Sciweavers

IMC
2004
ACM
13 years 8 months ago
Measuring interactions between transport protocols and middleboxes
In this paper we explore the current network environment with respect to how the network’s evolution ultimately impacts end-to-end protocols. The traditional end-to-end assumpti...
Alberto Medina, Mark Allman, Sally Floyd
IMC
2004
ACM
13 years 8 months ago
The root of the matter: hints or slaves
We consider the possibility of having a (recursive) name server act as a slave to the root zone, rather than caching information after it is requested. Tests, described here, indi...
David Malone
IMC
2004
ACM
13 years 8 months ago
Single-hop probing asymptotics in available bandwidth estimation: sample-path analysis
In this paper, we take the sample-path approach in analyzing the asymptotic behavior of single-hop bandwidth estimation under bursty cross-traffic and show that these results are ...
Xiliang Liu, Kaliappa Nadar Ravindran, Benyuan Liu...
IMC
2004
ACM
13 years 8 months ago
Characteristics of internet background radiation
Monitoring any portion of the Internet address space reveals incessant activity. This holds even when monitoring traffic sent to unused addresses, which we term “background rad...
Ruoming Pang, Vinod Yegneswaran, Paul Barford, Ver...
IMC
2004
ACM
13 years 8 months ago
Availability, usage, and deployment characteristics of the domain name system
The Domain Name System (DNS) is a critical part of the Internet’s infrastructure, and is one of the few examples of a robust, highlyscalable, and operational distributed system....
Jeffrey Pang, James Hendricks, Aditya Akella, Robe...
IMC
2004
ACM
13 years 8 months ago
On the responsiveness of DNS-based network control
For the last few years, large Web content providers interested in improving their scalability and availability have increasingly turned to three techniques: mirroring, content dis...
Jeffrey Pang, Aditya Akella, Anees Shaikh, Balacha...
IMC
2004
ACM
13 years 8 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
IMC
2004
ACM
13 years 8 months ago
Characterizing the query behavior in peer-to-peer file sharing systems
This paper characterizes the query behavior of peers in a peer-topeer (P2P) file sharing system. In contrast to previous work, which provides various aggregate workload statistics...
Alexander Klemm, Christoph Lindemann, Mary K. Vern...
IMC
2004
ACM
13 years 8 months ago
MultiQ: automated detection of multiple bottleneck capacities along a path
multiQ is a passive capacity measurement tool suitable for largescale studies of Internet path characteristics. It is the first passive tool that discovers the capacity of multip...
Sachin Katti, Dina Katabi, Charles Blake, Eddie Ko...
IMC
2004
ACM
13 years 8 months ago
Ten fallacies and pitfalls on end-to-end available bandwidth estimation
The area of available bandwidth (avail-bw) estimation has attracted significant interest recently, with several estimation techniques and tools developed during the last 2-3 year...
Manish Jain, Constantinos Dovrolis