Abstract is missing.
- Networking named contentVan Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca Braynard. 1-12 [doi]
- Virtually eliminating router bugsEric Keller, Minlan Yu, Matthew Caesar, Jennifer Rexford. 13-24 [doi]
- MDCube: a high performance network structure for modular data center interconnectionHaitao Wu, Guohan Lu, Dan Li, Chuanxiong Guo, Yongguang Zhang. 25-36 [doi]
- Greening the internet with nano data centersVytautas Valancius, Nikolaos Laoutaris, Laurent Massoulié, Christophe Diot, Pablo Rodriguez. 37-48 [doi]
- SWARM: the power of structure in community wireless mesh networksSaumitra M. Das, Konstantina Papagiannaki, Suman Banerjee, Y. C. Tay. 49-60 [doi]
- Online optimization of 802.11 mesh networksTheodoros Salonidis, Georgios Sotiropoulos, Roch Guérin, Ramesh Govindan. 61-72 [doi]
- EZ-Flow: removing turbulence in IEEE 802.11 wireless mesh networks without message passingAdel Aziz, David Starobinski, Patrick Thiran, Alaeddine El Fawal. 73-84 [doi]
- The age of impatience: optimal replication schemes for opportunistic networksJoshua Reich, Augustin Chaintreau. 85-96 [doi]
- Feasibility of content dissemination between devices in moving vehiclesThomas Zahn, Greg O Shea, Antony I. T. Rowstron. 97-108 [doi]
- Cool-Tether: energy efficient on-the-fly wifi hot-spots using mobile phonesAshish Sharma, Vishnu Navda, Ramachandran Ramjee, Venkata N. Padmanabhan, Elizabeth M. Belding. 109-120 [doi]
- Content availability and bundling in swarming systemsDaniel Sadoc Menasché, Antonio Augusto de Aragão Rocha, Bin Li, Donald F. Towsley, Arun Venkataramani. 121-132 [doi]
- FairTorrent: bringing fairness to peer-to-peer systemsAlex Sherman, Jason Nieh, Clifford Stein. 133-144 [doi]
- Scaling all-pairs overlay routingDavid Sontag, Yang Zhang, Amar Phanishayee, David G. Andersen, David Karger. 145-156 [doi]
- StarClique: guaranteeing user privacy in social networks against intersection attacksKrishna P. N. Puttaswamy, Alessandra Sala, Ben Y. Zhao. 157-168 [doi]
- Lockr: better privacy for social networksAmin Tootoonchian, Stefan Saroiu, Yashar Ganjali, Alec Wolman. 169-180 [doi]
- ARES: an anti-jamming reinforcement system for 802.11 networksKonstantinos Pelechrinis, Ioannis Broustis, Srikanth V. Krishnamurthy, Christos Gkantsidis. 181-192 [doi]
- ThunderDome: discovering upload constraints using decentralized bandwidth tournamentsJohn R. Douceur, James W. Mickens, Thomas Moscibroda, Debmalya Panigrahi. 193-204 [doi]
- A minimum-delay-difference method for mitigating cross-traffic impact on capacity measurementEdmond W. W. Chan, Xiapu Luo, Rocky K. C. Chang. 205-216 [doi]
- Where the sidewalk ends: extending the internet as graph using traceroutes from P2P usersKai Chen, David R. Choffnes, Rahul Potharaju, Yan Chen, Fabian E. Bustamante, Dan Pei, Yao Zhao. 217-228 [doi]
- Macroscope: end-point approach to networked application dependency discoveryLucian Popa 0002, Byung-Gon Chun, Ion Stoica, Jaideep Chandrashekar, Nina Taft. 229-240 [doi]
- Exploiting dynamicity in graph-based traffic analysis: techniques and applicationsMarios Iliofotou, Michalis Faloutsos, Michael Mitzenmacher. 241-252 [doi]
- RFDump: an architecture for monitoring the wireless etherKaushik Lakshminarayanan, Samir Sapra, Srinivasan Seshan, Peter Steenkiste. 253-264 [doi]
- Traffic management and resource allocation in small wired/wireless networksChristos Gkantsidis, Thomas Karagiannis, Peter B. Key, Bozidar Radunovic, Elias Raftopoulos, D. Manjunath. 265-276 [doi]
- PACMAN: a platform for automated and controlled network operations and configuration managementXu Chen, Zhuoqing Morley Mao, Jacobus E. van der Merwe. 277-288 [doi]
- Detecting network neutrality violations with causal inferenceMuhammad Mukarram Bin Tariq, Murtaza Motiwala, Nick Feamster, Mostafa H. Ammar. 289-300 [doi]
- SafeGuard: safe forwarding during route changesAng Li, Xiaowei Yang, David Wetherall. 301-312 [doi]
- BUFFALO: bloom filter forwarding architecture for large organizationsMinlan Yu, Alex Fabrikant, Jennifer Rexford. 313-324 [doi]
- Improving internet-wide routing protocols convergence with MRPC timersAnthony J. Lambert, Marc-Olivier Buob, Steve Uhlig. 325-336 [doi]
- On effectively exploiting multiple wireless interfaces in mobile hostsCheng-Lin Tsao, Raghupathy Sivakumar. 337-348 [doi]