SIGCOMM

Results: 1060



#Item
951Detecting price and search discrimination on the Internet Jakub Mikians† , László Gyarmati? , Vijay Erramilli? , Nikolaos Laoutaris? Universitat Politecnica de Catalunya† , ? Telefonica Research [removed]

Detecting price and search discrimination on the Internet Jakub Mikians† , László Gyarmati? , Vijay Erramilli? , Nikolaos Laoutaris? Universitat Politecnica de Catalunya† , ? Telefonica Research [removed]

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2012-10-19 18:32:42
952How to Read a Paper S. Keshav David R. Cheriton School of Computer Science, University of Waterloo Waterloo, ON, Canada  [removed]

How to Read a Paper S. Keshav David R. Cheriton School of Computer Science, University of Waterloo Waterloo, ON, Canada [removed]

Add to Reading List

Source URL: ccr.sigcomm.org

Language: English - Date: 2007-06-27 10:43:35
953Worst	
  Case	
  Analysis	
  :	
  	
   Our	
  Strength	
  is	
  Our	
  Weakness	
   Michael	
  Mitzenmacher	
   Harvard	
  University	
    Prelude	
  

Worst  Case  Analysis  :     Our  Strength  is  Our  Weakness   Michael  Mitzenmacher   Harvard  University   Prelude  

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2011-09-21 23:37:00
954Network Exception Handlers: Host-network Control in Enterprise Networks Thomas Karagiannis, Richard Mortier and Antony Rowstron {thomkar, antr}@microsoft.com, [removed] Microsoft Research Cambridge, UK

Network Exception Handlers: Host-network Control in Enterprise Networks Thomas Karagiannis, Richard Mortier and Antony Rowstron {thomkar, antr}@microsoft.com, [removed] Microsoft Research Cambridge, UK

Add to Reading List

Source URL: www.sigcomm.org

Language: English - Date: 2011-07-27 15:41:09
955A

A"“Hitchhiker’s”"Guide"to"Fast"and"Efficient"Data" Reconstruc:on"in"Erasure;coded"Data"Centers K. V. Rashmi, Nihar Shah, D. Gu, H. Kuang, D. Borthakur, K. Ramchandran

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2014-09-01 23:12:59
956Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild † †

Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild † †

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-11-04 06:52:28
957Microsoft Word - djw-cv-2011-nov.docx

Microsoft Word - djw-cv-2011-nov.docx

Add to Reading List

Source URL: djw.cs.washington.edu

Language: English - Date: 2011-11-08 01:34:02
958Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching Shirin Nilizadeh Sonia Jahid

Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching Shirin Nilizadeh Sonia Jahid

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2012-12-03 11:30:30
959Theophilus Benson Contact Info Email: [removed]  Employment

Theophilus Benson Contact Info Email: [removed] Employment

Add to Reading List

Source URL: www.cs.duke.edu

Language: English - Date: 2014-08-01 12:01:47
    960The Workshop on Active Internet Measurements (AIMS) Report kc claffy Marina Fomenkov

    The Workshop on Active Internet Measurements (AIMS) Report kc claffy Marina Fomenkov

    Add to Reading List

    Source URL: www.caida.org

    Language: English - Date: 2014-12-16 19:24:10