Volume 34,
Number 1,
January 2004
Papers from Hotnets-II
- Neil T. Spring, David Wetherall, Thomas E. Anderson:
Reverse engineering the Internet.
3-8
- George Varghese, Cristian Estan:
The measurement manifesto.
9-14
- Mike Wawrzoniak, Larry L. Peterson, Timothy Roscoe:
Sophia: an Information Plane for networked systems.
15-20
- Donald F. Caldwell, Anna Gilbert, Joel Gottlieb, Albert G. Greenberg, Gísli Hjálmtýsson, Jennifer Rexford:
The cutting EDGE of IP router configuration.
21-26
- Roger Karrer, Ashutosh Sabharwal, Edward W. Knightly:
Enabling large-scale wireless broadband: the case for TAPs.
27-32
- Pravin Bhagwat, Bhaskaran Raman, Dheeraj Sanghi:
Turning 802.11 inside-out.
33-38
- Thomas E. Anderson, Timothy Roscoe, David Wetherall:
Preventing Internet denial-of-service with capabilities.
39-44
- Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica:
Taming IP packet flooding attacks.
45-50
- Christian Kreibich, Jon Crowcroft:
Honeycomb: creating intrusion detection signatures using honeypots.
51-56
- Vivek S. Pai, Limin Wang, KyoungSoo Park, Ruoming Pang, Larry L. Peterson:
The dark side of the Web: an open proxy's view.
57-62
- Glenn Judd, Peter Steenkiste:
Repeatable and realistic wireless experimentation through physical emulation.
63-68
- Sanjit Biswas, Robert Morris:
Opportunistic routing in multi-hop wireless networks.
69-74
- Romit Roy Choudhury, Nitin H. Vaidya:
MAC-layer anycasting in ad hoc networks.
75-80
- Alex C. Snoeren, Barath Raghavan:
Decoupling policy from mechanism in Internet routing.
81-86
- Nick Feamster:
Practical verification techniques for wide-area routing.
87-92
- Bryan Ford:
Unmanaged Internet Protocol: taming the edge network management crisis.
93-98
- Jeffrey C. Mogul, Lawrence S. Brakmo, David E. Lowell, Dinesh Subhraveti, Justin Moore:
Unveiling the transport.
99-106
- Ravi Kokku, Taylor L. Riché, Aaron R. Kunze, Jayaram Mudigonda, Jamie Jason, Harrick M. Vin:
A case for run-time adaptation in packet processing systems.
107-112
- Russ Cox, Frank Dabek, M. Frans Kaashoek, Jinyang Li, Robert Morris:
Practical, distributed network coordinates.
113-118
- Matt Welsh:
Exposing resource tradeoffs in region-based communication abstractions for sensor networks.
119-124
- Deepak Ganesan, Sylvia Ratnasamy, Hanbiao Wang, Deborah Estrin:
Coping with irregular spatio-temporal sampling in sensor networks.
125-130
- Miguel Castro, Manuel Costa, Antony I. T. Rowstron:
Should we build Gnutella on a structured overlay?
131-136
- Jeffrey Considine, John W. Byers, Ketan Meyer-Patel:
A constraint satisfaction approach to testbed embedding services.
137-142
Volume 34,
Number 2,
April 2004
- Ola Nordström, Constantinos Dovrolis:
Beware of BGP attacks.
1-8
- Steve Uhlig:
Non-stationarity and high-order scaling in TCP flow arrivals: a methodological analysis.
9-24
- Luigi Alfredo Grieco, Saverio Mascolo:
Performance evaluation and comparison of Westwood+, New Reno, and Vegas TCP congestion control.
25-38
- Jelena Mirkovic, Peter L. Reiher:
A taxonomy of DDoS attack and DDoS defense mechanisms.
39-53
- Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
SAKM: a scalable and adaptive key management approach for multicast communications.
55-70
- Kathleen M. Nichols, Van Jacobson, Kedarnath Poduri:
A Per-Domain Behavior for circuit emulation in IP networks.
71-83
- Andrei Gurtov, Sally Floyd:
Modeling wireless links for transport protocols.
85-96
- Will Eatherton, George Varghese, Zubin Dittia:
Tree bitmap: hardware/software IP lookups with incremental updates.
97-122
- Sourabh Ladha, Stephan Baucke, Reiner Ludwig, Paul D. Amer:
On making SCTP robust to spurious retransmissions.
123-135
- Jörg Widmer, Catherine Boutremans, Jean-Yves Le Boudec:
End-to-end congestion control for TCP-friendly flows with variable packet size.
137-151
Volume 34,
Number 3,
July 2004
Special Section on Science of Network Design
- Antonis Papachristodoulou, Lun Li, John C. Doyle:
Methodological frameworks for large-scale network analysis and design.
7-20
- Azer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibrahim Matta:
Safe compositional specification of networking systems.
21-34
- Thomas Voice:
A global stability result for primal-dual congestion control algorithms with routing.
35-41
- Aditya Akella, Shuchi Chawla, Arvind Kannan, Srinivasan Seshan:
On the scaling of congestion in the internet graph.
43-56
- Fan Bai, Ganesha Bhaskara, Ahmed Helmy:
Building the blocks of protocol design and analysis: challenges and lessons learned from case studies on mobile ad hoc routing and micro-mobility protocols.
57-70
- Ashish Agarwal, P. R. Kumar:
Capacity bounds for ad hoc and hybrid wireless networks.
71-81
Volume 34,
Number 4,
October 2004
Raj Yavatkar, Ellen W. Zegura, Jennifer Rexford (Eds.):
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 2004, Portland, Oregon, USA.
ACM 2004, ISBN 1-58113-862-8
Contents
Volume 34,
Number 5,
October 2004
- Tatjana Curcic, Mark E. Filipkowski, Almadena Yu. Chtchelkanova, Philip A. D'Ambrosio, Stuart A. Wolf, Michael Foster, Douglas Cochran:
Quantum networks: from quantum cryptography to quantum architecture.
3-8
- Seth Lloyd, Jeffrey H. Shapiro, Franco N. C. Wong, Prem Kumar, Selim M. Shahriar, Horace P. Yuen:
Infrastructure for the quantum internet.
9-20
- Eric Corndorf, Chuang Liang, Gregory S. Kanter, Prem Kumar, Horace P. Yuen:
Quantum-noise: protected data encryption for WDM fiber-optic networks.
21-30
- Mark Gaynor, Scott Bradner:
A real options framework to value network, protocol, and service architecture.
31-38
- Paramvir Bahl, Atul Adya, Jitendra Padhye, Alec Wolman:
Reconsidering wireless systems with multiple radios.
39-46
- Zhi Li, Prasant Mohapatra:
QoS-aware multicasting in DiffServ domains.
47-57
- Yi-Min Wang, Lili Qiu, Chad Verbowski, Dimitris Achlioptas, Gautam Das, Per-Åke Larson:
Summary-based routing for content-based event distribution networks.
59-74
- Wesley M. Eddy, Shawn Ostermann, Mark Allman:
New techniques for making transport protocols robust to corruption-based loss.
75-88
- Steve Uhlig, Olivier Bonaventure:
Designing BGP-based outbound traffic engineering techniques for stub ASes.
89-106
Copyright © Mon Mar 15 03:58:33 2010
by Michael Ley (ley@uni-trier.de)