Paper list

DHT:

[1] I. Stoica, et al., Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, ACM SIGCOMM, 2001.

 

Data center networks:

[2] M. Al-Fares, et al., A Scalable, Commodity Data Center Network Architecture, ACM SIGCOMM, 2008.

 

Software defined networking:

[3] M. Al-Fares, et al., Hedera: Dynamic Flow Scheduling for Data Center Networks, USENIX NSDI, 2010.

 

Cloud:

[4] Improving the scalability of data center networks with traffic-aware virtual machine placement. X. Meng, V. Pappas, and L. Zhang. In Proc. of IEEE INFOCOM, 2010.

 

Wireless routing

[5] Karp and Kung, GPSR: Greedy Perimeter Stateless Routing for Wireless Networks, in Proc. of ACM Mobicom 2000.

[7] Ben Leong, Barbara Liskov, and Robert Morris, Geographic Routing without Planarization, in NSDI 2006. 

 

Network security

[8] Intercepting Mobile Communications: The Insecurity of 802.11 Nikita Borisov, Ian Goldberg, David Wagner, in Proc. of ACM Mobicom 2001. 

[9] Chung Kei Wong, Mohamed G. Gouda, and Simon S. Lam, Secure Group Communications Using Key Graphs, IEEE/ACM Transactions on Networking, Vol. 8, No. 1, Feb. 2000

 

RFID systems

[10] Jinsong Han, Chen Qian, Panlong Yang, Dan Ma, Zhiping Jiang, Wei Xi, Jizhong Zhao, GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags, IEEE /ACM Transactions on Networking (ToN), 2016 

[11] Echoscope: Verifiable Smart Packaging with Passive RFID, in Proc of ACM Ubicomp 2016.

 

IoT security:

[12] Instant and Robust Authentication and Key Agreement among Mobile Devices, in Proc of ACM CCS 2016.

[13] Saiyu Qi, Yuanqing Zheng, Mo Li, Yunhao Liu, Jinli Qiu, Scalable Data Access Control in RFID-Enabled Supply Chain. in Proc of IEEE ICNP 2014

 

Network topology

[14] Jellyfish: Networking Data Centers Randomly, Ankit Singla, Chi-Yao Hong , Lucian Popa , P. Brighten Godfrey, in NSDI 2012

[15] Ye Yu and Chen Qian, Space Shuffle: A Scalable, Flexible, and High-Bandwidth Data Center Network, in Proceedings of 21th IEEE International Conference on Network Protocols (ICNP), 2014.

 

Virtual coordinates

[16] Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris, Vivaldi: A Decentralized Network Coordinate System, in SIGCOMM, 2004. 

 

Delaunay triangulation

[6] Lam and Qian, "Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch," in Proceedings of ACM SIGMETRICS, 2011.

[17] Qian and Lam, "ROME: Routing On Metropolitan-scale Ethernet". in Proceedings of 20th IEEE International Conference on Network Protocols (ICNP), 2012.

 

Erasure coding

[18] Luigi Rizzo, Effective Erasure Codes for Reliable Computer Communication Protocols, ACM SIGCOMM Computer Communication Review, April 1997. ( pdf ) 

[19] Y. Ma, et al., An Ensemble of Replication and Erasure Codes for Cloud File Systems, IEEE INFOCOMM 2013.

 

Network coding 

[20] S. Gollakota and D. Katabi, ZigZag Decoding: Combating Hidden Terminals in Wireless Networks, in SIGCOMM 2008.

 

Bloom Filter

[21] Andrei Broder and Michael Mitzenmacher, Network Applications of Bloom Filters: A Survey, in Internet Mathematics, 2005.

 

Hashing

[22] Dong Zhou, Bin Fan, Hyeontaek Lim, Michael Kaminsky, David G. Andersen, Scalable, High Performance Ethernet Forwarding with CUCKOOSWITCH, in ACM CoNEXT, 2013

[23] Ye Yu, Djamal Belazzougui, Chen Qian, and Qin Zhang Memory-efficient and Ultra-fast Network Lookup and Forwarding using Othello Hashing, in IEEE ICNP, 2017

 

Bitcoin 

[24] Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System