Abstract is missing.
- Modeling the internet is fun!: but can you make a living?Donald F. Towsley. 1-2 [doi]
- Floodless in seattle: a scalable ethernet architecture for large enterprisesChanghoon Kim, Matthew Caesar, Jennifer Rexford. 3-14 [doi]
- Xl: an efficient network routing algorithmKirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, Stefan Savage. 15-26 [doi]
- Path splicingMurtaza Motiwala, Megan Elmore, Nick Feamster, Santosh Vempala. 27-38 [doi]
- Shedding light on the glue logic of the internet routing architectureFranck Le, Geoffrey G. Xie, Dan Pei, Jia Wang, Hui Zhang. 39-50 [doi]
- A policy-aware switching layer for data centersDilip Antony Joseph, Arsalan Tavakoli, Ion Stoica. 51-62 [doi]
- A scalable, commodity data center network architectureMohammad Al-Fares, Alexander Loukissas, Amin Vahdat. 63-74 [doi]
- Dcell: a scalable and fault-tolerant network structure for data centersChuanxiong Guo, Haitao Wu, Kun Tan, Lei Shi, Yongguang Zhang, Songwu Lu. 75-86 [doi]
- What s going on?: learning communication rules in edge networksSrikanth Kandula, Ranveer Chandra, Dina Katabi. 87-98 [doi]
- Answering what-if deployment and configuration questions with wiseMukarram Tariq, Amgad Zeitoun, Vytautas Valancius, Nick Feamster, Mostafa H. Ammar. 99-110 [doi]
- Shadow configuration as a network management primitiveRichard Alimi, Ye Wang, Yang Richard Yang. 111-122 [doi]
- Network exception handlers: host-network control in enterprise networksThomas Karagiannis, Richard Mortier, Antony I. T. Rowstron. 123-134 [doi]
- A case for adapting channel width in wireless networksRanveer Chandra, Ratul Mahajan, Thomas Moscibroda, Ramya Raghavendra, Paramvir Bahl. 135-146 [doi]
- Learning to share: narrowband-friendly wideband networksHariharan Rahul, Nate Kushman, Dina Katabi, Charles Sodini, Farinaz Edalat. 147-158 [doi]
- Zigzag decoding: combating hidden terminals in wireless networksShyamnath Gollakota, Dina Katabi. 159-170 [doi]
- Spamming botnets: signatures and characteristicsYinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, Ivan Osipkov. 171-182 [doi]
- Enriching network security analysis with time travelGregor Maier, Robin Sommer, Holger Dreger, Anja Feldmann, Vern Paxson, Fabian Schneider. 183-194 [doi]
- To filter or to authorize: network-layer DoS defense against multimillion-node botnetsXin Liu, Xiaowei Yang, Yanbin Lu. 195-206 [doi]
- Deflating the big bang: fast and scalable deep packet inspection with extended finite automataRandy Smith, Cristian Estan, Somesh Jha, Shijin Kong. 207-218 [doi]
- Packet caches on routers: the implications of universal redundant traffic eliminationAshok Anand, Archit Gupta, Aditya Akella, Srinivasan Seshan, Scott Shenker. 219-230 [doi]
- Virtual routers on the move: live router migration as a network-management primitiveYi Wang, Eric Keller, Brian Biskeborn, Jacobus E. van der Merwe, Jennifer Rexford. 231-242 [doi]
- Bittorrent is an auction: analyzing and improving bittorrent s incentivesDave Levin, Katrina LaCurts, Neil Spring, Bobby Bhattacharjee. 243-254 [doi]
- Rd network services: differentiation through performance incentivesMaxim Podlesny, Sergey Gorinsky. 255-266 [doi]
- Rationality and traffic attraction: incentives for honest path announcements in bgpSharon Goldberg, Shai Halevi, Aaron D. Jaggard, Vijay Ramachandran, Rebecca N. Wright. 267-278 [doi]
- Unconstrained endpoint profiling (googling the internet)Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuzmanovic, Antonio Nucci. 279-290 [doi]
- Network discovery from passive measurementsBrian Eriksson, Paul Barford, Robert Nowak. 291-302 [doi]
- Discarte: a disjunctive internet cartographerRob Sherwood, Adam Bender, Neil Spring. 303-314 [doi]
- Satellitelab: adding heterogeneity to planetary-scale network testbedsMarcel Dischinger, Andreas Haeberlen, Ivan Beschastnikh, P. Krishna Gummadi, Stefan Saroiu. 315-326 [doi]
- Ispy: detecting ip prefix hijacking on my ownZheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing Morley Mao, Randy Bush. 327-338 [doi]
- Accountable internet protocol (aip)David G. Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker. 339-350 [doi]
- P4p: provider portal for applicationsHaiyong Xie 0002, Yang Richard Yang, Arvind Krishnamurthy, Yanbin Grace Liu, Abraham Silberschatz. 351-362 [doi]
- Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systemsDavid R. Choffnes, Fabián E. Bustamante. 363-374 [doi]
- Challenges, design and analysis of a large-scale p2p-vod systemYan Huang, Tom Z. J. Fu, Dah-Ming Chiu, John C. S. Lui, Cheng Huang. 375-388 [doi]
- Donnybrook: enabling large-scale, high-speed, peer-to-peer gamesAshwin R. Bharambe, John R. Douceur, Jacob R. Lorch, Thomas Moscibroda, Jeffrey Pang, Srinivasan Seshan, Xinyu Zhuang. 389-400 [doi]
- Symbol-level network coding for wireless mesh networksSachin Katti, Dina Katabi, Hari Balakrishnan, Muriel Médard. 401-412 [doi]
- Predictable performance optimization for wireless networksYi Li, Lili Qiu, Yin Zhang, Ratul Mahajan, Eric Rozner. 413-426 [doi]
- Interactive wifi connectivity for moving vehiclesAruna Balasubramanian, Ratul Mahajan, Arun Venkataramani, Brian Neil Levine, John Zahorjan. 427-438 [doi]