Sciweavers

104 search results - page 6 / 21
» sigcomm 2010
Sort
View
SIGCOMM
2010
ACM
13 years 10 months ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
SIGCOMM
2010
ACM
13 years 10 months ago
Experimenting with multipath TCP
It is becoming the norm for small mobile devices to have access to multiple technologies for connecting to the Internet. This gives researchers an increasing interest for solution...
Sébastien Barré, Olivier Bonaventure...
SIGCOMM
2010
ACM
13 years 10 months ago
Automating root-cause analysis of network anomalies using frequent itemset mining
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mi...
Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos,...
SIGCOMM
2010
ACM
13 years 10 months ago
A framework for low-power IPv6 routing simulation, experimentation, and evaluation
Low-power networked devices, such as sensors and actuators, are becoming a vital part of our everyday infrastructure. Being networked, the continued development of these systems n...
Nicolas Tsiftes, Joakim Eriksson, Niclas Finne, Fr...
SIGCOMM
2010
ACM
13 years 10 months ago
No more middlebox: integrate processing into network
Traditionally, in-network services like firewall, proxy, cache, and transcoders have been provided by dedicated hardware middleboxes. A recent trend has been to remove the middleb...
Jeongkeun Lee, Jean Tourrilhes, Puneet Sharma, Suj...