IMC '05 | Facilitating Access Point Selection in IEEE 802.11 Wireless Networks | S. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose, D. Towsley |
IMC '05 | Eliminating Handoff Latencies in 802.11 WLANs Using Multiple Radios: Applications, Experience, and Evaluation | Vladimir Brik, Arunesh Mishra, Suman Banerjee |
IMC '05 | Estimation of Link Interference in Static Multi-hop Wireless Networks | Jitendra Padhye, Sharad Agarwal, Venkata N. Padmanabhan, Lili Qiu, Ananth Rao, Brian Zill |
IMC '05 | Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage | Eric Rozner, William Arbaugh |
IMC '05 | Network Anomography | Zihui Ge, Albert Greenberg, Matthew Roughan |
IMC '05 | Combining Filtering and Statistical Methods for Anomaly Detection | Augustin Soule, Kavé Salamatian, Nina Taft |
IMC '05 | Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation | Yu Gu, Andrew McCallum |
IMC '05 | Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event | Vern Paxson, Nicholas Weaver |
IMC '05 | Collaborating Against Common Enemies | Sachin Katti, Dina Katabi |
IMC '05 | Perils of Transitive Trust in the Domain Name System | |
IMC '05 | Flooding Attacks by Exploiting Persistent Forwarding Loops | Jianhong Xia, Lixin Gao, Teng Fei |