Abstract is missing.
- They can hear your heartbeats: non-invasive security for implantable medical devicesShyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi, Kevin Fu. 2-13 [doi]
- Let the market drive deployment: a strategy for transitioning to BGP securityPhillipa Gill, Michael Schapira, Sharon Goldberg. 14-25 [doi]
- Finding protocol manipulation attacksNupur Kothari, Ratul Mahajan, Todd D. Millstein, Ramesh Govindan, Madanlal Musuvathi. 26-37 [doi]
- Augmenting data center networks with multi-gigabit wireless linksDaniel Halperin, Srikanth Kandula, Jitendra Padhye, Paramvir Bahl, David Wetherall. 38-49 [doi]
- Better never than late: meeting deadlines in datacenter networksChristo Wilson, Hitesh Ballani, Thomas Karagiannis, Ant Rowtron. 50-61 [doi]
- NetLord: a scalable multi-tenant network architecture for virtualized datacentersJayaram Mudigonda, Praveen Yalagandula, Jeffrey C. Mogul, Bryan Stiekes, Yanick Pouffary. 62-73 [doi]
- Inter-datacenter bulk transfers with netstitcherNikolaos Laoutaris, Michael Sirivianos, Xiaoyuan Yang, Pablo Rodriguez. 74-85 [doi]
- The power of prediction: cloud bandwidth and cost reductionEyal Zohar, Israel Cidon, Osnat Mokryn. 86-97 [doi]
- Managing data transfers in computer clusters with orchestraMosharaf Chowdhury, Matei Zaharia, Justin Ma, Michael I. Jordan, Ion Stoica. 98-109 [doi]
- On blind mice and the elephant: understanding the network impact of a large distributed systemJohn S. Otto, Mario A. Sánchez, David R. Choffnes, Fabián E. Bustamante, Georgos Siganos. 110-121 [doi]
- Predicting and tracking internet path changesÍtalo Cunha, Renata Teixeira, Darryl Veitch, Christophe Diot. 122-133 [doi]
- Broadband internet performance: a view from the gatewaySrikanth Sundaresan, Walter de Donato, Nick Feamster, Renata Teixeira, Sam Crawford, Antonio Pescapè. 134-145 [doi]
- Random access heterogeneous MIMO networksKate Ching-Ju Lin, Shyamnath Gollakota, Dina Katabi. 146-157 [doi]
- Strider: automatic rate adaptation and collision handlingAditya Gudipati, Sachin Katti. 158-169 [doi]
- Clearing the RF smog: making 802.11n robust to cross-technology interferenceShyamnath Gollakota, Fadel Adib, Dina Katabi, Srinivasan Seshan. 170-181 [doi]
- Design space analysis for modeling incentives in distributed systemsRameez Rahman, Tamás Vinkó, David Hales, Johan A. Pouwelse, Henk J. Sips. 182-193 [doi]
- How many tiers?: pricing in the internet transit marketVytautas Valancius, Cristian Lumezanu, Nick Feamster, Ramesh Johari, Vijay V. Vazirani. 194-205 [doi]
- The evolution of layered protocol stacks leads to an hourglass-shaped architectureSaamer Akhshabi, Constantine Dovrolis. 206-217 [doi]
- What s the difference?: efficient set reconciliation without prior contextDavid Eppstein, Michael T. Goodrich, Frank Uyeda, George Varghese. 218-229 [doi]
- DOF: a local wireless information planeSteven Siying Hong, Sachin Rajsekhar Katti. 230-241 [doi]
- Towards predictable datacenter networksHitesh Ballani, Paolo Costa, Thomas Karagiannis, Antony I. T. Rowstron. 242-253 [doi]
- DevoFlow: scaling flow management for high-performance networksAndrew R. Curtis, Jeffrey C. Mogul, Jean Tourrilhes, Praveen Yalagandula, Puneet Sharma, Sujata Banerjee. 254-265 [doi]
- Improving datacenter performance and robustness with multipath TCPCostin Raiciu, Sébastien Barré, Christopher Pluntke, Adam Greenhalgh, Damon Wischik, Mark Handley. 266-277 [doi]
- NetQuery: a knowledge plane for reasoning about network propertiesAlan Shieh, Emin Gün Sirer, Fred B. Schneider. 278-289 [doi]
- Debugging the data plane with anteaterHaohui Mai, Ahmed Khurshid, Rachit Agarwal, Matthew Caesar, Brighten Godfrey, Samuel Talmadge King. 290-301 [doi]
- Demystifying configuration challenges and trade-offs in network-based ISP servicesTheophilus Benson, Aditya Akella, Aman Shaikh. 302-313 [doi]
- Seamless network-wide IGP migrationsLaurent Vanbever, Stefano Vissicchio, Cristel Pelsser, Pierre François, Olivier Bonaventure. 314-325 [doi]
- A content propagation metric for efficient content distributionRyan S. Peterson, Bernard Wong, Emin Gün Sirer. 326-337 [doi]
- Insomnia in the access: or how to curb access network related energy consumptionEduard Goma Llairo, Marco Canini, Alberto Lopez Toledo, Nikolaos Laoutaris, Dejan Kostic, Pablo Rodriguez, Rade Stanojevic, Pablo Yagüe Valentin. 338-349 [doi]
- Understanding network failures in data centers: measurement, analysis, and implicationsPhillipa Gill, Navendu Jain, Nachiappan Nagappan. 350-361 [doi]
- Understanding the impact of video quality on user engagementFlorin Dobrian, Vyas Sekar, Asad Awan, Ion Stoica, Dilip Antony Joseph, Aditya Ganjam, Jibin Zhan, Hui Zhang. 362-373 [doi]
- An untold story of middleboxes in cellular networksZhaoguang Wang, Zhiyun Qian, Qiang Xu, Zhuoqing Morley Mao, Ming Zhang. 374-385 [doi]
- Automatic inference of movements from contact historiesPengcheng Wang, Zhaoyu Gao, Xinhui Xu, Yujiao Zhou, Haojin Zhu, Kenny Qili Zhu. 386-387 [doi]
- Towards a fully distributed n-tuple storeYan Shvartzshnaider, Maximilian Ott. 388-389 [doi]
- ASAP: a low-latency transport layerQingxi Li, Wenxuan Zhou, Matthew Caesar, Brighten Godfrey. 390-391 [doi]
- What can free money tell us on the virtual black market?Kyungmoon Woo, Hyukmin Kwon, Hyunchul Kim, Chong-kwon Kim, Huy Kang Kim. 392-393 [doi]
- LoKI: location-based PKI for social networksRandy Baden. 394-395 [doi]
- Roto-Rooting your router: solution against new potential DoS attacks on modern routersDanai Chasaki. 396-397 [doi]
- Limiting large-scale crawls of social networking sitesMainack Mondal, Bimal Viswanath, Allen Clement, Peter Druschel, P. Krishna Gummadi, Alan Mislove, Ansley Post. 398-399 [doi]
- Designing a testbed for large-scale distributed systemsChristof Leng, Max Lehn, Robert Rehner, Alejandro P. Buchmann. 400-401 [doi]
- Spider: improving mobile networking with concurrent wi-fi connectionsHamed Soroush, Peter Gilbert, Nilanjan Banerjee, Mark D. Corner, Brian Neil Levine, Landon P. Cox. 402-403 [doi]
- Covert channels in multiple access protocolsSeyed Ali Ahmadzadeh, Gordon B. Agnew. 404-405 [doi]
- Pomelo: accurate and decentralized shortest-path distance estimation in social graphsZhuo Chen, Yang Chen, Cong Ding, Beixing Deng, Xing Li. 406-407 [doi]
- Dummy rate analysis of buffer constrained chaum mixAbhishek Mishra, Parv Venkitasubramaniam. 408-409 [doi]
- Minimising cell transmit power: towards self-organized resource allocation in OFDMA femtocellsDavid López-Pérez, Xiaoli Chu, Athanasios V. Vasilakos, Holger Claussen. 410-411 [doi]
- Building virtual networks across multiple domainsChristoph Werle, Panagiotis Papadimitriou, Ines Houidi, Wajdi Louati, Djamal Zeghlache, Roland Bless, Laurent Mathy. 412-413 [doi]
- Multi-relational social networks in a large-scale MMORPGSeokshin Son, Ah Reum Kang, Hyunchul Kim, Ted Taekyoung Kwon, Juyong Park, Huy Kang Kim. 414-415 [doi]
- Taming power peaks in mapreduce clustersNan Zhu, Lei Rao, Xue Liu, Jie Liu, Haibin Guan. 416-417 [doi]
- Towards scalable and realistic node models for network simulatorsStein Kristiansen, Thomas Plagemann, Vera Goebel. 418-419 [doi]
- Revisiting next-hop selection in multipath networksSimon van der Linden, Gregory Detal, Olivier Bonaventure. 420-421 [doi]
- netmap: memory mapped access to network devicesLuigi Rizzo, Matteo Landi. 422-423 [doi]
- Detecting and assessing the hybrid IPv4/IPv6 as relationshipsVasileios Giotsas, Shi Zhou. 424-425 [doi]
- CloudProphet: towards application performance prediction in cloudAng Li, Xuanran Zong, Srikanth Kandula, Xiaowei Yang, Ming Zhang. 426-427 [doi]
- A novel approach for making energy efficient PONS. H. Shah Newaz, Ángel Cuevas, Gyu Myoung Lee, Noël Crespi, Jun Kyun Choi. 428-429 [doi]
- On the efficacy of fine-grained traffic splitting protocolsin data center networksAdvait Dixit, Pawan Prakash, Ramana Rao Kompella. 430-431 [doi]
- Wide-area routing dynamics of malicious networksMaria Konte, Nick Feamster. 432-433 [doi]
- Online testing of federated and heterogeneous distributed systemsMarco Canini, Vojin Jovanovic, Daniele Venzano, Dejan M. Novakovic, Dejan Kostic. 434-435 [doi]
- Performance based traffic control with IDIPSDamien Saucez, Olivier Bonaventure. 436-437 [doi]
- Eco-Sign: a load-based traffic light control system for environmental protection with vehicular communicationsLien-Wu Chen, Pranay Sharma, Yu-Chee Tseng. 438-439 [doi]
- FSR: formal analysis and implementation toolkit for safe inter-domain routingYiqing Ren, Wenchao Zhou, Anduo Wang, Limin Jia, Alexander J. T. Gurney, Boon Thau Loo, Jennifer Rexford. 440-441 [doi]
- PANDAA: a physical arrangement detection technique for networked devices through ambient-sound awarenessZheng Sun, Aveek Purohit, Philippe De Wagter, Irina Brinster, Chorom Hamm, Pei Zhang. 442-443 [doi]
- Implementing ARP-path low latency bridges in NetFPGAElisa Rojas, Jad Naous, Guillermo Ibáñez, Diego Rivera, Juan A. Carral, José M. Arco. 444-445 [doi]
- LifeNet: a flexible ad hoc networking solution for transient environmentsHrushikesh Mehendale, Ashwin Paranjpe, Santosh Vempala. 446-447 [doi]
- A protocol for disaster data evacuationTilmann Rabl, Florian Stegmaier, Mario Döller, The Thong Vang. 448-449 [doi]
- Towards energy-efficient streaming system for mobile hotspotsMing-Hung Chen, Chun-Yu Yang, Chun-Yuan Chang, Ming-Yuan Hsu, Ke-Han Lee, Cheng-Fu Chou. 450-451 [doi]
- MPLS-TE and MPLS VPNS with openflowAli Reza Sharafat, Saurav Das, Guru M. Parulkar, Nick McKeown. 452-453 [doi]
- Dasu - ISP characterization from the edge: a BitTorrent implementationMario A. Sánchez, John S. Otto, Zachary S. Bischof, Fabián E. Bustamante. 454-455 [doi]
- WiFire: a firewall for wireless networksMatthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders. 456-457 [doi]
- Demonstrating generalized virtual topologies in an openflow networkElio Salvadori, Roberto Doriguzzi Corin, Matteo Gerola, Attilio Broglio, Francesco De Pellegrini. 458-459 [doi]
- Visualizing anomalies in sensor networksQi Liao, Lei Shi, Yuan He, Rui Li, Zhong Su, Aaron Striegel, Yunhao Liu. 460-461 [doi]
- WiRE: a new rural connectivity paradigmAditya Dhananjay, Matt Tierney, Jinyang Li, Lakshminarayanan Subramanian. 462-463 [doi]
- Supporting novel home network management interfaces with openflow and NOXRichard Mortier, Ben Bedwell, Kevin Glover, Tom Lodge, Tom Rodden, Charalampos Rotsos, Andrew W. Moore, Alexandros Koliousis, Joseph S. Sventek. 464-465 [doi]
- Using NetMagic to observe fine-grained per-flow latency measurementsTao Li, ZhiGang Sun, Chunbo Jia, Qi Su, Myungjin Lee. 466-467 [doi]
- OSPF failure reconvergence through SRG inference and prediction of link state advertisementsBart Puype, Dimitri Papadimitriou, Goutam Das, Didier Colle, Mario Pickavet, Piet Demeester. 468-469 [doi]
- Communicating with caps: managing usage caps in home networksHyoJoon Kim, Srikanth Sundaresan, Marshini Chetty, Nick Feamster, W. Keith Edwards. 470-471 [doi]
- Cyber-physical handshakeFang-Jing Wu, Feng-I. Chu, Yu-Chee Tseng. 472-473 [doi]
- An online gaming testbed for peer-to-peer architecturesMax Lehn, Christof Leng, Robert Rehner, Tonio Triebel, Alejandro P. Buchmann. 474-475 [doi]
- Service hosting gateways: a platform for distributed service deployment in end user homesMartin May, Christophe Diot, Pascal Le Guyadec, Fabio Picconi, Joris Roussel, Augustin Soule. 476-477 [doi]
- Optimizing a virtualized data centerDavid Erickson, Brandon Heller, Shuang Yang, Jonathan Chu, Jonathan D. Ellithorpe, Scott Whyte, Stephen Stuart, Nick McKeown, Guru M. Parulkar, Mendel Rosenblum. 478-479 [doi]
- Efficient content dissemination in heterogeneous networks prone to episodic connectivityAmir Krifa, Marc Mendonca, Rao Naveed Bin Rais, Chadi Barakat, Thierry Turletti, Katia Obraczka. 480-481 [doi]