default search action
IMC 2004: Taormina, Sicily, Italy
- Alfio Lombardo, James F. Kurose:
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, IMC 2004, Taormina, Sicily, Italy, October 25-27, 2004. ACM 2004, ISBN 1-58113-821-0
DNS
- Jeffrey Pang, James Hendricks, Aditya Akella, Roberto De Prisco, Bruce M. Maggs, Srinivasan Seshan:
Availability, usage, and deployment characteristics of the domain name system. 1-14 - David Malone:
The root of the matter: hints or slaves. 15-20 - Jeffrey Pang, Aditya Akella, Anees Shaikh, Balachander Krishnamurthy, Srinivasan Seshan:
On the responsiveness of DNS-based network control. 21-26
Traffic characterization
- Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry L. Peterson:
Characteristics of internet background radiation. 27-40 - Kunwadee Sripanidkulchai, Bruce M. Maggs, Hui Zhang:
An analysis of live streaming workloads on the internet. 41-54 - Alexander Klemm, Christoph Lindemann, Mary K. Vernon, Oliver P. Waldhorst:
Characterizing the query behavior in peer-to-peer file sharing systems. 55-67
Traffic generation and analysis
- Joel Sommers, Paul Barford:
Self-configuring network traffic generation. 68-81 - Joel Sommers, Vinod Yegneswaran, Paul Barford:
A framework for malicious workload generation. 82-87 - Walter Willinger, David L. Alderson, Lun Li:
A pragmatic approach to dealing with high-variability in network measurements. 88-100 - Yin Zhang, Sumeet Singh, Subhabrata Sen, Nick G. Duffield, Carsten Lund:
Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications. 101-114
Identification and classification
- Tatsuya Mori, Masato Uchida, Ryoichi Kawahara, Jianping Pan, Shigeki Goto:
Identifying elephant flows through periodically sampled packets. 115-120 - Thomas Karagiannis, Andre Broido, Michalis Faloutsos, Kimberly C. Claffy:
Transport layer identification of P2P traffic. 121-134 - Matthew Roughan, Subhabrata Sen, Oliver Spatscheck, Nick G. Duffield:
Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification. 135-148
Traffic matrix estimation and tomography
- Anders Gunnar, Mikael Johansson, Thomas Telkamp:
Traffic matrix estimation on a large IP backbone: a comparison on real data. 149-160 - Konstantina Papagiannaki, Nina Taft, Anukool Lakhina:
A distributed approach to measure IP traffic matrices. 161-174 - Yolanda Tsang, Mehmet Can Yildiz, Paul Barford, Robert D. Nowak:
Network radar: tomography from round trip time measurements. 175-180 - Ritesh Kumar, Jasleen Kaur:
Efficient beacon placement for network tomography. 181-186
Detection
- Ramana Rao Kompella, Sumeet Singh, George Varghese:
On scalable attack detection in the network. 187-200 - Anukool Lakhina, Mark Crovella, Christophe Diot:
Characterization of network-wide anomalies in traffic flows. 201-206 - Robert T. Schweller, Ashish Gupta, Elliot Parsons, Yan Chen:
Reversible sketches for efficient and accurate change detection over network data streams. 207-212 - Nick Feamster, Zhuoqing Morley Mao, Jennifer Rexford:
BorderGuard: detecting cold potatoes from peers. 213-218
Measurement tools
- Darryl Veitch, Satish Babu Korada, Attila Pásztor:
Robust synchronization of software clocks across the internet. 219-232 - Loris Degioanni, Gianluca Varenni:
Introducing scalability in network measurement: toward 10 Gbps with commodity hardware. 233-238 - David A. Maltz, Jibin Zhan, Geoffrey G. Xie, Hui Zhang, Gísli Hjálmtýsson, Albert G. Greenberg, Jennifer Rexford:
Structure preserving anonymization of router configuration data. 239-244 - Sachin Katti, Dina Katabi, Charles Blake, Eddie Kohler, Jacob Strauss:
MultiQ: automated detection of multiple bottleneck capacities along a path. 245-250 - Andy Rupp, Holger Dreger, Anja Feldmann, Robin Sommer:
Packet trace manipulation rramework for test labs. 251-256 - Vladimir Brik, Jesse Stroik, Suman Banerjee:
Debugging DHCP performance. 257-262
Lessons learned
- Vern Paxson:
Strategies for sound internet measurement. 263-271 - Manish Jain, Constantinos Dovrolis:
Ten fallacies and pitfalls on end-to-end available bandwidth estimation. 272-277
Distance and location
- Yun Mao, Lawrence K. Saul:
Modeling distances in large-scale networks by matrix factorization. 278-287 - Bamba Gueye, Artur Ziviani, Mark Crovella, Serge Fdida:
Constraint-based geolocation of internet hosts. 288-293 - Sanghwan Lee, Zhi-Li Zhang, Srihari Nelakuditi:
Exploiting as hierarchy for scalable route selection in multi-homed stub networks. 294-299
Bandwidth and traffic estimation techniques
- Xiliang Liu, Kaliappa Nadar Ravindran, Benyuan Liu, Dmitri Loguinov:
Single-hop probing asymptotics in available bandwidth estimation: sample-path analysis. 300-313 - Karthik Lakshminarayanan, Venkata N. Padmanabhan, Jitendra Padhye:
Bandwidth estimation in broadband access networks. 314-321 - Anja Feldmann, Nils Kammenhuber, Olaf Maennel, Bruce M. Maggs, Roberto De Prisco, Ravi Sundaram:
A methodology for estimating interdomain web traffic demand. 322-335
Traffic characterization and SPAM
- Alberto Medina, Mark Allman, Sally Floyd:
Measuring interactions between transport protocols and middleboxes. 336-341 - Satish Raghunath, K. K. Ramakrishnan, Shivkumar Kalyanaraman, Chris Chase:
Measurement based characterization and provisioning of IP VPNs. 342-355 - Luíz Henrique Gomes, Cristiano Cazita, Jussara M. Almeida, Virgílio A. F. Almeida, Wagner Meira Jr.:
Characterizing a spam traffic. 356-369 - Jaeyeon Jung, Emil Sit:
An empirical study of spam traffic and the use of DNS black lists. 370-375
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.