


default search action
ACM SIGCOMM Conference 2008: Seattle, WA, USA
- Victor Bahl, David Wetherall, Stefan Savage, Ion Stoica:

Proceedings of the ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008. ACM 2008, ISBN 978-1-60558-175-0 - Donald F. Towsley:

Modeling the internet is fun!: but can you make a living? 1-2
Routing
- Changhoon Kim, Matthew Caesar

, Jennifer Rexford
:
Floodless in seattle: a scalable ethernet architecture for large enterprises. 3-14 - Kirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, Stefan Savage:

Xl: an efficient network routing algorithm. 15-26 - Murtaza Motiwala, Megan Elmore, Nick Feamster, Santosh S. Vempala:

Path splicing. 27-38 - Franck Le, Geoffrey G. Xie, Dan Pei

, Jia Wang, Hui Zhang:
Shedding light on the glue logic of the internet routing architecture. 39-50
Data Center networking
- Dilip Antony Joseph, Arsalan Tavakoli, Ion Stoica:

A policy-aware switching layer for data centers. 51-62 - Mohammad Al-Fares, Alexander Loukissas, Amin Vahdat:

A scalable, commodity data center network architecture. 63-74 - Chuanxiong Guo

, Haitao Wu, Kun Tan, Lei Shi, Yongguang Zhang, Songwu Lu:
Dcell: a scalable and fault-tolerant network structure for data centers. 75-86
Management
- Srikanth Kandula, Ranveer Chandra, Dina Katabi:

What's going on?: learning communication rules in edge networks. 87-98 - Muhammad Mukarram Bin Tariq, Amgad Zeitoun, Vytautas Valancius, Nick Feamster, Mostafa H. Ammar:

Answering what-if deployment and configuration questions with wise. 99-110 - Richard Alimi, Ye Wang, Yang Richard Yang:

Shadow configuration as a network management primitive. 111-122 - Thomas Karagiannis, Richard Mortier

, Antony I. T. Rowstron:
Network exception handlers: host-network control in enterprise networks. 123-134
Wireless I
- Ranveer Chandra, Ratul Mahajan, Thomas Moscibroda, Ramya Raghavendra, Paramvir Bahl:

A case for adapting channel width in wireless networks. 135-146 - Hariharan Rahul, Nate Kushman, Dina Katabi, Charles G. Sodini, Farinaz Edalat:

Learning to share: narrowband-friendly wideband networks. 147-158 - Shyamnath Gollakota, Dina Katabi:

Zigzag decoding: combating hidden terminals in wireless networks. 159-170
Security I
- Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, Ivan Osipkov:

Spamming botnets: signatures and characteristics. 171-182 - Gregor Maier, Robin Sommer, Holger Dreger, Anja Feldmann

, Vern Paxson, Fabian Schneider:
Enriching network security analysis with time travel. 183-194 - Xin Liu, Xiaowei Yang, Yanbin Lu:

To filter or to authorize: network-layer DoS defense against multimillion-node botnets. 195-206
Router primitives
- Randy Smith, Cristian Estan, Somesh Jha, Shijin Kong:

Deflating the big bang: fast and scalable deep packet inspection with extended finite automata. 207-218 - Ashok Anand, Archit Gupta, Aditya Akella, Srinivasan Seshan

, Scott Shenker
:
Packet caches on routers: the implications of universal redundant traffic elimination. 219-230 - Yi Wang, Eric Keller, Brian Biskeborn, Jacobus E. van der Merwe, Jennifer Rexford

:
Virtual routers on the move: live router migration as a network-management primitive. 231-242
Incentives
- Dave Levin, Katrina LaCurts, Neil Spring, Bobby Bhattacharjee:

Bittorrent is an auction: analyzing and improving bittorrent's incentives. 243-254 - Maxim Podlesny, Sergey Gorinsky

:
Rd network services: differentiation through performance incentives. 255-266 - Sharon Goldberg, Shai Halevi, Aaron D. Jaggard

, Vijay Ramachandran, Rebecca N. Wright:
Rationality and traffic attraction: incentives for honest path announcements in bgp. 267-278
Measurement
- Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuzmanovic, Antonio Nucci:

Unconstrained endpoint profiling (googling the internet). 279-290 - Brian Eriksson, Paul Barford, Robert D. Nowak:

Network discovery from passive measurements. 291-302 - Rob Sherwood, Adam Bender, Neil Spring:

Discarte: a disjunctive internet cartographer. 303-314 - Marcel Dischinger, Andreas Haeberlen

, Ivan Beschastnikh, P. Krishna Gummadi
, Stefan Saroiu:
Satellitelab: adding heterogeneity to planetary-scale network testbeds. 315-326
Security II
- Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing Morley Mao, Randy Bush:

Ispy: detecting ip prefix hijacking on my own. 327-338 - David G. Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker

:
Accountable internet protocol (aip). 339-350
P2P
- Haiyong Xie, Yang Richard Yang, Arvind Krishnamurthy, Yanbin Grace Liu, Abraham Silberschatz:

P4p: provider portal for applications. 351-362 - David R. Choffnes, Fabián E. Bustamante:

Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems. 363-374 - Yan Huang, Tom Z. J. Fu, Dah-Ming Chiu, John C. S. Lui, Cheng Huang:

Challenges, design and analysis of a large-scale p2p-vod system. 375-388 - Ashwin R. Bharambe, John R. Douceur, Jacob R. Lorch, Thomas Moscibroda, Jeffrey Pang, Srinivasan Seshan

, Xinyu Zhuang:
Donnybrook: enabling large-scale, high-speed, peer-to-peer games. 389-400
Wireless II
- Sachin Katti, Dina Katabi, Hari Balakrishnan, Muriel Médard:

Symbol-level network coding for wireless mesh networks. 401-412 - Yi Li, Lili Qiu, Yin Zhang, Ratul Mahajan, Eric Rozner:

Predictable performance optimization for wireless networks. 413-426 - Aruna Balasubramanian, Ratul Mahajan, Arun Venkataramani, Brian Neil Levine, John Zahorjan:

Interactive wifi connectivity for moving vehicles. 427-438

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














