Abstract is missing.
- Protocol design for effective communication among silicon or carbon-based nodesRadia Perlman. 1-2 [doi]
- Efficient error estimating coding: feasibility and applicationsBinbin Chen, Ziling Zhou, Yuda Zhao, Haifeng Yu. 3-14 [doi]
- Design and implementation of an approximate communication system for wireless media applicationsSayandeep Sen, Syed Gilani, Shreesha Srinath, Stephen Schmitt, Suman Banerjee. 15-26 [doi]
- Not all microseconds are equal: fine-grained per-flow measurements with reference latency interpolationMyungjin Lee, Nick G. Duffield, Ramana Rao Kompella. 27-38 [doi]
- Generic and automatic address configuration for data center networksKai Chen, Chuanxiong Guo, Haitao Wu, Jing Yuan, Zhenqian Feng, Yan Chen, Songwu Lu, Wenfei Wu. 39-50 [doi]
- Symbiotic routing in future data centersHussam Abu-Libdeh, Paolo Costa, Antony I. T. Rowstron, Greg O Shea, Austin Donnelly. 51-62 [doi]
- Data center TCP (DCTCP)Mohammad Alizadeh, Albert G. Greenberg, David A. Maltz, Jitendra Padhye, Parveen Patel, Balaji Prabhakar, Sudipta Sengupta, Murari Sridharan. 63-74 [doi]
- Internet inter-domain trafficCraig Labovitz, Scott Iekel-Johnson, Danny McPherson, Jon Oberheide, Farnam Jahanian. 75-86 [doi]
- How secure are secure interdomain routing protocolsSharon Goldberg, Michael Schapira, Peter Hummon, Jennifer Rexford. 87-98 [doi]
- Understanding block-level address usage in the visible internetXue Cai, John Heidemann. 99-110 [doi]
- Privacy-preserving P2P data sharing with OneSwarmTomas Isdal, Michael Piatek, Arvind Krishnamurthy, Thomas E. Anderson. 111-122 [doi]
- Differentially-private network trace analysisFrank McSherry, Ratul Mahajan. 123-134 [doi]
- Encrypting the internetMichael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mathew Eszenyi, Shay Gueron, David Durham. 135-146 [doi]
- Fine-grained channel access in wireless LANKun Tan, Ji Fang, Yuanyang Zhang, Shouyuan Chen, Lixin Shi, Jiansong Zhang, Yongguang Zhang. 147-158 [doi]
- Predictable 802.11 packet delivery from wireless channel measurementsDaniel Halperin, Wenjun Hu, Anmol Sheth, David Wetherall. 159-170 [doi]
- SourceSync: a distributed wireless architecture for exploiting sender diversityHariharan Rahul, Haitham Hassanieh, Dina Katabi. 171-182 [doi]
- SwitchBlade: a platform for rapid deployment of network protocols on programmable hardwareMuhammad Bilal Anwer, Murtaza Motiwala, Muhammad Mukarram Bin Tariq, Nick Feamster. 183-194 [doi]
- PacketShader: a GPU-accelerated software routerSangjin Han, Keon Jang, KyoungSoo Park, Sue B. Moon. 195-206 [doi]
- EffiCuts: optimizing packet classification for memory and throughputBalajee Vamanan, Gwendolyn Voskuilen, T. N. Vijaykumar. 207-218 [doi]
- Theory and new primitives for safely connecting routing protocol instancesFranck Le, Geoffrey G. Xie, Hui Zhang. 219-230 [doi]
- DONAR: decentralized server selection for cloud servicesPatrick Wendell, Joe Wenjie Jiang, Michael J. Freedman, Jennifer Rexford. 231-242 [doi]
- Cloudward bound: planning for beneficial migration of enterprise applications to the cloudMohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, David A. Maltz, Sanjay G. Rao, Kunwadee Sripanidkulchai, Mohit Tawarmalani. 243-254 [doi]
- NetFence: preventing internet denial of service from inside outXin Liu, Xiaowei Yang, Yong Xia. 255-266 [doi]
- ASTUTE: detecting a different class of traffic anomaliesFernando Silveira, Christophe Diot, Nina Taft, Ramesh Govindan. 267-278 [doi]
- NetShield: massive semantics-based vulnerability signature matching for high-speed networksZhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen, Bin Liu, Junchen Jiang, Yuezhou Lv. 279-290 [doi]
- R3: resilient routing reconfigurationYe Wang, Hao Wang, Ajay Mahimkar, Richard Alimi, Yin Zhang, Lili Qiu, Yang Richard Yang. 291-302 [doi]
- Detecting the performance impact of upgrades in large operational networksAjay Anil Mahimkar, Han Hee Song, Zihui Ge, Aman Shaikh, Jia Wang, Jennifer Yates, Yin Zhang, Joanne Emmons. 303-314 [doi]
- California fault lines: understanding the causes and impact of network failuresDaniel Turner, Kirill Levchenko, Alex C. Snoeren, Stefan Savage. 315-326 [doi]
- c-Through: part-time optics in data centersGuohui Wang, David G. Andersen, Michael Kaminsky, Konstantina Papagiannaki, T. S. Eugene Ng, Michael Kozuch, Michael P. Ryan. 327-338 [doi]
- Helios: a hybrid electrical/optical switch architecture for modular data centersNathan Farrington, George Porter, Sivasankar Radhakrishnan, Hamid Hajabdolali Bazzaz, Vikram Subramanya, Yeshaiahu Fainman, George Papen, Amin Vahdat. 339-350 [doi]
- Scalable flow-based networking with DIFANEMinlan Yu, Jennifer Rexford, Michael J. Freedman, Jia Wang. 351-362 [doi]
- An analysis of social network-based Sybil defensesBimal Viswanath, Ansley Post, P. Krishna Gummadi, Alan Mislove. 363-374 [doi]
- The little engine(s) that could: scaling online social networksJosep M. Pujol, Vijay Erramilli, Georgos Siganos, Xiaoyuan Yang, Nikolaos Laoutaris, Parminder Chhabra, Pablo Rodriguez. 375-386 [doi]
- Crowdsourcing service-level network event monitoringDavid R. Choffnes, Fabián E. Bustamante, Zihui Ge. 387-398 [doi]
- SIP overload control: a backpressure-based approachYaogong Wang. 399-400 [doi]
- Unbiased sampling in directed social graphTianyi Wang, Yang Chen, Zengbin Zhang, Peng Sun, Beixing Deng, Xing Li. 401-402 [doi]
- Contrabass: concurrent transmissions without coordinationSungro Yoon. 403-404 [doi]
- Backpressure-based routing protocol for DTNsAmit Dvir, Athanasios V. Vasilakos. 405-406 [doi]
- Fair bandwidth allocation in wireless network using max-flowSourav Kumar Dandapat, Bivas Mitra, Niloy Ganguly, Romit Roy Choudhury. 407-408 [doi]
- Stochastic approximation algorithm for optimal throughput performance of wireless LANsSundaresan Krishnan, Prasanna Chaporkar. 409-410 [doi]
- Rethinking iBGP routingIuniana M. Oprescu, Mickael Meulle, Steve Uhlig, Cristel Pelsser, Olaf Maennel, Philippe Owezarski. 411-412 [doi]
- Passive IP traceback: capturing the origin of anonymous traffic through network telescopesGuang Yao, Jun Bi, Zijian Zhou. 413-414 [doi]
- SecureAngle: improving wireless security using angle-of-arrival information (poster abstract)Jie Xiong, Kyle Jamieson. 415-416 [doi]
- Autonomous traffic engineering with self-configuring topologiesSrikanth Sundaresan, Cristian Lumezanu, Nick Feamster, Pierre François. 417-418 [doi]
- Fived: a service-based architecture implementation to innovate at the endpointsD. J. Capelis, Darrell D. E. Long. 419-420 [doi]
- Accelerometer-assisted 802.11 rate adaptation on mass rapid transit systemYu-Jen Lai, Wei-Hao Kuo, Wan-Ting Chiu, Shao-Ting Chang, Hung-Yu Wei. 421-422 [doi]
- Vehicular wifi access and rate adaptationAjinkya Uday Joshi, Purushottam Kulkarni. 423-424 [doi]
- Mobile data offloading: how much can WiFi deliver?Kyunghan Lee, Injong Rhee, Joohyun Lee, Yung Yi, Song Chong. 425-426 [doi]
- Residual white space distribution-based opportunistic channel access for cognitive radio enabled devicesManuj Sharma, Anirudha Sahoo. 427-428 [doi]
- Achieving O(1) IP lookup on GPU-based software routersJin Zhao, Xinya Zhang, Xin Wang, Xiangyang Xue. 429-430 [doi]
- Road traffic estimation using in-situ acoustic sensingC. Viven Rajendra, Purushottam Kulkarni. 431-432 [doi]
- Cone of silence: adaptively nulling interferers in wireless networksGeorgios Nikolaidis, Astrit Zhushi, Kyle Jamieson, Brad Karp. 433-434 [doi]
- Accelerating SSL with GPUsKeon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon, KyoungSoo Park. 437-438 [doi]
- An open router virtualization framework using a programmable forwarding planeZdravko Bozakov. 439-440 [doi]
- QuagFlow: partnering Quagga with OpenFlowMarcelo Ribeiro Nascimento, Christian Esteve Rothenberg, Marcos Rogério Salvador, Maurício F. Magalhães. 441-442 [doi]
- Experimenting with multipath TCPSébastien Barré, Olivier Bonaventure, Costin Raiciu, Mark Handley. 443-444 [doi]
- Caliper: a tool to generate precise and closed-loop trafficMonia Ghobadi, Martin Labrecque, Geoffrey Salmon, Kaveh Aasaraai, Soheil Hassas Yeganeh, Yashar Ganjali, J. Gregory Steffan. 445-446 [doi]
- Multi-hop packet tracking for experimental facilitiesTacio Santos, Christian Henke, Carsten Schmoll, Tanja Zseby. 447-448 [doi]
- SoftCast: one-size-fits-all wireless videoSzymon Jakubczak, Dina Katabi. 449-450 [doi]
- PixNet: LCD-camera pairs as communication linksSamuel David Perli, Nabeel Ahmed, Dina Katabi. 451-452 [doi]
- VMtorrent: virtual appliances on-demandJoshua Reich, Oren Laadan, Eli Brosh, Alex Sherman, Vishal Misra, Jason Nieh, Dan Rubenstein. 453-454 [doi]
- Flexible multimedia content retrieval using InfoNamesArun Kumar, Ashok Anand, Aditya Akella, Athula Balachandran, Vyas Sekar, Srinivasan Seshan. 455-456 [doi]
- Ripcord: a modular platform for data center networkingBrandon Heller, David Erickson, Nick McKeown, Rean Griffith, Igor Ganichev, Scott Whyte, Kyriakos Zarifis, Daekyeong Moon, Scott Shenker, Stephen Stuart. 457-458 [doi]
- No more middlebox: integrate processing into networkJeongkeun Lee, Jean Tourrilhes, Puneet Sharma, Sujata Banerjee. 459-460 [doi]
- LokVaani: demonstrating interactive voice in Lo3Vijay Gabale, Bhaskaran Raman, Kameswari Chebrolu, Purushottam Kulkarni. 461-462 [doi]
- Transit portal: BGP connectivity as a serviceVytautas Valancius, HyoJoon Kim, Nick Feamster. 463-464 [doi]
- Source flow: handling millions of flows on flow-based nodesYasunobu Chiba, Yusuke Shinohara, Hideyuki Shimonishi. 465-466 [doi]
- Automating root-cause analysis of network anomalies using frequent itemset miningIgnasi Paredes-Oliva, Xenofontas A. Dimitropoulos, Maurizio Molina, Pere Barlet-Ros, Daniela Brauckhoff. 467-468 [doi]
- Experimenting software radio with the Sora platformJiansong Zhang, Kun Tan, Sen Xiang, Qiufeng Yin, Qi Luo, Yong He, Ji Fang, Yongguang Zhang. 469-470 [doi]
- Circumventing censorship with collageSam Burnett, Nick Feamster, Santosh Vempala. 471-472 [doi]
- Twittering by cuckoo: decentralized and socio-aware online microblogging servicesTianyin Xu, Yang Chen, Xiaoming Fu, Pan Hui. 473-474 [doi]
- MPAP: virtualization architecture for heterogenous wireless APsYong He, Ji Fang, Jiansong Zhang, Haichen Shen, Kun Tan, Yongguang Zhang. 475-476 [doi]
- Stratus: energy-efficient mobile communication using cloud supportBhavish Agarwal, Pushkar Chitnis, Amit Dey, Kamal Jain, Vishnu Navda, Venkata N. Padmanabhan, Ramachandran Ramjee, Aaron Schulman, Neil Spring. 477-478 [doi]
- A framework for low-power IPv6 routing simulation, experimentation, and evaluationNicolas Tsiftes, Joakim Eriksson, Niclas Finne, Fredrik Österlind, Joel Höglund, Adam Dunkels. 479-480 [doi]
- CARMEN: resource management and abstraction in wireless heterogeneous mesh networksNico Bayer, Krzysztof Loziak, Andres Garcia-Saavedra, Cigdem Sengul, Pablo Serrano. 481-482 [doi]