-
2
-
-
85080603624
-
-
Jenkins Hash. http://burtleburtle.net/bob/c/lookup3.c.
-
-
-
Hash, J.1
-
3
-
-
85080611260
-
-
Acquired by Juniper in
-
Peribit Networks (Acquired by Juniper in 2005): WAN Optimization Solution. http://www.juniper.net/.
-
(2005)
WAN Optimization Solution
-
-
-
4
-
-
84883126457
-
-
Power Monitor, Monsoon Solutions. http://www.msoon.com/powermonitor/powermonitor.html.
-
Monsoon Solutions
-
-
-
7
-
-
76749121867
-
Packet caches on routers: The implications of universal redundant traffic elimination
-
Seattle, WA, Aug
-
A. Anand, A. Gupta, A. Akella, S. Seshan, and S. Shenker. Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination. In ACM SIGCOMM, Seattle, WA, Aug. 2008.
-
(2008)
ACM SIGCOMM
-
-
Anand, A.1
Gupta, A.2
Akella, A.3
Seshan, S.4
Shenker, S.5
-
8
-
-
70449638442
-
Redundant in network traffic: Findings and implications
-
Seattle, WA, June
-
A. Anand, C. Muthukrishnan, A. Akella, and R. Ramjee. Redundant in Network Traffic: Findings and Implications. In ACM SIGMETRICS, Seattle, WA, June 2009.
-
(2009)
ACM SIGMETRICS
-
-
Anand, A.1
Muthukrishnan, C.2
Akella, A.3
Ramjee, R.4
-
9
-
-
84936092287
-
Shark: Scaling file servers via cooperative caching
-
S. Annapureddy, M. J. Freedman, and D. Mazires. Shark: Scaling file servers via cooperative caching. In NSDI, 2005.
-
(2005)
NSDI
-
-
Annapureddy, S.1
Freedman, M.J.2
Mazires, D.3
-
10
-
-
31844442325
-
An analysis of TCP reset behavior on the internet
-
M. Arlitt and C. Williamson. An analysis of tcp reset behavior on the internet. ACM CCR, 35(1), 2005.
-
(2005)
ACM CCR
, vol.35
, Issue.1
-
-
Arlitt, M.1
Williamson, C.2
-
12
-
-
4544256811
-
Application-specific delta-encoding via resemblance detection
-
F. Douglis and A. Iyengar. Application-specific delta-encoding via resemblance detection. In USENIX, 2003.
-
(2003)
USENIX
-
-
Douglis, F.1
Iyengar, A.2
-
13
-
-
33748973379
-
Feasibility study of mesh networks for all-wireless offices
-
J. Eriksson, S. Agarwal, P. Bahl, and J. Padhye. Feasibility study of mesh networks for all-wireless offices. In MobiSys, 2006.
-
(2006)
MobiSys
-
-
Eriksson, J.1
Agarwal, S.2
Bahl, P.3
Padhye, J.4
-
14
-
-
0030609306
-
Potential benefits of delta encoding and data compression for http
-
J. C. Mogul, F. Douglis, A. Feldmann, and B. Krishnamurthy. Potential benefits of delta encoding and data compression for http. In SIGCOMM, pages 181-194, 1997.
-
(1997)
SIGCOMM
, pp. 181-194
-
-
Mogul, J.C.1
Douglis, F.2
Feldmann, A.3
Krishnamurthy, B.4
-
16
-
-
84878700321
-
A first look at modern enterprise traffic
-
R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. Tierney. A first look at modern enterprise traffic. In IMC, 2005.
-
(2005)
IMC
-
-
Pang, R.1
Allman, M.2
Bennett, M.3
Lee, J.4
Paxson, V.5
Tierney, B.6
-
17
-
-
79955492701
-
Exploiting similarity for multi-source downloads using file handprints
-
H. Pucha, D. G. Andersen, and M. Kaminsky. Exploiting similarity for multi-source downloads using file handprints. In NSDI, 2007.
-
(2007)
NSDI
-
-
Pucha, H.1
Andersen, D.G.2
Kaminsky, M.3
-
18
-
-
0003676885
-
-
Technical report, Harvard University, Technical Report, TR-15-81
-
M. Rabin. Fingerprinting by random polynomials. Technical report, Harvard University, 1981. Technical Report, TR-15-81.
-
(1981)
Fingerprinting by Random Polynomials
-
-
Rabin, M.1
-
20
-
-
0033651715
-
A protocol-independent technique for eliminating redundant network traffic
-
N. T. Spring and D. Wetherall. A protocol-independent technique for eliminating redundant network traffic. In SIGCOMM, pages 87-95, 2000.
-
(2000)
SIGCOMM
, pp. 87-95
-
-
Spring, N.T.1
Wetherall, D.2
|