Papers

Search results

    ConferenceTitleAuthor(s)
    IMC '05Multi-Hop Probing Asymptotics in Available Bandwidth Estimation: Stochastic AnalysisXiliang Liu, Kaliappa Ravindran, Dmitri Loguinov
    IMC '05Exploiting Internet Route Sharing for Large Scale Available Bandwidth EstimationNingning Hu, Peter Steenkiste
    IMC '05Inferring and Debugging Path MTU Discovery FailuresMatthew Luckie, Kenjiro Cho, Bill Owens
    IMC '05Characterization and Measurement of TCP Traversal Through NATs and FirewallsSaikat Guha, Paul Francis
    IMC '05Predicting Short-Transfer Latency from TCP Arcana: A Trace-based ValidationMartin Arlitt, Balachander Krishnamurthy, Jeffrey C. Mogul
    IMC '05Novel Approaches to End-to-End Packet Reordering MeasurementXiapu Luo, Rocky K.C. Chang
    IMC '05Data Reduction for the Scalable Automated Analysis of Distributed Darknet TrafficMichael Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, David Watson
    IMC '05Sparse Approximations for High Fidelity Compression of Network Traffic DataWilliam Aiello, Anna Gilbert, Brian Rexroad, Vyas Sekar
    IMC '05Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic Stefan Kornexl, Vern Paxson, Holger Dreger, Anja Feldmann, Robin Sommer
    IMC '05Improving Sketch Reconstruction Accuracy Using Linear Least Squares MethodGene Moo Lee, Huiya Liu, Young Yoon, Yin Zhang
    IMC '05Understanding Congestion in IEEE 802.11b Wireless NetworksAmit P. Jardosh, Krishna N. Ramachandran, Kevin C. Almeroth, Elizabeth M. Belding-Royer
    IMC '05Facilitating Access Point Selection in IEEE 802.11 Wireless NetworksS. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose, D. Towsley
    IMC '05Eliminating Handoff Latencies in 802.11 WLANs Using Multiple Radios: Applications, Experience, and EvaluationVladimir Brik, Arunesh Mishra, Suman Banerjee
    IMC '05Estimation of Link Interference in Static Multi-hop Wireless NetworksJitendra Padhye, Sharad Agarwal, Venkata N. Padmanabhan, Lili Qiu, Ananth Rao, Brian Zill
    IMC '05Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an AdvantageEric Rozner, William Arbaugh
    IMC '05Network AnomographyZihui Ge, Albert Greenberg, Matthew Roughan
    IMC '05Combining Filtering and Statistical Methods for Anomaly DetectionAugustin Soule, Kavé Salamatian, Nina Taft
    IMC '05Detecting Anomalies in Network Traffic Using Maximum Entropy EstimationYu Gu, Andrew McCallum
    IMC '05Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale EventVern Paxson, Nicholas Weaver
    IMC '05Collaborating Against Common EnemiesSachin Katti, Dina Katabi
    IMC '05Perils of Transitive Trust in the Domain Name System
    IMC '05Flooding Attacks by Exploiting Persistent Forwarding LoopsJianhong Xia, Lixin Gao, Teng Fei
    USENIX Security '05Security Analysis of a Cryptographically-Enabled RFID DeviceSteve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo
    USENIX Security '05Stronger Password Authentication Using Browser ExtensionsBlake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John C Mitchell
    USENIX Security '05Cryptographic Voting Protocols: A Systems PerspectiveChris Karlof, Naveen Sastry, David Wagner

Pages