Sciweavers

CCR
2010
120views more  CCR 2010»
13 years 11 months ago
Pitfalls for testbed evaluations of internet systems
Today's open platforms for network measurement and distributed system research, which we collectively refer to as testbeds in this article, provide opportunities for controll...
David R. Choffnes, Fabian E. Bustamante
CCR
2010
139views more  CCR 2010»
13 years 11 months ago
Longitudinal study of BGP monitor session failures
BGP routing data collected by RouteViews and RIPE RIS have become an essential asset to both the network research and operation communities. However, it has long been speculated t...
Pei-chun Cheng, Xin Zhao, Beichuan Zhang, Lixia Zh...
CCR
2010
156views more  CCR 2010»
13 years 11 months ago
Workshop on internet economics (WIE2009) report
On September 23, 2009, CAIDA hosted a virtual Workshop on Internet Economics [3] to bring together network technology and policy researchers, commercial Internet facilities and se...
kc claffy
CCR
2010
81views more  CCR 2010»
13 years 11 months ago
Perspectives on tracing end-hosts: a survey summary
There is an amazing paucity of data that is collected directly on users' personal computers. One key reason for this is the perception among researchers that users are unwill...
Diana Joumblatt, Renata Teixeira, Jaideep Chandras...
CCR
2010
171views more  CCR 2010»
13 years 11 months ago
Fighting online click-fraud using bluff ads
Online advertising is currently the richest source of revenue for many Internet giants. The increased number of online businesses, specialized websites and modern profiling techni...
Hamed Haddadi
CCR
2010
88views more  CCR 2010»
13 years 11 months ago
Dynamic route recomputation considered harmful
Matthew Caesar, Martin Casado, Teemu Koponen, Jenn...
CCR
2010
130views more  CCR 2010»
13 years 11 months ago
Arguments for an information-centric internetworking architecture
The current Internet architecture focuses on communicating entities, largely leaving aside the information to be ex-changed among them. However, trends in communication scenarios ...
Dirk Trossen, Mikko Särelä, Karen R. Sol...
CCR
2010
133views more  CCR 2010»
13 years 11 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
CCR
2010
102views more  CCR 2010»
13 years 11 months ago
Internet-scale IP alias resolution techniques
The well-known traceroute probing method discovers links between interfaces on Internet routers. IP alias resolution, the process of identifying IP addresses belonging to the same...
Ken Keys
CCR
2010
131views more  CCR 2010»
13 years 11 months ago
DECOR: DEClarative network management and OpeRation
Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. In this paper, we first examine the fundament...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...