IMC '05 | Multi-Hop Probing Asymptotics in Available Bandwidth Estimation: Stochastic Analysis | Xiliang Liu, Kaliappa Ravindran, Dmitri Loguinov |
IMC '05 | Exploiting Internet Route Sharing for Large Scale Available Bandwidth Estimation | Ningning Hu, Peter Steenkiste |
IMC '05 | Inferring and Debugging Path MTU Discovery Failures | Matthew Luckie, Kenjiro Cho, Bill Owens |
IMC '05 | Characterization and Measurement of TCP Traversal Through NATs and Firewalls | Saikat Guha, Paul Francis |
IMC '05 | Predicting Short-Transfer Latency from TCP Arcana: A Trace-based Validation | Martin Arlitt, Balachander Krishnamurthy, Jeffrey C. Mogul |
IMC '05 | Novel Approaches to End-to-End Packet Reordering Measurement | Xiapu Luo, Rocky K.C. Chang |
IMC '05 | Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic | Michael Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, David Watson |
IMC '05 | Sparse Approximations for High Fidelity Compression of Network Traffic Data | William Aiello, Anna Gilbert, Brian Rexroad, Vyas Sekar |
IMC '05 | Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic | Stefan Kornexl, Vern Paxson, Holger Dreger, Anja Feldmann, Robin Sommer |
IMC '05 | Improving Sketch Reconstruction Accuracy Using Linear Least Squares Method | Gene Moo Lee, Huiya Liu, Young Yoon, Yin Zhang |
IMC '05 | Understanding Congestion in IEEE 802.11b Wireless Networks | Amit P. Jardosh, Krishna N. Ramachandran, Kevin C. Almeroth, Elizabeth M. Belding-Royer |
IMC '05 | Facilitating Access Point Selection in IEEE 802.11 Wireless Networks | S. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose, D. Towsley |
IMC '05 | Eliminating Handoff Latencies in 802.11 WLANs Using Multiple Radios: Applications, Experience, and Evaluation | Vladimir Brik, Arunesh Mishra, Suman Banerjee |
IMC '05 | Estimation of Link Interference in Static Multi-hop Wireless Networks | Jitendra Padhye, Sharad Agarwal, Venkata N. Padmanabhan, Lili Qiu, Ananth Rao, Brian Zill |
IMC '05 | Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage | Eric Rozner, William Arbaugh |
IMC '05 | Network Anomography | Zihui Ge, Albert Greenberg, Matthew Roughan |
IMC '05 | Combining Filtering and Statistical Methods for Anomaly Detection | Augustin Soule, Kavé Salamatian, Nina Taft |
IMC '05 | Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation | Yu Gu, Andrew McCallum |
IMC '05 | Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event | Vern Paxson, Nicholas Weaver |
IMC '05 | Collaborating Against Common Enemies | Sachin Katti, Dina Katabi |
IMC '05 | Perils of Transitive Trust in the Domain Name System | |
IMC '05 | Flooding Attacks by Exploiting Persistent Forwarding Loops | Jianhong Xia, Lixin Gao, Teng Fei |
USENIX Security '05 | Security Analysis of a Cryptographically-Enabled RFID Device | Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo |
USENIX Security '05 | Stronger Password Authentication Using Browser Extensions | Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John C Mitchell |
USENIX Security '05 | Cryptographic Voting Protocols: A Systems Perspective | Chris Karlof, Naveen Sastry, David Wagner |