Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications最新文献

筛选
英文 中文
Session details: Analysis 会话详细信息:
Matthew Hertz
{"title":"Session details: Analysis","authors":"Matthew Hertz","doi":"10.1145/3261565","DOIUrl":"https://doi.org/10.1145/3261565","url":null,"abstract":"","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"638 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133101608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Wireless 会议详情:无线
B. Karp
{"title":"Session details: Wireless","authors":"B. Karp","doi":"10.1145/3249785","DOIUrl":"https://doi.org/10.1145/3249785","url":null,"abstract":"","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117131091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Analysis 会话详细信息:
W. Willinger
{"title":"Session details: Analysis","authors":"W. Willinger","doi":"10.1145/3263449","DOIUrl":"https://doi.org/10.1145/3263449","url":null,"abstract":"","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132471354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications 2006年计算机通信应用、技术、体系结构和协议会议论文集
L. Rizzo, T. Anderson, N. McKeown
{"title":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","authors":"L. Rizzo, T. Anderson, N. McKeown","doi":"10.1145/1159913","DOIUrl":"https://doi.org/10.1145/1159913","url":null,"abstract":"It is my pleasure to welcome you to Pisa for the 2006 edition of the ACM SIGCOMM conference. In keeping with our tradition, the conference will open with a keynote speech by the latest winner of the SIGCOMM Award, an honor that this year goes to Domenico Ferrari.Organizing a conference of the size and reputation of SIGCOMM is always a challenge, and it would not have been possible without the help of many people and organizations, all of which I would like to thank. It is my pleasure to start with the Universita di Pisa, which not only provided a huge help with logistics, equipment, administrative resources, and even some funding on it's own, but also let me and the Local Organization Chair, Giovanni Stea, spend a large amount of our time working on the organization of SIGCOMM 2006.In addition to the work of many individuals, this year we were extremely lucky, as we could rely on generous help from a number of companies and institutions. Our Gold Supporters are Cisco Systems and the National Science Foundation, who both provided funding for the Student Travel Grants. (Travel Grants also were made possible by the new SIGCOMM-sponsored Geodiversity Travel Grants program.) Silver Supporters are Microsoft Research, Intel, and Alcatel, who partly supported various social events. Last but not least, we have a large number of Bronze Supporters: AT&T, Digium, Google, HP, IIJ, Nokia, Tiscali and the Universita di Pisa.I am of course indebted to the other people involved in the event in various roles, who also invested many, many days on their tasks: Tom Anderson, Kenjiro Cho, Marco Conti, Jaudelice C. de Oliveira, Christophe Diot, Chris Edmondson-Yurkanan, Serge Fdida, Gianluca Iannaccone, Brad Karp, Laurent Mathy, Nick McKeown, Fran Spinola, Joe Touch, and Ellen Zegura. The team worked in close cooperation over a period of almost a year, exchanging thousands of emails (diligently archived for the benefit of next year's committee).For several of us, this was our first experience with this kind of work, and that made the task even more challenging. We would not have succeeded without help from the SIG officers, Jennifer Rexford and Tilman Wolf, and last year's General Chair, Roch Guerin, who was a precious resource for us in explaining how the process was run in the past.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123111744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Session details: Routing 2 会话详细信息:路由2
M. Handley
{"title":"Session details: Routing 2","authors":"M. Handley","doi":"10.1145/3249793","DOIUrl":"https://doi.org/10.1145/3249793","url":null,"abstract":"","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131652549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Routing 1 会话详细信息:路由1
B. Davie
{"title":"Session details: Routing 1","authors":"B. Davie","doi":"10.1145/3263446","DOIUrl":"https://doi.org/10.1145/3263446","url":null,"abstract":"","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129955958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Applications 会话详细信息:应用
S. Seshan
{"title":"Session details: Applications","authors":"S. Seshan","doi":"10.1145/3249794","DOIUrl":"https://doi.org/10.1145/3249794","url":null,"abstract":"","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126529989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Measurement 会议详情:测量
D. Andersen
{"title":"Session details: Measurement","authors":"D. Andersen","doi":"10.1145/3262943","DOIUrl":"https://doi.org/10.1145/3262943","url":null,"abstract":"","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127082412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Jigsaw: solving the puzzle of enterprise 802.11 analysis 拼图:解决企业802.11分析难题
Yuchung Cheng, J. Bellardo, Péter Benkö, A. Snoeren, G. Voelker, S. Savage
{"title":"Jigsaw: solving the puzzle of enterprise 802.11 analysis","authors":"Yuchung Cheng, J. Bellardo, Péter Benkö, A. Snoeren, G. Voelker, S. Savage","doi":"10.1145/1159913.1159920","DOIUrl":"https://doi.org/10.1145/1159913.1159920","url":null,"abstract":"The combination of unlicensed spectrum, cheap wireless interfaces and the inherent convenience of untethered computing have made 802.11 based networks ubiquitous in the enterprise. Modern universities, corporate campuses and government offices routinely de-ploy scores of access points to blanket their sites with wireless Internet access. However, while the fine-grained behavior of the 802.11 protocol itself has been well studied, our understanding of how large 802.11 networks behave in their full empirical complex-ity is surprisingly limited. In this paper, we present a system called Jigsaw that uses multiple monitors to provide a single unified view of all physical, link, network and transport-layer activity on an 802.11 network. To drive this analysis, we have deployed an infrastructure of over 150 radio monitors that simultaneously capture all 802.11b and 802.11g activity in a large university building (1M+ cubic feet). We describe the challenges posed by both the scale and ambiguity inherent in such an architecture, and explain the algorithms and inference techniques we developed to address them. Finally, using a 24-hour distributed trace containing more than 1.5 billion events, we use Jigsaw's global cross-layer viewpoint to isolate performance artifacts, both explicit, such as management inefficiencies, and implicit, such as co-channel interference. We believe this is the first analysis combining this scale and level of detail for a production 802.11 network.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116800516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 364
Modeling adoptability of secure BGP protocol 安全BGP协议的建模可采性
Haowen Chan, D. Dash, A. Perrig, Hui Zhang
{"title":"Modeling adoptability of secure BGP protocol","authors":"Haowen Chan, D. Dash, A. Perrig, Hui Zhang","doi":"10.1145/1159913.1159946","DOIUrl":"https://doi.org/10.1145/1159913.1159946","url":null,"abstract":"Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the greatest hurdle for BGP security, there has been little quantitative research into what properties contribute the most to the adoptability of a security scheme. In this paper, we provide a model for assessing the adoptability of a secure BGP routing protocol. We perform this evaluation by simulating incentives compatible adoption decisions of ISPs on the Internet under a variety of assumptions. Our results include: (a) the existence of a sharp threshold, where, if the cost of adoption is below the threshold, complete adoption takes place, while almost no adoption takes place above the threshold; (b) under a strong attacker model, adding a single hop of path authentication to origin authentication yields similar adoptability characteristics as a full path security scheme; (c) under a weaker attacker model, adding full path authentication (e.g., via S-BGP [9]) significantly improves the adoptability of BGP security over weaker path security schemes such as soBGP [16]. These results provide insight into the development of more adoptable secure BGP protocols and demonstrate the importance of studying adoptability of protocols.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126034369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信