


default search action
Computer Communication Review (ACM SIGCOMM), Volume 34
Volume 34, Number 1, January 2004
- Neil T. Spring, David Wetherall, Thomas E. Anderson:

Reverse engineering the Internet. 3-8 - George Varghese, Cristian Estan:

The measurement manifesto. 9-14 - Mike Wawrzoniak, Larry L. Peterson, Timothy Roscoe:

Sophia: an Information Plane for networked systems. 15-20 - Donald F. Caldwell, Anna C. Gilbert, Joel Gottlieb, Albert G. Greenberg, Gísli Hjálmtýsson

, Jennifer Rexford
:
The cutting EDGE of IP router configuration. 21-26 - Roger Karrer, Ashutosh Sabharwal, Edward W. Knightly:

Enabling large-scale wireless broadband: the case for TAPs. 27-32 - Pravin Bhagwat, Bhaskaran Raman, Dheeraj Sanghi:

Turning 802.11 inside-out. 33-38 - Thomas E. Anderson, Timothy Roscoe, David Wetherall:

Preventing Internet denial-of-service with capabilities. 39-44 - Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica:

Taming IP packet flooding attacks. 45-50 - Christian Kreibich, Jon Crowcroft:

Honeycomb: creating intrusion detection signatures using honeypots. 51-56 - Vivek S. Pai, Limin Wang, KyoungSoo Park, Ruoming Pang, Larry L. Peterson:

The dark side of the Web: an open proxy's view. 57-62 - Glenn Judd, Peter Steenkiste

:
Repeatable and realistic wireless experimentation through physical emulation. 63-68 - Sanjit Biswas, Robert Morris:

Opportunistic routing in multi-hop wireless networks. 69-74 - Romit Roy Choudhury, Nitin H. Vaidya:

MAC-layer anycasting in ad hoc networks. 75-80 - Alex C. Snoeren, Barath Raghavan:

Decoupling policy from mechanism in Internet routing. 81-86 - Nick Feamster:

Practical verification techniques for wide-area routing. 87-92 - Bryan Ford

:
Unmanaged Internet Protocol: taming the edge network management crisis. 93-98 - Jeffrey C. Mogul, Lawrence S. Brakmo, David E. Lowell, Dinesh Subhraveti, Justin Moore:

Unveiling the transport. 99-106 - Ravi Kokku, Taylor L. Riché, Aaron R. Kunze, Jayaram Mudigonda, Jamie Jason, Harrick M. Vin:

A case for run-time adaptation in packet processing systems. 107-112 - Russ Cox, Frank Dabek, M. Frans Kaashoek, Jinyang Li, Robert Morris:

Practical, distributed network coordinates. 113-118 - Matt Welsh:

Exposing resource tradeoffs in region-based communication abstractions for sensor networks. 119-124 - Deepak Ganesan, Sylvia Ratnasamy, Hanbiao Wang, Deborah Estrin:

Coping with irregular spatio-temporal sampling in sensor networks. 125-130 - Miguel Castro, Manuel Costa, Antony I. T. Rowstron:

Should we build Gnutella on a structured overlay? 131-136 - Jeffrey Considine

, John W. Byers, Ketan Meyer-Patel:
A constraint satisfaction approach to testbed embedding services. 137-142
Volume 34, Number 2, April 2004
- Ola Nordström, Constantinos Dovrolis:

Beware of BGP attacks. 1-8 - Steve Uhlig

:
Non-stationarity and high-order scaling in TCP flow arrivals: a methodological analysis. 9-24 - Luigi Alfredo Grieco, Saverio Mascolo:

Performance evaluation and comparison of Westwood+, New Reno, and Vegas TCP congestion control. 25-38 - Jelena Mirkovic, Peter L. Reiher:

A taxonomy of DDoS attack and DDoS defense mechanisms. 39-53 - Yacine Challal

, Hatem Bettahar, Abdelmadjid Bouabdallah:
SAKM: a scalable and adaptive key management approach for multicast communications. 55-70 - Kathleen M. Nichols, Van Jacobson, Kedarnath Poduri:

A Per-Domain Behavior for circuit emulation in IP networks. 71-83 - Andrei V. Gurtov

, Sally Floyd:
Modeling wireless links for transport protocols. 85-96 - Will Eatherton, George Varghese, Zubin Dittia:

Tree bitmap: hardware/software IP lookups with incremental updates. 97-122 - Sourabh Ladha, Stephan Baucke, Reiner Ludwig, Paul D. Amer:

On making SCTP robust to spurious retransmissions. 123-135 - Jörg Widmer

, Catherine Boutremans, Jean-Yves Le Boudec:
End-to-end congestion control for TCP-friendly flows with variable packet size. 137-151
Volume 34, Number 3, July 2004
- Antonis Papachristodoulou

, Lun Li, John C. Doyle:
Methodological frameworks for large-scale network analysis and design. 7-20 - Azer Bestavros

, Adam D. Bradley, Assaf J. Kfoury, Ibrahim Matta
:
Safe compositional specification of networking systems. 21-34 - Thomas Voice:

A global stability result for primal-dual congestion control algorithms with routing. 35-41 - Aditya Akella, Shuchi Chawla, Arvind Kannan, Srinivasan Seshan

:
On the scaling of congestion in the internet graph. 43-56 - Fan Bai, Ganesha Bhaskara, Ahmed Helmy

:
Building the blocks of protocol design and analysis: challenges and lessons learned from case studies on mobile ad hoc routing and micro-mobility protocols. 57-70 - Ashish Agarwal, P. R. Kumar:

Capacity bounds for ad hoc and hybrid wireless networks. 71-81 - Claus Bauer:

Distributed scheduling policies in networks of input-queued packet switches. 83-92 - Martin Duke, Thomas R. Henderson, Jeff Meegan:

Experience with "link-up notification" over a mobile satellite link. 93-104
Volume 34, Number 4, October 2004
- Raj Yavatkar, Ellen W. Zegura, Jennifer Rexford:

Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 2004, Portland, Oregon, USA. ACM 2004, ISBN 1-58113-862-8 [contents]
Volume 34, Number 5, October 2004
- Tatjana Curcic, Mark E. Filipkowski, Almadena Yu. Chtchelkanova, Philip A. D'Ambrosio, Stuart A. Wolf, Michael Foster, Douglas Cochran:

Quantum networks: from quantum cryptography to quantum architecture. 3-8 - Seth Lloyd, Jeffrey H. Shapiro, Franco N. C. Wong, Prem Kumar, Selim M. Shahriar, Horace P. Yuen:

Infrastructure for the quantum internet. 9-20 - Eric Corndorf, Chuang Liang, Gregory S. Kanter, Prem Kumar, Horace P. Yuen:

Quantum-noise: protected data encryption for WDM fiber-optic networks. 21-30 - Mark Gaynor, Scott O. Bradner:

A real options framework to value network, protocol, and service architecture. 31-38 - Paramvir Bahl, Atul Adya, Jitendra Padhye, Alec Wolman:

Reconsidering wireless systems with multiple radios. 39-46 - Zhi Li, Prasant Mohapatra:

QoS-aware multicasting in DiffServ domains. 47-57 - Yi-Min Wang, Lili Qiu, Chad Verbowski, Dimitris Achlioptas, Gautam Das

, Per-Åke Larson:
Summary-based routing for content-based event distribution networks. 59-74 - Wesley M. Eddy, Shawn Ostermann

, Mark Allman:
New techniques for making transport protocols robust to corruption-based loss. 75-88 - Steve Uhlig

, Olivier Bonaventure:
Designing BGP-based outbound traffic engineering techniques for stub ASes. 89-106

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














