Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
WiMAC: Rapid Implementation Platform for User Definable MAC Protocols Through Separation Simon Yau, Liang Ge, Ping-Chun Hsieh, I-Hong Hou, Shuguang Cui, P. R. Kumar, Amal Ekbal, Nikhil Kundargi |
WiMAC: Rapid Implementation Platform for User Definable MAC Protocols Through Separation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Enabling End-Host Network Functions Hitesh Ballani, Paolo Costa, Christos Gkantsidis, Matthew P. Grosvenor, Thomas Karagiannis, Lazaros Koromilas, Greg O'Shea |
Enabling End-Host Network Functions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google's Datacenter Network Arjun Singh, Joon Ong, Amit Agarwal, Glen Anderson, Ashby Armistead, Roy Bannon, Seb Boving, Gaurav Desai, Bob Felderman, Paulie Germano, Anand Kanagala, Jeff Provost, Jason Simmons, Eiichi Tanda, Jim Wanderer, Urs Hölzle, Stephen Stuart, Amin Vahdat |
Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google's Datacenter Network Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BitMiner: Bits Mining in Internet Traffic Classification Zhenlong Yuan, Yibo Xue, Mihaela van der Schaar |
BitMiner: Bits Mining in Internet Traffic Classification Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Scaling Up Clustered Network Appliances with ScaleBricks Dong Zhou, Bin Fan, Hyeontaek Lim, David G. Andersen, Michael Kaminsky, Michael Mitzenmacher, Ren Wang, Ajaypal Singh |
Scaling Up Clustered Network Appliances with ScaleBricks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
See How ISPs Care: An RPKI Validation Extension for Web Browsers Matthias Wählisch, Thomas C. Schmidt |
See How ISPs Care: An RPKI Validation Extension for Web Browsers Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Design and Implementation: the Native Web Browser and Server for Content-Centric Networking Guoshun Nan, Xiuquan Qiao, Yukai Tu, Wei Tan, Lei Guo, Junliang Chen |
Design and Implementation: the Native Web Browser and Server for Content-Centric Networking Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Short vs. Long Flows: A Battle That Both Can Win Morteza Kheirkhah, Ian Wakeman, George Parisis |
Short vs. Long Flows: A Battle That Both Can Win Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Dávid Szabó, Felician Németh, Balázs Sonkoly, András Gulyás, Frank H. P. Fitzek |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BRB: BetteR Batch Scheduling to Reduce Tail Latencies in Cloud Data Stores Waleed Reda, P. Lalith Suresh, Marco Canini, Sean Braithwaite |
BRB: BetteR Batch Scheduling to Reduce Tail Latencies in Cloud Data Stores Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Could End System Caching and Cooperation Replace In-Network Caching in CCN? Haibo Wu, Jun Li, Jiang Zhi |
Could End System Caching and Cooperation Replace In-Network Caching in CCN? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Laissez-Faire: Fully Asymmetric Backscatter Communication Pan Hu, Pengyu Zhang, Deepak Ganesan |
Laissez-Faire: Fully Asymmetric Backscatter Communication Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Declarative and Expressive Approach to Control Forwarding Paths in Carrier-Grade Networks Renaud Hartert, Stefano Vissicchio, Pierre Schaus, Olivier Bonaventure, Clarence Filsfils, Thomas Telkamp, Pierre François |
A Declarative and Expressive Approach to Control Forwarding Paths in Carrier-Grade Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Extreme Data-rate Scheduling for the Data Center Neelakandan Manihatty Bojan, Noa Zilberman, Gianni Antichi, Andrew W. Moore |
Extreme Data-rate Scheduling for the Data Center Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Inside the Social Network's (Datacenter) Network Arjun Roy, Hongyi Zeng, Jasmeet Bagga, George Porter, Alex C. Snoeren |
Inside the Social Network's (Datacenter) Network Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Congestion Control for Large-Scale RDMA Deployments Yibo Zhu, Haggai Eran, Daniel Firestone, Chuanxiong Guo, Marina Lipshteyn, Yehonatan Liron, Jitendra Padhye, Shachar Raindel, Mohamad Haj Yahia, Ming Zhang |
Congestion Control for Large-Scale RDMA Deployments Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Practical, Real-time Centralized Control for CDN-based Live Video Delivery Matthew K. Mukerjee, David Naylor, Junchen Jiang, Dongsu Han, Srinivasan Seshan, Hui Zhang |
Practical, Real-time Centralized Control for CDN-based Live Video Delivery Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
eSDN: Rethinking Datacenter Transports Using End-Host SDN Controllers Hasnain Ali Pirzada, Muhammad Raza Mahboob, Ihsan Ayyub Qazi |
eSDN: Rethinking Datacenter Transports Using End-Host SDN Controllers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes Maria Konte, Roberto Perdisci, Nick Feamster |
ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Programming the Home and Enterprise WiFi with OpenSDWN Julius Schulz-Zander, Carlos Mayer, Bogdan Ciobotaru, Stefan Schmid, Anja Feldmann, Roberto Riggio |
Programming the Home and Enterprise WiFi with OpenSDWN Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Network-Aware Scheduling for Data-Parallel Jobs: Plan When You Can Virajith Jalaparti, Peter Bodík, Ishai Menache, Sriram Rao, Konstantin Makarychev, Matthew Caesar |
Network-Aware Scheduling for Data-Parallel Jobs: Plan When You Can Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Pingmesh: A Large-Scale System for Data Center Network Latency Measurement and Analysis Chuanxiong Guo, Lihua Yuan, Dong Xiang, Yingnong Dang, Ray Huang, David A. Maltz, Zhaoyi Liu, Vin Wang, Bin Pang, Hua Chen, Zhi-Wei Lin, Varugis Kurien |
Pingmesh: A Large-Scale System for Data Center Network Latency Measurement and Analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Central Control Over Distributed Routing Stefano Vissicchio, Olivier Tilmans, Laurent Vanbever, Jennifer Rexford |
Central Control Over Distributed Routing Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Low Latency Geo-distributed Data Analytics Qifan Pu, Ganesh Ananthanarayanan, Peter Bodík, Srikanth Kandula, Aditya Akella, Paramvir Bahl, Ion Stoica |
Low Latency Geo-distributed Data Analytics Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Real-time 802.11 Compatible Distributed MIMO System Ezzeldin Hamed, Hariharan Rahul, Mohammed A. Abdelghany, Dina Katabi |
A Real-time 802.11 Compatible Distributed MIMO System Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Spatiotemporal Traffic Matrix Synthesis Paul Tune, Matthew Roughan |
Spatiotemporal Traffic Matrix Synthesis Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Cache'n DASH: Efficient Caching for DASH Parikshit Juluri, Deep Medhi |
Cache'n DASH: Efficient Caching for DASH Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Extreme Web Caching for Faster Web Browsing Ali Raza, Yasir Zaki, Thomas Pötsch, Jay Chen, Lakshmi Subramanian |
Extreme Web Caching for Faster Web Browsing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Presto: Edge-based Load Balancing for Fast Datacenter Networks Keqiang He, Eric Rozner, Kanak Agarwal, Wes Felter, John B. Carter, Aditya Akella |
Presto: Edge-based Load Balancing for Fast Datacenter Networks Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Rollback-Recovery for Middleboxes Justine Sherry, Peter Xiang Gao, Soumya Basu, Aurojit Panda, Arvind Krishnamurthy, Christian Maciocco, Maziar Manesh, João Martins, Sylvia Ratnasamy, Luigi Rizzo, Scott Shenker |
Rollback-Recovery for Middleboxes Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
R2C2: A Network Stack for Rack-scale Computers Paolo Costa, Hitesh Ballani, Kaveh Razavi, Ian A. Kash |
R2C2: A Network Stack for Rack-scale Computers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Condor: Better Topologies Through Declarative Design Brandon Schlinker, Radhika Niranjan Mysore, Sean Smith, Jeffrey C. Mogul, Amin Vahdat, Minlan Yu, Ethan Katz-Bassett, Michael Rubin |
Condor: Better Topologies Through Declarative Design Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications Hyunwoo Choi, Jeongmin Kim, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, Dongsu Han |
Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
A Case for a Stateful Middlebox Networking Stack Muhammad Asim Jamshed, Donghwi Kim, YoungGyoun Moon, Dongsu Han, KyoungSoo Park |
A Case for a Stateful Middlebox Networking Stack Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Efficient Coflow Scheduling Without Prior Knowledge Mosharaf Chowdhury, Ion Stoica |
Efficient Coflow Scheduling Without Prior Knowledge Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Chaos Monkey: Increasing SDN Reliability through Systematic Network Destruction Michael Alan Chang, Brendan Tschaen, Theophilus Benson, Laurent Vanbever |
Chaos Monkey: Increasing SDN Reliability through Systematic Network Destruction Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Santa: Faster Packet Delivery for Commonly Wished Replies Florian Schmidt, Oliver Hohlfeld, René Glebke, Klaus Wehrle |
Santa: Faster Packet Delivery for Commonly Wished Replies Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
End-User Mapping: Next Generation Request Routing for Content Delivery Fangfei Chen, Ramesh K. Sitaraman, Marcelo Torres |
End-User Mapping: Next Generation Request Routing for Content Delivery Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BitCuts: Towards Fast Packet Classification for Order-Independent Rules Zhi Liu, Xiang Wang, Baohua Yang, Jun Li |
BitCuts: Towards Fast Packet Classification for Order-Independent Rules Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SpotFi: Decimeter Level Localization Using WiFi Manikanta Kotaru, Kiran Raj Joshi, Dinesh Bharadia, Sachin Katti |
SpotFi: Decimeter Level Localization Using WiFi Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Supercharge me: Boost Router Convergence with SDN Michael Alan Chang, Thomas Holterbach, Markus Happe, Laurent Vanbever |
Supercharge me: Boost Router Convergence with SDN Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FlyCast: Free-Space Optics Accelerating Multicast Communications in Physical Layer Jinzhen Bao, Dezun Dong, Baokang Zhao, Zhang Luo, Chunqing Wu, Zhenghu Gong |
FlyCast: Free-Space Optics Accelerating Multicast Communications in Physical Layer Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
i-tee: A fully automated Cyber Defense Competition for Students Margus Ernits, Johannes Tammekänd, Olaf Maennel |
i-tee: A fully automated Cyber Defense Competition for Students Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Hopper: Decentralized Speculation-aware Cluster Scheduling at Scale Xiaoqi Ren, Ganesh Ananthanarayanan, Adam Wierman, Minlan Yu |
Hopper: Decentralized Speculation-aware Cluster Scheduling at Scale Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Packet-Level Telemetry in Large Datacenter Networks Yibo Zhu, Nanxi Kang, Jiaxin Cao, Albert G. Greenberg, Guohan Lu, Ratul Mahajan, David A. Maltz, Lihua Yuan, Ming Zhang, Ben Y. Zhao, Haitao Zheng |
Packet-Level Telemetry in Large Datacenter Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests Sam Burnett, Nick Feamster |
Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Enabling Performance Evaluation Beyond 10 Gbps Gianni Antichi, Charalampos Rotsos, Andrew W. Moore |
Enabling Performance Evaluation Beyond 10 Gbps Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
RPKI MIRO: Monitoring and Inspection of RPKI Objects Andreas Reuter, Matthias Wählisch, Thomas C. Schmidt |
RPKI MIRO: Monitoring and Inspection of RPKI Objects Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Rule-level Data Plane Monitoring With Monocle Peter Peresíni, Maciej Kuzniar, Dejan Kostic |
Rule-level Data Plane Monitoring With Monocle Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Network Policy Whiteboarding and Composition Jeongkeun Lee, Joon-Myung Kang, Chaithan Prakash, Yoshio Turner, Aditya Akella, Charles Clark, Yadi Ma, Puneet Sharma, Ying Zhang |
Network Policy Whiteboarding and Composition Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BwE: Flexible, Hierarchical Bandwidth Allocation for WAN Distributed Computing Alok Kumar, Sushant Jain, Uday Naik, Anand Raghuraman, Nikhil Kasinadhuni, Enrique Cauich Zermeno, C. Stephen Gunn, Jing Ai, Björn Carlin, Mihai Amarandei-Stavila, Mathieu Robin, Aspi Siganporia, Stephen Stuart, Amin Vahdat |
BwE: Flexible, Hierarchical Bandwidth Allocation for WAN Distributed Computing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Caraoke: An E-Toll Transponder Network for Smart Cities Omid Abari, Deepak Vasisht, Dina Katabi, Anantha Chandrakasan |
Caraoke: An E-Toll Transponder Network for Smart Cities Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sampling and Large Flow Detection in SDN Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schiff |
Sampling and Large Flow Detection in SDN Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Coarse-grained Scheduling with Software-Defined Networking Switches Myriana Rifai, Dino Lopez Pacheco, Guillaume Urvoy-Keller |
Coarse-grained Scheduling with Software-Defined Networking Switches Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC Tobias Markmann, Thomas C. Schmidt, Matthias Wählisch |
Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Towards Scalable SDN Switches: Enabling Faster Flow Table Entries Installation Roberto Bifulco, Anton Matsiuk |
Towards Scalable SDN Switches: Enabling Faster Flow Table Entries Installation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BackFi: High Throughput WiFi Backscatter Dinesh Bharadia, Kiran Raj Joshi, Manikanta Kotaru, Sachin Katti |
BackFi: High Throughput WiFi Backscatter Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Multi-Domain Service Orchestration Over Networks and Clouds: A Unified Approach Balázs Sonkoly, János Czentye, Róbert Szabó, David Jocha, János Elek, Sahel Sahhaf, Wouter Tavernier, Fulvio Risso |
Multi-Domain Service Orchestration Over Networks and Clouds: A Unified Approach Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Coracle: Evaluating Consensus at the Internet Edge Heidi Howard, Jon Crowcroft |
Coracle: Evaluating Consensus at the Internet Edge Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sub-Nanosecond Time of Flight on Commercial Wi-Fi Cards Deepak Vasisht, Swarun Kumar, Dina Katabi |
Sub-Nanosecond Time of Flight on Commercial Wi-Fi Cards Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
InterTubes: A Study of the US Long-haul Fiber-optic Infrastructure Ramakrishnan Durairajan, Paul Barford, Joel Sommers, Walter Willinger |
InterTubes: A Study of the US Long-haul Fiber-optic Infrastructure Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Internet of Names: A DNS Big Dataset Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto, Aiko Pras |
The Internet of Names: A DNS Big Dataset Details |
Author Comments:
Parts of the data collected by the OpenINTEL platform -- the research discussed in this paper -- are released as open data on a daily basis. See our website for more information.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
NetFPGA: Rapid Prototyping of Networking Devices in Open Source Noa Zilberman, Yury Audzevich, Georgina Kalogeridou, Neelakandan Manihatty Bojan, Jingyun Zhang, Andrew W. Moore |
NetFPGA: Rapid Prototyping of Networking Devices in Open Source Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Challenging Entropy-based Anomaly Detection and Diagnosis in Cellular Networks Pierdomenico Fiadino, Alessandro D'Alconzo, Mirko Schiavone, Pedro Casas |
Challenging Entropy-based Anomaly Detection and Diagnosis in Cellular Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
EPOXIDE: A Modular Prototype for SDN Troubleshooting Tamás Lévai, István Pelle, Felicián Németh, András Gulyás |
EPOXIDE: A Modular Prototype for SDN Troubleshooting Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
nf.io: A File System Abstraction for NFV Orchestration Md. Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, Raouf Boutaba |
nf.io: A File System Abstraction for NFV Orchestration Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Analysis of Game Bot's Behavioral Characteristics in Social Interaction Networks of MMORPG Seong Hoon Jeong, Ah Reum Kang, Huy Kang Kim |
Analysis of Game Bot's Behavioral Characteristics in Social Interaction Networks of MMORPG Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PGA: Using Graphs to Express and Automatically Reconcile Network Policies Chaithan Prakash, Jeongkeun Lee, Yoshio Turner, Joon-Myung Kang, Aditya Akella, Sujata Banerjee, Charles Clark, Yadi Ma, Puneet Sharma, Ying Zhang |
PGA: Using Graphs to Express and Automatically Reconcile Network Policies Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Control-Theoretic Approach for Dynamic Adaptive Video Streaming over HTTP Xiaoqi Yin, Abhishek Jindal, Vyas Sekar, Bruno Sinopoli |
A Control-Theoretic Approach for Dynamic Adaptive Video Streaming over HTTP Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
A High-Radix, Low-Latency Optical Switch for Data Centers Dan Alistarh, Hitesh Ballani, Paolo Costa, Adam C. Funnell, Joshua Benjamin, Philip M. Watts, Benn Thomsen |
A High-Radix, Low-Latency Optical Switch for Data Centers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS David Naylor, Kyle Schomp, Matteo Varvello, Ilias Leontiadis, Jeremy Blackburn, Diego R. López, Konstantina Papagiannaki, Pablo Rodríguez Rodríguez, Peter Steenkiste |
Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Liang Zheng, Carlee Joe-Wong, Chee-Wei Tan, Mung Chiang, Xinyu Wang |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems Stevens Le Blond, David R. Choffnes, William Caldwell, Peter Druschel, Nicholas Merritt |
Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Silo: Predictable Message Latency in the Cloud Keon Jang, Justine Sherry, Hitesh Ballani, Toby Moncaster |
Silo: Predictable Message Latency in the Cloud Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Adaptive Congestion Control for Unpredictable Cellular Networks Yasir Zaki, Thomas Pötsch, Jay Chen, Lakshminarayanan Subramanian, Carmelita Görg |
Adaptive Congestion Control for Unpredictable Cellular Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Hirochika Asai, Yasuhiro Ohara |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
TIMELY: RTT-based Congestion Control for the Datacenter Radhika Mittal, Vinh The Lam, Nandita Dukkipati, Emily R. Blem, Hassan M. G. Wassel, Monia Ghobadi, Amin Vahdat, Yaogong Wang, David Wetherall, David Zats |
TIMELY: RTT-based Congestion Control for the Datacenter Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Virtual Network Function Orchestration with Scylla Roberto Riggio, Julius Schulz-Zander, Abbas Bradai |
Virtual Network Function Orchestration with Scylla Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Toward Automated Testing of Geo-Distributed Replica Selection Algorithms Kirill Bogdanov, Miguel Peón Quirós, Gerald Q. Maguire Jr., Dejan Kostic |
Toward Automated Testing of Geo-Distributed Replica Selection Algorithms Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Alternative Trust Sources: Reducing DNSSEC Signature Verification Operations with TLS Sean Patrick Donovan, Nick Feamster |
Alternative Trust Sources: Reducing DNSSEC Signature Verification Operations with TLS Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Large-scale Measurements of Wireless Network Behavior Sanjit Biswas, John C. Bicket, Edmund Wong, Raluca Musaloiu-E, Apurv Bhartia, Daniel Aguayo |
Large-scale Measurements of Wireless Network Behavior Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism Mor Sides, Anat Bremler-Barr, Elisha J. Rosensweig |
Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Optimization of Request Routing for Content Delivery Walid Benchaita, Samir Ghamri-Doudane, Sébastien Tixeuil |
On the Optimization of Request Routing for Content Delivery Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Mininet-based Virtual Testbed for Distributed SDN Development Bob Lantz, Brian O'Connor |
A Mininet-based Virtual Testbed for Distributed SDN Development Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FreeSurf: Application-Centric Wireless Access with SDN Zhen Cao, Jürgen Fitschen, Panagiotis Papadimitriou |
FreeSurf: Application-Centric Wireless Access with SDN Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Liqiong Chang, Xiaojiang Chen, Dingyi Fang, Ju Wang, Tianzhang Xing, Chen Liu, Zhanyong Tang |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BlindBox: Deep Packet Inspection over Encrypted Traffic Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy |
BlindBox: Deep Packet Inspection over Encrypted Traffic Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|