Sciweavers

SIGCOMM
2010
ACM
13 years 9 months ago
DONAR: decentralized server selection for cloud services
Geo-replicated services need an effective way to direct client requests to a particular location, based on performance, load, and cost. This paper presents DONAR, a distributed sy...
Patrick Wendell, Joe Wenjie Jiang, Michael J. Free...
SIGCOMM
2010
ACM
13 years 9 months ago
Experimenting with multipath TCP
It is becoming the norm for small mobile devices to have access to multiple technologies for connecting to the Internet. This gives researchers an increasing interest for solution...
Sébastien Barré, Olivier Bonaventure...
SIGCOMM
2010
ACM
13 years 9 months ago
SoftCast: one-size-fits-all wireless video
The focus of this demonstration is the performance of streaming video over the mobile wireless channel. We compare two schemes: the standard approach to video which transmits H.26...
Szymon Jakubczak, Dina Katabi
SIGCOMM
2010
ACM
13 years 9 months ago
Internet inter-domain traffic
In this paper, we examine changes in Internet inter-domain traffic demands and interconnection policies. We analyze more than 200 Exabytes of commercial Internet traffic over a tw...
Craig Labovitz, Scott Iekel-Johnson, Danny McPhers...
SIGCOMM
2010
ACM
13 years 9 months ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...
SIGCOMM
2010
ACM
13 years 9 months ago
R3: resilient routing reconfiguration
Network resiliency is crucial to IP network operations. Existing techniques to recover from one or a series of failures do not offer performance predictability and may cause serio...
Ye Wang, Hao Wang, Ajay Mahimkar, Richard Alimi, Y...
SIGCOMM
2010
ACM
13 years 9 months ago
Unbiased sampling in directed social graph
Microblogging services, such as Twitter, are among the most important online social networks(OSNs). Different from OSNs such as Facebook, the topology of microblogging service is ...
Tianyi Wang, Yang Chen, Zengbin Zhang, Peng Sun, B...
SIGCOMM
2010
ACM
13 years 9 months ago
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes
IP traceback can be used to find the origin of anonymous traffic; however, Internet-scale IP traceback systems have not been deployed due to a need for cooperation between Interne...
Guang Yao, Jun Bi, Zijian Zhou
SIGCOMM
2010
ACM
13 years 9 months ago
Fair bandwidth allocation in wireless network using max-flow
This paper proposes a fair association scheme between clients and APs in WiFi network, exploiting the hybrid nature of the recent WLAN architecture. We show that such an associati...
Sourav Kumar Dandapat, Bivas Mitra, Niloy Ganguly,...
SIGCOMM
2010
ACM
13 years 9 months ago
Residual white space distribution-based opportunistic channel access for cognitive radio enabled devices
We describe an opportunistic channel access scheme for cognitive radio-enabled secondary nodes (SNs). The proposed scheme uses the residual channel idle time distribution to estim...
Manuj Sharma, Anirudha Sahoo