Abstract is missing.
- CloudCmp: comparing public cloud providersAng Li, Xiaowei Yang, Srikanth Kandula, Ming Zhang. 1-14 [doi]
- Comparing DNS resolvers in the wildBernhard Ager, Wolfgang Mühlbauer, Georgios Smaragdakis, Steve Uhlig. 15-21 [doi]
- Improving content delivery using provider-aided distance informationIngmar Poese, Benjamin Frank, Bernhard Ager, Georgios Smaragdakis, Anja Feldmann. 22-34 [doi]
- Detecting and characterizing social spam campaignsHongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Ben Y. Zhao. 35-47 [doi]
- Detecting algorithmically generated malicious domain namesSandeep Yadav, Ashwath Kumar Krishna Reddy, A. L. Narasimha Reddy, Supranamaya Ranjan. 48-61 [doi]
- Internet background radiation revisitedEric Wustrow, Manish Karir, Michael Bailey, Farnam Jahanian, Geoff Huston. 62-74 [doi]
- On economic heavy hitters: shapley value analysis of 95th-percentile pricingRade Stanojevic, Nikolaos Laoutaris, Pablo Rodriguez. 75-80 [doi]
- Challenges in measuring online advertising systemsSaikat Guha, Bin Cheng, Paul Francis. 81-87 [doi]
- Measurement of loss pairs in network pathsEdmond W. W. Chan, Xiapu Luo, Weichao Li, Waiting W. T. Fok, Rocky K. C. Chang. 88-101 [doi]
- Measuring path MTU discovery behaviourMatthew J. Luckie, Ben Stasiewicz. 102-108 [doi]
- Demystifying service discovery: implementing an internet-wide scannerDerek Leonard, Dmitri Loguinov. 109-122 [doi]
- Measurement and analysis of real-world 802.11 mesh networksKatrina LaCurts, Hari Balakrishnan. 123-136 [doi]
- Characterizing radio resource allocation for 3G networksFeng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoqing Morley Mao, Subhabrata Sen, Oliver Spatscheck. 137-150 [doi]
- On the feasibility of effective opportunistic spectrum accessVinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao, Haitao Zheng. 151-164 [doi]
- Primitives for active internet topology mapping: toward high-frequency characterizationRobert Beverly, Arthur Berger, Geoffrey G. Xie. 165-171 [doi]
- Resolving IP aliases with prespecified timestampsJustine Sherry, Ethan Katz-Bassett, Mary Pimenova, Harsha V. Madhyastha, Thomas E. Anderson, Arvind Krishnamurthy. 172-178 [doi]
- On the impact of layer-2 on node degree distributionPascal Mérindol, Benoit Donnet, Olivier Bonaventure, Jean-Jacques Pansiot. 179-191 [doi]
- Eyeball ASes: from geography to connectivityAmir H. Rasti, Nazanin Magharei, Reza Rejaie, Walter Willinger. 192-198 [doi]
- Towards an AS-to-organization mapXue Cai, John Heidemann, Balachander Krishnamurthy, Walter Willinger. 199-205 [doi]
- Comparing and improving current packet capturing solutions based on commodity hardwareLothar Braun, Alexander Didebulidze, Nils Kammenhuber, Georg Carle. 206-217 [doi]
- High speed network traffic analysis with commodity multi-core systemsFrancesco Fusco, Luca Deri. 218-224 [doi]
- Network tomography on correlated linksDenisa Ghita, Katerina J. Argyraki, Patrick Thiran. 225-238 [doi]
- Scamper: a scalable and extensible packet prober for active measurement of the internetMatthew J. Luckie. 239-245 [doi]
- Netalyzr: illuminating the edge networkChristian Kreibich, Nicholas Weaver, Boris Nechaev, Vern Paxson. 246-259 [doi]
- An experimental study of home gateway characteristicsSeppo Hätönen, Aki Nyrhinen, Lars Eggert, Stephen Strowes, Pasi Sarolahti, Markku Kojo. 260-266 [doi]
- Network traffic characteristics of data centers in the wildTheophilus Benson, Aditya Akella, David A. Maltz. 267-280 [doi]
- A first look at traffic on smartphonesHossein Falaki, Dimitrios Lymberopoulos, Ratul Mahajan, Srikanth Kandula, Deborah Estrin. 281-287 [doi]
- Listen to me if you can: tracking user experience of mobile network on social mediaTongqing Qiu, Junlan Feng, Zihui Ge, Jia Wang, Jun Xu, Jennifer Yates. 288-293 [doi]
- The effect of packet loss on redundancy elimination in cellular wireless networksCristian Lumezanu, Katherine Guo, Neil Spring, Bobby Bhattacharjee. 294-300 [doi]
- Performance comparison of 3G and metro-scale WiFi for vehicular network accessPralhad Deshpande, Xiaoxiao Hou, Samir R. Das. 301-307 [doi]
- An empirical study of orphan DNS servers in the internetAndrew J. Kalafut, Minaxi Gupta, Christopher A. Cole, Lei Chen, Nathan E. Myers. 308-314 [doi]
- Flowroute: inferring forwarding table updates using passive flow-level measurementsAmogh Dhamdhere, Lee Breslau, Nick G. Duffield, Cheng Ee, Alexandre Gerber, Carsten Lund, Subhabrata Sen. 315-321 [doi]
- Digging into HTTPS: flow-based classification of webmail trafficDominik Schatzmann, Wolfgang Mühlbauer, Thrasyvoulos Spyropoulos, Xenofontas A. Dimitropoulos. 322-327 [doi]
- Revisiting the case for a minimalist approach for network flow monitoringVyas Sekar, Michael K. Reiter, Hui Zhang. 328-341 [doi]
- Exact temporal characterization of 10 Gbps optical wide-area networkDaniel A. Freedman, Tudor Marian, Jennifer H. Lee, Ken Birman, Hakim Weatherspoon, Chris Xu. 342-355 [doi]
- TraceNET: an internet topology data collectorM. Engin Tozal, Kamil Saraç. 356-368 [doi]
- Understanding latent interactions in online social networksJing Jiang, Christo Wilson, Xiao Wang, Peng Huang, Wenpeng Sha, Yafei Dai, Ben Y. Zhao. 369-382 [doi]
- Measuring the mixing time of social graphsAbedelaziz Mohaisen, Aaram Yun, Yongdae Kim. 383-389 [doi]
- Estimating and sampling graphs with multidimensional random walksBruno F. Ribeiro, Donald F. Towsley. 390-403 [doi]
- The impact of YouTube recommendation system on video viewsRenjie Zhou, Samamon Khemmarat, Lixin Gao. 404-410 [doi]
- Selecting representative IP addresses for internet topology studiesXun Fan, John Heidemann. 411-423 [doi]
- Speed testing without speed tests: estimating achievable download speed from passive measurementsAlexandre Gerber, Jeffrey Pang, Oliver Spatscheck, Shobha Venkataraman. 424-430 [doi]
- YouTube traffic dynamics and its interplay with a tier-1 ISP: an ISP perspectiveVijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang. 431-443 [doi]
- On the characteristics and reasons of long-lived internet flowsLin Quan, John Heidemann. 444-450 [doi]
- BasisDetect: a model-based network event detection frameworkBrian Eriksson, Paul Barford, Rhys Alistair Bowden, Nick G. Duffield, Joel Sommers, Matthew Roughan. 451-464 [doi]
- Temporally oblivious anomaly detection on large networks using functional peersKevin M. Carter, Richard Lippmann, Stephen W. Boyer. 465-471 [doi]
- What happened in my network: mining network events from router syslogsTongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu. 472-484 [doi]