default search action
ACM SIGCOMM Conference 2003: Karlsruhe, Germany
- Anja Feldmann, Martina Zitterbart, Jon Crowcroft, David Wetherall:
Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 25-29, 2003, Karlsruhe, Germany. ACM 2003, ISBN 1-58113-735-4
Position Papers
- David D. Clark, Craig Partridge, J. Christopher Ramming, John Wroclawski:
A knowledge plane for the internet. 3-10 - Akihiro Nakao, Larry L. Peterson, Andy C. Bavier:
A routing underlay for overlay networks. 11-18 - Maruti Gupta, Suresh Singh:
Greening of the internet. 19-26 - Kevin R. Fall:
A delay-tolerant network architecture for challenged internets. 27-34
Routing
- Anindya Basu, Alvin Lin, Sharad Ramanathan:
Routing using potentials: a dynamic traffic-aware routing algorithm. 37-48 - João L. Sobrinho:
Network routing with path vector protocols: theory and applications. 49-60 - Timothy Griffin, Aaron D. Jaggard, Vijay Ramachandran:
Design principles of policy languages for path vector protocols. 61-72
Denial-of-service
- Aleksandar Kuzmanovic, Edward W. Knightly:
Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. 75-86 - Sergey Gorinsky, Sugat Jain, Harrick M. Vin, Yongguang Zhang:
Robustness to inflated subscription in multicast congestion control. 87-98 - Alefiya Hussain, John S. Heidemann, Christos Papadopoulos:
A framework for classifying denial of service attacks. 99-110
Measurement
- Neil T. Spring, Ratul Mahajan, Thomas E. Anderson:
The causes of path inflation. 113-124 - Harsha Narayan, Ramesh Govindan, George Varghese:
The impact of address allocation and routing on the structure and implementation of routing tables. 125-136 - Cristian Estan, Stefan Savage, George Varghese:
Automatically inferring patterns of resource consumption in network traffic. 137-148
Overlays
- Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker:
On selfish routing in internet-like environments. 151-162 - Antonio Carzaniga, Alexander L. Wolf:
Forwarding in a content-based network. 163-174 - Chunqiang Tang, Zhichen Xu, Sandhya Dwarkadas:
Peer-to-peer information retrieval using self-organizing semantic overlay networks. 175-186
Fowarding
- Isaac Keslassy, Shang-Tse Chuang, Kyoungsik Yu, David A. B. Miller, Mark Horowitz, Olav Solgaard, Nick McKeown:
Scaling internet routers using optics. 189-200 - Sarang Dharmapurikar, Praveen Krishnamurthy, David E. Taylor:
Longest prefix matching using bloom filters. 201-212 - Sumeet Singh, Florin Baboescu, George Varghese, Jia Wang:
Packet classification using multidimensional cutting. 213-224
Miscellany
- Chip Elliott, David Pearson, Gregory D. Troxel:
Quantum cryptography in practice. 227-238 - Sriram Ramabhadran, Joseph Pasquale:
Stratified round Robin: a low complexity packet scheduler with bandwidth fairness and bounded delay. 239-250 - Ping Ji, Zihui Ge, James F. Kurose, Donald F. Towsley:
A comparison of hard-state and soft-state signaling protocols. 251-262
Queue Management
- Long Le, Jay Aikat, Kevin Jeffay, F. Donelson Smith:
The effects of active queue management on web performance. 265-276 - Heying Zhang, Baohong Liu, Wenhua Dou:
Design of a robust active queue management algorithm based on feedback compensation. 277-285 - Hani Jamjoom, Kang G. Shin:
Persistent dropping: an efficient control of traffic aggregates. 287-298
Traffic Engineering
- Yin Zhang, Matthew Roughan, Carsten Lund, David L. Donoho:
An information-theoretic approach to traffic matrix estimation. 301-312 - David L. Applegate, Edith Cohen:
Making intra-domain routing robust to changing and uncertain traffic demands: understanding fundamental tradeoffs. 313-324 - Nick G. Duffield, Carsten Lund, Mikkel Thorup:
Estimating flow distributions from sampled flow statistics. 325-336
Measurement
- Ruoming Pang, Vern Paxson:
A high-level programming environment for packet trace anonymization and transformation. 339-351 - Aditya Akella, Bruce M. Maggs, Srinivasan Seshan, Anees Shaikh, Ramesh K. Sitaraman:
A measurement-based analysis of multihoming. 353-364 - Zhuoqing Morley Mao, Jennifer Rexford, Jia Wang, Randy H. Katz:
Towards an accurate AS-level traceroute tool. 365-378
Peer-to-peer
- P. Krishna Gummadi, Ramakrishna Gummadi, Steven D. Gribble, Sylvia Ratnasamy, Scott Shenker, Ion Stoica:
The impact of DHT routing geometry on resilience and proximity. 381-394 - Dmitri Loguinov, Anuj Kumar, Vivek Rai, Sai Ganesh:
Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience. 395-406 - Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nick Lanham, Scott Shenker:
Making gnutella-like P2P systems scalable. 407-418
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.