[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 17 Dec 2024Bibliometrics
Abstract

No abstract available.

RFC Downloads

Cited By

  1. Alramli O, Hanapi Z, Othman M, Ahmad I and Samian N (2024). RTTV-TCP, Ad Hoc Networks, 164:C, Online publication date: 1-Nov-2024.
  2. Yuan D, Zhang W, Qiu Y, Huang H, Yang M, Chen P, Xiao K, Yan H, He Y and Zhang Y (2024). Context-Aware Cross-Layer Congestion Control for Large-Scale Live Streaming, IEEE/ACM Transactions on Networking, 32:5, (3743-3759), Online publication date: 1-Oct-2024.
  3. ACM
    Li H, Liu Y, Cheng Y, Ray S, Du K and Jiang J Eloquent: A More Robust Transmission Scheme for LLM Token Streaming Proceedings of the 2024 SIGCOMM Workshop on Networks for AI Computing, (34-40)
  4. ACM
    Rautenstrauch J and Stock B Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, (843-855)
  5. ACM
    Ollando R, Shin S and Briand L (2024). Learning Failure-Inducing Models for Testing Software-Defined Networks, ACM Transactions on Software Engineering and Methodology, 33:5, (1-25), Online publication date: 30-Jun-2024.
  6. ACM
    Yang Y, Zhang Y, Wan T, Wang C, Duan H, Chen J and Li Y Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (265-276)
  7. ACM
    Lee J, Kim M, Song W, Kim Y and Kim D Rescuing QUIC Flows From Countermeasures Against UDP Flooding Attacks Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, (1072-1080)
  8. Aykurt K, Zerwas J, Blenk A and Kellerer W (2023). When TCP Meets Reconfigurations: A Comprehensive Measurement Study, IEEE Transactions on Network and Service Management, 21:2, (1372-1386), Online publication date: 1-Apr-2024.
  9. Wang S, Xie T, Chen M, Tu G, Li C, Lei X, Chou P, Hsieh F, Hu Y, Xiao L and Peng C (2024). Dissecting Operational Cellular IoT Service Security: Attacks and Defenses, IEEE/ACM Transactions on Networking, 32:2, (1229-1244), Online publication date: 1-Apr-2024.
  10. Khorov E, Krasilov A, Susloparov M and Kong L (2023). Boosting TCP & QUIC Performance in mmWave, Terahertz, and Lightwave Wireless Networks: A Survey, IEEE Communications Surveys & Tutorials, 25:4, (2862-2891), Online publication date: 1-Oct-2023.
  11. Zhou J, Qiu X, Li Z, Li Q, Tyson G, Duan J, Wang Y, Pan H and Wu Q (2023). A Machine Learning-Based Framework for Dynamic Selection of Congestion Control Algorithms, IEEE/ACM Transactions on Networking, 31:4, (1566-1581), Online publication date: 1-Aug-2023.
  12. ACM
    Boo J, Chung Y, Baek E, Na S, Kim C and Kim J F4T: A Fast and Flexible FPGA-based Full-stack TCP Acceleration Framework Proceedings of the 50th Annual International Symposium on Computer Architecture, (1-13)
  13. ACM
    Li T, Chandramouli B, Burckhardt S and Madden S (2023). DARQ Matter Binds Everything: Performant and Composable Cloud Programming via Resilient Steps, Proceedings of the ACM on Management of Data, 1:2, (1-27), Online publication date: 13-Jun-2023.
  14. Kong D, Shen Y, Chen X, Cheng Q, Liu H, Zhang D, Liu X, Chen S and Wu C (2023). Combination Attacks and Defenses on SDN Topology Discovery, IEEE/ACM Transactions on Networking, 31:2, (904-919), Online publication date: 1-Apr-2023.
  15. Michel F, Cohen A, Malak D, De Coninck Q, Médard M and Bonaventure O (2023). FlEC: Enhancing QUIC With Application-Tailored Reliability Mechanisms, IEEE/ACM Transactions on Networking, 31:2, (606-619), Online publication date: 1-Apr-2023.
  16. Majidi A, Gao X, Zhu S, Jahanbakhsh N, Zheng J and Chen G (2022). MiFi: Bounded Update to Optimize Network Performance in Software-Defined Data Centers, IEEE/ACM Transactions on Networking, 31:1, (322-335), Online publication date: 1-Feb-2023.
  17. He K, Kim D and Asghar M (2023). Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey, IEEE Communications Surveys & Tutorials, 25:1, (538-566), Online publication date: 1-Jan-2023.
  18. ACM
    Nast M, Raddatz H, Rother B, Golatowski F and Timmermann D A Survey and Comparison of Publish/Subscribe Protocols for the Industrial Internet of Things (IIoT) Proceedings of the 12th International Conference on the Internet of Things, (193-200)
  19. ACM
    Piraux M, Barbette T, Rybowski N, Navarre L, Alfroy T, Pelsser C, Michel F and Bonaventure O (2022). The multiple roles that IPv6 addresses can play in today's internet, ACM SIGCOMM Computer Communication Review, 52:3, (10-18), Online publication date: 30-Jul-2022.
  20. Feng X, Li Q, Sun K, Fu C and Xu K (2021). Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID, IEEE/ACM Transactions on Networking, 30:1, (409-422), Online publication date: 1-Feb-2022.
  21. Nguyen M, Debroy S and Fu A (2022). Moving Target Defense-Based Denial-of-Service Mitigation in Cloud Environments, Security and Communication Networks, 2022, Online publication date: 1-Jan-2022.
  22. ACM
    Stephens B, Grassi D, Almasi H, Ji T, Vamanan B and Akella A TCP is Harmful to In-Network Computing Proceedings of the 20th ACM Workshop on Hot Topics in Networks, (61-68)
  23. Zhang M, Li G, Xu L, Bai J, Xu M, Gu G and Wu J (2021). Control Plane Reflection Attacks and Defenses in Software-Defined Networks, IEEE/ACM Transactions on Networking, 29:2, (623-636), Online publication date: 1-Apr-2021.
  24. ACM
    Rochet F, Assogba E and Bonaventure O TCPLS Proceedings of the 19th ACM Workshop on Hot Topics in Networks, (45-52)
  25. ACM
    Chistiakov I and Yanovich Y Responsible Self-Funding in Dash Governance System Proceedings of the 2nd International Electronics Communication Conference, (67-72)
  26. ACM
    Shen Y, Liu K, Guo Z, Zhang W, Zhang G, Aggarwal V and Chen M Freeway Proceedings of the 17th ACM International Conference on Computing Frontiers, (225-228)
  27. Wang W, Tian D, Meng W, Jia X, Zhao R and Ma R (2020). MSYM, Computer Networks: The International Journal of Computer and Telecommunications Networking, 168:C, Online publication date: 26-Feb-2020.
  28. Busany N, Maoz S and Yulazari Y Size and accuracy in model inference Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, (887-898)
  29. Bao L, Busany N, Lo D and Maoz S Statistical log differencing Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, (851-862)
  30. Polese M, Chiariotti F, Bonetto E, Rigotto F, Zanella A and Zorzi M (2019). A Survey on Recent Advances in Transport Layer Protocols, IEEE Communications Surveys & Tutorials, 21:4, (3584-3608), Online publication date: 1-Oct-2019.
  31. Al-Saadi R, Armitage G, But J and Branch P (2019). A Survey of Delay-Based and Hybrid TCP Congestion Control Algorithms, IEEE Communications Surveys & Tutorials, 21:4, (3609-3638), Online publication date: 1-Oct-2019.
  32. ACM
    Majidi A, Gao X, Zhu S, Jahanbakhsh N and Chen G Adaptive Routing Reconfigurations to Minimize Flow Cost in SDN-Based Data Center Networks Proceedings of the 48th International Conference on Parallel Processing, (1-10)
  33. Ayala I, Amor M, Fuentes L and Risi M (2019). An Energy Efficiency Study of Web-Based Communication in Android Phones, Scientific Programming, 2019, Online publication date: 1-Jan-2019.
  34. (2018). SciVis Paper Reviewers, IEEE Transactions on Visualization and Computer Graphics, 25:1, (xxvii-xxvii), Online publication date: 1-Jan-2019.
  35. (2018). SciVis International Program Committee, IEEE Transactions on Visualization and Computer Graphics, 25:1, (xxii-xxii), Online publication date: 1-Jan-2019.
  36. (2018). InfoVis Paper Reviewers, IEEE Transactions on Visualization and Computer Graphics, 25:1, (xxv-xxvi), Online publication date: 1-Jan-2019.
  37. (2018). VAST Paper Reviewers, IEEE Transactions on Visualization and Computer Graphics, 25:1, (xxiv-xxiv), Online publication date: 1-Jan-2019.
  38. (2018). InfoVis International Program Committee, IEEE Transactions on Visualization and Computer Graphics, 25:1, (xxi-xxi), Online publication date: 1-Jan-2019.
  39. (2018). VIS Conference Committee, IEEE Transactions on Visualization and Computer Graphics, 25:1, (xix-xix), Online publication date: 1-Jan-2019.
  40. Kumar P, Tripathi M, Nehra A, Conti M and Lal C (2018). SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN, IEEE Transactions on Network and Service Management, 15:4, (1545-1559), Online publication date: 1-Dec-2018.
  41. ACM
    Polese M, Mezzavilla M, Rangan S and Zorzi M Mobility Management for TCP in mmWave Networks Proceedings of the 1st ACM Workshop on Millimeter-Wave Networks and Sensing Systems 2017, (11-16)
  42. ACM
    Hanford N, Tierney B and Ghosal D Optimizing data transfer nodes using packet pacing Proceedings of the Second Workshop on Innovating the Network for Data-Intensive Science, (1-8)
  43. Cohen H and Maoz S Have we seen enough traces? Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, (93-103)
  44. Smolyar I, Ben-Yehuda M and Tsafrir D Securing self-virtualizing ethernet devices Proceedings of the 24th USENIX Conference on Security Symposium, (335-350)
  45. ACM
    Alt L, Beverly R and Dainotti A Uncovering network tarpits with degreaser Proceedings of the 30th Annual Computer Security Applications Conference, (156-165)
  46. ACM
    Dart E, Rotman L, Tierney B, Hester M and Zurawski J The Science DMZ Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, (1-10)
  47. Walkinshaw N, Bogdanov K, Derrick J and Paris J Increasing functional coverage by inductive testing Proceedings of the 22nd IFIP WG 6.1 international conference on Testing software and systems, (126-141)
  48. Ciuffoletti A (2010). Secure token passing at application level, Future Generation Computer Systems, 26:7, (1026-1031), Online publication date: 1-Jul-2010.
  49. Walkinshaw N and Derrick J Incrementally discovering testable specifications from program executions Proceedings of the 8th international conference on Formal methods for components and objects, (272-289)
  50. ACM
    Zhao H, Chau C and Bellovin S ROFL Proceedings of the 2008 New Security Paradigms Workshop, (23-31)
  51. Caini C, Firrincieli R, Lacamera D, de Cola T, Marchese M, Marcondes C, Sanadidi M and Gerla M (2009). Analysis of TCP live experiments on a real GEO satellite testbed, Performance Evaluation, 66:6, (287-300), Online publication date: 1-Jun-2009.
  52. Baars E and Verbrugge R Adjusting a Knowledge-Based Algorithm for Multi-agent Communication for CPS Languages, Methodologies and Development Tools for Multi-Agent Systems, (89-105)
  53. Billington J and Saboo S An investigation of credit-based flow control protocols Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, (1-10)
  54. Billington J and Han B (2007). Formalising TCP's Data Transfer Service Language: A Symbolic Automaton and its Properties, Fundamenta Informaticae, 80:1-3, (49-74), Online publication date: 1-Mar-2008.
  55. Phanishayee A, Krevat E, Vasudevan V, Andersen D, Ganger G, Gibson G and Seshan S Measurement and analysis of TCP throughput collapse in cluster-based storage systems Proceedings of the 6th USENIX Conference on File and Storage Technologies, (1-14)
  56. Denis A (2007). Meta-communications in component-based communication frameworks for grids, Cluster Computing, 10:3, (253-263), Online publication date: 1-Sep-2007.
  57. ACM
    Alstes A and Lindqvist J (2007). VERKKOKE, ACM SIGCSE Bulletin, 39:3, (91-95), Online publication date: 25-Jun-2007.
  58. ACM
    Alstes A and Lindqvist J VERKKOKE Proceedings of the 12th annual SIGCSE conference on Innovation and technology in computer science education, (91-95)
  59. ACM
    Minshall G, Hinden B, Hoffman E, Liaw F, Lyon T and Newman P (2006). Flow labelled IP over ATM, ACM SIGCOMM Computer Communication Review, 36:3, (79-92), Online publication date: 5-Jul-2006.
  60. Luo X and Chang R Novel approaches to end-to-end packet reordering measurement Proceedings of the 5th ACM SIGCOMM conference on Internet measurement, (20-20)
  61. López L, Almansa G, Paquelet S and Fernández A (2005). A mathematical model for the TCP tragedy of the commons, Theoretical Computer Science, 343:1-2, (4-26), Online publication date: 10-Oct-2005.
  62. Karthik S, Senthilkumar V, Chidambararajan B and Srivatsa S (2004). Performance of TCP over satellite networks under severe cross-traffic using GA, International Journal of Mobile Communications, 2:4, (382-394), Online publication date: 1-Dec-2004.
  63. Grinnemo K, Garcia J and Brunstrom A (2004). Taxonomy and survey of retransmission-based partially reliable transport protocols, Computer Communications, 27:15, (1441-1452), Online publication date: 1-Sep-2004.
  64. Gevros P and Crowcroft J (2004). Distributed resource management with heterogeneous linear controls, Computer Networks: The International Journal of Computer and Telecommunications Networking, 45:6, (835-858), Online publication date: 21-Aug-2004.
  65. Solis I and Obraczka K (2004). FLIP, Mobile Networks and Applications, 9:4, (347-361), Online publication date: 1-Aug-2004.
  66. ACM
    Patel P, Whitaker A, Wetherall D, Lepreau J and Stack T (2003). Upgrading transport protocols using untrusted mobile code, ACM SIGOPS Operating Systems Review, 37:5, (1-14), Online publication date: 1-Dec-2003.
  67. ACM
    Patel P, Whitaker A, Wetherall D, Lepreau J and Stack T Upgrading transport protocols using untrusted mobile code Proceedings of the nineteenth ACM symposium on Operating systems principles, (1-14)
  68. ACM
    Carter C, Yi S, Ratanchandani P and Kravets R Manycast Proceedings of the 9th annual international conference on Mobile computing and networking, (273-285)
  69. Mogul J TCP offload is a dumb idea whose time has come Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9, (5-5)
  70. ACM
    Dunkels A Full TCP/IP for 8-bit architectures Proceedings of the 1st international conference on Mobile systems, applications and services, (85-98)
  71. Jha S and Hassan M (2002). Building agents for rule-based intrusion detection system, Computer Communications, 25:15, (1366-1373), Online publication date: 1-Sep-2002.
  72. ACM
    Garg R, Kamra A and Khurana V (2002). A game-theoretic approach towards congestion control in communication networks, ACM SIGCOMM Computer Communication Review, 32:3, (47-61), Online publication date: 1-Jul-2002.
  73. ACM
    Andersen D, Balakrishnan H, Kaashoek F and Morris R (2001). Resilient overlay networks, ACM SIGOPS Operating Systems Review, 35:5, (131-145), Online publication date: 1-Dec-2001.
  74. ACM
    Andersen D, Balakrishnan H, Kaashoek F and Morris R Resilient overlay networks Proceedings of the eighteenth ACM symposium on Operating systems principles, (131-145)
  75. ACM
    Kravets R, Carter C and Magalhães L (2001). A cooperative approach to user mobility, ACM SIGCOMM Computer Communication Review, 31:5, (57-69), Online publication date: 1-Oct-2001.
  76. Andersen D, Bansal D, Curtis D, Seshan S and Balakrishnan H System support for bandwidth management and content adaptation in internet applications Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
  77. ACM
    Adjie-Winoto W, Schwartz E, Balakrishnan H and Lilley J (1999). The design and implementation of an intentional naming system, ACM SIGOPS Operating Systems Review, 33:5, (186-201), Online publication date: 12-Dec-1999.
  78. ACM
    Adjie-Winoto W, Schwartz E, Balakrishnan H and Lilley J The design and implementation of an intentional naming system Proceedings of the seventeenth ACM symposium on Operating systems principles, (186-201)
  79. Wolski R (1998). Dynamically forecasting network performance using the Network Weather Service, Cluster Computing, 1:1, (119-132), Online publication date: 1-May-1998.
  80. Patel A and Gaffney K (1997). A technique for multi-network access to multimedia messages, Computer Communications, 20:5, (324-337), Online publication date: 1-Jul-1997.
  81. Bellovin S Probable Plaintext Cryptanalysis of the IP Security Protocols Proceedings of the 1997 Symposium on Network and Distributed System Security
  82. Bellovin S Problem areas for the IP security protocols Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (21-21)
  83. Comer D and Lin J Probing TCP implementations Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1, (17-17)
Contributors
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations