All papers
| Reflections on Trusting Trust Ken Thompson |
| Why Cryptosystems Fail Ross Anderson |
| A Logic of Authentication Michael Burrows, Roger Needham |
| A Scalable, Commodity Data Center Network Architecture
Mohammad Al-Fares, Alexander Loukissas, Amin Vahdat |
| A Scalable, Commodity Data Center Network Architecture
Mohammad Al-Fares, Alexander Loukissas, Amin Vahdat |
| Inferring Network-Wide Quality in P2P Live Streaming System |
| Measurement of Commercial Peer-To-Peer Live Video Streaming |
| I Tube, You Tube, Everybody Tubes: Analyzing the World’s Largest User Generated Content Video System |
| An Experimental Study of the Skype Peer-to-Peer VoIP System Saikat Guha, Neil Daswani |
| Requirements, Bottlenecks and Good Fortune: Agents for Microprocessor Evolution Y. N. Patt |