callback( { "result":{ "query":":facetid:toc:\"db/conf/sigcomm/sigcomm2013.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"69.63" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"91", "@dc":"91", "@oc":"91", "@id":"43411797", "text":":facetid:toc:db/conf/sigcomm/sigcomm2013.bht" } }, "hits":{ "@total":"91", "@computed":"91", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"4222993", "info":{"authors":{"author":[{"@pid":"51/9975","text":"Fadel Adib"},{"@pid":"k/DinaKatabi","text":"Dina Katabi"}]},"title":"See through walls with WiFi!","venue":"SIGCOMM","pages":"75-86","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/AdibK13","doi":"10.1145/2486001.2486039","ee":"https://doi.org/10.1145/2486001.2486039","url":"https://dblp.org/rec/conf/sigcomm/AdibK13"}, "url":"URL#4222993" }, { "@score":"1", "@id":"4222994", "info":{"authors":{"author":[{"@pid":"37/8397","text":"Mohammad Alizadeh"},{"@pid":"07/5790","text":"Shuang Yang"},{"@pid":"132/8515","text":"Milad Sharif"},{"@pid":"50/1133","text":"Sachin Katti"},{"@pid":"m/NickMcKeown","text":"Nick McKeown"},{"@pid":"48/1750","text":"Balaji Prabhakar"},{"@pid":"34/5593","text":"Scott Shenker"}]},"title":"pFabric: minimal near-optimal datacenter transport.","venue":"SIGCOMM","pages":"435-446","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/AlizadehYSKMPS13","doi":"10.1145/2486001.2486031","ee":"https://doi.org/10.1145/2486001.2486031","url":"https://dblp.org/rec/conf/sigcomm/AlizadehYSKMPS13"}, "url":"URL#4222994" }, { "@score":"1", "@id":"4222995", "info":{"authors":{"author":[{"@pid":"132/8480","text":"Sebastian Angel"},{"@pid":"00/2879","text":"Michael Walfish"}]},"title":"Verifiable auctions for online ad exchanges.","venue":"SIGCOMM","pages":"195-206","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/AngelW13","doi":"10.1145/2486001.2486038","ee":"https://doi.org/10.1145/2486001.2486038","url":"https://dblp.org/rec/conf/sigcomm/AngelW13"}, "url":"URL#4222995" }, { "@score":"1", "@id":"4222998", "info":{"authors":{"author":[{"@pid":"123/3725","text":"Karim Awara"},{"@pid":"45/1350","text":"Hani Jamjoom"},{"@pid":"97/3036","text":"Panos Kalnis"}]},"title":"To 4, 000 compute nodes and beyond: network-aware vertex placement in large-scale graph processing systems.","venue":"SIGCOMM","pages":"501-502","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/AwaraJK13","doi":"10.1145/2486001.2491726","ee":"https://doi.org/10.1145/2486001.2491726","url":"https://dblp.org/rec/conf/sigcomm/AwaraJK13"}, "url":"URL#4222998" }, { "@score":"1", "@id":"4223000", "info":{"authors":{"author":[{"@pid":"12/8357","text":"Athula Balachandran"},{"@pid":"45/4044","text":"Vyas Sekar"},{"@pid":"a/AdityaAkella","text":"Aditya Akella"},{"@pid":"s/SrinivasanSeshan","text":"Srinivasan Seshan"},{"@pid":"s/IonStoica","text":"Ion Stoica"},{"@pid":"z/HuiZhang1","text":"Hui Zhang 0001"}]},"title":"Developing a predictive model of quality of experience for internet video.","venue":"SIGCOMM","pages":"339-350","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/BalachandranSASSZ13","doi":"10.1145/2486001.2486025","ee":"https://doi.org/10.1145/2486001.2486025","url":"https://dblp.org/rec/conf/sigcomm/BalachandranSASSZ13"}, "url":"URL#4223000" }, { "@score":"1", "@id":"4223005", "info":{"authors":{"author":[{"@pid":"52/10159","text":"Dinesh Bharadia"},{"@pid":"132/8495","text":"Emily McMilin"},{"@pid":"50/1133","text":"Sachin Katti"}]},"title":"Full duplex radios.","venue":"SIGCOMM","pages":"375-386","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/BharadiaMK13","doi":"10.1145/2486001.2486033","ee":"https://doi.org/10.1145/2486001.2486033","url":"https://dblp.org/rec/conf/sigcomm/BharadiaMK13"}, "url":"URL#4223005" }, { "@score":"1", "@id":"4223006", "info":{"authors":{"author":[{"@pid":"130/0434","text":"Kanak Biscuitwala"},{"@pid":"130/0359","text":"Willem Bult"},{"@pid":"130/0417","text":"Mathias Lécuyer"},{"@pid":"66/11189","text":"T. J. Purtell"},{"@pid":"130/0401","text":"Madeline K. B. Ross"},{"@pid":"49/5532","text":"Augustin Chaintreau"},{"@pid":"130/0461","text":"Chris Haseman"},{"@pid":"l/MonicaSLam","text":"Monica S. Lam"},{"@pid":"130/0483","text":"Susan E. McGregor"}]},"title":"Dispatch: secure, resilient mobile reporting.","venue":"SIGCOMM","pages":"459-460","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/BiscuitwalaBLPRCHLM13","doi":"10.1145/2486001.2491697","ee":"https://doi.org/10.1145/2486001.2491697","url":"https://dblp.org/rec/conf/sigcomm/BiscuitwalaBLPRCHLM13"}, "url":"URL#4223006" }, { "@score":"1", "@id":"4223007", "info":{"authors":{"author":[{"@pid":"82/10800","text":"Trisha Biswas"},{"@pid":"132/8487","text":"Asit Chakraborti"},{"@pid":"122/4859","text":"Ravishankar Ravindran"},{"@pid":"14/3612","text":"Xinwen Zhang"},{"@pid":"06/3224-1","text":"Guoqiang Wang 0001"}]},"title":"Contextualized information-centric home network.","venue":"SIGCOMM","pages":"461-462","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/BiswasCRZW13","doi":"10.1145/2486001.2491691","ee":"https://doi.org/10.1145/2486001.2491691","url":"https://dblp.org/rec/conf/sigcomm/BiswasCRZW13"}, "url":"URL#4223007" }, { "@score":"1", "@id":"4223009", "info":{"authors":{"author":[{"@pid":"127/1337","text":"Pat Bosshart"},{"@pid":"49/2422","text":"Glen Gibb"},{"@pid":"77/6653","text":"Hun-Seok Kim"},{"@pid":"v/GeorgeVarghese","text":"George Varghese"},{"@pid":"m/NickMcKeown","text":"Nick McKeown"},{"@pid":"18/1959","text":"Martin Izzard"},{"@pid":"27/1360","text":"Fernando A. Mujica"},{"@pid":"h/MarkHorowitz","text":"Mark Horowitz"}]},"title":"Forwarding metamorphosis: fast programmable match-action processing in hardware for SDN.","venue":"SIGCOMM","pages":"99-110","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/BosshartGKVMIMH13","doi":"10.1145/2486001.2486011","ee":"https://doi.org/10.1145/2486001.2486011","url":"https://dblp.org/rec/conf/sigcomm/BosshartGKVMIMH13"}, "url":"URL#4223009" }, { "@score":"1", "@id":"4223010", "info":{"authors":{"author":[{"@pid":"24/3165","text":"Matt Calder"},{"@pid":"62/675","text":"Rui Miao"},{"@pid":"94/8396","text":"Kyriakos Zarifis"},{"@pid":"66/2080","text":"Ethan Katz-Bassett"},{"@pid":"89/6345","text":"Minlan Yu"},{"@pid":"p/JPadhye","text":"Jitendra Padhye"}]},"title":"Don't drop, detour!","venue":"SIGCOMM","pages":"503-504","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/CalderMZKYP13","doi":"10.1145/2486001.2491718","ee":"https://doi.org/10.1145/2486001.2491718","url":"https://dblp.org/rec/conf/sigcomm/CalderMZKYP13"}, "url":"URL#4223010" }, { "@score":"1", "@id":"4223013", "info":{"authors":{"author":[{"@pid":"03/2050","text":"Ruichuan Chen"},{"@pid":"09/6562","text":"Istemi Ekin Akkus"},{"@pid":"f/PaulFrancis","text":"Paul Francis"}]},"title":"SplitX: high-performance private analytics.","venue":"SIGCOMM","pages":"315-326","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/ChenAF13","doi":"10.1145/2486001.2486013","ee":"https://doi.org/10.1145/2486001.2486013","url":"https://dblp.org/rec/conf/sigcomm/ChenAF13"}, "url":"URL#4223013" }, { "@score":"1", "@id":"4223014", "info":{"authors":{"author":[{"@pid":"04/8276","text":"Yuanfang Chen"},{"@pid":"84/4327","text":"Noël Crespi"},{"@pid":"76/1781","text":"Lin Lv"},{"@pid":"83/3175","text":"Mingchu Li"},{"@pid":"42/3375","text":"Antonio Manuel Ortiz"},{"@pid":"19/2932-1","text":"Lei Shu 0001"}]},"title":"Locating using prior information: wireless indoor localization algorithm.","venue":"SIGCOMM","pages":"463-464","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/ChenCLLOS13","doi":"10.1145/2486001.2491688","ee":"https://doi.org/10.1145/2486001.2491688","url":"https://dblp.org/rec/conf/sigcomm/ChenCLLOS13"}, "url":"URL#4223014" }, { "@score":"1", "@id":"4223015", "info":{"authors":{"author":[{"@pid":"132/8485","text":"Bo-Si Chen"},{"@pid":"16/656","text":"Kate Ching-Ju Lin"},{"@pid":"09/6598","text":"Hung-Yu Wei"}]},"title":"Harnessing receive diversity in distributed multi-user MIMO networks.","venue":"SIGCOMM","pages":"505-506","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/ChenLW13","doi":"10.1145/2486001.2491720","ee":"https://doi.org/10.1145/2486001.2491720","url":"https://dblp.org/rec/conf/sigcomm/ChenLW13"}, "url":"URL#4223015" }, { "@score":"1", "@id":"4223016", "info":{"authors":{"author":[{"@pid":"18/2343-2","text":"Yingying Chen 0002"},{"@pid":"81/6327","text":"Ratul Mahajan"},{"@pid":"91/925","text":"Baskar Sridharan"},{"@pid":"07/5905","text":"Zhi-Li Zhang"}]},"title":"A provider-side view of web search response time.","venue":"SIGCOMM","pages":"243-254","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/ChenMSZ13","doi":"10.1145/2486001.2486035","ee":"https://doi.org/10.1145/2486001.2486035","url":"https://dblp.org/rec/conf/sigcomm/ChenMSZ13"}, "url":"URL#4223016" }, { "@score":"1", "@id":"4223018", "info":{"authors":{"author":[{"@pid":"42/1518","text":"Mosharaf Chowdhury"},{"@pid":"k/SrikanthKandula","text":"Srikanth Kandula"},{"@pid":"s/IonStoica","text":"Ion Stoica"}]},"title":"Leveraging endpoint flexibility in data-intensive clusters.","venue":"SIGCOMM","pages":"231-242","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/ChowdhuryKS13","doi":"10.1145/2486001.2486021","ee":"https://doi.org/10.1145/2486001.2486021","url":"https://dblp.org/rec/conf/sigcomm/ChowdhuryKS13"}, "url":"URL#4223018" }, { "@score":"1", "@id":"4223020", "info":{"authors":{"author":[{"@pid":"14/2485","text":"Daniel Crisan"},{"@pid":"09/2498","text":"Robert Birke"},{"@pid":"132/8507","text":"Gilles Cressier"},{"@pid":"09/659","text":"Cyriel Minkenberg"},{"@pid":"45/5210","text":"Mitchell Gusat"}]},"title":"Got loss?: get zOVN!","venue":"SIGCOMM","pages":"423-434","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/CrisanBCMG13","doi":"10.1145/2486001.2486024","ee":"https://doi.org/10.1145/2486001.2486024","url":"https://dblp.org/rec/conf/sigcomm/CrisanBCMG13"}, "url":"URL#4223020" }, { "@score":"1", "@id":"4223021", "info":{"authors":{"author":[{"@pid":"121/4032","text":"David Dietrich"},{"@pid":"30/6511","text":"Amr Rizk"},{"@pid":"p/PanagiotisPapadimitriou","text":"Panagiotis Papadimitriou 0001"}]},"title":"AutoEmbed: automated multi-provider virtual network embedding.","venue":"SIGCOMM","pages":"465-466","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/DietrichRP13","doi":"10.1145/2486001.2491690","ee":"https://doi.org/10.1145/2486001.2491690","url":"https://dblp.org/rec/conf/sigcomm/DietrichRP13"}, "url":"URL#4223021" }, { "@score":"1", "@id":"4223027", "info":{"authors":{"author":[{"@pid":"03/3113","text":"Seyed Kaveh Fayazbakhsh"},{"@pid":"19/3936","text":"Yin Lin"},{"@pid":"79/7981","text":"Amin Tootoonchian"},{"@pid":"71/4226-2","text":"Ali Ghodsi 0002"},{"@pid":"93/6926","text":"Teemu Koponen"},{"@pid":"m/BruceMMaggs","text":"Bruce M. Maggs"},{"@pid":"86/1193","text":"K. C. Ng"},{"@pid":"45/4044","text":"Vyas Sekar"},{"@pid":"34/5593","text":"Scott Shenker"}]},"title":"Less pain, most of the gain: incrementally deployable ICN.","venue":"SIGCOMM","pages":"147-158","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/FayazbakhshLTGKMNSS13","doi":"10.1145/2486001.2486023","ee":"https://doi.org/10.1145/2486001.2486023","url":"https://dblp.org/rec/conf/sigcomm/FayazbakhshLTGKMNSS13"}, "url":"URL#4223027" }, { "@score":"1", "@id":"4223029", "info":{"authors":{"author":[{"@pid":"61/11188","text":"Andrew D. Ferguson"},{"@pid":"15/2016","text":"Arjun Guha"},{"@pid":"35/3221","text":"Chen Liang"},{"@pid":"f/RFonseca","text":"Rodrigo Fonseca"},{"@pid":"k/SKrishnamurthi","text":"Shriram Krishnamurthi"}]},"title":"Participatory networking: an API for application control of SDNs.","venue":"SIGCOMM","pages":"327-338","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/FergusonGLFK13","doi":"10.1145/2486001.2486003","ee":"https://doi.org/10.1145/2486001.2486003","url":"https://dblp.org/rec/conf/sigcomm/FergusonGLFK13"}, "url":"URL#4223029" }, { "@score":"1", "@id":"4223030", "info":{"authors":{"author":[{"@pid":"62/10521","text":"Tobias Flach"},{"@pid":"74/5250","text":"Nandita Dukkipati"},{"@pid":"12/6664","text":"Andreas Terzis"},{"@pid":"22/3604","text":"Barath Raghavan"},{"@pid":"82/1529","text":"Neal Cardwell"},{"@pid":"85/8634","text":"Yuchung Cheng"},{"@pid":"77/1658","text":"Ankur Jain"},{"@pid":"73/5618","text":"Shuai Hao"},{"@pid":"66/2080","text":"Ethan Katz-Bassett"},{"@pid":"g/RameshGovindan","text":"Ramesh Govindan"}]},"title":"Reducing web latency: the virtue of gentle aggression.","venue":"SIGCOMM","pages":"159-170","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/FlachDTRCCJHKG13","doi":"10.1145/2486001.2486014","ee":"https://doi.org/10.1145/2486001.2486014","url":"https://dblp.org/rec/conf/sigcomm/FlachDTRCCJHKG13"}, "url":"URL#4223030" }, { "@score":"1", "@id":"4223031", "info":{"authors":{"author":[{"@pid":"17/8396","text":"Hongyu Gao"},{"@pid":"75/3570","text":"Vinod Yegneswaran"},{"@pid":"88/2827-4","text":"Yan Chen 0004"},{"@pid":"48/3729","text":"Phillip A. Porras"},{"@pid":"45/4320","text":"Shalini Ghosh"},{"@pid":"00/2797","text":"Jian Jiang"},{"@pid":"36/5143","text":"Hai-Xin Duan"}]},"title":"An empirical reexamination of global DNS behavior.","venue":"SIGCOMM","pages":"267-278","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/GaoYCPGJD13","doi":"10.1145/2486001.2486018","ee":"https://doi.org/10.1145/2486001.2486018","url":"https://dblp.org/rec/conf/sigcomm/GaoYCPGJD13"}, "url":"URL#4223031" }, { "@score":"1", "@id":"4223032", "info":{"authors":{"author":[{"@pid":"07/9556","text":"Aaron Gember"},{"@pid":"117/4351","text":"Robert Grandl"},{"@pid":"88/10928","text":"Junaid Khalid"},{"@pid":"a/AdityaAkella","text":"Aditya Akella"}]},"title":"Design and implementation of a framework for software-defined middlebox networking.","venue":"SIGCOMM","pages":"467-468","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/GemberGKA13","doi":"10.1145/2486001.2491686","ee":"https://doi.org/10.1145/2486001.2491686","url":"https://dblp.org/rec/conf/sigcomm/GemberGKA13"}, "url":"URL#4223032" }, { "@score":"1", "@id":"4223034", "info":{"authors":{"author":[{"@pid":"117/4261","text":"Matthew P. Grosvenor"},{"@pid":"49/7988","text":"Malte Schwarzkopf"},{"@pid":"95/2279-2","text":"Andrew W. Moore 0002"}]},"title":"R2D2: bufferless, switchless data center networks using commodity ethernet hardware.","venue":"SIGCOMM","pages":"507-508","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/GrosvenorSM13","doi":"10.1145/2486001.2491722","ee":"https://doi.org/10.1145/2486001.2491722","url":"https://dblp.org/rec/conf/sigcomm/GrosvenorSM13"}, "url":"URL#4223034" }, { "@score":"1", "@id":"4223037", "info":{"authors":{"author":[{"@pid":"12/5388","text":"Dongsu Han"},{"@pid":"117/4351","text":"Robert Grandl"},{"@pid":"a/AdityaAkella","text":"Aditya Akella"},{"@pid":"s/SrinivasanSeshan","text":"Srinivasan Seshan"}]},"title":"FCP: a flexible transport framework for accommodating diversity.","venue":"SIGCOMM","pages":"135-146","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/HanGAS13","doi":"10.1145/2486001.2486004","ee":"https://doi.org/10.1145/2486001.2486004","url":"https://dblp.org/rec/conf/sigcomm/HanGAS13"}, "url":"URL#4223037" }, { "@score":"1", "@id":"4223038", "info":{"authors":{"author":[{"@pid":"44/2111","text":"Seungyeop Han"},{"@pid":"22/9263-1","text":"Vincent Liu 0001"},{"@pid":"118/3429","text":"Qifan Pu"},{"@pid":"43/3917","text":"Simon Peter 0001"},{"@pid":"a/ThomasEAnderson","text":"Thomas E. Anderson"},{"@pid":"k/AKrishnamurthy","text":"Arvind Krishnamurthy"},{"@pid":"w/DavidWetherall","text":"David Wetherall"}]},"title":"Expressive privacy control with pseudonyms.","venue":"SIGCOMM","pages":"291-302","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/HanLPPAKW13","doi":"10.1145/2486001.2486032","ee":"https://doi.org/10.1145/2486001.2486032","url":"https://dblp.org/rec/conf/sigcomm/HanLPPAKW13"}, "url":"URL#4223038" }, { "@score":"1", "@id":"4223041", "info":{"authors":{"author":[{"@pid":"39/4858","text":"Chi-Yao Hong"},{"@pid":"k/SrikanthKandula","text":"Srikanth Kandula"},{"@pid":"81/6327","text":"Ratul Mahajan"},{"@pid":"73/1844-5","text":"Ming Zhang 0005"},{"@pid":"37/1849","text":"Vijay Gill"},{"@pid":"132/8483","text":"Mohan Nanduri"},{"@pid":"w/RogerWattenhofer","text":"Roger Wattenhofer"}]},"title":"Achieving high utilization with software-driven WAN.","venue":"SIGCOMM","pages":"15-26","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/HongKMZGNW13","doi":"10.1145/2486001.2486012","ee":"https://doi.org/10.1145/2486001.2486012","url":"https://dblp.org/rec/conf/sigcomm/HongKMZGNW13"}, "url":"URL#4223041" }, { "@score":"1", "@id":"4223044", "info":{"authors":{"author":[{"@pid":"52/3115-1","text":"Yu Hua 0001"},{"@pid":"l/XueLiu","text":"Xue Liu 0001"},{"@pid":"48/5939-1","text":"Dan Feng 0001"}]},"title":"Smart in-network deduplication for storage-aware SDN.","venue":"SIGCOMM","pages":"509-510","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/HuaLF13","doi":"10.1145/2486001.2491714","ee":"https://doi.org/10.1145/2486001.2491714","url":"https://dblp.org/rec/conf/sigcomm/HuaLF13"}, "url":"URL#4223044" }, { "@score":"1", "@id":"4223046", "info":{"authors":{"author":[{"@pid":"75/4947","text":"He Huang"},{"@pid":"22/562","text":"Xiangke Liao"},{"@pid":"66/5479-1","text":"Shanshan Li 0001"},{"@pid":"07/4720","text":"Shaoliang Peng"},{"@pid":"65/622-4","text":"Xiaodong Liu 0004"},{"@pid":"11/1186-11","text":"Bin Lin 0011"}]},"title":"The architecture and traffic management of wireless collaborated hybrid data center network.","venue":"SIGCOMM","pages":"511-512","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/HuangLLPLL13","doi":"10.1145/2486001.2491724","ee":"https://doi.org/10.1145/2486001.2491724","url":"https://dblp.org/rec/conf/sigcomm/HuangLLPLL13"}, "url":"URL#4223046" }, { "@score":"1", "@id":"4223047", "info":{"authors":{"author":[{"@pid":"94/214","text":"Junxian Huang"},{"@pid":"54/476-1","text":"Feng Qian 0001"},{"@pid":"132/8476","text":"Yihua Guo"},{"@pid":"99/2747","text":"Yuanyuan Zhou"},{"@pid":"43/1230","text":"Qiang Xu"},{"@pid":"91/584","text":"Zhuoqing Morley Mao"},{"@pid":"71/3761","text":"Subhabrata Sen"},{"@pid":"44/2433","text":"Oliver Spatscheck"}]},"title":"An in-depth study of LTE: effect of network protocol and application behavior on performance.","venue":"SIGCOMM","pages":"363-374","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/HuangQGZXMSS13","doi":"10.1145/2486001.2486006","ee":"https://doi.org/10.1145/2486001.2486006","url":"https://dblp.org/rec/conf/sigcomm/HuangQGZXMSS13"}, "url":"URL#4223047" }, { "@score":"1", "@id":"4223049", "info":{"authors":{"author":[{"@pid":"33/6021","text":"Mihaela Ion"},{"@pid":"29/2597","text":"Jianqing Zhang"},{"@pid":"72/2163","text":"Eve M. Schooler"}]},"title":"Toward content-centric privacy in ICN: attribute-based encryption and routing.","venue":"SIGCOMM","pages":"513-514","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/IonZS13","doi":"10.1145/2486001.2491717","ee":"https://doi.org/10.1145/2486001.2491717","url":"https://dblp.org/rec/conf/sigcomm/IonZS13"}, "url":"URL#4223049" } ] } } } )