The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Walid Dabbous: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mohammad Malli, Chadi Barakat, Walid Dabbous
    Application-Level Versus Network-Level Proximity. [Citation Graph (0, 0)][DBLP]
    AINTEC, 2005, pp:225-239 [Conf]
  2. Rares Serban, Chadi Barakat, Walid Dabbous
    Dynamic Resource Allocation in Core Routers of a Diffserv Network. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2002, pp:153-167 [Conf]
  3. Walid Dabbous, Christophe Diot
    High Performance Protocol Architecture. [Citation Graph (0, 0)][DBLP]
    Data Communications and their Performance, 1995, pp:66-81 [Conf]
  4. Walid Dabbous
    Analysis of a Delay Based Congestion Avoidance Algorithm. [Citation Graph (0, 0)][DBLP]
    HPN, 1992, pp:283-298 [Conf]
  5. Fatma Louati, Chadi Barakat, Walid Dabbous
    Handling Two-Way TCP Traffic in Asymmetric Networks. [Citation Graph (0, 0)][DBLP]
    HSNMC, 2004, pp:233-243 [Conf]
  6. Fethi Filali, Walid Dabbous
    A Simple and Scalable Fair Bandwidth Sharing Mechanism for Multicast Flows. [Citation Graph (0, 0)][DBLP]
    ICNP, 2002, pp:248-258 [Conf]
  7. Antoine Clerget, Walid Dabbous
    TUF : Tag-based Unified Fairness. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:498-507 [Conf]
  8. Christian Huitema, Walid Dabbous
    Minimal Complexity for the Simplest Protocol. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1991, pp:1481-1489 [Conf]
  9. Fethi Filali, Walid Dabbous
    Issues on the IP Multicast Service Behaviour over the Next-Generation Satellite-Terrestrial Hybrid Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2001, pp:417-424 [Conf]
  10. Miguel A. Ruiz-Sánchez, Walid Dabbous
    Controlling Bursts in Best-effort Routers for Flow Isolation. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:399-404 [Conf]
  11. Fethi Filali, Hitoshi Asaeda, Walid Dabbous
    Counting the Number of Members in Multicast Communication. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 2002, pp:63-70 [Conf]
  12. Walid Dabbous
    High performance presentation and transport mechanisms for integrated communication subsystems. [Citation Graph (0, 0)][DBLP]
    Protocols for High-Speed Networks, 1994, pp:189-204 [Conf]
  13. Fethi Filali, Walid Dabbous
    SBQ: A Simple Scheduler for Fair Bandwidth Sharing Between Unicast and Multicast Flows. [Citation Graph (0, 0)][DBLP]
    QofIS, 2002, pp:78-89 [Conf]
  14. Hitoshi Asaeda, Walid Dabbous
    Multicast Routers Cooperating with Channel Announcement System. [Citation Graph (0, 0)][DBLP]
    SAINT, 2004, pp:226-232 [Conf]
  15. Walid Dabbous, Sean W. O'Malley, Claude Castelluccia
    Generating Efficient Protocol Code from an Abstract Specification. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1996, pp:60-72 [Conf]
  16. Fethi Filali, Walid Dabbous
    Fair bandwidth sharing between unicast and multicast flows in best-effort networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:4, pp:330-344 [Journal]
  17. Christophe Diot, Walid Dabbous, Jon Crowcroft
    Multipoint Communication: A Survey of Protocols, Functions, and Mechanisms. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1997, v:15, n:3, pp:277-290 [Journal]
  18. Claude Castelluccia, Walid Dabbous, Sean W. O'Malley
    Generating efficient protocol code from an abstract specification. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1997, v:5, n:4, pp:514-524 [Journal]
  19. Mohamed Ali Kâafar, Laurent Mathy, Kavé Salamatian, Chadi Barakat, Thierry Turletti, Walid Dabbous
    Securing Internet Coordinate Systems. [Citation Graph (0, 0)][DBLP]
    AINTEC, 2007, pp:167-168 [Conf]
  20. Mohamed Ali Kâafar, Thierry Turletti, Walid Dabbous
    A Locating-First Approach for Scalable Overlay Multicast. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  21. Mohammad Malli, Chadi Barakat, Walid Dabbous
    Landmark-Based End-to-End Bandwidth Inference. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  22. Mohamed Ali Kâafar, Laurent Mathy, Chadi Barakat, Kavé Salamatian, Thierry Turletti, Walid Dabbous
    Securing internet coordinate embedding systems. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:61-72 [Conf]
  23. Mohamed Ali Kâafar, Thierry Turletti, Walid Dabbous
    A Locating-First Approach for Scalable Overlay Multicast [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  24. A Multi-Burst Sliding Encoding for Mobile Satellite TV Broadcasting. [Citation Graph (, )][DBLP]


  25. A Locating-First Approach for Scalable Overlay Multicast. [Citation Graph (, )][DBLP]


  26. An Enhanced Scalable Proximity Model. [Citation Graph (, )][DBLP]


  27. Can Realistic BitTorrent Experiments Be Performed on Clusters? [Citation Graph (, )][DBLP]


  28. Virtual networks under attack: disrupting internet coordinate systems. [Citation Graph (, )][DBLP]


  29. CHESS: An application-aware space for enhanced scalable services in overlay networks. [Citation Graph (, )][DBLP]


  30. Pushing BitTorrent Locality to the Limit [Citation Graph (, )][DBLP]


  31. BitTorrent Experiments on Testbeds: A Study of the Impact of Network Latencies [Citation Graph (, )][DBLP]


  32. Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent [Citation Graph (, )][DBLP]


  33. De-anonymizing BitTorrent Users on Tor [Citation Graph (, )][DBLP]


  34. Compromising Tor Anonymity Exploiting P2P Information Leakage [Citation Graph (, )][DBLP]


  35. Can Realistic BitTorrent Experiments Be Performed on Clusters? [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002