


default search action
Computer Communication Review, Volume 50
Volume 50, Number 1, January 2020
- Shay Vargaftik, Cosmin Caba, Liran Schour, Yaniv Ben-Itzhak:

C-share: optical circuits sharing for software-defined data-centers. 2-9 - Pedro de B. Marcos

, Marco Chiesa
, Christoph Dietzel, Marco Canini
, Marinho P. Barcellos
:
A survey on the current internet interconnection practices. 10-17 - Esteban Carisimo, Julián Martin Del Fiore, Diego Dujovne, Cristel Pelsser

, J. Ignacio Alvarez-Hamelin
:
A first look at the Latin American IXPs. 18-24 - Giacomo Giuliari, Tobias Klenze

, Markus Legner
, David A. Basin, Adrian Perrig
, Ankit Singla:
Internet backbones in space. 25-37 - Anirudh Sivaraman, Thomas Mason, Aurojit Panda, Ravi Netravali, Sai Anirudh-Kondaveeti:

Network architecture in the age of programmability. 38-44 - Volker Stocker, Georgios Smaragdakis

, William H. Lehr:
The state of network neutrality regulation. 45-59 - Steve Bauer, David D. Clark, William H. Lehr:

Gigabit broadband measurement workshop report. 60-65
Volume 50, Number 2, April 2020
- Steve Uhlig:

The April 2020 issue. 1-2 - Ben Du, Massimo Candela

, Bradley Huffaker, Alex C. Snoeren, K. C. Claffy
:
RIPE IPmap active geolocation: mechanism and performance evaluation. 3-10 - Waleed Reda, Kirill Bogdanov, Alexandros Milolidakis, Hamid Ghasemirahni, Marco Chiesa

, Gerald Q. Maguire Jr.
, Dejan Kostic:
Path persistence in the cloud: A study of the effects of inter-region traffic engineering in a large cloud provider's network. 11-23 - Nguyen Phong Hoang, Arian Akhavan Niaki

, Michalis Polychronakis
, Phillipa Gill:
The web is still small after more than a decade. 24-31 - Noa Zilberman:

An Artifact Evaluation of NDP. 32-36 - Dejene Boru Oljira, Karl-Johan Grinnemo, Anna Brunström, Javid Taheri:

Validating the Sharing Behavior and Latency Characteristics of the L4S Architecture. 37-44 - Thomas Holterbach, Tobias Bühler

, Tino Rellstab, Laurent Vanbever:
An Open Platform to Teach How the Internet Practically Works. 45-52 - K. C. Claffy

, David D. Clark:
Workshop on Internet Economics (WIE 2019) report. 53-59 - Noa Zilberman, Andrew W. Moore:

Thoughts about Artifact Badging. 60-63 - James W. Roberts:

Comment on "Datacenter Congestion Control: Identifying what is essential and making it practical" by Aisha Mushtaq, et al, CCR, July 2019. 64
Volume 50, Number 3, July 2020
- Steve Uhlig:

The July 2020 issue. 1-2 - Ralph Holz

, Jens Hiller
, Johanna Amann, Abbas Razaghpanah
, Thomas Jost, Narseo Vallina-Rodriguez
, Oliver Hohlfeld:
Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization. 3-15 - Martino Trevisan, Francesca Soro, Marco Mellia

, Idilio Drago
, Ricardo Morla
:
Does domain name encryption increase users' privacy? 16-22 - Talha Javed, Muhammad Haseeb, Muhammad Abdullah, Mobin Javed:

Using application layer banner data to automatically identify IoT devices. 23-29 - Pavel Chuprikov

, Sergey I. Nikolenko, Kirill Kogan
:
Towards declarative self-adapting buffer management. 30-37 - Chris Misa, Dennis Guse, Oliver Hohlfeld, Ramakrishnan Durairajan, Anna Sperotto, Alberto Dainotti

, Reza Rejaie:
Lessons learned organizing the PAM 2020 virtual conference. 46-54 - Ralph Holz

, Marco Mellia
, Olivier Bonaventure, Hamed Haddadi, Matthew Caesar
, Sergey Gorinsky, Gianni Antichi
, Joseph Camp
, K. C. Claffy, Bhaskaran Raman, Anna Sperotto, Aline Carneiro Viana, Steve Uhlig:
Update on ACM SIGCOMM CCR reviewing process: towards a more open review process. 55-56
Volume 50, Number 4, October 2020
- Steve Uhlig:

The October 2020 issue. 1-2 - Kyle Schomp, Rami Al-Dalky:

Partitioning the internet using Anycast catchments. 3-9 - Kwon Nung Choi, Harini Kolamunna, Akila Uyanwatta, Kanchana Thilakarathna

, Suranga Seneviratne, Ralph Holz
, Mahbub Hassan, Albert Y. Zomaya
:
LoRadar: LoRa sensor network monitoring through passive packet sniffing. 10-24 - Andra Lutu, Byungjin Jun, Fabián E. Bustamante, Diego Perino, Marcelo Bagnulo

, Carlos Gamboa Bontje:
A first look at the IP eXchange ecosystem. 25-34 - Ihsan Ayyub Qazi

, Zafar Ayyub Qazi, Theophilus A. Benson, Ghulam Murtaza, Ehsan Latif
, Abdul Manan, Abrar Tariq:
Mobile web browsing under memory pressure. 35-48 - Moritz Müller, Jins de Jong, Maran van Heesch, Benno J. Overeinder, Roland van Rijswijk-Deij

:
Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC. 49-57 - Panagiotis Skrimponis

, Nikos Makris, Sheila Borges Rajguru
, Karen Cheng
, Jonatan Ostrometzky, Emily Ford, Zoran Kostic, Gil Zussman, Thanasis Korakis:
COSMOS educational toolkit: using experimental wireless networking to enhance middle/high school STEM education. 58-65 - Douglas J. Leith

, Stephen Farrell:
Coronavirus contact tracing: evaluating the potential of using bluetooth received signal strength for proximity detection. 66-74 - Amee Trivedi, Deepak Vasisht:

Digital contact tracing: technologies, shortcomings, and the path forward. 75-81 - Nate Foster

, Nick McKeown, Jennifer Rexford
, Guru M. Parulkar, Larry L. Peterson, M. Oguz Sunay:
Using deep programmability to put network owners in control. 82-88

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














