Hash-based IP traceback AC Snoeren, C Partridge, LA Sanchez, CE Jones, F Tchakountio, ST Kent, ... ACM SIGCOMM Computer Communication Review 31 (4), 3-14, 2001 | 1246 | 2001 |
Inside the social network's (datacenter) network A Roy, H Zeng, J Bagga, G Porter, AC Snoeren Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015 | 1087 | 2015 |
An end-to-end approach to host mobility AC Snoeren, H Balakrishnan Proceedings of the 6th annual international conference on Mobile computing …, 2000 | 947 | 2000 |
Single-packet IP traceback AC Snoeren, C Partridge, LA Sanchez, CE Jones, F Tchakountio, ... IEEE/ACM Transactions on networking 10 (6), 721-734, 2002 | 667 | 2002 |
Difference engine: Harnessing memory redundancy in virtual machines D Gupta, S Lee, M Vrable, S Savage, AC Snoeren, G Varghese, ... USENIX Conference on Operating Systems Design and Implementation (OSDI), 309-322, 2008 | 580 | 2008 |
Scalability, fidelity, and containment in the potemkin virtual honeyfarm M Vrable, J Ma, J Chen, D Moore, E Vandekieft, AC Snoeren, GM Voelker, ... Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005 | 527 | 2005 |
Jigsaw: Solving the puzzle of enterprise 802.11 analysis YC Cheng, J Bellardo, P Benkö, AC Snoeren, GM Voelker, S Savage ACM SIGCOMM Computer Communication Review 36 (4), 39-50, 2006 | 428 | 2006 |
Cloud control with distributed rate limiting B Raghavan, K Vishwanath, S Ramabhadran, K Yocum, AC Snoeren ACM SIGCOMM Computer Communication Review 37 (4), 337-348, 2007 | 316 | 2007 |
Evaluating the effectiveness of model-based power characterization JC McCullough, Y Agarwal, J Chandrashekar, S Kuppuswamy, ... USENIX Annual Technical Conf 20, 19-20, 2011 | 311 | 2011 |
Mesh-based content routing using XML AC Snoeren, K Conley, DK Gifford Proceedings of the eighteenth ACM symposium on Operating systems principles …, 2001 | 305 | 2001 |
Fault localization via risk modeling RR Kompella, J Yates, A Greenberg, AC Snoeren IEEE Transactions on Dependable and Secure Computing 7 (4), 396-409, 2009 | 294 | 2009 |
Tracking ransomware end-to-end DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ... 2018 IEEE Symposium on Security and Privacy (SP), 618-631, 2018 | 254 | 2018 |
California fault lines: understanding the causes and impact of network failures D Turner, K Levchenko, AC Snoeren, S Savage Proceedings of the ACM SIGCOMM 2010 Conference, 315-326, 2010 | 244 | 2010 |
Resource allocation in federated distributed computing infrastructures A AuYoung, B Chun, A Snoeren, A Vahdat Proceedings of the 1st Workshop on Operating System and Architectural …, 2004 | 240 | 2004 |
Rotornet: A scalable, low-complexity, optical datacenter network WM Mellette, R McGuinness, A Roy, A Forencich, G Papen, AC Snoeren, ... Proceedings of the Conference of the ACM Special Interest Group on Data …, 2017 | 237 | 2017 |
Best-path vs. multi-path overlay routing DG Andersen, AC Snoeren, H Balakrishnan Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement, 91-100, 2003 | 232 | 2003 |
Detection and localization of network black holes RR Kompella, J Yates, A Greenberg, AC Snoeren IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 227 | 2007 |
Fine-Grained Failover Using Connection Migration. AC Snoeren, DG Andersen, H Balakrishnan USITS 1, 19-19, 2001 | 224 | 2001 |
Mirage: A microeconomic resource allocation system for sensornet testbeds BN Chun, P Buonadonna, A AuYoung, C Ng, DC Parkes, J Shneidman, ... The Second IEEE Workshop on Embedded Networked Sensors, 2005. EmNetS-II., 19-28, 2005 | 222 | 2005 |
To infinity and beyond: time warped network emulation D Gupta, K Yocum, M McNett, AC Snoeren, A Vahdat, GM Voelker Proceedings of the twentieth ACM symposium on Operating systems principles, 1-2, 2005 | 191 | 2005 |