Follow
Alex C. Snoeren
Title
Cited by
Cited by
Year
Hash-based IP traceback
AC Snoeren, C Partridge, LA Sanchez, CE Jones, F Tchakountio, ST Kent, ...
ACM SIGCOMM Computer Communication Review 31 (4), 3-14, 2001
12492001
Inside the social network's (datacenter) network
A Roy, H Zeng, J Bagga, G Porter, AC Snoeren
Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015
11602015
An end-to-end approach to host mobility
AC Snoeren, H Balakrishnan
Proceedings of the 6th annual international conference on Mobile computing …, 2000
9482000
Single-packet IP traceback
AC Snoeren, C Partridge, LA Sanchez, CE Jones, F Tchakountio, ...
IEEE/ACM Transactions on networking 10 (6), 721-734, 2002
6672002
Difference engine: Harnessing memory redundancy in virtual machines
D Gupta, S Lee, M Vrable, S Savage, AC Snoeren, G Varghese, ...
USENIX Conference on Operating Systems Design and Implementation (OSDI), 309-322, 2008
5882008
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
M Vrable, J Ma, J Chen, D Moore, E Vandekieft, AC Snoeren, GM Voelker, ...
Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005
5332005
Jigsaw: Solving the puzzle of enterprise 802.11 analysis
YC Cheng, J Bellardo, P Benkö, AC Snoeren, GM Voelker, S Savage
ACM SIGCOMM Computer Communication Review 36 (4), 39-50, 2006
4302006
Cloud control with distributed rate limiting
B Raghavan, K Vishwanath, S Ramabhadran, K Yocum, AC Snoeren
ACM SIGCOMM Computer Communication Review 37 (4), 337-348, 2007
3232007
Evaluating the effectiveness of model-based power characterization
JC McCullough, Y Agarwal, J Chandrashekar, S Kuppuswamy, ...
USENIX Annual Technical Conf 20, 19-20, 2011
3132011
Mesh-based content routing using XML
AC Snoeren, K Conley, DK Gifford
Proceedings of the eighteenth ACM symposium on Operating systems principles …, 2001
3062001
Fault localization via risk modeling
RR Kompella, J Yates, A Greenberg, AC Snoeren
IEEE Transactions on Dependable and Secure Computing 7 (4), 396-409, 2009
2962009
Tracking ransomware end-to-end
DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ...
2018 IEEE Symposium on Security and Privacy (SP), 618-631, 2018
2802018
Rotornet: A scalable, low-complexity, optical datacenter network
WM Mellette, R McGuinness, A Roy, A Forencich, G Papen, AC Snoeren, ...
Proceedings of the Conference of the ACM Special Interest Group on Data …, 2017
2682017
California fault lines: understanding the causes and impact of network failures
D Turner, K Levchenko, AC Snoeren, S Savage
Proceedings of the ACM SIGCOMM 2010 Conference, 315-326, 2010
2532010
Resource allocation in federated distributed computing infrastructures
A AuYoung, B Chun, A Snoeren, A Vahdat
Proceedings of the 1st Workshop on Operating System and Architectural …, 2004
2432004
Best-path vs. multi-path overlay routing
DG Andersen, AC Snoeren, H Balakrishnan
Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement, 91-100, 2003
2322003
Detection and localization of network black holes
RR Kompella, J Yates, A Greenberg, AC Snoeren
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
2302007
Fine-Grained Failover Using Connection Migration.
AC Snoeren, DG Andersen, H Balakrishnan
USITS 1, 19-19, 2001
2242001
Mirage: A microeconomic resource allocation system for sensornet testbeds
BN Chun, P Buonadonna, A AuYoung, C Ng, DC Parkes, J Shneidman, ...
The Second IEEE Workshop on Embedded Networked Sensors, 2005. EmNetS-II., 19-28, 2005
2232005
Circuit switching under the radar with {REACToR}
H Liu, F Lu, A Forencich, R Kapoor, M Tewari, GM Voelker, G Papen, ...
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014
1972014
The system can't perform the operation now. Try again later.
Articles 1–20