| 2010 | A framework for low-power IPv6 routing simulation, experimentation, and evaluation. Nicolas Tsiftes, Joakim Eriksson, Niclas Finne, Fredrik Österlind, Joel Höglund, Adam Dunkels |
| 2010 | ASTUTE: detecting a different class of traffic anomalies. Fernando Silveira, Christophe Diot, Nina Taft, Ramesh Govindan |
| 2010 | Accelerating SSL with GPUs. Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon, KyoungSoo Park |
| 2010 | Accelerometer-assisted 802.11 rate adaptation on mass rapid transit system. Yu-Jen Lai, Wei-Hao Kuo, Wan-Ting Chiu, Shao-Ting Chang, Hung-Yu Wei |
| 2010 | Achieving O(1) IP lookup on GPU-based software routers. Jin Zhao, Xinya Zhang, Xin Wang, Xiangyang Xue |
| 2010 | An analysis of social network-based Sybil defenses. Bimal Viswanath, Ansley Post, P. Krishna Gummadi, Alan Mislove |
| 2010 | An open router virtualization framework using a programmable forwarding plane. Zdravko Bozakov |
| 2010 | Automating root-cause analysis of network anomalies using frequent itemset mining. Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos, Maurizio Molina, Pere Barlet-Ros, Daniela Brauckhoff |
| 2010 | Autonomous traffic engineering with self-configuring topologies. Srikanth Sundaresan, Cristian Lumezanu, Nick Feamster, Pierre François |
| 2010 | Backpressure-based routing protocol for DTNs. Amit Dvir, Athanasios V. Vasilakos |
| 2010 | CARMEN: resource management and abstraction in wireless heterogeneous mesh networks. Nico Bayer, Krzysztof Loziak, Andres Garcia-Saavedra, Cigdem Sengul, Pablo Serrano |
| 2010 | California fault lines: understanding the causes and impact of network failures. Daniel Turner, Kirill Levchenko, Alex C. Snoeren, Stefan Savage |
| 2010 | Caliper: a tool to generate precise and closed-loop traffic. Monia Ghobadi, Martin Labrecque, Geoffrey Salmon, Kaveh Aasaraai, Soheil Hassas Yeganeh, Yashar Ganjali, J. Gregory Steffan |
| 2010 | Circumventing censorship with collage. Sam Burnett, Nick Feamster, Santosh S. Vempala |
| 2010 | Cloudward bound: planning for beneficial migration of enterprise applications to the cloud. Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, David A. Maltz, Sanjay G. Rao, Kunwadee Sripanidkulchai, Mohit Tawarmalani |
| 2010 | Cone of silence: adaptively nulling interferers in wireless networks. Georgios Nikolaidis, Astrit Zhushi, Kyle Jamieson, Brad Karp |
| 2010 | Contrabass: concurrent transmissions without coordination. Sungro Yoon |
| 2010 | Crowdsourcing service-level network event monitoring. David R. Choffnes, Fabián E. Bustamante, Zihui Ge |
| 2010 | DONAR: decentralized server selection for cloud services. Patrick Wendell, Joe Wenjie Jiang, Michael J. Freedman, Jennifer Rexford |
| 2010 | Data center TCP (DCTCP). Mohammad Alizadeh, Albert G. Greenberg, David A. Maltz, Jitendra Padhye, Parveen Patel, Balaji Prabhakar, Sudipta Sengupta, Murari Sridharan |
| 2010 | Design and implementation of an "approximate" communication system for wireless media applications. Sayandeep Sen, Syed Gilani, Shreesha Srinath, Stephen Schmitt, Suman Banerjee |
| 2010 | Detecting the performance impact of upgrades in large operational networks. Ajay Anil Mahimkar, Han Hee Song, Zihui Ge, Aman Shaikh, Jia Wang, Jennifer Yates, Yin Zhang, Joanne Emmons |
| 2010 | Differentially-private network trace analysis. Frank McSherry, Ratul Mahajan |
| 2010 | EffiCuts: optimizing packet classification for memory and throughput. Balajee Vamanan, Gwendolyn Voskuilen, T. N. Vijaykumar |
| 2010 | Efficient error estimating coding: feasibility and applications. Binbin Chen, Ziling Zhou, Yuda Zhao, Haifeng Yu |
| 2010 | Empowering users against sidejacking attacks. Ryan D. Riley, Nada Mohammed Ali, Kholoud Saleh Al-Senaidi, Aisha Lahdan Al-Kuwari |
| 2010 | Encrypting the internet. Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mathew Eszenyi, Shay Gueron, David Durham |
| 2010 | Experimenting software radio with the Sora platform. Jiansong Zhang, Kun Tan, Sen Xiang, Qiufeng Yin, Qi Luo, Yong He, Ji Fang, Yongguang Zhang |
| 2010 | Experimenting with multipath TCP. Sébastien Barré, Olivier Bonaventure, Costin Raiciu, Mark Handley |
| 2010 | Fair bandwidth allocation in wireless network using max-flow. Sourav Kumar Dandapat, Bivas Mitra, Niloy Ganguly, Romit Roy Choudhury |
| 2010 | Fine-grained channel access in wireless LAN. Kun Tan, Ji Fang, Yuanyang Zhang, Shouyuan Chen, Lixin Shi, Jiansong Zhang, Yongguang Zhang |
| 2010 | Fived: a service-based architecture implementation to innovate at the endpoints. D. J. Capelis, Darrell D. E. Long |
| 2010 | Flexible multimedia content retrieval using InfoNames. Arun Kumar, Ashok Anand, Aditya Akella, Athula Balachandran, Vyas Sekar, Srinivasan Seshan |
| 2010 | Generic and automatic address configuration for data center networks. Kai Chen, Chuanxiong Guo, Haitao Wu, Jing Yuan, Zhenqian Feng, Yan Chen, Songwu Lu, Wenfei Wu |
| 2010 | Helios: a hybrid electrical/optical switch architecture for modular data centers. Nathan Farrington, George Porter, Sivasankar Radhakrishnan, Hamid Hajabdolali Bazzaz, Vikram Subramanya, Yeshaiahu Fainman, George Papen, Amin Vahdat |
| 2010 | How secure are secure interdomain routing protocols. Sharon Goldberg, Michael Schapira, Peter Hummon, Jennifer Rexford |
| 2010 | Internet inter-domain traffic. Craig Labovitz, Scott Iekel-Johnson, Danny McPherson, Jon Oberheide, Farnam Jahanian |
| 2010 | LokVaani: demonstrating interactive voice in Lo3. Vijay Gabale, Bhaskaran Raman, Kameswari Chebrolu, Purushottam Kulkarni |
| 2010 | MPAP: virtualization architecture for heterogenous wireless APs. Yong He, Ji Fang, Jiansong Zhang, Haichen Shen, Kun Tan, Yongguang Zhang |
| 2010 | Mobile data offloading: how much can WiFi deliver? Kyunghan Lee, Injong Rhee, Joohyun Lee, Yung Yi, Song Chong |
| 2010 | Multi-hop packet tracking for experimental facilities. Tacio Santos, Christian Henke, Carsten Schmoll, Tanja Zseby |
| 2010 | NetFence: preventing internet denial of service from inside out. Xin Liu, Xiaowei Yang, Yong Xia |
| 2010 | NetShield: massive semantics-based vulnerability signature matching for high-speed networks. Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen, Bin Liu, Junchen Jiang, Yuezhou Lv |
| 2010 | No more middlebox: integrate processing into network. Jeongkeun Lee, Jean Tourrilhes, Puneet Sharma, Sujata Banerjee |
| 2010 | Not all microseconds are equal: fine-grained per-flow measurements with reference latency interpolation. Myungjin Lee, Nick G. Duffield, Ramana Rao Kompella |
| 2010 | PacketShader: a GPU-accelerated software router. Sangjin Han, Keon Jang, KyoungSoo Park, Sue B. Moon |
| 2010 | Passive IP traceback: capturing the origin of anonymous traffic through network telescopes. Guang Yao, Jun Bi, Zijian Zhou |
| 2010 | PixNet: LCD-camera pairs as communication links. Samuel David Perli, Nabeel Ahmed, Dina Katabi |
| 2010 | Predictable 802.11 packet delivery from wireless channel measurements. Daniel Halperin, Wenjun Hu, Anmol Sheth, David Wetherall |
| 2010 | Privacy-preserving P2P data sharing with OneSwarm. Tomas Isdal, Michael Piatek, Arvind Krishnamurthy, Thomas E. Anderson |
| 2010 | Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010 Shivkumar Kalyanaraman, Venkata N. Padmanabhan, K. K. Ramakrishnan, Rajeev Shorey, Geoffrey M. Voelker |
| 2010 | Protocol design for effective communication among silicon or carbon-based nodes. Radia J. Perlman |
| 2010 | QuagFlow: partnering Quagga with OpenFlow. Marcelo Ribeiro Nascimento, Christian Esteve Rothenberg, Marcos Rogério Salvador, Maurício F. Magalhães |
| 2010 | R3: resilient routing reconfiguration. Ye Wang, Hao Wang, Ajay Mahimkar, Richard Alimi, Yin Zhang, Lili Qiu, Yang Richard Yang |
| 2010 | Residual white space distribution-based opportunistic channel access for cognitive radio enabled devices. Manuj Sharma, Anirudha Sahoo |
| 2010 | Rethinking iBGP routing. Iuniana Oprescu, Mickael Meulle, Steve Uhlig, Cristel Pelsser, Olaf Maennel, Philippe Owezarski |
| 2010 | Ripcord: a modular platform for data center networking. Brandon Heller, David Erickson, Nick McKeown, Rean Griffith, Igor Ganichev, Scott Whyte, Kyriakos Zarifis, Daekyeong Moon, Scott Shenker, Stephen Stuart |
| 2010 | Road traffic estimation using in-situ acoustic sensing. C. Viven Rajendra, Purushottam Kulkarni |
| 2010 | SIP overload control: a backpressure-based approach. Yaogong Wang |
| 2010 | Scalable flow-based networking with DIFANE. Minlan Yu, Jennifer Rexford, Michael J. Freedman, Jia Wang |
| 2010 | SecureAngle: improving wireless security using angle-of-arrival information (poster abstract). Jie Xiong, Kyle Jamieson |
| 2010 | SoftCast: one-size-fits-all wireless video. Szymon Jakubczak, Dina Katabi |
| 2010 | Source flow: handling millions of flows on flow-based nodes. Yasunobu Chiba, Yusuke Shinohara, Hideyuki Shimonishi |
| 2010 | SourceSync: a distributed wireless architecture for exploiting sender diversity. Hariharan Rahul, Haitham Hassanieh, Dina Katabi |
| 2010 | Stochastic approximation algorithm for optimal throughput performance of wireless LANs. Sundaresan Krishnan, Prasanna Chaporkar |
| 2010 | Stratus: energy-efficient mobile communication using cloud support. Bhavish Agarwal, Pushkar V. Chitnis, Amit Dey, Kamal Jain, Vishnu Navda, Venkata N. Padmanabhan, Ramachandran Ramjee, Aaron Schulman, Neil Spring |
| 2010 | SwitchBlade: a platform for rapid deployment of network protocols on programmable hardware. Muhammad Bilal Anwer, Murtaza Motiwala, Muhammad Mukarram Bin Tariq, Nick Feamster |
| 2010 | Symbiotic routing in future data centers. Hussam Abu-Libdeh, Paolo Costa, Antony I. T. Rowstron, Greg O'Shea, Austin Donnelly |
| 2010 | The little engine(s) that could: scaling online social networks. Josep M. Pujol, Vijay Erramilli, Georgos Siganos, Xiaoyuan Yang, Nikolaos Laoutaris, Parminder Chhabra, Pablo Rodriguez |
| 2010 | Theory and new primitives for safely connecting routing protocol instances. Franck Le, Geoffrey G. Xie, Hui Zhang |
| 2010 | Transit portal: BGP connectivity as a service. Vytautas Valancius, Hyojoon Kim, Nick Feamster |
| 2010 | Twittering by cuckoo: decentralized and socio-aware online microblogging services. Tianyin Xu, Yang Chen, Xiaoming Fu, Pan Hui |
| 2010 | Unbiased sampling in directed social graph. Tianyi Wang, Yang Chen, Zengbin Zhang, Peng Sun, Beixing Deng, Xing Li |
| 2010 | Understanding block-level address usage in the visible internet. Xue Cai, John S. Heidemann |
| 2010 | VMtorrent: virtual appliances on-demand. Joshua Reich, Oren Laadan, Eli Brosh, Alex Sherman, Vishal Misra, Jason Nieh, Dan Rubenstein |
| 2010 | Vehicular wifi access and rate adaptation. Ajinkya Uday Joshi, Purushottam Kulkarni |
| 2010 | c-Through: part-time optics in data centers. Guohui Wang, David G. Andersen, Michael Kaminsky, Konstantina Papagiannaki, T. S. Eugene Ng, Michael Kozuch, Michael P. Ryan |