SIGCOMM 2008

AUGUST 17-22
SEATTLE, WA, USA

List of accepted posters

(authors: please see the logistics page)

Enhancing Resilience of P2P Systems to DDoS Reflector Attacks
Xin Sun (Purdue University); Ruben Torres (Purdue University); Sanjay Rao (Purdue University)
Towards Automated Auditing for Network Configuration Changes
Yu-Wei Sung (Purdue University); Sanjay Rao (Purdue University); Subhabrata Sen (AT&T Labs); Stephen Leggett (AT&T Inc.)
A Novel Approach to Reduce Traffic Chaos in Emergency and Evacuation Scenarios
Syed R. Rizvi (Old Dominion University); Stephan Olariu (Old Dominion University); Mona E. Rizvi (Norfolk State University); Michele C. Weigle (Old Dominion University)
Packets with Provenance
Anirudh Ramachandran (Georgia Tech); Kaushik Bhandankar (Georgia Tech); Mukarram Bin Tariq (Georgia Tech); Nick Feamster (Georgia Tech)
Towards Disruption-Free Intra-Domain Routing
Ang Li (UC Irvine); Xiaowei Yang (UC Irvine); David Wetherall (Intel Research)
FaceTrust: Collaborative Unwanted Traffic Mitigation based on Social Networks
Michael Sirivianos (UC Irvine); Xiaowei Yang (UC Irvine)
Path Based Network Modeling and Emulation
Pramod Sanaga (University of Utah); Jonathon Duerig (University of Utah); Robert Ricci (University of Utah); Jay Lepreau (University of Utah)
The Local and Global Effects of Traffic Shaping in the Internet
Massimiliano Marcon (MPI-SWS); Marcel Dischinger (MPI-SWS); Krishna P. Gummadi (MPI-SWS); Amin Vahdat (UC San Diego)
Predicting Wi-Fi Availability using Bluetooth and Cellular Signals
Ganesh Ananthanarayanan (UC Berkeley); Ion Stoica (UC Berkeley)
ISP-Friendly Peer Matching Algorithms
ChengHsin Hsu (Simon Fraser University); Nitin Chiluka (Simon Fraser University); Mohamed Hefeeda (Simon Fraser University)
Reachability Monitoring and Verification in Enterprise Networks
Bo Zhang (Rice University); T. S. Eugene Ng (Rice University)
Active Probing to Classify Internet Address Blocks
Xue Cai (USC/ISI); John Heidemann (USC/ISI)
A Pipelined Indexing Hash Table using Bloom and Fingerprint Filters for IP Lookup
Heeyeol Yu (Texas A&M University); Rabi Mahapatra (Texas A&M University)
Two bits are enough
Ihsan Ayyub Qazi (University of Pittsburgh); Lachlan L. H. Andrew (Caltech); Taieb Znati (University of Pittsburgh and NSF)
Ratpack: Communication in a Sparse Dynamic Network
Jo Bitsch (RWTH Aachen University); Klaus Wehrle (RWTH Aachen University); Okuary Osechas (Tubingen University); Johannes Thiele (Tubingen University)
Topological Transformation Approaches to Optimizing TCAM-Based Packet Processing Systems
Chad R. Meiners (Michigan State University); Alex X. Liu (Michigan State University); Eric Torng (Michigan State University)
A Taxonomy of Capabilities Based DDoS Defense Architectures
Vamsi Kambhampati (Colorado State University); Dan Massey (Colorado State University); Christos Papadopoulos (Colorado State University)
Unraveling the Subtleties of Link Estimation and Routing in Wireless Sensor Networks
Hongwei Zhang (Wayne State University); Lifeng Sang (The Ohio State University); Anish Arora (The Ohio State University)
Monitoring Network Bias
Gergely Biczok (Northwestern University); Whitney Young (Northwestern University); Aleksandar Kuzmanovic (Northwestern University)
Leveraging Altruistic Peers to Reduce the Bandwidth Costs of Free Content Downloads
Cameron Dale (Simon Fraser University); Jiangchuan Liu (Simon Fraser University)
Revisiting HTTP Traffic in the New Age
Wei Li (University of Cambridge); Andrew W. Moore (University of Cambridge); Marco Canini (University of Genoa)
Coverage Maximization in Small World Network Under Bandwidth Constraint
Subrata Nandi (Indian Institute of Technology, Kharagpur); Lutz Brusch (Technical University of Dresden); Ajit Pal (Indian Institute of Technology, Kharagpur); Niloy Ganguly (Indian Institute of Technology, Kharagpur)
Relaying a Fountain code across multiple nodes
Ramakrishna Gummadi; Ramavarapu Sreenivas
OneClick: A Framework for Capturing Users' Network Experiences
Cheng-Chun Tu (Academia Sinica); Kuan-Ta Chen (Academia Sinica); Yu-Chun Chang (National Taiwan University); Chin-Laung Lei (National Taiwan University)
Detecting Peer-to-Peer Activity by Signaling Packet Counting
Chen-Chi Wu (National Taiwan University); Kuan-Ta Chen (Academia Sinica); Yu-Chun Chang (National Taiwan University); Chin-Laung Lei (National Taiwan University)
A User-Centric Framework for Comparing Applications' Network Robustness
Hung-Hsuan Chen (Academia Sinica); Kuan-Ta Chen (Academia Sinica); Cheng-Chun Tu (Academia Sinica)
Stealthy IP Prefix Hijacking: Don't Bite More Than You Can Chew
Christian McArthur (Texas State University-San Marcos); Mina Guirguis (Texas State University-San Marcos)
Digging into KAD Users' Shared Folders
Marcin Pietrzyk (Orange Labs); Guillaume Urvoy-Keller (Institut Eurecom); Jean-Laurent Costeux (Orange Labs)
On the Problem of Channel Selection in Live Streaming IPTV Systems
Meeyoung Cha (MPI-SWS); Krishna P. Gummadi (MPI-SWS); Pablo Rodriguez (Telefonica Research Barcelona)
Detecting DDoS Attacks Against Web Server via Lightweight TCM-KNN Algorithm
Yang Li (Institute of Computing Technology; Chinese Academy of Sciences); Li Guo (Institute of Computing Technology; Chinese Academy of Sciences); Bin-Xing Fang (Institute of Computing Technology; Chinese Academy of Sciences)
Towards Zero-Cost Retransmission through Physical-Layer Network Coding in Wireless Networks
Sangki Yun (Korea University); Hyogon Kim (Korea University)
On the Accurate Identification of Network Paths having a Common Bottleneck
Muhammad Murtaza Yousaf (University of Innsbruck); Michael Welzl (University of Innsbruck); Bulent Yener (Rensselaer Polytechnic Institute)
Modeling the Flow of Information in a Social Network
Sarita Yardi (Georgia Tech); Amy Bruckman (Georgia Tech)