


default search action
Computer Communication Review (ACM SIGCOMM), Volume 35
Volume 35, Number 1, January 2004
- Simon S. Lam:

Back to the future part 4: the internet. 3-12
- Mark Allman, Craig Partridge:

Introduction. 13 - Kensuke Fukuda, Kenjiro Cho, Hiroshi Esaki:

The impact of residential broadband traffic on Japanese ISP backbones. 15-22 - Pekka Savola:

Observations of IPv6 traffic on a 6to4 relay. 23-28 - Mike Afergan, Robert Beverly

:
The state of the email address. 29-36 - Martin F. Arlitt, Carey L. Williamson:

An analysis of TCP reset behaviour on the internet. 37-44 - Richard Nelson, Daniel Lawson, Perry Lorier:

Analysis of long duration traces. 45-52 - Beichuan Zhang, Raymond A. Liu, Daniel Massey, Lixia Zhang:

Collecting the internet AS-level topology. 53-61 - Nick Feamster, Jaeyeon Jung, Hari Balakrishnan:

An empirical study of "bogon" route advertisements. 63-70 - Xiaoqiao Meng, Zhiguo Xu, Beichuan Zhang, Geoff Huston, Songwu Lu, Lixia Zhang:

IPv4 address allocation and the BGP routing table evolution. 71-80 - Ji Li, Karen R. Sollins, Dah-Yoh Lim:

Implementing aggregation and broadcast over Distributed Hash Tables. 81-92 - Hui Zhang, Ashish Goel, Ramesh Govindan:

An empirical evaluation of internet latency expansion. 93-97 - Eva González-Parada

, José Manuel Cano-García
, Antonio Díaz Estrella
:
A new methodology for representation of TCP performance in multiconnection environments. 99-110
Volume 35, Number 2, April 2005
- Frank P. Kelly, Thomas Voice:

Stability of end-to-end algorithms for joint routing and rate control. 5-12 - Shengming Jiang

:
Granular differentiated queueing services for QoS: structure and cost model. 13-22 - Jörg Wallerich, Holger Dreger, Anja Feldmann

, Balachander Krishnamurthy, Walter Willinger:
A methodology for studying persistency aspects of internet flows. 23-36 - Alberto Medina, Mark Allman, Sally Floyd:

Measuring the evolution of transport protocols in the internet. 37-52 - Mark Allman, Ethan Blanton:

Notes on burst mitigation for transport protocols. 53-60 - Marcelo Bagnulo

, Alberto García-Martínez
, Arturo Azcorra:
Efficient security for IPv6 multihoming. 61-68
- Craig Partridge:

Feature article introduction. 69-70 - Vinton G. Cerf, Robert E. Kahn:

A protocol for packet network intercommunication. 71-82
- Srinivasan Keshav

:
Why cell phones will dominate the future internet. 83-86 - Fabrizio Sestini, Thierry Van der Pyl:

Future and emerging technologies: a vision for tomorrow of EU IST research. 87-90 - Adrian Stephens:

802.11 "decrypted". 91-93
Volume 35, Number 3, July 2005
- Simon Schütz, Lars Eggert, Stefan Schmid, Marcus Brunner:

Protocol enhancements for intermittently connected hosts. 5-18 - Antonio Nucci, Ashwin Sridharan, Nina Taft:

The problem of synthetically generating IP traffic matrices: initial recommendations. 19-32 - Pierre François, Clarence Filsfils, John Evans, Olivier Bonaventure:

Achieving sub-second IGP convergence in large IP networks. 35-44 - Ying Xu, Roch Guérin:

On the robustness of router-based denial-of-service (DoS) defense systems. 47-60
- Aruna Seneviratne

, Terry Percival:
National ICT Australia (NICTA). 61-64 - Edward D. Lazowska

, David A. Patterson:
Computing research: a looming crisis. 65-68 - Marcus Brunner, Lars Eggert, Kevin R. Fall, Jörg Ott, Lars C. Wolf:

Dagstuhl seminar on disruption tolerant networking. 69-72 - Nick McKeown, Damon Wischik:

Making router buffers much smaller. 73-74 - Damon Wischik, Nick McKeown:

Part I: buffer sizes for core routers. 75-78 - Gaurav Raina

, Donald F. Towsley
, Damon Wischik:
Part II: control theory for buffer sizing. 79-82 - Mihaela Enachescu, Yashar Ganjali, Ashish Goel, Nick McKeown, Tim Roughgarden:

Part III: routers with very small buffers. 83-90 - David D. Clark, Craig Partridge, Robert Braden, Bruce S. Davie, Sally Floyd, Van Jacobson, Dina Katabi, Greg Minshall, K. K. Ramakrishnan, Timothy Roscoe, Ion Stoica, John Wroclawski, Lixia Zhang:

Making the world (of communications) a different place. 91-96
- Anja Feldmann

:
Experiences from the SIGCOMM 2005 European shadow PC experiment. 97-102
Volume 35, Number 4, October 2005
- Roch Guérin, Ramesh Govindan, Greg Minshall:

Proceedings of the ACM SIGCOMM 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Philadelphia, Pennsylvania, USA, August 22-26, 2005. ACM 2005, ISBN 1-59593-009-4 [contents]
Volume 35, Number 5, October 2005
- Tim Deegan, Jon Crowcroft, Andrew Warfield:

The main name system: an exercise in centralized computing. 5-14 - Evangelos Vergetis, Roch Guérin, Saswati Sarkar:

Realizing the benefits of user-level channel diversity. 15-28 - Anwar Al Hamra, Pascal Felber

:
Design choices for content distribution in P2P networks. 29-40 - Albert G. Greenberg, Gísli Hjálmtýsson, David A. Maltz, Andy Myers, Jennifer Rexford

, Geoffrey G. Xie, Hong Yan, Jibin Zhan, Hui Zhang:
A clean slate 4D approach to network control and management. 41-54 - Jun Li, Dejing Dou, Zhen Wu, Shiwoong Kim, Vikash Agarwal:

An internet routing forensics framework for discovering rules of abnormal BGP events. 55-66
- Randy Bush:

Into the future with the internet vendor task force a very curmudgeonly view or testing spaghetti: a wall's point of view. 67-68 - Aaron Falk:

The IETF, the IRTF, and the networking research community. 69-70 - Yuval Shavitt

, Eran Shir:
DIMES: let the internet measure itself. 71-74 - John D. DeHart, Fred Kuhns, Jyoti Parwatikar, Jonathan S. Turner, Charlie Wiseman, Ken Wong:

The open network laboratory: a resource for networking research and education. 75-78 - Renata Teixeira, Sharad Agarwal, Jennifer Rexford

:
BGP routing changes: merging views from two ISPs. 79-82 - Ernst W. Biersack:

Where is multicast today? 83-84 - Christoph Neumann, Vincent Roca, Rod Walsh:

Large scale content distribution protocols. 85-92 - Matthew Roughan

:
Simplifying the synthesis of internet traffic matrices. 93-96 - Colleen Shannon, David Moore, Ken Keys, Marina Fomenkov, Bradley Huffaker, Kimberly C. Claffy

:
The internet measurement data catalog. 97-100

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














