The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communication Review
2003, volume: 33, number: 1

  1. Lakshminarayanan Subramanian, Ion Stoica, Hari Balakrishnan, Randy H. Katz
    OverQoS: offering Internet QoS using overlays. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:11-16 [Journal]
  2. Robert Braden, Theodore Faber, Mark Handley
    From protocol stack to protocol heap: role-based architecture. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:17-22 [Journal]
  3. Christian F. Tschudin, Richard Gold
    Network pointers. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:23-28 [Journal]
  4. Sally Floyd, Eddie Kohler
    Internet research needs better models. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:29-34 [Journal]
  5. Konstantinos Psounis, Rong Pan, Balaji Prabhakar, Damon Wischik
    The scaling hypothesis: simplifying the prediction of network performance using scaled-down simulations. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:35-40 [Journal]
  6. David Alderson, John Doyle, Ramesh Govindan, Walter Willinger
    Toward an optimization-driven framework for designing and generating realistic Internet topologies. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:41-46 [Journal]
  7. Brian White, Jay Lepreau, Shashi Guruprasad
    Lowering the barrier to wireless and mobile experimentation. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:47-52 [Journal]
  8. Mark Handley, Orion Hodson, Eddie Kohler
    XORP: an open platform for network research. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:53-57 [Journal]
  9. Larry L. Peterson, Thomas E. Anderson, David E. Culler, Timothy Roscoe
    A blueprint for introducing disruptive technology into the Internet. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:59-64 [Journal]
  10. Timothy Roscoe, Steven Hand, Rebecca Isaacs, Richard Mortier, Paul W. Jardetzky
    Predicate routing: enabling controlled networking. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:65-70 [Journal]
  11. Dapeng Zhu, Mark Gritter, David R. Cheriton
    Feedback based routing. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:71-76 [Journal]
  12. Venkata N. Padmanabhan, Daniel R. Simon
    Secure traceroute to detect faulty or malicious routing. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:77-82 [Journal]
  13. Douglas S. J. De Couto, Daniel Aguayo, Benjamin A. Chambers, Robert Morris
    Performance of multihop wireless networks: shortest path is not enough. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:83-88 [Journal]
  14. Chunqiang Tang, Zhichen Xu, Mallik Mahalingam
    pSearch: information retrieval in structured overlays. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:89-94 [Journal]
  15. Edith Cohen, Amos Fiat, Haim Kaplan
    A case for associative peer to peer overlays. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:95-100 [Journal]
  16. Marcel Waldvogel, Roberto Rinaldi
    Efficient topology-aware overlay network. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:101-106 [Journal]
  17. Mayank Bawa, Hrishikesh Deshpande, Hector Garcia-Molina
    Transience of peers & streaming media. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:107-112 [Journal]
  18. Pablo Molinero-Fernández, Nick McKeown, Hui Zhang
    Is IP going to take over the world (of communications)? [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:113-118 [Journal]
  19. Cyriel Minkenberg, Ronald P. Luijten, François Abel, Wolfgang E. Denzel, Mitchell Gusat
    Current issues in packet switch design. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:119-124 [Journal]
  20. Thomas E. Anderson, Scott Shenker, Ion Stoica, David Wetherall
    Design guidelines for robust Internet protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:125-130 [Journal]
  21. Werner Vogels, Robbert van Renesse, Kenneth P. Birman
    The power of epidemics: robust communication for large-scale distributed systems. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:131-135 [Journal]
  22. Scott Shenker, Sylvia Ratnasamy, Brad Karp, Ramesh Govindan, Deborah Estrin
    Data-centric storage in sensornets. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:137-142 [Journal]
  23. Deepak Ganesan, Deborah Estrin, John S. Heidemann
    Dimensions: why do we need a new data handling architecture for sensor networks? [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:143-148 [Journal]
  24. Jeremy Elson, Kay Römer
    Wireless sensor networks: a new regime for time synchronization. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:149-154 [Journal]
  25. Badri Nath, Dragos Niculescu
    Routing on a curve. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:1, pp:155-160 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002