


default search action
ACM SIGCOMM Conference 2010: New Delhi, India
- Shivkumar Kalyanaraman, Venkata N. Padmanabhan, K. K. Ramakrishnan, Rajeev Shorey, Geoffrey M. Voelker:

Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010. ACM 2010, ISBN 978-1-4503-0201-2
Keynote address
- Radia J. Perlman:

Protocol design for effective communication among silicon or carbon-based nodes. 1-2
Wireless and measurement
- Binbin Chen

, Ziling Zhou, Yuda Zhao, Haifeng Yu:
Efficient error estimating coding: feasibility and applications. 3-14 - Sayandeep Sen, Syed Gilani, Shreesha Srinath, Stephen Schmitt, Suman Banerjee:

Design and implementation of an "approximate" communication system for wireless media applications. 15-26 - Myungjin Lee, Nick G. Duffield

, Ramana Rao Kompella:
Not all microseconds are equal: fine-grained per-flow measurements with reference latency interpolation. 27-38
Data center networks
- Kai Chen

, Chuanxiong Guo
, Haitao Wu, Jing Yuan, Zhenqian Feng, Yan Chen, Songwu Lu, Wenfei Wu
:
Generic and automatic address configuration for data center networks. 39-50 - Hussam Abu-Libdeh, Paolo Costa, Antony I. T. Rowstron, Greg O'Shea, Austin Donnelly

:
Symbiotic routing in future data centers. 51-62 - Mohammad Alizadeh, Albert G. Greenberg, David A. Maltz, Jitendra Padhye, Parveen Patel, Balaji Prabhakar, Sudipta Sengupta, Murari Sridharan:

Data center TCP (DCTCP). 63-74
Inter-domain routing and addressing
- Craig Labovitz, Scott Iekel-Johnson, Danny McPherson, Jon Oberheide, Farnam Jahanian:

Internet inter-domain traffic. 75-86 - Sharon Goldberg, Michael Schapira, Peter Hummon, Jennifer Rexford

:
How secure are secure interdomain routing protocols. 87-98 - Xue Cai, John S. Heidemann:

Understanding block-level address usage in the visible internet. 99-110
Privacy
- Tomas Isdal, Michael Piatek, Arvind Krishnamurthy, Thomas E. Anderson:

Privacy-preserving P2P data sharing with OneSwarm. 111-122 - Frank McSherry, Ratul Mahajan:

Differentially-private network trace analysis. 123-134
Wireless LANs
- Kun Tan, Ji Fang, Yuanyang Zhang, Shouyuan Chen, Lixin Shi, Jiansong Zhang, Yongguang Zhang:

Fine-grained channel access in wireless LAN. 147-158 - Daniel Halperin

, Wenjun Hu, Anmol Sheth, David Wetherall:
Predictable 802.11 packet delivery from wireless channel measurements. 159-170 - Hariharan Rahul, Haitham Hassanieh

, Dina Katabi:
SourceSync: a distributed wireless architecture for exploiting sender diversity. 171-182
Novel implementations of network components
- Muhammad Bilal Anwer, Murtaza Motiwala, Muhammad Mukarram Bin Tariq, Nick Feamster:

SwitchBlade: a platform for rapid deployment of network protocols on programmable hardware. 183-194 - Sangjin Han, Keon Jang, KyoungSoo Park, Sue B. Moon

:
PacketShader: a GPU-accelerated software router. 195-206 - Balajee Vamanan

, Gwendolyn Voskuilen, T. N. Vijaykumar:
EffiCuts: optimizing packet classification for memory and throughput. 207-218
Cloud and routing
- Franck Le, Geoffrey G. Xie, Hui Zhang:

Theory and new primitives for safely connecting routing protocol instances. 219-230 - Patrick Wendell, Joe Wenjie Jiang, Michael J. Freedman, Jennifer Rexford

:
DONAR: decentralized server selection for cloud services. 231-242 - Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, David A. Maltz, Sanjay G. Rao, Kunwadee Sripanidkulchai, Mohit Tawarmalani

:
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud. 243-254
Network IDS
- Xin Liu, Xiaowei Yang, Yong Xia:

NetFence: preventing internet denial of service from inside out. 255-266 - Fernando Silveira, Christophe Diot, Nina Taft, Ramesh Govindan:

ASTUTE: detecting a different class of traffic anomalies. 267-278 - Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen, Bin Liu, Junchen Jiang, Yuezhou Lv:

NetShield: massive semantics-based vulnerability signature matching for high-speed networks. 279-290
Network architecture and operations
- Ye Wang, Hao Wang, Ajay Mahimkar, Richard Alimi, Yin Zhang, Lili Qiu, Yang Richard Yang:

R3: resilient routing reconfiguration. 291-302 - Ajay Anil Mahimkar, Han Hee Song, Zihui Ge, Aman Shaikh, Jia Wang, Jennifer Yates, Yin Zhang, Joanne Emmons:

Detecting the performance impact of upgrades in large operational networks. 303-314 - Daniel Turner, Kirill Levchenko, Alex C. Snoeren, Stefan Savage:

California fault lines: understanding the causes and impact of network failures. 315-326
Novel technologies for data center networks
- Guohui Wang, David G. Andersen, Michael Kaminsky, Konstantina Papagiannaki, T. S. Eugene Ng, Michael Kozuch, Michael P. Ryan:

c-Through: part-time optics in data centers. 327-338 - Nathan Farrington, George Porter, Sivasankar Radhakrishnan, Hamid Hajabdolali Bazzaz, Vikram Subramanya, Yeshaiahu Fainman, George Papen, Amin Vahdat:

Helios: a hybrid electrical/optical switch architecture for modular data centers. 339-350 - Minlan Yu, Jennifer Rexford

, Michael J. Freedman, Jia Wang:
Scalable flow-based networking with DIFANE. 351-362
Social networks
- Bimal Viswanath, Ansley Post, P. Krishna Gummadi

, Alan Mislove:
An analysis of social network-based Sybil defenses. 363-374 - Josep M. Pujol, Vijay Erramilli, Georgos Siganos, Xiaoyuan Yang, Nikolaos Laoutaris

, Parminder Chhabra, Pablo Rodriguez:
The little engine(s) that could: scaling online social networks. 375-386 - David R. Choffnes, Fabián E. Bustamante, Zihui Ge:

Crowdsourcing service-level network event monitoring. 387-398
Poster session 1
- Yaogong Wang:

SIP overload control: a backpressure-based approach. 399-400 - Tianyi Wang, Yang Chen, Zengbin Zhang, Peng Sun, Beixing Deng, Xing Li:

Unbiased sampling in directed social graph. 401-402 - Sungro Yoon:

Contrabass: concurrent transmissions without coordination. 403-404 - Amit Dvir

, Athanasios V. Vasilakos
:
Backpressure-based routing protocol for DTNs. 405-406 - Sourav Kumar Dandapat, Bivas Mitra, Niloy Ganguly

, Romit Roy Choudhury:
Fair bandwidth allocation in wireless network using max-flow. 407-408 - Sundaresan Krishnan, Prasanna Chaporkar:

Stochastic approximation algorithm for optimal throughput performance of wireless LANs. 409-410 - Iuniana Oprescu, Mickael Meulle, Steve Uhlig

, Cristel Pelsser
, Olaf Maennel
, Philippe Owezarski:
Rethinking iBGP routing. 411-412 - Guang Yao, Jun Bi, Zijian Zhou:

Passive IP traceback: capturing the origin of anonymous traffic through network telescopes. 413-414 - Jie Xiong

, Kyle Jamieson
:
SecureAngle: improving wireless security using angle-of-arrival information (poster abstract). 415-416 - Srikanth Sundaresan, Cristian Lumezanu, Nick Feamster, Pierre François:

Autonomous traffic engineering with self-configuring topologies. 417-418 - D. J. Capelis, Darrell D. E. Long:

Fived: a service-based architecture implementation to innovate at the endpoints. 419-420 - Yu-Jen Lai, Wei-Hao Kuo, Wan-Ting Chiu, Shao-Ting Chang, Hung-Yu Wei

:
Accelerometer-assisted 802.11 rate adaptation on mass rapid transit system. 421-422
Poster session 2
- Ajinkya Uday Joshi, Purushottam Kulkarni:

Vehicular wifi access and rate adaptation. 423-424 - Kyunghan Lee

, Injong Rhee, Joohyun Lee
, Yung Yi, Song Chong:
Mobile data offloading: how much can WiFi deliver? 425-426 - Manuj Sharma, Anirudha Sahoo:

Residual white space distribution-based opportunistic channel access for cognitive radio enabled devices. 427-428 - Jin Zhao, Xinya Zhang, Xin Wang, Xiangyang Xue:

Achieving O(1) IP lookup on GPU-based software routers. 429-430 - C. Viven Rajendra, Purushottam Kulkarni:

Road traffic estimation using in-situ acoustic sensing. 431-432 - Georgios Nikolaidis, Astrit Zhushi, Kyle Jamieson

, Brad Karp:
Cone of silence: adaptively nulling interferers in wireless networks. 433-434 - Ryan D. Riley

, Nada Mohammed Ali, Kholoud Saleh Al-Senaidi, Aisha Lahdan Al-Kuwari:
Empowering users against sidejacking attacks. 435-436 - Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon

, KyoungSoo Park:
Accelerating SSL with GPUs. 437-438 - Zdravko Bozakov:

An open router virtualization framework using a programmable forwarding plane. 439-440 - Marcelo Ribeiro Nascimento, Christian Esteve Rothenberg

, Marcos Rogério Salvador, Maurício F. Magalhães:
QuagFlow: partnering Quagga with OpenFlow. 441-442
Demo session 1
- Sébastien Barré, Olivier Bonaventure, Costin Raiciu

, Mark Handley:
Experimenting with multipath TCP. 443-444 - Monia Ghobadi, Martin Labrecque, Geoffrey Salmon, Kaveh Aasaraai, Soheil Hassas Yeganeh, Yashar Ganjali, J. Gregory Steffan:

Caliper: a tool to generate precise and closed-loop traffic. 445-446 - Tacio Santos, Christian Henke, Carsten Schmoll, Tanja Zseby:

Multi-hop packet tracking for experimental facilities. 447-448 - Szymon Jakubczak, Dina Katabi:

SoftCast: one-size-fits-all wireless video. 449-450 - Samuel David Perli, Nabeel Ahmed, Dina Katabi:

PixNet: LCD-camera pairs as communication links. 451-452 - Joshua Reich, Oren Laadan, Eli Brosh, Alex Sherman, Vishal Misra, Jason Nieh, Dan Rubenstein:

VMtorrent: virtual appliances on-demand. 453-454 - Arun Kumar, Ashok Anand, Aditya Akella, Athula Balachandran, Vyas Sekar, Srinivasan Seshan

:
Flexible multimedia content retrieval using InfoNames. 455-456 - Brandon Heller, David Erickson, Nick McKeown, Rean Griffith, Igor Ganichev, Scott Whyte, Kyriakos Zarifis, Daekyeong Moon, Scott Shenker

, Stephen Stuart:
Ripcord: a modular platform for data center networking. 457-458 - Jeongkeun Lee, Jean Tourrilhes, Puneet Sharma, Sujata Banerjee

:
No more middlebox: integrate processing into network. 459-460 - Vijay Gabale, Bhaskaran Raman, Kameswari Chebrolu, Purushottam Kulkarni:

LokVaani: demonstrating interactive voice in Lo3. 461-462
Demo session 2
- Vytautas Valancius, Hyojoon Kim, Nick Feamster:

Transit portal: BGP connectivity as a service. 463-464 - Yasunobu Chiba, Yusuke Shinohara, Hideyuki Shimonishi:

Source flow: handling millions of flows on flow-based nodes. 465-466 - Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos, Maurizio Molina, Pere Barlet-Ros

, Daniela Brauckhoff:
Automating root-cause analysis of network anomalies using frequent itemset mining. 467-468 - Jiansong Zhang, Kun Tan, Sen Xiang, Qiufeng Yin, Qi Luo, Yong He, Ji Fang, Yongguang Zhang:

Experimenting software radio with the Sora platform. 469-470 - Sam Burnett, Nick Feamster, Santosh S. Vempala:

Circumventing censorship with collage. 471-472 - Tianyin Xu, Yang Chen, Xiaoming Fu

, Pan Hui:
Twittering by cuckoo: decentralized and socio-aware online microblogging services. 473-474 - Yong He, Ji Fang, Jiansong Zhang, Haichen Shen, Kun Tan, Yongguang Zhang:

MPAP: virtualization architecture for heterogenous wireless APs. 475-476 - Bhavish Agarwal, Pushkar V. Chitnis, Amit Dey, Kamal Jain, Vishnu Navda, Venkata N. Padmanabhan, Ramachandran Ramjee, Aaron Schulman, Neil Spring:

Stratus: energy-efficient mobile communication using cloud support. 477-478 - Nicolas Tsiftes, Joakim Eriksson, Niclas Finne, Fredrik Österlind, Joel Höglund, Adam Dunkels:

A framework for low-power IPv6 routing simulation, experimentation, and evaluation. 479-480 - Nico Bayer, Krzysztof Loziak

, Andres Garcia-Saavedra
, Cigdem Sengul
, Pablo Serrano
:
CARMEN: resource management and abstraction in wireless heterogeneous mesh networks. 481-482

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














