


default search action
ACM SIGCOMM Conference 2002: Pittsburgh, PA, USA
- Matthew Mathis, Peter Steenkiste, Hari Balakrishnan, Vern Paxson:
Proceedings of the ACM SIGCOMM 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 19-23, 2002, Pittsburgh, PA, USA. ACM 2002, ISBN 1-58113-570-X
BGP analysis
- Ratul Mahajan, David Wetherall, Thomas E. Anderson:
Understanding BGP misconfiguration. 3-16 - Timothy Griffin, Gordon T. Wilfong:
On the correctness of IBGP configuration. 17-29 - Olaf Maennel
, Anja Feldmann
:
Realistic BGP traffic for test labs. 31-44
Overlay networks
- John W. Byers, Jeffrey Considine
, Michael Mitzenmacher, Stanislav Rost:
Informed content delivery across adaptive overlay networks. 47-60 - Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
SOS: secure overlay services. 61-72 - Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker
, Sonesh Surana:
Internet indirection infrastructure. 73-86
Congestion control
- Dina Katabi, Mark Handley, Charles E. Rohrs:
Congestion control for high bandwidth-delay product networks. 89-102 - Milan Vojnovic, Jean-Yves Le Boudec:
On the long-run behavior of equation-based rate control. 103-116 - Aditya Akella, Srinivasan Seshan
, Richard M. Karp, Scott Shenker
, Christos H. Papadimitriou:
Selfish behavior and stability of the internet: a game-theoretic analysis of TCP. 117-130
Measuring and simulating networks
- Neil T. Spring, Ratul Mahajan, David Wetherall:
Measuring ISP topologies with rocketfuel. 133-145 - Hongsuda Tangmunarunkit
, Ramesh Govindan, Sugih Jamin, Scott Shenker
, Walter Willinger:
Network topology generators: degree-based vs. structural. 147-159 - Alberto Medina, Nina Taft, Kavé Salamatian
, Supratik Bhattacharyya, Christophe Diot:
Traffic matrix estimation: existing techniques and new directions. 161-174
P2P and multicast
- Edith Cohen, Scott Shenker
:
Replication strategies in unstructured peer-to-peer networks. 177-190 - Michael Luby, Vivek K. Goyal
, Simon Skaria, Gavin B. Horn:
Wave and equation based rate control using multicast round trip time. 191-204 - Suman Banerjee, Bobby Bhattacharjee, Christopher Kommareddy:
Scalable application layer multicast. 205-217
Routing dynamics
- Zhuoqing Morley Mao, Ramesh Govindan, George Varghese, Randy H. Katz:
Route flap damping exacerbates internet routing convergence. 221-233 - Anindya Basu, Chih-Hao Luke Ong
, April Rasala, F. Bruce Shepherd, Gordon T. Wilfong:
Route oscillations in I-BGP with route reflection. 235-247
Router design and analysis
- Sundar Iyer, Rui Zhang, Nick McKeown:
Routers with a single stage of buffering. 251-264 - Kenneth L. Calvert, Jim Griffioen, Su Wen:
Lightweight network support for scalable end-to-end services. 265-278 - Jun (Jim) Xu, Richard J. Lipton:
On fundamental tradeoffs between delay bounds and computational complexity in packet scheduling algorithms. 279-292
Measuring paths and flows
- Manish Jain, Constantinos Dovrolis:
End-to-end available bandwidth: measurement methodology, dynamics, and relation with TCP throughput. 295-308 - Yin Zhang, Lee Breslau, Vern Paxson, Scott Shenker
:
On the characteristics and origins of internet flow rates. 309-322 - Cristian Estan, George Varghese:
New directions in traffic measurement and accounting. 323-336
Position papers
- Micah Beck, Terry Moore, James S. Plank
:
An end-to-end approach to globally scalable network storage. 339-346 - David D. Clark, John Wroclawski, Karen R. Sollins, Robert Braden:
Tussle in cyberspace: defining tomorrow's internet. 347-356

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.