Follow
Arnaud Legout
Arnaud Legout
Research scientist Inria, France
Verified email at inria.fr - Homepage
Title
Cited by
Cited by
Year
Rarest first and choke algorithms are enough
A Legout, G Urvoy-Keller, P Michiardi
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 203-216, 2006
5462006
Social clicks: What and who gets read on Twitter?
M Gabielkov, A Ramachandran, A Chaintreau, A Legout
Proceedings of the 2016 ACM SIGMETRICS international conference on …, 2016
5212016
Network characteristics of video streaming traffic
A Rao, A Legout, Y Lim, D Towsley, C Barakat, W Dabbous
Proceedings of the seventh conference on emerging networking experiments and …, 2011
4482011
Clustering and sharing incentives in bittorrent systems
A Legout, N Liogkas, E Kohler, L Zhang
ACM SIGMETRICS Performance Evaluation Review 35 (1), 301-312, 2007
3822007
Recon: Revealing and controlling pii leaks in mobile network traffic
J Ren, A Rao, M Lindorfer, A Legout, D Choffnes
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
2832016
PLM: fast convergence for cumulative layered multicast transmisson schemes
A Legout, EW Biersack
ACM SIGMETRICS Performance Evaluation Review 28 (1), 13-22, 2000
2782000
Understanding bittorrent: An experimental perspective
A Legout, G Urvoy-Keller, P Michiardi
1602005
Pushing bittorrent locality to the limit
S Le Blond, A Legout, W Dabbous
Computer Networks 55 (3), 541-557, 2011
1352011
Bandwidth-allocation policies for unicast and multicast flows
A Legout, J Nonnenmacher, EW Biersack
IEEE/ACM Transactions on Networking 9 (4), 464-478, 2001
1272001
One Bad Apple Spoils the Bunch: Exploiting {P2P} Applications to Trace and Profile Tor Users
S Le Blond, P Manils, A Chaabane, MA Kaafar, C Castelluccia, A Legout, ...
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011
952011
Pathological Behaviors for RLM and RLC
A Legout, EW Biersack
Proc. of NOSSDAV, 2000
922000
Network non-neutrality debate: An economic analysis
E Altman, A Legout, Y Xu
NETWORKING 2011: 10th International IFIP TC 6 Networking Conference …, 2011
872011
Using the middle to meddle with mobile
A Rao, AM Kakhki, A Razaghpanah, A Tang, S Wang, J Sherry, P Gill, ...
CCIS, Dec, 2013
842013
Studying social networks at scale: macroscopic anatomy of the twitter social graph
M Gabielkov, A Rao, A Legout
The 2014 ACM international conference on Measurement and modeling of …, 2014
742014
Spying the world from your laptop: identifying and profiling content providers and big downloaders in BitTorrent
S Le Blond, A Legout, F Lefessant, W Dabbous, MA Kaafar
Proceedings of the 3rd USENIX conference on Large-scale exploits and …, 2010
74*2010
I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy
S Le Blond, C Zhang, A Legout, K Ross, W Dabbous
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
642011
Missed by filter lists: Detecting unknown third-party trackers with invisible pixels
I Fouad, N Bielova, A Legout, N Sarafijanovic-Djukic
arXiv preprint arXiv:1812.01514, 2018
632018
Understanding the properties of the bittorrent overlay
AA Hamra, A Legout, C Barakat
arXiv preprint arXiv:0707.1820, 2007
622007
The complete picture of the Twitter social graph
M Gabielkov, A Legout
Proceedings of the 2012 ACM conference on CoNEXT student workshop, 19-20, 2012
602012
Small is not always beautiful
P Marciniak, N Liogkas, A Legout, E Kohler
arXiv preprint arXiv:0802.1015, 2008
572008
The system can't perform the operation now. Try again later.
Articles 1–20