Sciweavers

28 search results - page 4 / 6
» How to extract BGP peering information from the internet rou...
Sort
View
CCR
2006
82views more  CCR 2006»
13 years 5 months ago
The internet AS-level topology: three data sources and one definitive metric
We calculate an extensive set of characteristics for Internet AS topologies extracted from the three data sources most frequently used by the research community: traceroutes, BGP,...
Priya Mahadevan, Dmitri V. Krioukov, Marina Fomenk...
SIGCOMM
2006
ACM
13 years 11 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster
CN
2007
96views more  CN 2007»
13 years 5 months ago
Persistent detection and recovery of state inconsistencies
Soft-state is a well established approach to designing robust network protocols and applications. However it is unclear how to apply soft-state approach to protocols that must mai...
Lan Wang, Daniel Massey, Lixia Zhang
WIDM
2006
ACM
13 years 11 months ago
SRI: exploiting semantic information for effective query routing in a PDMS
The huge amount of data available from Internet information sources has focused much attention on the sharing of distributed information through Peer Data Management Systems (PDMS...
Federica Mandreoli, Riccardo Martoglia, Simona Sas...
IMC
2009
ACM
13 years 11 months ago
Moving beyond end-to-end path information to optimize CDN performance
Replicating content across a geographically distributed set of servers and redirecting clients to the closest server in terms of latency has emerged as a common paradigm for impro...
Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srini...