\n                  {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016},\n  pages        = {1--9},\n  publisher    = {{IEEE}},\n  year         = {2016},\n  url          = {https://doi.org/10.1109/INFOCOM.2016.7524505},\n  doi          = {10.1109/INFOCOM.2016.7524505},\n  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/infocom/MargoliesGCRZ16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Power-Aware Neighbor Discovery for Energy Harvesting Things: Demo Abstract.\n \n \n \n \n\n\n \n Chen, T.; Chen, G.; Jain, S.; Margolies, R.; Grebla, G.; Rubenstein, D.; and Zussman, G.\n\n\n \n\n\n\n In Levis, P. A.; Eglash, S.; Nachman, L.; and Rowe, A., editor(s), Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, Stanford, CA, USA, November 14-16, 2016, pages 312–313, 2016. ACM\n \n\n\n\n
\n\n\n\n \n \n \"Power-AwarePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sensys/ChenCJMGRZ16,\n  author       = {Tingjun Chen and\n                  Gregory Chen and\n                  Saahil Jain and\n                  Robert Margolies and\n                  Guy Grebla and\n                  Dan Rubenstein and\n                  Gil Zussman},\n  editor       = {Philip Alexander Levis and\n                  Steve Eglash and\n                  Lama Nachman and\n                  Anthony Rowe},\n  title        = {Power-Aware Neighbor Discovery for Energy Harvesting Things: Demo\n                  Abstract},\n  booktitle    = {Proceedings of the 14th {ACM} Conference on Embedded Network Sensor\n                  Systems, SenSys 2016, Stanford, CA, USA, November 14-16, 2016},\n  pages        = {312--313},\n  publisher    = {{ACM}},\n  year         = {2016},\n  url          = {https://doi.org/10.1145/2994551.2996538},\n  doi          = {10.1145/2994551.2996538},\n  timestamp    = {Wed, 04 Dec 2024 09:43:59 +0100},\n  biburl       = {https://dblp.org/rec/conf/sensys/ChenCJMGRZ16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Panda: Neighbor Discovery on a Power Harvesting Budget.\n \n \n \n \n\n\n \n Margolies, R.; Grebla, G.; Chen, T.; Rubenstein, D.; and Zussman, G.\n\n\n \n\n\n\n CoRR, abs/1601.06474. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"Panda:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/MargoliesGCRZ16,\n  author       = {Robert Margolies and\n                  Guy Grebla and\n                  Tingjun Chen and\n                  Dan Rubenstein and\n                  Gil Zussman},\n  title        = {Panda: Neighbor Discovery on a Power Harvesting Budget},\n  journal      = {CoRR},\n  volume       = {abs/1601.06474},\n  year         = {2016},\n  url          = {http://arxiv.org/abs/1601.06474},\n  eprinttype    = {arXiv},\n  eprint       = {1601.06474},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/MargoliesGCRZ16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Maximizing Broadcast Throughput Under Ultra-Low-Power Constraints.\n \n \n \n \n\n\n \n Chen, T.; Ghaderi, J.; Rubenstein, D.; and Zussman, G.\n\n\n \n\n\n\n CoRR, abs/1610.04203. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"MaximizingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/ChenGRZ16,\n  author       = {Tingjun Chen and\n                  Javad Ghaderi and\n                  Dan Rubenstein and\n                  Gil Zussman},\n  title        = {Maximizing Broadcast Throughput Under Ultra-Low-Power Constraints},\n  journal      = {CoRR},\n  volume       = {abs/1610.04203},\n  year         = {2016},\n  url          = {http://arxiv.org/abs/1610.04203},\n  eprinttype    = {arXiv},\n  eprint       = {1610.04203},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/ChenGRZ16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n On the Optimality of Greedy Garbage Collection for SSDs.\n \n \n \n \n\n\n \n Yang, Y.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n SIGMETRICS Perform. Evaluation Rev., 43(2): 63–65. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sigmetrics/YangMR15,\n  author       = {Yudong Yang and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {On the Optimality of Greedy Garbage Collection for SSDs},\n  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},\n  volume       = {43},\n  number       = {2},\n  pages        = {63--65},\n  year         = {2015},\n  url          = {https://doi.org/10.1145/2825236.2825261},\n  doi          = {10.1145/2825236.2825261},\n  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sigmetrics/YangMR15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Joint-Family: Enabling adaptive bitrate streaming in peer-to-peer video-on-demand.\n \n \n \n \n\n\n \n Hwang, K.; Gopalakrishnan, V.; Jana, R.; Lee, S.; Misra, V.; Ramakrishnan, K. K.; and Rubenstein, D.\n\n\n \n\n\n\n In 2013 21st IEEE International Conference on Network Protocols, ICNP 2013, Göttingen, Germany, October 7-10, 2013, pages 1–10, 2013. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Joint-Family:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icnp/HwangGJLMRR13,\n  author       = {Kyung{-}Wook Hwang and\n                  Vijay Gopalakrishnan and\n                  Rittwik Jana and\n                  Seungjoon Lee and\n                  Vishal Misra and\n                  K. K. Ramakrishnan and\n                  Dan Rubenstein},\n  title        = {Joint-Family: Enabling adaptive bitrate streaming in peer-to-peer\n                  video-on-demand},\n  booktitle    = {2013 21st {IEEE} International Conference on Network Protocols, {ICNP}\n                  2013, G{\\"{o}}ttingen, Germany, October 7-10, 2013},\n  pages        = {1--10},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2013},\n  url          = {https://doi.org/10.1109/ICNP.2013.6733579},\n  doi          = {10.1109/ICNP.2013.6733579},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icnp/HwangGJLMRR13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Connectivity Maintenance in Mobile Wireless Networks via Constrained Mobility.\n \n \n \n \n\n\n \n Reich, J.; Misra, V.; Rubenstein, D.; and Zussman, G.\n\n\n \n\n\n\n IEEE J. Sel. Areas Commun., 30(5): 935–950. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"ConnectivityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jsac/ReichMRZ12,\n  author       = {Joshua Reich and\n                  Vishal Misra and\n                  Dan Rubenstein and\n                  Gil Zussman},\n  title        = {Connectivity Maintenance in Mobile Wireless Networks via Constrained\n                  Mobility},\n  journal      = {{IEEE} J. Sel. Areas Commun.},\n  volume       = {30},\n  number       = {5},\n  pages        = {935--950},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/JSAC.2012.120609},\n  doi          = {10.1109/JSAC.2012.120609},\n  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jsac/ReichMRZ12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Price differentiation in the kelly mechanism.\n \n \n \n \n\n\n \n Ma, R. T. B.; Chiu, D. M.; Lui, J. C. S.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n SIGMETRICS Perform. Evaluation Rev., 40(2): 30–33. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"PricePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sigmetrics/MaCLMR12,\n  author       = {Richard T. B. Ma and\n                  Dah Ming Chiu and\n                  John C. S. Lui and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Price differentiation in the kelly mechanism},\n  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},\n  volume       = {40},\n  number       = {2},\n  pages        = {30--33},\n  year         = {2012},\n  url          = {https://doi.org/10.1145/2381056.2381064},\n  doi          = {10.1145/2381056.2381064},\n  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sigmetrics/MaCLMR12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n VMTorrent: scalable P2P virtual machine streaming.\n \n \n \n \n\n\n \n Reich, J.; Laadan, O.; Brosh, E.; Sherman, A.; Misra, V.; Nieh, J.; and Rubenstein, D.\n\n\n \n\n\n\n In Barakat, C.; Teixeira, R.; Ramakrishnan, K. K.; and Thiran, P., editor(s), Conference on emerging Networking Experiments and Technologies, CoNEXT '12, Nice, France - December 10 - 13, 2012, pages 289–300, 2012. ACM\n \n\n\n\n
\n\n\n\n \n \n \"VMTorrent:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/conext/ReichLBSMNR12,\n  author       = {Joshua Reich and\n                  Oren Laadan and\n                  Eli Brosh and\n                  Alex Sherman and\n                  Vishal Misra and\n                  Jason Nieh and\n                  Dan Rubenstein},\n  editor       = {Chadi Barakat and\n                  Renata Teixeira and\n                  K. K. Ramakrishnan and\n                  Patrick Thiran},\n  title        = {VMTorrent: scalable {P2P} virtual machine streaming},\n  booktitle    = {Conference on emerging Networking Experiments and Technologies, CoNEXT\n                  '12, Nice, France - December 10 - 13, 2012},\n  pages        = {289--300},\n  publisher    = {{ACM}},\n  year         = {2012},\n  url          = {https://doi.org/10.1145/2413176.2413210},\n  doi          = {10.1145/2413176.2413210},\n  timestamp    = {Thu, 19 Feb 2026 15:52:49 +0100},\n  biburl       = {https://dblp.org/rec/conf/conext/ReichLBSMNR12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces.\n \n \n \n \n\n\n \n Choi, S. G.; Hwang, K.; Katz, J.; Malkin, T.; and Rubenstein, D.\n\n\n \n\n\n\n In Dunkelman, O., editor(s), Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings, volume 7178, of Lecture Notes in Computer Science, pages 416–432, 2012. Springer\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ctrsa/ChoiHKMR12,\n  author       = {Seung Geol Choi and\n                  Kyung{-}Wook Hwang and\n                  Jonathan Katz and\n                  Tal Malkin and\n                  Dan Rubenstein},\n  editor       = {Orr Dunkelman},\n  title        = {Secure Multi-Party Computation of Boolean Circuits with Applications\n                  to Privacy in On-Line Marketplaces},\n  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at\n                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March\n                  2, 2012. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7178},\n  pages        = {416--432},\n  publisher    = {Springer},\n  year         = {2012},\n  url          = {https://doi.org/10.1007/978-3-642-27954-6\\_26},\n  doi          = {10.1007/978-3-642-27954-6\\_26},\n  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},\n  biburl       = {https://dblp.org/rec/conf/ctrsa/ChoiHKMR12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n On cooperative settlement between content, transit, and eyeball internet service providers.\n \n \n \n \n\n\n \n Ma, R. T. B.; Chiu, D. M.; Lui, J. C. S.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n IEEE/ACM Trans. Netw., 19(3): 802–815. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ton/MaCLMR11,\n  author       = {Richard T. B. Ma and\n                  Dah Ming Chiu and\n                  John C. S. Lui and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {On cooperative settlement between content, transit, and eyeball internet\n                  service providers},\n  journal      = {{IEEE/ACM} Trans. Netw.},\n  volume       = {19},\n  number       = {3},\n  pages        = {802--815},\n  year         = {2011},\n  url          = {https://doi.org/10.1109/TNET.2010.2089533},\n  doi          = {10.1109/TNET.2010.2089533},\n  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ton/MaCLMR11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Connectivity maintenance in mobile wireless networks via constrained mobility.\n \n \n \n \n\n\n \n Reich, J.; Misra, V.; Rubenstein, D.; and Zussman, G.\n\n\n \n\n\n\n In INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China, pages 927–935, 2011. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"ConnectivityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/infocom/ReichMRZ11,\n  author       = {Joshua Reich and\n                  Vishal Misra and\n                  Dan Rubenstein and\n                  Gil Zussman},\n  title        = {Connectivity maintenance in mobile wireless networks via constrained\n                  mobility},\n  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,\n                  Joint Conference of the {IEEE} Computer and Communications Societies,\n                  10-15 April 2011, Shanghai, China},\n  pages        = {927--935},\n  publisher    = {{IEEE}},\n  year         = {2011},\n  url          = {https://doi.org/10.1109/INFCOM.2011.5935319},\n  doi          = {10.1109/INFCOM.2011.5935319},\n  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},\n  biburl       = {https://dblp.org/rec/conf/infocom/ReichMRZ11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SIGMETRICS 2011, Proceedings of the 2011 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, San Jose, CA, USA, 07-11 June 2011 (Co-located with FCRC 2011).\n \n \n \n \n\n\n \n Merchant, A.; Keeton, K.; and Rubenstein, D.,\n editors.\n \n\n\n \n\n\n\n ACM. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"SIGMETRICSPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@proceedings{DBLP:conf/sigmetrics/2011,\n  editor       = {Arif Merchant and\n                  Kimberly Keeton and\n                  Dan Rubenstein},\n  title        = {{SIGMETRICS} 2011, Proceedings of the 2011 {ACM} {SIGMETRICS} International\n                  Conference on Measurement and Modeling of Computer Systems, San Jose,\n                  CA, USA, 07-11 June 2011 (Co-located with {FCRC} 2011)},\n  publisher    = {{ACM}},\n  year         = {2011},\n  url          = {https://doi.org/10.1145/1993744},\n  doi          = {10.1145/1993744},\n  isbn         = {978-1-4503-0814-4},\n  timestamp    = {Sun, 01 Aug 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sigmetrics/2011.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces.\n \n \n \n \n\n\n \n Choi, S. G.; Hwang, K.; Katz, J.; Malkin, T.; and Rubenstein, D.\n\n\n \n\n\n\n IACR Cryptol. ePrint Arch.,257. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/ChoiHKMR11,\n  author       = {Seung Geol Choi and\n                  Kyung{-}Wook Hwang and\n                  Jonathan Katz and\n                  Tal Malkin and\n                  Dan Rubenstein},\n  title        = {Secure Multi-Party Computation of Boolean Circuits with Applications\n                  to Privacy in On-Line Marketplaces},\n  journal      = {{IACR} Cryptol. ePrint Arch.},\n  pages        = {257},\n  year         = {2011},\n  url          = {http://eprint.iacr.org/2011/257},\n  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/iacr/ChoiHKMR11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Internet Economics: The Use of Shapley Value for ISP Settlement.\n \n \n \n \n\n\n \n Ma, R. T. B.; Chiu, D.; Lui, J. C.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n IEEE/ACM Trans. Netw., 18(3): 775–787. 2010.\n \n\n\n\n
\n\n\n\n \n \n \"InternetPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ton/MaCLMR10,\n  author       = {Richard T. B. Ma and\n                  Dah{-}Ming Chiu and\n                  John Chi{-}Shing Lui and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Internet Economics: The Use of Shapley Value for {ISP} Settlement},\n  journal      = {{IEEE/ACM} Trans. Netw.},\n  volume       = {18},\n  number       = {3},\n  pages        = {775--787},\n  year         = {2010},\n  url          = {https://doi.org/10.1109/TNET.2010.2049205},\n  doi          = {10.1109/TNET.2010.2049205},\n  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ton/MaCLMR10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The Delay-Friendliness of TCP for Real-Time Traffic.\n \n \n \n \n\n\n \n Brosh, E.; Baset, S. A.; Misra, V.; Rubenstein, D.; and Schulzrinne, H.\n\n\n \n\n\n\n IEEE/ACM Trans. Netw., 18(5): 1478–1491. 2010.\n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ton/BroshBMRS10,\n  author       = {Eli Brosh and\n                  Salman Abdul Baset and\n                  Vishal Misra and\n                  Dan Rubenstein and\n                  Henning Schulzrinne},\n  title        = {The Delay-Friendliness of {TCP} for Real-Time Traffic},\n  journal      = {{IEEE/ACM} Trans. Netw.},\n  volume       = {18},\n  number       = {5},\n  pages        = {1478--1491},\n  year         = {2010},\n  url          = {https://doi.org/10.1109/TNET.2010.2050780},\n  doi          = {10.1109/TNET.2010.2050780},\n  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ton/BroshBMRS10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Toward Optimal Network Fault Correction in Externally Managed Overlay Networks.\n \n \n \n \n\n\n \n Lee, P. P. C.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n IEEE Trans. Parallel Distributed Syst., 21(3): 354–366. 2010.\n \n\n\n\n
\n\n\n\n \n \n \"TowardPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tpds/LeeMR10,\n  author       = {Patrick P. C. Lee and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Toward Optimal Network Fault Correction in Externally Managed Overlay\n                  Networks},\n  journal      = {{IEEE} Trans. Parallel Distributed Syst.},\n  volume       = {21},\n  number       = {3},\n  pages        = {354--366},\n  year         = {2010},\n  url          = {https://doi.org/10.1109/TPDS.2009.66},\n  doi          = {10.1109/TPDS.2009.66},\n  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tpds/LeeMR10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Energy harvesting active networked tags (EnHANTs) for ubiquitous object networking.\n \n \n \n \n\n\n \n Gorlatova, M.; Kinget, P. R.; Kymissis, I.; Rubenstein, D.; Wang, X.; and Zussman, G.\n\n\n \n\n\n\n IEEE Wirel. Commun., 17(6): 18–25. 2010.\n \n\n\n\n
\n\n\n\n \n \n \"EnergyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/wc/GorlatovaKKRWZ10,\n  author       = {Maria Gorlatova and\n                  Peter R. Kinget and\n                  Ioannis Kymissis and\n                  Dan Rubenstein and\n                  Xiaodong Wang and\n                  Gil Zussman},\n  title        = {Energy harvesting active networked tags (EnHANTs) for ubiquitous object\n                  networking},\n  journal      = {{IEEE} Wirel. Commun.},\n  volume       = {17},\n  number       = {6},\n  pages        = {18--25},\n  year         = {2010},\n  url          = {https://doi.org/10.1109/MWC.2010.5675774},\n  doi          = {10.1109/MWC.2010.5675774},\n  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/wc/GorlatovaKKRWZ10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On the robustness of wireless opportunistic routing toward inaccurate link-level measurements.\n \n \n \n \n\n\n \n Lee, P. P.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In Kumar, P. R.; Schulzrinne, H.; and Vin, H. M., editor(s), Second International Conference on Communication Systems and Networks, COMSNETS 2010, Bangalore, India, January 5-9, 2010, pages 1–10, 2010. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/comsnets/LeeMR10,\n  author       = {Patrick Pak{-}Ching Lee and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  editor       = {P. R. Kumar and\n                  Henning Schulzrinne and\n                  Harrick M. Vin},\n  title        = {On the robustness of wireless opportunistic routing toward inaccurate\n                  link-level measurements},\n  booktitle    = {Second International Conference on Communication Systems and Networks,\n                  {COMSNETS} 2010, Bangalore, India, January 5-9, 2010},\n  pages        = {1--10},\n  publisher    = {{IEEE}},\n  year         = {2010},\n  url          = {https://doi.org/10.1109/COMSNETS.2010.5431992},\n  doi          = {10.1109/COMSNETS.2010.5431992},\n  timestamp    = {Thu, 08 Apr 2021 08:40:48 +0200},\n  biburl       = {https://dblp.org/rec/conf/comsnets/LeeMR10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Prototyping Energy Harvesting Active Networked Tags (EnHANTs) with MICA2 Motes.\n \n \n \n \n\n\n \n Gorlatova, M.; Sharma, T.; Shrestha, D.; Xu, E.; Chen, J.; Skolnik, A.; Piao, D.; Kinget, P. R.; Kymissis, I.; Rubenstein, D.; and Zussman, G.\n\n\n \n\n\n\n In Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2010, June 21-25, 2010, Boston, Massachusetts, USA, pages 1–3, 2010. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"PrototypingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/secon/GorlatovaSSXCSPKKRZ10,\n  author       = {Maria Gorlatova and\n                  Tarun Sharma and\n                  Deep Shrestha and\n                  Enlin Xu and\n                  Jiasi Chen and\n                  Abraham Skolnik and\n                  Dongzhen Piao and\n                  Peter R. Kinget and\n                  Ioannis Kymissis and\n                  Dan Rubenstein and\n                  Gil Zussman},\n  title        = {Prototyping Energy Harvesting Active Networked Tags (EnHANTs) with\n                  {MICA2} Motes},\n  booktitle    = {Proceedings of the Seventh Annual {IEEE} Communications Society Conference\n                  on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2010,\n                  June 21-25, 2010, Boston, Massachusetts, {USA}},\n  pages        = {1--3},\n  publisher    = {{IEEE}},\n  year         = {2010},\n  url          = {https://doi.org/10.1109/SECON.2010.5508227},\n  doi          = {10.1109/SECON.2010.5508227},\n  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/secon/GorlatovaSSXCSPKKRZ10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n How green is IP-telephony?.\n \n \n \n \n\n\n \n Baset, S. A.; Reich, J.; Janak, J.; Kasparek, P.; Misra, V.; Rubenstein, D.; and Schulzrinne, H.\n\n\n \n\n\n\n In Barford, P.; Padhye, J.; and Sahu, S., editor(s), Proceedings of the 1st ACM SIGCOMM Workshop on Green Networking 2010, New Delhi, India, August 30, 2010, pages 77–84, 2010. ACM\n \n\n\n\n
\n\n\n\n \n \n \"HowPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigcomm/BasetRJKMRS10,\n  author       = {Salman Abdul Baset and\n                  Joshua Reich and\n                  Jan Janak and\n                  Pavel Kasparek and\n                  Vishal Misra and\n                  Dan Rubenstein and\n                  Henning Schulzrinne},\n  editor       = {Paul Barford and\n                  Jitendra Padhye and\n                  Sambit Sahu},\n  title        = {How green is IP-telephony?},\n  booktitle    = {Proceedings of the 1st {ACM} {SIGCOMM} Workshop on Green Networking\n                  2010, New Delhi, India, August 30, 2010},\n  pages        = {77--84},\n  publisher    = {{ACM}},\n  year         = {2010},\n  url          = {https://doi.org/10.1145/1851290.1851306},\n  doi          = {10.1145/1851290.1851306},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/sigcomm/BasetRJKMRS10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n VMtorrent: virtual appliances on-demand.\n \n \n \n \n\n\n \n Reich, J.; Laadan, O.; Brosh, E.; Sherman, A.; Misra, V.; Nieh, J.; and Rubenstein, D.\n\n\n \n\n\n\n In Kalyanaraman, S.; Padmanabhan, V. N.; Ramakrishnan, K. K.; Shorey, R.; and Voelker, G. M., editor(s), Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pages 453–454, 2010. ACM\n \n\n\n\n
\n\n\n\n \n \n \"VMtorrent:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigcomm/ReichLBSMNR10,\n  author       = {Joshua Reich and\n                  Oren Laadan and\n                  Eli Brosh and\n                  Alex Sherman and\n                  Vishal Misra and\n                  Jason Nieh and\n                  Dan Rubenstein},\n  editor       = {Shivkumar Kalyanaraman and\n                  Venkata N. Padmanabhan and\n                  K. K. Ramakrishnan and\n                  Rajeev Shorey and\n                  Geoffrey M. Voelker},\n  title        = {VMtorrent: virtual appliances on-demand},\n  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2010 Conference on Applications,\n                  Technologies, Architectures, and Protocols for Computer Communications,\n                  New Delhi, India, August 30 -September 3, 2010},\n  pages        = {453--454},\n  publisher    = {{ACM}},\n  year         = {2010},\n  url          = {https://doi.org/10.1145/1851182.1851259},\n  doi          = {10.1145/1851182.1851259},\n  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},\n  biburl       = {https://dblp.org/rec/conf/sigcomm/ReichLBSMNR10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n NETWORKING 2010, 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010. Proceedings.\n \n \n \n \n\n\n \n Crovella, M.; Feeney, L. M.; Rubenstein, D.; and Raghavan, S. V.,\n editors.\n \n\n\n \n\n\n\n Volume 6091, of Lecture Notes in Computer Science.Springer. 2010.\n \n\n\n\n
\n\n\n\n \n \n \"NETWORKINGPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@proceedings{DBLP:conf/networking/2010,\n  editor       = {Mark Crovella and\n                  Laura Marie Feeney and\n                  Dan Rubenstein and\n                  S. V. Raghavan},\n  title        = {{NETWORKING} 2010, 9th International {IFIP} {TC} 6 Networking Conference,\n                  Chennai, India, May 11-15, 2010. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {6091},\n  publisher    = {Springer},\n  year         = {2010},\n  url          = {https://doi.org/10.1007/978-3-642-12963-6},\n  doi          = {10.1007/978-3-642-12963-6},\n  isbn         = {978-3-642-12962-9},\n  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/networking/2010.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n An analysis of generalized slotted-Aloha protocols.\n \n \n \n \n\n\n \n Ma, R. T. B.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n IEEE/ACM Trans. Netw., 17(3): 936–949. 2009.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ton/MaMR09,\n  author       = {Richard T. B. Ma and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {An analysis of generalized slotted-Aloha protocols},\n  journal      = {{IEEE/ACM} Trans. Netw.},\n  volume       = {17},\n  number       = {3},\n  pages        = {936--949},\n  year         = {2009},\n  url          = {http://doi.acm.org/10.1145/1569732.1569752},\n  doi          = {10.1145/1569732.1569752},\n  timestamp    = {Tue, 28 Jul 2009 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ton/MaMR09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Opportunistic use of client repeaters to improve performance of WLANs.\n \n \n \n \n\n\n \n Bahl, P.; Chandra, R.; Lee, P. P. C.; Misra, V.; Padhye, J.; Rubenstein, D.; and Yu, Y.\n\n\n \n\n\n\n IEEE/ACM Trans. Netw., 17(4): 1160–1171. 2009.\n \n\n\n\n
\n\n\n\n \n \n \"OpportunisticPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ton/BahlCLMPRY09,\n  author       = {Paramvir Bahl and\n                  Ranveer Chandra and\n                  Patrick P. C. Lee and\n                  Vishal Misra and\n                  Jitendra Padhye and\n                  Dan Rubenstein and\n                  Yan Yu},\n  title        = {Opportunistic use of client repeaters to improve performance of WLANs},\n  journal      = {{IEEE/ACM} Trans. Netw.},\n  volume       = {17},\n  number       = {4},\n  pages        = {1160--1171},\n  year         = {2009},\n  url          = {http://doi.acm.org/10.1145/1618562.1618574},\n  doi          = {10.1145/1618562.1618574},\n  timestamp    = {Wed, 23 Sep 2009 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ton/BahlCLMPRY09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Challenge: ultra-low-power energy-harvesting active networked tags (EnHANTs).\n \n \n \n \n\n\n \n Gorlatova, M.; Kinget, P. R.; Kymissis, I.; Rubenstein, D.; Wang, X.; and Zussman, G.\n\n\n \n\n\n\n In Shin, K. G.; Zhang, Y.; Bagrodia, R. L.; and Govindan, R., editor(s), Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, MOBICOM 2009, Beijing, China, September 20-25, 2009, pages 253–260, 2009. ACM\n \n\n\n\n
\n\n\n\n \n \n \"Challenge:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mobicom/GorlatovaKKRWZ09,\n  author       = {Maria Gorlatova and\n                  Peter R. Kinget and\n                  Ioannis Kymissis and\n                  Dan Rubenstein and\n                  Xiaodong Wang and\n                  Gil Zussman},\n  editor       = {Kang G. Shin and\n                  Yongguang Zhang and\n                  Rajive L. Bagrodia and\n                  Ramesh Govindan},\n  title        = {Challenge: ultra-low-power energy-harvesting active networked tags\n                  (EnHANTs)},\n  booktitle    = {Proceedings of the 15th Annual International Conference on Mobile\n                  Computing and Networking, {MOBICOM} 2009, Beijing, China, September\n                  20-25, 2009},\n  pages        = {253--260},\n  publisher    = {{ACM}},\n  year         = {2009},\n  url          = {https://doi.org/10.1145/1614320.1614348},\n  doi          = {10.1145/1614320.1614348},\n  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/mobicom/GorlatovaKKRWZ09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2008\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Roomba MADNeT: a mobile ad-hoc delay tolerant network testbed.\n \n \n \n \n\n\n \n Reich, J.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n ACM SIGMOBILE Mob. Comput. Commun. Rev., 12(1): 68–70. 2008.\n \n\n\n\n
\n\n\n\n \n \n \"RoombaPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sigmobile/ReichMR08,\n  author       = {Joshua Reich and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Roomba MADNeT: a mobile ad-hoc delay tolerant network testbed},\n  journal      = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.},\n  volume       = {12},\n  number       = {1},\n  pages        = {68--70},\n  year         = {2008},\n  url          = {https://doi.org/10.1145/1374512.1374536},\n  doi          = {10.1145/1374512.1374536},\n  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sigmobile/ReichMR08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The shapley value: Its use and implications on internet economics.\n \n \n \n \n\n\n \n Ma, R. T. B.; Lui, J. C. S.; Chiu, D.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In 46th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2008, Monticello, IL, USA, September 24-26, 2008, pages 1094–1096, 2008. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/allerton/MaLCMR08,\n  author       = {Richard T. B. Ma and\n                  John C. S. Lui and\n                  Dah{-}Ming Chiu and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {The shapley value: Its use and implications on internet economics},\n  booktitle    = {46th Annual Allerton Conference on Communication, Control, and Computing,\n                  Allerton 2008, Monticello, IL, USA, September 24-26, 2008},\n  pages        = {1094--1096},\n  publisher    = {{IEEE}},\n  year         = {2008},\n  url          = {https://doi.org/10.1109/ALLERTON.2008.4797681},\n  doi          = {10.1109/ALLERTON.2008.4797681},\n  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/allerton/MaLCMR08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On cooperative settlement between content, transit and eyeball internet service providers.\n \n \n \n \n\n\n \n Ma, R. T. B.; Chiu, D.; Lui, J. C. S.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In Azcorra, A.; de Veciana, G.; Ross, K. W.; and Tassiulas, L., editor(s), Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2008, Madrid, Spain, December 9-12, 2008, pages 7, 2008. ACM\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/conext/MaCLMR08,\n  author       = {Richard T. B. Ma and\n                  Dah{-}Ming Chiu and\n                  John C. S. Lui and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  editor       = {Arturo Azcorra and\n                  Gustavo de Veciana and\n                  Keith W. Ross and\n                  Leandros Tassiulas},\n  title        = {On cooperative settlement between content, transit and eyeball internet\n                  service providers},\n  booktitle    = {Proceedings of the 2008 {ACM} Conference on Emerging Network Experiment\n                  and Technology, CoNEXT 2008, Madrid, Spain, December 9-12, 2008},\n  pages        = {7},\n  publisher    = {{ACM}},\n  year         = {2008},\n  url          = {https://doi.org/10.1145/1544012.1544019},\n  doi          = {10.1145/1544012.1544019},\n  timestamp    = {Thu, 19 Feb 2026 15:52:49 +0100},\n  biburl       = {https://dblp.org/rec/conf/conext/MaCLMR08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Opportunistic use of client repeaters to improve performance of WLANs.\n \n \n \n \n\n\n \n Bahl, P.; Chandra, R.; Lee, P. P. C.; Misra, V.; Padhye, J.; Rubenstein, D.; and Yu, Y.\n\n\n \n\n\n\n In Azcorra, A.; de Veciana, G.; Ross, K. W.; and Tassiulas, L., editor(s), Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2008, Madrid, Spain, December 9-12, 2008, pages 29, 2008. ACM\n \n\n\n\n
\n\n\n\n \n \n \"OpportunisticPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/conext/BahlCLMPRY08,\n  author       = {Paramvir Bahl and\n                  Ranveer Chandra and\n                  Patrick P. C. Lee and\n                  Vishal Misra and\n                  Jitendra Padhye and\n                  Dan Rubenstein and\n                  Yan Yu},\n  editor       = {Arturo Azcorra and\n                  Gustavo de Veciana and\n                  Keith W. Ross and\n                  Leandros Tassiulas},\n  title        = {Opportunistic use of client repeaters to improve performance of WLANs},\n  booktitle    = {Proceedings of the 2008 {ACM} Conference on Emerging Network Experiment\n                  and Technology, CoNEXT 2008, Madrid, Spain, December 9-12, 2008},\n  pages        = {29},\n  publisher    = {{ACM}},\n  year         = {2008},\n  url          = {https://doi.org/10.1145/1544012.1544041},\n  doi          = {10.1145/1544012.1544041},\n  timestamp    = {Thu, 19 Feb 2026 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/conext/BahlCLMPRY08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Interconnecting eyeballs to content: a shapley value perspective on isp peering and settlement.\n \n \n \n \n\n\n \n Ma, R. T. B.; Chiu, D.; Lui, J. C. S.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In Feigenbaum, J.; and Yang, Y. R., editor(s), Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, NetEcon 2008, Seattle, WA, USA, August 22, 2008, pages 61–66, 2008. ACM\n \n\n\n\n
\n\n\n\n \n \n \"InterconnectingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigcomm/MaCLMR08,\n  author       = {Richard T. B. Ma and\n                  Dah{-}Ming Chiu and\n                  John C. S. Lui and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  editor       = {Joan Feigenbaum and\n                  Yang Richard Yang},\n  title        = {Interconnecting eyeballs to content: a shapley value perspective on\n                  isp peering and settlement},\n  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2008 Workshop on Economics of Networked\n                  Systems, NetEcon 2008, Seattle, WA, USA, August 22, 2008},\n  pages        = {61--66},\n  publisher    = {{ACM}},\n  year         = {2008},\n  url          = {https://doi.org/10.1145/1403027.1403041},\n  doi          = {10.1145/1403027.1403041},\n  timestamp    = {Thu, 27 Jan 2022 17:25:25 +0100},\n  biburl       = {https://dblp.org/rec/conf/sigcomm/MaCLMR08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The delay-friendliness of TCP.\n \n \n \n \n\n\n \n Brosh, E.; Baset, S.; Rubenstein, D.; and Schulzrinne, H.\n\n\n \n\n\n\n In Liu, Z.; Misra, V.; and Shenoy, P. J., editor(s), Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2008, Annapolis, MD, USA, June 2-6, 2008, pages 49–60, 2008. ACM\n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigmetrics/BroshBRS08,\n  author       = {Eli Brosh and\n                  Salman Baset and\n                  Dan Rubenstein and\n                  Henning Schulzrinne},\n  editor       = {Zhen Liu and\n                  Vishal Misra and\n                  Prashant J. Shenoy},\n  title        = {The delay-friendliness of {TCP}},\n  booktitle    = {Proceedings of the 2008 {ACM} {SIGMETRICS} International Conference\n                  on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2008,\n                  Annapolis, MD, USA, June 2-6, 2008},\n  pages        = {49--60},\n  publisher    = {{ACM}},\n  year         = {2008},\n  url          = {https://doi.org/10.1145/1375457.1375464},\n  doi          = {10.1145/1375457.1375464},\n  timestamp    = {Fri, 30 Jul 2021 16:13:32 +0200},\n  biburl       = {https://dblp.org/rec/conf/sigmetrics/BroshBRS08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2007\n \n \n (11)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n The time-correlated update problem.\n \n \n \n \n\n\n \n Reich, J.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n SIGMETRICS Perform. Evaluation Rev., 35(2): 33–35. 2007.\n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sigmetrics/ReichMR07,\n  author       = {Joshua Reich and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {The time-correlated update problem},\n  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},\n  volume       = {35},\n  number       = {2},\n  pages        = {33--35},\n  year         = {2007},\n  url          = {https://doi.org/10.1145/1330555.1330569},\n  doi          = {10.1145/1330555.1330569},\n  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sigmetrics/ReichMR07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Provisioning servers in the application tier for e-commerce systems.\n \n \n \n \n\n\n \n Villela, D. A. M.; Pradhan, P.; and Rubenstein, D.\n\n\n \n\n\n\n ACM Trans. Internet Techn., 7(1): 7. 2007.\n \n\n\n\n
\n\n\n\n \n \n \"ProvisioningPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/toit/VillelaPR07,\n  author       = {Daniel A. M. Villela and\n                  Prashant Pradhan and\n                  Dan Rubenstein},\n  title        = {Provisioning servers in the application tier for e-commerce systems},\n  journal      = {{ACM} Trans. Internet Techn.},\n  volume       = {7},\n  number       = {1},\n  pages        = {7},\n  year         = {2007},\n  url          = {https://doi.org/10.1145/1189740.1189747},\n  doi          = {10.1145/1189740.1189747},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/toit/VillelaPR07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Distributed algorithms for secure multipath routing in attack-resistant networks.\n \n \n \n \n\n\n \n Lee, P. P. C.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n IEEE/ACM Trans. Netw., 15(6): 1490–1501. 2007.\n \n\n\n\n
\n\n\n\n \n \n \"DistributedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ton/LeeMR07,\n  author       = {Patrick P. C. Lee and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Distributed algorithms for secure multipath routing in attack-resistant\n                  networks},\n  journal      = {{IEEE/ACM} Trans. Netw.},\n  volume       = {15},\n  number       = {6},\n  pages        = {1490--1501},\n  year         = {2007},\n  url          = {http://doi.acm.org/10.1145/1373476.1373498},\n  doi          = {10.1145/1373476.1373498},\n  timestamp    = {Mon, 26 May 2008 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ton/LeeMR07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Internet economics: the use of Shapley value for ISP settlement.\n \n \n \n \n\n\n \n Ma, R. T. B.; Chiu, D.; Lui, J. C. S.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In Kurose, J.; and Schulzrinne, H., editor(s), Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2007, New York, NY, USA, December 10-13, 2007, pages 6, 2007. ACM\n \n\n\n\n
\n\n\n\n \n \n \"InternetPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/conext/MaCLMR07,\n  author       = {Richard T. B. Ma and\n                  Dah{-}Ming Chiu and\n                  John C. S. Lui and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  editor       = {Jim Kurose and\n                  Henning Schulzrinne},\n  title        = {Internet economics: the use of Shapley value for {ISP} settlement},\n  booktitle    = {Proceedings of the 2007 {ACM} Conference on Emerging Network Experiment\n                  and Technology, CoNEXT 2007, New York, NY, USA, December 10-13, 2007},\n  pages        = {6},\n  publisher    = {{ACM}},\n  year         = {2007},\n  url          = {https://doi.org/10.1145/1364654.1364662},\n  doi          = {10.1145/1364654.1364662},\n  timestamp    = {Thu, 19 Feb 2026 15:52:49 +0100},\n  biburl       = {https://dblp.org/rec/conf/conext/MaCLMR07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Toward Optimal Network Fault Correction via End-to-End Inference.\n \n \n \n \n\n\n \n Lee, P. P. C.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In INFOCOM 2007. 26th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, USA, pages 1343–1351, 2007. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"TowardPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/infocom/LeeMR07,\n  author       = {Patrick P. C. Lee and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Toward Optimal Network Fault Correction via End-to-End Inference},\n  booktitle    = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,\n                  Joint Conference of the {IEEE} Computer and Communications Societies,\n                  6-12 May 2007, Anchorage, Alaska, {USA}},\n  pages        = {1343--1351},\n  publisher    = {{IEEE}},\n  year         = {2007},\n  url          = {https://doi.org/10.1109/INFCOM.2007.159},\n  doi          = {10.1109/INFCOM.2007.159},\n  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/infocom/LeeMR07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks.\n \n \n \n \n\n\n \n Navda, V.; Bohra, A.; Ganguly, S.; and Rubenstein, D.\n\n\n \n\n\n\n In INFOCOM 2007. 26th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, USA, pages 2526–2530, 2007. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"UsingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/infocom/NavdaBGR07,\n  author       = {Vishnu Navda and\n                  Aniruddha Bohra and\n                  Samrat Ganguly and\n                  Dan Rubenstein},\n  title        = {Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks},\n  booktitle    = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,\n                  Joint Conference of the {IEEE} Computer and Communications Societies,\n                  6-12 May 2007, Anchorage, Alaska, {USA}},\n  pages        = {2526--2530},\n  publisher    = {{IEEE}},\n  year         = {2007},\n  url          = {https://doi.org/10.1109/INFCOM.2007.314},\n  doi          = {10.1109/INFCOM.2007.314},\n  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/infocom/NavdaBGR07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Fairness and Physical Layer Capture in Random Access Networks.\n \n \n \n \n\n\n \n Chang, H.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2007, Merged with IEEE International Workshop on Wireless Ad-hoc and Sensor Networks (IWWAN), June 18-21, 2007, San Diego, California, USA, pages 381–390, 2007. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"FairnessPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/secon/ChangMR07,\n  author       = {Hoon Chang and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Fairness and Physical Layer Capture in Random Access Networks},\n  booktitle    = {Proceedings of the Fourth Annual {IEEE} Communications Society Conference\n                  on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2007,\n                  Merged with {IEEE} International Workshop on Wireless Ad-hoc and Sensor\n                  Networks (IWWAN), June 18-21, 2007, San Diego, California, {USA}},\n  pages        = {381--390},\n  publisher    = {{IEEE}},\n  year         = {2007},\n  url          = {https://doi.org/10.1109/SAHCN.2007.4292850},\n  doi          = {10.1109/SAHCN.2007.4292850},\n  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},\n  biburl       = {https://dblp.org/rec/conf/secon/ChangMR07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CountTorrent: ubiquitous access to query aggregates in dynamic and mobile sensor networks.\n \n \n \n \n\n\n \n Kamra, A.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In Jha, S., editor(s), Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, SenSys 2007, Sydney, NSW, Australia, November 6-9, 2007, pages 43–57, 2007. ACM\n \n\n\n\n
\n\n\n\n \n \n \"CountTorrent:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sensys/KamraMR07,\n  author       = {Abhinav Kamra and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  editor       = {Sanjay Jha},\n  title        = {CountTorrent: ubiquitous access to query aggregates in dynamic and\n                  mobile sensor networks},\n  booktitle    = {Proceedings of the 5th International Conference on Embedded Networked\n                  Sensor Systems, SenSys 2007, Sydney, NSW, Australia, November 6-9,\n                  2007},\n  pages        = {43--57},\n  publisher    = {{ACM}},\n  year         = {2007},\n  url          = {https://doi.org/10.1145/1322263.1322269},\n  doi          = {10.1145/1322263.1322269},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/sensys/KamraMR07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n PBS: a unified priority-based scheduler.\n \n \n \n \n\n\n \n Feng, H.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In Golubchik, L.; Ammar, M. H.; and Harchol-Balter, M., editor(s), Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2007, San Diego, California, USA, June 12-16, 2007, pages 203–214, 2007. ACM\n \n\n\n\n
\n\n\n\n \n \n \"PBS:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigmetrics/FengMR07,\n  author       = {Hanhua Feng and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  editor       = {Leana Golubchik and\n                  Mostafa H. Ammar and\n                  Mor Harchol{-}Balter},\n  title        = {{PBS:} a unified priority-based scheduler},\n  booktitle    = {Proceedings of the 2007 {ACM} {SIGMETRICS} International Conference\n                  on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2007,\n                  San Diego, California, USA, June 12-16, 2007},\n  pages        = {203--214},\n  publisher    = {{ACM}},\n  year         = {2007},\n  url          = {https://doi.org/10.1145/1254882.1254906},\n  doi          = {10.1145/1254882.1254906},\n  timestamp    = {Fri, 30 Jul 2021 16:13:32 +0200},\n  biburl       = {https://dblp.org/rec/conf/sigmetrics/FengMR07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Theoretical bounds on control-plane self-monitoring in routing protocols.\n \n \n \n \n\n\n \n Rajendran, R. K.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In Golubchik, L.; Ammar, M. H.; and Harchol-Balter, M., editor(s), Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2007, San Diego, California, USA, June 12-16, 2007, pages 325–336, 2007. ACM\n \n\n\n\n
\n\n\n\n \n \n \"TheoreticalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigmetrics/RajendranMR07,\n  author       = {Raj Kumar Rajendran and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  editor       = {Leana Golubchik and\n                  Mostafa H. Ammar and\n                  Mor Harchol{-}Balter},\n  title        = {Theoretical bounds on control-plane self-monitoring in routing protocols},\n  booktitle    = {Proceedings of the 2007 {ACM} {SIGMETRICS} International Conference\n                  on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2007,\n                  San Diego, California, USA, June 12-16, 2007},\n  pages        = {325--336},\n  publisher    = {{ACM}},\n  year         = {2007},\n  url          = {https://doi.org/10.1145/1254882.1254921},\n  doi          = {10.1145/1254882.1254921},\n  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sigmetrics/RajendranMR07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Distributed Channel Assignment in Multi-Radio 802.11 Mesh Networks.\n \n \n \n \n\n\n \n Ko, B.; Misra, V.; Padhye, J.; and Rubenstein, D.\n\n\n \n\n\n\n In IEEE Wireless Communications and Networking Conference, WCNC 2007, Hong Kong, China, 11-15 March, 2007, pages 3978–3983, 2007. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"DistributedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/wcnc/KoMPR07,\n  author       = {Bong{-}Jun Ko and\n                  Vishal Misra and\n                  Jitendra Padhye and\n                  Dan Rubenstein},\n  title        = {Distributed Channel Assignment in Multi-Radio 802.11 Mesh Networks},\n  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2007,\n                  Hong Kong, China, 11-15 March, 2007},\n  pages        = {3978--3983},\n  publisher    = {{IEEE}},\n  year         = {2007},\n  url          = {https://doi.org/10.1109/WCNC.2007.727},\n  doi          = {10.1109/WCNC.2007.727},\n  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},\n  biburl       = {https://dblp.org/rec/conf/wcnc/KoMPR07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2006\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Optimizing the quality of scalable video streams on P2P networks.\n \n \n \n \n\n\n \n Rajendran, R. K.; and Rubenstein, D.\n\n\n \n\n\n\n Comput. Networks, 50(15): 2641–2658. 2006.\n \n\n\n\n
\n\n\n\n \n \n \"OptimizingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/cn/RajendranR06,\n  author       = {Raj Kumar Rajendran and\n                  Dan Rubenstein},\n  title        = {Optimizing the quality of scalable video streams on {P2P} networks},\n  journal      = {Comput. Networks},\n  volume       = {50},\n  number       = {15},\n  pages        = {2641--2658},\n  year         = {2006},\n  url          = {https://doi.org/10.1016/j.comnet.2005.10.001},\n  doi          = {10.1016/J.COMNET.2005.10.001},\n  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/cn/RajendranR06.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n P2P Computing Systems.\n \n \n \n \n\n\n \n Lui, J. C. S.; Rubenstein, D.; and Misra, V.\n\n\n \n\n\n\n Perform. Evaluation, 63(3): 147–148. 2006.\n \n\n\n\n
\n\n\n\n \n \n \"P2PPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/pe/LuiRM06,\n  author       = {John C. S. Lui and\n                  Dan Rubenstein and\n                  Vishal Misra},\n  title        = {{P2P} Computing Systems},\n  journal      = {Perform. Evaluation},\n  volume       = {63},\n  number       = {3},\n  pages        = {147--148},\n  year         = {2006},\n  url          = {https://doi.org/10.1016/j.peva.2005.01.006},\n  doi          = {10.1016/J.PEVA.2005.01.006},\n  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/pe/LuiRM06.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Understanding the behavior of TCP for real-time CBR workloads.\n \n \n \n \n\n\n \n Baset, S.; Brosh, E.; Misra, V.; Rubenstein, D.; and Schulzrinne, H.\n\n\n \n\n\n\n In Diot, C.; and Ammar, M. H., editor(s), Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2006, Lisboa, Portugal, December 4-7, 2006, pages 57, 2006. ACM\n \n\n\n\n
\n\n\n\n \n \n \"UnderstandingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/conext/BasetBMRS06,\n  author       = {Salman Baset and\n                  Eli Brosh and\n                  Vishal Misra and\n                  Dan Rubenstein and\n                  Henning Schulzrinne},\n  editor       = {Christophe Diot and\n                  Mostafa H. Ammar},\n  title        = {Understanding the behavior of {TCP} for real-time {CBR} workloads},\n  booktitle    = {Proceedings of the 2006 {ACM} Conference on Emerging Network Experiment\n                  and Technology, CoNEXT 2006, Lisboa, Portugal, December 4-7, 2006},\n  pages        = {57},\n  publisher    = {{ACM}},\n  year         = {2006},\n  url          = {https://doi.org/10.1145/1368436.1368502},\n  doi          = {10.1145/1368436.1368502},\n  timestamp    = {Thu, 19 Feb 2026 15:52:49 +0100},\n  biburl       = {https://dblp.org/rec/conf/conext/BasetBMRS06.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Modeling and Analysis of Generalized Slotted-Aloha MAC Protocols in Cooperative, Competitive and Adversarial Environments.\n \n \n \n \n\n\n \n Ma, R. T. B.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 4-7 July 2006, Lisboa, Portugal, pages 62, 2006. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"ModelingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdcs/MaMR06,\n  author       = {Richard T. B. Ma and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Modeling and Analysis of Generalized Slotted-Aloha {MAC} Protocols\n                  in Cooperative, Competitive and Adversarial Environments},\n  booktitle    = {26th {IEEE} International Conference on Distributed Computing Systems\n                  {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal},\n  pages        = {62},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2006},\n  url          = {https://doi.org/10.1109/ICDCS.2006.56},\n  doi          = {10.1109/ICDCS.2006.56},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icdcs/MaMR06.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A General Model and Analysis of Physical Layer Capture in 802.11 Networks.\n \n \n \n \n\n\n \n Chang, H.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In INFOCOM 2006. 25th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain, 2006. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/infocom/ChangMR06,\n  author       = {Hoon Chang and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {A General Model and Analysis of Physical Layer Capture in 802.11 Networks},\n  booktitle    = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications,\n                  Joint Conference of the {IEEE} Computer and Communications Societies,\n                  23-29 April 2006, Barcelona, Catalunya, Spain},\n  publisher    = {{IEEE}},\n  year         = {2006},\n  url          = {https://doi.org/10.1109/INFOCOM.2006.218},\n  doi          = {10.1109/INFOCOM.2006.218},\n  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},\n  biburl       = {https://dblp.org/rec/conf/infocom/ChangMR06.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Impact of Load Sharing on Provisioning Services with Consistency Requirements.\n \n \n \n \n\n\n \n Villela, D. A. M.; Misra, V.; Rubenstein, D.; and Sahu, S.\n\n\n \n\n\n\n In INFOCOM 2006. 25th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain, 2006. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"ImpactPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/infocom/VillelaMRS06,\n  author       = {Daniel A. M. Villela and\n                  Vishal Misra and\n                  Dan Rubenstein and\n                  Sambit Sahu},\n  title        = {Impact of Load Sharing on Provisioning Services with Consistency Requirements},\n  booktitle    = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications,\n                  Joint Conference of the {IEEE} Computer and Communications Societies,\n                  23-29 April 2006, Barcelona, Catalunya, Spain},\n  publisher    = {{IEEE}},\n  year         = {2006},\n  url          = {https://doi.org/10.1109/INFOCOM.2006.159},\n  doi          = {10.1109/INFOCOM.2006.159},\n  timestamp    = {Thu, 25 Jan 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/infocom/VillelaMRS06.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Growth codes: maximizing sensor network data persistence.\n \n \n \n \n\n\n \n Kamra, A.; Misra, V.; Feldman, J.; and Rubenstein, D.\n\n\n \n\n\n\n In Rizzo, L.; Anderson, T. E.; and McKeown, N., editor(s), Proceedings of the ACM SIGCOMM 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, September 11-15, 2006, pages 255–266, 2006. ACM\n \n\n\n\n
\n\n\n\n \n \n \"GrowthPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigcomm/KamraMFR06,\n  author       = {Abhinav Kamra and\n                  Vishal Misra and\n                  Jon Feldman and\n                  Dan Rubenstein},\n  editor       = {Luigi Rizzo and\n                  Thomas E. Anderson and\n                  Nick McKeown},\n  title        = {Growth codes: maximizing sensor network data persistence},\n  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2006 Conference on Applications,\n                  Technologies, Architectures, and Protocols for Computer Communications,\n                  Pisa, Italy, September 11-15, 2006},\n  pages        = {255--266},\n  publisher    = {{ACM}},\n  year         = {2006},\n  url          = {https://doi.org/10.1145/1159913.1159943},\n  doi          = {10.1145/1159913.1159943},\n  timestamp    = {Wed, 21 Jul 2021 16:09:54 +0200},\n  biburl       = {https://dblp.org/rec/conf/sigcomm/KamraMFR06.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Fluid modeling of pollution proliferation in P2P networks.\n \n \n \n \n\n\n \n Kumar, R.; Yao, D. D.; Bagchi, A.; Ross, K. W.; and Rubenstein, D.\n\n\n \n\n\n\n In Marie, R. A.; Key, P. B.; and Smirni, E., editor(s), Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS/Performance 2006, Saint Malo, France, June 26-30, 2006, pages 335–346, 2006. ACM\n \n\n\n\n
\n\n\n\n \n \n \"FluidPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigmetrics/KumarYBRR06,\n  author       = {Rakesh Kumar and\n                  David D. Yao and\n                  Amitabha Bagchi and\n                  Keith W. Ross and\n                  Dan Rubenstein},\n  editor       = {Raymond A. Marie and\n                  Peter B. Key and\n                  Evgenia Smirni},\n  title        = {Fluid modeling of pollution proliferation in {P2P} networks},\n  booktitle    = {Proceedings of the Joint International Conference on Measurement and\n                  Modeling of Computer Systems, SIGMETRICS/Performance 2006, Saint Malo,\n                  France, June 26-30, 2006},\n  pages        = {335--346},\n  publisher    = {{ACM}},\n  year         = {2006},\n  url          = {https://doi.org/10.1145/1140277.1140316},\n  doi          = {10.1145/1140277.1140316},\n  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sigmetrics/KumarYBRR06.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2005\n \n \n (12)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n WebSOS: an overlay-based system for protecting web servers from denial of service attacks.\n \n \n \n \n\n\n \n Stavrou, A.; Cook, D. L.; Morein, W. G.; Keromytis, A. D.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n Comput. Networks, 48(5): 781–807. 2005.\n \n\n\n\n
\n\n\n\n \n \n \"WebSOS:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/cn/StavrouCMKMR05,\n  author       = {Angelos Stavrou and\n                  Debra L. Cook and\n                  William G. Morein and\n                  Angelos D. Keromytis and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {WebSOS: an overlay-based system for protecting web servers from denial\n                  of service attacks},\n  journal      = {Comput. Networks},\n  volume       = {48},\n  number       = {5},\n  pages        = {781--807},\n  year         = {2005},\n  url          = {https://doi.org/10.1016/j.comnet.2005.01.005},\n  doi          = {10.1016/J.COMNET.2005.01.005},\n  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/cn/StavrouCMKMR05.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Optimal state-free, size-aware dispatching for heterogeneous \\emphM/\\emphG/-type systems.\n \n \n \n \n\n\n \n Feng, H.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n Perform. Evaluation, 62(1-4): 475–492. 2005.\n \n\n\n\n
\n\n\n\n \n \n \"OptimalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/pe/FengMR05,\n  author       = {Hanhua Feng and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Optimal state-free, size-aware dispatching for heterogeneous \\emph{M}/\\emph{G}/-type\n                  systems},\n  journal      = {Perform. Evaluation},\n  volume       = {62},\n  number       = {1-4},\n  pages        = {475--492},\n  year         = {2005},\n  url          = {https://doi.org/10.1016/j.peva.2005.07.031},\n  doi          = {10.1016/J.PEVA.2005.07.031},\n  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/pe/FengMR05.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Data persistence in sensor networks: towards optimal encoding for data recovery in partial network failures.\n \n \n \n \n\n\n \n Kamra, A.; Feldman, J.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n SIGMETRICS Perform. Evaluation Rev., 33(2): 24–26. 2005.\n \n\n\n\n
\n\n\n\n \n \n \"DataPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sigmetrics/KamraFMR05,\n  author       = {Abhinav Kamra and\n                  Jon Feldman and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Data persistence in sensor networks: towards optimal encoding for\n                  data recovery in partial network failures},\n  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},\n  volume       = {33},\n  number       = {2},\n  pages        = {24--26},\n  year         = {2005},\n  url          = {https://doi.org/10.1145/1101892.1101901},\n  doi          = {10.1145/1101892.1101901},\n  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sigmetrics/KamraFMR05.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cooperative and non-cooperative models for slotted-aloha type MAC protocols.\n \n \n \n \n\n\n \n Ma, R. T. B.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n SIGMETRICS Perform. Evaluation Rev., 33(2): 30–32. 2005.\n \n\n\n\n
\n\n\n\n \n \n \"CooperativePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sigmetrics/MaMR05,\n  author       = {Richard T. B. Ma and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Cooperative and non-cooperative models for slotted-aloha type {MAC}\n                  protocols},\n  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},\n  volume       = {33},\n  number       = {2},\n  pages        = {30--32},\n  year         = {2005},\n  url          = {https://doi.org/10.1145/1101892.1101903},\n  doi          = {10.1145/1101892.1101903},\n  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sigmetrics/MaMR05.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Pricing multicasting in more flexible network models.\n \n \n \n \n\n\n \n Adler, M.; and Rubenstein, D.\n\n\n \n\n\n\n ACM Trans. Algorithms, 1(1): 48–73. 2005.\n \n\n\n\n
\n\n\n\n \n \n \"PricingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/talg/AdlerR05,\n  author       = {Micah Adler and\n                  Dan Rubenstein},\n  title        = {Pricing multicasting in more flexible network models},\n  journal      = {{ACM} Trans. Algorithms},\n  volume       = {1},\n  number       = {1},\n  pages        = {48--73},\n  year         = {2005},\n  url          = {https://doi.org/10.1145/1077464.1077469},\n  doi          = {10.1145/1077464.1077469},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/talg/AdlerR05.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Distributed self-stabilizing placement of replicated resources in emerging networks.\n \n \n \n \n\n\n \n Ko, B.; and Rubenstein, D.\n\n\n \n\n\n\n IEEE/ACM Trans. Netw., 13(3): 476–487. 2005.\n \n\n\n\n
\n\n\n\n \n \n \"DistributedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ton/KoR05,\n  author       = {Bong{-}Jun Ko and\n                  Dan Rubenstein},\n  title        = {Distributed self-stabilizing placement of replicated resources in\n                  emerging networks},\n  journal      = {{IEEE/ACM} Trans. Netw.},\n  volume       = {13},\n  number       = {3},\n  pages        = {476--487},\n  year         = {2005},\n  url          = {https://doi.org/10.1109/TNET.2005.850196},\n  doi          = {10.1109/TNET.2005.850196},\n  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ton/KoR05.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Can unstructured P2P protocols survive flash crowds?.\n \n \n \n \n\n\n \n Rubenstein, D.; and Sahu, S.\n\n\n \n\n\n\n IEEE/ACM Trans. Netw., 13(3): 501–512. 2005.\n \n\n\n\n
\n\n\n\n \n \n \"CanPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ton/RubensteinS05,\n  author       = {Dan Rubenstein and\n                  Sambit Sahu},\n  title        = {Can unstructured {P2P} protocols survive flash crowds?},\n  journal      = {{IEEE/ACM} Trans. Netw.},\n  volume       = {13},\n  number       = {3},\n  pages        = {501--512},\n  year         = {2005},\n  url          = {https://doi.org/10.1109/TNET.2005.845530},\n  doi          = {10.1109/TNET.2005.845530},\n  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ton/RubensteinS05.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Performance Analysis of Server Sharing Collectives for Content Distribution.\n \n \n \n \n\n\n \n Villela, D. A. M.; and Rubenstein, D.\n\n\n \n\n\n\n IEEE Trans. Parallel Distributed Syst., 16(12): 1178–1189. 2005.\n \n\n\n\n
\n\n\n\n \n \n \"PerformancePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tpds/VillelaR05,\n  author       = {Daniel A. M. Villela and\n                  Dan Rubenstein},\n  title        = {Performance Analysis of Server Sharing Collectives for Content Distribution},\n  journal      = {{IEEE} Trans. Parallel Distributed Syst.},\n  volume       = {16},\n  number       = {12},\n  pages        = {1178--1189},\n  year         = {2005},\n  url          = {https://doi.org/10.1109/TPDS.2005.152},\n  doi          = {10.1109/TPDS.2005.152},\n  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tpds/VillelaR05.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Optimal peer selection for P2P downloading and streaming.\n \n \n \n \n\n\n \n Adler, M.; Kumar, R.; Ross, K. W.; Rubenstein, D.; Suel, T.; and Yao, D. D.\n\n\n \n\n\n\n In INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pages 1538–1549, 2005. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"OptimalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/infocom/AdlerKRRSY05,\n  author       = {Micah Adler and\n                  Rakesh Kumar and\n                  Keith W. Ross and\n                  Dan Rubenstein and\n                  Torsten Suel and\n                  David D. Yao},\n  title        = {Optimal peer selection for {P2P} downloading and streaming},\n  booktitle    = {{INFOCOM} 2005. 24th Annual Joint Conference of the {IEEE} Computer\n                  and Communications Societies, 13-17 March 2005, Miami, FL, {USA}},\n  pages        = {1538--1549},\n  publisher    = {{IEEE}},\n  year         = {2005},\n  url          = {https://doi.org/10.1109/INFCOM.2005.1498437},\n  doi          = {10.1109/INFCOM.2005.1498437},\n  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/infocom/AdlerKRRSY05.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Distributed algorithms for secure multipath routing.\n \n \n \n \n\n\n \n Lee, P. P. C.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pages 1952–1963, 2005. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"DistributedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/infocom/LeeMR05,\n  author       = {Patrick P. C. Lee and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {Distributed algorithms for secure multipath routing},\n  booktitle    = {{INFOCOM} 2005. 24th Annual Joint Conference of the {IEEE} Computer\n                  and Communications Societies, 13-17 March 2005, Miami, FL, {USA}},\n  pages        = {1952--1963},\n  publisher    = {{IEEE}},\n  year         = {2005},\n  url          = {https://doi.org/10.1109/INFCOM.2005.1498473},\n  doi          = {10.1109/INFCOM.2005.1498473},\n  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/infocom/LeeMR05.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n MOVE: An End-to-End Solution to Network Denial of Service.\n \n \n \n \n\n\n \n Stavrou, A.; Keromytis, A. D.; Nieh, J.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In Proceedings of the Network and Distributed System Security Symposium, NDSS 2005, San Diego, California, USA, 2005. The Internet Society\n \n\n\n\n
\n\n\n\n \n \n \"MOVE:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ndss/StavrouKNMR05,\n  author       = {Angelos Stavrou and\n                  Angelos D. Keromytis and\n                  Jason Nieh and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {{MOVE:} An End-to-End Solution to Network Denial of Service},\n  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,\n                  {NDSS} 2005, San Diego, California, {USA}},\n  publisher    = {The Internet Society},\n  year         = {2005},\n  url          = {https://www.ndss-symposium.org/ndss2005/move-end-end-solution-network-denial-service/},\n  timestamp    = {Mon, 01 Feb 2021 08:42:12 +0100},\n  biburl       = {https://dblp.org/rec/conf/ndss/StavrouKNMR05.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Brief announcement: strong detection of misconfigurations.\n \n \n \n \n\n\n \n Rajendran, R. K.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In Aguilera, M. K.; and Aspnes, J., editor(s), Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, PODC 2005, Las Vegas, NV, USA, July 17-20, 2005, pages 40, 2005. ACM\n \n\n\n\n
\n\n\n\n \n \n \"BriefPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/podc/RajendranMR05,\n  author       = {Raj Kumar Rajendran and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  editor       = {Marcos Kawazoe Aguilera and\n                  James Aspnes},\n  title        = {Brief announcement: strong detection of misconfigurations},\n  booktitle    = {Proceedings of the Twenty-Fourth Annual {ACM} Symposium on Principles\n                  of Distributed Computing, {PODC} 2005, Las Vegas, NV, USA, July 17-20,\n                  2005},\n  pages        = {40},\n  publisher    = {{ACM}},\n  year         = {2005},\n  url          = {https://doi.org/10.1145/1073814.1073821},\n  doi          = {10.1145/1073814.1073821},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/podc/RajendranMR05.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2004\n \n \n (12)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Improving reliable multicast using active parity encoding services.\n \n \n \n \n\n\n \n Rubenstein, D.; Kasera, S. K.; Towsley, D. F.; and Kurose, J. F.\n\n\n \n\n\n\n Comput. Networks, 44(1): 63–78. 2004.\n \n\n\n\n
\n\n\n\n \n \n \"ImprovingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/cn/RubensteinKTK04,\n  author       = {Dan Rubenstein and\n                  Sneha Kumar Kasera and\n                  Donald F. Towsley and\n                  James F. Kurose},\n  title        = {Improving reliable multicast using active parity encoding services},\n  journal      = {Comput. Networks},\n  volume       = {44},\n  number       = {1},\n  pages        = {63--78},\n  year         = {2004},\n  url          = {https://doi.org/10.1016/S1389-1286(03)00323-2},\n  doi          = {10.1016/S1389-1286(03)00323-2},\n  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/cn/RubensteinKTK04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A lightweight, robust P2P system to handle flash crowds.\n \n \n \n \n\n\n \n Stavrou, A.; Rubenstein, D.; and Sahu, S.\n\n\n \n\n\n\n IEEE J. Sel. Areas Commun., 22(1): 6–17. 2004.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jsac/StavrouRS04,\n  author       = {Angelos Stavrou and\n                  Dan Rubenstein and\n                  Sambit Sahu},\n  title        = {A lightweight, robust {P2P} system to handle flash crowds},\n  journal      = {{IEEE} J. Sel. Areas Commun.},\n  volume       = {22},\n  number       = {1},\n  pages        = {6--17},\n  year         = {2004},\n  url          = {https://doi.org/10.1109/JSAC.2003.818778},\n  doi          = {10.1109/JSAC.2003.818778},\n  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jsac/StavrouRS04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SOS: an architecture for mitigating DDoS attacks.\n \n \n \n \n\n\n \n Keromytis, A. D.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n IEEE J. Sel. Areas Commun., 22(1): 176–188. 2004.\n \n\n\n\n
\n\n\n\n \n \n \"SOS:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jsac/KeromytisMR04,\n  author       = {Angelos D. Keromytis and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {{SOS:} an architecture for mitigating DDoS attacks},\n  journal      = {{IEEE} J. Sel. Areas Commun.},\n  volume       = {22},\n  number       = {1},\n  pages        = {176--188},\n  year         = {2004},\n  url          = {https://doi.org/10.1109/JSAC.2003.818807},\n  doi          = {10.1109/JSAC.2003.818807},\n  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jsac/KeromytisMR04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Flood search under the California Split rule.\n \n \n \n \n\n\n \n Baryshnikov, Y. M.; Jr., E. G. C.; Jelenkovic, P. R.; Momcilovic, P.; and Rubenstein, D.\n\n\n \n\n\n\n Oper. Res. Lett., 32(3): 199–206. 2004.\n \n\n\n\n
\n\n\n\n \n \n \"FloodPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/orl/BaryshnikovCJMR04,\n  author       = {Yuliy M. Baryshnikov and\n                  Edward G. Coffman Jr. and\n                  Predrag R. Jelenkovic and\n                  Petar Momcilovic and\n                  Dan Rubenstein},\n  title        = {Flood search under the California Split rule},\n  journal      = {Oper. Res. Lett.},\n  volume       = {32},\n  number       = {3},\n  pages        = {199--206},\n  year         = {2004},\n  url          = {https://doi.org/10.1016/j.orl.2003.08.007},\n  doi          = {10.1016/J.ORL.2003.08.007},\n  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/orl/BaryshnikovCJMR04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Two optimal peer selection problems.\n \n \n \n \n\n\n \n Adler, M.; Kumar, R.; Ross, K. W.; Rubenstein, D.; Turner, D. A.; and Yao, D. D.\n\n\n \n\n\n\n SIGMETRICS Perform. Evaluation Rev., 32(2): 28–30. 2004.\n \n\n\n\n
\n\n\n\n \n \n \"TwoPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sigmetrics/AdlerKRRTY04,\n  author       = {Micah Adler and\n                  Rakesh Kumar and\n                  Keith W. Ross and\n                  Dan Rubenstein and\n                  David A. Turner and\n                  David D. Yao},\n  title        = {Two optimal peer selection problems},\n  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},\n  volume       = {32},\n  number       = {2},\n  pages        = {28--30},\n  year         = {2004},\n  url          = {https://doi.org/10.1145/1035334.1035346},\n  doi          = {10.1145/1035334.1035346},\n  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sigmetrics/AdlerKRRTY04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Content distribution for seamless transmission.\n \n \n \n \n\n\n \n Jr., E. G. C.; Constantinides, A.; Rubenstein, D.; Shepherd, F. B.; and Stavrou, A.\n\n\n \n\n\n\n SIGMETRICS Perform. Evaluation Rev., 32(2): 31–32. 2004.\n \n\n\n\n
\n\n\n\n \n \n \"ContentPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sigmetrics/CoffmanCRSS04,\n  author       = {Edward G. Coffman Jr. and\n                  Andreas Constantinides and\n                  Dan Rubenstein and\n                  F. Bruce Shepherd and\n                  Angelos Stavrou},\n  title        = {Content distribution for seamless transmission},\n  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},\n  volume       = {32},\n  number       = {2},\n  pages        = {31--32},\n  year         = {2004},\n  url          = {https://doi.org/10.1145/1035334.1035347},\n  doi          = {10.1145/1035334.1035347},\n  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sigmetrics/CoffmanCRSS04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Pay-per-Use DoS Protection Mechanism for the Web.\n \n \n \n \n\n\n \n Stavrou, A.; Ioannidis, J.; Keromytis, A. D.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In Jakobsson, M.; Yung, M.; and Zhou, J., editor(s), Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, volume 3089, of Lecture Notes in Computer Science, pages 120–134, 2004. Springer\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/acns/StavrouIKMR04,\n  author       = {Angelos Stavrou and\n                  John Ioannidis and\n                  Angelos D. Keromytis and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  editor       = {Markus Jakobsson and\n                  Moti Yung and\n                  Jianying Zhou},\n  title        = {A Pay-per-Use DoS Protection Mechanism for the Web},\n  booktitle    = {Applied Cryptography and Network Security, Second International Conference,\n                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {3089},\n  pages        = {120--134},\n  publisher    = {Springer},\n  year         = {2004},\n  url          = {https://doi.org/10.1007/978-3-540-24852-1\\_9},\n  doi          = {10.1007/978-3-540-24852-1\\_9},\n  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},\n  biburl       = {https://dblp.org/rec/conf/acns/StavrouIKMR04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Optimizing the quality of scalable video streams on P2P networks.\n \n \n \n \n\n\n \n Rajendran, R. K.; and Rubenstein, D.\n\n\n \n\n\n\n In Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November - 3 December 2004, pages 953–959, 2004. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"OptimizingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/globecom/RajendranR04,\n  author       = {Raj Kumar Rajendran and\n                  Dan Rubenstein},\n  title        = {Optimizing the quality of scalable video streams on {P2P} networks},\n  booktitle    = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM}\n                  '04, Dallas, Texas, USA, 29 November - 3 December 2004},\n  pages        = {953--959},\n  publisher    = {{IEEE}},\n  year         = {2004},\n  url          = {https://doi.org/10.1109/GLOCOM.2004.1378101},\n  doi          = {10.1109/GLOCOM.2004.1378101},\n  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},\n  biburl       = {https://dblp.org/rec/conf/globecom/RajendranR04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On the Robustness of Soft State Protocols.\n \n \n \n \n\n\n \n Lui, J. C. S.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In 12th IEEE International Conference on Network Protocols (ICNP 2004), 5-8 October 2004, Berlin, Germany, pages 50–60, 2004. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icnp/LuiMR04,\n  author       = {John C. S. Lui and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {On the Robustness of Soft State Protocols},\n  booktitle    = {12th {IEEE} International Conference on Network Protocols {(ICNP}\n                  2004), 5-8 October 2004, Berlin, Germany},\n  pages        = {50--60},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2004},\n  url          = {https://doi.org/10.1109/ICNP.2004.1348084},\n  doi          = {10.1109/ICNP.2004.1348084},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icnp/LuiMR04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Provisioning servers in the application tier for e-commerce systems.\n \n \n \n \n\n\n \n Villela, D. A. M.; Pradhan, P.; and Rubenstein, D.\n\n\n \n\n\n\n In Quality of Service - IWQoS 2004, 12th International Workshop, Montreal, Canada, June 7-9, 2004, Proceedings, pages 57–66, 2004. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"ProvisioningPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iwqos/VillelaPR04,\n  author       = {Daniel A. M. Villela and\n                  Prashant Pradhan and\n                  Dan Rubenstein},\n  title        = {Provisioning servers in the application tier for e-commerce systems},\n  booktitle    = {Quality of Service - IWQoS 2004, 12th International Workshop, Montreal,\n                  Canada, June 7-9, 2004, Proceedings},\n  pages        = {57--66},\n  publisher    = {{IEEE}},\n  year         = {2004},\n  url          = {https://doi.org/10.1109/IWQOS.2004.1309357},\n  doi          = {10.1109/IWQOS.2004.1309357},\n  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},\n  biburl       = {https://dblp.org/rec/conf/iwqos/VillelaPR04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Distributed server replication in large scale networks.\n \n \n \n \n\n\n \n Ko, B.; and Rubenstein, D.\n\n\n \n\n\n\n In Padmanabhan, V. N.; and Sreenan, C. J., editor(s), Network and Operating System Support for Digital Audio and Video, 14th International Workshop, NOSSDAV 2004, Cork, Ireland, June 16-18, 2004, Proceedings, pages 127–132, 2004. ACM\n \n\n\n\n
\n\n\n\n \n \n \"DistributedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/nossdav/KoR04,\n  author       = {Bong{-}Jun Ko and\n                  Dan Rubenstein},\n  editor       = {Venkata N. Padmanabhan and\n                  Cormac J. Sreenan},\n  title        = {Distributed server replication in large scale networks},\n  booktitle    = {Network and Operating System Support for Digital Audio and Video,\n                  14th International Workshop, {NOSSDAV} 2004, Cork, Ireland, June 16-18,\n                  2004, Proceedings},\n  pages        = {127--132},\n  publisher    = {{ACM}},\n  year         = {2004},\n  url          = {https://doi.org/10.1145/1005847.1005875},\n  doi          = {10.1145/1005847.1005875},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/nossdav/KoR04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Optimizing the quality of scalable video streams on P2P networks.\n \n \n \n \n\n\n \n Rajendran, R. K.; and Rubenstein, D.\n\n\n \n\n\n\n In Jr., E. G. C.; Liu, Z.; and Merchant, A., editor(s), Proceedings of the International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS 2004, June 10-14, 2004, New York, NY, USA, pages 396–397, 2004. ACM\n \n\n\n\n
\n\n\n\n \n \n \"OptimizingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigmetrics/RajendranR04,\n  author       = {Raj Kumar Rajendran and\n                  Dan Rubenstein},\n  editor       = {Edward G. Coffman Jr. and\n                  Zhen Liu and\n                  Arif Merchant},\n  title        = {Optimizing the quality of scalable video streams on {P2P} networks},\n  booktitle    = {Proceedings of the International Conference on Measurements and Modeling\n                  of Computer Systems, {SIGMETRICS} 2004, June 10-14, 2004, New York,\n                  NY, {USA}},\n  pages        = {396--397},\n  publisher    = {{ACM}},\n  year         = {2004},\n  url          = {https://doi.org/10.1145/1005686.1005735},\n  doi          = {10.1145/1005686.1005735},\n  timestamp    = {Fri, 30 Jul 2021 16:13:32 +0200},\n  biburl       = {https://dblp.org/rec/conf/sigmetrics/RajendranR04.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2003\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Using graphic turing tests to counter automated DDoS attacks against web servers.\n \n \n \n \n\n\n \n Morein, W. G.; Stavrou, A.; Cook, D. L.; Keromytis, A. D.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In Jajodia, S.; Atluri, V.; and Jaeger, T., editor(s), Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pages 8–19, 2003. ACM\n \n\n\n\n
\n\n\n\n \n \n \"UsingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccs/MoreinSCKMR03,\n  author       = {William G. Morein and\n                  Angelos Stavrou and\n                  Debra L. Cook and\n                  Angelos D. Keromytis and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  editor       = {Sushil Jajodia and\n                  Vijayalakshmi Atluri and\n                  Trent Jaeger},\n  title        = {Using graphic turing tests to counter automated DDoS attacks against\n                  web servers},\n  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications\n                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},\n  pages        = {8--19},\n  publisher    = {{ACM}},\n  year         = {2003},\n  url          = {https://doi.org/10.1145/948109.948114},\n  doi          = {10.1145/948109.948114},\n  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/ccs/MoreinSCKMR03.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A holistic approach to service survivability.\n \n \n \n \n\n\n \n Keromytis, A. D.; Parekh, J. J.; Gross, P.; Kaiser, G. E.; Misra, V.; Nieh, J.; Rubenstein, D.; and Stolfo, S. J.\n\n\n \n\n\n\n In Liu, P.; and Pal, P. P., editor(s), Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, in Association with 10th ACM Conference on Computer and Communications Security, SSRS@CCS 2003, Fairfax, VA, USA, October 31, 2003, pages 11–22, 2003. ACM\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccs/KeromytisPGKMNR03,\n  author       = {Angelos D. Keromytis and\n                  Janak J. Parekh and\n                  Philip Gross and\n                  Gail E. Kaiser and\n                  Vishal Misra and\n                  Jason Nieh and\n                  Dan Rubenstein and\n                  Salvatore J. Stolfo},\n  editor       = {Peng Liu and\n                  Partha P. Pal},\n  title        = {A holistic approach to service survivability},\n  booktitle    = {Proceedings of the 2003 {ACM} Workshop on Survivable and Self-Regenerative\n                  Systems, in Association with 10th {ACM} Conference on Computer and\n                  Communications Security, SSRS@CCS 2003, Fairfax, VA, USA, October\n                  31, 2003},\n  pages        = {11--22},\n  publisher    = {{ACM}},\n  year         = {2003},\n  url          = {https://doi.org/10.1145/1036921.1036923},\n  doi          = {10.1145/1036921.1036923},\n  timestamp    = {Fri, 20 Jan 2023 16:46:09 +0100},\n  biburl       = {https://dblp.org/rec/conf/ccs/KeromytisPGKMNR03.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Distributed, Self-Stabilizing Placement of Replicated Resources in Emerging Networks.\n \n \n \n \n\n\n \n Ko, B.; and Rubenstein, D.\n\n\n \n\n\n\n In 11th IEEE International Conference on Network Protocols (ICNP 2003), 4-7 November 2003, Atlanta, GA, USA, pages 6–15, 2003. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Distributed,Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icnp/Ko03,\n  author       = {Bong{-}Jun Ko and\n                  Dan Rubenstein},\n  title        = {Distributed, Self-Stabilizing Placement of Replicated Resources in\n                  Emerging Networks},\n  booktitle    = {11th {IEEE} International Conference on Network Protocols {(ICNP}\n                  2003), 4-7 November 2003, Atlanta, GA, {USA}},\n  pages        = {6--15},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2003},\n  url          = {https://doi.org/10.1109/ICNP.2003.1249752},\n  doi          = {10.1109/ICNP.2003.1249752},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icnp/Ko03.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n WebSOS: protecting web servers from DDoS attacks.\n \n \n \n \n\n\n \n Cook, D. L.; Morein, W. G.; Keromytis, A. D.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In 11th IEEE International Conference on Networks, ICON 2003, September 28 - October 1, 2003 Sydney, NSW, Australia, pages 461–466, 2003. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"WebSOS:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icon/CookMKMR03,\n  author       = {Debra L. Cook and\n                  William G. Morein and\n                  Angelos D. Keromytis and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  title        = {WebSOS: protecting web servers from DDoS attacks},\n  booktitle    = {11th {IEEE} International Conference on Networks, {ICON} 2003, September\n                  28 - October 1, 2003 Sydney, NSW, Australia},\n  pages        = {461--466},\n  publisher    = {{IEEE}},\n  year         = {2003},\n  url          = {https://doi.org/10.1109/ICON.2003.1266234},\n  doi          = {10.1109/ICON.2003.1266234},\n  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},\n  biburl       = {https://dblp.org/rec/conf/icon/CookMKMR03.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Performance Analysis of Server Sharing Collectives for Content Distribution.\n \n \n \n \n\n\n \n Villela, D. A. M.; and Rubenstein, D.\n\n\n \n\n\n\n In Jeffay, K.; Stoica, I.; and Wehrle, K., editor(s), Quality of Service - IWQoS 2003, 11th International Workshop, Berkeley, CA, USA, June 2-4, 2003, Proceedings, volume 2707, of Lecture Notes in Computer Science, pages 41–58, 2003. Springer\n \n\n\n\n
\n\n\n\n \n \n \"PerformancePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iwqos/VillelaR03,\n  author       = {Daniel A. M. Villela and\n                  Dan Rubenstein},\n  editor       = {Kevin Jeffay and\n                  Ion Stoica and\n                  Klaus Wehrle},\n  title        = {Performance Analysis of Server Sharing Collectives for Content Distribution},\n  booktitle    = {Quality of Service - IWQoS 2003, 11th International Workshop, Berkeley,\n                  CA, USA, June 2-4, 2003, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {2707},\n  pages        = {41--58},\n  publisher    = {Springer},\n  year         = {2003},\n  url          = {https://doi.org/10.1007/3-540-44884-5\\_3},\n  doi          = {10.1007/3-540-44884-5\\_3},\n  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},\n  biburl       = {https://dblp.org/rec/conf/iwqos/VillelaR03.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2002\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A lightweight, robust P2P system to handle flash crowds.\n \n \n \n \n\n\n \n Stavrou, A.; Rubenstein, D.; and Sahu, S.\n\n\n \n\n\n\n Comput. Commun. Rev., 32(3): 17. 2002.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ccr/StavrouRS02,\n  author       = {Angelos Stavrou and\n                  Dan Rubenstein and\n                  Sambit Sahu},\n  title        = {A lightweight, robust {P2P} system to handle flash crowds},\n  journal      = {Comput. Commun. Rev.},\n  volume       = {32},\n  number       = {3},\n  pages        = {17},\n  year         = {2002},\n  url          = {https://doi.org/10.1145/571697.571706},\n  doi          = {10.1145/571697.571706},\n  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ccr/StavrouRS02.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Flood search under the California split strategy.\n \n \n \n \n\n\n \n Baryshnikov, Y. M.; Jr., E. G. C.; Jelenkovic, P. R.; Momcilovic, P.; and Rubenstein, D.\n\n\n \n\n\n\n SIGMETRICS Perform. Evaluation Rev., 30(3): 15–16. 2002.\n \n\n\n\n
\n\n\n\n \n \n \"FloodPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sigmetrics/BaryshnikovCJMR02,\n  author       = {Yuliy M. Baryshnikov and\n                  Edward G. Coffman Jr. and\n                  Predrag R. Jelenkovic and\n                  Petar Momcilovic and\n                  Dan Rubenstein},\n  title        = {Flood search under the California split strategy},\n  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},\n  volume       = {30},\n  number       = {3},\n  pages        = {15--16},\n  year         = {2002},\n  url          = {https://doi.org/10.1145/605521.605528},\n  doi          = {10.1145/605521.605528},\n  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sigmetrics/BaryshnikovCJMR02.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The impact of multicast layering on netowrk fairness.\n \n \n \n \n\n\n \n Rubenstein, D.; Kurose, J. F.; and Towsley, D. F.\n\n\n \n\n\n\n IEEE/ACM Trans. Netw., 10(2): 169–182. 2002.\n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ton/RubensteinKT02,\n  author       = {Dan Rubenstein and\n                  James F. Kurose and\n                  Donald F. Towsley},\n  title        = {The impact of multicast layering on netowrk fairness},\n  journal      = {{IEEE/ACM} Trans. Netw.},\n  volume       = {10},\n  number       = {2},\n  pages        = {169--182},\n  year         = {2002},\n  url          = {https://doi.org/10.1109/90.993299},\n  doi          = {10.1109/90.993299},\n  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ton/RubensteinKT02.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Detecting shared congestion of flows via end-to-end measurement.\n \n \n \n \n\n\n \n Rubenstein, D.; Kurose, J. F.; and Towsley, D. F.\n\n\n \n\n\n\n IEEE/ACM Trans. Netw., 10(3): 381–395. 2002.\n \n\n\n\n
\n\n\n\n \n \n \"DetectingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ton/RubensteinKT02a,\n  author       = {Dan Rubenstein and\n                  James F. Kurose and\n                  Donald F. Towsley},\n  title        = {Detecting shared congestion of flows via end-to-end measurement},\n  journal      = {{IEEE/ACM} Trans. Netw.},\n  volume       = {10},\n  number       = {3},\n  pages        = {381--395},\n  year         = {2002},\n  url          = {https://doi.org/10.1109/TNET.2002.1012369},\n  doi          = {10.1109/TNET.2002.1012369},\n  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ton/RubensteinKT02a.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Lightweight, Robust P2P System to Handle Flash Crowds.\n \n \n \n \n\n\n \n Stavrou, A.; Rubenstein, D.; and Sahu, S.\n\n\n \n\n\n\n In 10th IEEE International Conference on Network Protocols (ICNP 2002), 12-15 November 2002, Paris, France, Proceedings, pages 226–235, 2002. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icnp/StavrouRS02,\n  author       = {Angelos Stavrou and\n                  Dan Rubenstein and\n                  Sambit Sahu},\n  title        = {A Lightweight, Robust {P2P} System to Handle Flash Crowds},\n  booktitle    = {10th {IEEE} International Conference on Network Protocols {(ICNP}\n                  2002), 12-15 November 2002, Paris, France, Proceedings},\n  pages        = {226--235},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2002},\n  url          = {https://doi.org/10.1109/ICNP.2002.1181410},\n  doi          = {10.1109/ICNP.2002.1181410},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icnp/StavrouRS02.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SOS: secure overlay services.\n \n \n \n \n\n\n \n Keromytis, A. D.; Misra, V.; and Rubenstein, D.\n\n\n \n\n\n\n In Mathis, M.; Steenkiste, P.; Balakrishnan, H.; and Paxson, V., editor(s), Proceedings of the ACM SIGCOMM 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 19-23, 2002, Pittsburgh, PA, USA, pages 61–72, 2002. ACM\n \n\n\n\n
\n\n\n\n \n \n \"SOS:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigcomm/KeromytisMR02,\n  author       = {Angelos D. Keromytis and\n                  Vishal Misra and\n                  Dan Rubenstein},\n  editor       = {Matthew Mathis and\n                  Peter Steenkiste and\n                  Hari Balakrishnan and\n                  Vern Paxson},\n  title        = {{SOS:} secure overlay services},\n  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2002 Conference on Applications,\n                  Technologies, Architectures, and Protocols for Computer Communication,\n                  August 19-23, 2002, Pittsburgh, PA, {USA}},\n  pages        = {61--72},\n  publisher    = {{ACM}},\n  year         = {2002},\n  url          = {https://doi.org/10.1145/633025.633032},\n  doi          = {10.1145/633025.633032},\n  timestamp    = {Wed, 21 Jul 2021 16:09:54 +0200},\n  biburl       = {https://dblp.org/rec/conf/sigcomm/KeromytisMR02.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Pricing multicasting in more practical network models.\n \n \n \n \n\n\n \n Adler, M.; and Rubenstein, D.\n\n\n \n\n\n\n In Eppstein, D., editor(s), Proceedings of the Thirteenth Annual ACM-SIAM Symposium on Discrete Algorithms, January 6-8, 2002, San Francisco, CA, USA, pages 981–990, 2002. ACM/SIAM\n \n\n\n\n
\n\n\n\n \n \n \"PricingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/soda/AdlerR02,\n  author       = {Micah Adler and\n                  Dan Rubenstein},\n  editor       = {David Eppstein},\n  title        = {Pricing multicasting in more practical network models},\n  booktitle    = {Proceedings of the Thirteenth Annual {ACM-SIAM} Symposium on Discrete\n                  Algorithms, January 6-8, 2002, San Francisco, CA, {USA}},\n  pages        = {981--990},\n  publisher    = {{ACM/SIAM}},\n  year         = {2002},\n  url          = {http://dl.acm.org/citation.cfm?id=545381.545508},\n  timestamp    = {Fri, 07 Dec 2012 17:02:08 +0100},\n  biburl       = {https://dblp.org/rec/conf/soda/AdlerR02.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2001\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A study of proactive hybrid FEC/ARQ and scalable feedback techniques for reliable, real-time multicast.\n \n \n \n \n\n\n \n Rubenstein, D.; Kurose, J. F.; and Towsley, D. F.\n\n\n \n\n\n\n Comput. Commun., 24(5-6): 563–574. 2001.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/comcom/RubensteinKT01,\n  author       = {Dan Rubenstein and\n                  James F. Kurose and\n                  Donald F. Towsley},\n  title        = {A study of proactive hybrid {FEC/ARQ} and scalable feedback techniques\n                  for reliable, real-time multicast},\n  journal      = {Comput. Commun.},\n  volume       = {24},\n  number       = {5-6},\n  pages        = {563--574},\n  year         = {2001},\n  url          = {https://doi.org/10.1016/S0140-3664(00)00303-0},\n  doi          = {10.1016/S0140-3664(00)00303-0},\n  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/comcom/RubensteinKT01.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2000\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Detecting shared congestion of flows via end-to-end measurement.\n \n \n \n \n\n\n \n Rubenstein, D.; Kurose, J. F.; and Towsley, D. F.\n\n\n \n\n\n\n In Brandwajn, A.; Kurose, J.; and Nain, P., editor(s), Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, Santa Clara, CA, USA, June 18-21, 2000, pages 145–155, 2000. ACM\n \n\n\n\n
\n\n\n\n \n \n \"DetectingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigmetrics/RubensteinKT00,\n  author       = {Dan Rubenstein and\n                  James F. Kurose and\n                  Donald F. Towsley},\n  editor       = {Alexandre Brandwajn and\n                  Jim Kurose and\n                  Philippe Nain},\n  title        = {Detecting shared congestion of flows via end-to-end measurement},\n  booktitle    = {Proceedings of the 2000 {ACM} {SIGMETRICS} international conference\n                  on Measurement and modeling of computer systems, Santa Clara, CA,\n                  USA, June 18-21, 2000},\n  pages        = {145--155},\n  publisher    = {{ACM}},\n  year         = {2000},\n  url          = {https://doi.org/10.1145/339331.339410},\n  doi          = {10.1145/339331.339410},\n  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sigmetrics/RubensteinKT00.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1999\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Improving Reliable Multicast Using Active Parity Encoding Services (APES).\n \n \n \n \n\n\n \n Rubenstein, D.; Kasera, S. K.; Towsley, D. F.; and Kurose, J. F.\n\n\n \n\n\n\n In Proceedings IEEE INFOCOM '99, The Conference on Computer Communications, Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, The Future Is Now, New York, NY, USA, March 21-25, 1999, pages 1248–1255, 1999. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"ImprovingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/infocom/RubensteinKTK99,\n  author       = {Dan Rubenstein and\n                  Sneha Kumar Kasera and\n                  Donald F. Towsley and\n                  James F. Kurose},\n  title        = {Improving Reliable Multicast Using Active Parity Encoding Services\n                  {(APES)}},\n  booktitle    = {Proceedings {IEEE} {INFOCOM} '99, The Conference on Computer Communications,\n                  Eighteenth Annual Joint Conference of the {IEEE} Computer and Communications\n                  Societies, The Future Is Now, New York, NY, USA, March 21-25, 1999},\n  pages        = {1248--1255},\n  publisher    = {{IEEE} Computer Society},\n  year         = {1999},\n  url          = {https://doi.org/10.1109/INFCOM.1999.752142},\n  doi          = {10.1109/INFCOM.1999.752142},\n  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/infocom/RubensteinKTK99.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The Impact of Multicast Layering on Network Fairness.\n \n \n \n \n\n\n \n Rubenstein, D.; Kurose, J. F.; and Towsley, D. F.\n\n\n \n\n\n\n In Chapin, L.; Sterbenz, J. P. G.; Parulkar, G. M.; and Turner, J. S., editor(s), Proceedings of the ACM SIGCOMM 1999 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 1999, Cambridge, Massachusetts, USA, pages 27–38, 1999. ACM\n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigcomm/RubensteinKT99,\n  author       = {Dan Rubenstein and\n                  James F. Kurose and\n                  Donald F. Towsley},\n  editor       = {Lyman Chapin and\n                  James P. G. Sterbenz and\n                  Guru M. Parulkar and\n                  Jonathan S. Turner},\n  title        = {The Impact of Multicast Layering on Network Fairness},\n  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 1999 Conference on Applications,\n                  Technologies, Architectures, and Protocols for Computer Communication,\n                  August 30 - September 3, 1999, Cambridge, Massachusetts, {USA}},\n  pages        = {27--38},\n  publisher    = {{ACM}},\n  year         = {1999},\n  url          = {https://doi.org/10.1145/316188.316203},\n  doi          = {10.1145/316188.316203},\n  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sigcomm/RubensteinKT99.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1998\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Optimistic Parallel Simulation of Reliable Multicast Protocols.\n \n \n \n \n\n\n \n Rubenstein, D.; Kurose, J. F.; and Towsley, D. F.\n\n\n \n\n\n\n SIGMETRICS Perform. Evaluation Rev., 25(4): 22–29. 1998.\n \n\n\n\n
\n\n\n\n \n \n \"OptimisticPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sigmetrics/RubensteinKT98,\n  author       = {Dan Rubenstein and\n                  James F. Kurose and\n                  Donald F. Towsley},\n  title        = {Optimistic Parallel Simulation of Reliable Multicast Protocols},\n  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},\n  volume       = {25},\n  number       = {4},\n  pages        = {22--29},\n  year         = {1998},\n  url          = {https://doi.org/10.1145/274084.274087},\n  doi          = {10.1145/274084.274087},\n  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sigmetrics/RubensteinKT98.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1994\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Catalan Numbers Revisited.\n \n \n \n\n\n \n Rubenstein, D.\n\n\n \n\n\n\n J. Comb. Theory A, 68(2): 486–490. 1994.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jct/Rubenstein94,\n  author       = {Dan Rubenstein},\n  title        = {Catalan Numbers Revisited},\n  journal      = {J. Comb. Theory {A}},\n  volume       = {68},\n  number       = {2},\n  pages        = {486--490},\n  year         = {1994},\n  timestamp    = {Fri, 07 Jun 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jct/Rubenstein94.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);