Abstract is missing.
- Shared-state samplingFrederic Raspall, Sebastià Sallent, Josep Yufera. 1-14 [doi]
- Fisher information of sampled packets: an application to flow size estimationBruno F. Ribeiro, Donald F. Towsley, Tao Ye, Jean Bolot. 15-26 [doi]
- On unbiased sampling for unstructured peer-to-peer networksDaniel Stutzbach, Reza Rejaie, Nick G. Duffield, Subhabrata Sen, Walter Willinger. 27-40 [doi]
- A multifaceted approach to understanding the botnet phenomenonMoheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis. 41-52 [doi]
- Finding diversity in remote code injection exploitsJustin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker. 53-64 [doi]
- Generating a privacy footprint on the internetBalachander Krishnamurthy, Craig E. Wills. 65-70 [doi]
- Towards IP geolocation using delay and topology measurementsEthan Katz-Bassett, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas E. Anderson, Yatin Chawathe. 71-84 [doi]
- Measurement based analysis, modeling, and synthesis of the internet delay spaceBo Zhang, T. S. Eugene Ng, Animesh Nandi, Rudolf H. Riedi, Peter Druschel, Guohui Wang. 85-98 [doi]
- A structural approach to latency predictionHarsha V. Madhyastha, Thomas E. Anderson, Arvind Krishnamurthy, Neil Spring, Arun Venkataramani. 99-104 [doi]
- Monarch: a tool to emulate transport protocol flowsover the internet at largeAndreas Haeberlen, Marcel Dischinger, P. Krishna Gummadi, Stefan Saroiu. 105-118 [doi]
- Semi-automated discovery of application session structureJayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Can Emre Koksal. 119-132 [doi]
- On the impact of research network based testbeds on wide-area experimentsHimabindu Pucha, Y. Charlie Hu, Zhuoqing Morley Mao. 133-146 [doi]
- Detection and identification of network anomalies using sketch subspacesXin Li, Fang Bian, Mark Crovella, Christophe Diot, Ramesh Govindan, Gianluca Iannaccone, Anukool Lakhina. 147-152 [doi]
- Avoiding traceroute anomalies with Paris tracerouteBrice Augustin, Xavier Cuvellier, Benjamin Orgogozo, Fabien Viger, Timur Friedman, Matthieu Latapy, Clémence Magnien, Renata Teixeira. 153-158 [doi]
- Impact of packet sampling on anomaly detection metricsDaniela Brauckhoff, Bernhard Tellenbach, Arno Wagner, Martin May, Anukool Lakhina. 159-164 [doi]
- Is sampled data sufficient for anomaly detection?Jianning Mai, Chen-Nee Chuah, Ashwin Sridharan, Tao Ye, Hui Zang. 165-176 [doi]
- Comprehensive view of a live network coding P2P systemChristos Gkantsidis, John Miller, Pablo Rodriguez. 177-188 [doi]
- Understanding churn in peer-to-peer networksDaniel Stutzbach, Reza Rejaie. 189-202 [doi]
- Rarest first and choke algorithms are enoughArnaud Legout, Guillaume Urvoy-Keller, Pietro Michiardi. 203-216 [doi]
- Delving into internet streaming media delivery: a quality and resource utilization perspectiveLei Guo, Enhua Tan, Songqing Chen, Zhen Xiao, Oliver Spatscheck, Xiaodong Zhang. 217-230 [doi]
- A measurement-based deployment proposal for IP anycastHitesh Ballani, Paul Francis, Sylvia Ratnasamy. 231-244 [doi]
- Web search clickstreamsNils Kammenhuber, Julia Luxenburger, Anja Feldmann, Gerhard Weikum. 245-250 [doi]
- An independent-connection model for traffic matricesVijay Erramilli, Mark Crovella, Nina Taft. 251-256 [doi]
- The need for cross-layer information in access point selection algorithmsKarthikeyan Sundaresan, Konstantina Papagiannaki. 257-262 [doi]
- A study of the short message service of a nationwide cellular networkPetros Zerfos, Xiaoqiao Meng, Starsky H. Y. Wong, Vidyut Samanta, Songwu Lu. 263-268 [doi]
- Quantifying path exploration in the internetRicardo V. Oliveira, Beichuan Zhang, Dan Pei, Rafit Izhak-Ratzin, Lixia Zhang. 269-282 [doi]
- BGP convergence in virtual private networksDan Pei, Jacobus E. van der Merwe. 283-288 [doi]
- binpac: a yacc for writing application protocol parsersRuoming Pang, Vern Paxson, Robin Sommer, Larry L. Peterson. 289-300 [doi]
- Approximate fingerprinting to accelerate pattern matchingRamaswamy Ramaswamy, Lukas Kencl, Gianluca Iannaccone. 301-306 [doi]
- Efficient sequence alignment of network trafficChristian Kreibich, Jon Crowcroft. 307-312 [doi]
- Unexpected means of protocol inferenceJustin Ma, Kirill Levchenko, Christian Kreibich, Stefan Savage, Geoffrey M. Voelker. 313-326 [doi]
- A study of malware in peer-to-peer networksAndrew J. Kalafut, Abhinav Acharya, Minaxi Gupta. 327-332 [doi]
- Malware prevalence in the KaZaA file-sharing networkSeungwon Shin, Jaeyeon Jung, Hari Balakrishnan. 333-338 [doi]
- Touring the internet in a TCP sidecarRob Sherwood, Neil Spring. 339-344 [doi]