 | 2009 |
19 |  | Nishanth Sastry,
Karen R. Sollins,
Jon Crowcroft:
Delivery Properties of Human Social Networks.
INFOCOM 2009: 2586-2590 |
| 2008 |
18 |  | Robert Beverly,
Karen R. Sollins:
Exploiting Transport-Level Characteristics of Spam.
CEAS 2008 |
17 |  | Jelena Mirkovic,
Karen R. Sollins,
John Wroclawski:
Managing the Health of Security Experiments.
CSET 2008 |
16 |  | Robert Beverly,
Karen R. Sollins:
An Internet Protocol Address Clustering Algorithm.
SysML 2008 |
| 2007 |
15 |  | Bei Yu,
Guoliang Li,
Karen R. Sollins,
Anthony K. H. Tung:
Effective keyword-based selection of relational databases.
SIGMOD Conference 2007: 139-150 |
| 2006 |
14 |  | Robert Beverly,
Karen R. Sollins,
Arthur Berger:
SVM learning of IP address structure for latency prediction.
MineNet 2006: 299-304 |
| 2005 |
13 |  | David D. Clark,
John Wroclawski,
Karen R. Sollins,
Robert Braden:
Tussle in cyberspace: defining tomorrow's internet.
IEEE/ACM Trans. Netw. 13(3): 462-475 (2005) |
| 2004 |
12 |  | Ji Li,
Karen R. Sollins:
Exploiting Autonomous System Information in Structured Peer-to-Peer Networks.
ICCCN 2004: 403-408 |
11 |  | Ji Li,
Karen R. Sollins,
Dah-Yoh Lim:
Implementing aggregation and broadcast over Distributed Hash Tables.
Computer Communication Review 35(1): 81-92 (2004) |
| 2003 |
10 |  | David D. Clark,
Karen R. Sollins,
John Wroclawski,
Theodore Faber:
Addressing reality: an architectural response to real-world demands on the evolving Internet.
Computer Communication Review 33(4): 247-257 (2003) |
9 |  | Karen R. Sollins:
Designing for scale and differentiation.
Computer Communication Review 33(4): 267-276 (2003) |
8 |  | Karen R. Sollins:
Network research: exploration of dimensions and scope.
Computer Communication Review 33(5): 67-74 (2003) |
| 2002 |
7 |  | David D. Clark,
John Wroclawski,
Karen R. Sollins,
Robert Braden:
Tussle in cyberspace: defining tomorrow's internet.
SIGCOMM 2002: 347-356 |
6 |  | Ji Li,
Haiyang Liu,
Karen R. Sollins:
AFBV: a scalable packet classification algorithm.
Computer Communication Review 32(3): 24 (2002) |
| 1996 |
5 |  | Karen R. Sollins:
Supporting Longevity in an Information Infrastructure Architecture.
ACM SIGOPS European Workshop 1996: 297-303 |
| 1992 |
4 |  | John A. Bull,
Li Gong,
Karen R. Sollins:
Towards Security in an Open Systems Federation.
ESORICS 1992: 3-20 |
| 1988 |
3 |  | Karen R. Sollins:
Submission to the European SIGOPS workshop, 1988.
ACM SIGOPS European Workshop 1988 |
| 1981 |
2 |  | Karen R. Sollins:
Copying Structured Objects in a Distributed System.
Berkeley Workshop 1981: 284-297 |
1 |  | Karen R. Sollins:
Copying Structured Objects in a Distributed System.
Computer Networks 5: 351-359 (1981) |