Abstract is missing.
- MetaroutingTimothy G. Griffin, João L. Sobrinho. 1-12 [doi]
- HLP: a next generation inter-domain routing protocolLakshminarayanan Subramanian, Matthew Caesar, Cheng Tien Ee, Mark Handley, Zhuoqing Morley Mao, Scott Shenker, Ion Stoica. 13-24 [doi]
- Implications of autonomy for the expressiveness of policy routingNick Feamster, Ramesh Johari, Hari Balakrishnan. 25-36 [doi]
- One more bit is enoughYong Xia, Lakshminarayanan Subramanian, Ion Stoica, Shivkumar Kalyanaraman. 37-48 [doi]
- Limitations of equation-based congestion controlInjong Rhee, Lisong Xu. 49-60 [doi]
- The power of explicit congestion notificationAleksandar Kuzmanovic. 61-72 [doi]
- OpenDHT: a public DHT service and its usesSean C. Rhea, Brighten Godfrey, Brad Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, Harlan Yu. 73-84 [doi]
- Meridian: a lightweight network location service without virtual coordinatesBernard Wong, Aleksandrs Slivkins, Emin Gün Sirer. 85-96 [doi]
- A case study in building layered DHT applicationsYatin Chawathe, Sriram Ramabhadran, Sylvia Ratnasamy, Anthony LaMarca, Scott Shenker, Joseph M. Hellerstein. 97-108 [doi]
- Using redundancy to cope with failures in a delay tolerant networkSushant Jain, Michael J. Demmer, Rabin K. Patra, Kevin R. Fall. 109-120 [doi]
- Idle sense: an optimal access method for high throughput and fairness in rate diverse wireless LANsMartin Heusse, Franck Rousseau, Romaric Guillier, Andrzej Duda. 121-132 [doi]
- ExOR: opportunistic multi-hop routing for wireless networksSanjit Biswas, Robert Morris. 133-144 [doi]
- On the predictability of large transfer TCP throughputQi He, Constantinos Dovrolis, Mostafa H. Ammar. 145-156 [doi]
- Improving accuracy in end-to-end packet loss measurementJoel Sommers, Paul Barford, Nick G. Duffield, Amos Ron. 157-168 [doi]
- Profiling internet backbone traffic: behavior models and applicationsKuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya. 169-180 [doi]
- Fast hash table lookup using extended bloom filter: an aid to network processingHaoyu Song, Sarang Dharmapurikar, Jonathan S. Turner, John W. Lockwood. 181-192 [doi]
- Algorithms for advanced packet classification with ternary CAMsKarthik Lakshminarayanan, Anand Rangarajan, Srinivasan Venkatachary. 193-204 [doi]
- Dynamic pipelining: making IP-lookup truly scalableJahangir Hasan, T. N. Vijaykumar. 205-216 [doi]
- Mining anomalies using traffic feature distributionsAnukool Lakhina, Mark Crovella, Christophe Diot. 217-228 [doi]
- BLINC: multilevel traffic classification in the darkThomas Karagiannis, Konstantina Papagiannaki, Michalis Faloutsos. 229-240 [doi]
- A DoS-limiting network architectureXiaowei Yang, David Wetherall, Thomas E. Anderson. 241-252 [doi]
- Walking the tightrope: responsive yet stable traffic engineeringSrikanth Kandula, Dina Katabi, Bruce S. Davie, Anna Charny. 253-264 [doi]
- Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and socketsSteve Bishop, Matthew Fairbairn, Michael Norrish, Peter Sewell, Michael Smith, Keith Wansbrough. 265-276 [doi]
- Policing congestion response in an internetwork using re-feedbackBob Briscoe, Arnaud Jacquet, Carla Di Cairano-Gilfedder, Alessandro Salvatori, Andrea Soppera, Martin Koyabe. 277-288 [doi]
- Declarative routing: extensible routing with declarative queriesBoon Thau Loo, Joseph M. Hellerstein, Ion Stoica, Raghu Ramakrishnan. 289-300 [doi]
- Towards a global IP anycast serviceHitesh Ballani, Paul Francis. 301-312 [doi]
- Towards an evolvable internet architectureSylvia Ratnasamy, Scott Shenker, Steven McCanne. 313-324 [doi]
- The internet and identifiersPaul V. Mockapetris. 325 [doi]