Abstract is missing.
- Ethane: taking control of the enterpriseMartin Casado, Michael J. Freedman, Justin Pettit, Jianying Luo, Nick McKeown, Scott Shenker. 1-12 [doi]
- Towards highly reliable enterprise network services via inference of multi-level dependenciesParamvir Bahl, Ranveer Chandra, Albert G. Greenberg, Srikanth Kandula, David A. Maltz, Ming Zhang. 13-24 [doi]
- Automating cross-layer diagnosis of enterprise wireless networksYu-Chung Cheng, Mikhail Afanasyev, Patrick Verkaik, Péter Benkö, Jennifer Chiang, Alex C. Snoeren, Stefan Savage, Geoffrey M. Voelker. 25-36 [doi]
- Revealing skype traffic: when randomness plays with youDario Bonfiglio, Marco Mellia, Michela Meo, Dario Rossi, Paolo Tofanelli. 37-48 [doi]
- Bubblestorm: resilient, probabilistic, and exhaustive peer-to-peer searchWesley W. Terpstra, Jussi Kangasharju, Christof Leng, Alejandro P. Buchmann. 49-60 [doi]
- Securing internet coordinate embedding systemsMohamed Ali Kâafar, Laurent Mathy, Chadi Barakat, Kavé Salamatian, Thierry Turletti, Walid Dabbous. 61-72 [doi]
- Reconciling performance and programmability in networking systemsJayaram Mudigonda, Harrick M. Vin, Stephen W. Keckler. 73-84 [doi]
- Supercharging planetlab: a high performance, multi-application, overlay network platformJonathan S. Turner, Patrick Crowley, John D. DeHart, Amy Freestone, Brandon Heller, Fred Kuhns, Sailesh Kumar, John W. Lockwood, Jing Lu, Michael Wilson, Charles Wiseman, David Zar. 85-96 [doi]
- ProgME: towards programmable network measurementLihua Yuan, Chen-Nee Chuah, Prasant Mohapatra. 97-108 [doi]
- Accurate and efficient SLA compliance monitoringJoel Sommers, Paul Barford, Nick G. Duffield, Amos Ron. 109-120 [doi]
- Lottery trees: motivational deployment of networked systemsJohn R. Douceur, Thomas Moscibroda. 121-132 [doi]
- Can internet video-on-demand be profitable?Cheng Huang, Jin Li, Keith W. Ross. 133-144 [doi]
- In search for an appropriate granularity to model routing policiesWolfgang Mühlbauer, Steve Uhlig, Bingjie Fu, Mickael Meulle, Olaf Maennel. 145-156 [doi]
- Resolving inter-domain policy disputesCheng Tien Ee, Vijay Ramachandran, Byung-Gon Chun, Kaushik Lakshminarayanan, Scott Shenker. 157-168 [doi]
- Trading structure for randomness in wireless opportunistic routingSzymon Chachulski, Michael Jennings, Sachin Katti, Dina Katabi. 169-180 [doi]
- A data-oriented (and beyond) network architectureTeemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolinskiy, Kye Hyun Kim, Scott Shenker, Ion Stoica. 181-192 [doi]
- An end-middle-end approach to connection establishmentSaikat Guha, Paul Francis. 193-204 [doi]
- CONMan: a step towards network manageabilityHitesh Ballani, Paul Francis. 205-216 [doi]
- An axiomatic basis for communicationMartin Karsten, S. Keshav, Sanjiva Prasad, Mirza Beg. 217-228 [doi]
- Reliability as an interdomain serviceHao Wang, Yang Richard Yang, Paul H. Liu, Jia Wang, Alexandre Gerber, Albert G. Greenberg. 229-240 [doi]
- Achieving convergence-free routing using failure-carrying packetsKarthik Lakshminarayanan, Matthew Caesar, Murali Rangan, Tom Anderson, Scott Shenker, Ion Stoica. 241-252 [doi]
- Etherfuse: an ethernet watchdogKhaled Elmeleegy, Alan L. Cox, T. S. Eugene Ng. 253-264 [doi]
- A study of prefix hijacking and interception in the internetHitesh Ballani, Paul Francis, Xinyang Zhang. 265-276 [doi]
- A light-weight distributed scheme for detecting ip prefix hijacks in real-timeChangxi Zheng, Lusheng Ji, Dan Pei, Jia Wang, Paul Francis. 277-288 [doi]
- Portcullis: protecting connection setup from denial-of-capability attacksBryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu. 289-300 [doi]
- How dynamic are IP addresses?Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moisés Goldszmidt, Ted Wobber. 301-312 [doi]
- Observing the evolution of internet as topologyRicardo V. Oliveira, Beichuan Zhang, Lixia Zhang. 313-324 [doi]
- Orbis: rescaling degree correlations to generate annotated internet topologiesPriya Mahadevan, Calvin Hubble, Dmitri V. Krioukov, Bradley Huffaker, Amin Vahdat. 325-336 [doi]
- Cloud control with distributed rate limitingBarath Raghavan, Kashi Venkatesh Vishwanath, Sriram Ramabhadran, Ken Yocum, Alex C. Snoeren. 337-348 [doi]
- Emulating AQM from end hostsSumitha Bhandarkar, A. L. Narasimha Reddy, Yueping Zhang, Dmitri Loguinov. 349-360 [doi]
- Structured streams: a new transport abstractionBryan Ford. 361-372 [doi]
- DTN routing as a resource allocation problemAruna Balasubramanian, Brian Neil Levine, Arun Venkataramani. 373-384 [doi]
- Understanding and mitigating the impact of RF interference on 802.11 networksRamakrishna Gummadi, David Wetherall, Ben Greenstein, Srinivasan Seshan. 385-396 [doi]
- Embracing wireless interference: analog network codingSachin Katti, Shyamnath Gollakota, Dina Katabi. 397-408 [doi]
- PPR: partial packet recovery for wireless networksKyle Jamieson, Hari Balakrishnan. 409-420 [doi]