


default search action
IMC 2004: Taormina, Sicily, Italy
- Alfio Lombardo, James F. Kurose:

Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, IMC 2004, Taormina, Sicily, Italy, October 25-27, 2004. ACM 2004, ISBN 1-58113-821-0
DNS
- Jeffrey Pang, James Hendricks

, Aditya Akella, Roberto De Prisco, Bruce M. Maggs, Srinivasan Seshan
:
Availability, usage, and deployment characteristics of the domain name system. 1-14 - David Malone:

The root of the matter: hints or slaves. 15-20 - Jeffrey Pang, Aditya Akella, Anees Shaikh, Balachander Krishnamurthy, Srinivasan Seshan

:
On the responsiveness of DNS-based network control. 21-26
Traffic characterization
- Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry L. Peterson:

Characteristics of internet background radiation. 27-40 - Kunwadee Sripanidkulchai, Bruce M. Maggs, Hui Zhang:

An analysis of live streaming workloads on the internet. 41-54 - Alexander Klemm, Christoph Lindemann, Mary K. Vernon, Oliver P. Waldhorst

:
Characterizing the query behavior in peer-to-peer file sharing systems. 55-67
Traffic generation and analysis
- Joel Sommers, Paul Barford:

Self-configuring network traffic generation. 68-81 - Joel Sommers, Vinod Yegneswaran, Paul Barford:

A framework for malicious workload generation. 82-87 - Walter Willinger, David L. Alderson, Lun Li:

A pragmatic approach to dealing with high-variability in network measurements. 88-100 - Yin Zhang, Sumeet Singh, Subhabrata Sen, Nick G. Duffield, Carsten Lund:

Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications. 101-114
Identification and classification
- Tatsuya Mori

, Masato Uchida
, Ryoichi Kawahara, Jianping Pan
, Shigeki Goto:
Identifying elephant flows through periodically sampled packets. 115-120 - Thomas Karagiannis, Andre Broido, Michalis Faloutsos, Kimberly C. Claffy

:
Transport layer identification of P2P traffic. 121-134 - Matthew Roughan, Subhabrata Sen, Oliver Spatscheck, Nick G. Duffield:

Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification. 135-148
Traffic matrix estimation and tomography
- Anders Gunnar, Mikael Johansson, Thomas Telkamp:

Traffic matrix estimation on a large IP backbone: a comparison on real data. 149-160 - Konstantina Papagiannaki, Nina Taft, Anukool Lakhina

:
A distributed approach to measure IP traffic matrices. 161-174 - Yolanda Tsang, Mehmet Can Yildiz, Paul Barford, Robert D. Nowak:

Network radar: tomography from round trip time measurements. 175-180 - Ritesh Kumar, Jasleen Kaur:

Efficient beacon placement for network tomography. 181-186
Detection
- Ramana Rao Kompella, Sumeet Singh, George Varghese:

On scalable attack detection in the network. 187-200 - Anukool Lakhina

, Mark Crovella, Christophe Diot:
Characterization of network-wide anomalies in traffic flows. 201-206 - Robert T. Schweller, Ashish Gupta, Elliot Parsons, Yan Chen:

Reversible sketches for efficient and accurate change detection over network data streams. 207-212 - Nick Feamster, Zhuoqing Morley Mao, Jennifer Rexford

:
BorderGuard: detecting cold potatoes from peers. 213-218
Measurement tools
- Darryl Veitch, Satish Babu Korada, Attila Pásztor:

Robust synchronization of software clocks across the internet. 219-232 - Loris Degioanni, Gianluca Varenni:

Introducing scalability in network measurement: toward 10 Gbps with commodity hardware. 233-238 - David A. Maltz, Jibin Zhan, Geoffrey G. Xie, Hui Zhang, Gísli Hjálmtýsson, Albert G. Greenberg, Jennifer Rexford

:
Structure preserving anonymization of router configuration data. 239-244 - Sachin Katti, Dina Katabi, Charles Blake, Eddie Kohler, Jacob Strauss:

MultiQ: automated detection of multiple bottleneck capacities along a path. 245-250 - Andy Rupp

, Holger Dreger, Anja Feldmann
, Robin Sommer:
Packet trace manipulation rramework for test labs. 251-256 - Vladimir Brik, Jesse Stroik, Suman Banerjee:

Debugging DHCP performance. 257-262
Lessons learned
- Vern Paxson:

Strategies for sound internet measurement. 263-271 - Manish Jain, Constantinos Dovrolis:

Ten fallacies and pitfalls on end-to-end available bandwidth estimation. 272-277
Distance and location
- Yun Mao, Lawrence K. Saul:

Modeling distances in large-scale networks by matrix factorization. 278-287 - Bamba Gueye

, Artur Ziviani, Mark Crovella, Serge Fdida:
Constraint-based geolocation of internet hosts. 288-293 - Sanghwan Lee, Zhi-Li Zhang, Srihari Nelakuditi:

Exploiting as hierarchy for scalable route selection in multi-homed stub networks. 294-299
Bandwidth and traffic estimation techniques
- Xiliang Liu, Kaliappa Nadar Ravindran, Benyuan Liu, Dmitri Loguinov:

Single-hop probing asymptotics in available bandwidth estimation: sample-path analysis. 300-313 - Karthik Lakshminarayanan, Venkata N. Padmanabhan, Jitendra Padhye:

Bandwidth estimation in broadband access networks. 314-321 - Anja Feldmann

, Nils Kammenhuber, Olaf Maennel
, Bruce M. Maggs, Roberto De Prisco, Ravi Sundaram:
A methodology for estimating interdomain web traffic demand. 322-335
Traffic characterization and SPAM
- Alberto Medina, Mark Allman, Sally Floyd:

Measuring interactions between transport protocols and middleboxes. 336-341 - Satish Raghunath, K. K. Ramakrishnan, Shivkumar Kalyanaraman, Chris Chase:

Measurement based characterization and provisioning of IP VPNs. 342-355 - Luíz Henrique Gomes, Cristiano Cazita, Jussara M. Almeida, Virgílio A. F. Almeida, Wagner Meira Jr.:

Characterizing a spam traffic. 356-369 - Jaeyeon Jung, Emil Sit:

An empirical study of spam traffic and the use of DNS black lists. 370-375

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














