default search action
IMC 2006: Rio de Janeriro, Brazil
- Jussara M. Almeida, Virgílio A. F. Almeida, Paul Barford:
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006. ACM 2006, ISBN 1-59593-561-4
Sampling
- Frederic Raspall, Sebastià Sallent, Josep Yufera:
Shared-state sampling. 1-14 - Bruno F. Ribeiro, Donald F. Towsley, Tao Ye, Jean Bolot:
Fisher information of sampled packets: an application to flow size estimation. 15-26 - Daniel Stutzbach, Reza Rejaie, Nick G. Duffield, Subhabrata Sen, Walter Willinger:
On unbiased sampling for unstructured peer-to-peer networks. 27-40
Security and privacy
- Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis:
A multifaceted approach to understanding the botnet phenomenon. 41-52 - Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker:
Finding diversity in remote code injection exploits. 53-64 - Balachander Krishnamurthy, Craig E. Wills:
Generating a privacy footprint on the internet. 65-70
Latency and topology
- Ethan Katz-Bassett, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas E. Anderson, Yatin Chawathe:
Towards IP geolocation using delay and topology measurements. 71-84 - Bo Zhang, T. S. Eugene Ng, Animesh Nandi, Rudolf H. Riedi, Peter Druschel, Guohui Wang:
Measurement based analysis, modeling, and synthesis of the internet delay space. 85-98 - Harsha V. Madhyastha, Thomas E. Anderson, Arvind Krishnamurthy, Neil Spring, Arun Venkataramani:
A structural approach to latency prediction. 99-104 - Rob Sherwood, Neil Spring:
Touring the internet in a TCP sidecar. 339-344
Tools
- Andreas Haeberlen, Marcel Dischinger, P. Krishna Gummadi, Stefan Saroiu:
Monarch: a tool to emulate transport protocol flowsover the internet at large. 105-118 - Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Can Emre Koksal:
Semi-automated discovery of application session structure. 119-132 - Himabindu Pucha, Y. Charlie Hu, Zhuoqing Morley Mao:
On the impact of research network based testbeds on wide-area experiments. 133-146
Anomalies
- Xin Li, Fang Bian, Mark Crovella, Christophe Diot, Ramesh Govindan, Gianluca Iannaccone, Anukool Lakhina:
Detection and identification of network anomalies using sketch subspaces. 147-152 - Brice Augustin, Xavier Cuvellier, Benjamin Orgogozo, Fabien Viger, Timur Friedman, Matthieu Latapy, Clémence Magnien, Renata Teixeira:
Avoiding traceroute anomalies with Paris traceroute. 153-158 - Daniela Brauckhoff, Bernhard Tellenbach, Arno Wagner, Martin May, Anukool Lakhina:
Impact of packet sampling on anomaly detection metrics. 159-164 - Jianning Mai, Chen-Nee Chuah, Ashwin Sridharan, Tao Ye, Hui Zang:
Is sampled data sufficient for anomaly detection? 165-176
Peer to peer
- Christos Gkantsidis, John L. Miller, Pablo Rodriguez:
Comprehensive view of a live network coding P2P system. 177-188 - Daniel Stutzbach, Reza Rejaie:
Understanding churn in peer-to-peer networks. 189-202 - Arnaud Legout, Guillaume Urvoy-Keller, Pietro Michiardi:
Rarest first and choke algorithms are enough. 203-216
Traffic
- Lei Guo, Enhua Tan, Songqing Chen, Zhen Xiao, Oliver Spatscheck, Xiaodong Zhang:
Delving into internet streaming media delivery: a quality and resource utilization perspective. 217-230 - Hitesh Ballani, Paul Francis, Sylvia Ratnasamy:
A measurement-based deployment proposal for IP anycast. 231-244 - Nils Kammenhuber, Julia Luxenburger, Anja Feldmann, Gerhard Weikum:
Web search clickstreams. 245-250 - Vijay Erramilli, Mark Crovella, Nina Taft:
An independent-connection model for traffic matrices. 251-256
Wireless
- Karthikeyan Sundaresan, Konstantina Papagiannaki:
The need for cross-layer information in access point selection algorithms. 257-262 - Petros Zerfos, Xiaoqiao Meng, Starsky H. Y. Wong, Vidyut Samanta, Songwu Lu:
A study of the short message service of a nationwide cellular network. 263-268
BGP
- Ricardo V. Oliveira, Beichuan Zhang, Dan Pei, Rafit Izhak-Ratzin, Lixia Zhang:
Quantifying path exploration in the internet. 269-282 - Dan Pei, Jacobus E. van der Merwe:
BGP convergence in virtual private networks. 283-288
Pattern matching and parsing
- Ruoming Pang, Vern Paxson, Robin Sommer, Larry L. Peterson:
binpac: a yacc for writing application protocol parsers. 289-300 - Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannaccone:
Approximate fingerprinting to accelerate pattern matching. 301-306 - Christian Kreibich, Jon Crowcroft:
Efficient sequence alignment of network traffic. 307-312
Malware
- Justin Ma, Kirill Levchenko, Christian Kreibich, Stefan Savage, Geoffrey M. Voelker:
Unexpected means of protocol inference. 313-326 - Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta:
A study of malware in peer-to-peer networks. 327-332 - Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan:
Malware prevalence in the KaZaA file-sharing network. 333-338
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.