Network Routing - Papers List

(Under construction)

I expect every person to do a presentation. Choices are on a first come first served basis.
Send me an email to reserve a paper for presentation.
Presentation MUST follow these guidelines. Presentations must be 20 minutes in length.
Everybody must read the papers however, and participate in the discussions.

Papers to be presented by index:
Feb 1:   1, 2
Feb 3:    3, 4
Feb 8:     5, 6
Feb 10:   7, 8
Feb 15:   9    - Hand in project proposal
Feb 17:   10 11
Feb 22:     12 13
Feb 24:       14 15
Mrach 1:    16 - 17
March 3:    Quiz
March 8:     18  - project presentations
March 10:    project presentations
March 21:  Submission of projects
                   (extensions only for serious reasons)


* Effect of BGP Policy on Routing

 1.   The Impact of Routing Policy on   Internet Paths Hongsuda Tangmunarunkit, Ramesh Govindan
         Scott Shenker, Deborah Estrin INFOCOM 2001    
  2. The Impact of Internet Policy and Topology on Delayed Routing Convergence, by Craig Labovitz, Roger Wattenhofer,
         Srinivasan      Venkatachary and Abha Ahuja. Proceedings of INFOCOM, Anchorage, AK, April, 2001        (Anirban)

BGP and instability
    3.  The Temporal and Topological Characteristics of BGP Path Changes
        D. Chang, R. Govindan, J. Heidemann ICNP 2003        (Ram Sudhir)
    4. ``An Experimental Analysis of BGP Convergence Time.'' Timothy G. Griffin and Brian J. Premore.
        9th International Conference on  Network Protocols, ICNP' 2001 (Eric)

Routing in Sensor Networks:
    5.   "A Survey of Routing Protocols in Wireless Sensor Networks, "
        K. Akkaya and M. Younis, in the Elsevier  Ad Hoc Network Journal (to appear)   (Aggelos and Jorge)

    6. Directed Diffusion for Wireless Sensor Networking.
        Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann, and Fabio Silva.
        ACM/IEEE Transactions on Networking ,11 (1 ), pp. 2-16, February, 2002   (Jin Sun)

  7.  Synchronization of Multiple Levels of Data Fusion in Wireless Sensor Networks,
      Yuan W., Krishnamurthy S.V, and Tripathi, S.K.,  IEEE GLOBECOM 2003.   (Yu Fan)


  Routing and Security
    8. "A Framework for Classifying Denial of Service Attacks,"
      by Alefiya Hussain, John Heidemann, Christos Papadopoulos. In Proceedings of Sigcomm 2003,  
      Karlsruhe, Germany, August 2003.   (Ilker)
    9.  Internet Quarantine: Requirements for Containing Self-Propagating Code.
      David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage, INFOCOM 2003.  (Ioannis)


   10. Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking
       Rice Computer Science Technical Reoprt TR04-433   (Gentian)


   11. "Can ISPs take the heat from Overlay Networks?"
            R. Keralapura, N. Taft, C. N. Chuah, and G. Iannaccone,  
           ACM Workshop on Hot Topics in Networks (HotNets-III) ,  November 2004.   (Mark Porterfield)

BGP/IBGP Stability and Anomalies:
     12. "Combining Visual and Automated Data Mining for Near-Real-Time Anomaly Detection and Analysis in BGP",  (Nicholas)
            Soon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, and S. Felix Wu,
            Proc. of the ACM Conf. on Computer and Communications Security Workshop on Visualization and Data Mining for Computer Security, 2004.

    13.  Reliability-aware IBGP Route Reflection Topology Design,
             L. Xiao, J. Wang, K. Nahrstedt (UIUC)  ICNP 2003             (Chadi)

    Multicast routing - Bounds and proofs
   14.   "Bounds for the On-line Multicast Problem in Directed Graphs"   (Chahden)
          Michalis Faloutsos, Rajesh Pankaj and Kenneth C. Sevcik  
          4th International Colloquium on Structural Information and Communication Complexity (SIROCCO '97)

   15.  Scalable Application Layer Multicast
        Suman Banerjee, Bobby Bhattacharjee, Christopher Kommareddy
        Proceedings of ACM Sigcomm 2002, Pittsburgh, Pennsylvania, August 2002   (Fouzia)


 Routing and Security
    16. Topology-based detection of anomalous BGP messages.
      C. Kruegel, D. Mutz, W. Robertson, F. Valeur, RAID 2003.    (Keri)

   17. Same as paper 12 sorry!
       "Combining Visual and Automated Data Mining for Near-Real-Time Anomaly Detection and Analysis in BGP"
        Soon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, and S. Felix Wu,
     Proc. of the ACM Conf. on Computer and Communications Security Workshop on Visualization and Data Mining for Computer Security, 2004.
     (Nicholas)

  18.    SOS: secure overlay services
      Angelos D. Keromytis, Vishal Misra, Dan Rubenstein, ACM SIGCOMM 2002. (Luke Keppler)