Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
A global name service for a highly mobile internetwork Abhigyan Sharma, Xiaozheng Tie, Hardeep Uppal, Arun Venkataramani, David Westbrook, Aditya Yadav |
A global name service for a highly mobile internetwork Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards a quantitative comparison of location-independent network architectures Zhaoyu Gao, Arun Venkataramani, James F. Kurose, Simon Heimlicher |
Towards a quantitative comparison of location-independent network architectures Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Network stack specialization for performance Ilias Marinos, Robert N. M. Watson, Mark Handley |
Network stack specialization for performance Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Filipe Manco, João Martins, Felipe Huici |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
CTE: cost-effective intra-domain traffic engineering Baobao Zhang, Jun Bi, Jianping Wu, Fred Baker |
CTE: cost-effective intra-domain traffic engineering Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Decentralized task-aware scheduling for data center networks Fahad R. Dogar, Thomas Karagiannis, Hitesh Ballani, Antony I. T. Rowstron |
Decentralized task-aware scheduling for data center networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Diagnosing missing events in distributed systems with negative provenance Yang Wu, Mingchen Zhao, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo |
Diagnosing missing events in distributed systems with negative provenance Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Traffic engineering with forward fault correction Hongqiang Harry Liu, Srikanth Kandula, Ratul Mahajan, Ming Zhang, David Gelernter |
Traffic engineering with forward fault correction Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An educational networking framework for full layer implementation and testing Keunhong Lee, Joongi Kim, Sue B. Moon |
An educational networking framework for full layer implementation and testing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
RPKI vs ROVER: comparing the risks of BGP security solutions Aanchal Malhotra, Sharon Goldberg |
RPKI vs ROVER: comparing the risks of BGP security solutions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Using RDMA efficiently for key-value services Anuj Kalia, Michael Kaminsky, David G. Andersen |
Using RDMA efficiently for key-value services Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
A user behavior based cheat detection mechanism for crowdtesting Ricky K. P. Mok, Weichao Li, Rocky K. C. Chang |
A user behavior based cheat detection mechanism for crowdtesting Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ESCAPE: extensible service chain prototyping environment using mininet, click, NETCONF and POX Attila Csoma, Balázs Sonkoly, Levente Csikor, Felician Németh, András Gulyás, Wouter Tavernier, Sahel Sahhaf |
ESCAPE: extensible service chain prototyping environment using mininet, click, NETCONF and POX Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Payman Samadi, Varun Gupta, Berk Birand, Howard Wang, Gil Zussman, Keren Bergman |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Social SDN: online social networks integration in wireless network provisioning Arjuna Sathiaseelan, M. Said Seddiki, Stoyan Stoyanov, Dirk Trossen |
Social SDN: online social networks integration in wireless network provisioning Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
AI3: application-independent information infrastructure Bo Zhang, Jinfan Wang, Xinyu Wang, Tracy Yingying Cheng, Xiaohua Jia, Jianfei He |
AI3: application-independent information infrastructure Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FastForward: fast and constructive full duplex relays Dinesh Bharadia, Sachin Katti |
FastForward: fast and constructive full duplex relays Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
T-DNS: connection-oriented DNS to improve privacy and security (poster abstract) Liang Zhu, Zi Hu, John S. Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya |
T-DNS: connection-oriented DNS to improve privacy and security (poster abstract) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Flow-level state transition as a new switch primitive for SDN Masoud Moshref, Apoorv Bhargava, Adhip Gupta, Minlan Yu, Ramesh Govindan |
Flow-level state transition as a new switch primitive for SDN Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Simon Peter, Umar Javed, Qiao Zhang, Doug Woos, Thomas E. Anderson, Arvind Krishnamurthy |
Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Duet: cloud scale load balancing with hardware and software Rohan Gandhi, Hongqiang Harry Liu, Y. Charlie Hu, Guohan Lu, Jitendra Padhye, Lihua Yuan, Ming Zhang |
Duet: cloud scale load balancing with hardware and software Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fastpass: a centralized "zero-queue" datacenter network Jonathan Perry, Amy Ousterhout, Hari Balakrishnan, Devavrat Shah, Hans Fugal |
Fastpass: a centralized "zero-queue" datacenter network Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Adrian Gämperli, Vasileios Kotronis, Xenofontas A. Dimitropoulos |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Dinesh Bharadia, Kiran Raj Joshi, Sachin Katti |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Zhiyong Zhang, Ovidiu Mara, Katerina J. Argyraki |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Steffen Gebert, David Hock, Thomas Zinner, Phuoc Tran-Gia, Marco Hoffmann, Michael Jarschel, Ernst-Dieter Schmidt, Ralf-Peter Braun, Christian Banse, Andreas Köpsel |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Balancing accountability and privacy in the network David Naylor, Matthew K. Mukerjee, Peter Steenkiste |
Balancing accountability and privacy in the network Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Other
Verification:
Authors have
verified
information
|
Calendaring for wide area networks Srikanth Kandula, Ishai Menache, Roy Schwartz, Spandana Raj Babbula |
Calendaring for wide area networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A middlebox-cooperative TCP for a non end-to-end internet Ryan Craven, Robert Beverly, Mark Allman |
A middlebox-cooperative TCP for a non end-to-end internet Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
NIMBUS: cloud-scale attack detection and mitigation Rui Miao, Minlan Yu, Navendu Jain |
NIMBUS: cloud-scale attack detection and mitigation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Rethinking congestion control architecture: performance-oriented congestion control Mo Dong, Qingxi Li, Doron Zarchy, Brighten Godfrey, Michael Schapira |
Rethinking congestion control architecture: performance-oriented congestion control Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
VIRL: the virtual internet routing lab Joel Obstfeld, Simon Knight, Ed Kern, Qiang Sheng Wang, Tom Bryan, Dan Bourque |
VIRL: the virtual internet routing lab Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SOUP: an online social network by the people, for the people David Koll, Jun Li, Xiaoming Fu |
SOUP: an online social network by the people, for the people Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
LTE radio analytics made easy and accessible Swarun Kumar, Ezzeldin Hamed, Dina Katabi, Li Erran Li |
LTE radio analytics made easy and accessible Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DREAM: dynamic resource allocation for software-defined measurement Masoud Moshref, Minlan Yu, Ramesh Govindan, Amin Vahdat |
DREAM: dynamic resource allocation for software-defined measurement Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Demonstrating the prospects of dynamic application-aware networking in a home environment Florian Wamser, Thomas Zinner, Lukas Iffländer, Phuoc Tran-Gia |
Demonstrating the prospects of dynamic application-aware networking in a home environment Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Control-plane protocol interactions in cellular networks Guan-Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Hongyi Wang, Songwu Lu |
Control-plane protocol interactions in cellular networks Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Mahimahi: a lightweight toolkit for reproducible web measurement Ravi Netravali, Anirudh Sivaraman, Keith Winstein, Somak Das, Ameesh Goyal, Hari Balakrishnan |
Mahimahi: a lightweight toolkit for reproducible web measurement Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Millions of little minions: using packets for low latency network programming and visibility Vimalkumar Jeyakumar, Mohammad Alizadeh, Yilong Geng, Changhoon Kim, David Mazières |
Millions of little minions: using packets for low latency network programming and visibility Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
YouSlow: a performance analysis tool for adaptive bitrate video streaming Hyunwoo Nam, Kyung-Hwa Kim, Doru Calin, Henning Schulzrinne |
YouSlow: a performance analysis tool for adaptive bitrate video streaming Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SDX: a software defined internet exchange Arpit Gupta, Laurent Vanbever, Muhammad Shahbaz, Sean P. Donovan, Brandon Schlinker, Nick Feamster, Jennifer Rexford, Scott Shenker, Russ Clark, Ethan Katz-Bassett |
SDX: a software defined internet exchange Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Angela H. Jiang, Zachary S. Bischof, Fabian E. Bustamante |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Toward a biometric-aware cloud service engine for multi-screen video applications Han Hu, Yichao Jin, Yonggang Wen, Tat-Seng Chua, Xuelong Li |
Toward a biometric-aware cloud service engine for multi-screen video applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Lightweight source authentication and path validation Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu, Adrian Perrig |
Lightweight source authentication and path validation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
From the consent of the routed: improving the transparency of the RPKI Ethan Heilman, Danny Cooper, Leonid Reyzin, Sharon Goldberg |
From the consent of the routed: improving the transparency of the RPKI Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Enabling near real-time central control for live video delivery in CDNs Matthew K. Mukerjee, JungAh Hong, Junchen Jiang, David Naylor, Dongsu Han, Srinivasan Seshan, Hui Zhang |
Enabling near real-time central control for live video delivery in CDNs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Quartz: a new design element for low-latency DCNs Yunpeng James Liu, Peter Xiang Gao, Bernard Wong, Srinivasan Keshav |
Quartz: a new design element for low-latency DCNs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DesktopDC: setting all programmable data center networking testbed on desk Chengchen Hu, Ji Yang, Zhimin Gong, Shuoling Deng, Hongbo Zhao |
DesktopDC: setting all programmable data center networking testbed on desk Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CONGA: distributed congestion-aware load balancing for datacenters Mohammad Alizadeh, Tom Edsall, Sarang Dharmapurikar, Ramanan Vaidyanathan, Kevin Chu, Andy Fingerhut, Vinh The Lam, Francis Matus, Rong Pan, Navindra Yadav, George Varghese |
CONGA: distributed congestion-aware load balancing for datacenters Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Characterizing botnets-as-a-service Wentao Chang, An Wang, Aziz Mohaisen, Songqing Chen |
Characterizing botnets-as-a-service Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mark Schmidt, Florian Heimgaertner, Michael Menth |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Behind the curtain: the importance of replica selection in next generation cellular networks John P. Rula, Fabian E. Bustamante |
Behind the curtain: the importance of replica selection in next generation cellular networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Guarantee IP lookup performance with FIB explosion Tong Yang, Gaogang Xie, Yanbiao Li, Qiaobin Fu, Alex X. Liu, Qi Li, Laurent Mathy |
Guarantee IP lookup performance with FIB explosion Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
SAX-PAC (Scalable And eXpressive PAcket Classification) Kirill Kogan, Sergey I. Nikolenko, Ori Rottenstreich, William Culhane, Patrick Eugster |
SAX-PAC (Scalable And eXpressive PAcket Classification) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
OpenNF: enabling innovation in network function control Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, Aditya Akella |
OpenNF: enabling innovation in network function control Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Efficient coflow scheduling with Varys Mosharaf Chowdhury, Yuan Zhong, Ion Stoica |
Efficient coflow scheduling with Varys Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Droid-Sec: deep learning in android malware detection Zhenlong Yuan, Yongqiang Lu, Zhaoguo Wang, Yibo Xue |
Droid-Sec: deep learning in android malware detection Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Flowinsight: decoupling visibility from operability in SDN data plane Yuliang Li, Guang Yao, Jun Bi |
Flowinsight: decoupling visibility from operability in SDN data plane Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
A time for reliability: the growing importance of being always on Zachary S. Bischof, Fabián E. Bustamante |
A time for reliability: the growing importance of being always on Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Keynote: life in the fast lane George Varghese |
Keynote: life in the fast lane Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Jakub Czyz, Mark Allman, Jing Zhang, Scott Iekel-Johnson, Eric Osterweil, Michael Bailey |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A "hitchhiker's" guide to fast and efficient data reconstruction in erasure-coded data centers K. V. Rashmi, Nihar B. Shah, Dikang Gu, Hairong Kuang, Dhruba Borthakur, Kannan Ramchandran |
A "hitchhiker's" guide to fast and efficient data reconstruction in erasure-coded data centers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Friends, not foes: synthesizing existing transport strategies for data center networks Ali Munir, Ghufran Baig, Syed Mohammad Irteza, Ihsan Ayyub Qazi, Alex X. Liu, Fahad R. Dogar |
Friends, not foes: synthesizing existing transport strategies for data center networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Rethinking buffer management in data center networks Aisha Mushtaq, Asad Khalid Ismail, Abdul Wasay, Bilal Mahmood, Ihsan Ayyub Qazi, Zartash Afzal Uzmi |
Rethinking buffer management in data center networks Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Drawbridge: software-defined DDoS-resistant traffic engineering Jun Li, Skyler Berg, Mingwei Zhang, Peter L. Reiher, Tao Wei |
Drawbridge: software-defined DDoS-resistant traffic engineering Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Traffic statistics collection with FleXam Sajad Shirali-Shahreza, Yashar Ganjali |
Traffic statistics collection with FleXam Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Troubleshooting blackbox SDN control software with minimal causal sequences Colin Scott, Andreas Wundsam, Barath Raghavan, Aurojit Panda, Andrew Or, Jefferson Lai, Eugene Huang, Zhi Liu, Ahmed El-Hassany, Sam Whitlock, Hrishikesh B. Acharya, Kyriakos Zarifis, Scott Shenker |
Troubleshooting blackbox SDN control software with minimal causal sequences Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A network-state management service Peng Sun, Ratul Mahajan, Jennifer Rexford, Lihua Yuan, Ming Zhang, Ahsan Arefin |
A network-state management service Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Geosphere: consistently turning MIMO capacity into throughput Konstantinos Nikitopoulos, Juan Zhou, Ben Congdon, Kyle Jamieson |
Geosphere: consistently turning MIMO capacity into throughput Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Locating throughput bottlenecks in home networks Srikanth Sundaresan, Nick Feamster, Renata Teixeira |
Locating throughput bottlenecks in home networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sampling online social networks: an experimental study of twitter Maksym Gabielkov, Ashwin Rao, Arnaud Legout |
Sampling online social networks: an experimental study of twitter Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Vidyut: exploiting power line infrastructure for enterprise wireless networks Vivek Yenamandra, Kannan Srinivasan |
Vidyut: exploiting power line infrastructure for enterprise wireless networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Turbocharging ambient backscatter communication Aaron N. Parks, Angli Liu, Shyamnath Gollakota, Joshua R. Smith |
Turbocharging ambient backscatter communication Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dynamic scheduling of network updates Xin Jin, Hongqiang Harry Liu, Rohan Gandhi, Srikanth Kandula, Ratul Mahajan, Ming Zhang, Jennifer Rexford, Roger Wattenhofer |
Dynamic scheduling of network updates Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A buffer-based approach to rate adaptation: evidence from a large video streaming service Te-Yuan Huang, Ramesh Johari, Nick McKeown, Matthew Trunnell, Mark Watson |
A buffer-based approach to rate adaptation: evidence from a large video streaming service Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Tracing multipath TCP connections Benjamin Hesmans, Olivier Bonaventure |
Tracing multipath TCP connections Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
OpenSAN: a software-defined satellite network architecture Jinzhen Bao, Baokang Zhao, Wanrong Yu, Zhenqian Feng, Chunqing Wu, Zhenghu Gong |
OpenSAN: a software-defined satellite network architecture Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DOT: distributed OpenFlow testbed Arup Raton Roy, Md. Faizul Bari, Mohamed Faten Zhani, Reaz Ahmed, Raouf Boutaba |
DOT: distributed OpenFlow testbed Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SENSS: observe and control your own traffic in the internet Abdulla Alwabel, Minlan Yu, Ying Zhang, Jelena Mirkovic |
SENSS: observe and control your own traffic in the internet Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
NetAssay: providing new monitoring primitives for network operators Sean P. Donovan, Nick Feamster |
NetAssay: providing new monitoring primitives for network operators Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Aerial wireless localization using target-guided flight route Shaofeng Chen, Dingyi Fang, Xiaojiang Chen, Tingting Xia, Meng Jin |
Aerial wireless localization using target-guided flight route Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Wi-fi backscatter: internet connectivity for RF-powered devices Bryce Kellogg, Aaron N. Parks, Shyamnath Gollakota, Joshua R. Smith, David Wetherall |
Wi-fi backscatter: internet connectivity for RF-powered devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SDN-based live VM migration across datacenters Jiaqiang Liu, Yong Li, Depeng Jin |
SDN-based live VM migration across datacenters Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FireFly: a reconfigurable wireless data center fabric using free-space optics Navid Hamed Azimi, Zafar Ayyub Qazi, Himanshu Gupta, Vyas Sekar, Samir R. Das, Jon P. Longtin, Himanshu Shah, Ashish Tanwer |
FireFly: a reconfigurable wireless data center fabric using free-space optics Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Multi-resource packing for cluster schedulers Robert Grandl, Ganesh Ananthanarayanan, Srikanth Kandula, Sriram Rao, Aditya Akella |
Multi-resource packing for cluster schedulers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Ziria: language for rapid prototyping of wireless PHY Gordon Stewart, Mahanth Gowda, Geoffrey Mainland, Bozidar Radunovic, Dimitrios Vytiniotis, Doug Patterson |
Ziria: language for rapid prototyping of wireless PHY Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Identifying traffic differentiation on cellular data networks Arash Molavi Kakhki, Abbas Razaghpanah, Rajesh Golani, David R. Choffnes, Phillipa Gill, Alan Mislove |
Identifying traffic differentiation on cellular data networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Application-driven bandwidth guarantees in datacenters Jeongkeun Lee, Yoshio Turner, Myungjin Lee, Lucian Popa, Sujata Banerjee, Joon-Myung Kang, Puneet Sharma |
Application-driven bandwidth guarantees in datacenters Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An experimental study of the learnability of congestion control Anirudh Sivaraman, Keith Winstein, Pratiksha Thaker, Hari Balakrishnan |
An experimental study of the learnability of congestion control Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
RF-IDraw: virtual touch screen in the air using RF signals Jue Wang, Deepak Vasisht, Dina Katabi |
RF-IDraw: virtual touch screen in the air using RF signals Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SDX: a software defined internet exchange Arpit Gupta, Laurent Vanbever, Muhammad Shahbaz, Sean Patrick Donovan, Brandon Schlinker, Nick Feamster, Jennifer Rexford, Scott Shenker, Russ Clark, Ethan Katz-Bassett |
SDX: a software defined internet exchange Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Extending the software-defined network boundary Oliver Michel, Michael Coughlin, Eric Keller |
Extending the software-defined network boundary Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Native actors: how to scale network forensics Matthias Vallentin, Dominik Charousset, Thomas C. Schmidt, Vern Paxson, Matthias Wählisch |
Native actors: how to scale network forensics Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
OpenANFV: accelerating network function virtualization with a consolidated framework in openstack Xiongzi Ge, Yi Liu, David H. C. Du, Liang Zhang, Hongguang Guan, Jian Chen, Yuping Zhao, Xinyu Hu |
OpenANFV: accelerating network function virtualization with a consolidated framework in openstack Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Vivisecting whatsapp through large-scale measurements in mobile networks Pierdomenico Fiadino, Mirko Schiavone, Pedro Casas |
Vivisecting whatsapp through large-scale measurements in mobile networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Planck: millisecond-scale monitoring and control for commodity networks Jeff Rasley, Brent Stephens, Colin Dixon, Eric Rozner, Wes Felter, Kanak Agarwal, John B. Carter, Rodrigo Fonseca |
Planck: millisecond-scale monitoring and control for commodity networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|