SIGCOMM A*

38 papers

YearTitle / Authors
2008A case for adapting channel width in wireless networks.
Ranveer Chandra, Ratul Mahajan, Thomas Moscibroda, Ramya Raghavendra, Paramvir Bahl
2008A policy-aware switching layer for data centers.
Dilip Antony Joseph, Arsalan Tavakoli, Ion Stoica
2008A scalable, commodity data center network architecture.
Mohammad Al-Fares, Alexander Loukissas, Amin Vahdat
2008Accountable internet protocol (aip).
David G. Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker
2008Answering what-if deployment and configuration questions with wise.
Muhammad Mukarram Bin Tariq, Amgad Zeitoun, Vytautas Valancius, Nick Feamster, Mostafa H. Ammar
2008Bittorrent is an auction: analyzing and improving bittorrent's incentives.
Dave Levin, Katrina LaCurts, Neil Spring, Bobby Bhattacharjee
2008Challenges, design and analysis of a large-scale p2p-vod system.
Yan Huang, Tom Z. J. Fu, Dah-Ming Chiu, John C. S. Lui, Cheng Huang
2008Dcell: a scalable and fault-tolerant network structure for data centers.
Chuanxiong Guo, Haitao Wu, Kun Tan, Lei Shi, Yongguang Zhang, Songwu Lu
2008Deflating the big bang: fast and scalable deep packet inspection with extended finite automata.
Randy Smith, Cristian Estan, Somesh Jha, Shijin Kong
2008Discarte: a disjunctive internet cartographer.
Rob Sherwood, Adam Bender, Neil Spring
2008Donnybrook: enabling large-scale, high-speed, peer-to-peer games.
Ashwin R. Bharambe, John R. Douceur, Jacob R. Lorch, Thomas Moscibroda, Jeffrey Pang, Srinivasan Seshan, Xinyu Zhuang
2008Enriching network security analysis with time travel.
Gregor Maier, Robin Sommer, Holger Dreger, Anja Feldmann, Vern Paxson, Fabian Schneider
2008Floodless in seattle: a scalable ethernet architecture for large enterprises.
Changhoon Kim, Matthew Caesar, Jennifer Rexford
2008Interactive wifi connectivity for moving vehicles.
Aruna Balasubramanian, Ratul Mahajan, Arun Venkataramani, Brian Neil Levine, John Zahorjan
2008Ispy: detecting ip prefix hijacking on my own.
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing Morley Mao, Randy Bush
2008Learning to share: narrowband-friendly wideband networks.
Hariharan Rahul, Nate Kushman, Dina Katabi, Charles G. Sodini, Farinaz Edalat
2008Modeling the internet is fun!: but can you make a living?
Donald F. Towsley
2008Network discovery from passive measurements.
Brian Eriksson, Paul Barford, Robert D. Nowak
2008Network exception handlers: host-network control in enterprise networks.
Thomas Karagiannis, Richard Mortier, Antony I. T. Rowstron
2008P4p: provider portal for applications.
Haiyong Xie, Yang Richard Yang, Arvind Krishnamurthy, Yanbin Grace Liu, Abraham Silberschatz
2008Packet caches on routers: the implications of universal redundant traffic elimination.
Ashok Anand, Archit Gupta, Aditya Akella, Srinivasan Seshan, Scott Shenker
2008Path splicing.
Murtaza Motiwala, Megan Elmore, Nick Feamster, Santosh S. Vempala
2008Predictable performance optimization for wireless networks.
Yi Li, Lili Qiu, Yin Zhang, Ratul Mahajan, Eric Rozner
2008Proceedings of the ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008
Victor Bahl, David Wetherall, Stefan Savage, Ion Stoica
2008Rationality and traffic attraction: incentives for honest path announcements in bgp.
Sharon Goldberg, Shai Halevi, Aaron D. Jaggard, Vijay Ramachandran, Rebecca N. Wright
2008Rd network services: differentiation through performance incentives.
Maxim Podlesny, Sergey Gorinsky
2008Satellitelab: adding heterogeneity to planetary-scale network testbeds.
Marcel Dischinger, Andreas Haeberlen, Ivan Beschastnikh, P. Krishna Gummadi, Stefan Saroiu
2008Shadow configuration as a network management primitive.
Richard Alimi, Ye Wang, Yang Richard Yang
2008Shedding light on the glue logic of the internet routing architecture.
Franck Le, Geoffrey G. Xie, Dan Pei, Jia Wang, Hui Zhang
2008Spamming botnets: signatures and characteristics.
Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, Ivan Osipkov
2008Symbol-level network coding for wireless mesh networks.
Sachin Katti, Dina Katabi, Hari Balakrishnan, Muriel Médard
2008Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems.
David R. Choffnes, Fabián E. Bustamante
2008To filter or to authorize: network-layer DoS defense against multimillion-node botnets.
Xin Liu, Xiaowei Yang, Yanbin Lu
2008Unconstrained endpoint profiling (googling the internet).
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuzmanovic, Antonio Nucci
2008Virtual routers on the move: live router migration as a network-management primitive.
Yi Wang, Eric Keller, Brian Biskeborn, Jacobus E. van der Merwe, Jennifer Rexford
2008What's going on?: learning communication rules in edge networks.
Srikanth Kandula, Ranveer Chandra, Dina Katabi
2008Xl: an efficient network routing algorithm.
Kirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, Stefan Savage
2008Zigzag decoding: combating hidden terminals in wireless networks.
Shyamnath Gollakota, Dina Katabi