-
2
-
-
21844441678
-
A comparison of overlay routing and multihoming route control
-
New York, NY, USA
-
A. Akella, J. Pang, B. Maggs, S. Seshan, and A. Shaikh. A comparison of overlay routing and multihoming route control. In ACM SIGCOMM, pages 93-106, New York, NY, USA, 2004.
-
(2004)
ACM SIGCOMM
, pp. 93-106
-
-
Akella, A.1
Pang, J.2
Maggs, B.3
Seshan, S.4
Shaikh, A.5
-
3
-
-
0036036742
-
Resilient overlay networks
-
ACM Press
-
D. Andersen, H. Balakrishnan, M. Kaashoek, and R. Morris. Resilient overlay networks. In SOSP, pages 131-145. ACM Press, 2001.
-
(2001)
SOSP
, pp. 131-145
-
-
Andersen, D.1
Balakrishnan, H.2
Kaashoek, M.3
Morris, R.4
-
4
-
-
18144370444
-
Overcoming the Internet impasse through virtualization
-
T. Anderson, L. Peterson, S. Shenker, and J. Turner. Overcoming the Internet impasse through virtualization. Computer, 38(4):34-41, 2005.
-
(2005)
Computer
, vol.38
, Issue.4
, pp. 34-41
-
-
Anderson, T.1
Peterson, L.2
Shenker, S.3
Turner, J.4
-
5
-
-
33750362576
-
Loose source routing as a mechanism for traffic policies
-
K. Argyraki and D. Cheriton. Loose source routing as a mechanism for traffic policies. In Proc. of FDNA, 2004.
-
(2004)
Proc. of FDNA
-
-
Argyraki, K.1
Cheriton, D.2
-
8
-
-
21844443150
-
An algebraic approach to practical and scalable overlay network monitoring
-
Y. Chen, D. Bindel, H. Song, and R. H. Katz. An algebraic approach to practical and scalable overlay network monitoring. SIGCOMM Comput. Commun. Rev., 34(4):55-66, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.4
, pp. 55-66
-
-
Chen, Y.1
Bindel, D.2
Song, H.3
Katz, R.H.4
-
9
-
-
0028485511
-
MBone: The multicast backbone
-
Aug.
-
H. Eriksson. MBone: The Multicast Backbone. Communications of the ACM, 37(8):54-60, Aug. 1994.
-
(1994)
Communications of the ACM
, vol.37
, Issue.8
, pp. 54-60
-
-
Eriksson, H.1
-
11
-
-
85032698306
-
Improving the reliability of internet paths with one-hop source routing
-
K. P. Gummadi, H. V. Madhyastha, S. D. Gribble, H. M. Levy, and D. Wetherall. Improving the reliability of internet paths with one-hop source routing. In USENIX OSDI, pages 183-198, 2004.
-
(2004)
USENIX OSDI
, pp. 183-198
-
-
Gummadi, K.P.1
Madhyastha, H.V.2
Gribble, S.D.3
Levy, H.M.4
Wetherall, D.5
-
14
-
-
33748794706
-
-
Technical Report UCB/CSD-005-1397, UC Berkeley, EECS
-
D. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I. Stoica, and K. Wehrle. Ocala: An architecture for supporting legacy applications over overlays. Technical Report UCB/CSD-005-1397, UC Berkeley, EECS, 2005.
-
(2005)
Ocala: An Architecture for Supporting Legacy Applications over Overlays
-
-
Joseph, D.1
Kannan, J.2
Kubota, A.3
Lakshminarayanan, K.4
Stoica, I.5
Wehrle, K.6
-
17
-
-
33845212081
-
-
Technical Report TR-668-03, Computer Science Department, Princeton, Feb.
-
A. Nakao, L. Peterson, and M. Wawrzoniak. A divert mechanism for service overlays. Technical Report TR-668-03, Computer Science Department, Princeton, Feb. 2003.
-
(2003)
A Divert Mechanism for Service Overlays
-
-
Nakao, A.1
Peterson, L.2
Wawrzoniak, M.3
-
19
-
-
85084160260
-
A waypoint service approach to connect heterogeneous internet address spaces
-
T. S. E. Ng, I. Stoica, and H. Zhang. A waypoint service approach to connect heterogeneous internet address spaces. In USENIX Technical Conf., 2001.
-
(2001)
USENIX Technical Conf.
-
-
Ng, T.S.E.1
Stoica, I.2
Zhang, H.3
-
20
-
-
33845209969
-
Upgrading transport protocols using untrusted mobile code
-
October
-
P. Patel, A. Whitaker, D. Wetherall, J. Lepreau, and T. Stack. Upgrading transport protocols using untrusted mobile code. In SOSP, October 2003.
-
(2003)
SOSP
-
-
Patel, P.1
Whitaker, A.2
Wetherall, D.3
Lepreau, J.4
Stack, T.5
-
23
-
-
19944390671
-
Session level techniques for improving web browsing performance on wireless links
-
P. Rodriguez, S. Mukherjee, and S. Rangarajan. Session level techniques for improving web browsing performance on wireless links. In WWW, 2004.
-
(2004)
WWW
-
-
Rodriguez, P.1
Mukherjee, S.2
Rangarajan, S.3
-
24
-
-
24144473704
-
Detour: A case for informed Internet routing and transport
-
January
-
S. Savage, T. Anderson, A. Aggarwal, D. Becker, N. Cardwell, A. Collins, E. Hoffman, J. Snell, A. Vahdat, G. Voelker, and J. Zahorjan. Detour: a case for informed Internet routing and transport. IEEE Micro, 19, No. 1:50-59, January 1999.
-
(1999)
IEEE Micro
, vol.19
, Issue.1
, pp. 50-59
-
-
Savage, S.1
Anderson, T.2
Aggarwal, A.3
Becker, D.4
Cardwell, N.5
Collins, A.6
Hoffman, E.7
Snell, J.8
Vahdat, A.9
Voelker, G.10
Zahorjan, J.11
-
25
-
-
0002098559
-
TCP congestion contorl with a misbehaving receiver
-
S. Savage, N. Cardwell, D. Wetherall, and T. Anderson. TCP congestion contorl with a misbehaving receiver. Computer Communication Review, 29(5), 1999.
-
(1999)
Computer Communication Review
, vol.29
, Issue.5
-
-
Savage, S.1
Cardwell, N.2
Wetherall, D.3
Anderson, T.4
-
26
-
-
2442581337
-
Internet indirection infrastructure
-
I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet indirection infrastructure. IEEE/ACM Trans. Netw., 12(2):205-218, 2004.
-
(2004)
IEEE/ACM Trans. Netw.
, vol.12
, Issue.2
, pp. 205-218
-
-
Stoica, I.1
Adkins, D.2
Zhuang, S.3
Shenker, S.4
Surana, S.5
-
31
-
-
84964410786
-
A network architecture providing host migration transparency
-
F. Teraoka, Y. Yokote, and M. Tokoro. A network architecture providing host migration transparency. In Proceedings of the ACM SIGCOMM '88 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 1991.
-
(1991)
Proceedings of the ACM SIGCOMM '88 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
-
-
Teraoka, F.1
Yokote, Y.2
Tokoro, M.3
-
32
-
-
18144402704
-
-
Technical Report ISI-TR-2003-570, Information Sciences Institute (ISI), March
-
J. Touch, Y. Wang, L. Eggert, and G. Finn. Virtual internet architecture. Technical Report ISI-TR-2003-570, Information Sciences Institute (ISI), March 2003.
-
(2003)
Virtual Internet Architecture
-
-
Touch, J.1
Wang, Y.2
Eggert, L.3
Finn, G.4
-
34
-
-
84871284967
-
Middleboxes no longer considered harmful
-
M. Walfish, J. Stribling, and M. Krohn. Middleboxes no longer considered harmful. In OSDI, 2004.
-
(2004)
OSDI
-
-
Walfish, M.1
Stribling, J.2
Krohn, M.3
-
35
-
-
11244277131
-
-
Technical Report TR-01-30, UT Austin, June
-
P. Yalagandula, A. Garg, M. Dahlin, L. Alvisi, and H. Vin. Transparent mobility with minimal infrastructure. Technical Report TR-01-30, UT Austin, June 2001.
-
(2001)
Transparent Mobility with Minimal Infrastructure
-
-
Yalagandula, P.1
Garg, A.2
Dahlin, M.3
Alvisi, L.4
Vin, H.5
-
37
-
-
85091073309
-
A transport layer approach for improving end-to-end performance and robustness using redundant paths
-
June
-
M. Zhang, J. Lai, A. Krishnamurthy, L. Peterson, and R. Wang. A transport layer approach for improving end-to-end performance and robustness using redundant paths. In USENIX Annual Technical Conference, June 2004.
-
(2004)
USENIX Annual Technical Conference
-
-
Zhang, M.1
Lai, J.2
Krishnamurthy, A.3
Peterson, L.4
Wang, R.5
-
38
-
-
28744432524
-
Host mobility using an internet indirection infrastructure
-
S. Zhuang, K. Lai, I. Stoica, R. Katz, and S. Shenker. Host mobility using an internet indirection infrastructure. In Proc. of Mobisys, 2003.
-
(2003)
Proc. of Mobisys
-
-
Zhuang, S.1
Lai, K.2
Stoica, I.3
Katz, R.4
Shenker, S.5
|