Sciweavers

SIGCOMM
2010
ACM
13 years 4 months ago
Rethinking iBGP routing
The Internet is organized as a collection of administrative domains, known as Autonomous Systems (ASes). These ASes interact through the Border Gateway Protocol (BGP) that allows ...
Iuniana M. Oprescu, Mickael Meulle, Steve Uhlig, C...
SIGCOMM
2010
ACM
13 years 4 months ago
A framework for low-power IPv6 routing simulation, experimentation, and evaluation
Low-power networked devices, such as sensors and actuators, are becoming a vital part of our everyday infrastructure. Being networked, the continued development of these systems n...
Nicolas Tsiftes, Joakim Eriksson, Niclas Finne, Fr...
SIGCOMM
2010
ACM
13 years 4 months ago
Predictable 802.11 packet delivery from wireless channel measurements
RSSI is known to be a fickle indicator of whether a wireless link will work, for many reasons. This greatly complicates operation because it requires testing and adaptation to fin...
Daniel Halperin, Wenjun Hu, Anmol Sheth, David Wet...
SIGCOMM
2010
ACM
13 years 4 months ago
Experimenting software radio with the Sora platform
Sora is a fully programmable, high performance software radio platform based on commodity general-purpose PC. In this demonstration, we illustrate the main features of the Sora pl...
Jiansong Zhang, Kun Tan, Sen Xiang, Qiufeng Yin, Q...
SIGCOMM
2010
ACM
13 years 4 months ago
CARMEN: resource management and abstraction in wireless heterogeneous mesh networks
Nico Bayer, Krzysztof Loziak, Andres Garcia-Saaved...
SIGCOMM
2010
ACM
13 years 4 months ago
Scalable flow-based networking with DIFANE
Ideally, enterprise administrators could specify fine-grain policies that drive how the underlying switches forward, drop, and measure traffic. However, existing techniques for fl...
Minlan Yu, Jennifer Rexford, Michael J. Freedman, ...
SIGCOMM
2010
ACM
13 years 4 months ago
NetFence: preventing internet denial of service from inside out
Denial of Service (DoS) attacks frequently happen on the Internet, paralyzing Internet services and causing millions of dollars of financial loss. This work presents NetFence, a s...
Xin Liu, Xiaowei Yang, Yong Xia
SIGCOMM
2010
ACM
13 years 4 months ago
Automating root-cause analysis of network anomalies using frequent itemset mining
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mi...
Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos,...
SIGCOMM
2010
ACM
13 years 4 months ago
PacketShader: a GPU-accelerated software router
We present PacketShader, a high-performance software router framework for general packet processing with Graphics Processing Unit (GPU) acceleration. PacketShader exploits the mas...
Sangjin Han, Keon Jang, KyoungSoo Park, Sue B. Moo...
SIGCOMM
2010
ACM
13 years 4 months ago
Crowdsourcing service-level network event monitoring
The user experience for networked applications is becoming a key benchmark for customers and network providers. Perceived user experience is largely determined by the frequency, d...
David R. Choffnes, Fabián E. Bustamante, Zi...