Sciweavers

SIGCOMM
2010
ACM
13 years 11 months ago
Achieving O(1) IP lookup on GPU-based software routers
IP address lookup is a challenging problem due to the increasing routing table size, and higher line rate. This paper investigates a new way to build an efficient IP lookup scheme...
Jin Zhao, Xinya Zhang, Xin Wang, Xiangyang Xue
SIGCOMM
2010
ACM
13 years 11 months ago
Twittering by cuckoo: decentralized and socio-aware online microblogging services
Online microblogging services, as exemplified by Twitter, have become immensely popular during the latest years. However, current microblogging systems severely suffer from perfor...
Tianyin Xu, Yang Chen, Xiaoming Fu, Pan Hui
SIGCOMM
2010
ACM
13 years 11 months ago
Ripcord: a modular platform for data center networking
In this demo, we present Ripcord, a modular platform for rapidly prototyping scale-out data center networks. Ripcord enables researchers to build and evaluate new network features...
Brandon Heller, David Erickson, Nick McKeown, Rean...
SIGCOMM
2010
ACM
13 years 11 months ago
How secure are secure interdomain routing protocols
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which vari...
Sharon Goldberg, Michael Schapira, Peter Hummon, J...
SIGCOMM
2010
ACM
13 years 11 months ago
Empowering users against sidejacking attacks
SideJacking occurs when an attacker intercepts a session cookie and uses it to impersonate a user and gain unauthorized access to a web-based service. To prevent SideJacking, a se...
Ryan D. Riley, Nada Mohammed Ali, Kholoud Saleh Al...
SIGCOMM
2010
ACM
13 years 11 months ago
Differentially-private network trace analysis
Frank McSherry, Ratul Mahajan
SIGCOMM
2010
ACM
13 years 11 months ago
Autonomous traffic engineering with self-configuring topologies
Network operators use traffic engineering (TE) to control the flow of traffic across their networks. Existing TE methods require manual configuration of link weights or tunnels, w...
Srikanth Sundaresan, Cristian Lumezanu, Nick Feams...
SIGCOMM
2010
ACM
13 years 11 months ago
Caliper: a tool to generate precise and closed-loop traffic
Generating realistic and responsive traffic that reflects different network conditions is a challenging problem associated with performing valid experiments in network testbeds. I...
Monia Ghobadi, Martin Labrecque, Geoffrey Salmon, ...
SIGCOMM
2010
ACM
13 years 11 months ago
SIP overload control: a backpressure-based approach
Overload happens in Session Initiation Protocol (SIP) networks when SIP servers have insufficient resources to handle all messages they receive. Under overload, SIP networks suffe...
Yaogong Wang