-
1
-
-
44249122520
-
Internet clean-slate design: What and why?
-
Jul.
-
A. Feldmann, "Internet clean-slate design: what and why?" SIGCOMM Computer Communication Review, vol. 37, no. 3, pp. 59-64, Jul. 2007.
-
(2007)
SIGCOMM Computer Communication Review
, vol.37
, Issue.3
, pp. 59-64
-
-
Feldmann, A.1
-
2
-
-
18144370444
-
Overcoming the Internet impasse through virtualization
-
Apr
-
T. Anderson, L. Peterson, S. Shenker, and J. Turner, "Overcoming the Internet impasse through virtualization," Computer, vol. 38, no. 4, pp. 34-41, Apr 2005.
-
(2005)
Computer
, vol.38
, Issue.4
, pp. 34-41
-
-
Anderson, T.1
Peterson, L.2
Shenker, S.3
Turner, J.4
-
3
-
-
34547673397
-
A proposed architecture for the GENI backbone platform
-
J. S. Turner, "A proposed architecture for the GENI backbone platform," in Proc. of ACM/IEEE Symposium on Architectures for Networking and Communication Systems (ANCS), San Jose, CA, Dec. 2006, pp. 1-10.
-
Proc. of ACM/IEEE Symposium on Architectures for Networking and Communication Systems (ANCS), San Jose, CA, Dec. 2006
, pp. 1-10
-
-
Turner, J.S.1
-
4
-
-
70349682522
-
Virtual network embedding with coordinated node and link mapping
-
IEEE, april
-
N. Chowdhury, M. Rahman, and R. Boutaba, "Virtual network embedding with coordinated node and link mapping," in INFOCOM 2009, IEEE, april 2009, pp. 783-791.
-
(2009)
INFOCOM 2009
, pp. 783-791
-
-
Chowdhury, N.1
Rahman, M.2
Boutaba, R.3
-
5
-
-
78149309101
-
SwitchBlade: A platform for rapid deployment of network protocols on programmable hardware
-
M. B. Anwer, M. Motiwala, M. b. Tariq, and N. Feamster, "SwitchBlade: a platform for rapid deployment of network protocols on programmable hardware," in Proceedings of the Conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM), New Delhi, India, Sep. 2010, pp. 183-194.
-
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), New Delhi, India, Sep. 2010
, pp. 183-194
-
-
Anwer, M.B.1
Motiwala, M.2
Tariq, M.B.3
Feamster, N.4
-
6
-
-
78650474548
-
Fair multithreading on packet processors for scalable network virtualization
-
Q. Wu, S. Shanbhag, and T. Wolf, "Fair multithreading on packet processors for scalable network virtualization," in Proc. of ACM/IEEE Symposium on Architectures for Networking and Communication Systems (ANCS), San Diego, CA, Oct. 2010.
-
Proc. of ACM/IEEE Symposium on Architectures for Networking and Communication Systems (ANCS), San Diego, CA, Oct. 2010
-
-
Wu, Q.1
Shanbhag, S.2
Wolf, T.3
-
7
-
-
84859900032
-
-
National Science Foundation
-
Global Environment for Network Innovation, National Science Foundation, http://www.geni.net/.
-
-
-
-
9
-
-
84871557657
-
-
University of Utah
-
Network Emulation Testbed, University of Utah, http://www.emulab.net/.
-
Network Emulation Testbed
-
-
-
10
-
-
33750303852
-
In VINI veritas: Realistic and controlled network experimentation
-
A. Bavier, N. Feamster, M. Huang, L. Peterson, and J. Rexford, "In VINI veritas: realistic and controlled network experimentation," in SIGCOMM '06: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, Aug. 2006, pp. 3-14.
-
SIGCOMM '06: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, Aug. 2006
, pp. 3-14
-
-
Bavier, A.1
Feamster, N.2
Huang, M.3
Peterson, L.4
Rexford, J.5
-
11
-
-
33846560709
-
Diversifying the Internet
-
Saint Louis, MO, Nov.
-
J. S. Turner and D. E. Taylor, "Diversifying the Internet," in Proc. of IEEE Global Communications Conference (GLOBECOM), vol. 2, Saint Louis, MO, Nov. 2005.
-
(2005)
Proc. of IEEE Global Communications Conference (GLOBECOM)
, vol.2
-
-
Turner, J.S.1
Taylor, D.E.2
-
12
-
-
84876357755
-
How to lease the Internet in your spare time
-
Jan.
-
N. Feamster, L. Gao, and J. Rexford, "How to lease the Internet in your spare time," SIGCOMM Computer Communication Review, vol. 37, Jan. 2007.
-
(2007)
SIGCOMM Computer Communication Review
, vol.37
-
-
Feamster, N.1
Gao, L.2
Rexford, J.3
-
13
-
-
36949030190
-
Supercharging PlanetLab: A high performance, multi-application, overlay network platform
-
J. S. Turner, P. Crowley, J. DeHart, A. Freestone, B. Heller, F. Kuhns, S. Kumar, J. Lockwood, J. Lu, M. Wilson, C. Wiseman, and D. Zar, "Supercharging PlanetLab: a high performance, multi-application, overlay network platform," in SIGCOMM '07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, Kyoto, Japan, Aug. 2007, pp. 85-96.
-
SIGCOMM '07: Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Kyoto, Japan, Aug. 2007
, pp. 85-96
-
-
Turner, J.S.1
Crowley, P.2
DeHart, J.3
Freestone, A.4
Heller, B.5
Kuhns, F.6
Kumar, S.7
Lockwood, J.8
Lu, J.9
Wilson, M.10
Wiseman, C.11
Zar, D.12
-
14
-
-
79551529148
-
Customizing virtual networks with partial fpga reconfiguration
-
Jan.
-
D. Yin, D. Unnikrishnan, Y. Liao, L. Gao, and R. Tessier, "Customizing virtual networks with partial fpga reconfiguration," SIGCOMM Computer Communication Review, vol. 41, pp. 125-132, Jan. 2011.
-
(2011)
SIGCOMM Computer Communication Review
, vol.41
, pp. 125-132
-
-
Yin, D.1
Unnikrishnan, D.2
Liao, Y.3
Gao, L.4
Tessier, R.5
-
16
-
-
84859884818
-
-
Bad ISPs, VUZE, http://wiki.vuze.com/w/Bad-ISPs.
-
Bad ISPs
-
-
-
17
-
-
85014857125
-
Accountability in hosted virtual networks
-
ser. VISA '09, Barcelona, Spain, Aug. 2009
-
E. Keller, R. B. Lee, and J. Rexford, "Accountability in hosted virtual networks," in Proc. of the First ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures (VISA), ser. VISA '09, Barcelona, Spain, Aug. 2009, pp. 29-36.
-
Proc. of the First ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures (VISA)
, pp. 29-36
-
-
Keller, E.1
Lee, R.B.2
Rexford, J.3
-
18
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ser. CCS '09. New York, NY, USA: ACM, Online. Available
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in Proceedings of the 16th ACM conference on Computer and communications security, ser. CCS '09. New York, NY, USA: ACM, 2009, pp. 199-212. [Online]. Available: http://doi.acm.org/10.1145/1653662.1653687
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
19
-
-
77249132188
-
A survey of network virtualization
-
Apr.
-
N. M. M. K. Chowdhury and R. Boutaba, "A survey of network virtualization," Computer Networks, vol. 54, no. 5, pp. 862-876, Apr. 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.5
, pp. 862-876
-
-
Chowdhury, N.M.M.K.1
Boutaba, R.2
-
20
-
-
80053012116
-
Attacks on network infrastructure
-
D. Chasaki, Q. Wu, and T. Wolf, "Attacks on network infrastructure," in Proc. of Twentieth IEEE International Conference on Computer Communications and Networks (ICCCN), Maui, HI, Aug. 2011.
-
Proc. of Twentieth IEEE International Conference on Computer Communications and Networks (ICCCN), Maui, HI, Aug. 2011
-
-
Chasaki, D.1
Wu, Q.2
Wolf, T.3
-
21
-
-
78650501368
-
Design of a secure packet processor
-
D. Chasaki and T. Wolf, "Design of a secure packet processor," in Proc. of ACM/IEEE Symposium on Architectures for Networking and Communication Systems (ANCS), San Diego, CA, Oct. 2010.
-
Proc. of ACM/IEEE Symposium on Architectures for Networking and Communication Systems (ANCS), San Diego, CA, Oct. 2010
-
-
Chasaki, D.1
Wolf, T.2
-
22
-
-
79960586672
-
Minimum disclosure routing for network virtualization
-
M. Fukushima, T. Hasegawa, T. Hasegawa, and A. Nakao, "Minimum disclosure routing for network virtualization," in Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on, april 2011, pp. 858-863.
-
Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference On, April 2011
, pp. 858-863
-
-
Fukushima, M.1
Hasegawa, T.2
Hasegawa, T.3
Nakao, A.4
-
23
-
-
65249152909
-
Virtual routers on the move: Live router migration as a network-management primitive
-
August Online. Available
-
Y. Wang, E. Keller, B. Biskeborn, J. van der Merwe, and J. Rexford, "Virtual routers on the move: live router migration as a network-management primitive," SIGCOMM Comput. Commun. Rev., vol. 38, pp. 231-242, August 2008. [Online]. Available: http://doi.acm.org/10.1145/1402946.1402985
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, pp. 231-242
-
-
Wang, Y.1
Keller, E.2
Biskeborn, B.3
Van Der Merwe, J.4
Rexford, J.5
-
24
-
-
85059766484
-
Live migration of virtual machines
-
ser NSDI'05. Berkeley, CA, USA: USENIX Association, Online. Available
-
C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield, "Live migration of virtual machines," in Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2, ser NSDI'05. Berkeley, CA, USA: USENIX Association, 2005, pp. 273-286. [Online]. Available: http://portal.acm.org/citation.cfm?id= 1251203.1251223
-
(2005)
Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation
, vol.2
, pp. 273-286
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.G.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
25
-
-
70849107663
-
Exploiting Live Virtual Machine Migration
-
Washington DC, February
-
J. Oberheide, E. Cooke, and F. Jahanian, "Exploiting Live Virtual Machine Migration," in BlackHat DC Briefings, Washington DC, February 2008.
-
(2008)
BlackHat DC Briefings
-
-
Oberheide, J.1
Cooke, E.2
Jahanian, F.3
-
30
-
-
78249239698
-
Attacks on message stream encryption
-
H. R. Nielson and C. W. Probst, Eds., October
-
B. B. Brumley and J. Valkonen, "Attacks on message stream encryption," in Proceedings of the 13th Nordic Workshop on Secure IT Systems - NordSec '08, H. R. Nielson and C. W. Probst, Eds., October 2008, pp. 163-173.
-
(2008)
Proceedings of the 13th Nordic Workshop on Secure IT Systems - NordSec '08
, pp. 163-173
-
-
Brumley, B.B.1
Valkonen, J.2
-
31
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
ser. STOC '09. New York, USA: ACM, Online. Available
-
C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proceedings of the 41st annual ACM symposium on Theory of computing, ser. STOC '09. New York, USA: ACM, 2009, pp. 169-178. [Online]. Available: http://doi.acm.org/10.1145/1536414.1536440
-
(2009)
Proceedings of the 41st Annual ACM Symposium on Theory of Computing
, pp. 169-178
-
-
Gentry, C.1
-
32
-
-
78249261537
-
Incorporating trust in network virtualization
-
ser. CIT '10. Washington, DC, USA. IEEE Computer Society, Online. Available
-
L. Mekouar, Y. Iraqi, and R. Boutaba, "Incorporating trust in network virtualization," in Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology, ser. CIT '10. Washington, DC, USA. IEEE Computer Society, 2010, pp. 942-947. [Online]. Available: http://dx.doi.org/10.1109/CIT.2010.174
-
(2010)
Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology
, pp. 942-947
-
-
Mekouar, L.1
Iraqi, Y.2
Boutaba, R.3
-
33
-
-
76749138554
-
Detecting network neutrality violations with causal inference
-
ser. CoNEXT '09. New York, NY, USA: ACM, Online. Available
-
M. B. Tariq, M. Motiwala, N. Feamster, and M. Ammar, "Detecting network neutrality violations with causal inference," in Proceedings of the 5th international conference on Emerging networking experiments and technologies, ser. CoNEXT '09. New York, NY, USA: ACM, 2009, pp. 289-300. [Online]. Available: http://doi.acm.org/10.1145/1658939.1658972
-
(2009)
Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies
, pp. 289-300
-
-
Tariq, M.B.1
Motiwala, M.2
Feamster, N.3
Ammar, M.4
-
34
-
-
33748117052
-
Detecting and isolating malicious routers
-
Jul-Sep
-
A. T. Mizrak, Y.-C. Cheng, K. Marzullo, and S. Savage, "Detecting and isolating malicious routers," IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 3, pp. 230-244, Jul-Sep 2006.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.3
, pp. 230-244
-
-
Mizrak, A.T.1
Cheng, Y.-C.2
Marzullo, K.3
Savage, S.4
-
35
-
-
0033702951
-
Using conservation of flow as a security mechanism in network protocols
-
J. Hughes, T. Aura, and M. Bishop, "Using conservation of flow as a security mechanism in network protocols," in Security and Privacy, 2000. S P 2000. Proceedings. 2000 IEEE Symposium on, 2000, pp. 132-141.
-
Security and Privacy, 2000. S P 2000. Proceedings. 2000 IEEE Symposium On, 2000
, pp. 132-141
-
-
Hughes, J.1
Aura, T.2
Bishop, M.3
-
36
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
Apr
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "OpenFlow: enabling innovation in campus networks," SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69-74, Apr 2008.
-
(2008)
SIGCOMM Computer Communication Review
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
37
-
-
84983293248
-
Building a fast, virtualized data plane with programmable hardware
-
M. B. Anwer and N. Feamster, "Building a fast, virtualized data plane with programmable hardware," in Proc. of the First ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures (VISA,), Barcelona, Spain, Aug. 2009, pp. 1-8.
-
Proc. of the First ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures (VISA,), Barcelona, Spain, Aug. 2009
, pp. 1-8
-
-
Anwer, M.B.1
Feamster, N.2
|