default search action
Computer Communication Review (ACM SIGCOMM), Volume 40
Volume 40, Number 1, January 2010
- Martin Burkhart, Dominik Schatzmann, Brian Trammell, Elisa Boschi, Bernhard Plattner:
The role of network trace anonymization under attack. 5-11 - Yao Liang, Wei Peng:
Minimizing energy consumptions in wireless sensor networks via two-modal transmission. 12-18
- Daniel Halperin, Wenjun Hu, Anmol Sheth, David Wetherall:
802.11 with multiple antennas for dummies. 19-25 - Parag Kulkarni, Woon Hau Chin, Tim Farnham:
Radio resource management considerations for LTE Femto cells. 26-30 - Brian E. Carpenter, Craig Partridge:
Internet requests for comments (RFCs) as scholarly publications. 31-33 - Dah-Ming Chiu, Tom Z. J. Fu:
"Publish or Perish" in the Internet Age: a study of publication statistics in computer networking research. 34-43 - Nathan Farrington, Nikhil Handigol, Christoph P. Mayer, Kok-Kiong Yap, Jeffrey C. Mogul:
Report on WREN 2009 -- workshop: research on enterprise networking. 44-49 - Ken Keys:
Internet-scale IP alias resolution techniques. 50-55
- James Kelly, Wladimir Araujo, Kallol Banerjee:
Rapid service creation using the JUNOS SDK. 56-60 - Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. van der Merwe:
DECOR: DEClarative network management and OpeRation. 61-66 - Fang Hao, T. V. Lakshman, Sarit Mukherjee, Haoyu Song:
Enhancing dynamic cloud-based services using network virtualization. 67-74 - Muhammad Bilal Anwer, Nick Feamster:
Building a fast, virtualized data plane with programmable hardware. 75-82 - Huan Liu, Dan Orban:
Remote network labs: an on-demand network cloud for configuration testing. 83-91 - Theophilus Benson, Ashok Anand, Aditya Akella, Ming Zhang:
Understanding data center traffic characteristics. 92-99 - Xuan Bao, Romit Roy Choudhury:
VUPoints: collaborative sensing and video recording through mobile phones. 100-105 - Stephen M. Rumble, Ryan Stutsman, Philip Alexander Levis, David Mazières, Nickolai Zeldovich:
Apprehending joule thieves with cinder. 106-111 - Balachander Krishnamurthy, Craig E. Wills:
On the leakage of personally identifiable information via online social networks. 112-117 - John Kit Tang, Mirco Musolesi, Cecilia Mascolo, Vito Latora:
Characterising temporal distance and reachability in mobile and online social networks. 118-124
- Kok-Kiong Yap, Masayoshi Kobayashi, Rob Sherwood, Te-Yuan Huang, Michael Chan, Nikhil Handigol, Nick McKeown:
OpenRoads: empowering research in mobile networks. 125-126 - Norbert Egi, Adam Greenhalgh, Mark Handley, Mickaël Hoerdt, Felipe Huici, Laurent Mathy, Panagiotis Papadimitriou:
A platform for high performance and flexible virtual routers on commodity hardware. 127-128 - Rob Sherwood, Michael Chan, G. Adam Covington, Glen Gibb, Mario Flajslik, Nikhil Handigol, Te-Yuan Huang, Peyman Kazemian, Masayoshi Kobayashi, Jad Naous, Srinivasan Seetharaman, David Underhill, Tatsuya Yabe, Kok-Kiong Yap, Yiannis Yiakoumis, Hongyi Zeng, Guido Appenzeller, Ramesh Johari, Nick McKeown, Guru M. Parulkar:
Carving research slices out of your production networks with OpenFlow. 129-130 - Christian Hübsch, Christoph P. Mayer, Sebastian Mies, Roland Bless, Oliver P. Waldhorst, Martina Zitterbart:
Reconnecting the internet with ariba: self-organizing provisioning of end-to-end connectivity in heterogeneous networks. 131-132
Volume 40, Number 2, April 2010
- Hilary K. Finucane, Michael Mitzenmacher:
An improved analysis of the lossy difference aggregator. 4-11 - Marta Carbone, Luigi Rizzo:
Dummynet revisited. 12-20 - Hamed Haddadi:
Fighting online click-fraud using bluff ads. 21-25 - Dirk Trossen, Mikko Särelä, Karen R. Sollins:
Arguments for an information-centric internetworking architecture. 26-33 - Pei-Chun Cheng, Xin Zhao, Beichuan Zhang, Lixia Zhang:
Longitudinal study of BGP monitor session failures. 34-42 - David R. Choffnes, Fabian E. Bustamante:
Pitfalls for testbed evaluations of internet systems. 43-50
- Diana Joumblatt, Renata Teixeira, Jaideep Chandrashekar, Nina Taft:
Perspectives on tracing end-hosts: a survey summary. 51-55 - kc claffy:
Workshop on internet economics (WIE2009) report. 56-59 - Ratul Mahajan:
How to build a research system in your spare time. 60-65 - Matthew Caesar, Martín Casado, Teemu Koponen, Jennifer Rexford, Scott Shenker:
Dynamic route recomputation considered harmful. 66-71 - Constantine Dovrolis, J. Todd Streelman:
Evolvable network architectures: what can we learn from biology? 72-77 - Hamed Haddadi, Tristan Henderson, Jon Crowcroft:
The ambient Loo: caught short when nature calls? 78
Volume 40, Number 3, July 2010
- Sardar Ali, Irfan Ul Haq, Sajjad Rizvi, Naurin Rasheed, Unum Sarfraz, Syed Ali Khayam, Fauzan Mirza:
On mitigating sampling-induced accuracy loss in traffic anomaly detection systems. 4-16 - Roch Guérin, Kartik Hosanagar:
Fostering IPv6 migration through network quality differentials. 17-25 - Nandita Dukkipati, Tiziana Refice, Yuchung Cheng, Jerry Chu, Tom Herbert, Amit Agarwal, Arvind Jain, Natalia Sutin:
An argument for increasing TCP's initial congestion window. 26-33 - Zuoning Yin, Matthew Caesar, Yuanyuan Zhou:
Towards understanding bugs in open source router software. 34-40 - Michael Buettner, David Wetherall:
A "Gen 2" RFID monitor based on the USRP. 41-47
- Jon Crowcroft:
FIE: future internet enervation. 48-52 - Constantine Dovrolis, P. Krishna Gummadi, Aleksandar Kuzmanovic, Sascha D. Meinrath:
Measurement lab: overview and an invitation to the research community. 53-56
Volume 40, Number 4, October 2010
- Shivkumar Kalyanaraman, Venkata N. Padmanabhan, K. K. Ramakrishnan, Rajeev Shorey, Geoffrey M. Voelker:
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010. ACM 2010, ISBN 978-1-4503-0201-2 [contents]
Volume 40, Number 5, October 2010
- László Gyarmati, Tuan Anh Trinh:
Scafida: a scale-free network inspired data center architecture. 4-12 - Igor Ganichev, Bin Dai, Brighten Godfrey, Scott Shenker:
YAMR: yet another multipath routing protocol. 13-19 - Niccolo Cascarano, Pierluigi Rolando, Fulvio Risso, Riccardo Sisto:
iNFAnt: NFA pattern matching on GPGPU devices. 20-26 - Mark Allman:
On building special-purpose social networks for emergency communication. 27-34 - Alisa Devlic:
SIP-based context distribution: does aggregation pay off? 35-46
- Augusto Ciuffoletti:
Monitoring a virtual network infrastructure: an IaaS perspective. 47-52 - kc claffy, Emile Aben, Jordan Augé, Robert Beverly, Fabián E. Bustamante, Benoit Donnet, Timur Friedman, Marina Fomenkov, Péter Hága, Matthew J. Luckie, Yuval Shavitt:
The 2nd workshop on active internet measurements (AIMS-2) report. 53-58 - Anthony M. Rutkowski, Youki Kadobayashi, Inette Furey, Damir Rajnovic, Robert Martin, Takeshi Takahashi, Craig Schultz, Gavin Reid, Gregg Schudel, Mike Hird, Stephen Adegbite:
CYBEX: the cybersecurity information exchange framework (x.1500). 59-64 - Balachander Krishnamurthy:
I know what you will do next summer. 65-70 - Andreas Mäder, Nader Zein:
OFDMA in the field: current and future challenges. 71-76
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.