| 2010 | A cost comparison of datacenter network architectures. Lucian Popa, Sylvia Ratnasamy, Gianluca Iannaccone, Arvind Krishnamurthy, Ion Stoica |
| 2010 | Assessing the vulnerability of replicated network services. George Dean Bissias, Brian Neil Levine, Ramesh K. Sitaraman |
| 2010 | Auto-configuration of 802.11n WLANs. Mustafa Y. Arslan, Konstantinos Pelechrinis, Ioannis Broustis, Srikanth V. Krishnamurthy, Sateesh Addepalli, Konstantina Papagiannaki |
| 2010 | Balancing throughput, robustness, and in-order delivery in P2P VoD. Bin Fan, David G. Andersen, Michael Kaminsky, Konstantina Papagiannaki |
| 2010 | Declarative configuration management for complex and dynamic networks. Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. van der Merwe |
| 2010 | Enabling high-bandwidth vehicular content distribution. Upendra Shevade, Yi-Chao Chen, Lili Qiu, Yin Zhang, Vinoth Chandar, Mi Kyung Han, Han Hee Song, Yousuk Seung |
| 2010 | Exploiting locality of interest in online social networks. Mike P. Wittie, Veljko Pejovic, Lara B. Deek, Kevin C. Almeroth, Ben Y. Zhao |
| 2010 | Federation of virtualized infrastructures: sharing the value of diversity. Panayotis Antoniadis, Serge Fdida, Timur Friedman, Vishal Misra |
| 2010 | G-RCA: a generic root cause analysis platform for service quality management in large IP networks. He Yan, Lee Breslau, Zihui Ge, Daniel Massey, Dan Pei, Jennifer Yates |
| 2010 | ICTCP: Incast Congestion Control for TCP in data center networks. Haitao Wu, Zhenqian Feng, Chuanxiong Guo, Yongguang Zhang |
| 2010 | Inferring invisible traffic. Vineet Bharti, Pankaj Kankar, Lokesh Setia, Gonca Gürsun, Anukool Lakhina, Mark Crovella |
| 2010 | Internet traffic classification demystified: on the sources of the discriminative power. Yeon-Sup Lim, Hyunchul Kim, Jiwoong Jeong, Chong-Kwon Kim, Ted Taekyoung Kwon, Yanghee Choi |
| 2010 | Is content publishing in BitTorrent altruistic or profit-driven? Rubén Cuevas Rumín, Michal Kryczka, Ángel Cuevas, Sebastian Kaune, Carmen Guerrero, Reza Rejaie |
| 2010 | LEGUP: using heterogeneity to reduce the cost of data center network upgrades. Andrew R. Curtis, Srinivasan Keshav, Alejandro López-Ortiz |
| 2010 | MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. Romain Fontugne, Pierre Borgnat, Patrice Abry, Kensuke Fukuda |
| 2010 | Mobile data offloading: how much can WiFi deliver? Kyunghan Lee, Injong Rhee, Joohyun Lee, Song Chong, Yung Yi |
| 2010 | NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems. Yu Jin, Nick G. Duffield, Alexandre Gerber, Patrick Haffner, Subhabrata Sen, Zhi-Li Zhang |
| 2010 | Network-wide deployment of intrusion detection and prevention systems. Vyas Sekar, Ravishankar Krishnaswamy, Anupam Gupta, Michael K. Reiter |
| 2010 | Optimal content placement for a large-scale VoD system. David L. Applegate, Aaron Archer, Vijay Gopalakrishnan, Seungjoon Lee, K. K. Ramakrishnan |
| 2010 | Personal data vaults: a locus of control for personal data streams. Min Y. Mun, Shuai Hao, Nilesh Mishra, Katie Shilton, Jeff Burke, Deborah Estrin, Mark H. Hansen, Ramesh Govindan |
| 2010 | Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, CoNEXT 2010, Philadelphia, PA, USA, November 30 - December 03, 2010 Jaudelice Cavalcante de Oliveira, Maximilian Ott, Timothy G. Griffin, Muriel Médard |
| 2010 | Profiling-By-Association: a resilient traffic profiling solution for the internet backbone. Marios Iliofotou, Brian Gallagher, Tina Eliassi-Rad, Guowu Xie, Michalis Faloutsos |
| 2010 | Scalable routing on flat names. Ankit Singla, Brighten Godfrey, Kevin R. Fall, Gianluca Iannaccone, Sylvia Ratnasamy |
| 2010 | SecondNet: a data center network virtualization architecture with bandwidth guarantees. Chuanxiong Guo, Guohan Lu, Helen J. Wang, Shuang Yang, Chao Kong, Peng Sun, Wenfei Wu, Yongguang Zhang |
| 2010 | Simple yet efficient, transparent airtime allocation for TCP in wireless mesh networks. Ki-Young Jang, Konstantinos Psounis, Ramesh Govindan |
| 2010 | Spatio-temporal patterns in network events. Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu |
| 2010 | Strengthening forensic investigations of child pornography on P2P networks. Marc Liberatore, Brian Neil Levine, Clay Shields |
| 2010 | The Internet is flat: modeling the transition from a transit hierarchy to a peering mesh. Amogh Dhamdhere, Constantine Dovrolis |
| 2010 | Verifiable network-performance measurements. Katerina J. Argyraki, Petros Maniatis, Ankit Singla |