ACM Special Interest Group on Data Communication, SIGCOMM 2015


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

WiMAC: Rapid Implementation Platform for User Definable MAC Protocols Through Separation

Simon Yau, Liang Ge, Ping-Chun Hsieh, I-Hong Hou, Shuguang Cui, P. R. Kumar, Amal Ekbal, Nikhil Kundargi

WiMAC: Rapid Implementation Platform for User Definable MAC Protocols Through Separation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enabling End-Host Network Functions

Hitesh Ballani, Paolo Costa, Christos Gkantsidis, Matthew P. Grosvenor, Thomas Karagiannis, Lazaros Koromilas, Greg O'Shea

Enabling End-Host Network Functions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google's Datacenter Network

Arjun Singh, Joon Ong, Amit Agarwal, Glen Anderson, Ashby Armistead, Roy Bannon, Seb Boving, Gaurav Desai, Bob Felderman, Paulie Germano, Anand Kanagala, Jeff Provost, Jason Simmons, Eiichi Tanda, Jim Wanderer, Urs Hölzle, Stephen Stuart, Amin Vahdat

Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google's Datacenter Network

Details
Discussion Comments: 0
Verification: Authors have not verified information

BitMiner: Bits Mining in Internet Traffic Classification

Zhenlong Yuan, Yibo Xue, Mihaela van der Schaar

BitMiner: Bits Mining in Internet Traffic Classification

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scaling Up Clustered Network Appliances with ScaleBricks

Dong Zhou, Bin Fan, Hyeontaek Lim, David G. Andersen, Michael Kaminsky, Michael Mitzenmacher, Ren Wang, Ajaypal Singh

Scaling Up Clustered Network Appliances with ScaleBricks

Details
Discussion Comments: 0
Verification: Authors have not verified information

See How ISPs Care: An RPKI Validation Extension for Web Browsers

Matthias Wählisch, Thomas C. Schmidt

See How ISPs Care: An RPKI Validation Extension for Web Browsers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Design and Implementation: the Native Web Browser and Server for Content-Centric Networking

Guoshun Nan, Xiuquan Qiao, Yukai Tu, Wei Tan, Lei Guo, Junliang Chen

Design and Implementation: the Native Web Browser and Server for Content-Centric Networking

Details
Discussion Comments: 0
Verification: Authors have not verified information

Short vs. Long Flows: A Battle That Both Can Win

Morteza Kheirkhah, Ian Wakeman, George Parisis

Short vs. Long Flows: A Battle That Both Can Win

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Towards the 5G Revolution: A Software Defined Network Architecture Exploiting Network Coding as a Service

Dávid Szabó, Felician Németh, Balázs Sonkoly, András Gulyás, Frank H. P. Fitzek

Towards the 5G Revolution: A Software Defined Network Architecture Exploiting Network Coding as a Service

Details
Discussion Comments: 0
Verification: Authors have not verified information

BRB: BetteR Batch Scheduling to Reduce Tail Latencies in Cloud Data Stores

Waleed Reda, P. Lalith Suresh, Marco Canini, Sean Braithwaite

BRB: BetteR Batch Scheduling to Reduce Tail Latencies in Cloud Data Stores

Details
Discussion Comments: 0
Verification: Authors have not verified information

Could End System Caching and Cooperation Replace In-Network Caching in CCN?

Haibo Wu, Jun Li, Jiang Zhi

Could End System Caching and Cooperation Replace In-Network Caching in CCN?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Laissez-Faire: Fully Asymmetric Backscatter Communication

Pan Hu, Pengyu Zhang, Deepak Ganesan

Laissez-Faire: Fully Asymmetric Backscatter Communication

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Declarative and Expressive Approach to Control Forwarding Paths in Carrier-Grade Networks

Renaud Hartert, Stefano Vissicchio, Pierre Schaus, Olivier Bonaventure, Clarence Filsfils, Thomas Telkamp, Pierre François

A Declarative and Expressive Approach to Control Forwarding Paths in Carrier-Grade Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Extreme Data-rate Scheduling for the Data Center

Neelakandan Manihatty Bojan, Noa Zilberman, Gianni Antichi, Andrew W. Moore

Extreme Data-rate Scheduling for the Data Center

Details
Discussion Comments: 0
Verification: Authors have not verified information

Inside the Social Network's (Datacenter) Network

Arjun Roy, Hongyi Zeng, Jasmeet Bagga, George Porter, Alex C. Snoeren

Inside the Social Network's (Datacenter) Network

Details
Discussion Comments: 0
Verification: Authors have not verified information

Congestion Control for Large-Scale RDMA Deployments

Yibo Zhu, Haggai Eran, Daniel Firestone, Chuanxiong Guo, Marina Lipshteyn, Yehonatan Liron, Jitendra Padhye, Shachar Raindel, Mohamad Haj Yahia, Ming Zhang

Congestion Control for Large-Scale RDMA Deployments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical, Real-time Centralized Control for CDN-based Live Video Delivery

Matthew K. Mukerjee, David Naylor, Junchen Jiang, Dongsu Han, Srinivasan Seshan, Hui Zhang

Practical, Real-time Centralized Control for CDN-based Live Video Delivery

Details
Discussion Comments: 0
Verification: Authors have not verified information

eSDN: Rethinking Datacenter Transports Using End-Host SDN Controllers

Hasnain Ali Pirzada, Muhammad Raza Mahboob, Ihsan Ayyub Qazi

eSDN: Rethinking Datacenter Transports Using End-Host SDN Controllers

Details
Discussion Comments: 0
Verification: Authors have not verified information

ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes

Maria Konte, Roberto Perdisci, Nick Feamster

ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Programming the Home and Enterprise WiFi with OpenSDWN

Julius Schulz-Zander, Carlos Mayer, Bogdan Ciobotaru, Stefan Schmid, Anja Feldmann, Roberto Riggio

Programming the Home and Enterprise WiFi with OpenSDWN

Details
Discussion Comments: 0
Verification: Authors have not verified information

Network-Aware Scheduling for Data-Parallel Jobs: Plan When You Can

Virajith Jalaparti, Peter Bodík, Ishai Menache, Sriram Rao, Konstantin Makarychev, Matthew Caesar

Network-Aware Scheduling for Data-Parallel Jobs: Plan When You Can

Details
Discussion Comments: 0
Verification: Authors have not verified information

Pingmesh: A Large-Scale System for Data Center Network Latency Measurement and Analysis

Chuanxiong Guo, Lihua Yuan, Dong Xiang, Yingnong Dang, Ray Huang, David A. Maltz, Zhaoyi Liu, Vin Wang, Bin Pang, Hua Chen, Zhi-Wei Lin, Varugis Kurien

Pingmesh: A Large-Scale System for Data Center Network Latency Measurement and Analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Central Control Over Distributed Routing

Stefano Vissicchio, Olivier Tilmans, Laurent Vanbever, Jennifer Rexford

Central Control Over Distributed Routing

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Low Latency Geo-distributed Data Analytics

Qifan Pu, Ganesh Ananthanarayanan, Peter Bodík, Srikanth Kandula, Aditya Akella, Paramvir Bahl, Ion Stoica

Low Latency Geo-distributed Data Analytics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Alibi Routing

Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee

Alibi Routing

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Real-time 802.11 Compatible Distributed MIMO System

Ezzeldin Hamed, Hariharan Rahul, Mohammed A. Abdelghany, Dina Katabi

A Real-time 802.11 Compatible Distributed MIMO System

Details
Discussion Comments: 0
Verification: Authors have not verified information

Spatiotemporal Traffic Matrix Synthesis

Paul Tune, Matthew Roughan

Spatiotemporal Traffic Matrix Synthesis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cache'n DASH: Efficient Caching for DASH

Parikshit Juluri, Deep Medhi

Cache'n DASH: Efficient Caching for DASH

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Extreme Web Caching for Faster Web Browsing

Ali Raza, Yasir Zaki, Thomas Pötsch, Jay Chen, Lakshmi Subramanian

Extreme Web Caching for Faster Web Browsing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Presto: Edge-based Load Balancing for Fast Datacenter Networks

Keqiang He, Eric Rozner, Kanak Agarwal, Wes Felter, John B. Carter, Aditya Akella

Presto: Edge-based Load Balancing for Fast Datacenter Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rollback-Recovery for Middleboxes

Justine Sherry, Peter Xiang Gao, Soumya Basu, Aurojit Panda, Arvind Krishnamurthy, Christian Maciocco, Maziar Manesh, João Martins, Sylvia Ratnasamy, Luigi Rizzo, Scott Shenker

Rollback-Recovery for Middleboxes

Details
Discussion Comments: 0
Verification: Authors have not verified information

R2C2: A Network Stack for Rack-scale Computers

Paolo Costa, Hitesh Ballani, Kaveh Razavi, Ian A. Kash

R2C2: A Network Stack for Rack-scale Computers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Condor: Better Topologies Through Declarative Design

Brandon Schlinker, Radhika Niranjan Mysore, Sean Smith, Jeffrey C. Mogul, Amin Vahdat, Minlan Yu, Ethan Katz-Bassett, Michael Rubin

Condor: Better Topologies Through Declarative Design

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications

Hyunwoo Choi, Jeongmin Kim, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, Dongsu Han

Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Case for a Stateful Middlebox Networking Stack

Muhammad Asim Jamshed, Donghwi Kim, YoungGyoun Moon, Dongsu Han, KyoungSoo Park

A Case for a Stateful Middlebox Networking Stack

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Efficient Coflow Scheduling Without Prior Knowledge

Mosharaf Chowdhury, Ion Stoica

Efficient Coflow Scheduling Without Prior Knowledge

Details
Discussion Comments: 0
Verification: Authors have not verified information

Chaos Monkey: Increasing SDN Reliability through Systematic Network Destruction

Michael Alan Chang, Brendan Tschaen, Theophilus Benson, Laurent Vanbever

Chaos Monkey: Increasing SDN Reliability through Systematic Network Destruction

Details
Discussion Comments: 0
Verification: Authors have not verified information

Santa: Faster Packet Delivery for Commonly Wished Replies

Florian Schmidt, Oliver Hohlfeld, René Glebke, Klaus Wehrle

Santa: Faster Packet Delivery for Commonly Wished Replies

Details
Discussion Comments: 0
Verification: Authors have not verified information

End-User Mapping: Next Generation Request Routing for Content Delivery

Fangfei Chen, Ramesh K. Sitaraman, Marcelo Torres

End-User Mapping: Next Generation Request Routing for Content Delivery

Details
Discussion Comments: 0
Verification: Authors have not verified information

BitCuts: Towards Fast Packet Classification for Order-Independent Rules

Zhi Liu, Xiang Wang, Baohua Yang, Jun Li

BitCuts: Towards Fast Packet Classification for Order-Independent Rules

Details
Discussion Comments: 0
Verification: Authors have not verified information

SpotFi: Decimeter Level Localization Using WiFi

Manikanta Kotaru, Kiran Raj Joshi, Dinesh Bharadia, Sachin Katti

SpotFi: Decimeter Level Localization Using WiFi

Details
Discussion Comments: 0
Verification: Authors have not verified information

Supercharge me: Boost Router Convergence with SDN

Michael Alan Chang, Thomas Holterbach, Markus Happe, Laurent Vanbever

Supercharge me: Boost Router Convergence with SDN

Details
Discussion Comments: 0
Verification: Authors have not verified information

FlyCast: Free-Space Optics Accelerating Multicast Communications in Physical Layer

Jinzhen Bao, Dezun Dong, Baokang Zhao, Zhang Luo, Chunqing Wu, Zhenghu Gong

FlyCast: Free-Space Optics Accelerating Multicast Communications in Physical Layer

Details
Discussion Comments: 0
Verification: Authors have not verified information

i-tee: A fully automated Cyber Defense Competition for Students

Margus Ernits, Johannes Tammekänd, Olaf Maennel

i-tee: A fully automated Cyber Defense Competition for Students

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hopper: Decentralized Speculation-aware Cluster Scheduling at Scale

Xiaoqi Ren, Ganesh Ananthanarayanan, Adam Wierman, Minlan Yu

Hopper: Decentralized Speculation-aware Cluster Scheduling at Scale

Details
Discussion Comments: 0
Verification: Authors have not verified information

Packet-Level Telemetry in Large Datacenter Networks

Yibo Zhu, Nanxi Kang, Jiaxin Cao, Albert G. Greenberg, Guohan Lu, Ratul Mahajan, David A. Maltz, Lihua Yuan, Ming Zhang, Ben Y. Zhao, Haitao Zheng

Packet-Level Telemetry in Large Datacenter Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests

Sam Burnett, Nick Feamster

Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enabling Performance Evaluation Beyond 10 Gbps

Gianni Antichi, Charalampos Rotsos, Andrew W. Moore

Enabling Performance Evaluation Beyond 10 Gbps

Details
Discussion Comments: 0
Verification: Authors have not verified information

RPKI MIRO: Monitoring and Inspection of RPKI Objects

Andreas Reuter, Matthias Wählisch, Thomas C. Schmidt

RPKI MIRO: Monitoring and Inspection of RPKI Objects

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rule-level Data Plane Monitoring With Monocle

Peter Peresíni, Maciej Kuzniar, Dejan Kostic

Rule-level Data Plane Monitoring With Monocle

Details
Discussion Comments: 0
Verification: Authors have not verified information

Network Policy Whiteboarding and Composition

Jeongkeun Lee, Joon-Myung Kang, Chaithan Prakash, Yoshio Turner, Aditya Akella, Charles Clark, Yadi Ma, Puneet Sharma, Ying Zhang

Network Policy Whiteboarding and Composition

Details
Discussion Comments: 0
Verification: Authors have not verified information

BwE: Flexible, Hierarchical Bandwidth Allocation for WAN Distributed Computing

Alok Kumar, Sushant Jain, Uday Naik, Anand Raghuraman, Nikhil Kasinadhuni, Enrique Cauich Zermeno, C. Stephen Gunn, Jing Ai, Björn Carlin, Mihai Amarandei-Stavila, Mathieu Robin, Aspi Siganporia, Stephen Stuart, Amin Vahdat

BwE: Flexible, Hierarchical Bandwidth Allocation for WAN Distributed Computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Caraoke: An E-Toll Transponder Network for Smart Cities

Omid Abari, Deepak Vasisht, Dina Katabi, Anantha Chandrakasan

Caraoke: An E-Toll Transponder Network for Smart Cities

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sampling and Large Flow Detection in SDN

Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schiff

Sampling and Large Flow Detection in SDN

Details
Discussion Comments: 0
Verification: Authors have not verified information

Coarse-grained Scheduling with Software-Defined Networking Switches

Myriana Rifai, Dino Lopez Pacheco, Guillaume Urvoy-Keller

Coarse-grained Scheduling with Software-Defined Networking Switches

Details
Discussion Comments: 0
Verification: Authors have not verified information

Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC

Tobias Markmann, Thomas C. Schmidt, Matthias Wählisch

Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards Scalable SDN Switches: Enabling Faster Flow Table Entries Installation

Roberto Bifulco, Anton Matsiuk

Towards Scalable SDN Switches: Enabling Faster Flow Table Entries Installation

Details
Discussion Comments: 0
Verification: Authors have not verified information

BackFi: High Throughput WiFi Backscatter

Dinesh Bharadia, Kiran Raj Joshi, Manikanta Kotaru, Sachin Katti

BackFi: High Throughput WiFi Backscatter

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-Domain Service Orchestration Over Networks and Clouds: A Unified Approach

Balázs Sonkoly, János Czentye, Róbert Szabó, David Jocha, János Elek, Sahel Sahhaf, Wouter Tavernier, Fulvio Risso

Multi-Domain Service Orchestration Over Networks and Clouds: A Unified Approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Coracle: Evaluating Consensus at the Internet Edge

Heidi Howard, Jon Crowcroft

Coracle: Evaluating Consensus at the Internet Edge

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sub-Nanosecond Time of Flight on Commercial Wi-Fi Cards

Deepak Vasisht, Swarun Kumar, Dina Katabi

Sub-Nanosecond Time of Flight on Commercial Wi-Fi Cards

Details
Discussion Comments: 0
Verification: Authors have not verified information

InterTubes: A Study of the US Long-haul Fiber-optic Infrastructure

Ramakrishnan Durairajan, Paul Barford, Joel Sommers, Walter Willinger

InterTubes: A Study of the US Long-haul Fiber-optic Infrastructure

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Internet of Names: A DNS Big Dataset

Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto, Aiko Pras

The Internet of Names: A DNS Big Dataset

Details
Author Comments: Parts of the data collected by the OpenINTEL platform -- the research discussed in this paper -- are released as open data on a daily basis. See our website for more information.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

NetFPGA: Rapid Prototyping of Networking Devices in Open Source

Noa Zilberman, Yury Audzevich, Georgina Kalogeridou, Neelakandan Manihatty Bojan, Jingyun Zhang, Andrew W. Moore

NetFPGA: Rapid Prototyping of Networking Devices in Open Source

Details
Discussion Comments: 0
Verification: Authors have not verified information

Challenging Entropy-based Anomaly Detection and Diagnosis in Cellular Networks

Pierdomenico Fiadino, Alessandro D'Alconzo, Mirko Schiavone, Pedro Casas

Challenging Entropy-based Anomaly Detection and Diagnosis in Cellular Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

EPOXIDE: A Modular Prototype for SDN Troubleshooting

Tamás Lévai, István Pelle, Felicián Németh, András Gulyás

EPOXIDE: A Modular Prototype for SDN Troubleshooting

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

nf.io: A File System Abstraction for NFV Orchestration

Md. Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, Raouf Boutaba

nf.io: A File System Abstraction for NFV Orchestration

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Analysis of Game Bot's Behavioral Characteristics in Social Interaction Networks of MMORPG

Seong Hoon Jeong, Ah Reum Kang, Huy Kang Kim

Analysis of Game Bot's Behavioral Characteristics in Social Interaction Networks of MMORPG

Details
Discussion Comments: 0
Verification: Authors have not verified information

PGA: Using Graphs to Express and Automatically Reconcile Network Policies

Chaithan Prakash, Jeongkeun Lee, Yoshio Turner, Joon-Myung Kang, Aditya Akella, Sujata Banerjee, Charles Clark, Yadi Ma, Puneet Sharma, Ying Zhang

PGA: Using Graphs to Express and Automatically Reconcile Network Policies

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Control-Theoretic Approach for Dynamic Adaptive Video Streaming over HTTP

Xiaoqi Yin, Abhishek Jindal, Vyas Sekar, Bruno Sinopoli

A Control-Theoretic Approach for Dynamic Adaptive Video Streaming over HTTP

Details
Discussion Comments: 0
Verification: Authors have not verified information

A High-Radix, Low-Latency Optical Switch for Data Centers

Dan Alistarh, Hitesh Ballani, Paolo Costa, Adam Funnell, Joshua Benjamin, Philip M. Watts, Benn Thomsen

A High-Radix, Low-Latency Optical Switch for Data Centers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS

David Naylor, Kyle Schomp, Matteo Varvello, Ilias Leontiadis, Jeremy Blackburn, Diego R. López, Konstantina Papagiannaki, Pablo Rodríguez Rodríguez, Peter Steenkiste

Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

How to Bid the Cloud

Liang Zheng, Carlee Joe-Wong, Chee-Wei Tan, Mung Chiang, Xinyu Wang

How to Bid the Cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems

Stevens Le Blond, David R. Choffnes, William Caldwell, Peter Druschel, Nicholas Merritt

Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Silo: Predictable Message Latency in the Cloud

Keon Jang, Justine Sherry, Hitesh Ballani, Toby Moncaster

Silo: Predictable Message Latency in the Cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adaptive Congestion Control for Unpredictable Cellular Networks

Yasir Zaki, Thomas Pötsch, Jay Chen, Lakshminarayanan Subramanian, Carmelita Görg

Adaptive Congestion Control for Unpredictable Cellular Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Poptrie: A Compressed Trie with Population Count for Fast and Scalable Software IP Routing Table Lookup

Hirochika Asai, Yasuhiro Ohara

Poptrie: A Compressed Trie with Population Count for Fast and Scalable Software IP Routing Table Lookup

Details
Discussion Comments: 0
Verification: Authors have not verified information

TIMELY: RTT-based Congestion Control for the Datacenter

Radhika Mittal, Vinh The Lam, Nandita Dukkipati, Emily R. Blem, Hassan M. G. Wassel, Monia Ghobadi, Amin Vahdat, Yaogong Wang, David Wetherall, David Zats

TIMELY: RTT-based Congestion Control for the Datacenter

Details
Discussion Comments: 0
Verification: Authors have not verified information

Virtual Network Function Orchestration with Scylla

Roberto Riggio, Julius Schulz-Zander, Abbas Bradai

Virtual Network Function Orchestration with Scylla

Details
Discussion Comments: 0
Verification: Authors have not verified information

Toward Automated Testing of Geo-Distributed Replica Selection Algorithms

Kirill Bogdanov, Miguel Peón Quirós, Gerald Q. Maguire Jr., Dejan Kostic

Toward Automated Testing of Geo-Distributed Replica Selection Algorithms

Details
Discussion Comments: 0
Verification: Authors have not verified information

Alternative Trust Sources: Reducing DNSSEC Signature Verification Operations with TLS

Sean Patrick Donovan, Nick Feamster

Alternative Trust Sources: Reducing DNSSEC Signature Verification Operations with TLS

Details
Discussion Comments: 0
Verification: Authors have not verified information

Large-scale Measurements of Wireless Network Behavior

Sanjit Biswas, John C. Bicket, Edmund Wong, Raluca Musaloiu-E, Apurv Bhartia, Daniel Aguayo

Large-scale Measurements of Wireless Network Behavior

Details
Discussion Comments: 0
Verification: Authors have not verified information

Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism

Mor Sides, Anat Bremler-Barr, Elisha J. Rosensweig

Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Optimization of Request Routing for Content Delivery

Walid Benchaita, Samir Ghamri-Doudane, Sébastien Tixeuil

On the Optimization of Request Routing for Content Delivery

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Mininet-based Virtual Testbed for Distributed SDN Development

Bob Lantz, Brian O'Connor

A Mininet-based Virtual Testbed for Distributed SDN Development

Details
Discussion Comments: 0
Verification: Authors have not verified information

FreeSurf: Application-Centric Wireless Access with SDN

Zhen Cao, Jürgen Fitschen, Panagiotis Papadimitriou

FreeSurf: Application-Centric Wireless Access with SDN

Details
Discussion Comments: 0
Verification: Authors have not verified information

FALE: Fine-grained Device Free Localization that can Adaptively work in Different Areas with Little Effort

Liqiong Chang, Xiaojiang Chen, Dingyi Fang, Ju Wang, Tianzhang Xing, Chen Liu, Zhanyong Tang

FALE: Fine-grained Device Free Localization that can Adaptively work in Different Areas with Little Effort

Details
Discussion Comments: 0
Verification: Authors have not verified information

BlindBox: Deep Packet Inspection over Encrypted Traffic

Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy

BlindBox: Deep Packet Inspection over Encrypted Traffic

Details
Discussion Comments: 0
Verification: Authors have not verified information