Skip to search formSkip to main contentSkip to account menu

SIGCOMM Award

The SIGCOMM Award recognizes lifetime contribution to the field of communication networks.The award is presented in the annual SIGCOMM Technical… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2014
Review
2014
Over the past few years, e-government has been rapidly changing the way governmental services are provided to citizens and… 
2012
2012
Clustering provides an effective method for improving the performance of wireless sensor networks (WSNs). In this paper, we study… 
Highly Cited
2011
Highly Cited
2011
This study investigated the use of wikis for collaborative writing projects. Fourth- and sixth-semester German students wrote… 
2007
2007
We present the first protocol for the anonymous transmission of a quantum state that is information-theoretically secure against… 
2006
2006
  • Denh SyL. Bao
  • 2006
  • Corpus ID: 476285
Network-based attacks can be either persistent or sporadic. Persistent attack flows can be relatively easy to trace by mechanisms… 
Highly Cited
2004
Highly Cited
2004
Many network devices such as routers and firewalls employ caches to take advantage of temporal locality of packet headers in… 
Highly Cited
2004
Highly Cited
2004
Introduction 1. Reproduction and Governmentality 2. The Creation of a Modern Reproductive System in Prewar Japan 3. Reproduction… 
Highly Cited
2002
Highly Cited
2002
The selection of metrics for spectral matches is fundamental to MVSI (multi-channel visible-spectrum imaging) otherwise known as… 
Highly Cited
1992
Highly Cited
1992
Over a million computers implement the Internet's Domain Name System of DNS, making it the world's most distributed database and…