


default search action
3. CoNEXT 2007: New York, NY, USA
- Jim Kurose, Henning Schulzrinne:

Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2007, New York, NY, USA, December 10-13, 2007. ACM 2007, ISBN 978-1-59593-770-4
Security
- Michela Becchi, Patrick Crowley:

A hybrid finite automaton for practical deep packet inspection. 1 - Oliver Sharma, Mark A. Girolami

, Joseph S. Sventek:
Detecting worm variants using machine learning. 2 - Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing Morley Mao:

Practical defenses against BGP prefix hijacking. 3 - Yu Jin, Esam Sharafuddin, Zhi-Li Zhang:

Identifying dynamic IP address blocks serendipitously through background scanning traffic. 4
New architectures and their evaluation
- Dilip Antony Joseph, Nikhil Shetty, John Chuang

, Ion Stoica:
Modeling the adoption of new network architectures. 5 - Richard T. B. Ma

, Dah-Ming Chiu, John C. S. Lui, Vishal Misra, Dan Rubenstein:
Internet economics: the use of Shapley value for ISP settlement. 6 - Luigi Iannone, Olivier Bonaventure:

On the cost of caching locator/ID mappings. 7
Improving communication efficiency
- Eric Rozner, Anand Padmanabha Iyer

, Yogita Mehta, Lili Qiu, Mansoor Jafry:
ER: efficient retransmission scheme for wireless LANs. 8 - Björn Scheuermann, Wenjun Hu, Jon Crowcroft:

Near-optimal co-ordinated coding in wireless multihop networks. 9 - Christos Gkantsidis, Wenjun Hu, Peter B. Key, Bozidar Radunovic, Pablo Rodriguez, Steluta Gheorghiu:

Multipath code casting for wireless mesh networks. 10 - Bing Wang, Wei Wei, Zheng Guo, Donald F. Towsley

:
Multipath live streaming via TCP: scheme, performance and benefits. 11
Delay tolerant networks
- Augustin Chaintreau

, Abderrahmen Mtibaa, Laurent Massoulié, Christophe Diot:
The diameter of opportunistic mobile networks. 12 - Shimin Guo, Srinivasan Keshav

:
Fair and efficient scheduling in data ferrying networks. 13 - Mathias Boc, Anne Fladenmuller

, Marcelo Dias de Amorim:
Otiy: locators tracking nodes. 14
Network engineering, monitoring, and modeling
- Ravi S. Prasad, Constantine Dovrolis, Marina Thottan:

Router buffer sizing revisited: the role of the output/input capacity ratio. 15 - Kin Wah Kwong, Roch Guérin, Anees Shaikh, Shu Tao:

Improving service differentiation in IP networks through dual topology routing. 16 - Jiayue He, Martin Suchara

, Ma'ayan Bresler, Jennifer Rexford
, Mung Chiang:
Rethinking internet traffic management: from multiple decompositions to a practical protocol. 17 - Amogh Dhamdhere, Renata Teixeira, Constantine Dovrolis, Christophe Diot:

NetDiagnoser: troubleshooting network unreachabilities using end-to-end probes and routing data. 18
Mesh networks
- Vivek Mhatre, Henrik Lundgren, François Baccelli, Christophe Diot:

Joint MAC-aware routing and load balancing in mesh networks. 19 - Edward Bortnikov, Israel Cidon, Idit Keidar:

Scalable real-time gateway assignment in mobile mesh networks. 20 - Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charlie Hu:

Practical service provisioning for wireless meshes. 21
Wireless and ad hoc networks
- Niky Riga, Ibrahim Matta

, Alberto Medina, Craig Partridge, Jason Redi:
An energy-conscious transport protocol for multi-hop wireless networks. 22 - Björn Scheuermann, Matthias Transier, Christian Lochert, Martin Mauve, Wolfgang Effelsberg:

Backpressure multicast congestion control in mobile ad-hoc networks. 23 - Yan Grunenberger, Martin Heusse, Franck Rousseau

, Andrzej Duda
:
Experience with an implementation of the Idle Sense wireless access method. 24
Resiliency
- Jian Wu, Ying Zhang, Zhuoqing Morley Mao, Kang G. Shin:

Internet routing resilience to failures: analysis and implications. 25 - Ang Li, Pierre François, Xiaowei Yang:

On improving the efficiency and manageability of NotVia. 26 - Alessandro Duminuco, Ernst W. Biersack, Taoufik En-Najjary:

Proactive replication in distributed storage systems using machine availability estimation. 27 - Damiano Carra, Ernst W. Biersack:

Building a reliable P2P system out of unreliable P2P clients: the case of KAD. 28
CoNext student workshop
- Adel Aziz, Roger P. Karrer, Patrick Thiran:

Promoting fluidity in the flow of packets of 802.11 wireless mesh networks. 29 - Salim Nahle, Naceur Malouch:

Fairness enhancement in wireless mesh networks. 30 - Konstantinos V. Katsaros

, George C. Polyzos
:
Towards the realization of a mobile grid. 31 - Alberto Dainotti

, Alessio Botta
, Antonio Pescapè:
Do you know what you are generating? 32 - Roman Spanek, Premysl Kovar, Pavel Pirkl:

The BlueGame project: ad-hoc multilayer mobile game with social dimension. 33 - Thabotharan Kathiravelu, Arnold Pears

:
Reproducing opportunistic connectivity traces using connectivity models. 34 - André O. Castelucio, Ronaldo M. Salles

, Artur Ziviani
:
An AS-level IP traceback system. 35 - Suman Srinivasan, Henning Schulzrinne:

BonSwing: A GUI framework for ad-hoc applications using service discovery. 36 - Gwendal Simon

, Yiping Chen, Ali Boudani:
A quicker way to discover nearby peers. 37 - Mohammad Nassiri

, Fabrice Theoleyre
, Martin Heusse, Andrzej Duda
:
Molecular architecture for autonomic wireless mesh networks. 38 - Thomas Silverston, Olivier Fourmaux

, Kavé Salamatian
, Kenjiro Cho:
Measuring P2P IPTV traffic on both sides of the world. 39 - Jaeouk Ok, Pedro Morales, Hiroyuki Morikawa:

Replacing channel scanning with multiple authentication for fast handoff in IEEE 802.11 wireless networks. 40 - Virginie Van den Schrieck:

Automating the iBGP organization in large IP networks. 41 - Katerina Dufková, Jirí Danihelka, Michal Ficek, Ivan Gregor, Jan Kouba:

Can active tracking of inroamer location optimise a live GSM network? 42 - Alberto Hernández, Enrique Vázquez

, Carolina Garcia:
Towards next generation network requirements for next generation gaming. 43 - Vytautas Valancius, Nick Feamster:

Multiplexing BGP sessions with BGP-Mux. 44 - Damien Saucez, Benoit Donnet

, Olivier Bonaventure:
Implementation and preliminary evaluation of an ISP-driven informed path selection. 45 - Purvi Shah, Jehan-François Pâris

, Jeff Morgan, John Schettino, Chandrasekar Venkatraman, Miranda Mowbray:
Resource-efficient software delivery using volunteer assistance. 46 - Vinod Namboodiri, Lixin Gao:

Can we reduce Wi-Fi energy consumption during VoIP calls? 47 - Wei Zeng, Bing Wang, Krishna R. Pattipati:

Probabilistic inference of lossy links using end-to-end data in sensor networks. 48 - Nishanth Sastry

:
Folksonomy-based reasoning in opportunistic networks. 49 - Naveen Santhapuri, Srihari Nelakuditi, Romit Roy Choudhury:

Capture-aware staggering for concurrent transmissions. 50 - Michael O. Adeyeye

, Neco Ventura
:
Extending web browsers architectures to support HTTP session mobility. 51 - Martin Suchara

, Ioannis C. Avramopoulos, Jennifer Rexford
:
Securing BGP incrementally. 52 - Saumitra M. Das, Konstantina Papagiannaki, Suman Banerjee, Y. C. Tay:

SWARM: self-organization of community wireless mesh networks. 53 - Soo Hyun Choi, Mark Handley:

Fairer TCP-friendly congestion control protocol for multimedia streaming applications. 54 - Damien Leroy, Olivier Bonaventure:

A secure role-based address allocation and distribution mechanism. 55 - Anirban Banerjee, Dhiman Barman:

Characterizing quality of content distribution from YouTube like portals. 56 - Sana Tmar, Eric Fleury:

Towards a clustering based data diffusion protocol in delay tolerant networks. 57 - Zied Ben-Houidi, Renata Teixeira, Marc Capelle:

Origin of route explosion in virtual private networks. 58 - Amelie Medem Kuatse, Renata Teixeira, Mickael Meulle:

Characterizing network events and their impact on routing. 59 - Kristján Valur Jónsson, Ólafur Ragnar Helgason, Gunnar Karlsson:

A gateway for wireless broadcasting. 60 - Walter Wong, Fábio Luciano Verdi, Maurício F. Magalhães:

A next generation internet architecture for mobility and multi-homing support. 61 - Syed Sajjad Rizvi, Saroj Poudyal, Varsha Edla, Ravi Nepal:

A novel approach for creating trust to reduce malicious behavior in MANET. 62 - Guillaume Valadon, Florian Le Goff

, Christophe Berger:
Daily walks in Paris: a practical analysis of wi-fi access points. 63 - Matthias Wählisch

, Thomas C. Schmidt
:
Exploring the routing complexity of mobile multicast: a semi-empirical study. 64 - Anna Kaisa Pietiläinen, Christophe Diot:

Experimenting with real-life opportunistic communications using windows mobile devices. 65 - Matteo Varvello, Ernst W. Biersack, Christophe Diot:

A networked virtual environment over KAD. 66 - Fernando Silveira, Christophe Diot:

Identifying statistically anomalous regions in time series of network traffic. 67 - Jae Woo Lee, Henning Schulzrinne, Wolfgang Kellerer

, Zoran Despotovic:
Bootstrapping large-scale DHT networks. 68 - Yibo Wang, Jun Li:

Is your IP address prefix well-served by internet routing? 69 - Dimitrios Koutsonikolas, Syed Ali Raza Jafri

, Y. Charlie Hu:
Energy-efficient MAC and routing design in distributed beamforming sensor networks. 70 - Victoria Manfredi:

Robust routing in networks with time-varying links. 71 - Marianna Carrera, Henrik Lundgren, Theodoros Salonidis, Christophe Diot:

A cross-layer load-independent link cost metric for wireless mesh networks. 72 - Gregor Maier, Wolfgang Mühlbauer, Yevgen Rogoza, Anja Feldmann

:
Enabling seamless internet mobility. 73 - Edward C. Kaiser, Wu-chang Feng:

mod_kaPoW: mitigating DoS with transparent proof-of-work. 74 - Omer Boyaci, Henning Schulzrinne:

Application and desktop sharing. 75 - Sergio Lembo, Jani Heikkinen:

Enabling session initiation in the presence of middleboxes. 76 - Xin Huang, Tilman Wolf

:
A next generation internet state management framework. 77 - Amir H. Rasti, Reza Rejaie, Walter Willinger:

Understanding the effect of P2P overlay on the AS-level underlay. 78

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














