[SRC84] J. Saltzer,
D. Reed, and D. Clark, End-to-end Arguments in System Design,
ACM Transactions on Computer Systems, Vol. 2, No. 4,
pp. 195-206, 1984.
[McK97]
Nick McKeown, A Fast Switched Backplane for a Gigabit Switched
Router
, Business Communications Review.
[APM+04] Aditya
Akella, Jeff Pang, Bruce Maggs, Srinivasan Seshan and Anees Shaikh,
A Comparison of Overlay Routing and Multihoming Route
Control, ACM SIGCOMM
2004.
[BFZ07]
H. Ballani et al, A Study of Prefix Hijacking and Interception in the Internet,
ACM Sigcomm 2007.
Transport and Congestion Control
[JK88] V. Jacobson
and M. Karels, Congestion Avoidance and Control, ACM SIGCOMM
1988.
[DKS90] A. Demers,
S. Keshav, and S. Shenker. Analysis and simulation of a
fair-queueing algorithm, Journal of Internetworking Research and
Experience, pages 3--26, Oct. 1990.
[SSZ98] I. Stoica,
S. Shenker, and H. Zhang, Core-Stateless Fair Queueing: Achieving
Approximately Fair Allocations in High Speed Networks, ACM
SIGCOMM 1998.
Emerging
Topics I
[AGA+08] Ashok Anand, Archit Gupta, Aditya Akella, Srinivasan
Seshan and Scott Shenker, Packet Caches on Routers: The
Implications of Universal Redundant Traffic Elimination, ACM
SIGCOMM 2008.
[WKB+08]
Yi Wang, Eric Keller, Brian Biskeborn, Jacobus van der Merwe, and
Jennifer Rexford, Virtual Routers on the Move: Live Router
Migration as a Network-Management Primitive, to appear in
Proc. ACM SIGCOMM, August 2008.
[TKA+06] Niraj
Tolia, Michael Kaminsky, David G. Andersen, Swapnil Patil, An
Architecture for Internet Data Transfer, NSDI 2006.
Naming and DHT-Based
Architecutures
[S+03] Ion Stoica,
Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana,
Internet Indirection Infrastructure, ACM SIGCOMM 2002.
[WSK+04]
Michael Walfish, Jeremy Stribling, Maxwell Krohn,. Hari
Balakrishnan, Robert Morris, and Scott Shenker, Middleboxes No Longer Considered Harmful, OSDI 2004.
Network
Security
[S+01]
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine
E. Jones, Fabrice Tchakountio, Stephen T. Kent, W. Timothy
Strayer, Hash-Based IP Traceback, ACM Sigcomm 2001.
[YWA05]
X. Wang, D. Wetherall and T. Anderson, A DoS Limiting Network
Architecture, ACM Sigcomm 2005.
[C+07] Martin
Casado (Stanford), Michael Freedman (NYU), Justin Pettit, Nick
McKeown (Stanford), Scott Shenker (UC Berkeley), Ethane: Taking
Control of the Enterprise, ACM Sigcomm 2007.
[PGG+07]
Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan
Seshan, and David Wetherall, 802.11 User Fingerprinting, ACM
MobiCom 2007.
[BM05]
S. Biswas and R. Morris, ExOR: Opportunistic Multi-Hop Routing
for Wireless Networks, ACM Sigcomm 2005.
[KKB+08]
Sachin Katti, Dina Katabi, Hari Balakrishnan and Muriel Medard,
Symbol-Level Network Coding for Wireless Mesh Networks, ACM
Sigcomm 2008.
[K03]
Kevin Fall, A Delay-Tolerant Network Architecture for Challenged
Internets, ACM SIGCOMM 2003.
Emerging Topics
II
[A+08] Mohammad Al-Fares, Alexander Loukissas, Amin Vahdat (UC San Diego), A Scalable, Commodity Data Center Network Architecture, SIGCOMM 2008.
[PIA+07]
Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy,
Arun Venkataramani, Do incentives build robustness in
BitTorrent?, NSDI 2007.
[YTL06],
Xiaowei Yang, Gene Tsudik, and Xin Liu, A Technical Approach to
Net Neutrality, HotNets 2006.
[YKG+06]
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman,
SybilGuard: Defending Against Sybil Attacks via Social
Networks, ACM SIGCOMM 2006.