-
1
-
-
84866504298
-
-
June
-
Crossbeam network consolidation. http://www.crossbeam.com/why-crossbeam/ consolidation/, June 2012.
-
(2012)
Crossbeam Network Consolidation
-
-
-
2
-
-
84866480621
-
-
June
-
F5 Networks products. http://www.f5.com/products/big-ip/, June 2012.
-
(2012)
F5 Networks Products
-
-
-
3
-
-
84866514822
-
-
June
-
Intel perf. counter mon. http://software.intel.com/en-us/articles/intel- performance-counter-monitor/, June 2012.
-
(2012)
Intel Perf. Counter Mon
-
-
-
4
-
-
84866514817
-
-
Feb.
-
M57 network traffic traces. https://domex.nps.edu/corp/scenarios/2009- m57/net/, Feb. 2012.
-
(2012)
M57 Network Traffic Traces
-
-
-
5
-
-
84866524215
-
-
June
-
Palo alto networks. http://www.paloaltonetworks.com/, June 2012.
-
(2012)
Palo Alto Networks
-
-
-
7
-
-
0038972375
-
The Price of Safety in An Active Network
-
March
-
D. S. Alexander, P. B. Menage, A. D. Keromytis, W. A. Arbaugh, K. G. Anagnostakis, and J. M. Smith. The Price of Safety in An Active Network. JCN, 3(1):4-18, March 2001.
-
(2001)
JCN
, vol.3
, Issue.1
, pp. 4-18
-
-
Alexander, D.S.1
Menage, P.B.2
Keromytis, A.D.3
Arbaugh, W.A.4
Anagnostakis, K.G.5
Smith, J.M.6
-
8
-
-
65249151272
-
-
Technical Report IRB-TR-08-44, Intel Research Berkeley, May
-
K. Argyraki, K. Fall, G. Iannaccone, A. Knies, M. Manesh, and S. Ratnasamy. Understanding the packet forwarding capability of general-purpose processors. Technical Report IRB-TR-08-44, Intel Research Berkeley, May 2008.
-
(2008)
Understanding the Packet Forwarding Capability of General-purpose Processors
-
-
Argyraki, K.1
Fall, K.2
Iannaccone, G.3
Knies, A.4
Manesh, M.5
Ratnasamy, S.6
-
9
-
-
0029754778
-
WF2Q: Worst-case fair weighted fair queueing
-
J. Bennett and H. Zhang. WF2Q: Worst-case fair weighted fair queueing. In INFOCOM, 1996.
-
(1996)
INFOCOM
-
-
Bennett, J.1
Zhang, H.2
-
10
-
-
0024889726
-
Analysis and simulation of a fair queueing algorithm
-
A. Demers, S. Keshav, and S. Shenker. Analysis and simulation of a fair queueing algorithm. In SIGCOMM, pages 1-12, 1989.
-
(1989)
SIGCOMM
, pp. 1-12
-
-
Demers, A.1
Keshav, S.2
Shenker, S.3
-
11
-
-
84856458838
-
No justified complaints: On fair sharing of multiple resources
-
D. Dolev, D. G. Feitelson, J. Y. Halpern, R. Kupferman, and N. Linial. No justified complaints: on fair sharing of multiple resources. In ITCS, pages 68-75, 2012.
-
(2012)
ITCS
, pp. 68-75
-
-
Dolev, D.1
Feitelson, D.G.2
Halpern, J.Y.3
Kupferman, R.4
Linial, N.5
-
12
-
-
14844312929
-
Operational experiences with high-volume network intrusion detection
-
H. Dreger, A. Feldmann, V. Paxson, and R. Sommer. Operational experiences with high-volume network intrusion detection. In ACM Conference on Computer and Communications Security, pages 2-11, 2004.
-
(2004)
ACM Conference on Computer and Communications Security
, pp. 2-11
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
13
-
-
84866512853
-
Predicting the resource consumption of network intrusion detection systems
-
H. Dreger, A. Feldmann, V. Paxson, and R. Sommer. Predicting the resource consumption of network intrusion detection systems. In RAID, 2008.
-
(2008)
RAID
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
14
-
-
73449116055
-
Improved forwarding architecture and resource management for multi-core software routers
-
N. Egi, A. Greenhalgh, M. Handley, G. Iannaccone, M. Manesh, L. Mathy, and S. Ratnasamy. Improved forwarding architecture and resource management for multi-core software routers. In NPC, pages 117-124, 2009.
-
(2009)
NPC
, pp. 117-124
-
-
Egi, N.1
Greenhalgh, A.2
Handley, M.3
Iannaccone, G.4
Manesh, M.5
Mathy, L.6
Ratnasamy, S.7
-
15
-
-
84866480622
-
-
Technical Report UCB/EECS-2012-166, EECS Department, University of California, Berkeley, June
-
A. Ghodsi, V. Sekar, M. Zaharia, and I. Stoica. Multi-resource fair queueing for packet processing. Technical Report UCB/EECS-2012-166, EECS Department, University of California, Berkeley, June 2012.
-
(2012)
Multi-resource Fair Queueing for Packet Processing
-
-
Ghodsi, A.1
Sekar, V.2
Zaharia, M.3
Stoica, I.4
-
16
-
-
85043238089
-
Dominant resource fairness: Fair allocation of multiple resource types
-
A. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski, I. Stoica, and S. Shenker. Dominant resource fairness: Fair allocation of multiple resource types. In NSDI, 2011.
-
(2011)
NSDI
-
-
Ghodsi, A.1
Zaharia, M.2
Hindman, B.3
Konwinski, A.4
Stoica, I.5
Shenker, S.6
-
17
-
-
0028599989
-
A self-clocked fair queueing scheme for broadband applications
-
S. J. Golestani. A self-clocked fair queueing scheme for broadband applications. In INFOCOM, pages 636-646, 1994.
-
(1994)
INFOCOM
, pp. 636-646
-
-
Golestani, S.J.1
-
18
-
-
0031250147
-
Start-time fair queuing: A scheduling algorithm for integrated services packet switching networks
-
Oct.
-
P. Goyal, H. Vin, and H. Cheng. Start-time fair queuing: A scheduling algorithm for integrated services packet switching networks. ACM Transactions on Networking, 5(5):690-704, Oct. 1997.
-
(1997)
ACM Transactions on Networking
, vol.5
, Issue.5
, pp. 690-704
-
-
Goyal, P.1
Vin, H.2
Cheng, H.3
-
19
-
-
84899434047
-
Fair Allocation Without Trade
-
June
-
A. Gutman and N. Nisan. Fair Allocation Without Trade. In AAMAS, June 2012.
-
(2012)
AAMAS
-
-
Gutman, A.1
Nisan, N.2
-
20
-
-
82955186911
-
Is it still possible to extend TCP?
-
M. Honda, Y. Nishida, C. Raiciu, A. Greenhalgh, M. Handley, and H. Tokuda. Is it still possible to extend TCP? In Proc. IMC, 2011.
-
Proc. IMC, 2011
-
-
Honda, M.1
Nishida, Y.2
Raiciu, C.3
Greenhalgh, A.4
Handley, M.5
Tokuda, H.6
-
21
-
-
84861627307
-
Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying framework
-
C. Joe-Wong, S. Sen, T. Lan, and M. Chiang. Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying framework. In INFOCOM, 2012.
-
(2012)
INFOCOM
-
-
Joe-Wong, C.1
Sen, S.2
Lan, T.3
Chiang, M.4
-
22
-
-
0040291388
-
The Click modular router
-
August
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click modular router. ACM Trans. Comput. Syst., 18, August 2000.
-
(2000)
ACM Trans. Comput. Syst.
, vol.18
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M.F.5
-
23
-
-
78149322636
-
Encrypting the Internet
-
M. Kounavis, X. Kang, K. Grewal, M. Eszenyi, S. Gueron, and D. Durham. Encrypting the Internet. In Proc. SIGCOMM, 2010.
-
Proc. SIGCOMM, 2010
-
-
Kounavis, M.1
Kang, X.2
Grewal, K.3
Eszenyi, M.4
Gueron, S.5
Durham, D.6
-
24
-
-
0027612043
-
A generalized processor sharing approach to flow control - The single node case
-
June
-
A. Parekh and R. Gallager. A generalized processor sharing approach to flow control - the single node case. ACM Transactions on Networking, 1(3):344-357, June 1993.
-
(1993)
ACM Transactions on Networking
, vol.1
, Issue.3
, pp. 344-357
-
-
Parekh, A.1
Gallager, R.2
-
25
-
-
84863521002
-
Beyond Dominant Resource Fairness: Extensions, Limitations, and Indivisibilities
-
D. C. Parkes, A. D. Procaccia, and N. Shah. Beyond Dominant Resource Fairness: Extensions, Limitations, and Indivisibilities. In ACM Conference on Electronic Commerce, 2012.
-
ACM Conference on Electronic Commerce, 2012
-
-
Parkes, D.C.1
Procaccia, A.D.2
Shah, N.3
-
26
-
-
84860665629
-
Do incentives build robustness in bittorrent
-
M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, and A. Venkataramani. Do incentives build robustness in bittorrent. In NSDI'07, 2007.
-
(2007)
NSDI'07
-
-
Piatek, M.1
Isdal, T.2
Anderson, T.3
Krishnamurthy, A.4
Venkataramani, A.5
-
27
-
-
84996432988
-
Design and implementation of a consolidated middlebox architecture
-
V. Sekar, N. Egi, S. Ratnasamy, M. Reiter, and G. Shi. Design and implementation of a consolidated middlebox architecture. In NSDI, 2012.
-
(2012)
NSDI
-
-
Sekar, V.1
Egi, N.2
Ratnasamy, S.3
Reiter, M.4
Shi, G.5
-
28
-
-
84888450226
-
The Middlebox Manifesto: Enabling Innovation in Middlebox Deployments
-
Oct.
-
V. Sekar, S. Ratnasamy, M. Reiter, N. Egi, and G. Shi. The Middlebox Manifesto: Enabling Innovation in Middlebox Deployments. In HotNets 2011, Oct. 2011.
-
(2011)
HotNets 2011
-
-
Sekar, V.1
Ratnasamy, S.2
Reiter, M.3
Egi, N.4
Shi, G.5
-
29
-
-
0030171894
-
Efficient fair queuing using deficit round robin
-
M. Shreedhar and G. Varghese. Efficient fair queuing using deficit round robin. ACM Transactions on Networking, 4(3):375-385, 1996.
-
(1996)
ACM Transactions on Networking
, vol.4
, Issue.3
, pp. 375-385
-
-
Shreedhar, M.1
Varghese, G.2
-
30
-
-
84894596431
-
Signature Matching in Network Processing Using SIMD/GPU Architectures
-
R. Smith, N. Goyal, J. Ormont, K. Sankaralingam, and C. Estan. Signature Matching in Network Processing Using SIMD/GPU Architectures. In Int. Symp. on Performance Analysis of Systems and Software, 2009.
-
Int. Symp. on Performance Analysis of Systems and Software, 2009
-
-
Smith, R.1
Goyal, N.2
Ormont, J.3
Sankaralingam, K.4
Estan, C.5
-
32
-
-
80053141283
-
An Untold Story of Middleboxes in Cellular Networks
-
Z. Wang, Z. Qian, Q. Xu, Z. M. Mao, and M. Zhang. An Untold Story of Middleboxes in Cellular Networks. In SIGCOMM, 2011.
-
(2011)
SIGCOMM
-
-
Wang, Z.1
Qian, Z.2
Xu, Q.3
Mao, Z.M.4
Zhang, M.5
-
33
-
-
85030153179
-
Virtual clock: A new traffic control algorithm for packet switching networks
-
August
-
L. Zhang. Virtual clock: a new traffic control algorithm for packet switching networks. SIGCOMM CCR, 20:19-29, August 1990.
-
(1990)
SIGCOMM CCR
, vol.20
, pp. 19-29
-
-
Zhang, L.1
|