callback( { "result":{ "query":":facetid:toc:\"db/conf/sigcomm/sigcomm2003.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"65.87" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"35", "@dc":"35", "@oc":"35", "@id":"43411787", "text":":facetid:toc:db/conf/sigcomm/sigcomm2003.bht" } }, "hits":{ "@total":"35", "@computed":"35", "@sent":"35", "@first":"0", "hit":[{ "@score":"1", "@id":"6202875", "info":{"authors":{"author":[{"@pid":"a/AdityaAkella","text":"Aditya Akella"},{"@pid":"m/BruceMMaggs","text":"Bruce M. Maggs"},{"@pid":"s/SrinivasanSeshan","text":"Srinivasan Seshan"},{"@pid":"55/654","text":"Anees Shaikh"},{"@pid":"s/RameshKSitaraman","text":"Ramesh K. Sitaraman"}]},"title":"A measurement-based analysis of multihoming.","venue":"SIGCOMM","pages":"353-364","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/AkellaMSSS03","doi":"10.1145/863955.863995","ee":"https://doi.org/10.1145/863955.863995","url":"https://dblp.org/rec/conf/sigcomm/AkellaMSSS03"}, "url":"URL#6202875" }, { "@score":"1", "@id":"6202876", "info":{"authors":{"author":[{"@pid":"99/2651","text":"David L. Applegate"},{"@pid":"40/1039","text":"Edith Cohen"}]},"title":"Making intra-domain routing robust to changing and uncertain traffic demands: understanding fundamental tradeoffs.","venue":"SIGCOMM","pages":"313-324","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/ApplegateC03","doi":"10.1145/863955.863991","ee":"https://doi.org/10.1145/863955.863991","url":"https://dblp.org/rec/conf/sigcomm/ApplegateC03"}, "url":"URL#6202876" }, { "@score":"1", "@id":"6202877", "info":{"authors":{"author":[{"@pid":"39/1541","text":"Anindya Basu"},{"@pid":"82/5538","text":"Alvin Lin"},{"@pid":"61/3485","text":"Sharad Ramanathan"}]},"title":"Routing using potentials: a dynamic traffic-aware routing algorithm.","venue":"SIGCOMM","pages":"37-48","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/BasuLR03","doi":"10.1145/863955.863962","ee":"https://doi.org/10.1145/863955.863962","url":"https://dblp.org/rec/conf/sigcomm/BasuLR03"}, "url":"URL#6202877" }, { "@score":"1", "@id":"6202878", "info":{"authors":{"author":[{"@pid":"53/4439","text":"Antonio Carzaniga"},{"@pid":"w/AlexanderLWolf","text":"Alexander L. Wolf"}]},"title":"Forwarding in a content-based network.","venue":"SIGCOMM","pages":"163-174","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/CarzanigaW03","doi":"10.1145/863955.863975","ee":"https://doi.org/10.1145/863955.863975","url":"https://dblp.org/rec/conf/sigcomm/CarzanigaW03"}, "url":"URL#6202878" }, { "@score":"1", "@id":"6202879", "info":{"authors":{"author":[{"@pid":"21/1176","text":"Yatin Chawathe"},{"@pid":"68/5579","text":"Sylvia Ratnasamy"},{"@pid":"18/4100","text":"Lee Breslau"},{"@pid":"50/6755","text":"Nick Lanham"},{"@pid":"34/5593","text":"Scott Shenker"}]},"title":"Making gnutella-like P2P systems scalable.","venue":"SIGCOMM","pages":"407-418","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/ChawatheRBLS03","doi":"10.1145/863955.864000","ee":"https://doi.org/10.1145/863955.864000","url":"https://dblp.org/rec/conf/sigcomm/ChawatheRBLS03"}, "url":"URL#6202879" }, { "@score":"1", "@id":"6202880", "info":{"authors":{"author":[{"@pid":"c/DavidDClark","text":"David D. Clark"},{"@pid":"45/6587","text":"Craig Partridge"},{"@pid":"26/3237","text":"J. Christopher Ramming"},{"@pid":"92/3944","text":"John Wroclawski"}]},"title":"A knowledge plane for the internet.","venue":"SIGCOMM","pages":"3-10","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/ClarkPRW03","doi":"10.1145/863955.863957","ee":"https://doi.org/10.1145/863955.863957","url":"https://dblp.org/rec/conf/sigcomm/ClarkPRW03"}, "url":"URL#6202880" }, { "@score":"1", "@id":"6202881", "info":{"authors":{"author":[{"@pid":"06/802","text":"Sarang Dharmapurikar"},{"@pid":"90/2711","text":"Praveen Krishnamurthy"},{"@pid":"59/6398","text":"David E. Taylor"}]},"title":"Longest prefix matching using bloom filters.","venue":"SIGCOMM","pages":"201-212","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/DharmapurikarKT03","doi":"10.1145/863955.863979","ee":"https://doi.org/10.1145/863955.863979","url":"https://dblp.org/rec/conf/sigcomm/DharmapurikarKT03"}, "url":"URL#6202881" }, { "@score":"1", "@id":"6202882", "info":{"authors":{"author":[{"@pid":"d/NickGDuffield","text":"Nick G. Duffield"},{"@pid":"l/CarstenLund","text":"Carsten Lund"},{"@pid":"t/MikkelThorup","text":"Mikkel Thorup"}]},"title":"Estimating flow distributions from sampled flow statistics.","venue":"SIGCOMM","pages":"325-336","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/DuffieldLT03","doi":"10.1145/863955.863992","ee":"https://doi.org/10.1145/863955.863992","url":"https://dblp.org/rec/conf/sigcomm/DuffieldLT03"}, "url":"URL#6202882" }, { "@score":"1", "@id":"6202883", "info":{"authors":{"author":[{"@pid":"78/115","text":"Chip Elliott"},{"@pid":"29/3435","text":"David Pearson"},{"@pid":"63/1171","text":"Gregory D. Troxel"}]},"title":"Quantum cryptography in practice.","venue":"SIGCOMM","pages":"227-238","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/ElliottPT03","doi":"10.1145/863955.863982","ee":"https://doi.org/10.1145/863955.863982","url":"https://dblp.org/rec/conf/sigcomm/ElliottPT03"}, "url":"URL#6202883" }, { "@score":"1", "@id":"6202884", "info":{"authors":{"author":[{"@pid":"e/CristianEstan","text":"Cristian Estan"},{"@pid":"s/StefanSavage","text":"Stefan Savage"},{"@pid":"v/GeorgeVarghese","text":"George Varghese"}]},"title":"Automatically inferring patterns of resource consumption in network traffic.","venue":"SIGCOMM","pages":"137-148","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/EstanSV03","doi":"10.1145/863955.863972","ee":"https://doi.org/10.1145/863955.863972","url":"https://dblp.org/rec/conf/sigcomm/EstanSV03"}, "url":"URL#6202884" }, { "@score":"1", "@id":"6202885", "info":{"authors":{"author":{"@pid":"38/3635","text":"Kevin R. Fall"}},"title":"A delay-tolerant network architecture for challenged internets.","venue":"SIGCOMM","pages":"27-34","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/Fall03","doi":"10.1145/863955.863960","ee":"https://doi.org/10.1145/863955.863960","url":"https://dblp.org/rec/conf/sigcomm/Fall03"}, "url":"URL#6202885" }, { "@score":"1", "@id":"6202886", "info":{"authors":{"author":[{"@pid":"50/4752","text":"Sergey Gorinsky"},{"@pid":"95/2724","text":"Sugat Jain"},{"@pid":"v/HarrickMVin","text":"Harrick M. Vin"},{"@pid":"70/3755","text":"Yongguang Zhang"}]},"title":"Robustness to inflated subscription in multicast congestion control.","venue":"SIGCOMM","pages":"87-98","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/GorinskyJVZ03","doi":"10.1145/863955.863967","ee":"https://doi.org/10.1145/863955.863967","url":"https://dblp.org/rec/conf/sigcomm/GorinskyJVZ03"}, "url":"URL#6202886" }, { "@score":"1", "@id":"6202887", "info":{"authors":{"author":[{"@pid":"g/TimothyGGriffin","text":"Timothy Griffin"},{"@pid":"03/2500","text":"Aaron D. Jaggard"},{"@pid":"60/5282","text":"Vijay Ramachandran"}]},"title":"Design principles of policy languages for path vector protocols.","venue":"SIGCOMM","pages":"61-72","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/GriffinJR03","doi":"10.1145/863955.863964","ee":"https://doi.org/10.1145/863955.863964","url":"https://dblp.org/rec/conf/sigcomm/GriffinJR03"}, "url":"URL#6202887" }, { "@score":"1", "@id":"6202888", "info":{"authors":{"author":[{"@pid":"g/PKrishnaGummadi","text":"P. Krishna Gummadi"},{"@pid":"46/5713","text":"Ramakrishna Gummadi"},{"@pid":"g/StevenDGribble","text":"Steven D. Gribble"},{"@pid":"68/5579","text":"Sylvia Ratnasamy"},{"@pid":"34/5593","text":"Scott Shenker"},{"@pid":"s/IonStoica","text":"Ion Stoica"}]},"title":"The impact of DHT routing geometry on resilience and proximity.","venue":"SIGCOMM","pages":"381-394","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/GummadiGGRSS03","doi":"10.1145/863955.863998","ee":"https://doi.org/10.1145/863955.863998","url":"https://dblp.org/rec/conf/sigcomm/GummadiGGRSS03"}, "url":"URL#6202888" }, { "@score":"1", "@id":"6202889", "info":{"authors":{"author":[{"@pid":"37/3666","text":"Maruti Gupta"},{"@pid":"21/3471","text":"Suresh Singh"}]},"title":"Greening of the internet.","venue":"SIGCOMM","pages":"19-26","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/GuptaS03","doi":"10.1145/863955.863959","ee":"https://doi.org/10.1145/863955.863959","url":"https://dblp.org/rec/conf/sigcomm/GuptaS03"}, "url":"URL#6202889" }, { "@score":"1", "@id":"6202890", "info":{"authors":{"author":[{"@pid":"48/1816","text":"Heying Zhang"},{"@pid":"41/1240","text":"Baohong Liu"},{"@pid":"41/5655","text":"Wenhua Dou"}]},"title":"Design of a robust active queue management algorithm based on feedback compensation.","venue":"SIGCOMM","pages":"277-285","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/HeyingBD03","doi":"10.1145/863955.863987","ee":"https://doi.org/10.1145/863955.863987","url":"https://dblp.org/rec/conf/sigcomm/HeyingBD03"}, "url":"URL#6202890" }, { "@score":"1", "@id":"6202891", "info":{"authors":{"author":[{"@pid":"13/2327","text":"Alefiya Hussain"},{"@pid":"h/JohnSHeidemann","text":"John S. Heidemann"},{"@pid":"91/1770","text":"Christos Papadopoulos"}]},"title":"A framework for classifying denial of service attacks.","venue":"SIGCOMM","pages":"99-110","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/HussainHP03","doi":"10.1145/863955.863968","ee":"https://doi.org/10.1145/863955.863968","url":"https://dblp.org/rec/conf/sigcomm/HussainHP03"}, "url":"URL#6202891" }, { "@score":"1", "@id":"6202892", "info":{"authors":{"author":[{"@pid":"45/1350","text":"Hani Jamjoom"},{"@pid":"s/KangGShin","text":"Kang G. Shin"}]},"title":"Persistent dropping: an efficient control of traffic aggregates.","venue":"SIGCOMM","pages":"287-298","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/JamjoomS03","doi":"10.1145/863955.863988","ee":"https://doi.org/10.1145/863955.863988","url":"https://dblp.org/rec/conf/sigcomm/JamjoomS03"}, "url":"URL#6202892" }, { "@score":"1", "@id":"6202893", "info":{"authors":{"author":[{"@pid":"64/1129-2","text":"Ping Ji 0002"},{"@pid":"76/5778","text":"Zihui Ge"},{"@pid":"k/JamesFKurose","text":"James F. Kurose"},{"@pid":"t/DonaldFTowsley","text":"Donald F. Towsley"}]},"title":"A comparison of hard-state and soft-state signaling protocols.","venue":"SIGCOMM","pages":"251-262","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/JiGKT03","doi":"10.1145/863955.863984","ee":"https://doi.org/10.1145/863955.863984","url":"https://dblp.org/rec/conf/sigcomm/JiGKT03"}, "url":"URL#6202893" }, { "@score":"1", "@id":"6202894", "info":{"authors":{"author":[{"@pid":"68/2276","text":"Isaac Keslassy"},{"@pid":"96/3601","text":"Shang-Tse Chuang"},{"@pid":"65/2186","text":"Kyoungsik Yu"},{"@pid":"81/3992","text":"David A. B. Miller"},{"@pid":"h/MarkHorowitz","text":"Mark Horowitz"},{"@pid":"37/82","text":"Olav Solgaard"},{"@pid":"m/NickMcKeown","text":"Nick McKeown"}]},"title":"Scaling internet routers using optics.","venue":"SIGCOMM","pages":"189-200","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/KeslassyCYMHSM03","doi":"10.1145/863955.863978","ee":"https://doi.org/10.1145/863955.863978","url":"https://dblp.org/rec/conf/sigcomm/KeslassyCYMHSM03"}, "url":"URL#6202894" }, { "@score":"1", "@id":"6202895", "info":{"authors":{"author":[{"@pid":"k/AleksandarKuzmanovic","text":"Aleksandar Kuzmanovic"},{"@pid":"k/EWKnightly","text":"Edward W. Knightly"}]},"title":"Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants.","venue":"SIGCOMM","pages":"75-86","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/KuzmanovicK03","doi":"10.1145/863955.863966","ee":"https://doi.org/10.1145/863955.863966","url":"https://dblp.org/rec/conf/sigcomm/KuzmanovicK03"}, "url":"URL#6202895" }, { "@score":"1", "@id":"6202896", "info":{"authors":{"author":[{"@pid":"53/4146","text":"Long Le"},{"@pid":"22/149","text":"Jay Aikat"},{"@pid":"j/KevinJeffay","text":"Kevin Jeffay"},{"@pid":"s/FDonelsonSmith","text":"F. Donelson Smith"}]},"title":"The effects of active queue management on web performance.","venue":"SIGCOMM","pages":"265-276","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/LeAJS03","doi":"10.1145/863955.863986","ee":"https://doi.org/10.1145/863955.863986","url":"https://dblp.org/rec/conf/sigcomm/LeAJS03"}, "url":"URL#6202896" }, { "@score":"1", "@id":"6202897", "info":{"authors":{"author":[{"@pid":"l/DmitriLoguinov","text":"Dmitri Loguinov"},{"@pid":"78/4454","text":"Anuj Kumar"},{"@pid":"65/4378","text":"Vivek Rai"},{"@pid":"70/295","text":"Sai Ganesh"}]},"title":"Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience.","venue":"SIGCOMM","pages":"395-406","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/LoguinovKRG03","doi":"10.1145/863955.863999","ee":"https://doi.org/10.1145/863955.863999","url":"https://dblp.org/rec/conf/sigcomm/LoguinovKRG03"}, "url":"URL#6202897" }, { "@score":"1", "@id":"6202898", "info":{"authors":{"author":[{"@pid":"91/584","text":"Zhuoqing Morley Mao"},{"@pid":"r/JenniferRexford","text":"Jennifer Rexford"},{"@pid":"58/6299-1","text":"Jia Wang 0001"},{"@pid":"k/RandyHKatz","text":"Randy H. Katz"}]},"title":"Towards an accurate AS-level traceroute tool.","venue":"SIGCOMM","pages":"365-378","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/MaoRWK03","doi":"10.1145/863955.863996","ee":"https://doi.org/10.1145/863955.863996","url":"https://dblp.org/rec/conf/sigcomm/MaoRWK03"}, "url":"URL#6202898" }, { "@score":"1", "@id":"6202899", "info":{"authors":{"author":[{"@pid":"71/4736","text":"Akihiro Nakao"},{"@pid":"p/LLPeterson","text":"Larry L. Peterson"},{"@pid":"98/2846","text":"Andy C. Bavier"}]},"title":"A routing underlay for overlay networks.","venue":"SIGCOMM","pages":"11-18","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/NakaoPB03","doi":"10.1145/863955.863958","ee":"https://doi.org/10.1145/863955.863958","url":"https://dblp.org/rec/conf/sigcomm/NakaoPB03"}, "url":"URL#6202899" }, { "@score":"1", "@id":"6202900", "info":{"authors":{"author":[{"@pid":"81/6280","text":"Harsha Narayan"},{"@pid":"g/RameshGovindan","text":"Ramesh Govindan"},{"@pid":"v/GeorgeVarghese","text":"George Varghese"}]},"title":"The impact of address allocation and routing on the structure and implementation of routing tables.","venue":"SIGCOMM","pages":"125-136","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/NarayanGV03","doi":"10.1145/863955.863971","ee":"https://doi.org/10.1145/863955.863971","url":"https://dblp.org/rec/conf/sigcomm/NarayanGV03"}, "url":"URL#6202900" }, { "@score":"1", "@id":"6202901", "info":{"authors":{"author":[{"@pid":"32/2940","text":"Ruoming Pang"},{"@pid":"p/VernPaxson","text":"Vern Paxson"}]},"title":"A high-level programming environment for packet trace anonymization and transformation.","venue":"SIGCOMM","pages":"339-351","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/PangP03","doi":"10.1145/863955.863994","ee":"https://doi.org/10.1145/863955.863994","url":"https://dblp.org/rec/conf/sigcomm/PangP03"}, "url":"URL#6202901" }, { "@score":"1", "@id":"6202902", "info":{"authors":{"author":[{"@pid":"54/4031","text":"Lili Qiu"},{"@pid":"y/YangRichardYang","text":"Yang Richard Yang"},{"@pid":"91/3045-1","text":"Yin Zhang 0001"},{"@pid":"34/5593","text":"Scott Shenker"}]},"title":"On selfish routing in internet-like environments.","venue":"SIGCOMM","pages":"151-162","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/QiuYZS03","doi":"10.1145/863955.863974","ee":"https://doi.org/10.1145/863955.863974","url":"https://dblp.org/rec/conf/sigcomm/QiuYZS03"}, "url":"URL#6202902" }, { "@score":"1", "@id":"6202903", "info":{"authors":{"author":[{"@pid":"30/4247","text":"Sriram Ramabhadran"},{"@pid":"p/JPasquale","text":"Joseph Pasquale"}]},"title":"Stratified round Robin: a low complexity packet scheduler with bandwidth fairness and bounded delay.","venue":"SIGCOMM","pages":"239-250","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/RamabhadranP03","doi":"10.1145/863955.863983","ee":"https://doi.org/10.1145/863955.863983","url":"https://dblp.org/rec/conf/sigcomm/RamabhadranP03"}, "url":"URL#6202903" }, { "@score":"1", "@id":"6202904", "info":{"authors":{"author":[{"@pid":"93/2536","text":"Sumeet Singh"},{"@pid":"28/181","text":"Florin Baboescu"},{"@pid":"v/GeorgeVarghese","text":"George Varghese"},{"@pid":"58/6299","text":"Jia Wang"}]},"title":"Packet classification using multidimensional cutting.","venue":"SIGCOMM","pages":"213-224","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/SinghBVW03","doi":"10.1145/863955.863980","ee":"https://doi.org/10.1145/863955.863980","url":"https://dblp.org/rec/conf/sigcomm/SinghBVW03"}, "url":"URL#6202904" }, { "@score":"1", "@id":"6202905", "info":{"authors":{"author":{"@pid":"s/JoaoLSobrinho","text":"João L. Sobrinho"}},"title":"Network routing with path vector protocols: theory and applications.","venue":"SIGCOMM","pages":"49-60","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/Sobrinho03","doi":"10.1145/863955.863963","ee":"https://doi.org/10.1145/863955.863963","url":"https://dblp.org/rec/conf/sigcomm/Sobrinho03"}, "url":"URL#6202905" }, { "@score":"1", "@id":"6202906", "info":{"authors":{"author":[{"@pid":"s/NeilTSpring","text":"Neil T. Spring"},{"@pid":"81/6327","text":"Ratul Mahajan"},{"@pid":"a/ThomasEAnderson","text":"Thomas E. Anderson"}]},"title":"The causes of path inflation.","venue":"SIGCOMM","pages":"113-124","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/SpringMA03","doi":"10.1145/863955.863970","ee":"https://doi.org/10.1145/863955.863970","url":"https://dblp.org/rec/conf/sigcomm/SpringMA03"}, "url":"URL#6202906" }, { "@score":"1", "@id":"6202907", "info":{"authors":{"author":[{"@pid":"81/4301","text":"Chunqiang Tang"},{"@pid":"47/192","text":"Zhichen Xu"},{"@pid":"62/1421","text":"Sandhya Dwarkadas"}]},"title":"Peer-to-peer information retrieval using self-organizing semantic overlay networks.","venue":"SIGCOMM","pages":"175-186","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/TangXD03","doi":"10.1145/863955.863976","ee":"https://doi.org/10.1145/863955.863976","url":"https://dblp.org/rec/conf/sigcomm/TangXD03"}, "url":"URL#6202907" }, { "@score":"1", "@id":"6202908", "info":{"authors":{"author":[{"@pid":"91/3045-1","text":"Yin Zhang 0001"},{"@pid":"72/6960","text":"Matthew Roughan"},{"@pid":"l/CarstenLund","text":"Carsten Lund"},{"@pid":"d/DavidLDonoho","text":"David L. Donoho"}]},"title":"An information-theoretic approach to traffic matrix estimation.","venue":"SIGCOMM","pages":"301-312","year":"2003","type":"Conference and Workshop Papers","access":"closed","key":"conf/sigcomm/ZhangRLD03","doi":"10.1145/863955.863990","ee":"https://doi.org/10.1145/863955.863990","url":"https://dblp.org/rec/conf/sigcomm/ZhangRLD03"}, "url":"URL#6202908" }, { "@score":"1", "@id":"6213107", "info":{"authors":{"author":[{"@pid":"f/AnjaFeldmann","text":"Anja Feldmann"},{"@pid":"z/MZitterbart","text":"Martina Zitterbart"},{"@pid":"c/JonCrowcroft","text":"Jon Crowcroft"},{"@pid":"w/DavidWetherall","text":"David Wetherall"}]},"title":"Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 25-29, 2003, Karlsruhe, Germany","venue":"SIGCOMM","publisher":"ACM","year":"2003","type":"Editorship","key":"conf/sigcomm/2003","doi":"10.1145/863955","ee":"https://doi.org/10.1145/863955","url":"https://dblp.org/rec/conf/sigcomm/2003"}, "url":"URL#6213107" } ] } } } )