USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Mind the Gap: Towards a Backpressure-Based Transport Protocol for the Tor Network

Florian Tschorsch, Björn Scheuermann

Mind the Gap: Towards a Backpressure-Based Transport Protocol for the Tor Network

Details
Discussion Comments: 0
Verification: Authors have not verified information

Compiling Path Queries

Srinivas Narayana, Mina Tahmasbi, Jennifer Rexford, David Walker

Compiling Path Queries

Details
Discussion Comments: 0
Verification: Authors have not verified information

VAST: A Unified Platform for Interactive Network Forensics

Matthias Vallentin, Vern Paxson, Robin Sommer

VAST: A Unified Platform for Interactive Network Forensics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sibyl: A Practical Internet Route Oracle

Ítalo Cunha, Pietro Marchetta, Matt Calder, Yi-Ching Chiu, Brandon Schlinker, Bruno V. A. Machado, Antonio Pescapè, Vasileios Giotsas, Harsha V. Madhyastha, Ethan Katz-Bassett

Sibyl: A Practical Internet Route Oracle

Details
Discussion Comments: 0
Verification: Authors have not verified information

Diamond: Nesting the Data Center Network with Wireless Rings in 3D Space

Yong Cui, Shihan Xiao, Xin Wang, Zhenjie Yang, Chao Zhu, Xiangyang Li, Liu Yang, Ning Ge

Diamond: Nesting the Data Center Network with Wireless Rings in 3D Space

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enabling ECN in Multi-Service Multi-Queue Data Centers

Wei Bai, Li Chen, Kai Chen, Haitao Wu

Enabling ECN in Multi-Service Multi-Queue Data Centers

Details
Discussion Comments: 0
Verification: Authors have not verified information

HUG: Multi-Resource Fairness for Correlated and Elastic Demands

Mosharaf Chowdhury, Zhenhua Liu, Ali Ghodsi, Ion Stoica

HUG: Multi-Resource Fairness for Correlated and Elastic Demands

Details
Discussion Comments: 0
Verification: Authors have not verified information

AnonRep: Towards Tracking-Resistant Anonymous Reputation

Ennan Zhai, David Isaac Wolinsky, Ruichuan Chen, Ewa Syta, Chao Teng, Bryan Ford

AnonRep: Towards Tracking-Resistant Anonymous Reputation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Decimeter-Level Localization with a Single WiFi Access Point

Deepak Vasisht, Swarun Kumar, Dina Katabi

Decimeter-Level Localization with a Single WiFi Access Point

Details
Discussion Comments: 0
Verification: Authors have not verified information

Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions

Bryce Kellogg, Vamsi Talla, Shyamnath Gollakota, Joshua R. Smith

Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Scalable Multi-User Uplink for Wi-Fi

Adriana B. Flores, Sadia Quadri, Edward W. Knightly

A Scalable Multi-User Uplink for Wi-Fi

Details
Discussion Comments: 0
Verification: Authors have not verified information

StreamScope: Continuous Reliable Distributed Processing of Big Data Streams

Wei Lin, Haochuan Fan, Zhengping Qian, Junwei Xu, Sen Yang, Jingren Zhou, Lidong Zhou

StreamScope: Continuous Reliable Distributed Processing of Big Data Streams

Details
Discussion Comments: 0
Verification: Authors have not verified information

Universal Packet Scheduling

Radhika Mittal, Rachit Agarwal, Sylvia Ratnasamy, Scott Shenker

Universal Packet Scheduling

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard

Zhenhua Li, Weiwei Wang, Tianyin Xu, Xin Zhong, Xiang-Yang Li, Yunhao Liu, Christo Wilson, Ben Y. Zhao

Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficiently Delivering Online Services over Integrated Infrastructure

Hongqiang Harry Liu, Raajay Viswanathan, Matt Calder, Aditya Akella, Ratul Mahajan, Jitendra Padhye, Ming Zhang

Efficiently Delivering Online Services over Integrated Infrastructure

Details
Discussion Comments: 0
Verification: Authors have not verified information

Be Fast, Cheap and in Control with SwitchKV

Xiaozhou Li, Raghav Sethi, Michael Kaminsky, David G. Andersen, Michael J. Freedman

Be Fast, Cheap and in Control with SwitchKV

Details
Discussion Comments: 0
Verification: Authors have not verified information

Social Hash: An Assignment Framework for Optimizing Distributed Systems Operations on Social Networks

Alon Shalita, Brian Karrer, Igor Kabiljo, Arun Sharma, Alessandro Presta, Aaron Adcock, Herald Kllapi, Michael Stumm

Social Hash: An Assignment Framework for Optimizing Distributed Systems Operations on Social Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Diplomat: Using Delegations to Protect Community Repositories

Trishank Karthik Kuppusamy, Santiago Torres-Arias, Vladimir Diaz, Justin Cappos

Diplomat: Using Delegations to Protect Community Repositories

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Scalable and Private Media Consumption with Popcorn

Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath T. V. Setty, Lorenzo Alvisi, Michael Walfish

Scalable and Private Media Consumption with Popcorn

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

BeamSpy: Enabling Robust 60 GHz Links Under Blockage

Sanjib Sur, Xinyu Zhang, Parmesh Ramanathan, Ranveer Chandra

BeamSpy: Enabling Robust 60 GHz Links Under Blockage

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Ernest: Efficient Performance Prediction for Large-Scale Advanced Analytics

Shivaram Venkataraman, Zongheng Yang, Michael J. Franklin, Benjamin Recht, Ion Stoica

Ernest: Efficient Performance Prediction for Large-Scale Advanced Analytics

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Paving the Way for NFV: Simplifying Middlebox Modifications Using StateAlyzr

Junaid Khalid, Aaron Gember-Jacobson, Roney Michael, Anubhavnidhi Abhashkumar, Aditya Akella

Paving the Way for NFV: Simplifying Middlebox Modifications Using StateAlyzr

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

FlowRadar: A Better NetFlow for Data Centers

Yuliang Li, Rui Miao, Changhoon Kim, Minlan Yu

FlowRadar: A Better NetFlow for Data Centers

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

FairRide: Near-Optimal, Fair Cache Sharing

Qifan Pu, Haoyuan Li, Matei Zaharia, Ali Ghodsi, Ion Stoica

FairRide: Near-Optimal, Fair Cache Sharing

Details
Discussion Comments: 0
Verification: Authors have not verified information

BUZZ: Testing Context-Dependent Policies in Stateful Networks

Seyed Kaveh Fayaz, Tianlong Yu, Yoshiaki Tobioka, Sagar Chaki, Vyas Sekar

BUZZ: Testing Context-Dependent Policies in Stateful Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

BlowFish: Dynamic Storage-Performance Tradeoff in Data Stores

Anurag Khandelwal, Rachit Agarwal, Ion Stoica

BlowFish: Dynamic Storage-Performance Tradeoff in Data Stores

Details
Discussion Comments: 0
Verification: Authors have not verified information

Consensus in a Box: Inexpensive Coordination in Hardware

Zsolt István, David Sidler, Gustavo Alonso, Marko Vukolic

Consensus in a Box: Inexpensive Coordination in Hardware

Details
Discussion Comments: 0
Verification: Authors have not verified information

PhyCloak: Obfuscating Sensing from Communication Signals

Yue Qiao, Ouyang Zhang, Wenjie Zhou, Kannan Srinivasan, Anish Arora

PhyCloak: Obfuscating Sensing from Communication Signals

Details
Discussion Comments: 0
Verification: Authors have not verified information

Bitcoin-NG: A Scalable Blockchain Protocol

Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, Robbert van Renesse

Bitcoin-NG: A Scalable Blockchain Protocol

Details
Discussion Comments: 0
Verification: Authors have not verified information

Embark: Securely Outsourcing Middleboxes to the Cloud

Chang Lan, Justine Sherry, Raluca Ada Popa, Sylvia Ratnasamy, Zhi Liu

Embark: Securely Outsourcing Middleboxes to the Cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

CFA: A Practical Prediction System for Video QoE Optimization

Junchen Jiang, Vyas Sekar, Henry Milner, Davis Shepherd, Ion Stoica, Hui Zhang

CFA: A Practical Prediction System for Video QoE Optimization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Speeding up Web Page Loads with Shandian

Xiao Sophia Wang, Arvind Krishnamurthy, David Wetherall

Speeding up Web Page Loads with Shandian

Details
Discussion Comments: 0
Verification: Authors have not verified information

Simplifying Software-Defined Network Optimization Using SOL

Victor Heorhiadi, Michael K. Reiter, Vyas Sekar

Simplifying Software-Defined Network Optimization Using SOL

Details
Discussion Comments: 0
Verification: Authors have not verified information

Ripple II: Faster Communication through Physical Vibration

Nirupam Roy, Romit Roy Choudhury

Ripple II: Faster Communication through Physical Vibration

Details
Discussion Comments: 0
Verification: Authors have not verified information

Earp: Principled Storage, Sharing, and Protection for Mobile Apps

Yuanzhong Xu, Tyler Hunt, Youngjin Kwon, Martin Georgiev, Vitaly Shmatikov, Emmett Witchel

Earp: Principled Storage, Sharing, and Protection for Mobile Apps

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

DFC: Accelerating String Pattern Matching for Network Applications

Byungkwon Choi, Jongwook Chae, Muhammad Jamshed, KyoungSoo Park, Dongsu Han

DFC: Accelerating String Pattern Matching for Network Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Minimizing Faulty Executions of Distributed Systems

Colin Scott, Aurojit Panda, Vjekoslav Brajkovic, George C. Necula, Arvind Krishnamurthy, Scott Shenker

Minimizing Faulty Executions of Distributed Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cliffhanger: Scaling Performance Cliffs in Web Memory Caches

Asaf Cidon, Assaf Eisenman, Mohammad Alizadeh, Sachin Katti

Cliffhanger: Scaling Performance Cliffs in Web Memory Caches

Details
Discussion Comments: 0
Verification: Authors have not verified information

Polaris: Faster Page Loads Using Fine-grained Dependency Tracking

Ravi Netravali, Ameesh Goyal, James Mickens, Hari Balakrishnan

Polaris: Faster Page Loads Using Fine-grained Dependency Tracking

Details
Discussion Comments: 0
Verification: Authors have not verified information

iCellular: Device-Customized Cellular Network Access on Commodity Smartphones

Yuanjie Li, Haotian Deng, Chunyi Peng, Zengwen Yuan, Guan-Hua Tu, Jiayao Li, Songwu Lu

iCellular: Device-Customized Cellular Network Access on Commodity Smartphones

Details
Discussion Comments: 0
Verification: Authors have not verified information

XFabric: A Reconfigurable In-Rack Network for Rack-Scale Computers

Sergey Legtchenko, Nicholas Chen, Daniel Cletheroe, Antony I. T. Rowstron, Hugh Williams, Xiaohan Zhao

XFabric: A Reconfigurable In-Rack Network for Rack-Scale Computers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Maglev: A Fast and Reliable Software Network Load Balancer

Daniel E. Eisenbud, Cheng Yi, Carlo Contavalli, Cody Smith, Roman Kononov, Eric Mann-Hielscher, Ardas Cilingiroglu, Bin Cheyney, Wentao Shang, Jinnah Dylan Hosein

Maglev: A Fast and Reliable Software Network Load Balancer

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Industrial-Scale Software Defined Internet Exchange Point

Arpit Gupta, Robert MacDavid, Rüdiger Birkner, Marco Canini, Nick Feamster, Jennifer Rexford, Laurent Vanbever

An Industrial-Scale Software Defined Internet Exchange Point

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds

Frank Wang, James Mickens, Nickolai Zeldovich, Vinod Vaikuntanathan

Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information