default search action
Computer Communication Review, Volume 42
Volume 42, Number 1, January 2012
- Partha Kanuparthy, Constantine Dovrolis, Konstantina Papagiannaki, Srinivasan Seshan, Peter Steenkiste:
Can user-level probing detect and diagnose common home-WLAN pathologies. 7-15 - Nadi Sarrar, Steve Uhlig, Anja Feldmann, Rob Sherwood, Xin Huang:
Leveraging Zipf's law for traffic offloading. 16-22 - Thomas Bonald, James W. Roberts:
Internet and the Erlang formula. 23-30 - Alberto Dainotti, Roman Amman, Emile Aben, Kimberly C. Claffy:
Extracting benefit from harm: using malware pollution to analyze the impact of political and geophysical events on the internet. 31-39 - Phillipa Gill, Michael Schapira, Sharon Goldberg:
Modeling on quicksand: dealing with the scarcity of ground truth in interdomain routing data. 40-46 - Francesco Fusco, Xenofontas A. Dimitropoulos, Michail Vlachos, Luca Deri:
pcapIndex: an index for network packet traces with legacy compatibility. 47-53 - Murtaza Motiwala, Amogh Dhamdhere, Nick Feamster, Anukool Lakhina:
Towards a cost model for network traffic. 54-60 - Maxim Podlesny, Carey Williamson:
Improving TCP performance in residential broadband networks: a simple and deployable approach. 61-68
- Yoo Chung:
Distributed denial of service is a scalability problem. 69-71 - Jonathon Duerig, Robert Ricci, Leigh Stoller, Matt Strum, Gary Wong, Charles Carpenter, Zongming Fei, James Griffioen, Hussamuddin Nasir, Jeremy Reed, Xiongqi Wu:
Getting started with GENI: a user tutorial. 72-77 - John W. Byers, Jeffrey C. Mogul, Fadel Adib, Jay Aikat, Danai Chasaki, Ming-Hung Chen, Marshini Chetty, Romain Fontugne, Vijay Gabale, László Gyarmati, Katrina LaCurts, Qi Liao, Marc Mendonca, Trang Cao Minh, S. H. Shah Newaz, Pawan Prakash, Yan Shvartzshnaider, Praveen Yalagandula, Chun-Yu Yang:
Report on the SIGCOMM 2011 conference. 80-96
Volume 42, Number 2, April 2012
- Supasate Choochaisri, Kittipat Apicharttrisorn, Kittiporn Korprasertthaworn, Pongpakdi Taechalertpaisarn, Chalermek Intanagonwiwat:
Desynchronization with an artificial force field for wireless networks. 7-15 - André Zúquete, Carlos Frade:
A new location layer for the TCP/IP protocol stack. 16-27 - Kate Ching-Ju Lin, Yung-Jen Chuang, Dina Katabi:
A light-weight wireless handshake. 28-34 - Cheng Huang, Ivan Batanov, Jin Li:
A practical solution to the client-LDNS mismatch problem. 35-41 - Shane Alcock, Perry Lorier, Richard Nelson:
Libtrace: a packet capture and analysis library. 42-48 - Pamela Zave:
Using lightweight modeling to understand chord. 49-57 - Juan Camilo Cardona Restrepo, Rade Stanojevic:
A history of an internet exchange point. 58-64 - Eric Keller, Michael Schapira, Jennifer Rexford:
Rehoming edge links for better traffic engineering. 65-71 - Craig A. Shue, Andrew J. Kalafut, Mark Allman, Curtis R. Taylor:
On building inexpensive network capabilities. 72-79 - Yingdi Yu, Duane Wessels, Matt Larson, Lixia Zhang:
Authority server selection in DNS caching resolvers. 80-86 - Benoit Donnet, Matthew J. Luckie, Pascal Mérindol, Jean-Jacques Pansiot:
Revealing MPLS tunnels obscured from traceroute. 87-93
- Hamed Haddadi, Richard Mortier, Steven Hand:
Privacy analytics. 94-98 - Martin F. Arlitt:
The top ten similarities between playing hockey and building a better internet. 99-102 - Jon Crowcroft:
The DNS is not a right. oh yes it is. oh no it isn't. oh yes it is... 103-104 - Charles R. Kalmanek:
The essential elements of successful innovation. 105-109 - kc claffy:
Workshop on internet economics (WIE2011) report. 110-114
Volume 42, Number 3, July 2012
- Vinh The Lam, Sivasankar Radhakrishnan, Rong Pan, Amin Vahdat, George Varghese:
Netshare and stochastic netshare: predictable bandwidth allocation for data centers. 5-11 - Yosuke Himura, Yoshiko Yasuda:
Discovering configuration templates of virtualized tenant networks in multi-tenancy datacenters via graph-mining. 13-20 - The collateral damage of internet censorship by DNS injection. 21-27
- kc claffy:
Border gateway protocol (BGP) and traceroute data workshop report. 28-31 - Jon Crowcroft:
Differential piracy. 32-33 - kc claffy:
The 4th workshop on active internet measurements (AIMS-4) report. 34-38 - Rute C. Sofia, Paulo Mendes, Manuel José Damásio, Sara Henriques, Fabio Giglietto, Erica Giambitto, Alessandro Bogliolo:
Moving towards a socially-driven internet architectural design. 39-46 - Dirk Trossen:
Turing, the internet and a theory for architecture: a (fictional?) tale in three parts. 47-53 - Marshini Chetty, Nick Feamster:
Refactoring network infrastructure to improve manageability: a case study of home networking. 54-61 - Cheng Yi, Alexander Afanasyev, Lan Wang, Beichuan Zhang, Lixia Zhang:
Adaptive forwarding in named data networking. 62-67
Volume 42, Number 4, October 2012
- Lars Eggert, Jörg Ott, Venkata N. Padmanabhan, George Varghese:
ACM SIGCOMM 2012 Conference, SIGCOMM '12, Helsinki, Finland - August 13 - 17, 2012. ACM 2012, ISBN 978-1-4503-1419-0 [contents]
- Kok-Kiong Yap, Te-Yuan Huang, Masayoshi Kobayashi, Yiannis Yiakoumis, Nick McKeown, Sachin Katti, Guru M. Parulkar:
Making use of all the networks around us: a case study in android. 455-460 - Ying Zhang, Åke Arvidsson:
Understanding the characteristics of cellular data traffic. 461-466
- Ahmed Khurshid, Wenxuan Zhou, Matthew Caesar, Brighten Godfrey:
Veriflow: verifying network-wide invariants in real time. 467-472 - Brandon Heller, Rob Sherwood, Nick McKeown:
The controller placement problem. 473-478
- Ashish Patro, Shravan K. Rayanchu, Michael Griepentrog, Yadi Ma, Suman Banerjee:
The anatomy of a large mobile massively multiplayer online game. 479-484 - Tan Kiat Wee, Rajesh Krishna Balan:
Adaptive display power management for OLED displays. 485-490
- Giovanna Carofiglio, Massimo Gallo, Luca Muscariello:
Joint hop-by-hop and receiver-driven interest control protocol for content-centric networks. 491-496 - Nikos Fotiou, Giannis F. Marias, George C. Polyzos:
Access control enforcement delegation for information-centric networking architectures. 497-502
- Mikko Pitkänen, Teemu Kärkkäinen, Jörg Ott, Marco Conti, Andrea Passarella, Silvia Giordano, Daniele Puccinelli, Franck Legendre, Sacha Trifunovic, Karin Anna Hummel, Martin May, Nidhi Hegde, Thrasyvoulos Spyropoulos:
SCAMPI: service platform for social aware mobile and pervasive computing. 503-508 - Kyu-Han Kim, Sung-Ju Lee, Paul Congdon:
On cloud-centric network architecture for multi-dimensional mobility. 509-514
- Zachary S. Bischof, John S. Otto, Fabián E. Bustamante:
Up, down and around the stack: ISP characterization from network intensive applications. 515-520 - Chien-Nan (Shannon) Chen, Cing-yu Chu, Su-Ling Yeh, Hao-Hua Chu, Polly Huang:
Measuring the perceptual quality of Skype sources. 521-526
- Gianluca Stringhini, Manuel Egele, Christopher Kruegel, Giovanni Vigna:
Poultry markets: on the underground economy of twitter followers. 527-532 - Naveen Kumar Sharma, Saptarshi Ghosh, Fabrício Benevenuto, Niloy Ganguly, P. Krishna Gummadi:
Inferring who-is-who in the Twitter social network. 533-538
Volume 42, Number 5, October 2012
- Xuetao Wei, Nicholas Valler, B. Aditya Prakash, Iulian Neamtiu, Michalis Faloutsos, Christos Faloutsos:
Competing memes propagation on networks: a case study of composite networks. 5-12 - Sebastian Zander, Lachlan L. H. Andrew, Grenville J. Armitage, Geoff Huston, George Michaelson:
Investigating the IPv6 teredo tunnelling capability and performance of internet clients. 13-20 - Ingmar Poese, Benjamin Poese, Georgios Smaragdakis, Steve Uhlig, Anja Feldmann, Bruce M. Maggs:
Enabling content-aware traffic engineering. 21-28 - Marko Zec, Luigi Rizzo, Miljenko Mikuc:
DXR: towards a billion routing lookups per second in software. 29-36 - Jon Whiteaker, Fabian Schneider, Renata Teixeira, Christophe Diot, Augustin Soule, Fabio Picconi, Martin May:
Expanding home services with advanced gateways. 37-43
- Jeffrey C. Mogul, Lucian Popa:
What we talk about when we talk about cloud network performance. 44-48 - Tanja Zseby, kc claffy:
Workshop report: darkspace and unsolicited traffic analysis (DUST 2012). 49-53 - Tobias Lauinger, Nikolaos Laoutaris, Pablo Rodriguez, Thorsten Strufe, Ernst W. Biersack, Engin Kirda:
Privacy risks in named data networking: what is the cost of performance? 54-57 - Sameer S. Tilak, Philip M. Papadopoulos:
The case for a rigorous approach to automating software operations and management of large-scale sensor networks. 58-61 - Dimitri Papadimitriou, Lluís Fàbrega, Pere Vilà, Davide Careglio, Piet Demeester:
Measurement-based research: methodology, experiments, and tools. 62-68
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.