default search action
6. CoNEXT 2011: Tokyo, Japan
- Kenjiro Cho, Mark Crovella:
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, Co-NEXT '11, Tokyo, Japan, December 6-9, 2011. ACM 2011, ISBN 978-1-4503-1041-3 - George Nychis, Ranveer Chandra, Thomas Moscibroda, Ivan Tashev, Peter Steenkiste:
Reclaiming the white spaces: spectrum efficient coexistence with primary users. 1 - Bozidar Radunovic, Alexandre Proutière, Dinan Gunawardena, Peter B. Key:
Dynamic channel, rate selection and scheduling for white spaces. 2 - Abhishek Goswami, Luis E. Ortiz, Samir R. Das:
WiGEM: a learning-based approach for indoor localization. 3 - Hamed Soroush, Peter Gilbert, Nilanjan Banerjee, Brian Neil Levine, Mark D. Corner, Landon P. Cox:
Concurrent Wi-Fi for mobile users: analysis and measurements. 4 - Ruichuan Chen, Aman Shaikh, Jia Wang, Paul Francis:
Address-based route reflection. 5 - Franck Le, Geoffrey G. Xie, Hui Zhang:
On route aggregation. 6 - M. Abdul Alim, Timothy G. Griffin:
On the interaction of multiple routing algorithms. 7 - Theophilus Benson, Ashok Anand, Aditya Akella, Ming Zhang:
MicroTE: fine grained traffic engineering for data centers. 8 - Xiaozheng Tie, Anand Seetharam, Arun Venkataramani, Deepak Ganesan, Dennis Goeckel:
Anticipatory wireless bitrate control for blocks. 9 - Domenico Giustiniano, Stefan Mangold:
CAESAR: carrier sense-based ranging in off-the-shelf 802.11 wireless LAN. 10 - Lara B. Deek, Eduard Garcia Villegas, Elizabeth M. Belding, Sung-Ju Lee, Kevin C. Almeroth:
The impact of channel bonding on 802.11n network management. 11 - Ki-Young Jang, Shuai Hao, Anmol Sheth, Ramesh Govindan:
Snooze: energy management in 802.11n WLANs. 12 - Ajay Mahimkar, Zihui Ge, Jia Wang, Jennifer Yates, Yin Zhang, Joanne Emmons, Brian Huntley, Mark Stockert:
Rapid detection of maintenance induced changes in service performance. 13 - Yongjun Liao, Wei Du, Pierre Geurts, Guy Leduc:
Decentralized prediction of end-to-end network performance classes. 14 - Edmond W. W. Chan, Ang Chen, Xiapu Luo, Ricky K. P. Mok, Weichao Li, Rocky K. C. Chang:
TRIO: measuring asymmetric capacity with three minimum round-trip times. 15 - Richard T. B. Ma, Vishal Misra:
The public option: a non-regulatory alternative to network neutrality. 16 - Rade Stanojevic, Ignacio Castro, Sergey Gorinsky:
CIPT: using tuangou to reduce IP transit costs. 17 - Nedeljko Vasic, Prateek Bhurat, Dejan M. Novakovic, Marco Canini, Satyam Shekhar, Dejan Kostic:
Identifying and using energy-critical paths. 18 - Arun Vishwanath, Vijay Sivaraman, Zhi Zhao, Craig Russell, Marina Thottan:
Adapting router buffers for energy efficiency. 19 - Wenxuan Zhou, Qingxi Li, Matthew Caesar, Brighten Godfrey:
ASAP: a low-latency transport layer. 20 - Sivasankar Radhakrishnan, Yuchung Cheng, Jerry Chu, Arvind Jain, Barath Raghavan:
TCP fast open. 21 - Florian Schmidt, Muhammad Hamad Alizai, Ismet Aktas, Klaus Wehrle:
Refector: heuristic header error recovery for error-tolerant transmissions. 22 - Chao Zhang, Cheng Huang, Philip A. Chou, Jin Li, Sanjeev Mehrotra, Keith W. Ross, Hao Chen, Felix Livni, Jay Thaler:
Pangolin: speeding up concurrent messaging for cloud-based social gaming. 23 - Denisa Ghita, Can Karakus, Katerina J. Argyraki, Patrick Thiran:
Shifting network tomography toward a practical goal. 24 - Ashwin Rao, Arnaud Legout, Yeon-Sup Lim, Don Towsley, Chadi Barakat, Walid Dabbous:
Network characteristics of video streaming traffic. 25 - Mehdi Nikkhah, Roch Guérin, Yiu Lee, Richard Woundy:
Assessing IPv6 through web access a measurement study and its findings. 26 - Balajee Vamanan, T. N. Vijaykumar:
TreeCAM: decoupling updates and lookups in packet classification. 27 - Bhavish Agarwal, Ranjita Bhagwan, Lorenzo De Carli, Venkata N. Padmanabhan, Krishna P. N. Puttaswamy:
Deja vu: fingerprinting network problems. 28 - Zartash Afzal Uzmi, Markus E. Nebel, Ahsan Tariq, Sana Jawad, Ruichuan Chen, Aman Shaikh, Jia Wang, Paul Francis:
SMALTA: practical and near-optimal FIB aggregation. 29 - Jad Naous, Michael Walfish, Antonio Nicolosi, David Mazières, Michael Miller, Arun Seehra:
Verifying and enforcing network paths with icing. 30
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.