default search action
5. CoNEXT 2010: Philadelphia, PA, USA
- Jaudelice Cavalcante de Oliveira, Maximilian Ott, Timothy G. Griffin, Muriel Médard:
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, CoNEXT 2010, Philadelphia, PA, USA, November 30 - December 03, 2010. ACM 2010, ISBN 978-1-4503-0448-1
Performance analysis
- Katerina J. Argyraki, Petros Maniatis, Ankit Singla:
Verifiable network-performance measurements. 1 - Marios Iliofotou, Brian Gallagher, Tina Eliassi-Rad, Guowu Xie, Michalis Faloutsos:
Profiling-By-Association: a resilient traffic profiling solution for the internet backbone. 2 - Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu:
Spatio-temporal patterns in network events. 3
Network design and analysis
- David L. Applegate, Aaron Archer, Vijay Gopalakrishnan, Seungjoon Lee, K. K. Ramakrishnan:
Optimal content placement for a large-scale VoD system. 4 - He Yan, Lee Breslau, Zihui Ge, Daniel Massey, Dan Pei, Jennifer Yates:
G-RCA: a generic root cause analysis platform for service quality management in large IP networks. 5 - Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. van der Merwe:
Declarative configuration management for complex and dynamic networks. 6
Network management and trouble shooting
- Yu Jin, Nick G. Duffield, Alexandre Gerber, Patrick Haffner, Subhabrata Sen, Zhi-Li Zhang:
NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems. 7 - Romain Fontugne, Pierre Borgnat, Patrice Abry, Kensuke Fukuda:
MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. 8 - Yeon-sup Lim, Hyunchul Kim, Jiwoong Jeong, Chong-kwon Kim, Ted Taekyoung Kwon, Yanghee Choi:
Internet traffic classification demystified: on the sources of the discriminative power. 9
P2P
- Bin Fan, David G. Andersen, Michael Kaminsky, Konstantina Papagiannaki:
Balancing throughput, robustness, and in-order delivery in P2P VoD. 10 - Rubén Cuevas Rumín, Michal Kryczka, Ángel Cuevas, Sebastian Kaune, Carmen Guerrero, Reza Rejaie:
Is content publishing in BitTorrent altruistic or profit-driven? 11 - Panayotis Antoniadis, Serge Fdida, Timur Friedman, Vishal Misra:
Federation of virtualized infrastructures: sharing the value of diversity. 12
Data centers
- Haitao Wu, Zhenqian Feng, Chuanxiong Guo, Yongguang Zhang:
ICTCP: Incast Congestion Control for TCP in data center networks. 13 - Andrew R. Curtis, Srinivasan Keshav, Alejandro López-Ortiz:
LEGUP: using heterogeneity to reduce the cost of data center network upgrades. 14 - Chuanxiong Guo, Guohan Lu, Helen J. Wang, Shuang Yang, Chao Kong, Peng Sun, Wenfei Wu, Yongguang Zhang:
SecondNet: a data center network virtualization architecture with bandwidth guarantees. 15 - Lucian Popa, Sylvia Ratnasamy, Gianluca Iannaccone, Arvind Krishnamurthy, Ion Stoica:
A cost comparison of datacenter network architectures. 16
Privacy, security, and forensics
- Min Y. Mun, Shuai Hao, Nilesh Mishra, Katie Shilton, Jeff Burke, Deborah Estrin, Mark H. Hansen, Ramesh Govindan:
Personal data vaults: a locus of control for personal data streams. 17 - Vyas Sekar, Ravishankar Krishnaswamy, Anupam Gupta, Michael K. Reiter:
Network-wide deployment of intrusion detection and prevention systems. 18 - Marc Liberatore, Brian Neil Levine, Clay Shields:
Strengthening forensic investigations of child pornography on P2P networks. 19
Internet routing
- Ankit Singla, Brighten Godfrey, Kevin R. Fall, Gianluca Iannaccone, Sylvia Ratnasamy:
Scalable routing on flat names. 20 - Amogh Dhamdhere, Constantine Dovrolis:
The Internet is flat: modeling the transition from a transit hierarchy to a peering mesh. 21 - Vineet Bharti, Pankaj Kankar, Lokesh Setia, Gonca Gürsun, Anukool Lakhina, Mark Crovella:
Inferring invisible traffic. 22
Mobility and replication
- Upendra Shevade, Yi-Chao Chen, Lili Qiu, Yin Zhang, Vinoth Chandar, Mi Kyung Han, Han Hee Song, Yousuk Seung:
Enabling high-bandwidth vehicular content distribution. 23 - George Dean Bissias, Brian Neil Levine, Ramesh K. Sitaraman:
Assessing the vulnerability of replicated network services. 24 - Mike P. Wittie, Veljko Pejovic, Lara B. Deek, Kevin C. Almeroth, Ben Y. Zhao:
Exploiting locality of interest in online social networks. 25
Wireless
- Kyunghan Lee, Injong Rhee, Joohyun Lee, Song Chong, Yung Yi:
Mobile data offloading: how much can WiFi deliver? 26 - Mustafa Y. Arslan, Konstantinos Pelechrinis, Ioannis Broustis, Srikanth V. Krishnamurthy, Sateesh Addepalli, Konstantina Papagiannaki:
Auto-configuration of 802.11n WLANs. 27 - Ki-Young Jang, Konstantinos Psounis, Ramesh Govindan:
Simple yet efficient, transparent airtime allocation for TCP in wireless mesh networks. 28
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.