


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 42 matches
- 2015
- Ahmed Osama Fathy Atya, Karthikeyan Sundaresan, Srikanth V. Krishnamurthy
, Mohammad Ali Khojastepour, Sampath Rangarajan:
BOLT: realizing high throughput power line communication networks. CoNEXT 2015: 39:1-39:13 - Arijit Banerjee, Rajesh Mahindra, Karthik Sundaresan, Sneha Kumar Kasera, Kobus van der Merwe, Sampath Rangarajan:
Scaling the LTE control-plane for future mobile access. CoNEXT 2015: 19:1-19:13 - Nimantha Thushan Baranasuriya, Vishnu Navda, Venkata N. Padmanabhan, Seth Gilbert
:
QProbe: locating the bottleneck in cellular communication. CoNEXT 2015: 33:1-33:7 - Juan Miguel Carrascosa, Jakub Mikians, Rubén Cuevas Rumín
, Vijay Erramilli, Nikolaos Laoutaris
:
I always feel like somebody's watching me: measuring online behavioural advertising. CoNEXT 2015: 13:1-13:13 - Balakrishnan Chandrasekaran
, Georgios Smaragdakis
, Arthur W. Berger, Matthew J. Luckie
, Keung-Chi Ng:
A server-to-server view of the internet. CoNEXT 2015: 40:1-40:13 - Danilo Cicalese, Jordan Augé, Diana Joumblatt, Timur Friedman, Dario Rossi:
Characterizing IPv4 anycast adoption and deployment. CoNEXT 2015: 16:1-16:13 - Giorgos Dimopoulos
, Ilias Leontiadis, Pere Barlet-Ros
, Konstantina Papagiannaki, Peter Steenkiste
:
Identifying the root cause of video streaming issues on mobile devices. CoNEXT 2015: 24:1-24:13 - Peter Xiang Gao, Akshay Narayan, Gautam Kumar, Rachit Agarwal, Sylvia Ratnasamy, Scott Shenker:
pHost: distributed near-optimal datacenter transport over commodity network fabric. CoNEXT 2015: 1:1-1:12 - Vasileios Giotsas
, Georgios Smaragdakis
, Bradley Huffaker, Matthew J. Luckie
, kc claffy
:
Mapping peering interconnections to a facility. CoNEXT 2015: 37:1-37:13 - Marco Gramaglia, Marco Fiore:
Hiding mobile traffic fingerprints with GLOVE. CoNEXT 2015: 26:1-26:13 - Bo Han, Feng Qian, Shuai Hao, Lusheng Ji:
An anatomy of mobile web performance over multipath TCP. CoNEXT 2015: 5:1-5:7 - Adiseshu Hari, T. V. Lakshman, Gordon T. Wilfong:
Path switching: reduced-state flow handling in SDN using path information. CoNEXT 2015: 36:1-36:7 - Benjamin Hesmans, Gregory Detal, Sébastien Barré, R. Bauduin, Olivier Bonaventure:
SMAPP: towards smart multipath TCP-enabled applications. CoNEXT 2015: 28:1-28:7 - Pengfei Hu
, Parth H. Pathak, Xiaotao Feng, Hao Fu, Prasant Mohapatra:
ColorBars: increasing data rate of LED-to-camera communication using color shift keying. CoNEXT 2015: 12:1-12:13 - Nanxi Kang, Monia Ghobadi, John Reumann, Alexander Shraer, Jennifer Rexford
:
Efficient traffic splitting on commodity switches. CoNEXT 2015: 6:1-6:13 - Nanxi Kang, Ori Rottenstreich, Sanjay G. Rao, Jennifer Rexford
:
Alpaca: compact network policies with attribute-carrying addresses. CoNEXT 2015: 7:1-7:13 - Rajat Kateja, Nimantha Thushan Baranasuriya, Vishnu Navda, Venkata N. Padmanabhan:
DiversiFi: robust multi-link interactive streaming. CoNEXT 2015: 35:1-35:13 - Yannick Léo, Christophe Crespelle, Eric Fleury:
Non-altering time scales for aggregation of dynamic networks into series of graphs. CoNEXT 2015: 29:1-29:7 - Qingxi Li, Mo Dong, Philip Brighten Godfrey:
Halfback: running short flows quickly and safely. CoNEXT 2015: 22:1-22:13 - Marc Liechti, Vincent Lenders
, Domenico Giustiniano
:
Jamming mitigation by randomized bandwidth hopping. CoNEXT 2015: 11:1-11:13 - Yeon-Sup Lim, Yung-Chih Chen, Erich M. Nahum, Don Towsley
, Richard J. Gibbens, Emmanuel Cecchet:
Design, implementation, and evaluation of energy-aware multi-path TCP. CoNEXT 2015: 30:1-30:13 - He Liu, Matthew K. Mukerjee, Conglong Li, Nicolas Feltman, George Papen, Stefan Savage, Srinivasan Seshan
, Geoffrey M. Voelker, David G. Andersen, Michael Kaminsky, George Porter, Alex C. Snoeren:
Scheduling techniques for hybrid circuit/packet networks. CoNEXT 2015: 41:1-41:13 - Vincent Liu, Danyang Zhuo, Simon Peter, Arvind Krishnamurthy, Thomas E. Anderson:
Subways: a case for redundant, inexpensive data center edge links. CoNEXT 2015: 27:1-27:13 - Richard T. B. Ma
, Don Towsley
:
Cashing in on caching: on-demand contract design with linear pricing. CoNEXT 2015: 8:1-8:6 - Tong Meng, Fan Wu, Aijing Li, Guihai Chen
, Nitin H. Vaidya:
On robust neighbor discovery in mobile wireless networks. CoNEXT 2015: 38:1-38:13 - Uma Parthavi Moravapalle
, Shruti Sanadhya, Abhinav Parate, Kyu-Han Kim:
Pulsar: improving throughput estimation in enterprise LTE small cells. CoNEXT 2015: 20:1-20:7 - Masoud Moshref, Minlan Yu, Ramesh Govindan, Amin Vahdat:
SCREAM: sketch resource allocation for software-defined measurement. CoNEXT 2015: 14:1-14:13 - Georgios Nikolaidis, Mark Handley, Kyle Jamieson
, Brad Karp:
COPA: cooperative power allocation for interfering wireless networks. CoNEXT 2015: 18:1-18:13 - Thomas Nitsche, Guillermo Bielsa, Irene Tejado, Adrian Loch, Joerg Widmer
:
Boon and bane of 60 GHz networks: practical insights into beamforming, interference, and frame level operation. CoNEXT 2015: 17:1-17:13 - Peter Peresíni
, Maciej Kuzniar, Dejan Kostic
:
Monocle: dynamic, fine-grained data plane monitoring. CoNEXT 2015: 32:1-32:13
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-06-22 17:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
