Arnaud Legout
Arnaud Legout
Research scientist Inria, France
Verified email at inria.fr - Homepage
Title
Cited by
Cited by
Year
Rarest first and choke algorithms are enough
A Legout, G Urvoy-Keller, P Michiardi
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 203-216, 2006
5142006
Network characteristics of video streaming traffic
A Rao, A Legout, Y Lim, D Towsley, C Barakat, W Dabbous
Proceedings of the Seventh COnference on emerging Networking EXperiments and …, 2011
3602011
Clustering and sharing incentives in bittorrent systems
A Legout, N Liogkas, E Kohler, L Zhang
ACM SIGMETRICS Performance Evaluation Review 35 (1), 301-312, 2007
3602007
PLM: fast convergence for cumulative layered multicast transmisson schemes
A Legout, EW Biersack
ACM SIGMETRICS Performance Evaluation Review 28 (1), 13-22, 2000
2552000
Social clicks: What and who gets read on Twitter?
M Gabielkov, A Ramachandran, A Chaintreau, A Legout
Proceedings of the 2016 ACM SIGMETRICS international conference on …, 2016
1862016
Recon: Revealing and controlling pii leaks in mobile network traffic
J Ren, A Rao, M Lindorfer, A Legout, D Choffnes
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
1412016
Understanding bittorrent: An experimental perspective
A Legout, G Urvoy-Keller, P Michiardi
1402005
Pushing bittorrent locality to the limit
S Le Blond, A Legout, W Dabbous
Computer Networks 55 (3), 541-557, 2011
1332011
Bandwidth-allocation policies for unicast and multicast flows
A Legout, J Nonnenmacher, EW Biersack
IEEE/ACM Transactions on Networking 9 (4), 464-478, 2001
1222001
Pathological Behaviors for RLM and RLC
A Legout, EW Biersack
Proc. of NOSSDAV’00, 164-172, 2000
892000
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users
SL Blond, P Manils, C Abdelberi, MAD Kaafar, C Castelluccia, A Legout, ...
arXiv preprint arXiv:1103.1518, 2011
752011
Spying the world from your laptop: identifying and profiling content providers and big downloaders in BitTorrent
S Le Blond, A Legout, F Lefessant, W Dabbous, MA Kaafar
Proceedings of the 3rd USENIX conference on Large-scale exploits and …, 2010
71*2010
Network non-neutrality debate: An economic analysis
E Altman, A Legout, Y Xu
International conference on research in networking, 68-81, 2011
682011
Small is not always beautiful
P Marciniak, N Liogkas, A Legout, E Kohler
arXiv preprint arXiv:0802.1015, 2008
572008
Studying social networks at scale: macroscopic anatomy of the twitter social graph
M Gabielkov, A Rao, A Legout
The 2014 ACM international conference on Measurement and modeling of …, 2014
562014
I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy
S Le Blond, C Zhang, A Legout, K Ross, W Dabbous
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
542011
Understanding the properties of the bittorrent overlay
AA Hamra, A Legout, C Barakat
arXiv preprint arXiv:0707.1820, 2007
542007
The complete picture of the Twitter social graph
M Gabielkov, A Legout
Proceedings of the 2012 ACM conference on CoNEXT student workshop, 19-20, 2012
492012
Compromising Tor anonymity exploiting P2P information leakage
P Manils, C Abdelberri, SL Blond, MA Kaafar, C Castelluccia, A Legout, ...
arXiv preprint arXiv:1004.1461, 2010
402010
Meddle: middleboxes for increased transparency and control of mobile traffic
A Rao, J Sherry, A Legout, A Krishnamurthy, W Dabbous, D Choffnes
Proceedings of the 2012 ACM conference on CoNEXT student workshop, 65-66, 2012
332012
The system can't perform the operation now. Try again later.
Articles 1–20