SIGCOMM

Results: 1060



#Item
31

Can Censorship Measurements Be Safe(r)? Ben Jones Nick Feamster Princeton University

Add to Reading List

Source URL: conferences.sigcomm.org

- Date: 2015-10-30 12:21:45
    32

    Re-evaluating Measurement Algorithms in Software Omid Alipourfard, Masoud Moshref, Minlan Yu University of Southern California {alipourf, moshrefj, minlanyu}@usc.edu ABSTRACT

    Add to Reading List

    Source URL: conferences.sigcomm.org

    - Date: 2015-10-30 12:24:48
      33

      Enabling a “RISC” Approach for Software-Defined Monitoring using Universal Streaming Zaoxing Liu † , Greg Vorsanger† , Vladimir Braverman† , Vyas Sekar? † Johns Hopkins University ? Carnegie Mellon University

      Add to Reading List

      Source URL: conferences.sigcomm.org

      - Date: 2015-10-30 12:24:53
        34

        A Case for Marrying Censorship Measurements with Circumvention Aqib Nisar, Aqsa Kashaf, Zartash Afzal Uzmi, Ihsan Ayyub Qazi SBA School of Science and Engineering LUMS, Lahore, Pakistan

        Add to Reading List

        Source URL: conferences.sigcomm.org

        - Date: 2015-10-30 12:22:08
          35

          ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes Maria Konte Roberto Perdisci

          Add to Reading List

          Source URL: conferences.sigcomm.org

          - Date: 2015-07-29 16:55:45
            36

            MoonGen: A Scriptable High-Speed Packet Generator

            Add to Reading List

            Source URL: conferences.sigcomm.org

            - Date: 2015-09-25 07:44:10
              37

              Time’s Forgotten: Using NTP to understand Internet Latency Ramakrishnan Durairajan†, Sathiya Kumaran Mani† , Joel Sommers* , Paul Barford†+ {rkrish,sathiya,pb}@cs.wisc.edu, † University

              Add to Reading List

              Source URL: conferences.sigcomm.org

              - Date: 2015-10-30 12:24:37
                38

                Differential Provenance: Better Network Diagnostics with Reference Events

                Add to Reading List

                Source URL: conferences.sigcomm.org

                - Date: 2015-10-30 12:25:15
                  39

                  Automated Network Repair with Meta Provenance Yang Wu Ang Chen University of Pennsylvania

                  Add to Reading List

                  Source URL: conferences.sigcomm.org

                  - Date: 2015-10-30 12:25:18
                    40

                    Destroying networks for fun (and profit) Nick Shelly∗§, Brendan Tschaen†, Klaus-Tycho Förster∗, Michael Chang‡, Theophilus Benson†, Laurent Vanbever∗ ∗ ETH Zürich, ‡Princeton University, †Duke Unive

                    Add to Reading List

                    Source URL: conferences.sigcomm.org

                    - Date: 2015-10-30 12:23:34
                      UPDATE