-
4
-
-
85175133095
-
-
This project has benefited from the use of measurement data collected on the internet2 network as part of the internet2 observatory project
-
This project has benefited from the use of measurement data collected on the internet2 network as part of the internet2 observatory project. http://netflow.internet2.edu/.
-
-
-
-
6
-
-
0029719644
-
The space complexity of approximating the frequency moments
-
N. Alon, Y. Matias, and M. Szegedy. The space complexity of approximating the frequency moments. STOC, 1996.
-
(1996)
STOC
-
-
Alon, N.1
Matias, Y.2
Szegedy, M.3
-
8
-
-
84878376185
-
Loss and delay accountability for the Internet
-
K. Argyraki, P. Maniatis, O. Irzak, S. Ashish, and S. Shenker. Loss and delay accountability for the Internet. In IEEE ICNP, 2007.
-
(2007)
IEEE ICNP
-
-
Argyraki, K.1
Maniatis, P.2
Irzak, O.3
Ashish, S.4
Shenker, S.5
-
12
-
-
39149117709
-
ODSBR: An on-demand secure byzantine resilient routing protocol for wireless ad hoc networks
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens. ODSBR: An on-demand secure byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans Inform. Syst. Secur, 2008.
-
(2008)
ACM Trans Inform. Syst. Secur
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
14
-
-
84869465632
-
Protocols and lower bounds for failure localization in the Internet
-
B. Barak, S. Goldberg, and D. Xiao. Protocols and lower bounds for failure localization in the Internet. In EUROCRYPT, 2008.
-
(2008)
EUROCRYPT
-
-
Barak, B.1
Goldberg, S.2
Xiao, D.3
-
15
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
16
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
K. A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R. A. Olsson. Detecting disruptive routers: A distributed network monitoring approach. In IEEE Symposium on Security and Privacy, May 1998.
-
IEEE Symposium on Security and Privacy, May 1998
-
-
Bradley, K.A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R.A.5
-
18
-
-
84878363926
-
Measuring and characterizing end-to-end route dynamics in the presence of load balancing
-
I. Cunha, R. Teixeira, and C. Diot. Measuring and characterizing end-to-end route dynamics in the presence of load balancing. In PAM, 2011.
-
(2011)
PAM
-
-
Cunha, I.1
Teixeira, R.2
Diot, C.3
-
19
-
-
57349083089
-
Path-quality monitoring in the presence of adversaries
-
S. Goldberg, D. Xiao, E. Tromer, B. Barak, and J. Rexford. Path-quality monitoring in the presence of adversaries. In Proceedings of SIGMETRICS, 2008.
-
Proceedings of SIGMETRICS, 2008
-
-
Goldberg, S.1
Xiao, D.2
Tromer, E.3
Barak, B.4
Rexford, J.5
-
20
-
-
72249122104
-
VL2: A scalable and flexible data center network
-
A. Greenberg, N. Jain, S. Kandula, C. Kim, P. Lahiri, D. Maltz, P. Patel, and S. Sengupta. VL2: A scalable and flexible data center network. In ACM SIGCOMM, 2009.
-
(2009)
ACM SIGCOMM
-
-
Greenberg, A.1
Jain, N.2
Kandula, S.3
Kim, C.4
Lahiri, P.5
Maltz, D.6
Patel, P.7
Sengupta, S.8
-
23
-
-
4544372422
-
IEEE 1588 standard for a precision clock synchronization protocol for networked measurement and control systems
-
J.Eidson and K. Lee. IEEE 1588 standard for a precision clock synchronization protocol for networked measurement and control systems. In Sensors for Industry Conference, 2nd ISA/IEEE., 2002.
-
Sensors for Industry Conference, 2nd ISA/IEEE., 2002
-
-
Eidson, J.1
Lee, K.2
-
28
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In ACM Mobicom, 2000.
-
(2000)
ACM Mobicom
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
33
-
-
1842435123
-
Tabulation based 4-universal hashing with applications to second moment estimation
-
M. Thorup and Y. Zhang. Tabulation based 4-universal hashing with applications to second moment estimation. SODA, 2004.
-
(2004)
SODA
-
-
Thorup, M.1
Zhang, Y.2
-
34
-
-
70350757800
-
Packet-dropping adversary identification for data plane security
-
X. Zhang, A. Jain, and A. Perrig. Packet-dropping adversary identification for data plane security. In ACM CoNext, 2008.
-
(2008)
ACM CoNext
-
-
Zhang, X.1
Jain, A.2
Perrig, A.3
-
35
-
-
84055200941
-
Network fault localization with small TCB
-
X. Zhang, Z. Zhou, G. Hasker, A. Perrig, and V. Gligor. Network fault localization with small TCB. In Proceedings of the IEEE International Conference on Network Protocols (ICNP), 2011.
-
Proceedings of the IEEE International Conference on Network Protocols (ICNP), 2011
-
-
Zhang, X.1
Zhou, Z.2
Hasker, G.3
Perrig, A.4
Gligor, V.5
-
36
-
-
85180801198
-
Shortmac: Efficient data plane fault localization
-
X. Zhang, Z. Zhou, H.-C. Hsiao, A. Perrig, and P. Tague. Shortmac: Efficient data plane fault localization. In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012.
-
Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012
-
-
Zhang, X.1
Zhou, Z.2
Hsiao, H.-C.3
Perrig, A.4
Tague, P.5
-
37
-
-
33751441324
-
Designing a predictable internet backbone with valiant load-balancing
-
R. Zhang-shen and N. Mckeown. Designing a predictable internet backbone with valiant load-balancing. In in IWQoS, 2005.
-
(2005)
IWQoS
-
-
Zhang-shen, R.1
Mckeown, N.2
|