Author image not provided
 Nick Greer Feamster

Authors:
Add personal information
ACM Fellow badge
  Affiliation history
Bibliometrics: publication history
Average citations per article18.26
Citation Count2,355
Publication count129
Publication years2001-2017
Available for download107
Average downloads per article1,423.75
Downloads (cumulative)152,341
Downloads (12 Months)10,876
Downloads (6 Weeks)1,354
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


88 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 88
Result page: 1 2 3 4 5

Sort by:

1
October 2015 LCN WORKSHOPS '15: Proceedings of the 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Although broadband Internet relishes wide penetration in Pakistan, performance of fixed and wireless broadband networks have not been thoroughly investigated from perspective of end-users. To the best of our knowledge, no independent study exists to date documenting home user broadband experience in Pakistan. This dearth of information is troubling as ...

2 published by ACM
November 2014 IMC '14: Proceedings of the 2014 Conference on Internet Measurement Conference
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 14,   Downloads (12 Months): 66,   Downloads (Overall): 277

Full text available: PDFPDF
One means of enforcing Web censorship is to return a block page, which informs the user that an attempt to access a webpage is unsuccessful. Detecting block pages can provide a more complete picture of Web censorship, but automatically identifying block pages is difficult because Web content is dynamic, personalized, ...
Keywords: censorship, internet measurement

3 published by ACM
October 2014 HotNets-XIII: Proceedings of the 13th ACM Workshop on Hot Topics in Networks
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 13,   Downloads (12 Months): 73,   Downloads (Overall): 373

Full text available: PDFPDF
Monitoring network traffic serves many purposes, from security to accounting, yet current mechanisms for collecting network traffic are typically based on low-level features of network traffic (e.g., IP addresses, port numbers), rather than characteristics that more closely map to intent (e.g., people, applications, or devices). In this paper, we present ...
Keywords: Software-defined networking (SDN), network monitoring

4
June 2014 USENIX ATC'14: Proceedings of the 2014 USENIX conference on USENIX Annual Technical Conference
Publisher: USENIX Association
Bibliometrics:
Citation Count: 9

BISmark (Broadband Internet Service Benchmark) is a deployment of home routers running custom software, and backend infrastructure to manage experiments and collect measurements. The project began in 2010 as an attempt to better understand the characteristics of broadband access networks. We have since deployed BISmark routers in hundreds of home ...

5 published by ACM
December 2013 ACSAC '13: Proceedings of the 29th Annual Computer Security Applications Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 44,   Downloads (Overall): 321

Full text available: PDFPDF
Web applications can have vulnerabilities that result in server-side data leaks. Securing sensitive data from Web applications while ensuring reasonable performance and without requiring developers to rewrite entire applications is challenging. We present SilverLine, which prevents bulk data leaks caused due to code injection in Web applications as well as ...

6 published by ACM
December 2013 Queue - Large-Scale Implementations: Volume 11 Issue 12, December 2013
Publisher: ACM
Bibliometrics:
Citation Count: 46
Downloads (6 Weeks): 1,167,   Downloads (12 Months): 9,306,   Downloads (Overall): 109,592

Full text available: HtmlHtml  PDFPDF
An intellectual history of programmable networks

7
October 2013 ANCS '13: Proceedings of the ninth ACM/IEEE symposium on Architectures for networking and communications systems
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 13,   Downloads (Overall): 104

Full text available: PDFPDF
Keywords: monitoring, netfpga, open source, packet-sniffing, programmable hardware, traffic-generation, packet-capture, high speed

8
August 2013 SEC'13: Proceedings of the 22nd USENIX conference on Security
Publisher: USENIX Association
Bibliometrics:
Citation Count: 3

Modern Web services routinely personalize content to appeal to the specific interests, viewpoints, and contexts of individual users. Ideally, personalization allows sites to highlight information uniquely relevant to each of their users, thereby increasing user satisfaction--and, eventually, the service's bottom line. Unfortunately, as we demonstrate in this paper, the personalization ...

9 published by ACM
July 2013 ACM SIGCOMM Computer Communication Review: Volume 43 Issue 3, July 2013
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 19,   Downloads (12 Months): 105,   Downloads (Overall): 1,126

Full text available: PDFPDF
Free and open access to information on the Internet is at risk: more than 60 countries around the world practice some form of Internet censorship, and both the number of countries practicing censorship and the proportion of Internet users who are subject to it are likely to increase. We posit ...
Keywords: censorship measurement, ooni

10
April 2013 nsdi'13: Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation
Publisher: USENIX Association
Bibliometrics:
Citation Count: 0


11
February 2013 IEEE/ACM Transactions on Networking (TON): Volume 21 Issue 1, February 2013
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 11,   Downloads (Overall): 141

Full text available: PDFPDF
Designers of content distribution networks (CDNs) often need to determine how changes to infrastructure deployment and configuration affect service response times when they deploy a new data center, change ISP peering, or change the mapping of clients to servers. Today, the designers use coarse, back-of-the-envelope calculations or costly field deployments; ...
Keywords: web performance, causality, content distribution network (CDN), what-if scenario evaluator (WISE)

12 published by ACM
August 2012 SIGCOMM '12: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
Publisher: ACM
Bibliometrics:
Citation Count: 24
Downloads (6 Weeks): 5,   Downloads (12 Months): 14,   Downloads (Overall): 341

Full text available: PDFPDF
The Internet was designed to always find a route if there is a policy-compliant path. However, in many cases, connectivity is disrupted despite the existence of an underlying valid path. The research community has focused on short-term outages that occur during route convergence. There has been less progress on addressing ...
Keywords: availability, bgp, internet, measurement, outages, repair, routing

13 published by ACM
June 2012 ACM SIGCOMM Computer Communication Review: Volume 42 Issue 3, July 2012
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2,   Downloads (12 Months): 11,   Downloads (Overall): 496

Full text available: PDFPDF
Managing a home network is challenging because the underlying infrastructure is so complex. Existing interfaces either hide or expose the network's underlying complexity, but in both cases, the information that is shown does not necessarily allow a user to complete desired tasks. Recent advances in software defined networking, however, permit ...
Keywords: management, home networking, monitoring, software defined networking

14
March 2012 PAM'12: Proceedings of the 13th international conference on Passive and Active Measurement
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

This paper studies the AS-level re-wiring dynamics (changes in the connectivity) of malicious networks. Anecdotal evidence suggests that some malicious ASes that are primarily involved in nefarious activities on the Internet, were sequentially de-peered by providers before their final cut-off (as occurred in the well-publicized cases of Atrivo/Intercage). We present ...

15 published by ACM
January 2012 ACM SIGCOMM Computer Communication Review: Volume 42 Issue 1, January 2012
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 5,   Downloads (12 Months): 14,   Downloads (Overall): 515

Full text available: PDFPDF
We develop a holistic cost model that operators can use to help evaluate the costs of various routing and peering decisions. Using real traffic data from a large carrier network, we show how network operators can use this cost model to significantly reduce the cost of carrying traffic in their ...
Keywords: cost optimization, traffic cost model

16 published by ACM
November 2011 IMC '11: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Publisher: ACM
Bibliometrics:
Citation Count: 17
Downloads (6 Weeks): 3,   Downloads (12 Months): 38,   Downloads (Overall): 483

Full text available: PDFPDF
Attackers often use URLs to advertise scams or propagate malware. Because the reputation of a domain can be used to identify malicious behavior, miscreants often register these domains "just in time" before an attack. This paper explores the DNS behavior of attack domains, as identified by appearance in a spam ...
Keywords: DNS, domain registration, malicious domain, spam

17 published by ACM
November 2011 IMC '11: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Publisher: ACM
Bibliometrics:
Citation Count: 15
Downloads (6 Weeks): 4,   Downloads (12 Months): 21,   Downloads (Overall): 315

Full text available: PDFPDF
Studying network configuration evolution can improve our understanding of the evolving complexity of networks and can be helpful in making network configuration less error-prone. Unfortunately, the nature of changes that operators make to network configuration is poorly understood. Towards improving our understanding, we examine and analyze five years of router, ...
Keywords: longitudinal analysis, network configuration, network evolution

18 published by ACM
September 2011 CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 3,   Downloads (12 Months): 16,   Downloads (Overall): 272

Full text available: PDFPDF
Web mail providers rely on users to "vote" to quickly and col-laboratively identify spam messages. Unfortunately, spammers have begun to use bots to control large collections of compromised Web mail accounts not just to send spam, but also to vote "not spam" on incoming spam emails in an attempt to ...

19 published by ACM
August 2011 HomeNets '11: Proceedings of the 2nd ACM SIGCOMM workshop on Home networks
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 1,   Downloads (12 Months): 9,   Downloads (Overall): 156

Full text available: PDFPDF
When purchasing home broadband access from Internet service providers (ISPs), users must decide which service plans are most appropriate for their needs. Today, ISPs advertise their available service plans using only generic upload and download speeds. Unfortunately, these metrics do not always accurately reflect the varying performance that home users ...
Keywords: access networks, benchmarking, bismark, broadband networks, gateway measurements

20 published by ACM
August 2011 SIGCOMM '11: Proceedings of the ACM SIGCOMM 2011 conference
Publisher: ACM
Bibliometrics:
Citation Count: 94
Downloads (6 Weeks): 4,   Downloads (12 Months): 82,   Downloads (Overall): 1,564

Full text available: PDFPDF
We present the first study of network access link performance measured directly from home gateway devices. Policymakers, ISPs, and users are increasingly interested in studying the performance of Internet access links. Because of many confounding factors in a home network or on end hosts, however, thoroughly understanding access network performance ...
Keywords: access networks, benchmarking, bismark, broadband networks
Also published in:
October 2011  ACM SIGCOMM Computer Communication Review - SIGCOMM '11: Volume 41 Issue 4, August 2011



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2019 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us