default search action
Computer Communication Review (ACM SIGCOMM), Volume 34
Volume 34, Number 1, January 2004
- Neil T. Spring, David Wetherall, Thomas E. Anderson:
Reverse engineering the Internet. 3-8 - George Varghese, Cristian Estan:
The measurement manifesto. 9-14 - Mike Wawrzoniak, Larry L. Peterson, Timothy Roscoe:
Sophia: an Information Plane for networked systems. 15-20 - Donald F. Caldwell, Anna C. Gilbert, Joel Gottlieb, Albert G. Greenberg, Gísli Hjálmtýsson, Jennifer Rexford:
The cutting EDGE of IP router configuration. 21-26 - Roger Karrer, Ashutosh Sabharwal, Edward W. Knightly:
Enabling large-scale wireless broadband: the case for TAPs. 27-32 - Pravin Bhagwat, Bhaskaran Raman, Dheeraj Sanghi:
Turning 802.11 inside-out. 33-38 - Thomas E. Anderson, Timothy Roscoe, David Wetherall:
Preventing Internet denial-of-service with capabilities. 39-44 - Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica:
Taming IP packet flooding attacks. 45-50 - Christian Kreibich, Jon Crowcroft:
Honeycomb: creating intrusion detection signatures using honeypots. 51-56 - Vivek S. Pai, Limin Wang, KyoungSoo Park, Ruoming Pang, Larry L. Peterson:
The dark side of the Web: an open proxy's view. 57-62 - Glenn Judd, Peter Steenkiste:
Repeatable and realistic wireless experimentation through physical emulation. 63-68 - Sanjit Biswas, Robert Tappan Morris:
Opportunistic routing in multi-hop wireless networks. 69-74 - Romit Roy Choudhury, Nitin H. Vaidya:
MAC-layer anycasting in ad hoc networks. 75-80 - Alex C. Snoeren, Barath Raghavan:
Decoupling policy from mechanism in Internet routing. 81-86 - Nick Feamster:
Practical verification techniques for wide-area routing. 87-92 - Bryan Ford:
Unmanaged Internet Protocol: taming the edge network management crisis. 93-98 - Jeffrey C. Mogul, Lawrence S. Brakmo, David E. Lowell, Dinesh Subhraveti, Justin Moore:
Unveiling the transport. 99-106 - Ravi Kokku, Taylor L. Riché, Aaron R. Kunze, Jayaram Mudigonda, Jamie Jason, Harrick M. Vin:
A case for run-time adaptation in packet processing systems. 107-112 - Russ Cox, Frank Dabek, M. Frans Kaashoek, Jinyang Li, Robert Tappan Morris:
Practical, distributed network coordinates. 113-118 - Matt Welsh:
Exposing resource tradeoffs in region-based communication abstractions for sensor networks. 119-124 - Deepak Ganesan, Sylvia Ratnasamy, Hanbiao Wang, Deborah Estrin:
Coping with irregular spatio-temporal sampling in sensor networks. 125-130 - Miguel Castro, Manuel Costa, Antony I. T. Rowstron:
Should we build Gnutella on a structured overlay? 131-136 - Jeffrey Considine, John W. Byers, Ketan Meyer-Patel:
A constraint satisfaction approach to testbed embedding services. 137-142
Volume 34, Number 2, April 2004
- Ola Nordström, Constantinos Dovrolis:
Beware of BGP attacks. 1-8 - Steve Uhlig:
Non-stationarity and high-order scaling in TCP flow arrivals: a methodological analysis. 9-24 - Luigi Alfredo Grieco, Saverio Mascolo:
Performance evaluation and comparison of Westwood+, New Reno, and Vegas TCP congestion control. 25-38 - Jelena Mirkovic, Peter L. Reiher:
A taxonomy of DDoS attack and DDoS defense mechanisms. 39-53 - Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
SAKM: a scalable and adaptive key management approach for multicast communications. 55-70 - Kathleen M. Nichols, Van Jacobson, Kedarnath Poduri:
A Per-Domain Behavior for circuit emulation in IP networks. 71-83 - Andrei V. Gurtov, Sally Floyd:
Modeling wireless links for transport protocols. 85-96 - Will Eatherton, George Varghese, Zubin Dittia:
Tree bitmap: hardware/software IP lookups with incremental updates. 97-122 - Sourabh Ladha, Stephan Baucke, Reiner Ludwig, Paul D. Amer:
On making SCTP robust to spurious retransmissions. 123-135 - Jörg Widmer, Catherine Boutremans, Jean-Yves Le Boudec:
End-to-end congestion control for TCP-friendly flows with variable packet size. 137-151
Volume 34, Number 3, July 2004
- Antonis Papachristodoulou, Lun Li, John C. Doyle:
Methodological frameworks for large-scale network analysis and design. 7-20 - Azer Bestavros, Adam D. Bradley, Assaf J. Kfoury, Ibrahim Matta:
Safe compositional specification of networking systems. 21-34 - Thomas Voice:
A global stability result for primal-dual congestion control algorithms with routing. 35-41 - Aditya Akella, Shuchi Chawla, Arvind Kannan, Srinivasan Seshan:
On the scaling of congestion in the internet graph. 43-56 - Fan Bai, Ganesha Bhaskara, Ahmed Helmy:
Building the blocks of protocol design and analysis: challenges and lessons learned from case studies on mobile ad hoc routing and micro-mobility protocols. 57-70 - Ashish Agarwal, P. R. Kumar:
Capacity bounds for ad hoc and hybrid wireless networks. 71-81 - Claus Bauer:
Distributed scheduling policies in networks of input-queued packet switches. 83-92 - Martin Duke, Thomas R. Henderson, Jeff Meegan:
Experience with "link-up notification" over a mobile satellite link. 93-104
Volume 34, Number 4, October 2004
- Raj Yavatkar, Ellen W. Zegura, Jennifer Rexford:
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 2004, Portland, Oregon, USA. ACM 2004, ISBN 1-58113-862-8 [contents]
Volume 34, Number 5, October 2004
- Tatjana Curcic, Mark E. Filipkowski, Almadena Yu. Chtchelkanova, Philip A. D'Ambrosio, Stuart A. Wolf, Michael Foster, Douglas Cochran:
Quantum networks: from quantum cryptography to quantum architecture. 3-8 - Seth Lloyd, Jeffrey H. Shapiro, Franco N. C. Wong, Prem Kumar, Selim M. Shahriar, Horace P. Yuen:
Infrastructure for the quantum internet. 9-20 - Eric Corndorf, Chuang Liang, Gregory S. Kanter, Prem Kumar, Horace P. Yuen:
Quantum-noise: protected data encryption for WDM fiber-optic networks. 21-30 - Mark Gaynor, Scott O. Bradner:
A real options framework to value network, protocol, and service architecture. 31-38 - Paramvir Bahl, Atul Adya, Jitendra Padhye, Alec Wolman:
Reconsidering wireless systems with multiple radios. 39-46 - Zhi Li, Prasant Mohapatra:
QoS-aware multicasting in DiffServ domains. 47-57 - Yi-Min Wang, Lili Qiu, Chad Verbowski, Dimitris Achlioptas, Gautam Das, Per-Åke Larson:
Summary-based routing for content-based event distribution networks. 59-74 - Wesley M. Eddy, Shawn Ostermann, Mark Allman:
New techniques for making transport protocols robust to corruption-based loss. 75-88 - Steve Uhlig, Olivier Bonaventure:
Designing BGP-based outbound traffic engineering techniques for stub ASes. 89-106
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.