Papers

Search results

    ConferenceTitleAuthor(s)
    IMC '05Characterization and Measurement of TCP Traversal Through NATs and FirewallsSaikat Guha, Paul Francis
    IMC '05Predicting Short-Transfer Latency from TCP Arcana: A Trace-based ValidationMartin Arlitt, Balachander Krishnamurthy, Jeffrey C. Mogul
    IMC '05Novel Approaches to End-to-End Packet Reordering MeasurementXiapu Luo, Rocky K.C. Chang
    IMC '05Data Reduction for the Scalable Automated Analysis of Distributed Darknet TrafficMichael Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, David Watson
    IMC '05Sparse Approximations for High Fidelity Compression of Network Traffic DataWilliam Aiello, Anna Gilbert, Brian Rexroad, Vyas Sekar
    IMC '05Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic Stefan Kornexl, Vern Paxson, Holger Dreger, Anja Feldmann, Robin Sommer
    IMC '05Improving Sketch Reconstruction Accuracy Using Linear Least Squares MethodGene Moo Lee, Huiya Liu, Young Yoon, Yin Zhang
    IMC '05Understanding Congestion in IEEE 802.11b Wireless NetworksAmit P. Jardosh, Krishna N. Ramachandran, Kevin C. Almeroth, Elizabeth M. Belding-Royer
    IMC '05Facilitating Access Point Selection in IEEE 802.11 Wireless NetworksS. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose, D. Towsley
    IMC '05Eliminating Handoff Latencies in 802.11 WLANs Using Multiple Radios: Applications, Experience, and EvaluationVladimir Brik, Arunesh Mishra, Suman Banerjee
    IMC '05Estimation of Link Interference in Static Multi-hop Wireless NetworksJitendra Padhye, Sharad Agarwal, Venkata N. Padmanabhan, Lili Qiu, Ananth Rao, Brian Zill
    IMC '05Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an AdvantageEric Rozner, William Arbaugh
    IMC '05Network AnomographyZihui Ge, Albert Greenberg, Matthew Roughan
    IMC '05Combining Filtering and Statistical Methods for Anomaly DetectionAugustin Soule, Kavé Salamatian, Nina Taft
    IMC '05Detecting Anomalies in Network Traffic Using Maximum Entropy EstimationYu Gu, Andrew McCallum
    IMC '05Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale EventVern Paxson, Nicholas Weaver
    IMC '05Collaborating Against Common EnemiesSachin Katti, Dina Katabi
    IMC '05Perils of Transitive Trust in the Domain Name System
    IMC '05Flooding Attacks by Exploiting Persistent Forwarding LoopsJianhong Xia, Lixin Gao, Teng Fei
    IMC '05Measurement-based Characterization of a Collection of On-line GamesChris Chambers, Wu-chang Feng, Sambit Sahu, Debanjan Saha
    IMC '05A First Look at Modern Enterprise TrafficRuoming Pang, Mark Allman, International Computer Science Institute, Mike Bennett, Jason Lee, Vern Paxson, Brian Tierney
    IMC '05Client Behavior and Feed Characteristics of RSS, a Publish-Subscribe System for Web MicronewsHongzhou Liu, Venugopalan Ramasubramanian, Emin Gün Sirer
    IMC '05Measurements, Analysis, and Modeling of BitTorrent-like SystemsLei Guo, Songqing Chen, Zhen Xiao, Enhua Tan, Xiaoning Ding, Xiaodong Zhang
    IMC '05Characterizing Unstructured Overlay Topologies in Modern P2P File-Sharing SystemsDaniel Stutzbach, Reza Rejaie, Subhabrata Sen
    IMC '05Should Internet Service Providers Fear Peer-Assisted Content Distribution?Thomas Karagiannis, Pablo Rodriguez, Konstantina Papagiannaki

Pages