Abstract is missing.
- Graph mining: laws, generators and toolsChristos Faloutsos. 1 [doi]
- Detecting bittorrent blockingMarcel Dischinger, Alan Mislove, Andreas Haeberlen, P. Krishna Gummadi. 3-8 [doi]
- On the difficulty of finding the nearest peer in p2p systemsVivek Vishnumurthy, Paul Francis. 9-14 [doi]
- Thinning akamaiAo-Jan Su, Aleksandar Kuzmanovic. 29-42 [doi]
- Unveiling facebook: a measurement study of social network based applicationsAtif Nazir, Saqib Raza, Chen-Nee Chuah. 43-56 [doi]
- Comparison of online social relations in volume vs interaction: a case study of cyworldHyunwoo Chun, Haewoon Kwak, Young-Ho Eom, Yong-Yeol Ahn, Sue B. Moon, Hawoong Jeong. 57-70 [doi]
- Watching television over an IP networkMeeyoung Cha, Pablo Rodriguez, Jon Crowcroft, Sue B. Moon, Xavier Amatriain. 71-84 [doi]
- Analysis of a mixed-use urban wifi network: when metropolitan becomes neapolitanMikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, Alex C. Snoeren. 85-98 [doi]
- Mark-and-sweep: getting the inside scoop on neighborhood networksDongsu Han, Aditiya Agarwala, David G. Andersen, Michael Kaminsky, Konstantina Papagiannaki, Srinivasan Seshan. 99-104 [doi]
- 802.11n under the microscopeVivek Shrivastava, Shravan K. Rayanchu, Jongwoon Yoonj, Suman Banerjee. 105-110 [doi]
- A measurement study of a commercial-grade urban wifi meshVladimir Brik, Shravan K. Rayanchu, Sharad Saha, Sayandeep Sen, Vivek Shrivastava, Suman Banerjee. 111-124 [doi]
- Correcting congestion-based error in network telescope s observations of worm dynamicsSongjie Wei, Jelena Mirkovic. 125-130 [doi]
- Distributed algorithms for stable and secure network coordinatesGuohui Wang, T. S. Eugene Ng. 131-144 [doi]
- How healthy are today s enterprise networks?Saikat Guha, Jaideep Chandrashekar, Nina Taft, Konstantina Papagiannaki. 145-150 [doi]
- An empirical evaluation of entropy-based traffic anomaly detectionGeorge Nychis, Vyas Sekar, David G. Andersen, Hyong Kim, Hui Zhang. 151-156 [doi]
- On the internet delay space dimensionalityBruno D. Abrahao, Robert D. Kleinberg. 157-168 [doi]
- Census and survey of the visible internetJohn S. Heidemann, Yuri Pryadkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, Joseph A. Bannister. 169-182 [doi]
- Ten years in the evolution of the internet ecosystemAmogh Dhamdhere, Constantine Dovrolis. 183-196 [doi]
- Experimental study of router buffer sizingNeda Beheshti, Yashar Ganjali, Monia Ghobadi, Nick McKeown, Geoff Salmon. 197-210 [doi]
- Understanding implications of DNS zone provisioningAndrew J. Kalafut, Craig A. Shue, Minaxi Gupta. 211-216 [doi]
- Context-aware clustering of DNS query trafficDavid Plonka, Paul Barford. 217-230 [doi]
- Quantifying the operational status of the DNSSEC deploymentEric Osterweil, Michael Ryan, Daniel Massey, Lixia Zhang. 231-242 [doi]
- Towards optimal sampling for flow size estimationPaul Tune, Darryl Veitch. 243-256 [doi]
- Fast monitoring of traffic subpopulationsAnirudh Ramachandran, Srinivasan Seetharaman, Nick Feamster, Vijay V. Vazirani. 257-270 [doi]
- Adaptive shared-state samplingFrederic Raspall, Sebastià Sallent. 271-284 [doi]
- A resource-minimalist flow size histogram estimatorBruno F. Ribeiro, Tao Ye, Donald F. Towsley. 285-290 [doi]
- Spectral probing, crosstalk and frequency multiplexing in internet pathsPartha Kanuparthy, Constantine Dovrolis, Mostafa H. Ammar. 291-304 [doi]
- On the predictive power of shortest-path weight inferenceAndrew Coyle, Miro Kraetzl, Olaf Maennel, Matthew Roughan. 305-310 [doi]
- Traceroute probe method and forward IP path inferenceMatthew J. Luckie, Young Hyun, Bradley Huffaker. 311-324 [doi]
- Bigfoot, sasquatch, the yeti and other missing links: what we don t know about the as graphMatthew Roughan, Simon Jonathan Tuke, Olaf Maennel. 325-330 [doi]
- Towards a meaningful MRA of traffic matricesDavid Rincón, Matthew Roughan, Walter Willinger. 331-336 [doi]
- Fixing ally s growing pains with velocity modelingAdam Bender, Rob Sherwood, Neil Spring. 337-342 [doi]