


default search action
ACM SIGCOMM Conference 2007: Kyoto, Japan
- Jun Murai, Kenjiro Cho:

Proceedings of the ACM SIGCOMM 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Kyoto, Japan, August 27-31, 2007. ACM 2007, ISBN 978-1-59593-713-1
Enterprise networks
- Martín Casado, Michael J. Freedman, Justin Pettit, Jianying Luo, Nick McKeown, Scott Shenker

:
Ethane: taking control of the enterprise. 1-12 - Paramvir Bahl, Ranveer Chandra, Albert G. Greenberg, Srikanth Kandula, David A. Maltz, Ming Zhang:

Towards highly reliable enterprise network services via inference of multi-level dependencies. 13-24 - Yuchung Cheng, Mikhail Afanasyev, Patrick Verkaik, Péter Benkö, Jennifer Chiang, Alex C. Snoeren, Stefan Savage, Geoffrey M. Voelker:

Automating cross-layer diagnosis of enterprise wireless networks. 25-36
Network applications
- Dario Bonfiglio, Marco Mellia

, Michela Meo
, Dario Rossi, Paolo Tofanelli:
Revealing skype traffic: when randomness plays with you. 37-48 - Wesley W. Terpstra, Jussi Kangasharju

, Christof Leng, Alejandro P. Buchmann:
Bubblestorm: resilient, probabilistic, and exhaustive peer-to-peer search. 49-60 - Mohamed Ali Kâafar

, Laurent Mathy, Chadi Barakat
, Kavé Salamatian
, Thierry Turletti, Walid Dabbous:
Securing internet coordinate embedding systems. 61-72
System design
- Jayaram Mudigonda, Harrick M. Vin, Stephen W. Keckler:

Reconciling performance and programmability in networking systems. 73-84 - Jonathan S. Turner, Patrick Crowley, John D. DeHart, Amy Freestone, Brandon Heller, Fred Kuhns, Sailesh Kumar, John W. Lockwood, Jing Lu, Michael Wilson, Charles Wiseman, David Zar:

Supercharging planetlab: a high performance, multi-application, overlay network platform. 85-96 - Lihua Yuan, Chen-Nee Chuah

, Prasant Mohapatra:
ProgME: towards programmable network measurement. 97-108
Incentives
- Joel Sommers, Paul Barford, Nick G. Duffield

, Amos Ron:
Accurate and efficient SLA compliance monitoring. 109-120 - John R. Douceur, Thomas Moscibroda:

Lottery trees: motivational deployment of networked systems. 121-132 - Cheng Huang, Jin Li, Keith W. Ross:

Can internet video-on-demand be profitable? 133-144
Routing
- Wolfgang Mühlbauer, Steve Uhlig

, Bingjie Fu, Mickael Meulle, Olaf Maennel
:
In search for an appropriate granularity to model routing policies. 145-156 - Cheng Tien Ee, Vijay Ramachandran, Byung-Gon Chun, Kaushik Lakshminarayanan, Scott Shenker

:
Resolving inter-domain policy disputes. 157-168 - Szymon Chachulski, Michael Jennings, Sachin Katti, Dina Katabi:

Trading structure for randomness in wireless opportunistic routing. 169-180
Alternative architectures
- Teemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolinskiy, Kye Hyun Kim, Scott Shenker

, Ion Stoica:
A data-oriented (and beyond) network architecture. 181-192 - Saikat Guha, Paul Francis:

An end-middle-end approach to connection establishment. 193-204 - Hitesh Ballani, Paul Francis:

CONMan: a step towards network manageability. 205-216 - Martin Karsten, Srinivasan Keshav

, Sanjiva Prasad, Mirza Omer Beg:
An axiomatic basis for communication. 217-228
Reliability
- Hao Wang, Yang Richard Yang, Paul H. Liu, Jia Wang, Alexandre Gerber, Albert G. Greenberg:

Reliability as an interdomain service. 229-240 - Karthik Lakshminarayanan, Matthew Caesar

, Murali Rangan, Tom Anderson, Scott Shenker
, Ion Stoica:
Achieving convergence-free routing using failure-carrying packets. 241-252 - Khaled Elmeleegy, Alan L. Cox, T. S. Eugene Ng:

Etherfuse: an ethernet watchdog. 253-264
Attack protection
- Hitesh Ballani, Paul Francis, Xinyang Zhang:

A study of prefix hijacking and interception in the internet. 265-276 - Changxi Zheng, Lusheng Ji, Dan Pei

, Jia Wang, Paul Francis:
A light-weight distributed scheme for detecting ip prefix hijacks in real-time. 277-288 - Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu:

Portcullis: protecting connection setup from denial-of-capability attacks. 289-300
Network characteristics
- Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moisés Goldszmidt, Ted Wobber:

How dynamic are IP addresses? 301-312 - Ricardo V. Oliveira, Beichuan Zhang

, Lixia Zhang:
Observing the evolution of internet as topology. 313-324 - Priya Mahadevan, Calvin Hubble, Dmitri V. Krioukov

, Bradley Huffaker, Amin Vahdat:
Orbis: rescaling degree correlations to generate annotated internet topologies. 325-336
Resource allocation
- Barath Raghavan, Kashi Venkatesh Vishwanath, Sriram Ramabhadran, Ken Yocum, Alex C. Snoeren:

Cloud control with distributed rate limiting. 337-348 - Sumitha Bhandarkar, A. L. Narasimha Reddy, Yueping Zhang, Dmitri Loguinov:

Emulating AQM from end hosts. 349-360 - Bryan Ford

:
Structured streams: a new transport abstraction. 361-372 - Aruna Balasubramanian, Brian Neil Levine, Arun Venkataramani:

DTN routing as a resource allocation problem. 373-384
Wireless
- Ramakrishna Gummadi, David Wetherall, Ben Greenstein, Srinivasan Seshan

:
Understanding and mitigating the impact of RF interference on 802.11 networks. 385-396 - Sachin Katti, Shyamnath Gollakota, Dina Katabi:

Embracing wireless interference: analog network coding. 397-408 - Kyle Jamieson

, Hari Balakrishnan:
PPR: partial packet recovery for wireless networks. 409-420

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














