ACM Special Interest Group on Data Communication, SIGCOMM 2014


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

A global name service for a highly mobile internetwork

Abhigyan Sharma, Xiaozheng Tie, Hardeep Uppal, Arun Venkataramani, David Westbrook, Aditya Yadav

A global name service for a highly mobile internetwork

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards a quantitative comparison of location-independent network architectures

Zhaoyu Gao, Arun Venkataramani, James F. Kurose, Simon Heimlicher

Towards a quantitative comparison of location-independent network architectures

Details
Discussion Comments: 0
Verification: Authors have not verified information

Network stack specialization for performance

Ilias Marinos, Robert N. M. Watson, Mark Handley

Network stack specialization for performance

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards the super fluid cloud

Filipe Manco, João Martins, Felipe Huici

Towards the super fluid cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

CTE: cost-effective intra-domain traffic engineering

Baobao Zhang, Jun Bi, Jianping Wu, Fred Baker

CTE: cost-effective intra-domain traffic engineering

Details
Discussion Comments: 0
Verification: Authors have not verified information

Decentralized task-aware scheduling for data center networks

Fahad R. Dogar, Thomas Karagiannis, Hitesh Ballani, Antony I. T. Rowstron

Decentralized task-aware scheduling for data center networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Diagnosing missing events in distributed systems with negative provenance

Yang Wu, Mingchen Zhao, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo

Diagnosing missing events in distributed systems with negative provenance

Details
Discussion Comments: 0
Verification: Authors have not verified information

Traffic engineering with forward fault correction

Hongqiang Harry Liu, Srikanth Kandula, Ratul Mahajan, Ming Zhang, David Gelernter

Traffic engineering with forward fault correction

Details
Discussion Comments: 0
Verification: Authors have not verified information

An educational networking framework for full layer implementation and testing

Keunhong Lee, Joongi Kim, Sue B. Moon

An educational networking framework for full layer implementation and testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

RPKI vs ROVER: comparing the risks of BGP security solutions

Aanchal Malhotra, Sharon Goldberg

RPKI vs ROVER: comparing the risks of BGP security solutions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Using RDMA efficiently for key-value services

Anuj Kalia, Michael Kaminsky, David G. Andersen

Using RDMA efficiently for key-value services

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

A user behavior based cheat detection mechanism for crowdtesting

Ricky K. P. Mok, Weichao Li, Rocky K. C. Chang

A user behavior based cheat detection mechanism for crowdtesting

Details
Discussion Comments: 0
Verification: Authors have not verified information

ESCAPE: extensible service chain prototyping environment using mininet, click, NETCONF and POX

Attila Csoma, Balázs Sonkoly, Levente Csikor, Felician Németh, András Gulyás, Wouter Tavernier, Sahel Sahhaf

ESCAPE: extensible service chain prototyping environment using mininet, click, NETCONF and POX

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Accelerating incast and multicast traffic delivery for data-intensive applications using physical layer optics

Payman Samadi, Varun Gupta, Berk Birand, Howard Wang, Gil Zussman, Keren Bergman

Accelerating incast and multicast traffic delivery for data-intensive applications using physical layer optics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Social SDN: online social networks integration in wireless network provisioning

Arjuna Sathiaseelan, M. Said Seddiki, Stoyan Stoyanov, Dirk Trossen

Social SDN: online social networks integration in wireless network provisioning

Details
Discussion Comments: 0
Verification: Authors have not verified information

AI3: application-independent information infrastructure

Bo Zhang, Jinfan Wang, Xinyu Wang, Tracy Yingying Cheng, Xiaohua Jia, Jianfei He

AI3: application-independent information infrastructure

Details
Discussion Comments: 0
Verification: Authors have not verified information

FastForward: fast and constructive full duplex relays

Dinesh Bharadia, Sachin Katti

FastForward: fast and constructive full duplex relays

Details
Discussion Comments: 0
Verification: Authors have not verified information

T-DNS: connection-oriented DNS to improve privacy and security (poster abstract)

Liang Zhu, Zi Hu, John S. Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya

T-DNS: connection-oriented DNS to improve privacy and security (poster abstract)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Flow-level state transition as a new switch primitive for SDN

Masoud Moshref, Apoorv Bhargava, Adhip Gupta, Minlan Yu, Ramesh Govindan

Flow-level state transition as a new switch primitive for SDN

Details
Discussion Comments: 0
Verification: Authors have not verified information

One tunnel is (often) enough

Simon Peter, Umar Javed, Qiao Zhang, Doug Woos, Thomas E. Anderson, Arvind Krishnamurthy

One tunnel is (often) enough

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Duet: cloud scale load balancing with hardware and software

Rohan Gandhi, Hongqiang Harry Liu, Y. Charlie Hu, Guohan Lu, Jitendra Padhye, Lihua Yuan, Ming Zhang

Duet: cloud scale load balancing with hardware and software

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fastpass: a centralized "zero-queue" datacenter network

Jonathan Perry, Amy Ousterhout, Hari Balakrishnan, Devavrat Shah, Hans Fugal

Fastpass: a centralized "zero-queue" datacenter network

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework

Adrian Gämperli, Vasileios Kotronis, Xenofontas A. Dimitropoulos

Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework

Details
Discussion Comments: 0
Verification: Authors have not verified information

Robust full duplex radio link

Dinesh Bharadia, Kiran Raj Joshi, Sachin Katti

Robust full duplex radio link

Details
Discussion Comments: 0
Verification: Authors have not verified information

Network neutrality inference

Zhiyong Zhang, Ovidiu Mara, Katerina J. Argyraki

Network neutrality inference

Details
Discussion Comments: 0
Verification: Authors have not verified information

Demonstrating the optimal placement of virtualized cellular network functions in case of large crowd events

Steffen Gebert, David Hock, Thomas Zinner, Phuoc Tran-Gia, Marco Hoffmann, Michael Jarschel, Ernst-Dieter Schmidt, Ralf-Peter Braun, Christian Banse, Andreas Köpsel

Demonstrating the optimal placement of virtualized cellular network functions in case of large crowd events

Details
Discussion Comments: 0
Verification: Authors have not verified information

Balancing accountability and privacy in the network

David Naylor, Matthew K. Mukerjee, Peter Steenkiste

Balancing accountability and privacy in the network

Details
Author Comments:
Discussion Comments: 0
Sharing: Other
Verification: Authors have verified information

Calendaring for wide area networks

Srikanth Kandula, Ishai Menache, Roy Schwartz, Spandana Raj Babbula

Calendaring for wide area networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A middlebox-cooperative TCP for a non end-to-end internet

Ryan Craven, Robert Beverly, Mark Allman

A middlebox-cooperative TCP for a non end-to-end internet

Details
Discussion Comments: 0
Verification: Authors have not verified information

NIMBUS: cloud-scale attack detection and mitigation

Rui Miao, Minlan Yu, Navendu Jain

NIMBUS: cloud-scale attack detection and mitigation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rethinking congestion control architecture: performance-oriented congestion control

Mo Dong, Qingxi Li, Doron Zarchy, Brighten Godfrey, Michael Schapira

Rethinking congestion control architecture: performance-oriented congestion control

Details
Discussion Comments: 0
Verification: Authors have not verified information

VIRL: the virtual internet routing lab

Joel Obstfeld, Simon Knight, Ed Kern, Qiang Sheng Wang, Tom Bryan, Dan Bourque

VIRL: the virtual internet routing lab

Details
Discussion Comments: 0
Verification: Authors have not verified information

SOUP: an online social network by the people, for the people

David Koll, Jun Li, Xiaoming Fu

SOUP: an online social network by the people, for the people

Details
Discussion Comments: 0
Verification: Authors have not verified information

LTE radio analytics made easy and accessible

Swarun Kumar, Ezzeldin Hamed, Dina Katabi, Li Erran Li

LTE radio analytics made easy and accessible

Details
Discussion Comments: 0
Verification: Authors have not verified information

DREAM: dynamic resource allocation for software-defined measurement

Masoud Moshref, Minlan Yu, Ramesh Govindan, Amin Vahdat

DREAM: dynamic resource allocation for software-defined measurement

Details
Discussion Comments: 0
Verification: Authors have not verified information

Demonstrating the prospects of dynamic application-aware networking in a home environment

Florian Wamser, Thomas Zinner, Lukas Iffländer, Phuoc Tran-Gia

Demonstrating the prospects of dynamic application-aware networking in a home environment

Details
Discussion Comments: 0
Verification: Authors have not verified information

Control-plane protocol interactions in cellular networks

Guan-Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Hongyi Wang, Songwu Lu

Control-plane protocol interactions in cellular networks

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Mahimahi: a lightweight toolkit for reproducible web measurement

Ravi Netravali, Anirudh Sivaraman, Keith Winstein, Somak Das, Ameesh Goyal, Hari Balakrishnan

Mahimahi: a lightweight toolkit for reproducible web measurement

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Millions of little minions: using packets for low latency network programming and visibility

Vimalkumar Jeyakumar, Mohammad Alizadeh, Yilong Geng, Changhoon Kim, David Mazières

Millions of little minions: using packets for low latency network programming and visibility

Details
Discussion Comments: 0
Verification: Authors have not verified information

YouSlow: a performance analysis tool for adaptive bitrate video streaming

Hyunwoo Nam, Kyung-Hwa Kim, Doru Calin, Henning Schulzrinne

YouSlow: a performance analysis tool for adaptive bitrate video streaming

Details
Discussion Comments: 0
Verification: Authors have not verified information

SDX: a software defined internet exchange

Arpit Gupta, Laurent Vanbever, Muhammad Shahbaz, Sean P. Donovan, Brandon Schlinker, Nick Feamster, Jennifer Rexford, Scott Shenker, Russ Clark, Ethan Katz-Bassett

SDX: a software defined internet exchange

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

A cliq of content curators

Angela H. Jiang, Zachary S. Bischof, Fabian E. Bustamante

A cliq of content curators

Details
Discussion Comments: 0
Verification: Authors have not verified information

Toward a biometric-aware cloud service engine for multi-screen video applications

Han Hu, Yichao Jin, Yonggang Wen, Tat-Seng Chua, Xuelong Li

Toward a biometric-aware cloud service engine for multi-screen video applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Lightweight source authentication and path validation

Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu, Adrian Perrig

Lightweight source authentication and path validation

Details
Discussion Comments: 0
Verification: Authors have not verified information

From the consent of the routed: improving the transparency of the RPKI

Ethan Heilman, Danny Cooper, Leonid Reyzin, Sharon Goldberg

From the consent of the routed: improving the transparency of the RPKI

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enabling near real-time central control for live video delivery in CDNs

Matthew K. Mukerjee, JungAh Hong, Junchen Jiang, David Naylor, Dongsu Han, Srinivasan Seshan, Hui Zhang

Enabling near real-time central control for live video delivery in CDNs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Quartz: a new design element for low-latency DCNs

Yunpeng James Liu, Peter Xiang Gao, Bernard Wong, Srinivasan Keshav

Quartz: a new design element for low-latency DCNs

Details
Discussion Comments: 0
Verification: Authors have not verified information

DesktopDC: setting all programmable data center networking testbed on desk

Chengchen Hu, Ji Yang, Zhimin Gong, Shuoling Deng, Hongbo Zhao

DesktopDC: setting all programmable data center networking testbed on desk

Details
Discussion Comments: 0
Verification: Authors have not verified information

CONGA: distributed congestion-aware load balancing for datacenters

Mohammad Alizadeh, Tom Edsall, Sarang Dharmapurikar, Ramanan Vaidyanathan, Kevin Chu, Andy Fingerhut, Vinh The Lam, Francis Matus, Rong Pan, Navindra Yadav, George Varghese

CONGA: distributed congestion-aware load balancing for datacenters

Details
Discussion Comments: 0
Verification: Authors have not verified information

Characterizing botnets-as-a-service

Wentao Chang, An Wang, Aziz Mohaisen, Songqing Chen

Characterizing botnets-as-a-service

Details
Discussion Comments: 0
Verification: Authors have not verified information

Demo: a virtualized lab testbed with physical network outlets for hands-on computer networking education

Mark Schmidt, Florian Heimgaertner, Michael Menth

Demo: a virtualized lab testbed with physical network outlets for hands-on computer networking education

Details
Discussion Comments: 0
Verification: Authors have not verified information

Behind the curtain: the importance of replica selection in next generation cellular networks

John P. Rula, Fabian E. Bustamante

Behind the curtain: the importance of replica selection in next generation cellular networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Guarantee IP lookup performance with FIB explosion

Tong Yang, Gaogang Xie, Yanbiao Li, Qiaobin Fu, Alex X. Liu, Qi Li, Laurent Mathy

Guarantee IP lookup performance with FIB explosion

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

SAX-PAC (Scalable And eXpressive PAcket Classification)

Kirill Kogan, Sergey I. Nikolenko, Ori Rottenstreich, William Culhane, Patrick Eugster

SAX-PAC (Scalable And eXpressive PAcket Classification)

Details
Discussion Comments: 0
Verification: Authors have not verified information

OpenNF: enabling innovation in network function control

Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, Aditya Akella

OpenNF: enabling innovation in network function control

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Efficient coflow scheduling with Varys

Mosharaf Chowdhury, Yuan Zhong, Ion Stoica

Efficient coflow scheduling with Varys

Details
Discussion Comments: 0
Verification: Authors have not verified information

Droid-Sec: deep learning in android malware detection

Zhenlong Yuan, Yongqiang Lu, Zhaoguo Wang, Yibo Xue

Droid-Sec: deep learning in android malware detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Flowinsight: decoupling visibility from operability in SDN data plane

Yuliang Li, Guang Yao, Jun Bi

Flowinsight: decoupling visibility from operability in SDN data plane

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

A time for reliability: the growing importance of being always on

Zachary S. Bischof, Fabián E. Bustamante

A time for reliability: the growing importance of being always on

Details
Discussion Comments: 0
Verification: Authors have not verified information

Keynote: life in the fast lane

George Varghese

Keynote: life in the fast lane

Details
Discussion Comments: 0
Verification: Author has not verified information

Measuring IPv6 adoption

Jakub Czyz, Mark Allman, Jing Zhang, Scott Iekel-Johnson, Eric Osterweil, Michael Bailey

Measuring IPv6 adoption

Details
Discussion Comments: 0
Verification: Authors have not verified information

A "hitchhiker's" guide to fast and efficient data reconstruction in erasure-coded data centers

K. V. Rashmi, Nihar B. Shah, Dikang Gu, Hairong Kuang, Dhruba Borthakur, Kannan Ramchandran

A "hitchhiker's" guide to fast and efficient data reconstruction in erasure-coded data centers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Friends, not foes: synthesizing existing transport strategies for data center networks

Ali Munir, Ghufran Baig, Syed Mohammad Irteza, Ihsan Ayyub Qazi, Alex X. Liu, Fahad R. Dogar

Friends, not foes: synthesizing existing transport strategies for data center networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rethinking buffer management in data center networks

Aisha Mushtaq, Asad Khalid Ismail, Abdul Wasay, Bilal Mahmood, Ihsan Ayyub Qazi, Zartash Afzal Uzmi

Rethinking buffer management in data center networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Drawbridge: software-defined DDoS-resistant traffic engineering

Jun Li, Skyler Berg, Mingwei Zhang, Peter L. Reiher, Tao Wei

Drawbridge: software-defined DDoS-resistant traffic engineering

Details
Discussion Comments: 0
Verification: Authors have not verified information

Traffic statistics collection with FleXam

Sajad Shirali-Shahreza, Yashar Ganjali

Traffic statistics collection with FleXam

Details
Discussion Comments: 0
Verification: Authors have not verified information

Troubleshooting blackbox SDN control software with minimal causal sequences

Colin Scott, Andreas Wundsam, Barath Raghavan, Aurojit Panda, Andrew Or, Jefferson Lai, Eugene Huang, Zhi Liu, Ahmed El-Hassany, Sam Whitlock, Hrishikesh B. Acharya, Kyriakos Zarifis, Scott Shenker

Troubleshooting blackbox SDN control software with minimal causal sequences

Details
Discussion Comments: 0
Verification: Authors have not verified information

A network-state management service

Peng Sun, Ratul Mahajan, Jennifer Rexford, Lihua Yuan, Ming Zhang, Ahsan Arefin

A network-state management service

Details
Discussion Comments: 0
Verification: Authors have not verified information

Geosphere: consistently turning MIMO capacity into throughput

Konstantinos Nikitopoulos, Juan Zhou, Ben Congdon, Kyle Jamieson

Geosphere: consistently turning MIMO capacity into throughput

Details
Discussion Comments: 0
Verification: Authors have not verified information

Locating throughput bottlenecks in home networks

Srikanth Sundaresan, Nick Feamster, Renata Teixeira

Locating throughput bottlenecks in home networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sampling online social networks: an experimental study of twitter

Maksym Gabielkov, Ashwin Rao, Arnaud Legout

Sampling online social networks: an experimental study of twitter

Details
Discussion Comments: 0
Verification: Authors have not verified information

Vidyut: exploiting power line infrastructure for enterprise wireless networks

Vivek Yenamandra, Kannan Srinivasan

Vidyut: exploiting power line infrastructure for enterprise wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Turbocharging ambient backscatter communication

Aaron N. Parks, Angli Liu, Shyamnath Gollakota, Joshua R. Smith

Turbocharging ambient backscatter communication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic scheduling of network updates

Xin Jin, Hongqiang Harry Liu, Rohan Gandhi, Srikanth Kandula, Ratul Mahajan, Ming Zhang, Jennifer Rexford, Roger Wattenhofer

Dynamic scheduling of network updates

Details
Discussion Comments: 0
Verification: Authors have not verified information

A buffer-based approach to rate adaptation: evidence from a large video streaming service

Te-Yuan Huang, Ramesh Johari, Nick McKeown, Matthew Trunnell, Mark Watson

A buffer-based approach to rate adaptation: evidence from a large video streaming service

Details
Discussion Comments: 0
Verification: Authors have not verified information

Tracing multipath TCP connections

Benjamin Hesmans, Olivier Bonaventure

Tracing multipath TCP connections

Details
Discussion Comments: 0
Verification: Authors have not verified information

OpenSAN: a software-defined satellite network architecture

Jinzhen Bao, Baokang Zhao, Wanrong Yu, Zhenqian Feng, Chunqing Wu, Zhenghu Gong

OpenSAN: a software-defined satellite network architecture

Details
Discussion Comments: 0
Verification: Authors have not verified information

DOT: distributed OpenFlow testbed

Arup Raton Roy, Md. Faizul Bari, Mohamed Faten Zhani, Reaz Ahmed, Raouf Boutaba

DOT: distributed OpenFlow testbed

Details
Discussion Comments: 0
Verification: Authors have not verified information

SENSS: observe and control your own traffic in the internet

Abdulla Alwabel, Minlan Yu, Ying Zhang, Jelena Mirkovic

SENSS: observe and control your own traffic in the internet

Details
Discussion Comments: 0
Verification: Authors have not verified information

NetAssay: providing new monitoring primitives for network operators

Sean P. Donovan, Nick Feamster

NetAssay: providing new monitoring primitives for network operators

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Aerial wireless localization using target-guided flight route

Shaofeng Chen, Dingyi Fang, Xiaojiang Chen, Tingting Xia, Meng Jin

Aerial wireless localization using target-guided flight route

Details
Discussion Comments: 0
Verification: Authors have not verified information

Wi-fi backscatter: internet connectivity for RF-powered devices

Bryce Kellogg, Aaron N. Parks, Shyamnath Gollakota, Joshua R. Smith, David Wetherall

Wi-fi backscatter: internet connectivity for RF-powered devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

SDN-based live VM migration across datacenters

Jiaqiang Liu, Yong Li, Depeng Jin

SDN-based live VM migration across datacenters

Details
Discussion Comments: 0
Verification: Authors have not verified information

FireFly: a reconfigurable wireless data center fabric using free-space optics

Navid Hamed Azimi, Zafar Ayyub Qazi, Himanshu Gupta, Vyas Sekar, Samir R. Das, Jon P. Longtin, Himanshu Shah, Ashish Tanwer

FireFly: a reconfigurable wireless data center fabric using free-space optics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-resource packing for cluster schedulers

Robert Grandl, Ganesh Ananthanarayanan, Srikanth Kandula, Sriram Rao, Aditya Akella

Multi-resource packing for cluster schedulers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Ziria: language for rapid prototyping of wireless PHY

Gordon Stewart, Mahanth Gowda, Geoffrey Mainland, Bozidar Radunovic, Dimitrios Vytiniotis, Doug Patterson

Ziria: language for rapid prototyping of wireless PHY

Details
Discussion Comments: 0
Verification: Authors have not verified information

Identifying traffic differentiation on cellular data networks

Arash Molavi Kakhki, Abbas Razaghpanah, Rajesh Golani, David R. Choffnes, Phillipa Gill, Alan Mislove

Identifying traffic differentiation on cellular data networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Application-driven bandwidth guarantees in datacenters

Jeongkeun Lee, Yoshio Turner, Myungjin Lee, Lucian Popa, Sujata Banerjee, Joon-Myung Kang, Puneet Sharma

Application-driven bandwidth guarantees in datacenters

Details
Discussion Comments: 0
Verification: Authors have not verified information

An experimental study of the learnability of congestion control

Anirudh Sivaraman, Keith Winstein, Pratiksha Thaker, Hari Balakrishnan

An experimental study of the learnability of congestion control

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

RF-IDraw: virtual touch screen in the air using RF signals

Jue Wang, Deepak Vasisht, Dina Katabi

RF-IDraw: virtual touch screen in the air using RF signals

Details
Discussion Comments: 0
Verification: Authors have not verified information

SDX: a software defined internet exchange

Arpit Gupta, Laurent Vanbever, Muhammad Shahbaz, Sean Patrick Donovan, Brandon Schlinker, Nick Feamster, Jennifer Rexford, Scott Shenker, Russ Clark, Ethan Katz-Bassett

SDX: a software defined internet exchange

Details
Discussion Comments: 0
Verification: Authors have not verified information

Extending the software-defined network boundary

Oliver Michel, Michael Coughlin, Eric Keller

Extending the software-defined network boundary

Details
Discussion Comments: 0
Verification: Authors have not verified information

Native actors: how to scale network forensics

Matthias Vallentin, Dominik Charousset, Thomas C. Schmidt, Vern Paxson, Matthias Wählisch

Native actors: how to scale network forensics

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

OpenANFV: accelerating network function virtualization with a consolidated framework in openstack

Xiongzi Ge, Yi Liu, David H. C. Du, Liang Zhang, Hongguang Guan, Jian Chen, Yuping Zhao, Xinyu Hu

OpenANFV: accelerating network function virtualization with a consolidated framework in openstack

Details
Discussion Comments: 0
Verification: Authors have not verified information

Vivisecting whatsapp through large-scale measurements in mobile networks

Pierdomenico Fiadino, Mirko Schiavone, Pedro Casas

Vivisecting whatsapp through large-scale measurements in mobile networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Planck: millisecond-scale monitoring and control for commodity networks

Jeff Rasley, Brent Stephens, Colin Dixon, Eric Rozner, Wes Felter, Kanak Agarwal, John B. Carter, Rodrigo Fonseca

Planck: millisecond-scale monitoring and control for commodity networks

Details
Discussion Comments: 0
Verification: Authors have not verified information