dblp: ACM SIGCOMM Conference 2004 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


ACM SIGCOMM Conference 2004: Portland, Oregon, USA

jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Raj Yavatkar, Ellen W. Zegura, Jennifer Rexford:
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 2004, Portland, Oregon, USA. ACM 2004, ISBN 1-58113-862-8
Simon S. Lam:
Back to the future part 4: the internet. 1-2
Network geometry and design

Lun Li, David L. Alderson, Walter Willinger, John Doyle:
A first-principles approach to understanding the internet's router-level topology. 3-14
Frank Dabek, Russ Cox, M. Frans Kaashoek, Robert Morris:
Vivaldi: a decentralized network coordinate system. 15-26
Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Zhang, Albert G. Greenberg, Gísli Hjálmtýsson:
Routing design in operational networks: a look from the inside. 27-40
Inference of network properties

Ningning Hu, Li (Erran) Li, Zhuoqing Morley Mao, Peter Steenkiste
, Jia Wang:
Locating internet bottlenecks: algorithms, measurements, and implications. 41-54
Yan Chen, David Bindel
, Han Hee Song, Randy H. Katz:
An algebraic approach to practical and scalable overlay network monitoring. 55-66
Rohit Kapoor, Ling-Jyh Chen
, Li Lao, Mario Gerla, M. Y. Sanadidi:
CapProbe: a simple and accurate capacity estimation technique. 67-78
Multihoming and overlays

David Kiyoshi Goldenberg, Lili Qiu, Haiyong Xie, Yang Richard Yang, Yin Zhang:
Optimizing cost and performance for multihoming. 79-92
Aditya Akella, Jeffrey Pang, Bruce M. Maggs, Srinivasan Seshan
, Anees Shaikh:
A comparison of overlay routing and multihoming route control. 93-106
Kunwadee Sripanidkulchai, Aditya Ganjam, Bruce M. Maggs, Hui Zhang:
The feasibility of supporting large-scale live streaming applications with dynamic application end-points. 107-120
Wireless and delay-tolerant networks

Daniel Aguayo, John C. Bicket, Sanjit Biswas, Glenn Judd, Robert Morris:
Link-level measurements from an 802.11b mesh network. 121-132
Richard Draves, Jitendra Padhye, Brian Zill:
Comparison of routing metrics for static multi-hop wireless networks. 133-144
Sushant Jain, Kevin R. Fall, Rabin K. Patra:
Routing in a delay tolerant network. 145-158
Randolph Y. Wang, Sumeet Sobti, Nitin Garg, Elisha Ziskind, Junwen Lai, Arvind Krishnamurthy:
Turning the postal system into a generic digital communication mechanism. 159-166
Secure networks

Barath Raghavan, Alex C. Snoeren:
A system for authenticated policy-compliant routing. 167-178
Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu
:
SPV: secure path vector routing for securing BGP. 179-192
Helen J. Wang, Chuanxiong Guo
, Daniel R. Simon, Alf Zugenmaier:
Shield: vulnerability-driven network filters for preventing known vulnerability exploits. 193-204
Network troubleshooting

Anja Feldmann
, Olaf Maennel
, Zhuoqing Morley Mao, Arthur W. Berger, Bruce M. Maggs:
Locating internet routing instabilities. 205-218
Anukool Lakhina
, Mark Crovella, Christophe Diot:
Diagnosing network-wide traffic anomalies. 219-230
Renata Teixeira, Aman Shaikh, Timothy Griffin, Geoffrey M. Voelker:
Network sensitivity to hot-potato disruptions. 231-244
Router design

Cristian Estan, Ken Keys, David Moore, George Varghese:
Building a better NetFlow. 245-256
Prashanth Pappu, Jonathan S. Turner, Kenneth Wong:
Work-conserving distributed schedulers for Terabit routers. 257-268
Paolo Valente
:
Exact GPS simulation with logarithmic complexity, and its application to an optimally fair scheduler. 269-280
Congestion control

Guido Appenzeller, Isaac Keslassy
, Nick McKeown:
Sizing router buffers. 281-292
Min Sik Kim, Taekhyun Kim, YongJune Shin
, Simon S. Lam, Edward J. Powers:
A wavelet-based approach to detect shared congestion. 293-306
Yueping Zhang, Seong-ryong Kang, Dmitri Loguinov:
Delayed stability and performance of distributed congestion control. 307-318
DNS and naming

Vasileios Pappas, Zhiguo Xu, Songwu Lu, Daniel Massey, Andreas Terzis, Lixia Zhang:
Impact of configuration errors on DNS robustness. 319-330
Venugopalan Ramasubramanian, Emin Gün Sirer:
The design and implementation of a next generation name service for the internet. 331-342
Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia Ratnasamy, Scott Shenker
, Ion Stoica, Michael Walfish:
A layered naming architecture for the internet. 343-352
Distributed information systems

Ashwin R. Bharambe, Mukesh Agrawal, Srinivasan Seshan
:
Mercury: supporting scalable multi-attribute range queries. 353-366
Dongyu Qiu, Rayadurgam Srikant:
Modeling and performance analysis of BitTorrent-like peer-to-peer networks. 367-378
Praveen Yalagandula, Michael Dahlin:
A scalable distributed information management system. 379-390

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







