Sciweavers

104 search results - page 9 / 21
» sigcomm 2010
Sort
View
SIGCOMM
2010
ACM
13 years 11 months ago
Autonomous traffic engineering with self-configuring topologies
Network operators use traffic engineering (TE) to control the flow of traffic across their networks. Existing TE methods require manual configuration of link weights or tunnels, w...
Srikanth Sundaresan, Cristian Lumezanu, Nick Feams...
SIGCOMM
2010
ACM
13 years 11 months ago
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes
IP traceback can be used to find the origin of anonymous traffic; however, Internet-scale IP traceback systems have not been deployed due to a need for cooperation between Interne...
Guang Yao, Jun Bi, Zijian Zhou
SIGCOMM
2010
ACM
13 years 11 months ago
Twittering by cuckoo: decentralized and socio-aware online microblogging services
Online microblogging services, as exemplified by Twitter, have become immensely popular during the latest years. However, current microblogging systems severely suffer from perfor...
Tianyin Xu, Yang Chen, Xiaoming Fu, Pan Hui
SIGCOMM
2010
ACM
13 years 11 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker
SIGCOMM
2010
ACM
13 years 11 months ago
Shipping to streaming: is this shift green?
Streaming movies over the Internet has become increasingly popular in recent years as an alternative to mailing DVDs to a customer. In this paper we investigate the environmental-...
Anand Seetharam, Manikandan Somasundaram, Donald F...