Filters








812 Hits in 4.8 sec

Towards more constructive reviewing of SIGCOMM papers

Jeffrey C. Mogul
2013 Computer communication review  
The SIGCOMM Technical Steering Committee (TSC) has been addressing this issue, with the goal of encouraging cultural change without undermining the integrity of peer review.  ...  Many people in CS in general, and SIGCOMM in particular, have expressed concerns about an increasingly "hypercritical" approach to reviewing, which can block or discourage the publication of innovative  ...  members to contribute their own suggestions towards this goal, and towards improving the SIGCOMM review process in general.  ... 
doi:10.1145/2500098.2500112 fatcat:656r2ithzragpggkyxk44zbnnm

The experimental literature of the internet: an annotated bibliography

Jeffrey C. Mogul
1989 Computer communication review  
It connects computer systems from almost every major vendor, using a wide variety of wide-area and local-area network technology, and is in continual use by thousands of people.  ...  This annotated bibliography covers the literature of the Internet as an experiment: publications which convey the experience acquired by the experimenters.  ...  I also made heavy use of the bibliographies of books by Douglas Comer [2] and Craig Partridge [4].  ... 
doi:10.1145/66093.66096 fatcat:hoevmbljfffgbctb3qpky5omwe

Open issues in organizing computer systems conferences

Jeffrey C. Mogul, Tom Anderson
2008 Computer communication review  
In conjunction with WOWCS, we survey some previous publications that discuss open issues related to organizing computer systems conferences, especially concerning conduct and management of the review process  ...  Acknowledgments We would like to thank a lot of people for helping us to write this article, including the other members of the WOWCS PC, the WOWCS authors, and especially Mary Baker, Ed Lazowska, Hank  ...  The PC co-chairs of SIGCOMM 2006 (Tom Anderson and Nick McKeown) expanded the program to include more papers than at any prior SIGCOMM.  ... 
doi:10.1145/1384609.1384623 fatcat:keftykbg65gnvlbxn6myrj27re

Opportunistic message routing using multi-layer social networks

Annalisa Socievole, Eiko Yoneki, Floriano De Rango, Jon Crowcroft
2013 Proceedings of the 2nd ACM workshop on High performance mobile opportunistic systems - HP-MOSys '13  
To select an e↵ective forwarding node, ML-SOR measures the forwarding capability of a node when compared to an encountered node in terms of node centrality, tie strength and link prediction.  ...  In this paper, we propose a novel opportunistic routing approach, called ML-SOR (Multi-layer Social Network based Routing), which extracts social network information from multiple social contexts.  ...  The remainder of the paper is organized as follows. Section 2 provides a review of existing works in this area. Section 3 formally defines a multi-layer social network.  ... 
doi:10.1145/2507908.2507923 dblp:conf/mswim/SocievoleYRC13 fatcat:ven5m74d55akrj6di7vk4anvxi

ML-SOR: Message routing using multi-layer social networks in opportunistic communications

A. Socievole, E. Yoneki, F. De Rango, J. Crowcroft
2015 Computer Networks  
In this paper, we start defining a multi-layer social network model combining the social network detected through encounters with other social networks and investigate the relationship between these social  ...  To select an effective forwarding node, ML-SOR measures the forwarding capability of a node when compared to an encountered node in terms of node centrality, tie strength and link prediction.  ...  The authors wish to thank Damien Fay, Jérôme Kunegis and the anonymous reviewers for their insightful suggestions.  ... 
doi:10.1016/j.comnet.2015.02.016 fatcat:p5fuhqvt6rf5paa6sve7p3umpi

802.11 user fingerprinting

Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, David Wetherall
2007 Proceedings of the 13th annual ACM international conference on Mobile computing and networking - MobiCom '07  
In this paper, we demonstrate that pseudonyms are insufficient to prevent tracking of 802.11 devices because implicit identifiers, or identifying characteristics of 802.11 traffic, can identify many users  ...  The ubiquity of 802.11 devices and networks enables anyone to track our every move with alarming ease.  ...  We thank CRAWDAD [31] for making the sigcomm trace available and Yu-Chung Cheng for providing us with the ucsd trace.  ... 
doi:10.1145/1287853.1287866 dblp:conf/mobicom/PangGGSW07 fatcat:kpbg3fdujrefxmx25mzkv2ph6i

Bootstrapping evolvability for inter-domain routing with D-BGP

Raja R. Sambasivan, David Tran-Lam, Aditya Akella, Peter Steenkiste
2017 Proceedings of the Conference of the ACM Special Interest Group on Data Communication - SIGCOMM '17  
Terminology: Islands refer to a cluster of one or more contiguous ASes that support the same set of routing protocols. Neighbors of islands run a di erent set of protocols.  ...  To help, this paper proposes Darwin's BGP (D-BGP), a modi ed version of BGP that can support evolvability to new protocols.  ...  SIGCOMM, Aug. . [ ] D. L. Tennenhouse and D. J. Wetherall. Towards an Active Network Architecture. SIGCOMM Computer Communication Review, ( ): -, Apr. . [ ] K. Varadhan, R. Govindan, and D. Estrin.  ... 
doi:10.1145/3098822.3098857 dblp:conf/sigcomm/SambasivanTAS17 fatcat:oqw6w7y2k5du3ige3qq7n4xo24

An architectural approach for integrated network and systems management

Raouf Boutaba, Simon Znaty
1995 Computer communication review  
In this paper we introduce an architecture for the integrated management of all resources in a networked system, i.e. application, system and network resources.  ...  a sophisticated management of resources.  ...  ACM SIGCOMM -25-Computer Communication Review II.2.  ... 
doi:10.1145/216701.216703 fatcat:xfovkxcgq5ca7moo5226mckdk4

Using lightweight modeling to understand chord

Pamela Zave
2012 Computer communication review  
Under the same assumptions about failure behavior as made in the Chord papers, no published version of Chord is correct.  ...  The paper also discusses the significance of these results, describes briefly how Alloy is used to model and reason about Chord, and compares Alloy analysis to model-checking.  ...  It was first presented in a 2001 SIGCOMM paper [9] which won the 2011 SIGCOMM Test-of-Time Award.  ... 
doi:10.1145/2185376.2185383 fatcat:dlnqdmlsangbzkqduftdmlaor4

The architecture and traffic management of wireless collaborated hybrid data center network

He Huang, Xiangke Liao, Shanshan Li, Shaoliang Peng, Xiaodong Liu, Bin Lin
2013 Computer communication review  
This paper introduces a novel wireless collaborated hybrid data center architecture called RF-HYBRID that could optimize the effect of wireless transmission while reduce the complexity of wired network  ...  Copyrights for thirdparty components of this work must be honored. For all other uses, contact the owner/author(s). SIGCOMM'13, August 12-16, 2013, Hong Kong, China.  ...  First, 2D torus eliminates the switching fabric and has more regular structure.  ... 
doi:10.1145/2534169.2491724 fatcat:2i5ma37yjvazhhin4jo4qoyqjy

Synthesis of communications protocols

Kassem Saleh
1996 Computer communication review  
In this paper, we introduce protocol synthesis in the context of the protocol engineering process, and we briefly describe and survey the main features of the proposed synthesis methods.  ...  Protocol synthesis attempts to formalize and automate the process of designing communications protocols.  ...  Finally, I am grateful for the valuable suggestions by the anonymous referees which helped improving an earlier version of this paper.  ... 
doi:10.1145/242896.242900 fatcat:xocnk2l3xbhk7cvy4bhqxqee5e

Time series analysis of temporal networks

Sandipan Sikdar, Niloy Ganguly, Animesh Mukherjee
2016 European Physical Journal B : Condensed Matter Physics  
We, in this paper show that even if the network structure at a future time point is not available one can still manage to estimate its properties.  ...  We propose a novel method to map a temporal network to a set of time series instances, analyze them and using a standard forecast model of time series, try to predict the properties of a temporal network  ...  Rest of the paper is organized as follows. In Section 2 we present a brief review of the literature. Section 3 describes the framework for mapping temporal networks to time series.  ... 
doi:10.1140/epjb/e2015-60654-7 fatcat:d7brxqf5zfam5d5cvlkvbw7r4e

Towards passive analysis of anycast in global routing

Rui Bian, Shuai Hao, Haining Wang, Amogh Dhamdere, Alberto Dainotti, Chase Cotton
2019 Computer communication review  
The methodology can be useful for informing other research in this space, hence the reviewers recommended this paper to be accepted into CCR.  ...  The paper brings insights into the reasons behind misclassifications and impact of remote peering on path selection.  ...  ACKNOWLEDGMENTS We would like to thank our Editor, Olivier Bonaventure, as well as Ignacio Castro and the anonymous reviewers for their insightful comments.  ... 
doi:10.1145/3371927.3371930 fatcat:cgjxxdejyffonmlfnhfiacu6ny

Cone of silence

Georgios Nikolaidis, Astrit Zhushi, Kyle Jamieson, Brad Karp
2010 Computer communication review  
In this paper, we present Cone of Silence (CoS), a technique that leverages software-steerable directional antennas to improve the capacity of indoor 802.11 wireless networks by adaptively nulling interference  ...  point from a sender while nulling inteference from one or more concurrent interferers.  ...  Notice the phase differences among the three received instances of the signal. Instances of the same signal received by distinct elements combine either constructively or destructively.  ... 
doi:10.1145/1851275.1851248 fatcat:arvisaszindxbk5vnrf7wkqycy

The changing nature of network traffic

A. Feldmann, A. C. Gilbert, W. Willinger, T. G. Kurtz
1998 Computer communication review  
In fact, the first ACM SIGCOMM 7 Computer Communication Review Computer Communication Review  ...  In particular, we (i) identify ACM SIGCOMM 5 Computer Communication Review distinct scaling regions in aggregate packet-level WAN traces, one for small time scales (a few hundreds of milliseconds and below  ...  Acknowledgments Many of the traces considered in this paper were collected using the tcpdump packet capture tool developed Finally, we are very grateful to P. Abry and D.  ... 
doi:10.1145/279345.279346 fatcat:qsudco4uxrdizgazvqc7i5l2gy
« Previous Showing results 1 — 15 out of 812 results