The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communication Review
2004, volume: 34, number: 1

  1. Neil T. Spring, David Wetherall, Thomas E. Anderson
    Reverse engineering the Internet. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:3-8 [Journal]
  2. George Varghese, Cristian Estan
    The measurement manifesto. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:9-14 [Journal]
  3. Mike Wawrzoniak, Larry L. Peterson, Timothy Roscoe
    Sophia: an Information Plane for networked systems. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:15-20 [Journal]
  4. Donald F. Caldwell, Anna Gilbert, Joel Gottlieb, Albert G. Greenberg, Gísli Hjálmtýsson, Jennifer Rexford
    The cutting EDGE of IP router configuration. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:21-26 [Journal]
  5. Roger Karrer, Ashutosh Sabharwal, Edward W. Knightly
    Enabling large-scale wireless broadband: the case for TAPs. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:27-32 [Journal]
  6. Pravin Bhagwat, Bhaskaran Raman, Dheeraj Sanghi
    Turning 802.11 inside-out. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:33-38 [Journal]
  7. Thomas E. Anderson, Timothy Roscoe, David Wetherall
    Preventing Internet denial-of-service with capabilities. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:39-44 [Journal]
  8. Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica
    Taming IP packet flooding attacks. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:45-50 [Journal]
  9. Christian Kreibich, Jon Crowcroft
    Honeycomb: creating intrusion detection signatures using honeypots. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:51-56 [Journal]
  10. Vivek S. Pai, Limin Wang, KyoungSoo Park, Ruoming Pang, Larry L. Peterson
    The dark side of the Web: an open proxy's view. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:57-62 [Journal]
  11. Glenn Judd, Peter Steenkiste
    Repeatable and realistic wireless experimentation through physical emulation. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:63-68 [Journal]
  12. Sanjit Biswas, Robert Morris
    Opportunistic routing in multi-hop wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:69-74 [Journal]
  13. Romit Roy Choudhury, Nitin H. Vaidya
    MAC-layer anycasting in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:75-80 [Journal]
  14. Alex C. Snoeren, Barath Raghavan
    Decoupling policy from mechanism in Internet routing. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:81-86 [Journal]
  15. Nick Feamster
    Practical verification techniques for wide-area routing. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:87-92 [Journal]
  16. Bryan Ford
    Unmanaged Internet Protocol: taming the edge network management crisis. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:93-98 [Journal]
  17. Jeffrey C. Mogul, Lawrence S. Brakmo, David E. Lowell, Dinesh Subhraveti, Justin Moore
    Unveiling the transport. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:99-106 [Journal]
  18. Ravi Kokku, Taylor L. Riché, Aaron R. Kunze, Jayaram Mudigonda, Jamie Jason, Harrick M. Vin
    A case for run-time adaptation in packet processing systems. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:107-112 [Journal]
  19. Russ Cox, Frank Dabek, M. Frans Kaashoek, Jinyang Li, Robert Morris
    Practical, distributed network coordinates. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:113-118 [Journal]
  20. Matt Welsh
    Exposing resource tradeoffs in region-based communication abstractions for sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:119-124 [Journal]
  21. Deepak Ganesan, Sylvia Ratnasamy, Hanbiao Wang, Deborah Estrin
    Coping with irregular spatio-temporal sampling in sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:125-130 [Journal]
  22. Miguel Castro, Manuel Costa, Antony I. T. Rowstron
    Should we build Gnutella on a structured overlay? [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:131-136 [Journal]
  23. Jeffrey Considine, John W. Byers, Ketan Meyer-Patel
    A constraint satisfaction approach to testbed embedding services. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:137-142 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002