| 2008 | A case for adapting channel width in wireless networks. Ranveer Chandra, Ratul Mahajan, Thomas Moscibroda, Ramya Raghavendra, Paramvir Bahl |
| 2008 | A policy-aware switching layer for data centers. Dilip Antony Joseph, Arsalan Tavakoli, Ion Stoica |
| 2008 | A scalable, commodity data center network architecture. Mohammad Al-Fares, Alexander Loukissas, Amin Vahdat |
| 2008 | Accountable internet protocol (aip). David G. Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker |
| 2008 | Answering what-if deployment and configuration questions with wise. Muhammad Mukarram Bin Tariq, Amgad Zeitoun, Vytautas Valancius, Nick Feamster, Mostafa H. Ammar |
| 2008 | Bittorrent is an auction: analyzing and improving bittorrent's incentives. Dave Levin, Katrina LaCurts, Neil Spring, Bobby Bhattacharjee |
| 2008 | Challenges, design and analysis of a large-scale p2p-vod system. Yan Huang, Tom Z. J. Fu, Dah-Ming Chiu, John C. S. Lui, Cheng Huang |
| 2008 | Dcell: a scalable and fault-tolerant network structure for data centers. Chuanxiong Guo, Haitao Wu, Kun Tan, Lei Shi, Yongguang Zhang, Songwu Lu |
| 2008 | Deflating the big bang: fast and scalable deep packet inspection with extended finite automata. Randy Smith, Cristian Estan, Somesh Jha, Shijin Kong |
| 2008 | Discarte: a disjunctive internet cartographer. Rob Sherwood, Adam Bender, Neil Spring |
| 2008 | Donnybrook: enabling large-scale, high-speed, peer-to-peer games. Ashwin R. Bharambe, John R. Douceur, Jacob R. Lorch, Thomas Moscibroda, Jeffrey Pang, Srinivasan Seshan, Xinyu Zhuang |
| 2008 | Enriching network security analysis with time travel. Gregor Maier, Robin Sommer, Holger Dreger, Anja Feldmann, Vern Paxson, Fabian Schneider |
| 2008 | Floodless in seattle: a scalable ethernet architecture for large enterprises. Changhoon Kim, Matthew Caesar, Jennifer Rexford |
| 2008 | Interactive wifi connectivity for moving vehicles. Aruna Balasubramanian, Ratul Mahajan, Arun Venkataramani, Brian Neil Levine, John Zahorjan |
| 2008 | Ispy: detecting ip prefix hijacking on my own. Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing Morley Mao, Randy Bush |
| 2008 | Learning to share: narrowband-friendly wideband networks. Hariharan Rahul, Nate Kushman, Dina Katabi, Charles G. Sodini, Farinaz Edalat |
| 2008 | Modeling the internet is fun!: but can you make a living? Donald F. Towsley |
| 2008 | Network discovery from passive measurements. Brian Eriksson, Paul Barford, Robert D. Nowak |
| 2008 | Network exception handlers: host-network control in enterprise networks. Thomas Karagiannis, Richard Mortier, Antony I. T. Rowstron |
| 2008 | P4p: provider portal for applications. Haiyong Xie, Yang Richard Yang, Arvind Krishnamurthy, Yanbin Grace Liu, Abraham Silberschatz |
| 2008 | Packet caches on routers: the implications of universal redundant traffic elimination. Ashok Anand, Archit Gupta, Aditya Akella, Srinivasan Seshan, Scott Shenker |
| 2008 | Path splicing. Murtaza Motiwala, Megan Elmore, Nick Feamster, Santosh S. Vempala |
| 2008 | Predictable performance optimization for wireless networks. Yi Li, Lili Qiu, Yin Zhang, Ratul Mahajan, Eric Rozner |
| 2008 | Proceedings of the ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008 Victor Bahl, David Wetherall, Stefan Savage, Ion Stoica |
| 2008 | Rationality and traffic attraction: incentives for honest path announcements in bgp. Sharon Goldberg, Shai Halevi, Aaron D. Jaggard, Vijay Ramachandran, Rebecca N. Wright |
| 2008 | Rd network services: differentiation through performance incentives. Maxim Podlesny, Sergey Gorinsky |
| 2008 | Satellitelab: adding heterogeneity to planetary-scale network testbeds. Marcel Dischinger, Andreas Haeberlen, Ivan Beschastnikh, P. Krishna Gummadi, Stefan Saroiu |
| 2008 | Shadow configuration as a network management primitive. Richard Alimi, Ye Wang, Yang Richard Yang |
| 2008 | Shedding light on the glue logic of the internet routing architecture. Franck Le, Geoffrey G. Xie, Dan Pei, Jia Wang, Hui Zhang |
| 2008 | Spamming botnets: signatures and characteristics. Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, Ivan Osipkov |
| 2008 | Symbol-level network coding for wireless mesh networks. Sachin Katti, Dina Katabi, Hari Balakrishnan, Muriel Médard |
| 2008 | Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems. David R. Choffnes, Fabián E. Bustamante |
| 2008 | To filter or to authorize: network-layer DoS defense against multimillion-node botnets. Xin Liu, Xiaowei Yang, Yanbin Lu |
| 2008 | Unconstrained endpoint profiling (googling the internet). Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuzmanovic, Antonio Nucci |
| 2008 | Virtual routers on the move: live router migration as a network-management primitive. Yi Wang, Eric Keller, Brian Biskeborn, Jacobus E. van der Merwe, Jennifer Rexford |
| 2008 | What's going on?: learning communication rules in edge networks. Srikanth Kandula, Ranveer Chandra, Dina Katabi |
| 2008 | Xl: an efficient network routing algorithm. Kirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, Stefan Savage |
| 2008 | Zigzag decoding: combating hidden terminals in wireless networks. Shyamnath Gollakota, Dina Katabi |