


default search action
5th CoNEXT 2009: Rome, Italy
- Jörg Liebeherr, Giorgio Ventre, Ernst W. Biersack, Srinivasan Keshav:
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, CoNEXT 2009, Rome, Italy, December 1-4, 2009. ACM 2009, ISBN 978-1-60558-636-6
New architectures 1
- Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca Braynard:
Networking named content. 1-12 - Eric Keller, Minlan Yu, Matthew Caesar
, Jennifer Rexford
:
Virtually eliminating router bugs. 13-24 - Haitao Wu, Guohan Lu, Dan Li, Chuanxiong Guo
, Yongguang Zhang:
MDCube: a high performance network structure for modular data center interconnection. 25-36 - Vytautas Valancius, Nikolaos Laoutaris
, Laurent Massoulié, Christophe Diot, Pablo Rodriguez:
Greening the internet with nano data centers. 37-48
Wireless mesh networks
- Saumitra M. Das, Konstantina Papagiannaki, Suman Banerjee, Y. C. Tay:
SWARM: the power of structure in community wireless mesh networks. 49-60 - Theodoros Salonidis, Georgios Sotiropoulos, Roch Guérin, Ramesh Govindan:
Online optimization of 802.11 mesh networks. 61-72 - Adel Aziz, David Starobinski, Patrick Thiran, Alaeddine El Fawal:
EZ-Flow: removing turbulence in IEEE 802.11 wireless mesh networks without message passing. 73-84
Opportunistic communication
- Joshua Reich, Augustin Chaintreau
:
The age of impatience: optimal replication schemes for opportunistic networks. 85-96 - Thomas Zahn, Greg O'Shea, Antony I. T. Rowstron:
Feasibility of content dissemination between devices in moving vehicles. 97-108 - Ashish Sharma, Vishnu Navda, Ramachandran Ramjee, Venkata N. Padmanabhan, Elizabeth M. Belding:
Cool-Tether: energy efficient on-the-fly wifi hot-spots using mobile phones. 109-120
New architectures II
- Daniel Sadoc Menasché, Antônio Augusto de Aragão Rocha, Bin Li, Donald F. Towsley
, Arun Venkataramani:
Content availability and bundling in swarming systems. 121-132 - Alex Sherman, Jason Nieh, Clifford Stein:
FairTorrent: bringing fairness to peer-to-peer systems. 133-144 - David A. Sontag, Yang Zhang, Amar Phanishayee, David G. Andersen, David R. Karger
:
Scaling all-pairs overlay routing. 145-156
Privacy and security
- Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. Zhao:
StarClique: guaranteeing user privacy in social networks against intersection attacks. 157-168 - Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali, Alec Wolman:
Lockr: better privacy for social networks. 169-180 - Konstantinos Pelechrinis, Ioannis Broustis, Srikanth V. Krishnamurthy
, Christos Gkantsidis:
ARES: an anti-jamming reinforcement system for 802.11 networks. 181-192
Measurement I
- John R. Douceur, James W. Mickens, Thomas Moscibroda, Debmalya Panigrahi:
ThunderDome: discovering upload constraints using decentralized bandwidth tournaments. 193-204 - Edmond W. W. Chan, Xiapu Luo
, Rocky K. C. Chang
:
A minimum-delay-difference method for mitigating cross-traffic impact on capacity measurement. 205-216 - Kai Chen
, David R. Choffnes, Rahul Potharaju, Yan Chen, Fabian E. Bustamante, Dan Pei
, Yao Zhao:
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users. 217-228
Measurement II
- Lucian Popa, Byung-Gon Chun, Ion Stoica, Jaideep Chandrashekar, Nina Taft:
Macroscope: end-point approach to networked application dependency discovery. 229-240 - Marios Iliofotou, Michalis Faloutsos
, Michael Mitzenmacher:
Exploiting dynamicity in graph-based traffic analysis: techniques and applications. 241-252 - Kaushik Lakshminarayanan, Samir Sapra, Srinivasan Seshan
, Peter Steenkiste
:
RFDump: an architecture for monitoring the wireless ether. 253-264
Network management
- Christos Gkantsidis, Thomas Karagiannis, Peter B. Key, Bozidar Radunovic, Elias Raftopoulos, D. Manjunath:
Traffic management and resource allocation in small wired/wireless networks. 265-276 - Xu Chen, Zhuoqing Morley Mao, Jacobus E. van der Merwe:
PACMAN: a platform for automated and controlled network operations and configuration management. 277-288 - Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nick Feamster, Mostafa H. Ammar:
Detecting network neutrality violations with causal inference. 289-300
Newl architectures II
- Ang Li, Xiaowei Yang, David Wetherall:
SafeGuard: safe forwarding during route changes. 301-312 - Minlan Yu, Alex Fabrikant, Jennifer Rexford
:
BUFFALO: bloom filter forwarding architecture for large organizations. 313-324 - Anthony Lambert, Marc-Olivier Buob, Steve Uhlig
:
Improving internet-wide routing protocols convergence with MRPC timers. 325-336 - Cheng-Lin Tsao, Raghupathy Sivakumar:
On effectively exploiting multiple wireless interfaces in mobile hosts. 337-348

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.