Sciweavers

CCR
2008
86views more  CCR 2008»
13 years 7 months ago
The need for simulation in evaluating anomaly detectors
Anomalous events that affect the performance of networks are a fact of life. It is therefore not surprising that recent years have seen an explosion in research on network anomaly...
Haakon Ringberg, Matthew Roughan, Jennifer Rexford
CCR
2008
94views more  CCR 2008»
13 years 7 months ago
ECHOS: edge capacity hosting overlays of nano data centers
In this paper we propose a radical solution to data hosting and delivery for the Internet of the future. The current data delivery architecture is "network centric", wit...
Nikolaos Laoutaris, Pablo Rodriguez, Laurent Masso...
CCR
2008
66views more  CCR 2008»
13 years 7 months ago
New directions in mobile communications, or how to learn to stop hating the cellular telephone industry
In this article, we discuss the lessons in innovation from the last twenty years of the Internet that might be applied in the cellular telephone industry. Categories and Subject D...
Jon Crowcroft
CCR
2008
88views more  CCR 2008»
13 years 7 months ago
My ten favorite "practical theory" papers
As the saying goes, "In theory there is no difference between theory and practice. But, in practice, there is." Networking research has a wealth of good papers on both s...
Jennifer Rexford
CCR
2008
91views more  CCR 2008»
13 years 7 months ago
Serial experiments online
Current network protocols must comply with rigid interfaces and rules of behavior to fit into well defined, vertical protocol stacks. It is difficult for network designers to offe...
Juan J. Ramos-Muñoz, Lidia Yamamoto, Christ...
CCR
2008
62views more  CCR 2008»
13 years 7 months ago
You must be joking...: cares about the endangered species
For those of us in academia, tenure is great. Unless you don't have it, in which case it pretty much sucks. In fact, it goes beyond sucking: it kills. Mainly your personal li...
Michalis Faloutsos
CCR
2008
83views more  CCR 2008»
13 years 7 months ago
The CoNEXT shadow TPC
This paper claims that Shadow Technical Program Committee (TPC) should be organized on a regular basis for attractive conferences in the networking domain. It helps ensuring that ...
Olivier Bonaventure, Augustin Chaintreau, Laurent ...
CCR
2008
88views more  CCR 2008»
13 years 7 months ago
Rethinking virtual network embedding: substrate support for path splitting and migration
Network virtualization is a powerful way to run multiple architectures or experiments simultaneously on a shared infrastructure. However, making efficient use of the underlying re...
Minlan Yu, Yung Yi, Jennifer Rexford, Mung Chiang
CCR
2008
170views more  CCR 2008»
13 years 7 months ago
Probe-Aided MulTCP: an aggregate congestion control mechanism
An aggregate congestion control mechanism, namely ProbeAided MulTCP (PA-MulTCP), is proposed in this paper. It is based on MulTCP, a proposal for enabling an aggregate to emulate ...
Fang-Chun Kuo, Xiaoming Fu
CCR
2008
62views more  CCR 2008»
13 years 7 months ago
Ranking of ACM SIGCOMM computer communication review
Mark Crovella, Christophe Diot