default search action
ACM SIGCOMM Conference 2007: Kyoto, Japan
- Jun Murai, Kenjiro Cho:
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Kyoto, Japan, August 27-31, 2007. ACM 2007, ISBN 978-1-59593-713-1
Enterprise networks
- Martín Casado, Michael J. Freedman, Justin Pettit, Jianying Luo, Nick McKeown, Scott Shenker:
Ethane: taking control of the enterprise. 1-12 - Paramvir Bahl, Ranveer Chandra, Albert G. Greenberg, Srikanth Kandula, David A. Maltz, Ming Zhang:
Towards highly reliable enterprise network services via inference of multi-level dependencies. 13-24 - Yuchung Cheng, Mikhail Afanasyev, Patrick Verkaik, Péter Benkö, Jennifer Chiang, Alex C. Snoeren, Stefan Savage, Geoffrey M. Voelker:
Automating cross-layer diagnosis of enterprise wireless networks. 25-36
Network applications
- Dario Bonfiglio, Marco Mellia, Michela Meo, Dario Rossi, Paolo Tofanelli:
Revealing skype traffic: when randomness plays with you. 37-48 - Wesley W. Terpstra, Jussi Kangasharju, Christof Leng, Alejandro P. Buchmann:
Bubblestorm: resilient, probabilistic, and exhaustive peer-to-peer search. 49-60 - Mohamed Ali Kâafar, Laurent Mathy, Chadi Barakat, Kavé Salamatian, Thierry Turletti, Walid Dabbous:
Securing internet coordinate embedding systems. 61-72
System design
- Jayaram Mudigonda, Harrick M. Vin, Stephen W. Keckler:
Reconciling performance and programmability in networking systems. 73-84 - Jonathan S. Turner, Patrick Crowley, John D. DeHart, Amy Freestone, Brandon Heller, Fred Kuhns, Sailesh Kumar, John W. Lockwood, Jing Lu, Michael Wilson, Charles Wiseman, David Zar:
Supercharging planetlab: a high performance, multi-application, overlay network platform. 85-96 - Lihua Yuan, Chen-Nee Chuah, Prasant Mohapatra:
ProgME: towards programmable network measurement. 97-108
Incentives
- Joel Sommers, Paul Barford, Nick G. Duffield, Amos Ron:
Accurate and efficient SLA compliance monitoring. 109-120 - John R. Douceur, Thomas Moscibroda:
Lottery trees: motivational deployment of networked systems. 121-132 - Cheng Huang, Jin Li, Keith W. Ross:
Can internet video-on-demand be profitable? 133-144
Routing
- Wolfgang Mühlbauer, Steve Uhlig, Bingjie Fu, Mickael Meulle, Olaf Maennel:
In search for an appropriate granularity to model routing policies. 145-156 - Cheng Tien Ee, Vijay Ramachandran, Byung-Gon Chun, Kaushik Lakshminarayanan, Scott Shenker:
Resolving inter-domain policy disputes. 157-168 - Szymon Chachulski, Michael Jennings, Sachin Katti, Dina Katabi:
Trading structure for randomness in wireless opportunistic routing. 169-180
Alternative architectures
- Teemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolinskiy, Kye Hyun Kim, Scott Shenker, Ion Stoica:
A data-oriented (and beyond) network architecture. 181-192 - Saikat Guha, Paul Francis:
An end-middle-end approach to connection establishment. 193-204 - Hitesh Ballani, Paul Francis:
CONMan: a step towards network manageability. 205-216 - Martin Karsten, Srinivasan Keshav, Sanjiva Prasad, Mirza Omer Beg:
An axiomatic basis for communication. 217-228
Reliability
- Hao Wang, Yang Richard Yang, Paul H. Liu, Jia Wang, Alexandre Gerber, Albert G. Greenberg:
Reliability as an interdomain service. 229-240 - Karthik Lakshminarayanan, Matthew Caesar, Murali Rangan, Tom Anderson, Scott Shenker, Ion Stoica:
Achieving convergence-free routing using failure-carrying packets. 241-252 - Khaled Elmeleegy, Alan L. Cox, T. S. Eugene Ng:
Etherfuse: an ethernet watchdog. 253-264
Attack protection
- Hitesh Ballani, Paul Francis, Xinyang Zhang:
A study of prefix hijacking and interception in the internet. 265-276 - Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang, Paul Francis:
A light-weight distributed scheme for detecting ip prefix hijacks in real-time. 277-288 - Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu:
Portcullis: protecting connection setup from denial-of-capability attacks. 289-300
Network characteristics
- Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moisés Goldszmidt, Ted Wobber:
How dynamic are IP addresses? 301-312 - Ricardo V. Oliveira, Beichuan Zhang, Lixia Zhang:
Observing the evolution of internet as topology. 313-324 - Priya Mahadevan, Calvin Hubble, Dmitri V. Krioukov, Bradley Huffaker, Amin Vahdat:
Orbis: rescaling degree correlations to generate annotated internet topologies. 325-336
Resource allocation
- Barath Raghavan, Kashi Venkatesh Vishwanath, Sriram Ramabhadran, Ken Yocum, Alex C. Snoeren:
Cloud control with distributed rate limiting. 337-348 - Sumitha Bhandarkar, A. L. Narasimha Reddy, Yueping Zhang, Dmitri Loguinov:
Emulating AQM from end hosts. 349-360 - Bryan Ford:
Structured streams: a new transport abstraction. 361-372 - Aruna Balasubramanian, Brian Neil Levine, Arun Venkataramani:
DTN routing as a resource allocation problem. 373-384
Wireless
- Ramakrishna Gummadi, David Wetherall, Ben Greenstein, Srinivasan Seshan:
Understanding and mitigating the impact of RF interference on 802.11 networks. 385-396 - Sachin Katti, Shyamnath Gollakota, Dina Katabi:
Embracing wireless interference: analog network coding. 397-408 - Kyle Jamieson, Hari Balakrishnan:
PPR: partial packet recovery for wireless networks. 409-420
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.