


default search action
ACM SIGCOMM Conference 2003: Karlsruhe, Germany
- Anja Feldmann

, Martina Zitterbart, Jon Crowcroft, David Wetherall:
Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 25-29, 2003, Karlsruhe, Germany. ACM 2003, ISBN 1-58113-735-4 
Position Papers
- David D. Clark, Craig Partridge, J. Christopher Ramming, John Wroclawski:

A knowledge plane for the internet. 3-10 - Akihiro Nakao

, Larry L. Peterson, Andy C. Bavier:
A routing underlay for overlay networks. 11-18 - Maruti Gupta, Suresh Singh:

Greening of the internet. 19-26 - Kevin R. Fall:

A delay-tolerant network architecture for challenged internets. 27-34 
Routing
- Anindya Basu, Alvin Lin, Sharad Ramanathan:

Routing using potentials: a dynamic traffic-aware routing algorithm. 37-48 - João L. Sobrinho

:
Network routing with path vector protocols: theory and applications. 49-60 - Timothy Griffin, Aaron D. Jaggard, Vijay Ramachandran:

Design principles of policy languages for path vector protocols. 61-72 
Denial-of-service
- Aleksandar Kuzmanovic, Edward W. Knightly:

Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. 75-86 - Sergey Gorinsky, Sugat Jain, Harrick M. Vin, Yongguang Zhang:

Robustness to inflated subscription in multicast congestion control. 87-98 - Alefiya Hussain

, John S. Heidemann, Christos Papadopoulos:
A framework for classifying denial of service attacks. 99-110 
Measurement
- Neil T. Spring, Ratul Mahajan, Thomas E. Anderson:

The causes of path inflation. 113-124 - Harsha Narayan, Ramesh Govindan, George Varghese:

The impact of address allocation and routing on the structure and implementation of routing tables. 125-136 - Cristian Estan, Stefan Savage, George Varghese:

Automatically inferring patterns of resource consumption in network traffic. 137-148 
Overlays
- Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker

:
On selfish routing in internet-like environments. 151-162 - Antonio Carzaniga

, Alexander L. Wolf:
Forwarding in a content-based network. 163-174 - Chunqiang Tang, Zhichen Xu, Sandhya Dwarkadas:

Peer-to-peer information retrieval using self-organizing semantic overlay networks. 175-186 
Fowarding
- Isaac Keslassy

, Shang-Tse Chuang, Kyoungsik Yu, David A. B. Miller, Mark Horowitz, Olav Solgaard, Nick McKeown:
Scaling internet routers using optics. 189-200 - Sarang Dharmapurikar, Praveen Krishnamurthy, David E. Taylor:

Longest prefix matching using bloom filters. 201-212 - Sumeet Singh, Florin Baboescu, George Varghese, Jia Wang:

Packet classification using multidimensional cutting. 213-224 
Miscellany
- Chip Elliott, David Pearson, Gregory D. Troxel:

Quantum cryptography in practice. 227-238 - Sriram Ramabhadran, Joseph Pasquale:

Stratified round Robin: a low complexity packet scheduler with bandwidth fairness and bounded delay. 239-250 - Ping Ji, Zihui Ge, James F. Kurose, Donald F. Towsley

:
A comparison of hard-state and soft-state signaling protocols. 251-262 
Queue Management
- Long Le, Jay Aikat, Kevin Jeffay, F. Donelson Smith:

The effects of active queue management on web performance. 265-276 - Heying Zhang, Baohong Liu, Wenhua Dou:

Design of a robust active queue management algorithm based on feedback compensation. 277-285 - Hani Jamjoom, Kang G. Shin:

Persistent dropping: an efficient control of traffic aggregates. 287-298 
Traffic Engineering
- Yin Zhang, Matthew Roughan

, Carsten Lund, David L. Donoho:
An information-theoretic approach to traffic matrix estimation. 301-312 - David L. Applegate, Edith Cohen:

Making intra-domain routing robust to changing and uncertain traffic demands: understanding fundamental tradeoffs. 313-324 - Nick G. Duffield

, Carsten Lund, Mikkel Thorup:
Estimating flow distributions from sampled flow statistics. 325-336 
Measurement
- Ruoming Pang, Vern Paxson:

A high-level programming environment for packet trace anonymization and transformation. 339-351 - Aditya Akella, Bruce M. Maggs, Srinivasan Seshan

, Anees Shaikh, Ramesh K. Sitaraman
:
A measurement-based analysis of multihoming. 353-364 - Zhuoqing Morley Mao, Jennifer Rexford

, Jia Wang, Randy H. Katz:
Towards an accurate AS-level traceroute tool. 365-378 
Peer-to-peer
- P. Krishna Gummadi, Ramakrishna Gummadi, Steven D. Gribble

, Sylvia Ratnasamy, Scott Shenker
, Ion Stoica:
The impact of DHT routing geometry on resilience and proximity. 381-394 - Dmitri Loguinov, Anuj Kumar, Vivek Rai, Sai Ganesh:

Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience. 395-406 - Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nick Lanham, Scott Shenker

:
Making gnutella-like P2P systems scalable. 407-418 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














