Sciweavers

SIGCOMM
2010
ACM
13 years 9 months ago
The little engine(s) that could: scaling online social networks
The difficulty of scaling Online Social Networks (OSNs) has introduced new system design challenges that has often caused costly re-architecting for services like Twitter and Face...
Josep M. Pujol, Vijay Erramilli, Georgos Siganos, ...
SIGCOMM
2010
ACM
13 years 9 months ago
Circumventing censorship with collage
Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are...
Sam Burnett, Nick Feamster, Santosh Vempala
SIGCOMM
2010
ACM
13 years 9 months ago
EffiCuts: optimizing packet classification for memory and throughput
Packet Classification is a key functionality provided by modern routers. Previous decision-tree algorithms, HiCuts and HyperCuts, cut the multi-dimensional rule space to separate ...
Balajee Vamanan, Gwendolyn Voskuilen, T. N. Vijayk...
SIGCOMM
2010
ACM
13 years 9 months ago
Multi-hop packet tracking for experimental facilities
The Internet has become a complex system with increasing numbers of end-systems, applications, protocols and types of networks. Although we have a good understanding of how data i...
Tacio Santos, Christian Henke, Carsten Schmoll, Ta...
SIGCOMM
2010
ACM
13 years 9 months ago
ASTUTE: detecting a different class of traffic anomalies
When many flows are multiplexed on a non-saturated link, their volume changes over short timescales tend to cancel each other out, making the average change across flows close to ...
Fernando Silveira, Christophe Diot, Nina Taft, Ram...
SIGCOMM
2010
ACM
13 years 9 months ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
SIGCOMM
2010
ACM
13 years 9 months ago
Stochastic approximation algorithm for optimal throughput performance of wireless LANs
In this paper, we consider the problem of throughput maximization in an infrastructure based WLAN. We demonstrate that most of the proposed protocols though perform optimally for ...
Sundaresan Krishnan, Prasanna Chaporkar
SIGCOMM
2010
ACM
13 years 9 months ago
Mobile data offloading: how much can WiFi deliver?
This is a quantitative study on the performance of 3G mobile data offloading through WiFi networks. We recruited about 100 iPhone users from a metropolitan area and collected stat...
Kyunghan Lee, Injong Rhee, Joohyun Lee, Yung Yi, S...
SIGCOMM
2010
ACM
13 years 9 months ago
Improving peer-to-peer file distribution: winner doesn't have to take all
Recent work on BitTorrent has shown that the choke/unchoke mechanism implements an auction where each peer tries to induce other peers into "unchoking" it by uploading m...
Ben Leong, Youming Wang, Su Wen, Cristina Carbunar...