


default search action
ACM SIGCOMM Conference 2006: Pisa, Italy
- Luigi Rizzo, Thomas E. Anderson, Nick McKeown:

Proceedings of the ACM SIGCOMM 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, September 11-15, 2006. ACM 2006, ISBN 1-59593-308-5 - Domenico Ferrari:

Humble beginnings, uncertain end: getting the internet to provide performance guarantees. 1-2
Architecture
- Andy C. Bavier, Nick Feamster, Mark Huang, Larry L. Peterson, Jennifer Rexford

:
In VINI veritas: realistic and controlled network experimentation. 3-14 - Sylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenker

:
Revisiting IP multicast. 15-26 - Eddie Kohler, Mark Handley, Sally Floyd:

Designing DCCP: congestion control without reliability. 27-38
Wireless
- Yuchung Cheng, John Bellardo

, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Jigsaw: solving the puzzle of enterprise 802.11 analysis. 39-50 - Charles Reis, Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan:

Measurement-based models of delivery and interference in static wireless networks. 51-62 - Sumit Rangwala, Ramakrishna Gummadi, Ramesh Govindan, Konstantinos Psounis:

Interference-aware fair rate control in wireless sensor networks. 63-74 - Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan:

Analyzing the MAC-level behavior of wireless networks in the wild. 75-86
Network
- Michael Menth, Rüdiger Martin, Joachim Charzinski:

Capacity overprovisioning for networks with resilience requirements. 87-98 - Hao Wang, Haiyong Xie, Lili Qiu, Yang Richard Yang, Yin Zhang, Albert G. Greenberg:

COPE: traffic engineering in dynamic networks. 99-110
Analysis
- Kashi Venkatesh Vishwanath, Amin Vahdat:

Realistic and responsive network traffic generation. 111-122 - Yuming Jiang

:
A basic stochastic network calculus. 123-134 - Priya Mahadevan, Dmitri V. Krioukov

, Kevin R. Fall, Amin Vahdat:
Systematic topology analysis and generation using degree correlations. 135-146 - Brighten Godfrey, Scott Shenker

, Ion Stoica:
Minimizing churn in distributed systems. 147-158
Routing 1
- Xiaowei Yang, David Wetherall:

Source selectable path diversity via routing deflections. 159-170 - Wen Xu, Jennifer Rexford

:
MIRO: multi-path interdomain routing. 171-182 - Paul Laskowski, John Chuang

:
Network monitors and contracting systems: competition and innovation. 183-194
Measurement
- Wolfgang Mühlbauer, Anja Feldmann

, Olaf Maennel
, Matthew Roughan
, Steve Uhlig
:
Building an AS-topology model that captures route diversity. 195-206 - Kenjiro Cho

, Kensuke Fukuda
, Hiroshi Esaki, Akira Kato:
The impact and implications of the growth in residential user-to-user traffic. 207-218 - Yao Zhao, Yan Chen, David Bindel

:
Towards unbiased end-to-end network diagnosis. 219-230 - François Baccelli, Sridhar Machiraju, Darryl Veitch, Jean Bolot:

The role of PASTA in network measurement. 231-242
Coding
- Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Médard, Jon Crowcroft:

XORs in the air: practical wireless network coding. 243-254 - Abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rubenstein:

Growth codes: maximizing sensor network data persistence. 255-266
Security
- Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman:

SybilGuard: defending against sybil attacks via social networks. 267-278 - Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang:

Modeling adoptability of secure BGP protocol. 279-290 - Anirudh Ramachandran, Nick Feamster:

Understanding the network-level behavior of spammers. 291-302 - Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David R. Karger

, Scott Shenker
:
DDoS defense by offense. 303-314
Hardware
- Flavio Bonomi, Michael Mitzenmacher, Rina Panigrahy, Sushil Singh, George Varghese:

Beyond bloom filters: from approximate membership checks to approximate state machines. 315-326 - George Varghese, J. Andrew Fingerhut, Flavio Bonomi:

Detecting evasion attacks at high speeds without reassembly. 327-338 - Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patrick Crowley, Jonathan S. Turner:

Algorithms to accelerate multiple regular expressions matching for deep packet inspection. 339-350
Routing 2
- Matthew Caesar

, Miguel Castro, Edmund B. Nightingale, Greg O'Shea, Antony I. T. Rowstron:
Virtual ring routing: network routing inspired by DHTs. 351-362 - Matthew Caesar

, Tyson Condie, Jayanthkumar Kannan, Karthik Lakshminarayanan, Ion Stoica:
ROFL: routing on flat labels. 363-374 - Feng Wang

, Zhuoqing Morley Mao, Jia Wang, Lixin Gao, Randy Bush:
A measurement study on the impact of routing events on end-to-end internet path performance. 375-386 - Chi-Kin Chau

:
Policy-based routing with non-strict preferences. 387-398
Applications
- Kuan-Ta Chen, Chun-Ying Huang

, Polly Huang, Chin-Laung Lei:
Quantifying Skype user satisfaction. 399-410 - Yu-Wei Eric Sung, Michael A. Bishop, Sanjay G. Rao:

Enabling contribution awareness in an overlay broadcasting system. 411-422 - Christos Gkantsidis, Thomas Karagiannis, Pablo Rodriguez, Milan Vojnovic:

Planet scale software updates. 423-434 - Ao-Jan Su, David R. Choffnes, Aleksandar Kuzmanovic, Fabián E. Bustamante:

Drafting behind Akamai (travelocity-based detouring). 435-446

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














