Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

SIGCOMM Award

The SIGCOMM Award recognizes lifetime contribution to the field of communication networks.The award is presented in the annual SIGCOMM Technical… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2014
Review
2014
Over the past few years, e-government has been rapidly changing the way governmental services are provided to citizens and… Expand
Highly Cited
2013
Highly Cited
2013
Distributed controllers have been proposed for Software Defined Networking to address the issues of scalability and reliability… Expand
  • figure 3
  • figure 4
  • figure 5
Review
2012
Review
2012
Abstract CityGML is the international standard of the Open Geospatial Consortium (OGC) for the representation and exchange of 3D… Expand
Highly Cited
2011
Highly Cited
2011
This article provides an alternative perspective for measuring author impact by applying PageRank algorithm to a coauthorship… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2011
Highly Cited
2011
This study investigated the use of wikis for collaborative writing projects. Fourth- and sixth-semester German students wrote… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Highly Cited
2008
Highly Cited
2008
Car detection from aerial images has been studied for years. However, given a large-scale aerial image with typical car and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2007
2007
We present the first protocol for the anonymous transmission of a quantum state that is information-theoretically secure against… Expand
2006
2006
  • D. Sy, L. Bao
  • 5th International Conference on Information…
  • 2006
  • Corpus ID: 476285
Network-based attacks can be either persistent or sporadic. Persistent attack flows can be relatively easy to trace by mechanisms… Expand
  • figure 1
  • figure 3
  • figure 2
  • table 1
  • table 2
Highly Cited
2004
Highly Cited
2004
Many network devices such as routers and firewalls employ caches to take advantage of temporal locality of packet headers in… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Highly Cited
2004
Highly Cited
2004
Introduction 1. Reproduction and Governmentality 2. The Creation of a Modern Reproductive System in Prewar Japan 3. Reproduction… Expand
  • figure 1.1
  • figure 5.1