IEEE Intl. Conference on Network Protocols, ICNP 2017


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Selective HTTPS traffic manipulation at middleboxes for BYOD devices

Xing Liu, Feng Qian, Zhiyun Qian

Selective HTTPS traffic manipulation at middleboxes for BYOD devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

The implementation of improved MPTCP in MANETs

Tongguang Zhang, Shuai Zhao, Yulong Shi, Bingfei Ren, Bo Cheng, Junliang Chen

The implementation of improved MPTCP in MANETs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure crowdsourced radio environment map construction

Yidan Hu, Rui Zhang

Secure crowdsourced radio environment map construction

Details
Discussion Comments: 0
Verification: Authors have not verified information

Experimental evaluation of two OpenFlow controllers

Mohamad Darianian, Carey Williamson, Israat Haque

Experimental evaluation of two OpenFlow controllers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Stabilizing BGP through distributed elimination of recurrent routing loops

João Luis Sobrinho, David Fialho, Paulo Mateus

Stabilizing BGP through distributed elimination of recurrent routing loops

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Impacts of task placement and bandwidth allocation on stream analytics

Walid A. Y. Aljoby, Tom Z. J. Fu, Richard T. B. Ma

Impacts of task placement and bandwidth allocation on stream analytics

Details
Discussion Comments: 0
Verification: Authors have not verified information

MDP modeling of resource provisioning in virtualized content-delivery networks

Ali A. Haghighi, Shahram Shah-Heydari, Shahram ShahbazPanahi

MDP modeling of resource provisioning in virtualized content-delivery networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Performance enhancement of multipath TCP in mobile Ad Hoc networks

Tongguang Zhang, Shuai Zhao, Bingfei Ren, Yulong Shi, Bo Cheng, Junliang Chen

Performance enhancement of multipath TCP in mobile Ad Hoc networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Experimental evaluation of BBR congestion control

Mario Hock, Roland Bless, Martina Zitterbart

Experimental evaluation of BBR congestion control

Details
Discussion Comments: 0
Verification: Authors have not verified information

VMS: Traffic balancing based on virtual switches in datacenter networks

Zhaogeng Li, Jun Bi, Yiran Zhang, Abdul Basit Dogar, Chengwei Qin

VMS: Traffic balancing based on virtual switches in datacenter networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Characterizing and optimizing background data transfers on smartwatches

Yi Yang, Guohong Cao

Characterizing and optimizing background data transfers on smartwatches

Details
Discussion Comments: 0
Verification: Authors have not verified information

GSC: Greedy shard caching algorithm for improved I/O efficiency in GraphChi

Dagang Li, Zehua Zheng

GSC: Greedy shard caching algorithm for improved I/O efficiency in GraphChi

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed Mininet placement algorithm for fat-tree topologies

Philippos Isaia, Lin Guan

Distributed Mininet placement algorithm for fat-tree topologies

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fast testing network data plane with RuleChecker

Peng Zhang, Cheng Zhang, Chengchen Hu

Fast testing network data plane with RuleChecker

Details
Discussion Comments: 0
Verification: Authors have not verified information

Toward a programmable FIB caching architecture

Garegin Grigoryan, Yaoqing Liu

Toward a programmable FIB caching architecture

Details
Discussion Comments: 0
Verification: Authors have not verified information

When creek meets river: Exploiting high-bandwidth circuit switch in scheduling multicast data

Xiaoye Steven Sun, T. S. Eugene Ng

When creek meets river: Exploiting high-bandwidth circuit switch in scheduling multicast data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cost of not arbitrarily splitting in routing

Yingjie Bi, Ao Tang

Cost of not arbitrarily splitting in routing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Wireless network instabilities in the wild: Prevalence, App (non)resilience, and OS remedy

Zeqi Lai, Yong Cui, Yimin Jiang, Xiaomeng Chen, Y. Charlie Hu, Kun Tan, Minglong Dai, Kai Zheng

Wireless network instabilities in the wild: Prevalence, App (non)resilience, and OS remedy

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deploying default paths by joint optimization of flow table and group table in SDNs

Gongming Zhao, Hongli Xu, Shigang Chen, Liusheng Huang, Pengzhan Wang

Deploying default paths by joint optimization of flow table and group table in SDNs

Details
Discussion Comments: 0
Verification: Authors have not verified information

SICS: Secure and dynamic middlebox outsourcing

Huazhe Wang, Xin Li, Chen Qian

SICS: Secure and dynamic middlebox outsourcing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Suffering from buffering? Detecting QoE impairments in live video streams

Adnan Ahmed, Zubair Shafiq, Harkeerat Bedi, Amir R. Khakpour

Suffering from buffering? Detecting QoE impairments in live video streams

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards higher throughput rate adaptation for backscatter networks

Wei Gong, Si Chen, Jiangchuan Liu

Towards higher throughput rate adaptation for backscatter networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A customized and cost-efficient backup scheme in software-defined networks

Zhijie Zhu, Qing Li, Mingwei Xu, Ziyan Song, Shu-Tao Xia

A customized and cost-efficient backup scheme in software-defined networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Coordinating rolling software upgrades for cellular networks

Mubashir Adnan Qureshi, Ajay Mahimkar, Lili Qiu, Zihui Ge, Max Zhang, Ioannis Broustis

Coordinating rolling software upgrades for cellular networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

PMC: Parallel multi-protocol communication to heterogeneous IoT radios within a single WiFi channel

Zicheng Chi, Yan Li, Yao Yao, Ting Zhu

PMC: Parallel multi-protocol communication to heterogeneous IoT radios within a single WiFi channel

Details
Discussion Comments: 0
Verification: Authors have not verified information

Investigating the impact of cache pollution attacks in heterogeneous cellular networks

Sibendu Paul, Anand Seetharam, Amitava Mukherjee, Mrinal Kanti Naskar

Investigating the impact of cache pollution attacks in heterogeneous cellular networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A programmable buffer management platform

Kirill Kogan, Danushka Menikkumbura, Gustavo Petri, Yangtae Noh, Sergey I. Nikolenko, Alexander Sirotkin, Patrick Eugster

A programmable buffer management platform

Details
Discussion Comments: 0
Verification: Authors have not verified information

Spatio-temporal analysis and prediction of cellular traffic in metropolis

Xu Wang, Zimu Zhou, Zheng Yang, Yunhao Liu, Chunyi Peng

Spatio-temporal analysis and prediction of cellular traffic in metropolis

Details
Discussion Comments: 0
Verification: Authors have not verified information

A concise forwarding information base for scalable and fast name lookups

Ye Yu, Djamal Belazzougui, Chen Qian, Qin Zhang

A concise forwarding information base for scalable and fast name lookups

Details
Discussion Comments: 0
Verification: Authors have not verified information

SoftRing: Taming the reactive model for software defined networks

Chengchen Hu, Kaiyu Hou, Hao Li, Ruilong Wang, Peng Zheng, Peng Zhang, Huanzhao Wang

SoftRing: Taming the reactive model for software defined networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Machine learning at the network edge for automated home intrusion monitoring

Aditya Dhakal, K. K. Ramakrishnan

Machine learning at the network edge for automated home intrusion monitoring

Details
Discussion Comments: 0
Verification: Authors have not verified information

BlueCoDE: Bluetooth coordination in dense environment for better coexistence

Weiping Sun, Jonghoe Koo, Seongho Byeon, Woojin Park, Sangsoon Lim, Daehyun Ban, Sunghyun Choi

BlueCoDE: Bluetooth coordination in dense environment for better coexistence

Details
Author Comments: The source code used in this paper, i.e., the code operating on Ubertooth for Bluetooth master and coordinator devices, has not yet systematically organized. For any questions related to the implementations and experiments, please feel free to contact Dr. Weiping Sun via weiping@mwnl.snu.ac.kr
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Cotask scheduling in cloud computing

Yangming Zhao, Shouxi Luo, Yi Wang, Sheng Wang

Cotask scheduling in cloud computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Planning in compute-aggregate problems as optimization problems on graphs

Pavel Chuprikov, Alex Davydow, Kirill Kogan, Sergey I. Nikolenko, Alexander V. Sirotkin

Planning in compute-aggregate problems as optimization problems on graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

MSAID: Automated interference detection for multiple SDN applications

Yahui Li, Zhiliang Wang, Jiangyuan Yao, Xia Yin, Xingang Shi, Jianping Wu

MSAID: Automated interference detection for multiple SDN applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rethinking LTE network functions virtualization

Muhammad Taqi Raza, Dongho Kim, Kyu-Han Kim, Songwu Lu, Mario Gerla

Rethinking LTE network functions virtualization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Popularity-aware differentiated distributed stream processing on skewed streams

Hanhua Chen, Fan Zhang, Hai Jin

Popularity-aware differentiated distributed stream processing on skewed streams

Details
Discussion Comments: 0
Verification: Authors have not verified information

SocialGate: Managing large-scale social data on home gateways

David Koll, Dieter Lechler, Xiaoming Fu

SocialGate: Managing large-scale social data on home gateways

Details
Discussion Comments: 0
Verification: Authors have not verified information

vPROM: VSwitch enhanced programmable measurement in SDN

An Wang, Yang Guo, Songqing Chen, Fang Hao, T. V. Lakshman, Doug Montgomery, Kotikalapudi Sriram

vPROM: VSwitch enhanced programmable measurement in SDN

Details
Discussion Comments: 0
Verification: Authors have not verified information

When deep learning meets edge computing

Yutao Huang, Xiaoqiang Ma, Xiaoyi Fan, Jiangchuan Liu, Wei Gong

When deep learning meets edge computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reflection: Automated test location selection for cellular network upgrades

Mubashir Adnan Qureshi, Ajay Mahimkar, Lili Qiu, Zihui Ge, Sarat C. Puthenpura, Nabeel Mir, Sanjeev Ahuja

Reflection: Automated test location selection for cellular network upgrades

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mrs. Z: Improving ZigBee throughput via multi-rate transmission

Yifeng Cao, Linghe Kong, Liang He, Guihai Chen, Min-You Wu, Tian He

Mrs. Z: Improving ZigBee throughput via multi-rate transmission

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

A network-centric TCP for interactive video delivery networks (VDN)

Md Iftakharul Islam, Javed I. Khan

A network-centric TCP for interactive video delivery networks (VDN)

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Yosemite: Efficient scheduling of weighted coflows in data centers

Han Zhang, Xingang Shi, Xia Yin, Zhiliang Wang

Yosemite: Efficient scheduling of weighted coflows in data centers

Details
Discussion Comments: 0
Verification: Authors have not verified information

iMUTE: Energy-optimal update policy for perishable mobile contents

Joohyun Lee, Fang Liu, Kyunghan Lee, Ness B. Shroff

iMUTE: Energy-optimal update policy for perishable mobile contents

Details
Discussion Comments: 0
Verification: Authors have not verified information

On an impact of large content on packet-level caching of information centric networking

Yoji Yamamoto, Junji Takemasa, Yuki Koizumi, Toru Hasegawa

On an impact of large content on packet-level caching of information centric networking

Details
Discussion Comments: 0
Verification: Authors have not verified information

An empirical model of packet processing delay of the Open vSwitch

Danish Sattar, Ashraf Matrawy

An empirical model of packet processing delay of the Open vSwitch

Details
Discussion Comments: 0
Verification: Authors have not verified information

The first experimental SDR platform for inband D2D communications in 5G

Max Engelhardt, Arash Asadi

The first experimental SDR platform for inband D2D communications in 5G

Details
Discussion Comments: 0
Verification: Authors have not verified information

A framework for anonymous routing in delay tolerant networks

Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu

A framework for anonymous routing in delay tolerant networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network

Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih-Chun Hu

TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network

Details
Discussion Comments: 0
Verification: Authors have not verified information

Preferential link tomography in dynamic networks

Huikang Li, Yi Gao, Wei Dong, Chun Chen

Preferential link tomography in dynamic networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Making multipath TCP friendlier to load balancers and anycast

Fabien Duchene, Olivier Bonaventure

Making multipath TCP friendlier to load balancers and anycast

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enabling seamless WiGig/WiFi handovers in tri-band wireless systems

Yao-Yu Li, Chi-Yu Li, Wei-Han Chen, Chia-Jui Yeh, Kuochen Wang

Enabling seamless WiGig/WiFi handovers in tri-band wireless systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Comparing OpenFlow and NETCONF when interconnecting data centers

Thomas Kunz, Karpakamurthy Muthukumar

Comparing OpenFlow and NETCONF when interconnecting data centers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Analyzing public transportation mobility data for networking purposes

Kais Elmurtadi Suleiman, Otman Basir

Analyzing public transportation mobility data for networking purposes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Algorithm-data driven optimization of adaptive communication networks

Mu He, Patrick Kalmbach, Andreas Blenk, Wolfgang Kellerer, Stefan Schmid

Algorithm-data driven optimization of adaptive communication networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

SyncCoding: A compression technique exploiting references for data synchronization services

Wooseung Nam, Joohyun Lee, Kyunghan Lee

SyncCoding: A compression technique exploiting references for data synchronization services

Details
Discussion Comments: 0
Verification: Authors have not verified information

GeneWave: Fast authentication and key agreement on commodity mobile devices

Pengjin Xie, Jingchao Feng, Zhichao Cao, Jiliang Wang

GeneWave: Fast authentication and key agreement on commodity mobile devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

The dynamic cuckoo filter

Hanhua Chen, Liangyi Liao, Hai Jin, Jie Wu

The dynamic cuckoo filter

Details
Discussion Comments: 0
Verification: Authors have not verified information

A multiple vehicle sensing approach for collision avoidance in progressively deployed vehicle networks

Yi Gao, Xue Liu, Wei Dong

A multiple vehicle sensing approach for collision avoidance in progressively deployed vehicle networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

P4DB: On-the-fly debugging of the programmable data plane

Cheng Zhang, Jun Bi, Yu Zhou, Jianping Wu, Bingyang Liu, Zhaogeng Li, Abdul Basit Dogar, Yangyang Wang

P4DB: On-the-fly debugging of the programmable data plane

Details
Discussion Comments: 0
Verification: Authors have not verified information

BoLTE: Efficient network-wide LTE broadcasting

Rajarajan Sivaraj, Mustafa Y. Arslan, Karthikeyan Sundaresan, Sampath Rangarajan, Prasant Mohapatra

BoLTE: Efficient network-wide LTE broadcasting

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adaptively adjusting ECN marking thresholds for datacenter networks

Shuo Wang, Jiao Zhang, Tao Huang, Tian Pan, Jiang Liu, Yunjie Liu

Adaptively adjusting ECN marking thresholds for datacenter networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

General ternary bit strings on commodity longest-prefix-match infrastructures

Pavel Chuprikov, Kirill Kogan, Sergey I. Nikolenko

General ternary bit strings on commodity longest-prefix-match infrastructures

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multipath TCP traffic diversion attacks and countermeasures

Ali Munir, Zhiyun Qian, Zubair Shafiq, Alex Liu, Franck Le

Multipath TCP traffic diversion attacks and countermeasures

Details
Discussion Comments: 0
Verification: Authors have not verified information

Peering vs. transit: Performance comparison of peering and transit interconnections

Adnan Ahmed, Zubair Shafiq, Harkeerat Bedi, Amir R. Khakpour

Peering vs. transit: Performance comparison of peering and transit interconnections

Details
Discussion Comments: 0
Verification: Authors have not verified information

NF-switch: VNFs-enabled SDN switches for high performance service function chaining

Cheng-Liang Hsieh, Ning Weng

NF-switch: VNFs-enabled SDN switches for high performance service function chaining

Details
Discussion Comments: 0
Verification: Authors have not verified information

SDN-based service automation for IoT

Mostafa Uddin, Sarit Mukherjee, Hyunseok Chang, T. V. Lakshman

SDN-based service automation for IoT

Details
Discussion Comments: 0
Verification: Authors have not verified information