Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Mind the Gap: Towards a Backpressure-Based Transport Protocol for the Tor Network Florian Tschorsch, Björn Scheuermann |
Mind the Gap: Towards a Backpressure-Based Transport Protocol for the Tor Network Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Srinivas Narayana, Mina Tahmasbi, Jennifer Rexford, David Walker |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
VAST: A Unified Platform for Interactive Network Forensics Matthias Vallentin, Vern Paxson, Robin Sommer |
VAST: A Unified Platform for Interactive Network Forensics Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sibyl: A Practical Internet Route Oracle Ítalo Cunha, Pietro Marchetta, Matt Calder, Yi-Ching Chiu, Brandon Schlinker, Bruno V. A. Machado, Antonio Pescapè, Vasileios Giotsas, Harsha V. Madhyastha, Ethan Katz-Bassett |
Sibyl: A Practical Internet Route Oracle Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Diamond: Nesting the Data Center Network with Wireless Rings in 3D Space Yong Cui, Shihan Xiao, Xin Wang, Zhenjie Yang, Chao Zhu, Xiangyang Li, Liu Yang, Ning Ge |
Diamond: Nesting the Data Center Network with Wireless Rings in 3D Space Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Enabling ECN in Multi-Service Multi-Queue Data Centers Wei Bai, Li Chen, Kai Chen, Haitao Wu |
Enabling ECN in Multi-Service Multi-Queue Data Centers Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
HUG: Multi-Resource Fairness for Correlated and Elastic Demands Mosharaf Chowdhury, Zhenhua Liu, Ali Ghodsi, Ion Stoica |
HUG: Multi-Resource Fairness for Correlated and Elastic Demands Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
AnonRep: Towards Tracking-Resistant Anonymous Reputation Ennan Zhai, David Isaac Wolinsky, Ruichuan Chen, Ewa Syta, Chao Teng, Bryan Ford |
AnonRep: Towards Tracking-Resistant Anonymous Reputation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Decimeter-Level Localization with a Single WiFi Access Point Deepak Vasisht, Swarun Kumar, Dina Katabi |
Decimeter-Level Localization with a Single WiFi Access Point Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions Bryce Kellogg, Vamsi Talla, Shyamnath Gollakota, Joshua R. Smith |
Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Scalable Multi-User Uplink for Wi-Fi Adriana B. Flores, Sadia Quadri, Edward W. Knightly |
A Scalable Multi-User Uplink for Wi-Fi Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
StreamScope: Continuous Reliable Distributed Processing of Big Data Streams Wei Lin, Haochuan Fan, Zhengping Qian, Junwei Xu, Sen Yang, Jingren Zhou, Lidong Zhou |
StreamScope: Continuous Reliable Distributed Processing of Big Data Streams Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Radhika Mittal, Rachit Agarwal, Sylvia Ratnasamy, Scott Shenker |
Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard Zhenhua Li, Weiwei Wang, Tianyin Xu, Xin Zhong, Xiang-Yang Li, Yunhao Liu, Christo Wilson, Ben Y. Zhao |
Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficiently Delivering Online Services over Integrated Infrastructure Hongqiang Harry Liu, Raajay Viswanathan, Matt Calder, Aditya Akella, Ratul Mahajan, Jitendra Padhye, Ming Zhang |
Efficiently Delivering Online Services over Integrated Infrastructure Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Be Fast, Cheap and in Control with SwitchKV Xiaozhou Li, Raghav Sethi, Michael Kaminsky, David G. Andersen, Michael J. Freedman |
Be Fast, Cheap and in Control with SwitchKV Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Alon Shalita, Brian Karrer, Igor Kabiljo, Arun Sharma, Alessandro Presta, Aaron Adcock, Herald Kllapi, Michael Stumm |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Diplomat: Using Delegations to Protect Community Repositories Trishank Karthik Kuppusamy, Santiago Torres-Arias, Vladimir Diaz, Justin Cappos |
Diplomat: Using Delegations to Protect Community Repositories Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Scalable and Private Media Consumption with Popcorn Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath T. V. Setty, Lorenzo Alvisi, Michael Walfish |
Scalable and Private Media Consumption with Popcorn Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
BeamSpy: Enabling Robust 60 GHz Links Under Blockage Sanjib Sur, Xinyu Zhang, Parmesh Ramanathan, Ranveer Chandra |
BeamSpy: Enabling Robust 60 GHz Links Under Blockage Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Ernest: Efficient Performance Prediction for Large-Scale Advanced Analytics Shivaram Venkataraman, Zongheng Yang, Michael J. Franklin, Benjamin Recht, Ion Stoica |
Ernest: Efficient Performance Prediction for Large-Scale Advanced Analytics Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Paving the Way for NFV: Simplifying Middlebox Modifications Using StateAlyzr Junaid Khalid, Aaron Gember-Jacobson, Roney Michael, Anubhavnidhi Abhashkumar, Aditya Akella |
Paving the Way for NFV: Simplifying Middlebox Modifications Using StateAlyzr Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
FlowRadar: A Better NetFlow for Data Centers Yuliang Li, Rui Miao, Changhoon Kim, Minlan Yu |
FlowRadar: A Better NetFlow for Data Centers Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
FairRide: Near-Optimal, Fair Cache Sharing Qifan Pu, Haoyuan Li, Matei Zaharia, Ali Ghodsi, Ion Stoica |
FairRide: Near-Optimal, Fair Cache Sharing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BUZZ: Testing Context-Dependent Policies in Stateful Networks Seyed Kaveh Fayaz, Tianlong Yu, Yoshiaki Tobioka, Sagar Chaki, Vyas Sekar |
BUZZ: Testing Context-Dependent Policies in Stateful Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BlowFish: Dynamic Storage-Performance Tradeoff in Data Stores Anurag Khandelwal, Rachit Agarwal, Ion Stoica |
BlowFish: Dynamic Storage-Performance Tradeoff in Data Stores Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Consensus in a Box: Inexpensive Coordination in Hardware Zsolt István, David Sidler, Gustavo Alonso, Marko Vukolic |
Consensus in a Box: Inexpensive Coordination in Hardware Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PhyCloak: Obfuscating Sensing from Communication Signals Yue Qiao, Ouyang Zhang, Wenjie Zhou, Kannan Srinivasan, Anish Arora |
PhyCloak: Obfuscating Sensing from Communication Signals Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Bitcoin-NG: A Scalable Blockchain Protocol Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, Robbert van Renesse |
Bitcoin-NG: A Scalable Blockchain Protocol Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Embark: Securely Outsourcing Middleboxes to the Cloud Chang Lan, Justine Sherry, Raluca Ada Popa, Sylvia Ratnasamy, Zhi Liu |
Embark: Securely Outsourcing Middleboxes to the Cloud Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CFA: A Practical Prediction System for Video QoE Optimization Junchen Jiang, Vyas Sekar, Henry Milner, Davis Shepherd, Ion Stoica, Hui Zhang |
CFA: A Practical Prediction System for Video QoE Optimization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Speeding up Web Page Loads with Shandian Xiao Sophia Wang, Arvind Krishnamurthy, David Wetherall |
Speeding up Web Page Loads with Shandian Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Simplifying Software-Defined Network Optimization Using SOL Victor Heorhiadi, Michael K. Reiter, Vyas Sekar |
Simplifying Software-Defined Network Optimization Using SOL Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Ripple II: Faster Communication through Physical Vibration Nirupam Roy, Romit Roy Choudhury |
Ripple II: Faster Communication through Physical Vibration Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Earp: Principled Storage, Sharing, and Protection for Mobile Apps Yuanzhong Xu, Tyler Hunt, Youngjin Kwon, Martin Georgiev, Vitaly Shmatikov, Emmett Witchel |
Earp: Principled Storage, Sharing, and Protection for Mobile Apps Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
DFC: Accelerating String Pattern Matching for Network Applications Byungkwon Choi, Jongwook Chae, Muhammad Jamshed, KyoungSoo Park, Dongsu Han |
DFC: Accelerating String Pattern Matching for Network Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Minimizing Faulty Executions of Distributed Systems Colin Scott, Aurojit Panda, Vjekoslav Brajkovic, George C. Necula, Arvind Krishnamurthy, Scott Shenker |
Minimizing Faulty Executions of Distributed Systems Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Cliffhanger: Scaling Performance Cliffs in Web Memory Caches Asaf Cidon, Assaf Eisenman, Mohammad Alizadeh, Sachin Katti |
Cliffhanger: Scaling Performance Cliffs in Web Memory Caches Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Polaris: Faster Page Loads Using Fine-grained Dependency Tracking Ravi Netravali, Ameesh Goyal, James Mickens, Hari Balakrishnan |
Polaris: Faster Page Loads Using Fine-grained Dependency Tracking Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
iCellular: Device-Customized Cellular Network Access on Commodity Smartphones Yuanjie Li, Haotian Deng, Chunyi Peng, Zengwen Yuan, Guan-Hua Tu, Jiayao Li, Songwu Lu |
iCellular: Device-Customized Cellular Network Access on Commodity Smartphones Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
XFabric: A Reconfigurable In-Rack Network for Rack-Scale Computers Sergey Legtchenko, Nicholas Chen, Daniel Cletheroe, Antony I. T. Rowstron, Hugh Williams, Xiaohan Zhao |
XFabric: A Reconfigurable In-Rack Network for Rack-Scale Computers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Maglev: A Fast and Reliable Software Network Load Balancer Daniel E. Eisenbud, Cheng Yi, Carlo Contavalli, Cody Smith, Roman Kononov, Eric Mann-Hielscher, Ardas Cilingiroglu, Bin Cheyney, Wentao Shang, Jinnah Dylan Hosein |
Maglev: A Fast and Reliable Software Network Load Balancer Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Industrial-Scale Software Defined Internet Exchange Point Arpit Gupta, Robert MacDavid, Rüdiger Birkner, Marco Canini, Nick Feamster, Jennifer Rexford, Laurent Vanbever |
An Industrial-Scale Software Defined Internet Exchange Point Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds Frank Wang, James Mickens, Nickolai Zeldovich, Vinod Vaikuntanathan |
Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|