CoNEXT A

29 papers

YearTitle / Authors
2010A cost comparison of datacenter network architectures.
Lucian Popa, Sylvia Ratnasamy, Gianluca Iannaccone, Arvind Krishnamurthy, Ion Stoica
2010Assessing the vulnerability of replicated network services.
George Dean Bissias, Brian Neil Levine, Ramesh K. Sitaraman
2010Auto-configuration of 802.11n WLANs.
Mustafa Y. Arslan, Konstantinos Pelechrinis, Ioannis Broustis, Srikanth V. Krishnamurthy, Sateesh Addepalli, Konstantina Papagiannaki
2010Balancing throughput, robustness, and in-order delivery in P2P VoD.
Bin Fan, David G. Andersen, Michael Kaminsky, Konstantina Papagiannaki
2010Declarative configuration management for complex and dynamic networks.
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. van der Merwe
2010Enabling high-bandwidth vehicular content distribution.
Upendra Shevade, Yi-Chao Chen, Lili Qiu, Yin Zhang, Vinoth Chandar, Mi Kyung Han, Han Hee Song, Yousuk Seung
2010Exploiting locality of interest in online social networks.
Mike P. Wittie, Veljko Pejovic, Lara B. Deek, Kevin C. Almeroth, Ben Y. Zhao
2010Federation of virtualized infrastructures: sharing the value of diversity.
Panayotis Antoniadis, Serge Fdida, Timur Friedman, Vishal Misra
2010G-RCA: a generic root cause analysis platform for service quality management in large IP networks.
He Yan, Lee Breslau, Zihui Ge, Daniel Massey, Dan Pei, Jennifer Yates
2010ICTCP: Incast Congestion Control for TCP in data center networks.
Haitao Wu, Zhenqian Feng, Chuanxiong Guo, Yongguang Zhang
2010Inferring invisible traffic.
Vineet Bharti, Pankaj Kankar, Lokesh Setia, Gonca Gürsun, Anukool Lakhina, Mark Crovella
2010Internet traffic classification demystified: on the sources of the discriminative power.
Yeon-Sup Lim, Hyunchul Kim, Jiwoong Jeong, Chong-Kwon Kim, Ted Taekyoung Kwon, Yanghee Choi
2010Is content publishing in BitTorrent altruistic or profit-driven?
Rubén Cuevas Rumín, Michal Kryczka, Ángel Cuevas, Sebastian Kaune, Carmen Guerrero, Reza Rejaie
2010LEGUP: using heterogeneity to reduce the cost of data center network upgrades.
Andrew R. Curtis, Srinivasan Keshav, Alejandro López-Ortiz
2010MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking.
Romain Fontugne, Pierre Borgnat, Patrice Abry, Kensuke Fukuda
2010Mobile data offloading: how much can WiFi deliver?
Kyunghan Lee, Injong Rhee, Joohyun Lee, Song Chong, Yung Yi
2010NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems.
Yu Jin, Nick G. Duffield, Alexandre Gerber, Patrick Haffner, Subhabrata Sen, Zhi-Li Zhang
2010Network-wide deployment of intrusion detection and prevention systems.
Vyas Sekar, Ravishankar Krishnaswamy, Anupam Gupta, Michael K. Reiter
2010Optimal content placement for a large-scale VoD system.
David L. Applegate, Aaron Archer, Vijay Gopalakrishnan, Seungjoon Lee, K. K. Ramakrishnan
2010Personal data vaults: a locus of control for personal data streams.
Min Y. Mun, Shuai Hao, Nilesh Mishra, Katie Shilton, Jeff Burke, Deborah Estrin, Mark H. Hansen, Ramesh Govindan
2010Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, CoNEXT 2010, Philadelphia, PA, USA, November 30 - December 03, 2010
Jaudelice Cavalcante de Oliveira, Maximilian Ott, Timothy G. Griffin, Muriel Médard
2010Profiling-By-Association: a resilient traffic profiling solution for the internet backbone.
Marios Iliofotou, Brian Gallagher, Tina Eliassi-Rad, Guowu Xie, Michalis Faloutsos
2010Scalable routing on flat names.
Ankit Singla, Brighten Godfrey, Kevin R. Fall, Gianluca Iannaccone, Sylvia Ratnasamy
2010SecondNet: a data center network virtualization architecture with bandwidth guarantees.
Chuanxiong Guo, Guohan Lu, Helen J. Wang, Shuang Yang, Chao Kong, Peng Sun, Wenfei Wu, Yongguang Zhang
2010Simple yet efficient, transparent airtime allocation for TCP in wireless mesh networks.
Ki-Young Jang, Konstantinos Psounis, Ramesh Govindan
2010Spatio-temporal patterns in network events.
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu
2010Strengthening forensic investigations of child pornography on P2P networks.
Marc Liberatore, Brian Neil Levine, Clay Shields
2010The Internet is flat: modeling the transition from a transit hierarchy to a peering mesh.
Amogh Dhamdhere, Constantine Dovrolis
2010Verifiable network-performance measurements.
Katerina J. Argyraki, Petros Maniatis, Ankit Singla