-
2
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson,H.Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "OpenFlow: Enabling innovation in campus networks," Comput. Commun. Rev., vol. 38, no. 2, pp. 69-74, 2008.
-
(2008)
Comput. Commun. Rev.
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
3
-
-
70350765000
-
CoreLab: An emerging network testbed employing hosted virtual machine monitor
-
Dec.
-
A. Nakao, R. Ozaki, and Y. Nishida, "CoreLab: An emerging network testbed employing hosted virtual machine monitor," in Proc. ACM ROADS, Dec. 2008, pp. 73:1-73:6.
-
(2008)
Proc. ACM ROADS
, pp. 731-736
-
-
Nakao, A.1
Ozaki, R.2
Nishida, Y.3
-
4
-
-
84876357755
-
How to lease the Internet in your spare time
-
Jan.
-
N. Feamster, L. Gao, and J. Rexford, "How to lease the Internet in your spare time," Comput. Commun. Rev., vol. 37, no. 1, pp. 61-64, Jan. 2007.
-
(2007)
Comput. Commun. Rev.
, vol.37
, Issue.1
, pp. 61-64
-
-
Feamster, N.1
Gao, L.2
Rexford, J.3
-
5
-
-
68949188091
-
Network virtualization: State of the art and research challenges
-
Jul.
-
N. Chowdhury and R. Boutaba, "Network virtualization: State of the art and research challenges," IEEE Commun. Mag., vol. 47, no. 7, pp. 20-26, Jul. 2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.7
, pp. 20-26
-
-
Chowdhury, N.1
Boutaba, R.2
-
6
-
-
65249103859
-
Path splicing
-
M. Motiwala, M. Elmore, N. Feamster, and S. Vempala, "Path splicing," Comput. Commun. Rev., vol. 38, no. 4, pp. 27-38, 2008.
-
(2008)
Comput. Commun. Rev.
, vol.38
, Issue.4
, pp. 27-38
-
-
Motiwala, M.1
Elmore, M.2
Feamster, N.3
Vempala, S.4
-
9
-
-
84891629510
-
-
Steel in the Air, Fort Myers, FL, USA [Online]. Available:
-
Steel in the Air, Fort Myers, FL, USA, "AT&T/Cingular cell tower lease renegotiation," [Online]. Available: http://www. steelintheair.com/Cingular-and-ATT-Wireless-Cell-Tower-Lease-Negotiations.html
-
AT&T/Cingular Cell Tower Lease Renegotiation
-
-
-
10
-
-
0442281562
-
Best practice does not equal best strategy
-
P. Nattermann, "Best practice does not equal best strategy," McKinsey Quart., vol. 2, no. 2000, pp. 22-31, 2000.
-
(2000)
McKinsey Quart.
, vol.2
, Issue.2000
, pp. 22-31
-
-
Nattermann, P.1
-
11
-
-
39049096845
-
On the interaction between dynamic routing in the native and overlay layers
-
S. Seetharaman and M. Ammar, "On the interaction between dynamic routing in the native and overlay layers," in Proc. IEEE INFOCOM, 2006, pp. 1-12.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-12
-
-
Seetharaman, S.1
Ammar, M.2
-
12
-
-
84891634420
-
Cisco OSPF command
-
San Jose and CA USA:Cisco Press
-
W. Parkhurst, Cisco OSPF Command and Configuration Handbook. San Jose, CA, USA: Cisco Press, 2002.
-
(2002)
Configuration Handbook
-
-
Parkhurst, W.1
-
13
-
-
0035521411
-
Distance realization problems with applications to internet tomography
-
DOI 10.1006/jcss.2001.1785
-
F. Chung, M. Garrett, R. Graham, and D. Shallcross, "Distance realization problems with applications to Internet tomography," J. Comput. Syst. Sci., vol. 63, no. 3, pp. 432-448, 2001. (Pubitemid 34266035)
-
(2001)
Journal of Computer and System Sciences
, vol.63
, Issue.3
, pp. 432-448
-
-
Chung, F.1
Garrett, M.2
Graham, R.3
Shallcross, D.4
-
14
-
-
79960586672
-
Minimum disclosure routing for network virtualization
-
Apr.
-
M. Fukushima, T. Hasegawa, T. Hasegawa, and A. Nakao, "Minimum disclosure routing for network virtualization," in Proc. IEEE INFOCOM Workshop Global Internet Symp., Apr. 2011, pp. 858-863.
-
(2011)
Proc. IEEE INFOCOM Workshop Global Internet Symp.
, pp. 858-863
-
-
Fukushima, M.1
Hasegawa, T.2
Hasegawa, T.3
Nakao, A.4
-
15
-
-
33645593031
-
Foundations of cryptography
-
Cambridge, U.K.: Cambridge Univ. Press
-
O. Goldreich, Foundations of Cryptography, Volume 2, Basic Applications. Cambridge, U.K.: Cambridge Univ. Press, 2004.
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
16
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," in Proc. ACM STOC, 1988, pp. 1-10.
-
(1988)
Proc. ACM STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
17
-
-
84891632752
-
-
Qwest BusinessMonroe and LA USA [Online] Available
-
Qwest Business,Monroe, LA, USA, "Qwest network maps," [Online]. Available: http://www.qwest-business.com/demos/network-maps. html
-
Qwest Network Maps
-
-
-
18
-
-
48649085344
-
Secure and flexible monitoring of virtual machines
-
B. Payne, M. Carbone, and L.Wenke, "Secure and flexible monitoring of virtual machines," in Proc. ACSAC, 2007, pp. 385-397.
-
(2007)
Proc. ACSAC
, pp. 385-397
-
-
Payne, B.1
Carbone, M.2
Wenke, L.3
-
19
-
-
0023545076
-
How to play any mental game
-
O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game," in Proc. ACM STOC, 1987, pp. 218-229.
-
(1987)
Proc. ACM STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
20
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
22
-
-
1642408605
-
Measuring ISP topologies with Rocketfuel
-
Feb.
-
N.Spring, R.Mahajan, D.Wetherall, and T. Anderson, "Measuring ISP topologies with Rocketfuel," IEEE/ACM Trans. Netw., vol. 12, no. 1, pp. 2-16, Feb. 2004.
-
(2004)
IEEE/ACM Trans. Netw.
, vol.12
, Issue.1
, pp. 2-16
-
-
Spring, N.1
Mahajan, R.2
Wetherall, D.3
Anderson, T.4
-
23
-
-
50449090154
-
-
[Online] Available
-
"Quagga routing suite," [Online]. Available: http://www.quagga.net/
-
Quagga Routing Suite
-
-
-
24
-
-
58049108203
-
Analyzing and modeling router-level Internet topology
-
R. Fukumoto, S. Arakawa, T. Takine, and M. Murata, "Analyzing and modeling router-level Internet topology," Lect.Notes Comput. Sci., vol. 5200, pp. 171-182, 2008.
-
(2008)
Lect.Notes Comput. Sci.
, vol.5200
, pp. 171-182
-
-
Fukumoto, R.1
Arakawa, S.2
Takine, T.3
Murata, M.4
-
25
-
-
33645762992
-
Achieving subsecond IGP convergence in large IP networks
-
P. Francois, C. Filsfils, J. Evans, and O. Bonaventure, "Achieving subsecond IGP convergence in large IP networks," Comput. Commun. Rev., vol. 35, no. 3, pp. 35-44, 2005.
-
(2005)
Comput. Commun. Rev.
, vol.35
, Issue.3
, pp. 35-44
-
-
Francois, P.1
Filsfils, C.2
Evans, J.3
Bonaventure, O.4
-
27
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious RAMs," J. ACM, vol. 43, no. 3, pp. 431-473, 1996. (Pubitemid 126607640)
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
28
-
-
33645361020
-
BGP routing policies in ISP networks
-
DOI 10.1109/MNET.2005.1541715
-
M. Caesar and J. Rexford, "BGP routing policies in ISP networks," IEEE Netw., vol. 19, no. 6, pp. 5-11, Nov.-Dec. 2005. (Pubitemid 46444788)
-
(2005)
IEEE Network
, vol.19
, Issue.6
, pp. 5-11
-
-
Caesar, M.1
Rexford, J.2
-
29
-
-
57049083569
-
Privacy preserving error resilient DNA searching through oblivious automata
-
J. Troncoso-Pastoriza, S. Katzenbeisser, and M. Celik, "Privacy preserving error resilient DNA searching through oblivious automata," in Proc. ACM CCS, 2007, pp. 519-528.
-
(2007)
Proc. ACM CCS
, pp. 519-528
-
-
Troncoso-Pastoriza, J.1
Katzenbeisser, S.2
Celik, M.3
-
30
-
-
33744930363
-
Secure two-party context free language recognition
-
Distributed Computing and Internet Technology - Second International Conference, ICDCIT 2005, Proceedings
-
A. Singh, S. Barman, and K. Shukla, "Secure two-party context free language recognition," Distrib. Comput. Internet Technol., vol. 3816, pp. 117-124, 2005. (Pubitemid 43846678)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3816 LNCS
, pp. 117-124
-
-
Singh, A.1
Barman, S.2
Shukla, K.K.3
-
31
-
-
0036806665
-
Traffic engineering with traditional IP routing protocols
-
DOI 10.1109/MCOM.2002.1039866
-
B. Fortz, J. Rexford, and M. Thorup, "Traffic engineering with traditional IP routing protocols," IEEE Commun. Mag., vol. 40, no. 10, pp. 118-124, Oct. 2002. (Pubitemid 35311955)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 118-124
-
-
Fortz, B.1
Rexford, J.2
Thorup, M.3
-
32
-
-
85014857125
-
Accountability in hosted virtual networks
-
E. Keller, R. Lee, and J. Rexford, "Accountability in hosted virtual networks," in Proc. ACM VISA, 2009, pp. 29-36.
-
(2009)
Proc. ACM VISA
, pp. 29-36
-
-
Keller, E.1
Lee, R.2
Rexford, J.3
-
33
-
-
77953691051
-
Preserving topology confidentiality in interdomain path computation using a path-key-based mechanism
-
Apr.
-
J. Vasseur and A. Farrel, "Preserving topology confidentiality in interdomain path computation using a path-key-based mechanism," RFC 5520, Apr. 2009.
-
(2009)
RFC
, vol.5520
-
-
Vasseur, J.1
Farrel, A.2
-
34
-
-
84891628293
-
-
3GPP TS 23.228 V5.15.0 Jun.
-
"3GPP TS 23.228 V5.15.0," Jun. 2006.
-
(2006)
-
-
-
36
-
-
33646793331
-
Privacy-preserving graph algorithms in the semi-honest model
-
J. Brickell and V. Shmatikov, "Privacy-preserving graph algorithms in the semi-honest model," Lect. Notes Comput. Sci., vol. 3788, p. 236, 2005.
-
(2005)
Lect. Notes Comput. Sci.
, vol.3788
, pp. 236
-
-
Brickell, J.1
Shmatikov, V.2
-
37
-
-
33847272740
-
Verifying global invariants in multiprovider distributed systems
-
S. Machiraju and R. Katz, "Verifying global invariants in multiprovider distributed systems," in Proc. ACM SIGCOMM HotNets, 2004, pp. 149-154.
-
(2004)
Proc. ACM SIGCOMM HotNets
, pp. 149-154
-
-
MacHiraju, S.1
Katz, R.2
|