IMC '05 | Characterization and Measurement of TCP Traversal Through NATs and Firewalls | Saikat Guha, Paul Francis |
IMC '05 | Predicting Short-Transfer Latency from TCP Arcana: A Trace-based Validation | Martin Arlitt, Balachander Krishnamurthy, Jeffrey C. Mogul |
IMC '05 | Novel Approaches to End-to-End Packet Reordering Measurement | Xiapu Luo, Rocky K.C. Chang |
IMC '05 | Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic | Michael Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, David Watson |
IMC '05 | Sparse Approximations for High Fidelity Compression of Network Traffic Data | William Aiello, Anna Gilbert, Brian Rexroad, Vyas Sekar |
IMC '05 | Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic | Stefan Kornexl, Vern Paxson, Holger Dreger, Anja Feldmann, Robin Sommer |
IMC '05 | Improving Sketch Reconstruction Accuracy Using Linear Least Squares Method | Gene Moo Lee, Huiya Liu, Young Yoon, Yin Zhang |
IMC '05 | Understanding Congestion in IEEE 802.11b Wireless Networks | Amit P. Jardosh, Krishna N. Ramachandran, Kevin C. Almeroth, Elizabeth M. Belding-Royer |
IMC '05 | Facilitating Access Point Selection in IEEE 802.11 Wireless Networks | S. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose, D. Towsley |
IMC '05 | Eliminating Handoff Latencies in 802.11 WLANs Using Multiple Radios: Applications, Experience, and Evaluation | Vladimir Brik, Arunesh Mishra, Suman Banerjee |
IMC '05 | Estimation of Link Interference in Static Multi-hop Wireless Networks | Jitendra Padhye, Sharad Agarwal, Venkata N. Padmanabhan, Lili Qiu, Ananth Rao, Brian Zill |
IMC '05 | Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage | Eric Rozner, William Arbaugh |
IMC '05 | Network Anomography | Zihui Ge, Albert Greenberg, Matthew Roughan |
IMC '05 | Combining Filtering and Statistical Methods for Anomaly Detection | Augustin Soule, Kavé Salamatian, Nina Taft |
IMC '05 | Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation | Yu Gu, Andrew McCallum |
IMC '05 | Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event | Vern Paxson, Nicholas Weaver |
IMC '05 | Collaborating Against Common Enemies | Sachin Katti, Dina Katabi |
IMC '05 | Perils of Transitive Trust in the Domain Name System | |
IMC '05 | Flooding Attacks by Exploiting Persistent Forwarding Loops | Jianhong Xia, Lixin Gao, Teng Fei |
IMC '05 | Measurement-based Characterization of a Collection of On-line Games | Chris Chambers, Wu-chang Feng, Sambit Sahu, Debanjan Saha |
IMC '05 | A First Look at Modern Enterprise Traffic | Ruoming Pang, Mark Allman, International Computer Science Institute, Mike Bennett, Jason Lee, Vern Paxson, Brian Tierney |
IMC '05 | Client Behavior and Feed Characteristics of RSS, a Publish-Subscribe System for Web Micronews | Hongzhou Liu, Venugopalan Ramasubramanian, Emin Gün Sirer |
IMC '05 | Measurements, Analysis, and Modeling of BitTorrent-like Systems | Lei Guo, Songqing Chen, Zhen Xiao, Enhua Tan, Xiaoning Ding, Xiaodong Zhang |
IMC '05 | Characterizing Unstructured Overlay Topologies in Modern P2P File-Sharing Systems | Daniel Stutzbach, Reza Rejaie, Subhabrata Sen |
IMC '05 | Should Internet Service Providers Fear Peer-Assisted Content Distribution? | Thomas Karagiannis, Pablo Rodriguez, Konstantina Papagiannaki |