The SCEAS System
Navigation Menu

Conferences in DBLP

Passive and Active Network Measurement (pam)
2008 (conf/pam/2008)


  1. The Flattening Internet Topology: Natural Evolution, Unsightly Barnacles or Contrived Collapse?. [Citation Graph (, )][DBLP]


  2. Assessing the Geographic Resolution of Exhaustive Tabulation for Geolocating Internet Hosts. [Citation Graph (, )][DBLP]


  3. Observations of IPv6 Addresses. [Citation Graph (, )][DBLP]


  4. The New Web: Characterizing AJAX Traffic. [Citation Graph (, )][DBLP]


  5. Measurement and Estimation of Network QoS Among Peer Xbox 360 Game Players. [Citation Graph (, )][DBLP]


  6. Evaluation of VoIP Quality over WiBro. [Citation Graph (, )][DBLP]


  7. Packet Sampling for Flow Accounting: Challenges and Limitations. [Citation Graph (, )][DBLP]


  8. On the Validation of Traffic Classification Algorithms. [Citation Graph (, )][DBLP]


  9. Evaluation of Header Field Entropy for Hash-Based Packet Selection. [Citation Graph (, )][DBLP]


  10. A Reactive Measurement Framework. [Citation Graph (, )][DBLP]


  11. Towards a High Quality Path-Oriented Network Measurement and Storage System. [Citation Graph (, )][DBLP]


  12. On Community-Oriented Internet Measurement. [Citation Graph (, )][DBLP]


  13. On the Effectiveness of Switched Beam Antennas in Indoor Environments. [Citation Graph (, )][DBLP]


  14. On the Fidelity of 802.11 Packet Traces. [Citation Graph (, )][DBLP]


  15. Refocusing in 802.11 Wireless Measurement. [Citation Graph (, )][DBLP]


  16. Pathdiag: Automated TCP Diagnosis. [Citation Graph (, )][DBLP]


  17. SCUBA: Focus and Context for Real-Time Mesh Network Health Diagnosis. [Citation Graph (, )][DBLP]


  18. IMR-Pathload: Robust Available Bandwidth Estimation Under End-Host Interrupt Delay. [Citation Graph (, )][DBLP]


  19. A Measurement Study of Internet Delay Asymmetry. [Citation Graph (, )][DBLP]


  20. Trends and Differences in Connection-Behavior within Classes of Internet Backbone Traffic. [Citation Graph (, )][DBLP]


  21. The Cubicle vs. The Coffee Shop: Behavioral Modes in Enterprise End-Users. [Citation Graph (, )][DBLP]


  22. A Two-Layered Anomaly Detection Technique Based on Multi-modal Flow Behavior Models. [Citation Graph (, )][DBLP]


  23. Malware in IEEE 802.11 Wireless Networks. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002