


default search action
Computer Communication Review (ACM SIGCOMM), Volume 40
Volume 40, Number 1, January 2010
- Martin Burkhart, Dominik Schatzmann, Brian Trammell

, Elisa Boschi, Bernhard Plattner:
The role of network trace anonymization under attack. 5-11 - Yao Liang, Wei Peng:

Minimizing energy consumptions in wireless sensor networks via two-modal transmission. 12-18
- Daniel Halperin

, Wenjun Hu, Anmol Sheth, David Wetherall:
802.11 with multiple antennas for dummies. 19-25 - Parag Kulkarni, Woon Hau Chin, Tim Farnham:

Radio resource management considerations for LTE Femto cells. 26-30 - Brian E. Carpenter, Craig Partridge:

Internet requests for comments (RFCs) as scholarly publications. 31-33 - Dah-Ming Chiu, Tom Z. J. Fu:

"Publish or Perish" in the Internet Age: a study of publication statistics in computer networking research. 34-43 - Nathan Farrington, Nikhil Handigol, Christoph P. Mayer, Kok-Kiong Yap, Jeffrey C. Mogul:

Report on WREN 2009 -- workshop: research on enterprise networking. 44-49 - Ken Keys:

Internet-scale IP alias resolution techniques. 50-55
- James Kelly, Wladimir Araujo, Kallol Banerjee:

Rapid service creation using the JUNOS SDK. 56-60 - Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. van der Merwe:

DECOR: DEClarative network management and OpeRation. 61-66 - Fang Hao, T. V. Lakshman, Sarit Mukherjee, Haoyu Song

:
Enhancing dynamic cloud-based services using network virtualization. 67-74 - Muhammad Bilal Anwer, Nick Feamster:

Building a fast, virtualized data plane with programmable hardware. 75-82 - Huan Liu, Dan Orban:

Remote network labs: an on-demand network cloud for configuration testing. 83-91 - Theophilus Benson, Ashok Anand, Aditya Akella, Ming Zhang:

Understanding data center traffic characteristics. 92-99 - Xuan Bao, Romit Roy Choudhury:

VUPoints: collaborative sensing and video recording through mobile phones. 100-105 - Stephen M. Rumble, Ryan Stutsman, Philip Alexander Levis, David Mazières, Nickolai Zeldovich:

Apprehending joule thieves with cinder. 106-111 - Balachander Krishnamurthy, Craig E. Wills:

On the leakage of personally identifiable information via online social networks. 112-117 - John Kit Tang, Mirco Musolesi

, Cecilia Mascolo, Vito Latora
:
Characterising temporal distance and reachability in mobile and online social networks. 118-124
- Kok-Kiong Yap, Masayoshi Kobayashi, Rob Sherwood, Te-Yuan Huang

, Michael Chan, Nikhil Handigol, Nick McKeown:
OpenRoads: empowering research in mobile networks. 125-126 - Norbert Egi, Adam Greenhalgh, Mark Handley, Mickaël Hoerdt, Felipe Huici, Laurent Mathy, Panagiotis Papadimitriou

:
A platform for high performance and flexible virtual routers on commodity hardware. 127-128 - Rob Sherwood, Michael Chan, G. Adam Covington, Glen Gibb, Mario Flajslik, Nikhil Handigol, Te-Yuan Huang

, Peyman Kazemian, Masayoshi Kobayashi, Jad Naous, Srinivasan Seetharaman, David Underhill, Tatsuya Yabe, Kok-Kiong Yap, Yiannis Yiakoumis, Hongyi Zeng
, Guido Appenzeller, Ramesh Johari, Nick McKeown, Guru M. Parulkar:
Carving research slices out of your production networks with OpenFlow. 129-130 - Christian Hübsch, Christoph P. Mayer, Sebastian Mies, Roland Bless, Oliver P. Waldhorst, Martina Zitterbart:

Reconnecting the internet with ariba: self-organizing provisioning of end-to-end connectivity in heterogeneous networks. 131-132
Volume 40, Number 2, April 2010
- Hilary K. Finucane, Michael Mitzenmacher:

An improved analysis of the lossy difference aggregator. 4-11 - Marta Carbone, Luigi Rizzo

:
Dummynet revisited. 12-20 - Hamed Haddadi:

Fighting online click-fraud using bluff ads. 21-25 - Dirk Trossen, Mikko Särelä, Karen R. Sollins:

Arguments for an information-centric internetworking architecture. 26-33 - Pei-Chun Cheng, Xin Zhao, Beichuan Zhang, Lixia Zhang:

Longitudinal study of BGP monitor session failures. 34-42 - David R. Choffnes, Fabian E. Bustamante:

Pitfalls for testbed evaluations of internet systems. 43-50
- Diana Joumblatt, Renata Teixeira, Jaideep Chandrashekar, Nina Taft:

Perspectives on tracing end-hosts: a survey summary. 51-55 - K. C. Claffy

:
Workshop on internet economics (WIE2009) report. 56-59 - Ratul Mahajan:

How to build a research system in your spare time. 60-65 - Matthew Caesar

, Martín Casado, Teemu Koponen, Jennifer Rexford
, Scott Shenker
:
Dynamic route recomputation considered harmful. 66-71 - Constantine Dovrolis, J. Todd Streelman:

Evolvable network architectures: what can we learn from biology? 72-77 - Hamed Haddadi, Tristan Henderson

, Jon Crowcroft
:
The ambient Loo: caught short when nature calls? 78
Volume 40, Number 3, July 2010
- Sardar Ali, Irfan Ul Haq

, Sajjad Rizvi, Naurin Rasheed, Unum Sarfraz, Syed Ali Khayam, Fauzan Mirza
:
On mitigating sampling-induced accuracy loss in traffic anomaly detection systems. 4-16 - Roch Guérin, Kartik Hosanagar:

Fostering IPv6 migration through network quality differentials. 17-25 - Nandita Dukkipati, Tiziana Refice, Yuchung Cheng, Jerry Chu, Tom Herbert, Amit Agarwal, Arvind Jain, Natalia Sutin:

An argument for increasing TCP's initial congestion window. 26-33 - Zuoning Yin, Matthew Caesar

, Yuanyuan Zhou:
Towards understanding bugs in open source router software. 34-40 - Michael Buettner, David Wetherall:

A "Gen 2" RFID monitor based on the USRP. 41-47
- Jon Crowcroft

:
FIE: future internet enervation. 48-52 - Constantine Dovrolis, P. Krishna Gummadi

, Aleksandar Kuzmanovic, Sascha D. Meinrath
:
Measurement lab: overview and an invitation to the research community. 53-56
Volume 40, Number 4, October 2010
- Shivkumar Kalyanaraman, Venkata N. Padmanabhan, K. K. Ramakrishnan, Rajeev Shorey, Geoffrey M. Voelker:

Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010. ACM 2010, ISBN 978-1-4503-0201-2 [contents]
Volume 40, Number 5, October 2010
- László Gyarmati, Tuan Anh Trinh:

Scafida: a scale-free network inspired data center architecture. 4-12 - Igor Ganichev, Bin Dai

, Brighten Godfrey, Scott Shenker
:
YAMR: yet another multipath routing protocol. 13-19 - Niccolo Cascarano, Pierluigi Rolando, Fulvio Risso

, Riccardo Sisto
:
iNFAnt: NFA pattern matching on GPGPU devices. 20-26 - Mark Allman:

On building special-purpose social networks for emergency communication. 27-34 - Alisa Devlic:

SIP-based context distribution: does aggregation pay off? 35-46
- Augusto Ciuffoletti

:
Monitoring a virtual network infrastructure: an IaaS perspective. 47-52 - K. C. Claffy

, Emile Aben, Jordan Augé, Robert Beverly
, Fabián E. Bustamante, Benoit Donnet, Timur Friedman
, Marina Fomenkov, Péter Hága, Matthew J. Luckie, Yuval Shavitt
:
The 2nd workshop on active internet measurements (AIMS-2) report. 53-58 - Anthony M. Rutkowski, Youki Kadobayashi, Inette Furey, Damir Rajnovic, Robert Martin, Takeshi Takahashi

, Craig Schultz, Gavin Reid, Gregg Schudel, Mike Hird, Stephen Adegbite:
CYBEX: the cybersecurity information exchange framework (x.1500). 59-64 - Balachander Krishnamurthy:

I know what you will do next summer. 65-70 - Andreas Mäder, Nader Zein:

OFDMA in the field: current and future challenges. 71-76

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














