10:20
|
Alp Simsek, Isaac Cambron, Rupesh Kanthan
|
Inferring Router Behavior
|
10:40
|
Shan Sinha, Srikanth Kandula
|
HTTPGuard: Protecting Web Servers from Automated Content Request Floods
|
11:00
|
Josh Baratz, Ryan, Jazayeri, Greg Dennis
|
Inferring the Buffer Management Scheme of a Router
|
11:20
|
Vladimir Bychkovsky, Sachin Katti
|
Evaluation of repair request compression schmes for reliable out-of-order delivery mechnism in sensor networks
|
11:40 |
Clifford Frey, James Roewe, Gerardo Viedma
|
A User-level Congestion Manager Using Tesla
|
12:00 - 1:00
|
BREAK
|
|
1:00
|
Timothy Chan, Edward Faulkner, David Ziegler
|
A System for Multi-Path File Transmission
|
1:20 |
Reina Riemann, Keith Winstein
|
Can Forward Error Correction Improve TCP Performance?
|
1:40
|
Tom Lasko, Tim Olsen, Chris Taylor
|
A Fast File Transfer Protocol
|
2:00
|
Brian Leung, Julia Zhang
|
Active and Passive End-To-End Inference of Router Behavior
|
2:20
|
Kristina Foster and Tazeen Mahtab
|
Fundamental Properties for Behavior-based Detection of Email Viruses
|
2:40
|
William Tetteh, Miguel Ferreira
|
A Distributed Congestion Management Protocol for P2P Networks
|
3:00
|
I-Ting Angelina Lee, Neha Singh, Winnie Cheng
|
A new scheduling scheme for wireless ad hoc networks
|
3:20
|
Charles O'Donnell, Vinod Vaikuntanathan
|
Information Leak in Chord Networks by Passive Adversaries
|
3:40
|
Abdallah Jabbour, Jim Psota, Alexey Radul
|
A probabilistic routing protocol for mobile ad hoc networks
|