Abstract is missing.
- Traffic classification using clustering algorithmsJeffrey Erman, Martin F. Arlitt, Anirban Mahanti. 281-286 [doi]
- Mining web logs to debug distant connectivity problemsEmre Kiciman, David A. Maltz, Moisés Goldszmidt, John C. Platt. 287-292 [doi]
- Minerals: using data mining to detect router misconfigurationsFranck Le, Sihyung Lee, Tina Wong, Hyong S. Kim, Darrell Newcomb. 293-298 [doi]
- SVM learning of IP address structure for latency predictionRobert Beverly, Karen R. Sollins, Arthur Berger. 299-304 [doi]
- Diagnosis of TCP overlay connection failures using bayesian networksGeorge J. Lee, Lindsey Poole. 305-310 [doi]
- Toward sophisticated detection with distributed triggersLing Huang, Minos N. Garofalakis, Joseph M. Hellerstein, Anthony D. Joseph, Nina Taft. 311-316 [doi]
- How to extract BGP peering information from the internet routing registryGiuseppe Di Battista, Tiziana Refice, Massimo Rimondini. 317-322 [doi]
- SC2D: an alternative to trace anonymizationJeffrey C. Mogul, Martin F. Arlitt. 323-328 [doi]
- Privacy-preserving performance measurementsMatthew Roughan, Yin Zhang. 329-334 [doi]
- Forensic analysis of autonomous system reachabilityD. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong. 335-340 [doi]