Abstract is missing.
- Availability, usage, and deployment characteristics of the domain name systemJeffrey Pang, James Hendricks, Aditya Akella, Roberto De Prisco, Bruce M. Maggs, Srinivasan Seshan. 1-14 [doi]
- The root of the matter: hints or slavesDavid Malone. 15-20 [doi]
- On the responsiveness of DNS-based network controlJeffrey Pang, Aditya Akella, Anees Shaikh, Balachander Krishnamurthy, Srinivasan Seshan. 21-26 [doi]
- Characteristics of internet background radiationRuoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry L. Peterson. 27-40 [doi]
- An analysis of live streaming workloads on the internetKunwadee Sripanidkulchai, Bruce M. Maggs, Hui Zhang. 41-54 [doi]
- Characterizing the query behavior in peer-to-peer file sharing systemsAlexander Klemm, Christoph Lindemann, Mary K. Vernon, Oliver P. Waldhorst. 55-67 [doi]
- Self-configuring network traffic generationJoel Sommers, Paul Barford. 68-81 [doi]
- A framework for malicious workload generationJoel Sommers, Vinod Yegneswaran, Paul Barford. 82-87 [doi]
- A pragmatic approach to dealing with high-variability in network measurementsWalter Willinger, David Alderson, Lun Li. 88-100 [doi]
- Online identification of hierarchical heavy hitters: algorithms, evaluation, and applicationsYin Zhang, Sumeet Singh, Subhabrata Sen, Nick G. Duffield, Carsten Lund. 101-114 [doi]
- Identifying elephant flows through periodically sampled packetsTatsuya Mori, Masato Uchida, Ryoichi Kawahara, Jianping Pan 0002, Shigeki Goto. 115-120 [doi]
- Transport layer identification of P2P trafficThomas Karagiannis, Andre Broido, Michalis Faloutsos, Kimberly C. Claffy. 121-134 [doi]
- Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classificationMatthew Roughan, Subhabrata Sen, Oliver Spatscheck, Nick G. Duffield. 135-148 [doi]
- Traffic matrix estimation on a large IP backbone: a comparison on real dataAnders Gunnar, Mikael Johansson, Thomas Telkamp. 149-160 [doi]
- A distributed approach to measure IP traffic matricesKonstantina Papagiannaki, Nina Taft, Anukool Lakhina. 161-174 [doi]
- Network radar: tomography from round trip time measurementsYolanda Tsang, Mehmet Can Yildiz, Paul Barford, Robert D. Nowak. 175-180 [doi]
- Efficient beacon placement for network tomographyRitesh Kumar, Jasleen Kaur. 181-186 [doi]
- On scalable attack detection in the networkRamana Rao Kompella, Sumeet Singh, George Varghese. 187-200 [doi]
- Characterization of network-wide anomalies in traffic flowsAnukool Lakhina, Mark Crovella, Christophe Diot. 201-206 [doi]
- Reversible sketches for efficient and accurate change detection over network data streamsRobert T. Schweller, Ashish Gupta, Elliot Parsons, Yan Chen. 207-212 [doi]
- BorderGuard: detecting cold potatoes from peersNick Feamster, Zhuoqing Morley Mao, Jennifer Rexford. 213-218 [doi]
- Robust synchronization of software clocks across the internetDarryl Veitch, Satish Babu Korada, Attila Pásztor. 219-232 [doi]
- Introducing scalability in network measurement: toward 10 Gbps with commodity hardwareLoris Degioanni, Gianluca Varenni. 233-238 [doi]
- Structure preserving anonymization of router configuration dataDavid A. Maltz, Jibin Zhan, Geoffrey G. Xie, Hui Zhang, Gísli Hjálmtýsson, Albert G. Greenberg, Jennifer Rexford. 239-244 [doi]
- MultiQ: automated detection of multiple bottleneck capacities along a pathSachin Katti, Dina Katabi, Charles Blake, Eddie Kohler, Jacob Strauss. 245-250 [doi]
- Packet trace manipulation rramework for test labsAndy Rupp, Holger Dreger, Anja Feldmann, Robin Sommer. 251-256 [doi]
- Debugging DHCP performanceVladimir Brik, Jesse Stroik, Suman Banerjee. 257-262 [doi]
- Strategies for sound internet measurementVern Paxson. 263-271 [doi]
- Ten fallacies and pitfalls on end-to-end available bandwidth estimationManish Jain, Constantinos Dovrolis. 272-277 [doi]
- Modeling distances in large-scale networks by matrix factorizationYun Mao, Lawrence K. Saul. 278-287 [doi]
- Constraint-based geolocation of internet hostsBamba Gueye, Artur Ziviani, Mark Crovella, Serge Fdida. 288-293 [doi]
- Exploiting as hierarchy for scalable route selection in multi-homed stub networksSanghwan Lee, Zhi-Li Zhang, Srihari Nelakuditi. 294-299 [doi]
- Single-hop probing asymptotics in available bandwidth estimation: sample-path analysisXiliang Liu, Kaliappa Nadar Ravindran, Benyuan Liu, Dmitri Loguinov. 300-313 [doi]
- Bandwidth estimation in broadband access networksKarthik Lakshminarayanan, Venkata N. Padmanabhan, Jitendra Padhye. 314-321 [doi]
- A methodology for estimating interdomain web traffic demandAnja Feldmann, Nils Kammenhuber, Olaf Maennel, Bruce M. Maggs, Roberto De Prisco, Ravi Sundaram. 322-335 [doi]
- Measuring interactions between transport protocols and middleboxesAlberto Medina, Mark Allman, Sally Floyd. 336-341 [doi]
- Measurement based characterization and provisioning of IP VPNsSatish Raghunath, K. K. Ramakrishnan, Shivkumar Kalyanaraman, Chris Chase. 342-355 [doi]
- Characterizing a spam trafficLuíz Henrique Gomes, Cristiano Cazita, Jussara M. Almeida, Virgílio A. F. Almeida, Wagner Meira Jr.. 356-369 [doi]
- An empirical study of spam traffic and the use of DNS black listsJaeyeon Jung, Emil Sit. 370-375 [doi]