-
2
-
-
85015466003
-
Hedera: Dynamic flow scheduling for data center networks
-
M. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. Vahdat. Hedera: Dynamic flow scheduling for data center networks. In Proc. NSDI, 2010.
-
Proc. NSDI, 2010
-
-
Al-Fares, M.1
Radhakrishnan, S.2
Raghavan, B.3
Huang, N.4
Vahdat, A.5
-
3
-
-
84856200223
-
A high performance, server-centric network architecture for modular data centers
-
Bcube
-
C. Guo et al. Bcube: A high performance, server-centric network architecture for modular data centers. In Proc. Sigcomm, 2009.
-
Proc. Sigcomm, 2009
-
-
Guo, C.1
-
4
-
-
81255197424
-
Secondnet: A data center network virtualization architecture with bandwidth guarantees
-
C. Guo et al. Secondnet: A data center network virtualization architecture with bandwidth guarantees. In Proc. CoNext, 2010.
-
Proc. CoNext, 2010
-
-
Guo, C.1
-
5
-
-
77958113303
-
Safe and effective fine-grained tcp retransmissions for datacenter communication
-
V. Vasudevan et al. Safe and effective fine-grained tcp retransmissions for datacenter communication. In Proc. Sigcomm, 2009.
-
Proc. Sigcomm, 2009
-
-
Vasudevan, V.1
-
8
-
-
39049162846
-
Scalable clustering of internet paths by shared congestion
-
M. Kim, T. Kim, Y. Shin, S. Lam, and E. Powers. Scalable clustering of internet paths by shared congestion. In Proc. Infocom, 2006.
-
Proc. Infocom, 2006
-
-
Kim, M.1
Kim, T.2
Shin, Y.3
Lam, S.4
Powers, E.5
-
9
-
-
8344224137
-
Low-rate tcptargeted denial of service attacks (the shrew vs. the mice and elephants)
-
A. Kuzmanovic and E. W. Knightly. Low-rate tcptargeted denial of service attacks (the shrew vs. the mice and elephants). In Proc. Sigcomm, 2003.
-
Proc. Sigcomm, 2003
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
10
-
-
84856187858
-
A new form of dos attack in a cloud and its avoidance mechanism
-
H. Liu. A new form of dos attack in a cloud and its avoidance mechanism. In Proc. CCSW, 2011.
-
Proc. CCSW, 2011
-
-
Liu, H.1
-
11
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proc. CCS, 2009.
-
Proc. CCS, 2009
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
12
-
-
0036602269
-
Detecting shared congestion of flows via end-to-end measurement
-
D. Rubenstein, J. Kurose, and D. Towsley. Detecting shared congestion of flows via end-to-end measurement. In IEEE/ACM ToN, 2002.
-
(2002)
IEEE/ACM ToN
-
-
Rubenstein, D.1
Kurose, J.2
Towsley, D.3
-
14
-
-
84856184142
-
Defending against low-rate tcp attacks: Dynamic detection and protection
-
H. Sun, J.C.S. Lui, and D.K.Y. Yau. Defending against low-rate tcp attacks: Dynamic detection and protection. In Proc. ICNP, 2004.
-
Proc. ICNP, 2004
-
-
Sun, H.1
Lui, J.C.S.2
Yau, D.K.Y.3
-
15
-
-
85060085357
-
Low-rate tcp-targeted dos attack disrupts internet routing
-
Y. Zhang, Z.M. Mao, and J. Wang. Low-rate tcp-targeted dos attack disrupts internet routing. In Proc. NDSS, 2007.
-
Proc. NDSS, 2007
-
-
Zhang, Y.1
Mao, Z.M.2
Wang, J.3
|