Difference between revisions of "Publications 2005-2009"

From ARL Wiki
Jump to navigationJump to search
Line 40: Line 40:
  
 
* [http://www.arl.wustl.edu/~gorinsky/pdf/Layered_Multicast_ICCCN_2008.pdf Addressing Heterogeneity, Scalability, and Privacy in Layered Multicast Congestion Control], by S. Gorinsky, K.K. Ramakrishnan, and H. Vin, ''Proceedings of the IEEE International Conference on Computer Communications and Networks (IEEE ICCCN)'', 8/2008.
 
* [http://www.arl.wustl.edu/~gorinsky/pdf/Layered_Multicast_ICCCN_2008.pdf Addressing Heterogeneity, Scalability, and Privacy in Layered Multicast Congestion Control], by S. Gorinsky, K.K. Ramakrishnan, and H. Vin, ''Proceedings of the IEEE International Conference on Computer Communications and Networks (IEEE ICCCN)'', 8/2008.
 +
 +
* [http://www.arl.wustl.edu/~gorinsky/pdf/effairness.pdf Effairness: Dealing with Time in Congestion Control Evaluation], by S. Gorinsky and H. Vin, ''Proceedings of International Conference on Networking and Services (ICNS)'', 3/2008.
  
 
* [http://www.arl.wustl.edu/Publications/2005-09/sigcse08.pdf Operational Experience with a Virtual Networking Laboratory], by Charlie Wiseman, Ken Wong, Tilman Wolf, Sergey Gorinsky. In ''Proceedings of ACM SIGCSE'', 3/2008.
 
* [http://www.arl.wustl.edu/Publications/2005-09/sigcse08.pdf Operational Experience with a Virtual Networking Laboratory], by Charlie Wiseman, Ken Wong, Tilman Wolf, Sergey Gorinsky. In ''Proceedings of ACM SIGCSE'', 3/2008.

Revision as of 18:55, 22 July 2008

Dissertations and Theses

Journal Articles

Conference Papers

  • The Open Network Laboratory, by John DeHart, Fred Kuhns, Jyoti Parwatikar, Jonathan Turner, Charlie Wiseman, and Ken Wong, Proceedings of SIGCSE, 3/2006.
  • Multi-pattern Signature Matching for Hardware Network Intrusion Detection Systems, by Haoyu Song, and John Lockwood, Proceedings of Globecom, 11/2005.
  • Protecting TFRC from a Selfish Receiver, by Manfred Georg and Sergey Gorinsky. Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services (ICAS/ICNS 2005), 10/2005.
  • Transformation Algorithms for Data Streams, by John W. Lockwood, Stephen G. Eick, Doyle J. Weishar, Ron Loui, James Moscola, Chip Kastner, Andrew Levine, Mike Attig. IEEE Aerospace Conference, Big Sky, Montana, 3/2005.

Patents

Technical Reports