


default search action
PAM 2014: Los Angeles, CA, USA
- Michalis Faloutsos, Aleksandar Kuzmanovic:
Passive and Active Measurement - 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings. Lecture Notes in Computer Science 8362, Springer 2014, ISBN 978-3-319-04917-5
Internet Wireless and Mobility
- Junxian Huang, Feng Qian, Zhuoqing Morley Mao, Subhabrata Sen, Oliver Spatscheck:
RadioProphet: Intelligent Radio Resource Deallocation for Cellular Networks. 1-11 - Ashkan Nikravesh, David R. Choffnes, Ethan Katz-Bassett, Zhuoqing Morley Mao, Matt Welsh:
Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis. 12-22 - Kyriakos Zarifis, Tobias Flach, Srikanth Nori, David R. Choffnes, Ramesh Govindan, Ethan Katz-Bassett, Zhuoqing Morley Mao, Matt Welsh:
Diagnosing Path Inflation of Mobile Client Traffic. 23-33 - Yin Xu, Zixiao Wang, Wai Kay Leong
, Ben Leong
:
An End-to-End Measurement Study of Modern Cellular Data Networks. 34-45
Measurement Design, Experience and Analysis
- Matthew J. Luckie, kc claffy
:
A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option. 46-55 - Guillermo Baltra, Robert Beverly
, Geoffrey G. Xie:
Ingress Point Spreading: A New Primitive for Adaptive Active Network Mapping. 56-66 - Nevil Brownlee
:
On Searching for Patterns in Traceroute Responses. 67-76 - Vamseedhar Reddyvari Raja, Amogh Dhamdhere, Alessandra Scicchitano, Srinivas Shakkottai, kc claffy
, Simon Leinen
:
Volume-Based Transit Pricing: Is 95 the Right Percentile? 77-87
Performance Measurement
- Pietro Marchetta, Alessio Botta
, Ethan Katz-Bassett, Antonio Pescapè:
Dissecting Round Trip Time on the Slow Path with a Single Packet. 88-97 - Valentín Carela-Español, Tomasz Bujlow, Pere Barlet-Ros
:
Is Our Ground-Truth for Traffic Classification Reliable? 98-108 - Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall:
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels. 109-118 - Zi Hu, Liang Zhu, Calvin Ardi
, Ethan Katz-Bassett, Harsha V. Madhyastha, John S. Heidemann
, Minlan Yu:
The Need for End-to-End Evaluation of Cloud Availability. 119-130
Protocol And Application Behavior
- Xinyu Xing, Wei Meng, Dan Doozan, Nick Feamster, Wenke Lee, Alex C. Snoeren:
Exposing Inconsistent Web Search Results with Bobble. 131-140 - Matt Sargent, Ethan Blanton, Mark Allman:
Modern Application Layer Transmission Patterns from a Transport Perspective. 141-150 - Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri:
Third-Party Identity Management Usage on the Web. 151-162 - Andra Lutu, Marcelo Bagnulo
, Cristel Pelsser, Olaf Maennel
:
Understanding the Reachability of IPv6 Limited Visibility Prefixes. 163-172
Characterization of Network Behavior
- Riad Mazloum, Marc-Olivier Buob, Jordan Augé, Bruno Baynat, Dario Rossi, Timur Friedman
:
Violation of Interdomain Routing Assumptions. 173-182 - Nicholas Weaver, Christian Kreibich, Martin Dam, Vern Paxson:
Here Be Web Proxies. 183-192 - Massimo Rimondini
, Claudio Squarcella, Giuseppe Di Battista:
Towards an Automated Investigation of the Impact of BGP Routing Changes on Network Delay Variations. 193-203 - Arpit Gupta, Matt Calder, Nick Feamster, Marshini Chetty, Enrico Calandro, Ethan Katz-Bassett:
Peering at the Internet's Frontier: A First Look at ISP Interconnectivity in Africa. 204-213
Network Security and Privacy
- Kyle Schomp, Tom Callahan, Michael Rabinovich
, Mark Allman:
Assessing DNS Vulnerability to Record Injection. 214-223 - Yuanyuan Grace Zeng, David Coffey, John Viega:
How Vulnerable Are Unprotected Machines on the Internet? 224-234 - Chaabane Abdelberi, Yuan Ding, Ratan Dey, Mohamed Ali Kâafar
, Keith W. Ross:
A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information? 235-246 - Sambuddho Chakravarty, Marco Valerio Barbera, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis:
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records. 247-257
Poster Abstracts
- Qianwen Yin, Jasleen Kaur, F. Donelson Smith:
Scaling Bandwidth Estimation to High Speed Networks. 258-261 - Silvia Colabrese, Dario Rossi, Marco Mellia
:
Scalable Accurate Consolidation of Passively Measured Statistical Data. 262-264 - Marco Valerio Barbera, Simone Bronzini, Alessandro Mei, Vasile Claudiu Perta:
A Needle in the Haystack - Delay Based User Identification in Cellular Networks. 265-267 - Pedro Casas, Pierdomenico Fiadino, Arian Bär:
Understanding HTTP Traffic and CDN Behavior from the Eyes of a Mobile ISP. 268-271 - Samamon Khemmarat, Sabyasachi Saha, Han Hee Song, Mario Baldi, Lixin Gao:
On Understanding User Interests through Heterogeneous Data Sources. 272-274 - Tanja Zseby, Nevil Brownlee
, Alistair King, kc claffy
:
Nightlights: Entropy-Based Metrics for Classifying Darkspace Traffic Patterns. 275-277 - Pellegrino Casoria, Dario Rossi, Jordan Augé, Marc-Olivier Buob, Timur Friedman, Antonio Pescapè:
Distributed Active Measurement of Internet Queuing Delays. 278-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.