Social clicks: What and who gets read on Twitter? M Gabielkov, A Ramachandran, A Chaintreau, A Legout Proceedings of the 2016 ACM SIGMETRICS international conference on …, 2016 | 576 | 2016 |
Rarest first and choke algorithms are enough A Legout, G Urvoy-Keller, P Michiardi Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 203-216, 2006 | 547 | 2006 |
Network characteristics of video streaming traffic A Rao, A Legout, Y Lim, D Towsley, C Barakat, W Dabbous Proceedings of the seventh conference on emerging networking experiments and …, 2011 | 454 | 2011 |
Clustering and sharing incentives in bittorrent systems A Legout, N Liogkas, E Kohler, L Zhang ACM SIGMETRICS Performance Evaluation Review 35 (1), 301-312, 2007 | 378 | 2007 |
Recon: Revealing and controlling pii leaks in mobile network traffic J Ren, A Rao, M Lindorfer, A Legout, D Choffnes Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016 | 316 | 2016 |
PLM: fast convergence for cumulative layered multicast transmisson schemes A Legout, EW Biersack ACM SIGMETRICS Performance Evaluation Review 28 (1), 13-22, 2000 | 280 | 2000 |
Understanding bittorrent: An experimental perspective A Legout, G Urvoy-Keller, P Michiardi | 165 | 2005 |
Pushing bittorrent locality to the limit S Le Blond, A Legout, W Dabbous Computer Networks 55 (3), 541-557, 2011 | 135 | 2011 |
Bandwidth-allocation policies for unicast and multicast flows A Legout, J Nonnenmacher, EW Biersack IEEE/ACM Transactions on Networking 9 (4), 464-478, 2001 | 129 | 2001 |
Using the middle to meddle with mobile A Rao, AM Kakhki, A Razaghpanah, A Tang, S Wang, J Sherry, P Gill, ... CCIS, Dec, 2013 | 105 | 2013 |
One Bad Apple Spoils the Bunch: Exploiting {P2P} Applications to Trace and Profile Tor Users S Le Blond, P Manils, A Chaabane, MA Kaafar, C Castelluccia, A Legout, ... 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011 | 98 | 2011 |
Pathological Behaviors for RLM and RLC A Legout, EW Biersack Proc. of NOSSDAV, 2000 | 94 | 2000 |
Network non-neutrality debate: An economic analysis E Altman, A Legout, Y Xu NETWORKING 2011: 10th International IFIP TC 6 Networking Conference …, 2011 | 89 | 2011 |
Studying social networks at scale: macroscopic anatomy of the twitter social graph M Gabielkov, A Rao, A Legout The 2014 ACM international conference on Measurement and modeling of …, 2014 | 75 | 2014 |
Spying the world from your laptop: identifying and profiling content providers and big downloaders in BitTorrent S Le Blond, A Legout, F Lefessant, W Dabbous, MA Kaafar Proceedings of the 3rd USENIX conference on Large-scale exploits and …, 2010 | 72* | 2010 |
Missed by filter lists: Detecting unknown third-party trackers with invisible pixels I Fouad, N Bielova, A Legout, N Sarafijanovic-Djukic arXiv preprint arXiv:1812.01514, 2018 | 70 | 2018 |
I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy S Le Blond, C Zhang, A Legout, K Ross, W Dabbous Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 64 | 2011 |
Understanding the properties of the bittorrent overlay AA Hamra, A Legout, C Barakat arXiv preprint arXiv:0707.1820, 2007 | 62 | 2007 |
The complete picture of the Twitter social graph M Gabielkov, A Legout Proceedings of the 2012 ACM conference on CoNEXT student workshop, 19-20, 2012 | 61 | 2012 |
Small is not always beautiful P Marciniak, N Liogkas, A Legout, E Kohler arXiv preprint arXiv:0802.1015, 2008 | 54 | 2008 |