Survey and taxonomy of IP address lookup algorithms MA Ruiz-Sanchez, EW Biersack, W Dabbous IEEE Network 15 (2), 8-23, 2001 | 737 | 2001 |
Multipoint communication: a survey of protocols, functions, and mechanisms C Diot, W Dabbous, J Crowcroft IEEE Journal on Selected Areas in Communications 15 (3), 277-290, 1997 | 573 | 1997 |
Network characteristics of video streaming traffic A Rao, A Legout, Y Lim, D Towsley, C Barakat, W Dabbous Proceedings of the 2011 ACM CoNEXT conference, 2011 | 447 | 2011 |
On TCP performance in a heterogeneous network: a survey C Barakat, E Altman, W Dabbous IEEE Communications Magazine 38 (1), 40-46, 2000 | 345 | 2000 |
IP routing issues in satellite constellation networks L Wood, A Clerget, I Andrikopoulos, G Pavlou, W Dabbous International Journal of Satellite Communications 19 (1), 69-92, 2001 | 245 | 2001 |
A link-layer tunneling mechanism for unidirectional links E Duros, W Dabbous, H Izumiyama, N Fujii, Y Zhang RFC3077, 2001 | 182 | 2001 |
Direct code execution: Revisiting library os architecture for reproducible network experiments H Tazaki, F Uarbani, E Mancini, M Lacage, D Camara, T Turletti, ... Proceedings of the 2013 ACM CoNEXT conference, 2013 | 175 | 2013 |
Pushing bittorrent locality to the limit S Le Blond, A Legout, W Dabbous Computer Networks 55 (3), 541-557, 2011 | 135 | 2011 |
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users SL Blond, P Manils, C Abdelberi, MAD Kaafar, C Castelluccia, A Legout, ... Fourth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'11), 2011 | 94 | 2011 |
Generating efficient protocol code from an abstract specification C Castelluccia, W Dabbous, S O'Malley IEEE/ACM transactions on networking 5 (4), 514-524, 1997 | 93* | 1997 |
Securing Internet Coordinate System: Embedding Phase MA Kaafar, L Mathy, C Barakat, K Salamatian, T Turletti, W Dabbous Inria Research Report https://hal.inria.fr/inria-00151257, 2007 | 82* | 2007 |
Spying the World from your Laptop--Identifying and Profiling Content Providers and Big Downloaders in BitTorrent SL Blond, A Legout, FL Fessant, W Dabbous, MA Kaafar Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10), 2010 | 72* | 2010 |
I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy S Le Blond, C Zhang, A Legout, K Ross, W Dabbous Proceedings of the 2011 ACM SIGCOMM Internet Measurement Conference, 2011 | 64 | 2011 |
Virtual networks under attack: disrupting internet coordinate systems MA Kaafar, L Mathy, T Turletti, W Dabbous Proceedings of the 2006 ACM CoNEXT conference, 2006 | 58 | 2006 |
NEPI: An integration framework for network experimentation A Quereilhac, M Lacage, C Freire, T Turletti, W Dabbous Proceedings of SoftCOM 2011, 2011 | 57 | 2011 |
Real attacks on virtual networks: Vivaldi out of tune MA Kaafar, L Mathy, T Turletti, W Dabbous Proceedings of the 2006 SIGCOMM workshop on Large-scale Attack Defense, 2006 | 51 | 2006 |
Compromising Tor anonymity exploiting P2P information leakage P Manils, C Abdelberri, SL Blond, MA Kaafar, C Castelluccia, A Legout, ... Inria Research Report, 2010 | 46 | 2010 |
TUF: tag-based unified fairness A Clerget, W Dabbous Proceedings of INFOCOM 2001, 2001 | 46 | 2001 |
NEPI: using independent simulators, emulators, and testbeds for easy experimentation M Lacage, M Ferrari, M Hansen, T Turletti, W Dabbous ACM SIGOPS Operating Systems Review 43 (4), 60-65, 2010 | 43 | 2010 |
Meddle: middleboxes for increased transparency and control of mobile traffic A Rao, J Sherry, A Legout, A Krishnamurthy, W Dabbous, D Choffnes Proceedings of ACM CoNEXT 2012 student workshop, 65-66, 2012 | 42 | 2012 |