NSDI¶
All¶
Cited by | Paper title | Year |
---|---|---|
3127 | Live Migration of Virtual Machines. | 2005 |
2308 | Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. | 2012 |
1182 | Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks (Awarded Best Paper!). | 2004 |
993 | Hedera: Dynamic Flow Scheduling for Data Center Networks. | 2010 |
959 | Black-box and Gray-box Strategies for Virtual Machine Migration. | 2007 |
950 | Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center. | 2011 |
860 | MapReduce Online. | 2010 |
779 | ElasticTree: Saving Energy in Data Center Networks. | 2010 |
743 | Reducing Network Energy Consumption via Sleeping and Rate-Adaptation. | 2008 |
663 | Energy-Aware Server Provisioning and Load Dispatching for Connection-Intensive Internet Services. | 2008 |
636 | Remus: High Availability via Asynchronous Virtual Machine Replication. (Best Paper) | 2008 |
614 | Dominant Resource Fairness: Fair Allocation of Multiple Resource Types. | 2011 |
608 | Democratizing Content Publication with Coral. | 2004 |
589 | Total Recall: System Support for Automated Availability Management. | 2004 |
573 | Operating Systems Support for Planetary-Scale Network Services. | 2004 |
555 | The Emergence of Networking Abstractions and Techniques in TinyOS. | 2004 |
539 | Do Incentives Build Robustness in BitTorrent? (Awarded Best Student Paper). | 2007 |
530 | Design and Implementation of a Routing Control Platform. | 2005 |
511 | Programming Sensor Networks Using Abstract Regions. | 2004 |
500 | VeriFlow: Verifying Network-Wide Invariants in Real Time. | 2013 |
490 | Geographic Routing Made Practical. | 2005 |
453 | Header Space Analysis: Static Checking for Networks. | 2012 |
452 | Designing a DHT for Low Latency and High Throughput. | 2004 |
442 | Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds (Awarded Best Student Paper). | 2005 |
438 | Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets. | 2005 |
420 | Airavat: Security and Privacy for MapReduce. | 2010 |
417 | Design Implementation and Evaluation of Congestion Control for Multipath TCP. | 2011 |
411 | Scaling Memcache at Facebook. | 2013 |
403 | A NICE Way to Test OpenFlow Applications. | 2012 |
402 | Composing Software Defined Networks. | 2013 |
395 | X-Trace: A Pervasive Network Tracing Framework. | 2007 |
380 | Path-Based Failure and Evolution Management. | 2004 |
378 | Sora: High Performance Software Radio Using General Purpose Multi-core Processors. | 2009 |
356 | Detecting BGP Configuration Faults with Static Analysis (Awarded Best Paper). | 2005 |
355 | Pip: Detecting the Unexpected in Distributed Systems. | 2006 |
339 | Sharing the Data Center Network. | 2011 |
333 | WiLDNet: Design and Implementation of High Performance WiFi Based Long Distance Networks. | 2007 |
328 | How Hard Can It Be? Designing and Implementing a Deployable Multipath TCP. | 2012 |
314 | Network Coordinates in the Wild. | 2007 |
312 | ClickOS and the Art of Network Function Virtualization. | 2014 |
310 | Jellyfish: Networking Data Centers Randomly. | 2012 |
308 | OverQoS: An Overlay Based Architecture for Enhancing Internet QoS. | 2004 |
302 | Experience with an Object Reputation System for Peer-to-Peer Filesharing (Awarded Best Paper). | 2006 |
301 | Glacier: Highly Durable Decentralized Storage Despite Massive Correlated Failures. | 2005 |
301 | Efficient Routing for Peer-to-Peer Overlays. | 2004 |
295 | Volley: Automated Data Placement for Geo-Distributed Cloud Services. | 2010 |
293 | Efficient Replica Maintenance for Distributed Storage Systems. | 2006 |
283 | Sybil-Resilient Online Content Voting. | 2009 |
282 | Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. | 2010 |
281 | Design and Implementation of a Consolidated Middlebox Architecture. | 2012 |
276 | Listen and Whisper: Security Mechanisms for BGP (Awarded Best Student Paper!). | 2004 |
275 | ArrayTrack: A Fine-Grained Indoor Location System. | 2013 |
271 | Real Time Network Policy Checking Using Header Space Analysis. | 2013 |
270 | Active Sensor Networks. | 2005 |
258 | Somniloquy: Augmenting Network Interfaces to Reduce PC Energy Usage. | 2009 |
257 | The Design and Implementation of Open vSwitch. | 2015 |
257 | Less Is More: Trading a Little Bandwidth for Ultra-Low Latency in the Data Center. | 2012 |
255 | Colyseus: A Distributed Architecture for Online Multiplayer Games. | 2006 |
249 | Studying Spamming Botnets Using Botlab. | 2009 |
238 | Aiding the Detection of Fake Accounts in Large Scale Social Online Services. | 2012 |
238 | Untangling the Web from DNS. | 2004 |
235 | Software Defined Traffic Measurement with OpenSketch. | 2013 |
228 | Detecting and Defending Against Third-Party Tracking on the Web. | 2012 |
228 | Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays. | 2004 |
224 | Securing Distributed Systems with Information Flow Control. | 2008 |
222 | Hybrid Global-Local Indexing for Efficient Peer-to-Peer Information Retrieval. | 2004 |
219 | Open Versus Closed: A Cautionary Tale. | 2006 |
219 | Performance Modeling and System Management for Multi-component Online Services. | 2005 |
218 | Geographic Routing Without Planarization. | 2006 |
216 | CIEL: A Universal Execution Engine for Distributed Data-Flow Computing. | 2011 |
216 | Bandwidth-efficient Management of DHT Routing Tables. | 2005 |
215 | PACMan: Coordinated Memory Caching for Parallel Jobs. | 2012 |
214 | Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults. | 2009 |
214 | IP Fault Localization Via Risk Modeling. | 2005 |
212 | OSA: An Optical Switching Architecture for Data Center Networks with Unprecedented Flexibility. | 2012 |
210 | 3D Tracking via Body Radio Reflections. | 2014 |
210 | Shark: Scaling File Servers via Cooperative Caching. | 2005 |
208 | Life Death and the Critical Transition: Finding Liveness Bugs in Systems Code (Awarded Best Paper). | 2007 |
205 | Network Virtualization in Multi-tenant Datacenters. | 2014 |
201 | SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies. | 2010 |
194 | The Collective: A Cache-Based System Management Architecture. | 2005 |
193 | Privad: Practical Privacy in Online Advertising. | 2011 |
193 | R-BGP: Staying Connected in a Connected World. | 2007 |
193 | Decentralized Adaptive Resource Allocation for Sensor Networks. | 2005 |
190 | An Operating System for the Home. | 2012 |
189 | Full Duplex MIMO Radios. | 2014 |
189 | FaRM: Fast Remote Memory. | 2014 |
187 | Ostra: Leveraging Trust to Thwart Unwanted Communication. | 2008 |
186 | OASIS: Anycast for Any Service. | 2006 |
185 | One Hop Reputations for Peer to Peer File Sharing Workloads. | 2008 |
183 | Making Routers Last Longer with ViAggre. | 2009 |
181 | Debunking Some Myths About Structured and Unstructured Overlays. | 2005 |
180 | Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts. | 2007 |
179 | Designing Extensible IP Router Software. | 2005 |
178 | MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing. | 2013 |
177 | Exploiting Availability Prediction in Distributed Systems. | 2006 |
176 | Contract-Based Load Management in Federated Distributed Systems. | 2004 |
173 | NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms. | 2014 |
172 | FatVAP: Aggregating AP Backhaul Capacity to Maximize Throughput. | 2008 |
171 | Effective Straggler Mitigation: Attack of the Clones. | 2013 |
170 | MICA: A Holistic Approach to Fast In-Memory Key-Value Storage. | 2014 |
170 | Designing High Performance Enterprise Wi-Fi Networks. | 2008 |
169 | Accurate Low-Energy Trajectory Mapping for Mobile Devices. | 2011 |
169 | Enabling MAC Protocol Implementations on Software-Defined Radios. | 2009 |
169 | BotGraph: Large Scale Spamming Botnet Detection. | 2009 |
169 | RE: Reliable Email. | 2006 |
167 | MODIST: Transparent Model Checking of Unmodified Distributed Systems. | 2009 |
166 | Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags. | 2014 |
164 | MACEDON: Methodology for Automatically Creating Evaluating and Designing Overlay Networks | 2004 |
163 | Sustaining Cooperation in Multi-hop Wireless Networks. | 2005 |
162 | Corona: A High Performance Publish-Subscribe System for the World Wide Web. | 2006 |
161 | Stronger Semantics for Low-Latency Geo-Replicated Storage. | 2013 |
161 | Harnessing Exposed Terminals in Wireless Networks. | 2008 |
160 | Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems. | 2009 |
160 | Tesseract: A 4D Network Control Plane. | 2007 |
159 | EyeQ: Practical Network Performance Isolation at the Edge. | 2013 |
158 | Model Checking Large Network Protocol Implementations. | 2004 |
156 | Walkie-Markie: Indoor Pathway Mapping Made Easy. | 2013 |
154 | Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network. | 2005 |
150 | SSLShader: Cheap SSL Acceleration with Commodity Processors. | 2011 |
149 | PRACTI Replication. | 2006 |
147 | EndRE: An End-System Redundancy Elimination Service for Enterprises. | 2010 |
145 | D3S: Debugging Deployed Distributed Systems. | 2008 |
143 | Consensus Routing: The Internet as a Distributed System. (Best Paper) | 2008 |
143 | Explicit Control in the Batch-Aware Distributed File System. | 2004 |
142 | An Architecture for Internet Data Transfer. | 2006 |
140 | Glasnost: Enabling End Users to Detect Traffic Differentiation. | 2010 |
140 | AntFarm: Efficient Content Distribution with Managed Swarms. | 2009 |
139 | XIA: Efficient Support for Evolvable Internetworking. | 2012 |
139 | PRESTO: Feedback-driven Data Management in Sensor Networks. | 2006 |
138 | Epsilon: A Visible Light Based Positioning System. | 2014 |
138 | To Infinity and Beyond: Time-Warped Network Emulation. | 2006 |
138 | OSPF Monitoring: Architecture Design and Deployment Experience | 2004 |
137 | Making Sense of Performance in Data Analytics Frameworks. | 2015 |
137 | I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks. | 2014 |
137 | SSDAlloc: Hybrid SSD/RAM Memory Management Made Easy. | 2011 |
137 | TrInc: Small Trusted Hardware for Large Distributed Systems. | 2009 |
137 | Beyond Pilots: Keeping Rural Wireless Networks Alive. | 2008 |
136 | Diagnosing Performance Changes by Comparing Request Flows. | 2011 |
136 | DieCast: Testing Distributed Systems with an Accurate Scale Model. | 2008 |
136 | Scale and Performance in the CoBlitz Large-File Distribution Service. | 2006 |
136 | Cashmere: Resilient Anonymous Routing. | 2005 |
135 | Studying Black Holes in the Internet with Hubble. | 2008 |
134 | Reverse traceroute. | 2010 |
133 | Measurement and Analysis of Spyware in a University Environment. | 2004 |
132 | Supporting Demanding Wireless Applications with Frequency-agile Radios. | 2010 |
132 | cSamp: A System for Network-Wide Flow Monitoring. | 2008 |
130 | ServerSwitch: A Programmable and High Performance Platform for Data Center Networks. | 2011 |
130 | Using Emulation to Understand and Improve Wireless Networks and Applications. | 2005 |
129 | Serval: An End-Host Stack for Service-Centric Networking. | 2012 |
129 | Towards Street-Level Client-Independent IP Geolocation. | 2011 |
129 | Whanau: A Sybil-proof Distributed Hash Table. | 2010 |
126 | Split/Merge: System Support for Elastic Execution in Virtual Middleboxes. | 2013 |
126 | Exploiting Similarity for Multi-Source Downloads Using File Handprints. | 2007 |
125 | Reoptimizing Data Parallel Computing. | 2012 |
125 | Passport: Secure and Adoptable Source Authentication. | 2008 |
123 | Peering Through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification. | 2007 |
122 | Demystifying Page Load Performance with WProf. | 2013 |
122 | TightLip: Keeping Applications from Spilling the Beans. | 2007 |
121 | Camdoop: Exploiting In-network Aggregation for Big Data Applications. | 2012 |
120 | Friday: Global Comprehension for Distributed Replay. | 2007 |
119 | Bobtail: Avoiding Long Tails in the Cloud. | 2013 |
119 | Unraveling the Complexity of Network Management. | 2009 |
115 | Virtualization Aware File Systems: Getting Beyond the Limitations of Virtual Disks. | 2006 |
114 | A Platform for Content-based Partial Replication. | 2009 |
113 | Constructing Services with Interposable Virtual Hardware. | 2004 |
112 | AccuRate: Constellation Based Rate Estimation in Wireless Networks. | 2010 |
112 | iPlane Nano: Path Prediction for Peer-to-Peer Applications. | 2009 |
111 | Mugshot: Deterministic Capture and Replay for JavaScript Applications. | 2010 |
109 | CrystalBall: Predicting and Preventing Inconsistencies in Deployed Distributed Systems. | 2009 |
109 | A Systematic Framework for Unearthing the Missing Links: Measurements and Impact. | 2007 |
107 | Bringing Gesture Recognition to All Devices. | 2014 |
107 | S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks. | 2007 |
106 | Flexible Wide-Area Storage for Distributed Systems with WheelFS. | 2009 |
106 | Negotiation-Based Routing Between Neighboring ISPs. | 2005 |
104 | Exploring Link Correlation for Efficient Flooding in Wireless Sensor Networks. | 2010 |
102 | Chatty Tenants and the Cloud Network Sharing Problem. | 2013 |
101 | Wedge: Splitting Applications into Reduced-Privilege Compartments. | 2008 |
98 | Improving Wireless Network Performance Using Sensor Hints. | 2011 |
97 | Wishbone: Profile-based Partitioning for Sensornet Applications. | 2009 |
96 | How Speedy is SPDY? | 2014 |
96 | Structured Comparative Analysis of Systems Logs to Diagnose Performance Problems. | 2012 |
96 | Experiences with CoralCDN: A Five-Year Operational View. | 2010 |
95 | Maranello: Practical Partial Packet Recovery for 802.11. | 2010 |
95 | Detecting In-Flight Page Changes with Web Tripwires. | 2008 |
94 | Bitcoin-NG: A Scalable Blockchain Protocol. | 2016 |
94 | Subtleties in Tolerating Correlated Failures in Wide-area Storage Systems. | 2006 |
93 | Profiling Network Performance for Multi-tier Data Center Applications. | 2011 |
92 | Stochastic Forecasts Achieve High Throughput and Low Delay over Cellular Networks. | 2013 |
92 | Cobra: Content-based Filtering and Aggregation of Blogs and RSS Feeds. | 2007 |
91 | NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge. | 2009 |
90 | Paxos Replicated State Machines as the Basis of a High-Performance Data Store. | 2011 |
89 | WiDS Checker: Combating Bugs in Distributed Systems. | 2007 |
87 | Tierless Programming and Reasoning for Software-Defined Networks. | 2014 |
87 | WebProphet: Automating Performance Prediction for Web Services. | 2010 |
86 | F10: A Fault-Tolerant Engineered Network. | 2013 |
86 | PinPoint: Localizing Interfering Radios. | 2013 |
86 | Optimizing Cost and Performance in Online Service Provider Networks. | 2010 |
86 | HashCache: Cache Storage for the Next Billion. | 2009 |
85 | BFT Protocols Under Fire. | 2008 |
84 | Towards Statistical Queries over Distributed Private User Data. | 2012 |
84 | OCALA: An Architecture for Supporting Legacy Applications over Overlays. | 2006 |
84 | Design Implementation and Evaluation and Duplicate Transfer Detection in HTTP | 2004 |
83 | Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks. | 2009 |
83 | Phalanx: Withstanding Multimillion-Node Botnets. | 2008 |
82 | Improving Web Availability for Clients with MONET. | 2005 |
81 | TritonSort: A Balanced Large-Scale Sorting System. | 2011 |
81 | Zeno: Eventually Consistent Byzantine-Fault Tolerance. | 2009 |
81 | Block-switched Networks: A New Paradigm for Wireless Transport. | 2009 |
80 | Splash: Fast Data Dissemination with Constructive Interference in Wireless Sensor Networks. | 2013 |
79 | mTCP: a Highly Scalable User-level TCP Stack for Multicore Systems. | 2014 |
77 | Dasu: Pushing Experiments to the Internet’s Edge. | 2013 |
77 | Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems. | 2007 |
76 | Decimeter-Level Localization with a Single WiFi Access Point. | 2016 |
76 | SPLAY: Distributed Systems Evaluation Made Simple (or How to Turn Ideas into Live Systems in a Breeze). | 2009 |
75 | Multi-Person Localization via RF Body Reflections. | 2015 |
75 | Wire Speed Name Lookup: A GPU-based Approach. | 2013 |
75 | Information Slicing: Anonymity Using Unreliable Overlays. | 2007 |
73 | BOSS: Building Operating System Services. | 2013 |
73 | Orchestrating the Deployment of Computations in the Cloud with Conductor. | 2012 |
73 | Koi: A Location-Privacy Platform for Smartphone Apps. | 2012 |
73 | SplitScreen: Enabling Efficient Distributed Malware Detection. | 2010 |
72 | eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones. | 2013 |
71 | Information-Agnostic Flow Scheduling for Commodity Data Centers. | 2015 |
71 | Building Web Applications on Top of Encrypted Data Using Mylar. | 2014 |
71 | Cheap and Large CAMs for High Performance Data-Intensive Networked Systems. | 2010 |
70 | Quorum: Flexible Quality of Service for Internet Services. | 2005 |
67 | Contracts: Practical Contribution Incentives for P2P Live Streaming. | 2010 |
66 | Toward Predictable Performance in Software Packet-Processing Platforms. | 2012 |
66 | PIE in the Sky: Online Passive Interference Estimation for Enterprise WLANs. | 2011 |
66 | dFence: Transparent Network-based Denial of Service Mitigation. | 2007 |
65 | An Experimentation Workbench for Replayable Networking Research. | 2007 |
64 | CORFU: A Shared Log Design for Flash Clusters. | 2012 |
64 | Uncovering Performance Differences Among Backbone ISPs with Netdiff . | 2008 |
63 | Practical Data-Centric Storage. | 2006 |
61 | Queues Don’t Matter When You Can JUMP Them! | 2015 |
61 | Yank: Enabling Green Data Centers to Pull the Plug. | 2013 |
60 | P3: Toward Privacy-Preserving Photo Sharing. | 2013 |
60 | Optimizing Data Shuffling in Data-Parallel Computation by Understanding User-Defined Functions. | 2012 |
60 | Dewdrop: An Energy-Aware Runtime for Computational RFID. | 2011 |
59 | Circuit Switching Under the Radar with REACToR. | 2014 |
59 | GRASS: Trimming Stragglers in Approximation Analytics. | 2014 |
59 | FATE and DESTINI: A Framework for Cloud Recovery Testing. | 2011 |
59 | NetReview: Detecting When Interdomain Routing Goes Wrong. | 2009 |
58 | Bazaar: Strengthening User Reputations in Online Marketplaces. | 2011 |
58 | Session State: Beyond Soft State. | 2004 |
57 | Scalable Rule Management for Data Centers. | 2013 |
57 | A Location-Based Management System for Enterprise Wireless LANs. | 2007 |
56 | DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps. | 2014 |
55 | WiFi-NC : WiFi Over Narrow Channels. | 2012 |
55 | SliceTime: A Platform for Scalable and Accurate Network Emulation. | 2011 |
54 | Flywheel: Google’s Data Compression Proxy for the Mobile Web. | 2015 |
54 | Kinetic: Verifiable Dynamic Network Control. | 2015 |
54 | Libra: Divide and Conquer to Verify Forwarding Tables in Huge Networks. | 2014 |
54 | Software Dataplane Verification. | 2014 |
54 | Structure Management for Scalable Overlay Service Construction. | 2004 |
53 | CoVisor: A Compositional Hypervisor for Software-Defined Networks. | 2015 |
53 | Consistent and Automatic Replica Regeneration. | 2004 |
52 | The TCP Outcast Problem: Exposing Unfairness in Data Center Networks. | 2012 |
51 | PCP: Efficient Endpoint Congestion Control. | 2006 |
50 | Global Analytics in the Face of Bandwidth and Regulatory Constraints. | 2015 |
50 | Scalable WiFi Media Delivery through Adaptive Broadcasts. | 2010 |
49 | Aggregation and Degradation in JetStream: Streaming Analytics in the Wide Area. | 2014 |
49 | V-edge: Fast Self-constructive Power Modeling of Smartphones Based on Battery Voltage Dynamics. | 2013 |
49 | Ensuring Connectivity via Data Plane Mechanisms. | 2013 |
49 | The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery. | 2006 |
48 | ETTM: A Scalable Fault Tolerant Network Manager. | 2011 |
48 | Ricochet: Lateral Error Correction for Time-Critical Multicast. | 2007 |
46 | Softspeak: Making VoIP Play Well in Existing 802.11 Deployments. | 2009 |
46 | The Flexlab Approach to Realistic Evaluation of Networked Systems. | 2007 |
46 | Distributed Quota Enforcement for Spam Control. | 2006 |
45 | A General Approach to Network Configuration Analysis. | 2015 |
45 | Tolerating Latency in Replicated State Machines Through Client Speculation. | 2009 |
44 | Symbiotic Relationships in Internet Routing Overlays. | 2009 |
43 | SpecNet: Spectrum Sensing Sans Frontières. | 2011 |
43 | Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures. | 2008 |
42 | Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions. | 2016 |
42 | Klotski: Reprioritizing Web Content to Improve User Experience on Mobile Devices. | 2015 |
42 | PADS: A Policy Architecture for Distributed Storage Systems. | 2009 |
41 | C3: Cutting Tail Latency in Cloud Data Stores via Adaptive Replica Selection. | 2015 |
41 | SENIC: Scalable NIC for End-Host Rate Limiting. | 2014 |
40 | Ernest: Efficient Performance Prediction for Large-Scale Advanced Analytics. | 2016 |
40 | Catching Whales and Minnows Using WiFiNet: Deconstructing Non-WiFi Interference Using WiFi Hardware. | 2012 |
40 | Effective Diagnosis of Routing Disruptions from End Systems. | 2008 |
39 | Checking Beliefs in Dynamic Networks. | 2015 |
39 | Centrifuge: Integrated Lease Management and Partitioning for Cloud Services. | 2010 |
39 | Ensuring Content Integrity for Untrusted Peer-to-Peer Content Distribution Networks. | 2007 |
38 | WiDeo: Fine-grained Device-free Motion Tracing using RF Backscatter. | 2015 |
37 | Crom: Faster Web Browsing Using Speculative Execution. | 2010 |
37 | Context-based Routing: Technique Applications and Experience | 2008 |
37 | Swift: A Fast Dynamic Packet Filter. | 2008 |
36 | Compiling Packet Programs to Reconfigurable Switches. | 2015 |
36 | Jitsu: Just-In-Time Summoning of Unikernels. | 2015 |
36 | PCC: Re-architecting Congestion Control for Consistent High Performance. | 2015 |
36 | Embassies: Radically Refactoring the Web. | 2013 |
36 | Seamless BGP Migration with Router Grafting. | 2010 |
36 | OverCite: A Distributed Cooperative CiteSeer. | 2006 |
35 | Towards Wifi Mobility without Fast Handover. | 2015 |
35 | Fitting Square Pegs Through Round Pipes: Unordered Delivery Wire-Compatible with TCP and TLS. | 2012 |
35 | Mutually Controlled Routing with Independent ISPs. | 2007 |
34 | Enforcing Customizable Consistency Properties in Software-Defined Networks. | 2015 |
34 | C3: Internet-Scale Control Plane for Video Quality Optimization. | 2015 |
34 | Relative Localization of RFID Tags using Spatial-Temporal Phase Profiling. | 2015 |
34 | ipShield: A Framework For Enforcing Context-Aware Privacy. | 2014 |
33 | Juggling the Jigsaw: Towards Automated Problem Inference from Network Trouble Tickets. | 2013 |
32 | SAAR: A Shared Control Plane for Overlay Multicast. | 2007 |
31 | Designing Distributed Systems Using Approximate Synchrony in Data Center Networks. | 2015 |
31 | Reliable Client Accounting for P2P-Infrastructure Hybrids. | 2012 |
31 | ACMS: The Akamai Configuration Management System. | 2005 |
30 | FastRoute: A Scalable Load-Aware Anycast Routing Architecture for Modern CDNs. | 2015 |
30 | Catch the Whole Lot in an Action: Rapid Precise Packet Loss Notification in Data Center. | 2014 |
30 | Robustness in the Salus Scalable Block Store. | 2013 |
29 | An Industrial-Scale Software Defined Internet Exchange Point. | 2016 |
29 | Bolt: Data Management for Connected Homes. | 2014 |
29 | Improving Availability in Distributed Systems with Failure Informers. | 2013 |
29 | Maelstrom: Transparent Error Correction for Lambda Networks. | 2008 |
29 | Pastwatch: A Distributed Version Control System. | 2006 |
28 | Explicit Path Control in Commodity Data Centers: Design and Applications. | 2015 |
28 | CosTLO: Cost-Effective Redundancy for Lower Latency Variance on Cloud Storage Services. | 2015 |
28 | Enabling Bit-by-Bit Backscatter Communication in Severe Energy Harvesting Environments. | 2014 |
28 | Trickles: A Stateless Network Stack for Improved Scalability Resilience and Flexibility | 2005 |
27 | HUG: Multi-Resource Fairness for Correlated and Elastic Demands. | 2016 |
27 | VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls. | 2014 |
27 | High Throughput Data Center Topology Design. | 2014 |
26 | Maglev: A Fast and Reliable Software Network Load Balancer. | 2016 |
26 | Retro: Targeted Resource Management in Multi-tenant Distributed Systems. | 2015 |
26 | Rhea: Automatic Filtering for Unstructured Cloud Storage. | 2013 |
24 | Compiling Path Queries. | 2016 |
24 | SWAP: A Scheduler with Automatic Process Dependency Detection. | 2004 |
23 | Attaining the Promise and Avoiding the Pitfalls of TCP in the Datacenter. | 2015 |
23 | RPT: Re-architecting Loss Protection for Content-Aware Networks. | 2012 |
23 | Efficiency Through Eavesdropping: Link-layer Packet Caching. | 2008 |
22 | BeamSpy: Enabling Robust 60 GHz Links Under Blockage. | 2016 |
22 | Speeding up Web Page Loads with Shandian. | 2016 |
22 | cTPM: A Cloud TPM for Cross-Device Trusted Applications. | 2014 |
22 | ?Box: A Platform for Privacy-Preserving Apps. | 2013 |
22 | San Fermín: Aggregating Large Data Sets Using a Binomial Swap Forest. | 2008 |
22 | Olive: Distributed Point-in-Time Branching Storage for Real Systems. | 2006 |
21 | Embark: Securely Outsourcing Middleboxes to the Cloud. | 2016 |
21 | Polaris: Faster Page Loads Using Fine-grained Dependency Tracking. | 2016 |
21 | Raising the Bar for Using GPUs in Software Packet Processing. | 2015 |
21 | Succinct: Enabling Queries on Compressed Data. | 2015 |
21 | SloMo: Downclocking WiFi Communication. | 2013 |
21 | Bootstrapping Accountability in the Internet We Have. | 2011 |
20 | BUZZ: Testing Context-Dependent Policies in Stateful Networks. | 2016 |
20 | Recursively Cautious Congestion Control. | 2014 |
20 | A Semantic Framework for Data Analysis in Networked Systems. | 2011 |
19 | Consensus in a Box: Inexpensive Coordination in Hardware. | 2016 |
19 | FairRide: Near-Optimal Fair Cache Sharing. | 2016 |
18 | Cliffhanger: Scaling Performance Cliffs in Web Memory Caches. | 2016 |
18 | Universal Packet Scheduling. | 2016 |
18 | Expanding Rural Cellular Networks with Virtual Coverage. | 2013 |
18 | Modeling and Emulation of Internet Paths. | 2009 |
17 | Blizzard: Fast Cloud-scale Block Storage for Cloud-oblivious Applications. | 2014 |
17 | NetCheck: Network Diagnoses from Blackbox Traces. | 2014 |
17 | NetComplex: A Complexity Metric for Networked System Designs. | 2008 |
16 | FlowRadar: A Better NetFlow for Data Centers. | 2016 |
16 | FlexRadio: Fully Flexible Radios and Networks. | 2015 |
16 | CellIQ : Real-Time Cellular Network Analytics at Scale. | 2015 |
16 | Model Checking a Networked System Without the Network. | 2011 |
16 | RPC Chains: Efficient Client-Server Communication in Geodistributed Systems. | 2009 |
15 | CFA: A Practical Prediction System for Video QoE Optimization. | 2016 |
15 | StreamScope: Continuous Reliable Distributed Processing of Big Data Streams. | 2016 |
15 | Scalable and Private Media Consumption with Popcorn. | 2016 |
15 | Wormhole: Reliable Pub-Sub to Support Geo-replicated Internet Services. | 2015 |
15 | Ripple: Communicating through Physical Vibration. | 2015 |
15 | Warranties for Faster Strong Consistency. | 2014 |
15 | SoNIC: Precise Realtime Software Access and Control of Wired Networks. | 2013 |
15 | Efficiently Measuring Bandwidth at All Time Scales. | 2011 |
15 | The Architecture and Implementation of an Extensible Web Crawler. | 2010 |
15 | UsenetDHT: A Low-Overhead Design for Usenet. | 2008 |
14 | Minimizing Faulty Executions of Distributed Systems. | 2016 |
14 | Atomix: A Framework for Deploying Signal Processing Applications on Wireless Infrastructure. | 2015 |
14 | PHY Covert Channels: Can you see the Idles? | 2014 |
13 | Enabling ECN in Multi-Service Multi-Queue Data Centers. | 2016 |
13 | Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds. | 2016 |
13 | Bunker: A Privacy-Oriented Platform for Network Tracing. | 2009 |
13 | Na Kika: Secure Service Execution and Composition in an Open Edge-Side Computing Network. | 2006 |
12 | Paving the Way for NFV: Simplifying Middlebox Modifications Using StateAlyzr. | 2016 |
12 | Be Fast Cheap and in Control with SwitchKV. | 2016 |
12 | Efficiently Delivering Online Services over Integrated Infrastructure. | 2016 |
11 | Simplifying Software-Defined Network Optimization Using SOL. | 2016 |
11 | Diamond: Nesting the Data Center Network with Wireless Rings in 3D Space. | 2016 |
11 | CubicRing: Enabling One-Hop Failure Detection and Recovery for Distributed In-Memory Storage Systems. | 2015 |
11 | Prophecy: Using History for High-Throughput Fault Tolerance. | 2010 |
11 | Connection Conditioning: Architecture-Independent Support for Simple Robust Servers. | 2006 |
10 | Beyond Sensing: Multi-GHz Realtime Spectrum Analytics. | 2015 |
10 | Exalt: Empowering Researchers to Evaluate Large-Scale Storage Systems. | 2014 |
9 | Let It Flow: Resilient Asymmetric Load Balancing with Flowlet Switching. | 2017 |
9 | Availability of Multi-Object Operations (Awarded Best Paper). | 2006 |
8 | Opaque: An Oblivious and Encrypted Distributed Analytics Platform. | 2017 |
8 | Diplomat: Using Delegations to Protect Community Repositories. | 2016 |
8 | Ripple II: Faster Communication through Physical Vibration. | 2016 |
8 | BlowFish: Dynamic Storage-Performance Tradeoff in Data Stores. | 2016 |
8 | Social Hash: An Assignment Framework for Optimizing Distributed Systems Operations on Social Networks. | 2016 |
8 | Increasing Datacenter Network Utilisation with GRIN. | 2015 |
8 | Analyzing Protocol Implementations for Interoperability. | 2015 |
8 | Scalable Error Isolation for Distributed Systems. | 2015 |
8 | Securing RFIDs by Randomizing the Modulation and Channel. | 2015 |
8 | LOUP: The Principles and Practice of Intra-Domain Route Dissemination. | 2013 |
8 | Don’t Lose Sleep Over Availability: The GreenUp Decentralized Wakeup Service. | 2012 |
8 | TimeLine: A High Performance Archive for a Distributed Object Store. | 2004 |
7 | XFabric: A Reconfigurable In-Rack Network for Rack-Scale Computers. | 2016 |
7 | Tardigrade: Leveraging Lightweight Virtual Machines to Easily and Efficiently Construct Fault-Tolerant Services. | 2015 |
6 | Flowtune: Flowlet Control for Datacenter Networks. | 2017 |
6 | DFC: Accelerating String Pattern Matching for Network Applications. | 2016 |
6 | Sibyl: A Practical Internet Route Oracle. | 2016 |
6 | AnonRep: Towards Tracking-Resistant Anonymous Reputation. | 2016 |
6 | Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard. | 2016 |
6 | A Scalable Multi-User Uplink for Wi-Fi. | 2016 |
6 | Adtributor: Revenue Debugging in Advertising Systems. | 2014 |
6 | Carousel: Scalable Logging for Intrusion Prevention Systems. | 2010 |
6 | The Challenges of Delivering Content and Applications on the Internet. | 2005 |
5 | Enhancing Security and Privacy of Tor’s Ecosystem by Using Trusted Execution Environments. | 2017 |
5 | FarmBeats: An IoT Platform for Data-Driven Agriculture. | 2017 |
5 | Improving User Perceived Page Load Times Using Gaze. | 2017 |
5 | Stateless Network Functions: Breaking the Tight Coupling of State and Processing. | 2017 |
5 | Efficient Memory Disaggregation with Infiniswap. | 2017 |
5 | Earp: Principled Storage Sharing and Protection for Mobile Apps | 2016 |
5 | Operational Experiences with Disk Imaging in a Multi-Tenant Datacenter. | 2014 |
4 | FM Backscatter: Enabling Connected Cities and Smart Fabrics. | 2017 |
4 | Verifying Reachability in Networks with Mutable Datapaths. | 2017 |
4 | CherryPick: Adaptively Unearthing the Best Cloud Configurations for Big Data Analytics. | 2017 |
4 | VAST: A Unified Platform for Interactive Network Forensics. | 2016 |
4 | iCellular: Device-Customized Cellular Network Access on Commodity Smartphones. | 2016 |
4 | Easy Freshness with Pequod Cache Joins. | 2014 |
3 | APUNet: Revitalizing GPU as Packet Processing Accelerator. | 2017 |
3 | Enabling High-Quality Untethered Virtual Reality. | 2017 |
3 | Evaluating the Power of Flexible Packet Processing for Network Resource Allocation. | 2017 |
3 | Clipper: A Low-Latency Online Prediction Serving System. | 2017 |
3 | Splinter: Practical Private Queries on Public Data. | 2017 |
3 | VFP: A Virtual Switch Platform for Host SDN in the Public Cloud. | 2017 |
3 | mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes. | 2017 |
3 | Running Massively Multiplayer Games as a Business. | 2004 |
2 | Gaia: Geo-Distributed Machine Learning Approaching LAN Speeds. | 2017 |
2 | Pytheas: Enabling Data-Driven Quality of Experience Optimization Using Group-Based Exploration-Exploitation. | 2017 |
2 | Encoding Fast and Slow: Low-Latency Video Processing Using Thousands of Tiny Threads. | 2017 |
2 | Correct by Construction Networks Using Stepwise Refinement. | 2017 |
2 | Flexplane: An Experimentation Platform for Resource Management in Datacenters. | 2017 |
2 | RAIL: A Case for Redundant Arrays of Inexpensive Links in Data Center Networks. | 2017 |
2 | Bringing IoT to Sports Analytics. | 2017 |
2 | Passive Realtime Datacenter Fault Detection and Localization. | 2017 |
2 | Live Video Analytics at Scale with Approximation and Delay-Tolerance. | 2017 |
2 | Mind the Gap: Towards a Backpressure-Based Transport Protocol for the Tor Network. | 2016 |
2 | PhyCloak: Obfuscating Sensing from Communication Signals. | 2016 |
1 | AdaptSize: Orchestrating the Hot Object Memory Cache in a Content Delivery Network. | 2017 |
1 | Automated Bug Removal for Software-Defined Networks. | 2017 |
1 | Prio: Private Robust and Scalable Computation of Aggregate Statistics | 2017 |
1 | A System to Verify Network Behavior of Known Cryptographic Clients. | 2017 |
1 | Enabling Wide-Spread Communications on Optical Fabric with MegaSwitch. | 2017 |
1 | Facilitating Robust 60 GHz Network Deployment By Sensing Ambient Reflectors. | 2017 |
1 | Robust Validation of Network Designs under Uncertain Demands and Failures. | 2017 |
1 | vCorfu: A Cloud-Scale Object Store on a Shared Log. | 2017 |
1 | Delta-net: Real-time Network Verification Using Atoms. | 2017 |
1 | ModNet: A Modular Approach to Network Stack Extension. | 2015 |
0 | Curator: Self-Managing Storage for Enterprise Clusters. | 2017 |
0 | I Can’t Believe It’s Not Causal! Scalable Causal Consistency with No Slowdown Cascades. | 2017 |
0 | FlexCore: Massively Parallel and Flexible Processing for Large MIMO Access Points. | 2017 |
0 | Skip-Correlation for Multi-Power Wireless Carrier Sensing. | 2017 |
0 | Decibel: Isolation and Sharing in Disaggregated Rack-Scale Storage. | 2017 |
0 | One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet. | 2017 |
0 | The Design, Implementation and Deployment of a System to Transparently Compress Hundreds of Petabytes of Image Files for a File-Storage Service. | 2017 |
0 | ViewMap: Sharing Private In-Vehicle Dashcam Videos. | 2017 |
0 | SCL: Simplifying Distributed SDN Control Planes. | 2017 |
0 | Tux2: Distributed Graph Computation for Machine Learning. | 2017 |
0 | Security of Voting Systems. | 2007 |
2017¶
Cited by | Paper title |
---|---|
9 | Let It Flow: Resilient Asymmetric Load Balancing with Flowlet Switching. |
8 | Opaque: An Oblivious and Encrypted Distributed Analytics Platform. |
6 | Flowtune: Flowlet Control for Datacenter Networks. |
5 | Enhancing Security and Privacy of Tor’s Ecosystem by Using Trusted Execution Environments. |
5 | FarmBeats: An IoT Platform for Data-Driven Agriculture. |
5 | Improving User Perceived Page Load Times Using Gaze. |
5 | Stateless Network Functions: Breaking the Tight Coupling of State and Processing. |
5 | Efficient Memory Disaggregation with Infiniswap. |
4 | FM Backscatter: Enabling Connected Cities and Smart Fabrics. |
4 | Verifying Reachability in Networks with Mutable Datapaths. |
4 | CherryPick: Adaptively Unearthing the Best Cloud Configurations for Big Data Analytics. |
3 | APUNet: Revitalizing GPU as Packet Processing Accelerator. |
3 | Enabling High-Quality Untethered Virtual Reality. |
3 | Evaluating the Power of Flexible Packet Processing for Network Resource Allocation. |
3 | Clipper: A Low-Latency Online Prediction Serving System. |
3 | Splinter: Practical Private Queries on Public Data. |
3 | VFP: A Virtual Switch Platform for Host SDN in the Public Cloud. |
3 | mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes. |
2 | Gaia: Geo-Distributed Machine Learning Approaching LAN Speeds. |
2 | Pytheas: Enabling Data-Driven Quality of Experience Optimization Using Group-Based Exploration-Exploitation. |
2 | Encoding Fast and Slow: Low-Latency Video Processing Using Thousands of Tiny Threads. |
2 | Correct by Construction Networks Using Stepwise Refinement. |
2 | Flexplane: An Experimentation Platform for Resource Management in Datacenters. |
2 | RAIL: A Case for Redundant Arrays of Inexpensive Links in Data Center Networks. |
2 | Bringing IoT to Sports Analytics. |
2 | Passive Realtime Datacenter Fault Detection and Localization. |
2 | Live Video Analytics at Scale with Approximation and Delay-Tolerance. |
1 | AdaptSize: Orchestrating the Hot Object Memory Cache in a Content Delivery Network. |
1 | Automated Bug Removal for Software-Defined Networks. |
1 | Prio: Private Robust and Scalable Computation of Aggregate Statistics |
1 | A System to Verify Network Behavior of Known Cryptographic Clients. |
1 | Enabling Wide-Spread Communications on Optical Fabric with MegaSwitch. |
1 | Facilitating Robust 60 GHz Network Deployment By Sensing Ambient Reflectors. |
1 | Robust Validation of Network Designs under Uncertain Demands and Failures. |
1 | vCorfu: A Cloud-Scale Object Store on a Shared Log. |
1 | Delta-net: Real-time Network Verification Using Atoms. |
0 | Curator: Self-Managing Storage for Enterprise Clusters. |
0 | I Can’t Believe It’s Not Causal! Scalable Causal Consistency with No Slowdown Cascades. |
0 | FlexCore: Massively Parallel and Flexible Processing for Large MIMO Access Points. |
0 | Skip-Correlation for Multi-Power Wireless Carrier Sensing. |
0 | Decibel: Isolation and Sharing in Disaggregated Rack-Scale Storage. |
0 | One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet. |
0 | The Design, Implementation and Deployment of a System to Transparently Compress Hundreds of Petabytes of Image Files for a File-Storage Service. |
0 | ViewMap: Sharing Private In-Vehicle Dashcam Videos. |
0 | SCL: Simplifying Distributed SDN Control Planes. |
0 | Tux2: Distributed Graph Computation for Machine Learning. |
2016¶
Cited by | Paper title |
---|---|
94 | Bitcoin-NG: A Scalable Blockchain Protocol. |
76 | Decimeter-Level Localization with a Single WiFi Access Point. |
42 | Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions. |
40 | Ernest: Efficient Performance Prediction for Large-Scale Advanced Analytics. |
29 | An Industrial-Scale Software Defined Internet Exchange Point. |
27 | HUG: Multi-Resource Fairness for Correlated and Elastic Demands. |
26 | Maglev: A Fast and Reliable Software Network Load Balancer. |
24 | Compiling Path Queries. |
22 | BeamSpy: Enabling Robust 60 GHz Links Under Blockage. |
22 | Speeding up Web Page Loads with Shandian. |
21 | Embark: Securely Outsourcing Middleboxes to the Cloud. |
21 | Polaris: Faster Page Loads Using Fine-grained Dependency Tracking. |
20 | BUZZ: Testing Context-Dependent Policies in Stateful Networks. |
19 | Consensus in a Box: Inexpensive Coordination in Hardware. |
19 | FairRide: Near-Optimal Fair Cache Sharing. |
18 | Cliffhanger: Scaling Performance Cliffs in Web Memory Caches. |
18 | Universal Packet Scheduling. |
16 | FlowRadar: A Better NetFlow for Data Centers. |
15 | CFA: A Practical Prediction System for Video QoE Optimization. |
15 | StreamScope: Continuous Reliable Distributed Processing of Big Data Streams. |
15 | Scalable and Private Media Consumption with Popcorn. |
14 | Minimizing Faulty Executions of Distributed Systems. |
13 | Enabling ECN in Multi-Service Multi-Queue Data Centers. |
13 | Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds. |
12 | Paving the Way for NFV: Simplifying Middlebox Modifications Using StateAlyzr. |
12 | Be Fast Cheap and in Control with SwitchKV. |
12 | Efficiently Delivering Online Services over Integrated Infrastructure. |
11 | Simplifying Software-Defined Network Optimization Using SOL. |
11 | Diamond: Nesting the Data Center Network with Wireless Rings in 3D Space. |
8 | Diplomat: Using Delegations to Protect Community Repositories. |
8 | Ripple II: Faster Communication through Physical Vibration. |
8 | BlowFish: Dynamic Storage-Performance Tradeoff in Data Stores. |
8 | Social Hash: An Assignment Framework for Optimizing Distributed Systems Operations on Social Networks. |
7 | XFabric: A Reconfigurable In-Rack Network for Rack-Scale Computers. |
6 | DFC: Accelerating String Pattern Matching for Network Applications. |
6 | Sibyl: A Practical Internet Route Oracle. |
6 | AnonRep: Towards Tracking-Resistant Anonymous Reputation. |
6 | Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard. |
6 | A Scalable Multi-User Uplink for Wi-Fi. |
5 | Earp: Principled Storage Sharing and Protection for Mobile Apps |
4 | VAST: A Unified Platform for Interactive Network Forensics. |
4 | iCellular: Device-Customized Cellular Network Access on Commodity Smartphones. |
2 | Mind the Gap: Towards a Backpressure-Based Transport Protocol for the Tor Network. |
2 | PhyCloak: Obfuscating Sensing from Communication Signals. |
2015¶
Cited by | Paper title |
---|---|
257 | The Design and Implementation of Open vSwitch. |
137 | Making Sense of Performance in Data Analytics Frameworks. |
75 | Multi-Person Localization via RF Body Reflections. |
71 | Information-Agnostic Flow Scheduling for Commodity Data Centers. |
61 | Queues Don’t Matter When You Can JUMP Them! |
54 | Flywheel: Google’s Data Compression Proxy for the Mobile Web. |
54 | Kinetic: Verifiable Dynamic Network Control. |
53 | CoVisor: A Compositional Hypervisor for Software-Defined Networks. |
50 | Global Analytics in the Face of Bandwidth and Regulatory Constraints. |
45 | A General Approach to Network Configuration Analysis. |
42 | Klotski: Reprioritizing Web Content to Improve User Experience on Mobile Devices. |
41 | C3: Cutting Tail Latency in Cloud Data Stores via Adaptive Replica Selection. |
39 | Checking Beliefs in Dynamic Networks. |
38 | WiDeo: Fine-grained Device-free Motion Tracing using RF Backscatter. |
36 | Compiling Packet Programs to Reconfigurable Switches. |
36 | Jitsu: Just-In-Time Summoning of Unikernels. |
36 | PCC: Re-architecting Congestion Control for Consistent High Performance. |
35 | Towards Wifi Mobility without Fast Handover. |
34 | Enforcing Customizable Consistency Properties in Software-Defined Networks. |
34 | C3: Internet-Scale Control Plane for Video Quality Optimization. |
34 | Relative Localization of RFID Tags using Spatial-Temporal Phase Profiling. |
31 | Designing Distributed Systems Using Approximate Synchrony in Data Center Networks. |
30 | FastRoute: A Scalable Load-Aware Anycast Routing Architecture for Modern CDNs. |
28 | Explicit Path Control in Commodity Data Centers: Design and Applications. |
28 | CosTLO: Cost-Effective Redundancy for Lower Latency Variance on Cloud Storage Services. |
26 | Retro: Targeted Resource Management in Multi-tenant Distributed Systems. |
23 | Attaining the Promise and Avoiding the Pitfalls of TCP in the Datacenter. |
21 | Raising the Bar for Using GPUs in Software Packet Processing. |
21 | Succinct: Enabling Queries on Compressed Data. |
16 | FlexRadio: Fully Flexible Radios and Networks. |
16 | CellIQ : Real-Time Cellular Network Analytics at Scale. |
15 | Wormhole: Reliable Pub-Sub to Support Geo-replicated Internet Services. |
15 | Ripple: Communicating through Physical Vibration. |
14 | Atomix: A Framework for Deploying Signal Processing Applications on Wireless Infrastructure. |
11 | CubicRing: Enabling One-Hop Failure Detection and Recovery for Distributed In-Memory Storage Systems. |
10 | Beyond Sensing: Multi-GHz Realtime Spectrum Analytics. |
8 | Increasing Datacenter Network Utilisation with GRIN. |
8 | Analyzing Protocol Implementations for Interoperability. |
8 | Scalable Error Isolation for Distributed Systems. |
8 | Securing RFIDs by Randomizing the Modulation and Channel. |
7 | Tardigrade: Leveraging Lightweight Virtual Machines to Easily and Efficiently Construct Fault-Tolerant Services. |
1 | ModNet: A Modular Approach to Network Stack Extension. |
2014¶
Cited by | Paper title |
---|---|
312 | ClickOS and the Art of Network Function Virtualization. |
210 | 3D Tracking via Body Radio Reflections. |
205 | Network Virtualization in Multi-tenant Datacenters. |
189 | Full Duplex MIMO Radios. |
189 | FaRM: Fast Remote Memory. |
173 | NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms. |
170 | MICA: A Holistic Approach to Fast In-Memory Key-Value Storage. |
166 | Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags. |
138 | Epsilon: A Visible Light Based Positioning System. |
137 | I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks. |
107 | Bringing Gesture Recognition to All Devices. |
96 | How Speedy is SPDY? |
87 | Tierless Programming and Reasoning for Software-Defined Networks. |
79 | mTCP: a Highly Scalable User-level TCP Stack for Multicore Systems. |
71 | Building Web Applications on Top of Encrypted Data Using Mylar. |
59 | Circuit Switching Under the Radar with REACToR. |
59 | GRASS: Trimming Stragglers in Approximation Analytics. |
56 | DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps. |
54 | Libra: Divide and Conquer to Verify Forwarding Tables in Huge Networks. |
54 | Software Dataplane Verification. |
49 | Aggregation and Degradation in JetStream: Streaming Analytics in the Wide Area. |
41 | SENIC: Scalable NIC for End-Host Rate Limiting. |
34 | ipShield: A Framework For Enforcing Context-Aware Privacy. |
30 | Catch the Whole Lot in an Action: Rapid Precise Packet Loss Notification in Data Center. |
29 | Bolt: Data Management for Connected Homes. |
28 | Enabling Bit-by-Bit Backscatter Communication in Severe Energy Harvesting Environments. |
27 | VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls. |
27 | High Throughput Data Center Topology Design. |
22 | cTPM: A Cloud TPM for Cross-Device Trusted Applications. |
20 | Recursively Cautious Congestion Control. |
17 | Blizzard: Fast Cloud-scale Block Storage for Cloud-oblivious Applications. |
17 | NetCheck: Network Diagnoses from Blackbox Traces. |
15 | Warranties for Faster Strong Consistency. |
14 | PHY Covert Channels: Can you see the Idles? |
10 | Exalt: Empowering Researchers to Evaluate Large-Scale Storage Systems. |
6 | Adtributor: Revenue Debugging in Advertising Systems. |
5 | Operational Experiences with Disk Imaging in a Multi-Tenant Datacenter. |
4 | Easy Freshness with Pequod Cache Joins. |
2013¶
Cited by | Paper title |
---|---|
500 | VeriFlow: Verifying Network-Wide Invariants in Real Time. |
411 | Scaling Memcache at Facebook. |
402 | Composing Software Defined Networks. |
275 | ArrayTrack: A Fine-Grained Indoor Location System. |
271 | Real Time Network Policy Checking Using Header Space Analysis. |
235 | Software Defined Traffic Measurement with OpenSketch. |
178 | MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing. |
171 | Effective Straggler Mitigation: Attack of the Clones. |
161 | Stronger Semantics for Low-Latency Geo-Replicated Storage. |
159 | EyeQ: Practical Network Performance Isolation at the Edge. |
156 | Walkie-Markie: Indoor Pathway Mapping Made Easy. |
126 | Split/Merge: System Support for Elastic Execution in Virtual Middleboxes. |
122 | Demystifying Page Load Performance with WProf. |
119 | Bobtail: Avoiding Long Tails in the Cloud. |
102 | Chatty Tenants and the Cloud Network Sharing Problem. |
92 | Stochastic Forecasts Achieve High Throughput and Low Delay over Cellular Networks. |
86 | F10: A Fault-Tolerant Engineered Network. |
86 | PinPoint: Localizing Interfering Radios. |
80 | Splash: Fast Data Dissemination with Constructive Interference in Wireless Sensor Networks. |
77 | Dasu: Pushing Experiments to the Internet’s Edge. |
75 | Wire Speed Name Lookup: A GPU-based Approach. |
73 | BOSS: Building Operating System Services. |
72 | eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones. |
61 | Yank: Enabling Green Data Centers to Pull the Plug. |
60 | P3: Toward Privacy-Preserving Photo Sharing. |
57 | Scalable Rule Management for Data Centers. |
49 | V-edge: Fast Self-constructive Power Modeling of Smartphones Based on Battery Voltage Dynamics. |
49 | Ensuring Connectivity via Data Plane Mechanisms. |
36 | Embassies: Radically Refactoring the Web. |
33 | Juggling the Jigsaw: Towards Automated Problem Inference from Network Trouble Tickets. |
30 | Robustness in the Salus Scalable Block Store. |
29 | Improving Availability in Distributed Systems with Failure Informers. |
26 | Rhea: Automatic Filtering for Unstructured Cloud Storage. |
22 | ?Box: A Platform for Privacy-Preserving Apps. |
21 | SloMo: Downclocking WiFi Communication. |
18 | Expanding Rural Cellular Networks with Virtual Coverage. |
15 | SoNIC: Precise Realtime Software Access and Control of Wired Networks. |
8 | LOUP: The Principles and Practice of Intra-Domain Route Dissemination. |
2012¶
Cited by | Paper title |
---|---|
2308 | Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. |
453 | Header Space Analysis: Static Checking for Networks. |
403 | A NICE Way to Test OpenFlow Applications. |
328 | How Hard Can It Be? Designing and Implementing a Deployable Multipath TCP. |
310 | Jellyfish: Networking Data Centers Randomly. |
281 | Design and Implementation of a Consolidated Middlebox Architecture. |
257 | Less Is More: Trading a Little Bandwidth for Ultra-Low Latency in the Data Center. |
238 | Aiding the Detection of Fake Accounts in Large Scale Social Online Services. |
228 | Detecting and Defending Against Third-Party Tracking on the Web. |
215 | PACMan: Coordinated Memory Caching for Parallel Jobs. |
212 | OSA: An Optical Switching Architecture for Data Center Networks with Unprecedented Flexibility. |
190 | An Operating System for the Home. |
139 | XIA: Efficient Support for Evolvable Internetworking. |
129 | Serval: An End-Host Stack for Service-Centric Networking. |
125 | Reoptimizing Data Parallel Computing. |
121 | Camdoop: Exploiting In-network Aggregation for Big Data Applications. |
96 | Structured Comparative Analysis of Systems Logs to Diagnose Performance Problems. |
84 | Towards Statistical Queries over Distributed Private User Data. |
73 | Orchestrating the Deployment of Computations in the Cloud with Conductor. |
73 | Koi: A Location-Privacy Platform for Smartphone Apps. |
66 | Toward Predictable Performance in Software Packet-Processing Platforms. |
64 | CORFU: A Shared Log Design for Flash Clusters. |
60 | Optimizing Data Shuffling in Data-Parallel Computation by Understanding User-Defined Functions. |
55 | WiFi-NC : WiFi Over Narrow Channels. |
52 | The TCP Outcast Problem: Exposing Unfairness in Data Center Networks. |
40 | Catching Whales and Minnows Using WiFiNet: Deconstructing Non-WiFi Interference Using WiFi Hardware. |
35 | Fitting Square Pegs Through Round Pipes: Unordered Delivery Wire-Compatible with TCP and TLS. |
31 | Reliable Client Accounting for P2P-Infrastructure Hybrids. |
23 | RPT: Re-architecting Loss Protection for Content-Aware Networks. |
8 | Don’t Lose Sleep Over Availability: The GreenUp Decentralized Wakeup Service. |
2011¶
Cited by | Paper title |
---|---|
950 | Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center. |
614 | Dominant Resource Fairness: Fair Allocation of Multiple Resource Types. |
417 | Design Implementation and Evaluation of Congestion Control for Multipath TCP. |
339 | Sharing the Data Center Network. |
216 | CIEL: A Universal Execution Engine for Distributed Data-Flow Computing. |
193 | Privad: Practical Privacy in Online Advertising. |
169 | Accurate Low-Energy Trajectory Mapping for Mobile Devices. |
150 | SSLShader: Cheap SSL Acceleration with Commodity Processors. |
137 | SSDAlloc: Hybrid SSD/RAM Memory Management Made Easy. |
136 | Diagnosing Performance Changes by Comparing Request Flows. |
130 | ServerSwitch: A Programmable and High Performance Platform for Data Center Networks. |
129 | Towards Street-Level Client-Independent IP Geolocation. |
98 | Improving Wireless Network Performance Using Sensor Hints. |
93 | Profiling Network Performance for Multi-tier Data Center Applications. |
90 | Paxos Replicated State Machines as the Basis of a High-Performance Data Store. |
81 | TritonSort: A Balanced Large-Scale Sorting System. |
66 | PIE in the Sky: Online Passive Interference Estimation for Enterprise WLANs. |
60 | Dewdrop: An Energy-Aware Runtime for Computational RFID. |
59 | FATE and DESTINI: A Framework for Cloud Recovery Testing. |
58 | Bazaar: Strengthening User Reputations in Online Marketplaces. |
55 | SliceTime: A Platform for Scalable and Accurate Network Emulation. |
48 | ETTM: A Scalable Fault Tolerant Network Manager. |
43 | SpecNet: Spectrum Sensing Sans Frontières. |
21 | Bootstrapping Accountability in the Internet We Have. |
20 | A Semantic Framework for Data Analysis in Networked Systems. |
16 | Model Checking a Networked System Without the Network. |
15 | Efficiently Measuring Bandwidth at All Time Scales. |
2010¶
Cited by | Paper title |
---|---|
993 | Hedera: Dynamic Flow Scheduling for Data Center Networks. |
860 | MapReduce Online. |
779 | ElasticTree: Saving Energy in Data Center Networks. |
420 | Airavat: Security and Privacy for MapReduce. |
295 | Volley: Automated Data Placement for Geo-Distributed Cloud Services. |
282 | Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. |
201 | SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies. |
147 | EndRE: An End-System Redundancy Elimination Service for Enterprises. |
140 | Glasnost: Enabling End Users to Detect Traffic Differentiation. |
134 | Reverse traceroute. |
132 | Supporting Demanding Wireless Applications with Frequency-agile Radios. |
129 | Whanau: A Sybil-proof Distributed Hash Table. |
112 | AccuRate: Constellation Based Rate Estimation in Wireless Networks. |
111 | Mugshot: Deterministic Capture and Replay for JavaScript Applications. |
104 | Exploring Link Correlation for Efficient Flooding in Wireless Sensor Networks. |
96 | Experiences with CoralCDN: A Five-Year Operational View. |
95 | Maranello: Practical Partial Packet Recovery for 802.11. |
87 | WebProphet: Automating Performance Prediction for Web Services. |
86 | Optimizing Cost and Performance in Online Service Provider Networks. |
73 | SplitScreen: Enabling Efficient Distributed Malware Detection. |
71 | Cheap and Large CAMs for High Performance Data-Intensive Networked Systems. |
67 | Contracts: Practical Contribution Incentives for P2P Live Streaming. |
50 | Scalable WiFi Media Delivery through Adaptive Broadcasts. |
39 | Centrifuge: Integrated Lease Management and Partitioning for Cloud Services. |
37 | Crom: Faster Web Browsing Using Speculative Execution. |
36 | Seamless BGP Migration with Router Grafting. |
15 | The Architecture and Implementation of an Extensible Web Crawler. |
11 | Prophecy: Using History for High-Throughput Fault Tolerance. |
6 | Carousel: Scalable Logging for Intrusion Prevention Systems. |
2009¶
Cited by | Paper title |
---|---|
378 | Sora: High Performance Software Radio Using General Purpose Multi-core Processors. |
283 | Sybil-Resilient Online Content Voting. |
258 | Somniloquy: Augmenting Network Interfaces to Reduce PC Energy Usage. |
249 | Studying Spamming Botnets Using Botlab. |
214 | Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults. |
183 | Making Routers Last Longer with ViAggre. |
169 | Enabling MAC Protocol Implementations on Software-Defined Radios. |
169 | BotGraph: Large Scale Spamming Botnet Detection. |
167 | MODIST: Transparent Model Checking of Unmodified Distributed Systems. |
160 | Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems. |
140 | AntFarm: Efficient Content Distribution with Managed Swarms. |
137 | TrInc: Small Trusted Hardware for Large Distributed Systems. |
119 | Unraveling the Complexity of Network Management. |
114 | A Platform for Content-based Partial Replication. |
112 | iPlane Nano: Path Prediction for Peer-to-Peer Applications. |
109 | CrystalBall: Predicting and Preventing Inconsistencies in Deployed Distributed Systems. |
106 | Flexible Wide-Area Storage for Distributed Systems with WheelFS. |
97 | Wishbone: Profile-based Partitioning for Sensornet Applications. |
91 | NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge. |
86 | HashCache: Cache Storage for the Next Billion. |
83 | Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks. |
81 | Zeno: Eventually Consistent Byzantine-Fault Tolerance. |
81 | Block-switched Networks: A New Paradigm for Wireless Transport. |
76 | SPLAY: Distributed Systems Evaluation Made Simple (or How to Turn Ideas into Live Systems in a Breeze). |
59 | NetReview: Detecting When Interdomain Routing Goes Wrong. |
46 | Softspeak: Making VoIP Play Well in Existing 802.11 Deployments. |
45 | Tolerating Latency in Replicated State Machines Through Client Speculation. |
44 | Symbiotic Relationships in Internet Routing Overlays. |
42 | PADS: A Policy Architecture for Distributed Storage Systems. |
18 | Modeling and Emulation of Internet Paths. |
16 | RPC Chains: Efficient Client-Server Communication in Geodistributed Systems. |
13 | Bunker: A Privacy-Oriented Platform for Network Tracing. |
2008¶
Cited by | Paper title |
---|---|
743 | Reducing Network Energy Consumption via Sleeping and Rate-Adaptation. |
663 | Energy-Aware Server Provisioning and Load Dispatching for Connection-Intensive Internet Services. |
636 | Remus: High Availability via Asynchronous Virtual Machine Replication. (Best Paper) |
224 | Securing Distributed Systems with Information Flow Control. |
187 | Ostra: Leveraging Trust to Thwart Unwanted Communication. |
185 | One Hop Reputations for Peer to Peer File Sharing Workloads. |
172 | FatVAP: Aggregating AP Backhaul Capacity to Maximize Throughput. |
170 | Designing High Performance Enterprise Wi-Fi Networks. |
161 | Harnessing Exposed Terminals in Wireless Networks. |
145 | D3S: Debugging Deployed Distributed Systems. |
143 | Consensus Routing: The Internet as a Distributed System. (Best Paper) |
137 | Beyond Pilots: Keeping Rural Wireless Networks Alive. |
136 | DieCast: Testing Distributed Systems with an Accurate Scale Model. |
135 | Studying Black Holes in the Internet with Hubble. |
132 | cSamp: A System for Network-Wide Flow Monitoring. |
125 | Passport: Secure and Adoptable Source Authentication. |
101 | Wedge: Splitting Applications into Reduced-Privilege Compartments. |
95 | Detecting In-Flight Page Changes with Web Tripwires. |
85 | BFT Protocols Under Fire. |
83 | Phalanx: Withstanding Multimillion-Node Botnets. |
64 | Uncovering Performance Differences Among Backbone ISPs with Netdiff . |
43 | Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures. |
40 | Effective Diagnosis of Routing Disruptions from End Systems. |
37 | Context-based Routing: Technique Applications and Experience |
37 | Swift: A Fast Dynamic Packet Filter. |
29 | Maelstrom: Transparent Error Correction for Lambda Networks. |
23 | Efficiency Through Eavesdropping: Link-layer Packet Caching. |
22 | San Fermín: Aggregating Large Data Sets Using a Binomial Swap Forest. |
17 | NetComplex: A Complexity Metric for Networked System Designs. |
15 | UsenetDHT: A Low-Overhead Design for Usenet. |
2007¶
Cited by | Paper title |
---|---|
959 | Black-box and Gray-box Strategies for Virtual Machine Migration. |
539 | Do Incentives Build Robustness in BitTorrent? (Awarded Best Student Paper). |
395 | X-Trace: A Pervasive Network Tracing Framework. |
333 | WiLDNet: Design and Implementation of High Performance WiFi Based Long Distance Networks. |
314 | Network Coordinates in the Wild. |
208 | Life Death and the Critical Transition: Finding Liveness Bugs in Systems Code (Awarded Best Paper). |
193 | R-BGP: Staying Connected in a Connected World. |
180 | Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts. |
160 | Tesseract: A 4D Network Control Plane. |
126 | Exploiting Similarity for Multi-Source Downloads Using File Handprints. |
123 | Peering Through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification. |
122 | TightLip: Keeping Applications from Spilling the Beans. |
120 | Friday: Global Comprehension for Distributed Replay. |
109 | A Systematic Framework for Unearthing the Missing Links: Measurements and Impact. |
107 | S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks. |
92 | Cobra: Content-based Filtering and Aggregation of Blogs and RSS Feeds. |
89 | WiDS Checker: Combating Bugs in Distributed Systems. |
77 | Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems. |
75 | Information Slicing: Anonymity Using Unreliable Overlays. |
66 | dFence: Transparent Network-based Denial of Service Mitigation. |
65 | An Experimentation Workbench for Replayable Networking Research. |
57 | A Location-Based Management System for Enterprise Wireless LANs. |
48 | Ricochet: Lateral Error Correction for Time-Critical Multicast. |
46 | The Flexlab Approach to Realistic Evaluation of Networked Systems. |
39 | Ensuring Content Integrity for Untrusted Peer-to-Peer Content Distribution Networks. |
35 | Mutually Controlled Routing with Independent ISPs. |
32 | SAAR: A Shared Control Plane for Overlay Multicast. |
0 | Security of Voting Systems. |
2006¶
Cited by | Paper title |
---|---|
355 | Pip: Detecting the Unexpected in Distributed Systems. |
302 | Experience with an Object Reputation System for Peer-to-Peer Filesharing (Awarded Best Paper). |
293 | Efficient Replica Maintenance for Distributed Storage Systems. |
255 | Colyseus: A Distributed Architecture for Online Multiplayer Games. |
219 | Open Versus Closed: A Cautionary Tale. |
218 | Geographic Routing Without Planarization. |
186 | OASIS: Anycast for Any Service. |
177 | Exploiting Availability Prediction in Distributed Systems. |
169 | RE: Reliable Email. |
162 | Corona: A High Performance Publish-Subscribe System for the World Wide Web. |
149 | PRACTI Replication. |
142 | An Architecture for Internet Data Transfer. |
139 | PRESTO: Feedback-driven Data Management in Sensor Networks. |
138 | To Infinity and Beyond: Time-Warped Network Emulation. |
136 | Scale and Performance in the CoBlitz Large-File Distribution Service. |
115 | Virtualization Aware File Systems: Getting Beyond the Limitations of Virtual Disks. |
94 | Subtleties in Tolerating Correlated Failures in Wide-area Storage Systems. |
84 | OCALA: An Architecture for Supporting Legacy Applications over Overlays. |
63 | Practical Data-Centric Storage. |
51 | PCP: Efficient Endpoint Congestion Control. |
49 | The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery. |
46 | Distributed Quota Enforcement for Spam Control. |
36 | OverCite: A Distributed Cooperative CiteSeer. |
29 | Pastwatch: A Distributed Version Control System. |
22 | Olive: Distributed Point-in-Time Branching Storage for Real Systems. |
13 | Na Kika: Secure Service Execution and Composition in an Open Edge-Side Computing Network. |
11 | Connection Conditioning: Architecture-Independent Support for Simple Robust Servers. |
9 | Availability of Multi-Object Operations (Awarded Best Paper). |
2005¶
Cited by | Paper title |
---|---|
3127 | Live Migration of Virtual Machines. |
530 | Design and Implementation of a Routing Control Platform. |
490 | Geographic Routing Made Practical. |
442 | Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds (Awarded Best Student Paper). |
438 | Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets. |
356 | Detecting BGP Configuration Faults with Static Analysis (Awarded Best Paper). |
301 | Glacier: Highly Durable Decentralized Storage Despite Massive Correlated Failures. |
270 | Active Sensor Networks. |
219 | Performance Modeling and System Management for Multi-component Online Services. |
216 | Bandwidth-efficient Management of DHT Routing Tables. |
214 | IP Fault Localization Via Risk Modeling. |
210 | Shark: Scaling File Servers via Cooperative Caching. |
194 | The Collective: A Cache-Based System Management Architecture. |
193 | Decentralized Adaptive Resource Allocation for Sensor Networks. |
181 | Debunking Some Myths About Structured and Unstructured Overlays. |
179 | Designing Extensible IP Router Software. |
163 | Sustaining Cooperation in Multi-hop Wireless Networks. |
154 | Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network. |
136 | Cashmere: Resilient Anonymous Routing. |
130 | Using Emulation to Understand and Improve Wireless Networks and Applications. |
106 | Negotiation-Based Routing Between Neighboring ISPs. |
82 | Improving Web Availability for Clients with MONET. |
70 | Quorum: Flexible Quality of Service for Internet Services. |
31 | ACMS: The Akamai Configuration Management System. |
28 | Trickles: A Stateless Network Stack for Improved Scalability Resilience and Flexibility |
6 | The Challenges of Delivering Content and Applications on the Internet. |
2004¶
Cited by | Paper title |
---|---|
1182 | Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks (Awarded Best Paper!). |
608 | Democratizing Content Publication with Coral. |
589 | Total Recall: System Support for Automated Availability Management. |
573 | Operating Systems Support for Planetary-Scale Network Services. |
555 | The Emergence of Networking Abstractions and Techniques in TinyOS. |
511 | Programming Sensor Networks Using Abstract Regions. |
452 | Designing a DHT for Low Latency and High Throughput. |
380 | Path-Based Failure and Evolution Management. |
308 | OverQoS: An Overlay Based Architecture for Enhancing Internet QoS. |
301 | Efficient Routing for Peer-to-Peer Overlays. |
276 | Listen and Whisper: Security Mechanisms for BGP (Awarded Best Student Paper!). |
238 | Untangling the Web from DNS. |
228 | Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays. |
222 | Hybrid Global-Local Indexing for Efficient Peer-to-Peer Information Retrieval. |
176 | Contract-Based Load Management in Federated Distributed Systems. |
164 | MACEDON: Methodology for Automatically Creating Evaluating and Designing Overlay Networks |
158 | Model Checking Large Network Protocol Implementations. |
143 | Explicit Control in the Batch-Aware Distributed File System. |
138 | OSPF Monitoring: Architecture Design and Deployment Experience |
133 | Measurement and Analysis of Spyware in a University Environment. |
113 | Constructing Services with Interposable Virtual Hardware. |
84 | Design Implementation and Evaluation and Duplicate Transfer Detection in HTTP |
58 | Session State: Beyond Soft State. |
54 | Structure Management for Scalable Overlay Service Construction. |
53 | Consistent and Automatic Replica Regeneration. |
24 | SWAP: A Scheduler with Automatic Process Dependency Detection. |
8 | TimeLine: A High Performance Archive for a Distributed Object Store. |
3 | Running Massively Multiplayer Games as a Business. |