Abstract is missing.
- Measurement-based Characterization of a Collection of On-line Games (Awarded Best Student Paper!)Chris Chambers, Wu-chang Feng, Sambit Sahu, Debanjan Saha. 1-14 [doi]
- A First Look at Modern Enterprise TrafficRuoming Pang, Mark Allman, Mike Bennett, Jason Lee, Vern Paxson, Brian Tierney. 15-28 [doi]
- Client Behavior and Feed Characteristics of RSS, a Publish-Subscribe System for Web MicronewsHongzhou Liu, Venugopalan Ramasubramanian, Emin Gün Sirer. 29-34 [doi]
- Measurements, Analysis, and Modeling of BitTorrent-like SystemsLei Guo, Songqing Chen, Zhen Xiao, Enhua Tan, Xiaoning Ding, Xiaodong Zhang. 35-48 [doi]
- Characterizing Unstructured Overlay Topologies in Modern P2P File-Sharing SystemsDaniel Stutzbach, Reza Rejaie, Subhabrata Sen. 49-62 [doi]
- Should Internet Service Providers Fear Peer-Assisted Content Distribution?Thomas Karagiannis, Pablo Rodriguez, Konstantina Papagiannaki. 63-76 [doi]
- Joint Data Streaming and Sampling Techniques for Detection of Super Sources and DestinationsQi Zhao, Abhishek Kumar, Jun Xu. 77-90 [doi]
- Optimal Combination of Sampled Network MeasurementsNick G. Duffield, Carsten Lund, Mikkel Thorup. 91-104 [doi]
- The Power of Slicing in Internet Flow MeasurementRamana Rao Kompella, Cristian Estan. 105-118 [doi]
- Poisson versus Periodic Path Probing (or, Does PASTA Matter?)Muhammad Mukarram Bin Tariq, Amogh Dhamdhere, Constantinos Dovrolis, Mostafa H. Ammar. 119-124 [doi]
- On the Accuracy of Embeddings for Internet Coordinate SystemsEng Keong Lua, Timothy G. Griffin, Marcelo Pias, Han Zheng, Jon Crowcroft. 125-138 [doi]
- An Empirical Approach to Modeling Inter-AS Traffic MatricesHyunseok Chang, Sugih Jamin, Zhuoqing Morley Mao, Walter Willinger. 139-152 [doi]
- Geographic Locality of IP PrefixesMichael J. Freedman, Mythili Vutukuru, Nick Feamster, Hari Balakrishnan. 153-158 [doi]
- An Information-theoretic Approach to Network Monitoring and MeasurementYong Liu, Donald F. Towsley, Tao Ye, Jean-Chrysostome Bolot. 159-172 [doi]
- Multi-Hop Probing Asymptotics in Available Bandwidth Estimation: Stochastic AnalysisXiliang Liu, Kaliappa Nadar Ravindran, Dmitri Loguinov. 173-186 [doi]
- Exploiting Internet Route Sharing for Large Scale Available Bandwidth EstimationNingning Hu, Peter Steenkiste. 187-192 [doi]
- Inferring and Debugging Path MTU Discovery FailuresMatthew J. Luckie, Kenjiro Cho, Bill Owens. 193-198 [doi]
- Characterization and Measurement of TCP Traversal Through NATs and FirewallsSaikat Guha, Paul Francis. 199-211 [doi]
- Predicting Short-Transfer Latency from TCP Arcana: A Trace-based ValidationMartin F. Arlitt, Balachander Krishnamurthy, Jeffrey C. Mogul. 213-226 [doi]
- Novel Approaches to End-to-End Packet Reordering MeasurementXiapu Luo, Rocky K. C. Chang. 227-238 [doi]
- Data Reduction for the Scalable Automated Analysis of Distributed Darknet TrafficMichael Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, David Watson. 239-252 [doi]
- Sparse Approximations for High Fidelity Compression of Network Traffic DataWilliam Aiello, Anna C. Gilbert, Brian Rexroad, Vyas Sekar. 253-266 [doi]
- Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network TrafficStefan Kornexl, Vern Paxson, Holger Dreger, Anja Feldmann, Robin Sommer. 267-272 [doi]
- Improving Sketch Reconstruction Accuracy Using Linear Least Squares MethodGene Moo Lee, Huiya Liu, Young Yoon, Yin Zhang. 273-278 [doi]
- Understanding Congestion in IEEE 802.11b Wireless NetworksAmit P. Jardosh, Krishna N. Ramachandran, Kevin C. Almeroth, Elizabeth M. Belding-Royer. 279-292 [doi]
- Facilitating Access Point Selection in IEEE 802.11 Wireless NetworksSudarshan Vasudevan, Konstantina Papagiannaki, Christophe Diot, James F. Kurose, Donald F. Towsley. 293-298 [doi]
- Eliminating Handoff Latencies in 802.11 WLANs Using Multiple Radios: Applications, Experience, and EvaluationVladimir Brik, Arunesh Mishra, Suman Banerjee. 299-304 [doi]
- Estimation of Link Interference in Static Multi-hop Wireless NetworksJitendra Padhye, Sharad Agarwal, Venkata N. Padmanabhan, Lili Qiu, Ananth Rao, Brian Zill. 305-310 [doi]
- Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an AdvantageArunesh Mishra, Eric Rozner, Suman Banerjee, William A. Arbaugh. 311-316 [doi]
- Network AnomographyYin Zhang, Zihui Ge, Albert G. Greenberg, Matthew Roughan. 317-330 [doi]
- Combining Filtering and Statistical Methods for Anomaly DetectionAugustin Soule, Kavé Salamatian, Nina Taft. 331-344 [doi]
- Detecting Anomalies in Network Traffic Using Maximum Entropy EstimationYu Gu, Andrew McCallum, Donald F. Towsley. 345-350 [doi]
- Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale EventAbhishek Kumar, Vern Paxson, Nicholas Weaver. 351-364 [doi]
- Collaborating Against Common EnemiesSachin Katti, Balachander Krishnamurthy, Dina Katabi. 365-378 [doi]
- Perils of Transitive Trust in the Domain Name SystemVenugopalan Ramasubramanian, Emin Gün Sirer. 379-384 [doi]
- Flooding Attacks by Exploiting Persistent Forwarding LoopsJianhong Xia, Lixin Gao, Teng Fei. 385-390 [doi]