The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

P. Krishna Gummadi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Prasanna Ganesan, P. Krishna Gummadi, Hector Garcia-Molina
    Canon in G Major: Designing DHTs with Hierarchical Structure. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:263-272 [Conf]
  2. P. Krishna Gummadi, Stefan Saroiu, Steven D. Gribble
    King: estimating latency between arbitrary internet end hosts. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Workshop, 2002, pp:5-18 [Conf]
  3. Andreas Haeberlen, Marcel Dischinger, P. Krishna Gummadi, Stefan Saroiu
    Monarch: a tool to emulate transport protocol flowsover the internet at large. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:105-118 [Conf]
  4. P. Krishna Gummadi, Jnana Pradeep Madhavarapu, C. Siva Ram Murthy
    A Segmented Backup Scheme for Dependable Real Time Communication in Multihop Networks. [Citation Graph (0, 0)][DBLP]
    IPDPS Workshops, 2000, pp:678-684 [Conf]
  5. Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble
    Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:214-224 [Conf]
  6. Stefan Saroiu, P. Krishna Gummadi, Richard J. Dunn, Steven D. Gribble, Henry M. Levy
    An Analysis of Internet Content Delivery Systems. [Citation Graph (0, 0)][DBLP]
    OSDI, 2002, pp:- [Conf]
  7. P. Krishna Gummadi, Harsha V. Madhyastha, Steven D. Gribble, Henry M. Levy, David Wetherall
    Improving the Reliability of Internet Paths with One-hop Source Routing. [Citation Graph (0, 0)][DBLP]
    OSDI, 2004, pp:183-198 [Conf]
  8. P. Krishna Gummadi, Ramakrishna Gummadi, Steven D. Gribble, Sylvia Ratnasamy, Scott Shenker, Ion Stoica
    The impact of DHT routing geometry on resilience and proximity. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2003, pp:381-394 [Conf]
  9. P. Krishna Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M. Levy, John Zahorjan
    Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:314-329 [Conf]
  10. P. Krishna Gummadi, Stefan Saroiu, Steven D. Gribble
    A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:1, pp:82- [Journal]
  11. P. Krishna Gummadi, Stefan Saroiu, Steven D. Gribble
    King: estimating latency between arbitrary internet end hosts. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:3, pp:11- [Journal]
  12. Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble
    Measuring and analyzing the characteristics of Napster and Gnutella hosts. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2003, v:9, n:2, pp:170-184 [Journal]
  13. P. Krishna Gummadi, Jnana Pradeep Madhavarapu, C. Siva Ram Murthy
    An efficient primary-segmented backup scheme for dependable real-time communication in multihop networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2003, v:11, n:1, pp:81-94 [Journal]
  14. Andrew G. Miklas, Kiran K. Gollu, Kelvin K. W. Chan, Stefan Saroiu, P. Krishna Gummadi, Eyal de Lara
    Exploiting Social Interactions in Mobile Systems. [Citation Graph (0, 0)][DBLP]
    Ubicomp, 2007, pp:409-428 [Conf]

  15. Measurement and analysis of online social networks. [Citation Graph (, )][DBLP]


  16. Detecting bittorrent blocking. [Citation Graph (, )][DBLP]


  17. Characterizing residential broadband networks. [Citation Graph (, )][DBLP]


  18. Ostra: Leveraging Trust to Thwart Unwanted Communication. [Citation Graph (, )][DBLP]


  19. Glasnost: Enabling End Users to Detect Traffic Differentiation. [Citation Graph (, )][DBLP]


  20. Satellitelab: adding heterogeneity to planetary-scale network testbeds. [Citation Graph (, )][DBLP]


  21. On the evolution of user interaction in Facebook. [Citation Graph (, )][DBLP]


  22. An analysis of social network-based Sybil defenses. [Citation Graph (, )][DBLP]


  23. A measurement-driven analysis of information propagation in the flickr social network. [Citation Graph (, )][DBLP]


  24. You are who you know: inferring user profiles in online social networks. [Citation Graph (, )][DBLP]


  25. Pretty Good Packet Authentication. [Citation Graph (, )][DBLP]


  26. Measuring User Influence in Twitter: The Million Follower Fallacy. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002