Abstract is missing.
- A knowledge plane for the internetDavid D. Clark, Craig Partridge, J. Christopher Ramming, John Wroclawski. 3-10 [doi]
- A routing underlay for overlay networksAkihiro Nakao, Larry L. Peterson, Andy C. Bavier. 11-18 [doi]
- Greening of the internetMaruti Gupta, Suresh Singh. 19-26 [doi]
- A delay-tolerant network architecture for challenged internetsKevin R. Fall. 27-34 [doi]
- Routing using potentials: a dynamic traffic-aware routing algorithmAnindya Basu, Alvin Lin, Sharad Ramanathan. 37-48 [doi]
- Network routing with path vector protocols: theory and applicationsJoão L. Sobrinho. 49-60 [doi]
- Design principles of policy languages for path vector protocolsTimothy Griffin, Aaron D. Jaggard, Vijay Ramachandran. 61-72 [doi]
- Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephantsAleksandar Kuzmanovic, Edward W. Knightly. 75-86 [doi]
- Robustness to inflated subscription in multicast congestion controlSergey Gorinsky, Sugat Jain, Harrick M. Vin, Yongguang Zhang. 87-98 [doi]
- A framework for classifying denial of service attacksAlefiya Hussain, John S. Heidemann, Christos Papadopoulos. 99-110 [doi]
- The causes of path inflationNeil T. Spring, Ratul Mahajan, Thomas E. Anderson. 113-124 [doi]
- The impact of address allocation and routing on the structure and implementation of routing tablesHarsha Narayan, Ramesh Govindan, George Varghese. 125-136 [doi]
- Automatically inferring patterns of resource consumption in network trafficCristian Estan, Stefan Savage, George Varghese. 137-148 [doi]
- On selfish routing in internet-like environmentsLili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker. 151-162 [doi]
- Forwarding in a content-based networkAntonio Carzaniga, Alexander L. Wolf. 163-174 [doi]
- Peer-to-peer information retrieval using self-organizing semantic overlay networksChunqiang Tang, Zhichen Xu, Sandhya Dwarkadas. 175-186 [doi]
- Scaling internet routers using opticsIsaac Keslassy, Shang-Tse Chuang, Kyoungsik Yu, David Miller, Mark Horowitz, Olav Solgaard, Nick McKeown. 189-200 [doi]
- Longest prefix matching using bloom filtersSarang Dharmapurikar, Praveen Krishnamurthy, David E. Taylor. 201-212 [doi]
- Packet classification using multidimensional cuttingSumeet Singh, Florin Baboescu, George Varghese, Jia Wang. 213-224 [doi]
- Quantum cryptography in practiceChip Elliott, David Pearson, Gregory Troxel. 227-238 [doi]
- Stratified round Robin: a low complexity packet scheduler with bandwidth fairness and bounded delaySriram Ramabhadran, Joseph Pasquale. 239-250 [doi]
- A comparison of hard-state and soft-state signaling protocolsPing Ji, Zihui Ge, James F. Kurose, Donald F. Towsley. 251-262 [doi]
- The effects of active queue management on web performanceLong Le, Jay Aikat, Kevin Jeffay, F. Donelson Smith. 265-276 [doi]
- Design of a robust active queue management algorithm based on feedback compensationHeying Zhang, Baohong Liu, Wenhua Dou. 277-285 [doi]
- Persistent dropping: an efficient control of traffic aggregatesHani Jamjoom, Kang G. Shin. 287-298 [doi]
- An information-theoretic approach to traffic matrix estimationYin Zhang, Matthew Roughan, Carsten Lund, David L. Donoho. 301-312 [doi]
- Making intra-domain routing robust to changing and uncertain traffic demands: understanding fundamental tradeoffsDavid Applegate, Edith Cohen. 313-324 [doi]
- Estimating flow distributions from sampled flow statisticsNick G. Duffield, Carsten Lund, Mikkel Thorup. 325-336 [doi]
- A high-level programming environment for packet trace anonymization and transformationRuoming Pang, Vern Paxson. 339-351 [doi]
- A measurement-based analysis of multihomingAditya Akella, Bruce M. Maggs, Srinivasan Seshan, Anees Shaikh, Ramesh K. Sitaraman. 353-364 [doi]
- Towards an accurate AS-level traceroute toolZhuoqing Morley Mao, Jennifer Rexford, Jia Wang, Randy H. Katz. 365-378 [doi]
- The impact of DHT routing geometry on resilience and proximityP. Krishna Gummadi, Ramakrishna Gummadi, Steven D. Gribble, Sylvia Ratnasamy, Scott Shenker, Ion Stoica. 381-394 [doi]
- Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilienceDmitri Loguinov, Anuj Kumar, Vivek Rai, Sai Ganesh. 395-406 [doi]
- Making gnutella-like P2P systems scalableYatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nick Lanham, Scott Shenker. 407-418 [doi]