


default search action
Computer Communication Review, Volume 42
Volume 42, Number 1, January 2012
- Partha Kanuparthy, Constantine Dovrolis, Konstantina Papagiannaki, Srinivasan Seshan

, Peter Steenkiste
:
Can user-level probing detect and diagnose common home-WLAN pathologies. 7-15 - Nadi Sarrar, Steve Uhlig

, Anja Feldmann
, Rob Sherwood, Xin Huang:
Leveraging Zipf's law for traffic offloading. 16-22 - Thomas Bonald, James W. Roberts:

Internet and the Erlang formula. 23-30 - Alberto Dainotti

, Roman Amman, Emile Aben, Kimberly C. Claffy
:
Extracting benefit from harm: using malware pollution to analyze the impact of political and geophysical events on the internet. 31-39 - Phillipa Gill, Michael Schapira, Sharon Goldberg:

Modeling on quicksand: dealing with the scarcity of ground truth in interdomain routing data. 40-46 - Francesco Fusco

, Xenofontas A. Dimitropoulos, Michail Vlachos
, Luca Deri:
pcapIndex: an index for network packet traces with legacy compatibility. 47-53 - Murtaza Motiwala, Amogh Dhamdhere, Nick Feamster, Anukool Lakhina

:
Towards a cost model for network traffic. 54-60 - Maxim Podlesny, Carey Williamson:

Improving TCP performance in residential broadband networks: a simple and deployable approach. 61-68
- Yoo Chung:

Distributed denial of service is a scalability problem. 69-71 - Jonathon Duerig, Robert Ricci

, Leigh Stoller, Matt Strum, Gary Wong
, Charles Carpenter, Zongming Fei, James Griffioen, Hussamuddin Nasir, Jeremy Reed, Xiongqi Wu:
Getting started with GENI: a user tutorial. 72-77 - John W. Byers, Jeffrey C. Mogul, Fadel Adib, Jay Aikat, Danai Chasaki, Ming-Hung Chen, Marshini Chetty, Romain Fontugne, Vijay Gabale, László Gyarmati, Katrina LaCurts, Qi Liao, Marc Mendonca, Trang Cao Minh, S. H. Shah Newaz, Pawan Prakash, Yan Shvartzshnaider, Praveen Yalagandula, Chun-Yu Yang:

Report on the SIGCOMM 2011 conference. 80-96
Volume 42, Number 2, April 2012
- Supasate Choochaisri, Kittipat Apicharttrisorn

, Kittiporn Korprasertthaworn, Pongpakdi Taechalertpaisarn, Chalermek Intanagonwiwat:
Desynchronization with an artificial force field for wireless networks. 7-15 - André Zúquete

, Carlos Frade:
A new location layer for the TCP/IP protocol stack. 16-27 - Kate Ching-Ju Lin, Yung-Jen Chuang, Dina Katabi:

A light-weight wireless handshake. 28-34 - Cheng Huang, Ivan Batanov, Jin Li:

A practical solution to the client-LDNS mismatch problem. 35-41 - Shane Alcock, Perry Lorier, Richard Nelson:

Libtrace: a packet capture and analysis library. 42-48 - Pamela Zave:

Using lightweight modeling to understand chord. 49-57 - Juan Camilo Cardona Restrepo, Rade Stanojevic:

A history of an internet exchange point. 58-64 - Eric Keller, Michael Schapira, Jennifer Rexford

:
Rehoming edge links for better traffic engineering. 65-71 - Craig A. Shue, Andrew J. Kalafut, Mark Allman, Curtis R. Taylor:

On building inexpensive network capabilities. 72-79 - Yingdi Yu, Duane Wessels, Matt Larson, Lixia Zhang:

Authority server selection in DNS caching resolvers. 80-86 - Benoit Donnet

, Matthew J. Luckie, Pascal Mérindol, Jean-Jacques Pansiot
:
Revealing MPLS tunnels obscured from traceroute. 87-93
- Hamed Haddadi, Richard Mortier

, Steven Hand:
Privacy analytics. 94-98 - Martin F. Arlitt:

The top ten similarities between playing hockey and building a better internet. 99-102 - Jon Crowcroft

:
The DNS is not a right. oh yes it is. oh no it isn't. oh yes it is... 103-104 - Charles R. Kalmanek:

The essential elements of successful innovation. 105-109 - K. C. Claffy

:
Workshop on internet economics (WIE2011) report. 110-114
Volume 42, Number 3, July 2012
- Vinh The Lam, Sivasankar Radhakrishnan, Rong Pan, Amin Vahdat, George Varghese:

Netshare and stochastic netshare: predictable bandwidth allocation for data centers. 5-11 - Yosuke Himura, Yoshiko Yasuda:

Discovering configuration templates of virtualized tenant networks in multi-tenancy datacenters via graph-mining. 13-20 - The collateral damage of internet censorship by DNS injection. 21-27

- K. C. Claffy

:
Border gateway protocol (BGP) and traceroute data workshop report. 28-31 - Jon Crowcroft

:
Differential piracy. 32-33 - K. C. Claffy

:
The 4th workshop on active internet measurements (AIMS-4) report. 34-38 - Rute C. Sofia

, Paulo Mendes
, Manuel José Damásio
, Sara Henriques
, Fabio Giglietto
, Erica Giambitto, Alessandro Bogliolo
:
Moving towards a socially-driven internet architectural design. 39-46 - Dirk Trossen:

Turing, the internet and a theory for architecture: a (fictional?) tale in three parts. 47-53 - Marshini Chetty, Nick Feamster:

Refactoring network infrastructure to improve manageability: a case study of home networking. 54-61 - Cheng Yi, Alexander Afanasyev

, Lan Wang, Beichuan Zhang, Lixia Zhang:
Adaptive forwarding in named data networking. 62-67
Volume 42, Number 4, October 2012
- Lars Eggert, Jörg Ott, Venkata N. Padmanabhan, George Varghese:

ACM SIGCOMM 2012 Conference, SIGCOMM '12, Helsinki, Finland - August 13 - 17, 2012. ACM 2012, ISBN 978-1-4503-1419-0 [contents]
- Kok-Kiong Yap, Te-Yuan Huang, Masayoshi Kobayashi, Yiannis Yiakoumis, Nick McKeown, Sachin Katti, Guru M. Parulkar:

Making use of all the networks around us: a case study in android. 455-460 - Ying Zhang, Åke Arvidsson:

Understanding the characteristics of cellular data traffic. 461-466
- Ahmed Khurshid, Wenxuan Zhou, Matthew Caesar

, Brighten Godfrey:
Veriflow: verifying network-wide invariants in real time. 467-472 - Brandon Heller, Rob Sherwood, Nick McKeown:

The controller placement problem. 473-478
- Ashish Patro, Shravan K. Rayanchu, Michael Griepentrog, Yadi Ma, Suman Banerjee:

The anatomy of a large mobile massively multiplayer online game. 479-484 - Tan Kiat Wee, Rajesh Krishna Balan:

Adaptive display power management for OLED displays. 485-490
- Giovanna Carofiglio, Massimo Gallo, Luca Muscariello:

Joint hop-by-hop and receiver-driven interest control protocol for content-centric networks. 491-496 - Nikos Fotiou, Giannis F. Marias, George C. Polyzos

:
Access control enforcement delegation for information-centric networking architectures. 497-502
- Mikko Pitkänen, Teemu Kärkkäinen, Jörg Ott, Marco Conti

, Andrea Passarella
, Silvia Giordano
, Daniele Puccinelli, Franck Legendre, Sacha Trifunovic, Karin Anna Hummel
, Martin May, Nidhi Hegde, Thrasyvoulos Spyropoulos:
SCAMPI: service platform for social aware mobile and pervasive computing. 503-508 - Kyu-Han Kim, Sung-Ju Lee, Paul Congdon:

On cloud-centric network architecture for multi-dimensional mobility. 509-514
- Zachary S. Bischof

, John S. Otto, Fabián E. Bustamante:
Up, down and around the stack: ISP characterization from network intensive applications. 515-520 - Chien-Nan (Shannon) Chen, Cing-yu Chu, Su-Ling Yeh

, Hao-Hua Chu, Polly Huang:
Measuring the perceptual quality of Skype sources. 521-526
- Gianluca Stringhini, Manuel Egele, Christopher Kruegel, Giovanni Vigna:

Poultry markets: on the underground economy of twitter followers. 527-532 - Naveen Kumar Sharma, Saptarshi Ghosh, Fabrício Benevenuto

, Niloy Ganguly
, P. Krishna Gummadi
:
Inferring who-is-who in the Twitter social network. 533-538
Volume 42, Number 5, October 2012
- Xuetao Wei, Nicholas Valler, B. Aditya Prakash, Iulian Neamtiu, Michalis Faloutsos

, Christos Faloutsos
:
Competing memes propagation on networks: a case study of composite networks. 5-12 - Sebastian Zander, Lachlan L. H. Andrew, Grenville J. Armitage, Geoff Huston, George Michaelson:

Investigating the IPv6 teredo tunnelling capability and performance of internet clients. 13-20 - Ingmar Poese, Benjamin Poese, Georgios Smaragdakis

, Steve Uhlig
, Anja Feldmann
, Bruce M. Maggs:
Enabling content-aware traffic engineering. 21-28 - Marko Zec, Luigi Rizzo

, Miljenko Mikuc:
DXR: towards a billion routing lookups per second in software. 29-36 - Jon Whiteaker, Fabian Schneider, Renata Teixeira, Christophe Diot, Augustin Soule, Fabio Picconi, Martin May:

Expanding home services with advanced gateways. 37-43
- Jeffrey C. Mogul, Lucian Popa:

What we talk about when we talk about cloud network performance. 44-48 - Tanja Zseby, K. C. Claffy

:
Workshop report: darkspace and unsolicited traffic analysis (DUST 2012). 49-53 - Tobias Lauinger, Nikolaos Laoutaris

, Pablo Rodriguez, Thorsten Strufe, Ernst W. Biersack, Engin Kirda:
Privacy risks in named data networking: what is the cost of performance? 54-57 - Sameer S. Tilak, Philip M. Papadopoulos:

The case for a rigorous approach to automating software operations and management of large-scale sensor networks. 58-61 - Dimitri Papadimitriou, Lluís Fàbrega

, Pere Vilà
, Davide Careglio
, Piet Demeester:
Measurement-based research: methodology, experiments, and tools. 62-68

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














