


default search action
5th CoNEXT 2009: Rome, Italy
- Jörg Liebeherr, Giorgio Ventre, Ernst W. Biersack, Srinivasan Keshav:

Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, CoNEXT 2009, Rome, Italy, December 1-4, 2009. ACM 2009, ISBN 978-1-60558-636-6
New architectures 1
- Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca Braynard:

Networking named content. 1-12 - Eric Keller, Minlan Yu, Matthew Caesar

, Jennifer Rexford
:
Virtually eliminating router bugs. 13-24 - Haitao Wu, Guohan Lu, Dan Li, Chuanxiong Guo

, Yongguang Zhang:
MDCube: a high performance network structure for modular data center interconnection. 25-36 - Vytautas Valancius, Nikolaos Laoutaris

, Laurent Massoulié, Christophe Diot, Pablo Rodriguez:
Greening the internet with nano data centers. 37-48
Wireless mesh networks
- Saumitra M. Das, Konstantina Papagiannaki, Suman Banerjee, Y. C. Tay:

SWARM: the power of structure in community wireless mesh networks. 49-60 - Theodoros Salonidis, Georgios Sotiropoulos, Roch Guérin, Ramesh Govindan:

Online optimization of 802.11 mesh networks. 61-72 - Adel Aziz, David Starobinski, Patrick Thiran, Alaeddine El Fawal:

EZ-Flow: removing turbulence in IEEE 802.11 wireless mesh networks without message passing. 73-84
Opportunistic communication
- Joshua Reich, Augustin Chaintreau

:
The age of impatience: optimal replication schemes for opportunistic networks. 85-96 - Thomas Zahn, Greg O'Shea, Antony I. T. Rowstron:

Feasibility of content dissemination between devices in moving vehicles. 97-108 - Ashish Sharma, Vishnu Navda, Ramachandran Ramjee, Venkata N. Padmanabhan, Elizabeth M. Belding:

Cool-Tether: energy efficient on-the-fly wifi hot-spots using mobile phones. 109-120
New architectures II
- Daniel Sadoc Menasché, Antônio Augusto de Aragão Rocha, Bin Li, Donald F. Towsley

, Arun Venkataramani:
Content availability and bundling in swarming systems. 121-132 - Alex Sherman, Jason Nieh, Clifford Stein:

FairTorrent: bringing fairness to peer-to-peer systems. 133-144 - David A. Sontag, Yang Zhang, Amar Phanishayee, David G. Andersen, David R. Karger

:
Scaling all-pairs overlay routing. 145-156
Privacy and security
- Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. Zhao:

StarClique: guaranteeing user privacy in social networks against intersection attacks. 157-168 - Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali, Alec Wolman:

Lockr: better privacy for social networks. 169-180 - Konstantinos Pelechrinis, Ioannis Broustis, Srikanth V. Krishnamurthy

, Christos Gkantsidis:
ARES: an anti-jamming reinforcement system for 802.11 networks. 181-192
Measurement I
- John R. Douceur, James W. Mickens, Thomas Moscibroda, Debmalya Panigrahi:

ThunderDome: discovering upload constraints using decentralized bandwidth tournaments. 193-204 - Edmond W. W. Chan, Xiapu Luo

, Rocky K. C. Chang
:
A minimum-delay-difference method for mitigating cross-traffic impact on capacity measurement. 205-216 - Kai Chen

, David R. Choffnes, Rahul Potharaju, Yan Chen, Fabian E. Bustamante, Dan Pei
, Yao Zhao:
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users. 217-228
Measurement II
- Lucian Popa, Byung-Gon Chun, Ion Stoica, Jaideep Chandrashekar, Nina Taft:

Macroscope: end-point approach to networked application dependency discovery. 229-240 - Marios Iliofotou, Michalis Faloutsos

, Michael Mitzenmacher:
Exploiting dynamicity in graph-based traffic analysis: techniques and applications. 241-252 - Kaushik Lakshminarayanan, Samir Sapra, Srinivasan Seshan

, Peter Steenkiste
:
RFDump: an architecture for monitoring the wireless ether. 253-264
Network management
- Christos Gkantsidis, Thomas Karagiannis, Peter B. Key, Bozidar Radunovic, Elias Raftopoulos, D. Manjunath:

Traffic management and resource allocation in small wired/wireless networks. 265-276 - Xu Chen, Zhuoqing Morley Mao, Jacobus E. van der Merwe:

PACMAN: a platform for automated and controlled network operations and configuration management. 277-288 - Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nick Feamster, Mostafa H. Ammar:

Detecting network neutrality violations with causal inference. 289-300
Newl architectures II
- Ang Li, Xiaowei Yang, David Wetherall:

SafeGuard: safe forwarding during route changes. 301-312 - Minlan Yu, Alex Fabrikant, Jennifer Rexford

:
BUFFALO: bloom filter forwarding architecture for large organizations. 313-324 - Anthony Lambert, Marc-Olivier Buob, Steve Uhlig

:
Improving internet-wide routing protocols convergence with MRPC timers. 325-336 - Cheng-Lin Tsao, Raghupathy Sivakumar:

On effectively exploiting multiple wireless interfaces in mobile hosts. 337-348

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














