Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Selective HTTPS traffic manipulation at middleboxes for BYOD devices Xing Liu, Feng Qian, Zhiyun Qian |
Selective HTTPS traffic manipulation at middleboxes for BYOD devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The implementation of improved MPTCP in MANETs Tongguang Zhang, Shuai Zhao, Yulong Shi, Bingfei Ren, Bo Cheng, Junliang Chen |
The implementation of improved MPTCP in MANETs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Secure crowdsourced radio environment map construction Yidan Hu, Rui Zhang |
Secure crowdsourced radio environment map construction Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Experimental evaluation of two OpenFlow controllers Mohamad Darianian, Carey Williamson, Israat Haque |
Experimental evaluation of two OpenFlow controllers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Stabilizing BGP through distributed elimination of recurrent routing loops João Luis Sobrinho, David Fialho, Paulo Mateus |
Stabilizing BGP through distributed elimination of recurrent routing loops Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Impacts of task placement and bandwidth allocation on stream analytics Walid A. Y. Aljoby, Tom Z. J. Fu, Richard T. B. Ma |
Impacts of task placement and bandwidth allocation on stream analytics Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MDP modeling of resource provisioning in virtualized content-delivery networks Ali A. Haghighi, Shahram Shah-Heydari, Shahram ShahbazPanahi |
MDP modeling of resource provisioning in virtualized content-delivery networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Performance enhancement of multipath TCP in mobile Ad Hoc networks Tongguang Zhang, Shuai Zhao, Bingfei Ren, Yulong Shi, Bo Cheng, Junliang Chen |
Performance enhancement of multipath TCP in mobile Ad Hoc networks Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Experimental evaluation of BBR congestion control Mario Hock, Roland Bless, Martina Zitterbart |
Experimental evaluation of BBR congestion control Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
VMS: Traffic balancing based on virtual switches in datacenter networks Zhaogeng Li, Jun Bi, Yiran Zhang, Abdul Basit Dogar, Chengwei Qin |
VMS: Traffic balancing based on virtual switches in datacenter networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Characterizing and optimizing background data transfers on smartwatches Yi Yang, Guohong Cao |
Characterizing and optimizing background data transfers on smartwatches Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
GSC: Greedy shard caching algorithm for improved I/O efficiency in GraphChi Dagang Li, Zehua Zheng |
GSC: Greedy shard caching algorithm for improved I/O efficiency in GraphChi Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Distributed Mininet placement algorithm for fat-tree topologies Philippos Isaia, Lin Guan |
Distributed Mininet placement algorithm for fat-tree topologies Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fast testing network data plane with RuleChecker Peng Zhang, Cheng Zhang, Chengchen Hu |
Fast testing network data plane with RuleChecker Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Toward a programmable FIB caching architecture Garegin Grigoryan, Yaoqing Liu |
Toward a programmable FIB caching architecture Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
When creek meets river: Exploiting high-bandwidth circuit switch in scheduling multicast data Xiaoye Steven Sun, T. S. Eugene Ng |
When creek meets river: Exploiting high-bandwidth circuit switch in scheduling multicast data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Cost of not arbitrarily splitting in routing Yingjie Bi, Ao Tang |
Cost of not arbitrarily splitting in routing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Wireless network instabilities in the wild: Prevalence, App (non)resilience, and OS remedy Zeqi Lai, Yong Cui, Yimin Jiang, Xiaomeng Chen, Y. Charlie Hu, Kun Tan, Minglong Dai, Kai Zheng |
Wireless network instabilities in the wild: Prevalence, App (non)resilience, and OS remedy Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Deploying default paths by joint optimization of flow table and group table in SDNs Gongming Zhao, Hongli Xu, Shigang Chen, Liusheng Huang, Pengzhan Wang |
Deploying default paths by joint optimization of flow table and group table in SDNs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SICS: Secure and dynamic middlebox outsourcing Huazhe Wang, Xin Li, Chen Qian |
SICS: Secure and dynamic middlebox outsourcing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Suffering from buffering? Detecting QoE impairments in live video streams Adnan Ahmed, Zubair Shafiq, Harkeerat Bedi, Amir R. Khakpour |
Suffering from buffering? Detecting QoE impairments in live video streams Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards higher throughput rate adaptation for backscatter networks Wei Gong, Si Chen, Jiangchuan Liu |
Towards higher throughput rate adaptation for backscatter networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A customized and cost-efficient backup scheme in software-defined networks Zhijie Zhu, Qing Li, Mingwei Xu, Ziyan Song, Shu-Tao Xia |
A customized and cost-efficient backup scheme in software-defined networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Coordinating rolling software upgrades for cellular networks Mubashir Adnan Qureshi, Ajay Mahimkar, Lili Qiu, Zihui Ge, Max Zhang, Ioannis Broustis |
Coordinating rolling software upgrades for cellular networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PMC: Parallel multi-protocol communication to heterogeneous IoT radios within a single WiFi channel Zicheng Chi, Yan Li, Yao Yao, Ting Zhu |
PMC: Parallel multi-protocol communication to heterogeneous IoT radios within a single WiFi channel Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Investigating the impact of cache pollution attacks in heterogeneous cellular networks Sibendu Paul, Anand Seetharam, Amitava Mukherjee, Mrinal Kanti Naskar |
Investigating the impact of cache pollution attacks in heterogeneous cellular networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A programmable buffer management platform Kirill Kogan, Danushka Menikkumbura, Gustavo Petri, Yangtae Noh, Sergey I. Nikolenko, Alexander Sirotkin, Patrick Eugster |
A programmable buffer management platform Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Spatio-temporal analysis and prediction of cellular traffic in metropolis Xu Wang, Zimu Zhou, Zheng Yang, Yunhao Liu, Chunyi Peng |
Spatio-temporal analysis and prediction of cellular traffic in metropolis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A concise forwarding information base for scalable and fast name lookups Ye Yu, Djamal Belazzougui, Chen Qian, Qin Zhang |
A concise forwarding information base for scalable and fast name lookups Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SoftRing: Taming the reactive model for software defined networks Chengchen Hu, Kaiyu Hou, Hao Li, Ruilong Wang, Peng Zheng, Peng Zhang, Huanzhao Wang |
SoftRing: Taming the reactive model for software defined networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Machine learning at the network edge for automated home intrusion monitoring Aditya Dhakal, K. K. Ramakrishnan |
Machine learning at the network edge for automated home intrusion monitoring Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BlueCoDE: Bluetooth coordination in dense environment for better coexistence Weiping Sun, Jonghoe Koo, Seongho Byeon, Woojin Park, Sangsoon Lim, Daehyun Ban, Sunghyun Choi |
BlueCoDE: Bluetooth coordination in dense environment for better coexistence Details |
|
Author Comments:
The source code used in this paper, i.e., the code operating on Ubertooth for Bluetooth master and coordinator devices, has not yet systematically organized. For any questions related to the implementations and experiments, please feel free to contact Dr. Weiping Sun via weiping@mwnl.snu.ac.kr
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Cotask scheduling in cloud computing Yangming Zhao, Shouxi Luo, Yi Wang, Sheng Wang |
Cotask scheduling in cloud computing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Planning in compute-aggregate problems as optimization problems on graphs Pavel Chuprikov, Alex Davydow, Kirill Kogan, Sergey I. Nikolenko, Alexander V. Sirotkin |
Planning in compute-aggregate problems as optimization problems on graphs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MSAID: Automated interference detection for multiple SDN applications Yahui Li, Zhiliang Wang, Jiangyuan Yao, Xia Yin, Xingang Shi, Jianping Wu |
MSAID: Automated interference detection for multiple SDN applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Rethinking LTE network functions virtualization Muhammad Taqi Raza, Dongho Kim, Kyu-Han Kim, Songwu Lu, Mario Gerla |
Rethinking LTE network functions virtualization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Popularity-aware differentiated distributed stream processing on skewed streams Hanhua Chen, Fan Zhang, Hai Jin |
Popularity-aware differentiated distributed stream processing on skewed streams Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
SocialGate: Managing large-scale social data on home gateways David Koll, Dieter Lechler, Xiaoming Fu |
SocialGate: Managing large-scale social data on home gateways Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
vPROM: VSwitch enhanced programmable measurement in SDN An Wang, Yang Guo, Songqing Chen, Fang Hao, T. V. Lakshman, Doug Montgomery, Kotikalapudi Sriram |
vPROM: VSwitch enhanced programmable measurement in SDN Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
When deep learning meets edge computing Yutao Huang, Xiaoqiang Ma, Xiaoyi Fan, Jiangchuan Liu, Wei Gong |
When deep learning meets edge computing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reflection: Automated test location selection for cellular network upgrades Mubashir Adnan Qureshi, Ajay Mahimkar, Lili Qiu, Zihui Ge, Sarat C. Puthenpura, Nabeel Mir, Sanjeev Ahuja |
Reflection: Automated test location selection for cellular network upgrades Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mrs. Z: Improving ZigBee throughput via multi-rate transmission Yifeng Cao, Linghe Kong, Liang He, Guihai Chen, Min-You Wu, Tian He |
Mrs. Z: Improving ZigBee throughput via multi-rate transmission Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
A network-centric TCP for interactive video delivery networks (VDN) Md Iftakharul Islam, Javed I. Khan |
A network-centric TCP for interactive video delivery networks (VDN) Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Yosemite: Efficient scheduling of weighted coflows in data centers Han Zhang, Xingang Shi, Xia Yin, Zhiliang Wang |
Yosemite: Efficient scheduling of weighted coflows in data centers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
iMUTE: Energy-optimal update policy for perishable mobile contents Joohyun Lee, Fang Liu, Kyunghan Lee, Ness B. Shroff |
iMUTE: Energy-optimal update policy for perishable mobile contents Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On an impact of large content on packet-level caching of information centric networking Yoji Yamamoto, Junji Takemasa, Yuki Koizumi, Toru Hasegawa |
On an impact of large content on packet-level caching of information centric networking Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An empirical model of packet processing delay of the Open vSwitch Danish Sattar, Ashraf Matrawy |
An empirical model of packet processing delay of the Open vSwitch Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The first experimental SDR platform for inband D2D communications in 5G Max Engelhardt, Arash Asadi |
The first experimental SDR platform for inband D2D communications in 5G Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A framework for anonymous routing in delay tolerant networks Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu |
A framework for anonymous routing in delay tolerant networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih-Chun Hu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Preferential link tomography in dynamic networks Huikang Li, Yi Gao, Wei Dong, Chun Chen |
Preferential link tomography in dynamic networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Making multipath TCP friendlier to load balancers and anycast Fabien Duchene, Olivier Bonaventure |
Making multipath TCP friendlier to load balancers and anycast Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Enabling seamless WiGig/WiFi handovers in tri-band wireless systems Yao-Yu Li, Chi-Yu Li, Wei-Han Chen, Chia-Jui Yeh, Kuochen Wang |
Enabling seamless WiGig/WiFi handovers in tri-band wireless systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Comparing OpenFlow and NETCONF when interconnecting data centers Thomas Kunz, Karpakamurthy Muthukumar |
Comparing OpenFlow and NETCONF when interconnecting data centers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Analyzing public transportation mobility data for networking purposes Kais Elmurtadi Suleiman, Otman Basir |
Analyzing public transportation mobility data for networking purposes Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Algorithm-data driven optimization of adaptive communication networks Mu He, Patrick Kalmbach, Andreas Blenk, Wolfgang Kellerer, Stefan Schmid |
Algorithm-data driven optimization of adaptive communication networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SyncCoding: A compression technique exploiting references for data synchronization services Wooseung Nam, Joohyun Lee, Kyunghan Lee |
SyncCoding: A compression technique exploiting references for data synchronization services Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
GeneWave: Fast authentication and key agreement on commodity mobile devices Pengjin Xie, Jingchao Feng, Zhichao Cao, Jiliang Wang |
GeneWave: Fast authentication and key agreement on commodity mobile devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Hanhua Chen, Liangyi Liao, Hai Jin, Jie Wu |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Yi Gao, Xue Liu, Wei Dong |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
P4DB: On-the-fly debugging of the programmable data plane Cheng Zhang, Jun Bi, Yu Zhou, Jianping Wu, Bingyang Liu, Zhaogeng Li, Abdul Basit Dogar, Yangyang Wang |
P4DB: On-the-fly debugging of the programmable data plane Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
BoLTE: Efficient network-wide LTE broadcasting Rajarajan Sivaraj, Mustafa Y. Arslan, Karthikeyan Sundaresan, Sampath Rangarajan, Prasant Mohapatra |
BoLTE: Efficient network-wide LTE broadcasting Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Adaptively adjusting ECN marking thresholds for datacenter networks Shuo Wang, Jiao Zhang, Tao Huang, Tian Pan, Jiang Liu, Yunjie Liu |
Adaptively adjusting ECN marking thresholds for datacenter networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
General ternary bit strings on commodity longest-prefix-match infrastructures Pavel Chuprikov, Kirill Kogan, Sergey I. Nikolenko |
General ternary bit strings on commodity longest-prefix-match infrastructures Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Multipath TCP traffic diversion attacks and countermeasures Ali Munir, Zhiyun Qian, Zubair Shafiq, Alex Liu, Franck Le |
Multipath TCP traffic diversion attacks and countermeasures Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Peering vs. transit: Performance comparison of peering and transit interconnections Adnan Ahmed, Zubair Shafiq, Harkeerat Bedi, Amir R. Khakpour |
Peering vs. transit: Performance comparison of peering and transit interconnections Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
NF-switch: VNFs-enabled SDN switches for high performance service function chaining Cheng-Liang Hsieh, Ning Weng |
NF-switch: VNFs-enabled SDN switches for high performance service function chaining Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SDN-based service automation for IoT Mostafa Uddin, Sarit Mukherjee, Hyunseok Chang, T. V. Lakshman |
SDN-based service automation for IoT Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|