default search action
ACM SIGCOMM Conference 2006: Pisa, Italy
- Luigi Rizzo, Thomas E. Anderson, Nick McKeown:
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, September 11-15, 2006. ACM 2006, ISBN 1-59593-308-5 - Domenico Ferrari:
Humble beginnings, uncertain end: getting the internet to provide performance guarantees. 1-2
Architecture
- Andy C. Bavier, Nick Feamster, Mark Huang, Larry L. Peterson, Jennifer Rexford:
In VINI veritas: realistic and controlled network experimentation. 3-14 - Sylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenker:
Revisiting IP multicast. 15-26 - Eddie Kohler, Mark Handley, Sally Floyd:
Designing DCCP: congestion control without reliability. 27-38
Wireless
- Yuchung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Jigsaw: solving the puzzle of enterprise 802.11 analysis. 39-50 - Charles Reis, Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan:
Measurement-based models of delivery and interference in static wireless networks. 51-62 - Sumit Rangwala, Ramakrishna Gummadi, Ramesh Govindan, Konstantinos Psounis:
Interference-aware fair rate control in wireless sensor networks. 63-74 - Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan:
Analyzing the MAC-level behavior of wireless networks in the wild. 75-86
Network
- Michael Menth, Rüdiger Martin, Joachim Charzinski:
Capacity overprovisioning for networks with resilience requirements. 87-98 - Hao Wang, Haiyong Xie, Lili Qiu, Yang Richard Yang, Yin Zhang, Albert G. Greenberg:
COPE: traffic engineering in dynamic networks. 99-110
Analysis
- Kashi Venkatesh Vishwanath, Amin Vahdat:
Realistic and responsive network traffic generation. 111-122 - Yuming Jiang:
A basic stochastic network calculus. 123-134 - Priya Mahadevan, Dmitri V. Krioukov, Kevin R. Fall, Amin Vahdat:
Systematic topology analysis and generation using degree correlations. 135-146 - Brighten Godfrey, Scott Shenker, Ion Stoica:
Minimizing churn in distributed systems. 147-158
Routing 1
- Xiaowei Yang, David Wetherall:
Source selectable path diversity via routing deflections. 159-170 - Wen Xu, Jennifer Rexford:
MIRO: multi-path interdomain routing. 171-182 - Paul Laskowski, John Chuang:
Network monitors and contracting systems: competition and innovation. 183-194
Measurement
- Wolfgang Mühlbauer, Anja Feldmann, Olaf Maennel, Matthew Roughan, Steve Uhlig:
Building an AS-topology model that captures route diversity. 195-206 - Kenjiro Cho, Kensuke Fukuda, Hiroshi Esaki, Akira Kato:
The impact and implications of the growth in residential user-to-user traffic. 207-218 - Yao Zhao, Yan Chen, David Bindel:
Towards unbiased end-to-end network diagnosis. 219-230 - François Baccelli, Sridhar Machiraju, Darryl Veitch, Jean Bolot:
The role of PASTA in network measurement. 231-242
Coding
- Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Médard, Jon Crowcroft:
XORs in the air: practical wireless network coding. 243-254 - Abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rubenstein:
Growth codes: maximizing sensor network data persistence. 255-266
Security
- Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman:
SybilGuard: defending against sybil attacks via social networks. 267-278 - Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang:
Modeling adoptability of secure BGP protocol. 279-290 - Anirudh Ramachandran, Nick Feamster:
Understanding the network-level behavior of spammers. 291-302 - Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David R. Karger, Scott Shenker:
DDoS defense by offense. 303-314
Hardware
- Flavio Bonomi, Michael Mitzenmacher, Rina Panigrahy, Sushil Singh, George Varghese:
Beyond bloom filters: from approximate membership checks to approximate state machines. 315-326 - George Varghese, J. Andrew Fingerhut, Flavio Bonomi:
Detecting evasion attacks at high speeds without reassembly. 327-338 - Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patrick Crowley, Jonathan S. Turner:
Algorithms to accelerate multiple regular expressions matching for deep packet inspection. 339-350
Routing 2
- Matthew Caesar, Miguel Castro, Edmund B. Nightingale, Greg O'Shea, Antony I. T. Rowstron:
Virtual ring routing: network routing inspired by DHTs. 351-362 - Matthew Caesar, Tyson Condie, Jayanthkumar Kannan, Karthik Lakshminarayanan, Ion Stoica:
ROFL: routing on flat labels. 363-374 - Feng Wang, Zhuoqing Morley Mao, Jia Wang, Lixin Gao, Randy Bush:
A measurement study on the impact of routing events on end-to-end internet path performance. 375-386 - Chi-Kin Chau:
Policy-based routing with non-strict preferences. 387-398
Applications
- Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei:
Quantifying Skype user satisfaction. 399-410 - Yu-Wei Eric Sung, Michael A. Bishop, Sanjay G. Rao:
Enabling contribution awareness in an overlay broadcasting system. 411-422 - Christos Gkantsidis, Thomas Karagiannis, Pablo Rodriguez, Milan Vojnovic:
Planet scale software updates. 423-434 - Ao-Jan Su, David R. Choffnes, Aleksandar Kuzmanovic, Fabián E. Bustamante:
Drafting behind Akamai (travelocity-based detouring). 435-446
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.