


default search action
IMC 2006: Rio de Janeriro, Brazil
- Jussara M. Almeida, Virgílio A. F. Almeida, Paul Barford:

Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006. ACM 2006, ISBN 1-59593-561-4
Sampling
- Frederic Raspall, Sebastià Sallent

, Josep Yufera:
Shared-state sampling. 1-14 - Bruno F. Ribeiro

, Donald F. Towsley
, Tao Ye, Jean Bolot:
Fisher information of sampled packets: an application to flow size estimation. 15-26 - Daniel Stutzbach, Reza Rejaie, Nick G. Duffield

, Subhabrata Sen, Walter Willinger:
On unbiased sampling for unstructured peer-to-peer networks. 27-40
Security and privacy
- Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis:

A multifaceted approach to understanding the botnet phenomenon. 41-52 - Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker:

Finding diversity in remote code injection exploits. 53-64 - Balachander Krishnamurthy, Craig E. Wills:

Generating a privacy footprint on the internet. 65-70
Latency and topology
- Ethan Katz-Bassett, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas E. Anderson, Yatin Chawathe:

Towards IP geolocation using delay and topology measurements. 71-84 - Bo Zhang, T. S. Eugene Ng, Animesh Nandi, Rudolf H. Riedi, Peter Druschel, Guohui Wang:

Measurement based analysis, modeling, and synthesis of the internet delay space. 85-98 - Harsha V. Madhyastha, Thomas E. Anderson, Arvind Krishnamurthy, Neil Spring, Arun Venkataramani:

A structural approach to latency prediction. 99-104 - Rob Sherwood, Neil Spring:

Touring the internet in a TCP sidecar. 339-344
Tools
- Andreas Haeberlen

, Marcel Dischinger, P. Krishna Gummadi
, Stefan Saroiu:
Monarch: a tool to emulate transport protocol flowsover the internet at large. 105-118 - Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Can Emre Koksal:

Semi-automated discovery of application session structure. 119-132 - Himabindu Pucha, Y. Charlie Hu, Zhuoqing Morley Mao:

On the impact of research network based testbeds on wide-area experiments. 133-146
Anomalies
- Xin Li, Fang Bian, Mark Crovella, Christophe Diot, Ramesh Govindan, Gianluca Iannaccone, Anukool Lakhina

:
Detection and identification of network anomalies using sketch subspaces. 147-152 - Brice Augustin, Xavier Cuvellier, Benjamin Orgogozo, Fabien Viger, Timur Friedman

, Matthieu Latapy, Clémence Magnien, Renata Teixeira:
Avoiding traceroute anomalies with Paris traceroute. 153-158 - Daniela Brauckhoff, Bernhard Tellenbach, Arno Wagner, Martin May, Anukool Lakhina

:
Impact of packet sampling on anomaly detection metrics. 159-164 - Jianning Mai, Chen-Nee Chuah

, Ashwin Sridharan, Tao Ye, Hui Zang:
Is sampled data sufficient for anomaly detection? 165-176
Peer to peer
- Christos Gkantsidis, John L. Miller, Pablo Rodriguez:

Comprehensive view of a live network coding P2P system. 177-188 - Daniel Stutzbach, Reza Rejaie:

Understanding churn in peer-to-peer networks. 189-202 - Arnaud Legout, Guillaume Urvoy-Keller, Pietro Michiardi:

Rarest first and choke algorithms are enough. 203-216
Traffic
- Lei Guo, Enhua Tan, Songqing Chen, Zhen Xiao, Oliver Spatscheck, Xiaodong Zhang:

Delving into internet streaming media delivery: a quality and resource utilization perspective. 217-230 - Hitesh Ballani, Paul Francis, Sylvia Ratnasamy:

A measurement-based deployment proposal for IP anycast. 231-244 - Nils Kammenhuber, Julia Luxenburger, Anja Feldmann

, Gerhard Weikum:
Web search clickstreams. 245-250 - Vijay Erramilli, Mark Crovella, Nina Taft:

An independent-connection model for traffic matrices. 251-256
Wireless
- Karthikeyan Sundaresan, Konstantina Papagiannaki:

The need for cross-layer information in access point selection algorithms. 257-262 - Petros Zerfos, Xiaoqiao Meng, Starsky H. Y. Wong, Vidyut Samanta, Songwu Lu:

A study of the short message service of a nationwide cellular network. 263-268
BGP
- Ricardo V. Oliveira, Beichuan Zhang, Dan Pei

, Rafit Izhak-Ratzin, Lixia Zhang:
Quantifying path exploration in the internet. 269-282 - Dan Pei

, Jacobus E. van der Merwe:
BGP convergence in virtual private networks. 283-288
Pattern matching and parsing
- Ruoming Pang, Vern Paxson, Robin Sommer, Larry L. Peterson:

binpac: a yacc for writing application protocol parsers. 289-300 - Ramaswamy Ramaswamy, Lukas Kencl

, Gianluca Iannaccone:
Approximate fingerprinting to accelerate pattern matching. 301-306 - Christian Kreibich, Jon Crowcroft:

Efficient sequence alignment of network traffic. 307-312
Malware
- Justin Ma, Kirill Levchenko, Christian Kreibich, Stefan Savage, Geoffrey M. Voelker:

Unexpected means of protocol inference. 313-326 - Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta:

A study of malware in peer-to-peer networks. 327-332 - Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan:

Malware prevalence in the KaZaA file-sharing network. 333-338

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














