Abstract is missing.
- Humble beginnings, uncertain end: getting the internet to provide performance guaranteesDomenico Ferrari. 1-2 [doi]
- In VINI veritas: realistic and controlled network experimentationAndy C. Bavier, Nick Feamster, Mark Huang, Larry L. Peterson, Jennifer Rexford. 3-14 [doi]
- Revisiting IP multicastSylvia Ratnasamy, Andrey Ermolinskiy, Scott Shenker. 15-26 [doi]
- Designing DCCP: congestion control without reliabilityEddie Kohler, Mark Handley, Sally Floyd. 27-38 [doi]
- Jigsaw: solving the puzzle of enterprise 802.11 analysisYu-Chung Cheng, John Bellardo, Péter Benkö, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage. 39-50 [doi]
- Measurement-based models of delivery and interference in static wireless networksCharles Reis, Ratul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan. 51-62 [doi]
- Interference-aware fair rate control in wireless sensor networksSumit Rangwala, Ramakrishna Gummadi, Ramesh Govindan, Konstantinos Psounis. 63-74 [doi]
- Analyzing the MAC-level behavior of wireless networks in the wildRatul Mahajan, Maya Rodrig, David Wetherall, John Zahorjan. 75-86 [doi]
- Capacity overprovisioning for networks with resilience requirementsMichael Menth, Rüdiger Martin, Joachim Charzinski. 87-98 [doi]
- COPE: traffic engineering in dynamic networksHao Wang, Haiyong Xie 0002, Lili Qiu, Yang Richard Yang, Yin Zhang, Albert G. Greenberg. 99-110 [doi]
- Realistic and responsive network traffic generationKashi Venkatesh Vishwanath, Amin Vahdat. 111-122 [doi]
- A basic stochastic network calculusYuming Jiang. 123-134 [doi]
- Systematic topology analysis and generation using degree correlationsPriya Mahadevan, Dmitri V. Krioukov, Kevin R. Fall, Amin Vahdat. 135-146 [doi]
- Minimizing churn in distributed systemsBrighten Godfrey, Scott Shenker, Ion Stoica. 147-158 [doi]
- Source selectable path diversity via routing deflectionsXiaowei Yang, David Wetherall. 159-170 [doi]
- MIRO: multi-path interdomain routingWen Xu, Jennifer Rexford. 171-182 [doi]
- Network monitors and contracting systems: competition and innovationPaul Laskowski, John Chuang. 183-194 [doi]
- Building an AS-topology model that captures route diversityWolfgang Mühlbauer, Anja Feldmann, Olaf Maennel, Matthew Roughan, Steve Uhlig. 195-206 [doi]
- The impact and implications of the growth in residential user-to-user trafficKenjiro Cho, Kensuke Fukuda, Hiroshi Esaki, Akira Kato. 207-218 [doi]
- Towards unbiased end-to-end network diagnosisYao Zhao, Yan Chen, David Bindel. 219-230 [doi]
- The role of PASTA in network measurementFrançois Baccelli, Sridhar Machiraju, Darryl Veitch, Jean Bolot. 231-242 [doi]
- XORs in the air: practical wireless network codingSachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Médard, Jon Crowcroft. 243-254 [doi]
- Growth codes: maximizing sensor network data persistenceAbhinav Kamra, Vishal Misra, Jon Feldman, Dan Rubenstein. 255-266 [doi]
- SybilGuard: defending against sybil attacks via social networksHaifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman. 267-278 [doi]
- Modeling adoptability of secure BGP protocolHaowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang. 279-290 [doi]
- Understanding the network-level behavior of spammersAnirudh Ramachandran, Nick Feamster. 291-302 [doi]
- DDoS defense by offenseMichael Walfish, Mythili Vutukuru, Hari Balakrishnan, David R. Karger, Scott Shenker. 303-314 [doi]
- Beyond bloom filters: from approximate membership checks to approximate state machinesFlavio Bonomi, Michael Mitzenmacher, Rina Panigrahy, Sushil Singh, George Varghese. 315-326 [doi]
- Detecting evasion attacks at high speeds without reassemblyGeorge Varghese, J. Andrew Fingerhut, Flavio Bonomi. 327-338 [doi]
- Algorithms to accelerate multiple regular expressions matching for deep packet inspectionSailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patrick Crowley, Jonathan S. Turner. 339-350 [doi]
- Virtual ring routing: network routing inspired by DHTsMatthew Caesar, Miguel Castro, Edmund B. Nightingale, Greg O Shea, Antony I. T. Rowstron. 351-362 [doi]
- ROFL: routing on flat labelsMatthew Caesar, Tyson Condie, Jayanthkumar Kannan, Karthik Lakshminarayanan, Ion Stoica. 363-374 [doi]
- A measurement study on the impact of routing events on end-to-end internet path performanceFeng Wang, Zhuoqing Morley Mao, Jia Wang, Lixin Gao, Randy Bush. 375-386 [doi]
- Policy-based routing with non-strict preferencesChi-Kin Chau. 387-398 [doi]
- Quantifying Skype user satisfactionKuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei. 399-410 [doi]
- Enabling contribution awareness in an overlay broadcasting systemYu-Wei Eric Sung, Michael A. Bishop, Sanjay G. Rao. 411-422 [doi]
- Planet scale software updatesChristos Gkantsidis, Thomas Karagiannis, Milan Vojnovic. 423-434 [doi]
- Drafting behind Akamai (travelocity-based detouring)Ao-Jan Su, David R. Choffnes, Aleksandar Kuzmanovic, Fabián E. Bustamante. 435-446 [doi]