Network Routing - Papers List
I expect every person to do a presentation. Choices are on a first come
first served basis.
Send me an email to reserve a paper for presentation.
Presentation MUST follow these guidelines.
Presentations must be 20 minutes in length.
Everybody must read the papers however, and participate in the
Papers to be presented by index:
Feb 1: 1, 2
Feb 3: 3, 4
Feb 8: 5, 6
Feb 10: 7, 8
Feb 15: 9 - Hand in project proposal
Feb 17: 10 11
Feb 22: 12 13
Feb 24: 14 15
Mrach 1: 16 - 17
March 3: Quiz
March 8: 18 - project presentations
March 10: project presentations
March 21: Submission of projects
(extensions only for serious reasons)
* Effect of BGP Policy on Routing
1. The Impact of Routing Policy
on Internet Paths
Hongsuda Tangmunarunkit, Ramesh Govindan
Scott Shenker, Deborah
2. The Impact of Internet Policy and Topology on
Delayed Routing Convergence, by Craig Labovitz, Roger Wattenhofer,
Srinivasan Venkatachary and Abha Ahuja.
Proceedings of INFOCOM, Anchorage, AK, April,
BGP and instability
3. The Temporal and Topological
BGP Path Changes
D. Chang, R. Govindan,
J. Heidemann ICNP 2003 (Ram Sudhir)
4. ``An Experimental Analysis of BGP Convergence
Time.'' Timothy G. Griffin and Brian J. Premore.
9th International Conference
on Network Protocols, ICNP' 2001 (Eric)
Routing in Sensor Networks:
Survey of Routing Protocols in Wireless Sensor Networks, "
K. Akkaya and M. Younis, in the
Elsevier Ad Hoc Network Journal (to appear) (Aggelos and Jorge)
6. Directed Diffusion for Wireless Sensor
Chalermek Intanagonwiwat, Ramesh
Govindan, Deborah Estrin, John
Heidemann, and Fabio Silva.
ACM/IEEE Transactions on
Networking ,11 (1 ), pp. 2-16,
February, 2002 (Jin
7. Synchronization of Multiple Levels of Data Fusion in
Wireless Sensor Networks,
Yuan W., Krishnamurthy S.V, and
Tripathi, S.K., IEEE GLOBECOM 2003.
Routing and Security
8. "A Framework for Classifying Denial of Service
by Alefiya Hussain, John Heidemann,
Christos Papadopoulos. In
Proceedings of Sigcomm 2003,
Karlsruhe, Germany, August
9. Internet Quarantine: Requirements for
Containing Self-Propagating Code.
David Moore, Colleen Shannon, Geoffrey M.
Savage, INFOCOM 2003.
10. Self-Organizing Hierarchical Routing for Scalable Ad
Rice Computer Science Technical
11. "Can ISPs take the heat from Overlay Networks?"
N. Taft, C. N. Chuah, and G. Iannaccone,
Workshop on Hot Topics in Networks (HotNets-III) , November
BGP/IBGP Stability and Anomalies:
12. "Combining Visual and Automated Data
Mining for Near-Real-Time Anomaly Detection and Analysis in BGP",
Soon Tee Teoh,
Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, and S. Felix Wu,
Proc. of the
ACM Conf. on Computer and Communications Security Workshop
on Visualization and Data Mining for Computer Security, 2004.
13. Reliability-aware IBGP Route Reflection
L. Xiao, J. Wang, K. Nahrstedt (UIUC) ICNP
Multicast routing - Bounds and proofs
14. "Bounds for the On-line Multicast Problem in
Directed Graphs" (Chahden)
Michalis Faloutsos, Rajesh
Pankaj and Kenneth C. Sevcik
Colloquium on Structural Information and Communication Complexity
15. Scalable Application Layer Multicast
Suman Banerjee, Bobby
Bhattacharjee, Christopher Kommareddy
Proceedings of ACM Sigcomm 2002,
Pittsburgh, Pennsylvania, August 2002 (Fouzia)
Routing and Security
detection of anomalous BGP messages.
C. Kruegel, D. Mutz, W. Robertson, F.
Valeur, RAID 2003. (Keri)
17. Same as paper 12 sorry!
Visual and Automated Data Mining for Near-Real-Time Anomaly Detection
and Analysis in BGP"
Soon Tee Teoh, Ke Zhang,
Shih-Ming Tseng, Kwan-Liu Ma, and S. Felix Wu,
Proc. of the ACM Conf. on Computer and
Workshop on Visualization and Data Mining for Computer Security, 2004.
18. SOS: secure overlay services
Angelos D. Keromytis, Vishal Misra, Dan
Rubenstein, ACM SIGCOMM 2002. (Luke