Sciweavers

Share
SIGCOMM
2003
ACM
9 years 9 months ago
Peer-to-peer information retrieval using self-organizing semantic overlay networks
Content-based full-text search is a challenging problem in Peer-toPeer (P2P) systems. Traditional approaches have either been centralized or use flooding to ensure accuracy of th...
Chunqiang Tang, Zhichen Xu, Sandhya Dwarkadas
SIGCOMM
2003
ACM
9 years 9 months ago
Network routing with path vector protocols: theory and applications
Path vector protocols are currently in the limelight, mainly because the inter-domain routing protocol of the Internet, BGP (Border Gateway Protocol), belongs to this class. In th...
João L. Sobrinho
SIGCOMM
2003
ACM
9 years 9 months ago
Towards an accurate AS-level traceroute tool
Traceroute is widely used to detect routing problems, characterize end-to-end paths, and discover the Internet topology. Providing an accurate list of the Autonomous Systems (ASes...
Zhuoqing Morley Mao, Jennifer Rexford, Jia Wang, R...
SIGCOMM
2003
ACM
9 years 9 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
SIGCOMM
2003
ACM
9 years 9 months ago
A routing underlay for overlay networks
We argue that designing overlay services to independently probe the Internet—with the goal of making informed application-specific routing decisions—is an untenable strategy....
Akihiro Nakao, Larry L. Peterson, Andy C. Bavier
SIGCOMM
2003
ACM
9 years 9 months ago
The effects of active queue management on web performance
We present an empirical study of the effects of active queue management (AQM) on the distribution of response times experienced by a population of web users. Three prominent AQM s...
Long Le, Jay Aikat, Kevin Jeffay, F. Donelson Smit...
SIGCOMM
2003
ACM
9 years 9 months ago
Scaling internet routers using optics
Routers built around a single-stage crossbar and a centralized scheduler do not scale, and (in practice) do not provide the throughput guarantees that network operators need to ma...
Isaac Keslassy, Shang-Tse Chuang, Kyoungsik Yu, Da...
SIGCOMM
2003
ACM
9 years 9 months ago
A comparison of hard-state and soft-state signaling protocols
One of the key infrastructure components in all telecommunication networks, ranging from the telephone network, to VC-oriented data networks, to the Internet, is its signaling sys...
Ping Ji, Zihui Ge, James F. Kurose, Donald F. Tows...
SIGCOMM
2003
ACM
9 years 9 months ago
A framework for classifying denial of service attacks
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- o...
Alefiya Hussain, John S. Heidemann, Christos Papad...
books