Journals in DBLP
Neil T. Spring , David Wetherall , Thomas E. Anderson Reverse engineering the Internet. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:3-8 [Journal ] George Varghese , Cristian Estan The measurement manifesto. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:9-14 [Journal ] Mike Wawrzoniak , Larry L. Peterson , Timothy Roscoe Sophia: an Information Plane for networked systems. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:15-20 [Journal ] Donald F. Caldwell , Anna Gilbert , Joel Gottlieb , Albert G. Greenberg , Gísli Hjálmtýsson , Jennifer Rexford The cutting EDGE of IP router configuration. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:21-26 [Journal ] Roger Karrer , Ashutosh Sabharwal , Edward W. Knightly Enabling large-scale wireless broadband: the case for TAPs. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:27-32 [Journal ] Pravin Bhagwat , Bhaskaran Raman , Dheeraj Sanghi Turning 802.11 inside-out. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:33-38 [Journal ] Thomas E. Anderson , Timothy Roscoe , David Wetherall Preventing Internet denial-of-service with capabilities. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:39-44 [Journal ] Karthik Lakshminarayanan , Daniel Adkins , Adrian Perrig , Ion Stoica Taming IP packet flooding attacks. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:45-50 [Journal ] Christian Kreibich , Jon Crowcroft Honeycomb: creating intrusion detection signatures using honeypots. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:51-56 [Journal ] Vivek S. Pai , Limin Wang , KyoungSoo Park , Ruoming Pang , Larry L. Peterson The dark side of the Web: an open proxy's view. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:57-62 [Journal ] Glenn Judd , Peter Steenkiste Repeatable and realistic wireless experimentation through physical emulation. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:63-68 [Journal ] Sanjit Biswas , Robert Morris Opportunistic routing in multi-hop wireless networks. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:69-74 [Journal ] Romit Roy Choudhury , Nitin H. Vaidya MAC-layer anycasting in ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:75-80 [Journal ] Alex C. Snoeren , Barath Raghavan Decoupling policy from mechanism in Internet routing. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:81-86 [Journal ] Nick Feamster Practical verification techniques for wide-area routing. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:87-92 [Journal ] Bryan Ford Unmanaged Internet Protocol: taming the edge network management crisis. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:93-98 [Journal ] Jeffrey C. Mogul , Lawrence S. Brakmo , David E. Lowell , Dinesh Subhraveti , Justin Moore Unveiling the transport. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:99-106 [Journal ] Ravi Kokku , Taylor L. Riché , Aaron R. Kunze , Jayaram Mudigonda , Jamie Jason , Harrick M. Vin A case for run-time adaptation in packet processing systems. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:107-112 [Journal ] Russ Cox , Frank Dabek , M. Frans Kaashoek , Jinyang Li , Robert Morris Practical, distributed network coordinates. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:113-118 [Journal ] Matt Welsh Exposing resource tradeoffs in region-based communication abstractions for sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:119-124 [Journal ] Deepak Ganesan , Sylvia Ratnasamy , Hanbiao Wang , Deborah Estrin Coping with irregular spatio-temporal sampling in sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:125-130 [Journal ] Miguel Castro , Manuel Costa , Antony I. T. Rowstron Should we build Gnutella on a structured overlay? [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:131-136 [Journal ] Jeffrey Considine , John W. Byers , Ketan Meyer-Patel A constraint satisfaction approach to testbed embedding services. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:137-142 [Journal ]