Abstract is missing.
- Achieving Good End-to-End Service Using Bill-PayCristian Estan, Aditya Akella, Suman Banerjee. [doi]
- A Simple Approach to DNS DoS DefenseHitesh Ballani, Paul Francis. [doi]
- Decongestion ControlBarath Raghavan, Alex C. Snoeren. [doi]
- (R)Evolutionary Bootstrapping of a Global PKI for Securing BGPYih-Chun Hu, David A. McGrew, Adrian Perrig, Brian Weis, Dan Wendlandt. [doi]
- Capturing Complexity in Networked Systems Design: The Case for Improved MetricsSylvia Ratnasamy. [doi]
- Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing ApplicationsAndrew Parker, Sasank Reddy, Thomas Schmid, Kevin K. Chang, Saurabh Ganeriwal, Mani B. Srivastava, Mark H. Hansen, Jeff Burke, Deborah Estrin, Mark Allman, Vern Paxson. [doi]
- The End of Internet ArchitectureTimothy Roscoe. [doi]
- Flexlab: A Realistic, Controlled, and Friendly Environment for Evaluating Networked SystemsJonathon Duerig, Robert Ricci, Junxing Zhang, Daniel Gebhardt, Sneha Kumar Kasera, Jay Lepreau. [doi]
- An Axiomatic Basis for CommunicationMartin Karsten, S. Keshav, Sanjiva Prasad. [doi]
- Interconnection Discrimination: A Two-Sided Markets PerspectivePeyman Faratin, Tom Wilkening. [doi]
- Don't Secure Routing Protocols, Secure Data DeliveryDan Wendlandt, Ioannis C. Avramopoulos, David G. Andersen, Jennifer Rexford. [doi]
- Discovering Dependencies for Network ManagementParamvir Bahl, Paul Barham, Richard Black, Ranveer Chandra, Moisés Goldszmidt, Rebecca Isaacs, Srikanth Kandula, Lun Li, John MacCormick, David A. Maltz, Richard Mortier, Mike Wawrzoniak, Ming Zhang. [doi]
- Exploiting Social Networks for Internet SearchAlan Mislove, Krishna P. Gummadi, Peter Druschel. [doi]
- From the reviews [doi]
- Fighting Coordinated Attackers with Cross-Organizational Information SharingMark Allman, Ethan Blanton, Vern Paxson, Scott Shenker. [doi]
- A Technical Approach to Net NeutralityXiaowei Yang, Gene Tsudik, Xin Liu. [doi]
- Rethinking Wireless in the Developing WorldLakshminarayanan Subramanian, Sonesh Surana, Rabin K. Patra, Sergiu Nedevschi, Melissa Ho, Eric A. Brewer, Anmol Sheth. [doi]
- SPACE: Secure Protocol for Address Book based Connection EstablishmentGanesh Ananthanarayanan, Ramarathnam Venkatesan, Prasad Naldurg, Sean Olin Blagsvedt, Adithya Hemakumar. [doi]
- Free Riding in BitTorrent is CheapThomas Locher, Patrick Moor, Stefan Schmid, Roger Wattenhofer. [doi]
- Black Box Anomaly Detection: Is It Utopian?Shobha Venkataraman, Juan Caballero, Dawn Song, Avrim Blum, Jennifer Yates. [doi]
- Forward [doi]
- Some Implications of Low Power Wireless to IP NetworkingKannan Srinivasan, Prabal Dutta, Arsalan Tavakoli, Philip Levis. [doi]
- Glavlit: Preventing Exfiltration at Wire SpeedNabil Schear, Carmelo Kintana, Qing Zhang, Amin Vahdat. [doi]
- Protocol Design Beyond Graph-Based ModelsThomas Moscibroda, Roger Wattenhofer, Yves Weber. [doi]
- Service PortabilitySumeet Singh, Scott Shenker, George Varghese. [doi]