The SCEAS System
Navigation Menu

Conferences in DBLP

ACM SIGCOMM Conference (sigcomm)
2008 (conf/sigcomm/2008)


  1. Modeling the internet is fun!: but can you make a living? [Citation Graph (, )][DBLP]


  2. Floodless in seattle: a scalable ethernet architecture for large enterprises. [Citation Graph (, )][DBLP]


  3. Xl: an efficient network routing algorithm. [Citation Graph (, )][DBLP]


  4. Path splicing. [Citation Graph (, )][DBLP]


  5. Shedding light on the glue logic of the internet routing architecture. [Citation Graph (, )][DBLP]


  6. A policy-aware switching layer for data centers. [Citation Graph (, )][DBLP]


  7. A scalable, commodity data center network architecture. [Citation Graph (, )][DBLP]


  8. Dcell: a scalable and fault-tolerant network structure for data centers. [Citation Graph (, )][DBLP]


  9. What's going on?: learning communication rules in edge networks. [Citation Graph (, )][DBLP]


  10. Answering what-if deployment and configuration questions with wise. [Citation Graph (, )][DBLP]


  11. Shadow configuration as a network management primitive. [Citation Graph (, )][DBLP]


  12. Network exception handlers: host-network control in enterprise networks. [Citation Graph (, )][DBLP]


  13. A case for adapting channel width in wireless networks. [Citation Graph (, )][DBLP]


  14. Learning to share: narrowband-friendly wideband networks. [Citation Graph (, )][DBLP]


  15. Zigzag decoding: combating hidden terminals in wireless networks. [Citation Graph (, )][DBLP]


  16. Spamming botnets: signatures and characteristics. [Citation Graph (, )][DBLP]


  17. Enriching network security analysis with time travel. [Citation Graph (, )][DBLP]


  18. To filter or to authorize: network-layer DoS defense against multimillion-node botnets. [Citation Graph (, )][DBLP]


  19. Deflating the big bang: fast and scalable deep packet inspection with extended finite automata. [Citation Graph (, )][DBLP]


  20. Packet caches on routers: the implications of universal redundant traffic elimination. [Citation Graph (, )][DBLP]


  21. Virtual routers on the move: live router migration as a network-management primitive. [Citation Graph (, )][DBLP]


  22. Bittorrent is an auction: analyzing and improving bittorrent's incentives. [Citation Graph (, )][DBLP]


  23. Rd network services: differentiation through performance incentives. [Citation Graph (, )][DBLP]


  24. Rationality and traffic attraction: incentives for honest path announcements in bgp. [Citation Graph (, )][DBLP]


  25. Unconstrained endpoint profiling (googling the internet). [Citation Graph (, )][DBLP]


  26. Network discovery from passive measurements. [Citation Graph (, )][DBLP]


  27. Discarte: a disjunctive internet cartographer. [Citation Graph (, )][DBLP]


  28. Satellitelab: adding heterogeneity to planetary-scale network testbeds. [Citation Graph (, )][DBLP]


  29. Ispy: detecting ip prefix hijacking on my own. [Citation Graph (, )][DBLP]


  30. Accountable internet protocol (aip). [Citation Graph (, )][DBLP]


  31. P4p: provider portal for applications. [Citation Graph (, )][DBLP]


  32. Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems. [Citation Graph (, )][DBLP]


  33. Challenges, design and analysis of a large-scale p2p-vod system. [Citation Graph (, )][DBLP]


  34. Donnybrook: enabling large-scale, high-speed, peer-to-peer games. [Citation Graph (, )][DBLP]


  35. Symbol-level network coding for wireless mesh networks. [Citation Graph (, )][DBLP]


  36. Predictable performance optimization for wireless networks. [Citation Graph (, )][DBLP]


  37. Interactive wifi connectivity for moving vehicles. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002