default search action
Computer Communication Review (ACM SIGCOMM), Volume 35
Volume 35, Number 1, January 2004
- Simon S. Lam:
Back to the future part 4: the internet. 3-12
- Mark Allman, Craig Partridge:
Introduction. 13 - Kensuke Fukuda, Kenjiro Cho, Hiroshi Esaki:
The impact of residential broadband traffic on Japanese ISP backbones. 15-22 - Pekka Savola:
Observations of IPv6 traffic on a 6to4 relay. 23-28 - Mike Afergan, Robert Beverly:
The state of the email address. 29-36 - Martin F. Arlitt, Carey L. Williamson:
An analysis of TCP reset behaviour on the internet. 37-44 - Richard Nelson, Daniel Lawson, Perry Lorier:
Analysis of long duration traces. 45-52 - Beichuan Zhang, Raymond A. Liu, Daniel Massey, Lixia Zhang:
Collecting the internet AS-level topology. 53-61 - Nick Feamster, Jaeyeon Jung, Hari Balakrishnan:
An empirical study of "bogon" route advertisements. 63-70 - Xiaoqiao Meng, Zhiguo Xu, Beichuan Zhang, Geoff Huston, Songwu Lu, Lixia Zhang:
IPv4 address allocation and the BGP routing table evolution. 71-80 - Ji Li, Karen R. Sollins, Dah-Yoh Lim:
Implementing aggregation and broadcast over Distributed Hash Tables. 81-92 - Hui Zhang, Ashish Goel, Ramesh Govindan:
An empirical evaluation of internet latency expansion. 93-97 - Eva González-Parada, José Manuel Cano-García, Antonio Díaz Estrella:
A new methodology for representation of TCP performance in multiconnection environments. 99-110
Volume 35, Number 2, April 2005
- Frank P. Kelly, Thomas Voice:
Stability of end-to-end algorithms for joint routing and rate control. 5-12 - Shengming Jiang:
Granular differentiated queueing services for QoS: structure and cost model. 13-22 - Jörg Wallerich, Holger Dreger, Anja Feldmann, Balachander Krishnamurthy, Walter Willinger:
A methodology for studying persistency aspects of internet flows. 23-36 - Alberto Medina, Mark Allman, Sally Floyd:
Measuring the evolution of transport protocols in the internet. 37-52 - Mark Allman, Ethan Blanton:
Notes on burst mitigation for transport protocols. 53-60 - Marcelo Bagnulo, Alberto García-Martínez, Arturo Azcorra:
Efficient security for IPv6 multihoming. 61-68
- Craig Partridge:
Feature article introduction. 69-70 - Vinton G. Cerf, Robert E. Kahn:
A protocol for packet network intercommunication. 71-82
- Srinivasan Keshav:
Why cell phones will dominate the future internet. 83-86 - Fabrizio Sestini, Thierry Van der Pyl:
Future and emerging technologies: a vision for tomorrow of EU IST research. 87-90 - Adrian Stephens:
802.11 "decrypted". 91-93
Volume 35, Number 3, July 2005
- Simon Schütz, Lars Eggert, Stefan Schmid, Marcus Brunner:
Protocol enhancements for intermittently connected hosts. 5-18 - Antonio Nucci, Ashwin Sridharan, Nina Taft:
The problem of synthetically generating IP traffic matrices: initial recommendations. 19-32 - Pierre François, Clarence Filsfils, John Evans, Olivier Bonaventure:
Achieving sub-second IGP convergence in large IP networks. 35-44 - Ying Xu, Roch Guérin:
On the robustness of router-based denial-of-service (DoS) defense systems. 47-60
- Aruna Seneviratne, Terry Percival:
National ICT Australia (NICTA). 61-64 - Edward D. Lazowska, David A. Patterson:
Computing research: a looming crisis. 65-68 - Marcus Brunner, Lars Eggert, Kevin R. Fall, Jörg Ott, Lars C. Wolf:
Dagstuhl seminar on disruption tolerant networking. 69-72 - Nick McKeown, Damon Wischik:
Making router buffers much smaller. 73-74 - Damon Wischik, Nick McKeown:
Part I: buffer sizes for core routers. 75-78 - Gaurav Raina, Donald F. Towsley, Damon Wischik:
Part II: control theory for buffer sizing. 79-82 - Mihaela Enachescu, Yashar Ganjali, Ashish Goel, Nick McKeown, Tim Roughgarden:
Part III: routers with very small buffers. 83-90 - David D. Clark, Craig Partridge, Robert Braden, Bruce S. Davie, Sally Floyd, Van Jacobson, Dina Katabi, Greg Minshall, K. K. Ramakrishnan, Timothy Roscoe, Ion Stoica, John Wroclawski, Lixia Zhang:
Making the world (of communications) a different place. 91-96
- Anja Feldmann:
Experiences from the SIGCOMM 2005 European shadow PC experiment. 97-102
Volume 35, Number 4, October 2005
- Roch Guérin, Ramesh Govindan, Greg Minshall:
Proceedings of the ACM SIGCOMM 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Philadelphia, Pennsylvania, USA, August 22-26, 2005. ACM 2005, ISBN 1-59593-009-4 [contents]
Volume 35, Number 5, October 2005
- Tim Deegan, Jon Crowcroft, Andrew Warfield:
The main name system: an exercise in centralized computing. 5-14 - Evangelos Vergetis, Roch Guérin, Saswati Sarkar:
Realizing the benefits of user-level channel diversity. 15-28 - Anwar Al Hamra, Pascal Felber:
Design choices for content distribution in P2P networks. 29-40 - Albert G. Greenberg, Gísli Hjálmtýsson, David A. Maltz, Andy Myers, Jennifer Rexford, Geoffrey G. Xie, Hong Yan, Jibin Zhan, Hui Zhang:
A clean slate 4D approach to network control and management. 41-54 - Jun Li, Dejing Dou, Zhen Wu, Shiwoong Kim, Vikash Agarwal:
An internet routing forensics framework for discovering rules of abnormal BGP events. 55-66
- Randy Bush:
Into the future with the internet vendor task force a very curmudgeonly view or testing spaghetti: a wall's point of view. 67-68 - Aaron Falk:
The IETF, the IRTF, and the networking research community. 69-70 - Yuval Shavitt, Eran Shir:
DIMES: let the internet measure itself. 71-74 - John D. DeHart, Fred Kuhns, Jyoti Parwatikar, Jonathan S. Turner, Charlie Wiseman, Ken Wong:
The open network laboratory: a resource for networking research and education. 75-78 - Renata Teixeira, Sharad Agarwal, Jennifer Rexford:
BGP routing changes: merging views from two ISPs. 79-82 - Ernst W. Biersack:
Where is multicast today? 83-84 - Christoph Neumann, Vincent Roca, Rod Walsh:
Large scale content distribution protocols. 85-92 - Matthew Roughan:
Simplifying the synthesis of internet traffic matrices. 93-96 - Colleen Shannon, David Moore, Ken Keys, Marina Fomenkov, Bradley Huffaker, Kimberly C. Claffy:
The internet measurement data catalog. 97-100
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.