Abstract is missing.
- King: estimating latency between arbitrary internet end hostsP. Krishna Gummadi, Stefan Saroiu, Steven D. Gribble. 5-18 [doi]
- Diversity in DNS performance measuresRichard Liston, Sridhar Srinivasan, Ellen W. Zegura. 19-31 [doi]
- A flow-based model for internet backbone trafficChadi Barakat, Patrick Thiran, Gianluca Iannaccone, Christophe Diot, Philippe Owezarski. 35-47 [doi]
- Testing the Gaussian approximation of aggregate trafficJorma Kilpi, Ilkka Norros. 49-61 [doi]
- Does fractal scaling at the IP level depend on TCP flow arrival processes?Nicolas Hohn, Darryl Veitch, Patrice Abry. 63-68 [doi]
- A signal analysis of network traffic anomaliesPaul Barford, Jeffery Kline, David Plonka, Amos Ron. 71-82 [doi]
- Statistical analysis of malformed packets and their origins in the modern internetMarina Bykova, Shawn Ostermann. 83-88 [doi]
- Iterative Bayesian estimation of network traffic matrices in the case of bursty flowsSandrine Vaton, Annie Gravey. 89-90 [doi]
- Experience in measuring backbone traffic variability: models, metrics, measurements and meaningMatthew Roughan, Albert G. Greenberg, Charles R. Kalmanek, Michael P. Rumsewicz, Jennifer Yates, Yin Zhang. 91-92 [doi]
- Passive network tomography using Bayesian inferenceVenkata N. Padmanabhan, Lili Qiu, Helen J. Wang. 93-94 [doi]
- Measuring packet reorderingJohn Bellardo, Stefan Savage. 97-105 [doi]
- Detection and analysis of routing loops in packet tracesUrs Hengartner, Sue B. Moon, Richard Mortier, Christophe Diot. 107-112 [doi]
- Measurement and classification of out-of-sequence packets in a tier-1 IP backboneSharad Jaiswal, Gianluca Iannaccone, Christophe Diot, James F. Kurose, Donald F. Towsley. 113-114 [doi]
- A hierarchical characterization of a live streaming media workloadEveline Veloso, Virgílio A. F. Almeida, Wagner Meira Jr., Azer Bestavros, Shudong Jin. 117-130 [doi]
- MediaPlayer™ versus RealPlayer™: a comparison of network turbulenceMingzhe Li, Mark Claypool, Robert E. Kinicki. 131-136 [doi]
- Analyzing peer-to-peer traffic across large networksSubhabrata Sen, Jia Wang. 137-150 [doi]
- Provisioning on-line games: a traffic analysis of a busy counter-strike serverWu-chang Feng, Francis Chang, Wu-chi Feng, Jonathan Walpole. 151-156 [doi]
- Properties and prediction of flow statistics from sampled packet streamsNick G. Duffield, Carsten Lund, Mikkel Thorup. 159-171 [doi]
- NetFlow: information loss or win?Robin Sommer, Anja Feldmann. 173-174 [doi]
- A pragmatic definition of elephants in internet backbone trafficKonstantina Papagiannaki, Nina Taft, Supratik Bhattacharyya, Patrick Thiran, Kavé Salamatian, Christophe Diot. 175-176 [doi]
- Automated measurement of high volume traffic clustersCristian Estan, Stefan Savage, George Varghese. 177-178 [doi]
- Traffic classification for application specific peeringBalachander Krishnamurthy, Jia Wang. 179-180 [doi]
- Observation and analysis of BGP behavior under stressLan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang. 183-195 [doi]
- BGP routing stability of popular destinationsJennifer Rexford, Jia Wang, Zhen Xiao, Yin Zhang. 197-202 [doi]
- An empirical study of router response to large BGP routing table loadDi-Fa Chang, Ramesh Govindan, John S. Heidemann. 203-208 [doi]
- On the structure and application of BGP policy atomsYehuda Afek, Omer Ben-Shalom, Anat Bremler-Barr. 209-214 [doi]
- A case study of OSPF behavior in a large enterprise networkAman Shaikh, Chris Isett, Albert G. Greenberg, Matthew Roughan, Joel Gottlieb. 217-230 [doi]
- Inferring link weights using end-to-end measurementsRatul Mahajan, Neil T. Spring, David Wetherall, Thomas E. Anderson. 231-236 [doi]
- Analysis of link failures in an IP backboneGianluca Iannaccone, Chen-Nee Chuah, Richard Mortier, Supratik Bhattacharyya, Christophe Diot. 237-242 [doi]
- Topology inference from BGP routing dynamicsDavid G. Andersen, Nick Feamster, Steve Bauer, Hari Balakrishnan. 243-248 [doi]
- On the geographic location of internet resourcesAnukool Lakhina, John W. Byers, Mark Crovella, Ibrahim Matta. 249-250 [doi]
- Observed structure of addresses in IP trafficEddie Kohler, Jinyang Li, Vern Paxson, Scott Shenker. 253-266 [doi]
- A technique for counting natted hostsSteven M. Bellovin. 267-272 [doi]
- Code-Red: a case study on the spread and victims of an internet wormDavid Moore, Colleen Shannon, Kimberly C. Claffy. 273-284 [doi]
- Agile and scalable analysis of network eventsMike Fisk, George Varghese. 285-290 [doi]
- Active probing using packet quartetsAttila Pásztor, Darryl Veitch. 293-305 [doi]
- Predicting and bypassing end-to-end internet service degradationsAnat Bremler-Barr, Edith Cohen, Haim Kaplan, Yishay Mansour. 307-320 [doi]
- The effect of layer-2 switches on pathchar-like toolsRavi Prasad, Constantinos Dovrolis, Bruce A. Mah. 321-322 [doi]
- Preliminary measurements on the effect of server adaptation for web content deliveryBalachander Krishnamurthy, Craig E. Wills, Yin Zhang. 323-324 [doi]