I. P2P Networking
==================
1. Stoica I, Morris R, Liben-Nowell D, Karger DR, Kaashoek MF, Dabek F, Balakrishnan H (2003) Chord: a scalable peer-to-peer lookup protocol for Internet applications. IEEE/ACM Trans Netw 11(1):17-32.
2. Ou Z, Harjula E, Koskela T & Ylianttila M (2010) GTPP: General Truncated Pyramid Peer-to-Peer Architecture over Structured DHT Networks. Mobile Networks and Applications 15(5):729-749.
3. Ou Z, Harjula E, Kassinen O & Ylianttila M (2010) Performance evaluation of a Kademliabased communication-oriented P2P system under churn. Elsevier Journal Computer Networks 54 (5): 689-705.
4. Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker (2001) A scalable content-addressable network. Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '01): 161-172.
5. Maymounkov P, Mazires D (2002) Kademlia: A peer-to-peer information system based on the xor metric. First International Workshop in Peer-to-Peer Systems (IPTPS 2002): 53-65.
6. Rowstron A, Druschel P (2001) Pastry: Scalable, distributed object location and routing for large-scale peer-topeer systems. IFIP/ACM International Conference on Distributed Systems Platforms (Middleware):329-350.
7. Ganesan P, Gummadi K, Garcia-Molina H (2004) Canon in G major: designing DHTs with hierarchical structure. IEEE International Conference on Distributed Computing Systems (ICDCS 2004): 263-272.
8. Xu Z, Min R, Hu Y (2003) HIERAS: A DHT-based hierarchical peer-to-peer routing algorithm. Proceedings of 2003 international conference on parallel processing (ICPP 2003): 187-194.
9. Stutzbach D & Rejaie R (2006) Improving Lookup Performance Over a Widely-Deployed DHT. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM 2006): 1-12.
10. Stutzbach D & Rejaie R (2006) Understanding churn in peer-to-peer networks. Proceedings of the 6th ACM SIGCOMM conference on Internet measurement (IMC '06): 189-201.
II. Cloud Computing
====================
1. Barham Paul, Dragovic Boris, Fraser Keir, Hand Steven, Harris Tim, Ho Alex, Neugebauer Rolf, Pratt Ian, Warfield Andrew (2003) Xen and the art of virtualization, Proceedings of the nineteenth ACM symposium on Operating systems principles (SOSP '03): 164-177.
2. Kandula Srikanth, Sengupta Sudipta, Greenberg Albert, Patel Parveen, Chaiken Ronnie (2009) The nature of data center traffic: measurements & analysis. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference (IMC '09):202-220.
3. Al-Fares Mohammad, Loukissas Alexander, Vahdat Amin (2008) A scalable, commodity data center network architecture. Proceedings of the ACM SIGCOMM 2008 conference on Data communication (SIGCOMM '08):63-74.
4. Cully Brendan, Lefebvre Geoffrey, Meyer Dutch, Feeley Mike, Hutchinson Norm, Warfield Andrew (2008) Remus: high availability via asynchronous virtual machine replication. Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08): 161-174.
5. Ghemawat Sanjay, Gobioff Howard, Leung Shun-Tak (2003) The Google file system, SIGOPS Oper. Syst. Rev. 37(5):29-43.
6. Jeffrey Dean, Sanjay Ghemawat (2004) MapReduce: simplified data processing on large clusters. Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation (OSDI'04): 137-149.
7. Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Ch, Andrew Fikes, Robert E. Gruber (2006) Bigtable: A distributed storage system for structured data. Proceedings of the 7th Conference on USENIX Symposium on Operating Systems Design and Implementation (OSDI'06):1-14.
8. Matei Zaharia, Andrew Konwinski, Anthony Joseph, Randy Katz, Ion Stoica (2008) Improving MapReduce Performance in Heterogeneous Environments. Proceedings of the 8th Symposium on Operating Systems Design and Implementation (OSDI '08): 29-42.
III. Transport protocols
=========================
1. Kun Tan, Jingmin Song, Qian Zhang, and Murari Sridharan, A Compound TCP Approach for High-speed and Long Distance Networks, in INFOCOM 06, IEEE, 2006
2. Alizadeh, M., Greenberg, A., Maltz, D. A., Padhye, J., Patel, P., Prabhakar, B., Sengupta, S., and Sridharan, M. 2010. Data center TCP (DCTCP). In Proceedings of the ACM SIGCOMM 2010 Conference on SIGCOMM (New Delhi, India, August 30 - September 03, 2010). SIGCOMM '10. ACM, New York, NY, 63-74. DOI= http://doi.acm.org/10.1145/1851182.1851192
3. Measuring and Evaluating TCP Splitting for Cloud Services. Abhinav Pathak, Y. Angela Wang, Cheng Huang, Albert Greenberg, Y. Charlie Hu, Randy Kern, Jin li, and Keith Ross. In Proc. of Passive and Active Measurement Conference (PAM), April 2010.
4. Li, Y.T, Leith,D., Shorten,R. Experimental evaluation of high-speed congestion control protocols. Transactions on Networking, 2007.
5. Douglas Leith, Lachlan Andrew,Tom Quetchenbach, Robert Shorten, Kfir Lavi. Experimental Evaluation of Delay/Loss-based TCP Congestion Control Algorithms, Proc. PFLDnet 2008.
6. Equation-Based Congestion Control for Unicast Applications. S. Floyd, M. Handley, J. Padhye and J. Widmer. In SIGCOMM 2000.
7. Modeling TCP Throughput: A Simple Model and its Empirical Validation. J. Padhye, V. Firoiu, D. Towsley and J. Kurose, SIGCOMM 1998.
8. E. Altman, K. Avrachenkov, and C. Barakat, A?A stochastic model of TCP/IP with stationary random lossesA?, IEEE/ACM Trans. Netw., 13(2):356A?369, 2005.
9. Determining an Appropriate Sending Rate Over an Underutilized Network Path. Pasi Sarolahti, Mark Allman, and Sally Floyd. Computer Networks, V.51 N.7, May 2007.
10. Simon Heimlicher, Merkouris Karaliopoulos, Hanoch Levy and Thrasyvoulos Spyropoulos: On Leveraging Partial Paths in Partially-connected Networks. IEEE INFOCOM 2009, Rio de Janeiro, April 2009.
IV. Routing and traffic
========================
1. Bush, R., Maennel, O., Roughan, M., and Uhlig, S. 2009. Internet optometry: assessing the broken glasses in internet reachability. In Proceedings of the 9th ACM SIGCOMM Conference on internet Measurement Conference (Chicago, Illinois, USA, November 04 - 06, 2009). IMC '09. ACM, New York, NY, 242-253. DOI= http://doi.acm.org/10.1145/1644893.1644923
2. Zhu, Y., Rexford, J., Sen, S., and Shaikh, A. 2009. Impact of prefix-match changes on IP reachability. In Proceedings of the 9th ACM SIGCOMM Conference on internet Measurement Conference (Chicago, Illinois, USA, November 04 - 06, 2009). IMC '09. ACM, New York, NY, 235-241. DOI= http://doi.acm.org/10.1145/1644893.1644922
3. Abu-Libdeh, H., Costa, P., Rowstron, A., O'Shea, G., and Donnelly, A. 2010. Symbiotic routing in future data centers. In Proceedings of the ACM SIGCOMM 2010 Conference on SIGCOMM (New Delhi, India, August 30 - September 03, 2010). SIGCOMM '10. ACM, New York, NY, 51-62. DOI= http://doi.acm.org/10.1145/1851182.1851191
4. Labovitz, C., Iekel-Johnson, S., McPherson, D., Oberheide, J., and Jahanian, F. 2010. Internet inter-domain traffic. In Proceedings of the ACM SIGCOMM 2010 Conference on SIGCOMM (New Delhi, India, August 30 - September 03, 2010). SIGCOMM '10. ACM, New York, NY, 75-86. DOI= http://doi.acm.org/10.1145/1851182.1851194
5. Jokela, P., Zahemszky, A., Esteve Rothenberg, C., Arianfar, S., and Nikander, P. 2009. LIPSIN: line speed publish/subscribe inter-networking. In Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication (Barcelona, Spain, August 16 - 21, 2009). SIGCOMM '09. ACM, New York, NY, 195-206. DOI= http://doi.acm.org/10.1145/1592568.1592592
6. Le, F., Xie, G. G., Pei, D., Wang, J., and Zhang, H. 2008. Shedding light on the glue logic of the internet routing architecture. In Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication (Seattle, WA, USA, August 17 - 22, 2008). SIGCOMM '08. ACM, New York, NY, 39-50. DOI= http://doi.acm.org/10.1145/1402958.1402964
7. Hossmann, T.; Spyropoulos, T.; Legendre, F.; , "Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing," INFOCOM, 2010 Proceedings IEEE , vol., no., pp.1-9, 14-19 March 2010. doi: 10.1109/INFCOM.2010.5462135.
8. Miskovic, S.; Knightly, E.W.; , "Routing Primitives for Wireless Mesh Networks: Design, Analysis and Experiments," INFOCOM, 2010 Proceedings IEEE , vol., no., pp.1-9, 14-19 March 2010. doi: 10.1109/INFCOM.2010.5462111
9. Renata Teixeira, Aman Shaikh, Tim Griffin, and Jennifer Rexford, "Impact of hot-potato routing changes in IP networks," in IEEE/ACM Transactions on Networking, December 2008.
10. Caesar, M., Condie, T., Kannan, J., Lakshminarayanan, K., and Stoica, I. 2006. ROFL: routing on flat labels. In Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications (Pisa, Italy, September 11 - 15, 2006). SIGCOMM '06. ACM, New York, NY, 363-374. DOI= http://doi.acm.org/10.1145/1159913.1159955
V. Denial-of-Service attacks
=============================
1. J. Mirkovic and P. Reiher. A taxonomy of DDoS attack and DDoS defense mechanisms. SIGCOMM Comput. Commun. Rev., 34(2):39-53, 2004.
2. J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang. SAVE: Source Address Validity Enforcement Protocol. Technical report, 2001.
3. J. Wu, G. Ren, and X. Li. Source Address Validation: Architecture and Protocol Design. In IEEE International Conference on Network Protocols, pages 276-283. IEEE Computer Society Press, 20072.
4. A. Hussain, J. Heidemann, and C. Papadopoulos. A framework for classifying denial of service attacks. In SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pages 99-110, New York, NY, USA, 2003. ACM.
5. J. Ioannidis and S. M. Bellovin. Implementing Pushback: Router-Based Defense Against DDoS Attacks. In Proceedings of Network and Distributed System Security Symposium, Catamaran Resort Hotel San Diego, California 6-8 February 2002, 1775 Wiehle Ave., Suite 102, Reston, VA 20190, February 2002. The Internet Society.
6. M. T. Goodrich. Efficient packet marking for large-scale IP traceback. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, pages 117-126, New York, NY, USA, 2002. ACM.
7. T. K. Law, J. C. Lui, and D. K. Yau. You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers. IEEE Transactions on Parallel and Distributed Systems,16(9):799-813, 2005.
8. T. Peng, C. Leckie, and K. Ramamohanarao. Adjusted Probabilistic Packet Marking for IP Traceback. In NETWORKING '02: Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications, pages 697-708, London, UK, 2002. Springer-Verlag.
9. M. Sung and J. Xu. IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. In ICNP '02: Proceedings of the 10th IEEE International Conference on Network Protocols, pages 302-311, Washington, DC, USA, 2002. IEEE Computer Society.
10. M. Waldvogel. GOSSIB vs. IP Traceback Rumors. In ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference, pages 5-13, Washington, DC, USA, 2002. IEEE Computer Society.
11. C. Jin, H. Wang, and K. G. Shin. Hop-count filtering: an effective defense against spoofed DDoS traffic. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 30-41, New York, NY, USA, 2003. ACM.
12. J. Xu and W. Lee. Sustaining Availability of Web Services under Distributed Denial of Service Attacks. IEEE Transactions on Computers, 52(2):195-208, 2003.
13. D. K. Y. Yau, J. C. S. Lui, F. Liang, and Y. Yam. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Trans. Netw., 13(1):29-42, 2005.
14. M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker. DDoS defense by offense. In SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pages 303-314, New York, NY, USA, 2006. ACM.
15. A. P. Jordan Robertson. Authorities bust 3 in infection of 13m computers. http://www.usatoday.com/tech/news/computersecurity/2010-03-02-botnet-arrest_N.htm.
Mobile Services Business
=========================
1. Haaker, T., Faber, E., and Bouwman, H. 2006. Balancing customer and network value in business models for mobile services. Int. J. Mob. Commun. 4, 6 (Jul. 2006), 645-661. DOI= http://dx.doi.org/10.1504/IJMC.2006.010360
2. Khurri, A. & Luukkainen, S. (2009). Identification of preconditions for an emerging mobile LBS market. Journal of Location Based Services, 3(3), 188-209. doi:10.1080/17489720903362306
3. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5494785&isnumber=54&tag=1
4. http://www.emeraldinsight.com/journals.htm?issn=1463-6697&volume=12&issue=5
5. http://www.emeraldinsight.com/journals.htm?issn=1463-6697&volume=11&issue=3&articleid=1789393&show=abstract
6. http://www.emeraldinsight.com/journals.htm?issn=1463-6697&volume=10&issue=3&articleid=1723323&show=abstract
7. http://www.emeraldinsight.com/journals.htm?issn=1463-6697&volume=10&issue=2&articleid=1714107&show=abstract
8. van Biljon, J. and Kotze, P. 2007. Modelling the factors that influence mobile phone adoption. In Proceedings of the 2007 Annual Research Conference of the South African institute of Computer Scientists and information Technologists on IT Research in Developing Countries (Port Elizabeth, South Africa, October 02 - 03, 2007). SAICSIT '07, vol. 226. ACM, New York, NY, 152-161. DOI= http://doi.acm.org/10.1145/1292491.1292509
9. http://www.emeraldinsight.com/journals.htm?issn=1463-6697&volume=9&issue=5&articleid=1621440&show=abstract