default search action
Networking 2017: Stockholm, Sweden
- 2017 IFIP Networking Conference, IFIP Networking 2017 and Workshops, Stockholm, Sweden, June 12-16, 2017. IEEE Computer Society 2017, ISBN 978-3-901882-94-4
- Khondaker Musfakus Salehin, Vinitmadhukar Sahasrabudhe, Roberto Rojas-Cessa:
Remote measurement of interrupt-coalescence latency of internet hosts. 1-9 - Jose Yallouz, János Tapolcai, Attila Körösi, Kristóf Bérczi, László Gyimóthi, Ariel Orda:
Packing strictly-shortest paths in a tree for QoS-aware routing. 1-9 - Sukhpreet Kaur Khangura, Markus Fidler:
Available bandwidth estimation from passive TCP measurements using the probe gap model. 1-9 - Samuel Micka, Sean Yaw, Brittany Terese Fasy, Brendan Mumey, Mike P. Wittie:
Efficient multipath flow monitoring. 1-9 - Timmy Schüller, Nils Aschenbruck, Markus Chimani, Martin Horneffer, Stefan Schnitter:
Traffic engineering using segment routing and considering requirements of a carrier IP network. 1-9 - Shuya Abe, Go Hasegawa, Masayuki Murata:
Design and performance evaluation of bearer aggregation method in mobile core network with C/U plane separation. 1-8 - Torsten Zimmermann, Jan Rüth, Benedikt Wolters, Oliver Hohlfeld:
How HTTP/2 pushes the web: An empirical study of HTTP/2 server push. 1-9 - Diman Zad Tootaghaj, Hana Khamfroush, Novella Bartolini, Stefano Ciavarella, Seamus Hayes, Thomas La Porta:
Network recovery from massive failures under uncertain knowledge of damages. 1-9 - Junxiao Shi, Eric Newberry, Beichuan Zhang:
On broadcast-based self-learning in named data networking. 1-9 - Spencer Sevilla, J. J. Garcia-Luna-Aceves:
A deployable identifier-locator split architecture. 1-9 - Pavlos Sermpezis, Xenofontas A. Dimitropoulos:
Can SDN accelerate BGP convergence? - A performance analysis of inter-domain routing centralization. 1-9 - Naércio Magaia, Carlos Borrego, Paulo Pereira, Miguel Correia:
PRIVO: A privacy-preserving opportunistic routing protocol for delay tolerant networks. 1-9 - Daniel S. Marcon, Marinho P. Barcellos:
Packer: Minimizing multi-resource fragmentation and performance interference in datacenters. 1-9 - Nashid Shahriar, Shihabur Rahman Chowdhury, Reaz Ahmed, Aimal Khan, Raouf Boutaba, Jeebak Mitra, Liu Liu:
Joint backup capacity allocation and embedding for survivable virtual networks. 1-9 - Rhaban Hark, Nils Richerzhagen, Björn Richerzhagen, Amr Rizk, Ralf Steinmetz:
Towards an adaptive selection of loss estimation techniques in software-defined networks. 1-9 - Francesca Fossati, Stefano Moretti, Stefano Secci:
A mood value for fair resource allocations. 1-9 - Amr Rizk, Michael Zink, Ramesh K. Sitaraman:
Model-based design and analysis of cache hierarchies. 1-9 - Tatsuya Amano, Shugo Kajita, Hirozumi Yamaguchi, Teruo Higashino, Mineo Takai:
A crowdsourcing and simulation based approach for fast and accurate Wi-Fi radio map construction in urban environment. 1-9 - Ali Marandi, Torsten Braun, Kavé Salamatian, Nikolaos Thomos:
BFR: A bloom filter-based routing approach for information-centric networks. 1-9 - Pravein Govindan Kannan, Mun Choon Chan, Richard T. B. Ma, Ee-Chien Chang:
Raptor: Scalable rule placement over multiple path in software defined networks. 1-9 - Zhaogeng Li, Jun Bi, Yangyang Wang:
Multi-Channel Scatter (MCS): Traffic balancing based on edge-switching in datacenter networks. 1-9 - Christian Sieber, Raphael Durner, Wolfgang Kellerer:
How fast can you reconfigure your partially deployed SDN network? 1-9 - Milan Schmittner, Arash Asadi, Matthias Hollick:
SEMUD: Secure multi-hop device-to-device communication for 5G public safety networks. 1-9 - Matthias Wichtlhuber, Jan Kessler, Sebastian Bücker, Ingmar Poese, Jeremias Blendin, Christian Koch, David Hausheer:
SoDA: Enabling CDN-ISP collaboration with software defined anycast. 1-9 - Artur Sterz, Lars Baumgärtner, Ragnar Mogk, Mira Mezini, Bernd Freisleben:
DTN-RPC: Remote procedure calls for disruption-tolerant networking. 1-9 - Peiyue Zhao, György Dán:
Resilient placement of virtual process control functions in mobile edge clouds. 1-9 - Marco Casazza, Pierre Fouilhoux, Mathieu Bouet, Stefano Secci:
Securing virtual network function placement with high availability guarantees. 1-9 - Pradeep Bangera, Sergey Gorinsky:
Ads versus regular contents: Dissecting the web hosting ecosystem. 1-9 - Paul Emmerich, Maximilian Pudelko, Sebastian Gallenmüller, Georg Carle:
FlowScope: Efficient packet capture and storage in 100 Gbit/s networks. 1-9 - David A. Hayes, David Ros, Andreas Petlund, Iffat Ahmed:
A framework for less than best effort congestion control with soft deadlines. 1-9 - Bruhadeshwar Bezawada, Alex X. Liu, Xiaojiang Liang, Rui Li:
A template approach for group key distribution in dynamic ad-hoc groups. 1-9 - Anat Bremler-Barr, David Hay, Idan Moyal, Liron Schiff:
Load balancing memcached traffic using software defined networking. 1-9 - Paul Nikolaus, Jens B. Schmitt:
On per-flow delay bounds in tandem queues under (In)dependent arrivals. 1-9 - Siddharth Pal, Ertugrul N. Ciftcioglu, Prithwish Basu, Kevin S. Chan, Ananthram Swami:
Decentralized network protection games in adversarial environments. 1-9 - Argyrios G. Tasiopoulos, Sameer G. Kulkarni, Mayutan Arumaithurai, Ioannis Psaras, K. K. Ramakrishnan, Xiaoming Fu, George Pavlou:
DRENCH: A semi-distributed resource management framework for NFV based service function chaining. 1-9 - Bitan Banerjee, Anand Seetharam, Chintha Tellambura:
Greedy caching: A latency-aware caching strategy for information-centric networks. 1-9 - Kuangyu Zheng, Xiaorui Wang, Jia Liu:
DISCO: Distributed traffic flow consolidation for power efficient data center network. 1-9 - Marc Mosko, Ersin Uzun, Christopher A. Wood:
Mobile sessions in content-centric networks. 1-9 - Christopher A. Wood:
Protecting the long tail: Transparent packet security in content-centric networks. 1-9 - Naeem Khademi, Grenville Armitage, Michael Welzl, Sebastian Zander, Gorry Fairhurst, David Ros:
Alternative backoff: Achieving low latency and high throughput with ECN and AQM. 1-9 - Zubair Shafiq, Alex X. Liu:
Cascade size prediction in online social networks. 1-9 - Zubair Shafiq, Alex X. Liu:
A graph theoretic approach to fast and accurate malware detection. 1-9 - Zainab Abaid, Mohamed Ali Kâafar, Sanjay Jha:
Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study. 1-9 - Christopher Scherb, Balázs Faludi, Christian F. Tschudin:
Execution state management in named function networking. 1-6 - Christopher Scherb, Claudio Marxer, Urs Schnurrenberger, Christian F. Tschudin:
In-network live stream processing with named functions. 1-6 - Junaid Ahmed Khan, Cédric Westphal, Yacine Ghamri-Doudane:
A content-based centrality metric for collaborative caching in information-centric fogs. 1-6 - Tom Jones, Gorry Fairhurst, Colin Perkins:
Raising the datagram API to support transport protocol evolution. 1-6 - Imed Allal, Bruno Mongazon-Cazavet, Khaldoun Al Agha, Sidi-Mohammed Senouci, Yvon Gourhant:
A green small cells deployment in 5G - Switch ON/OFF via IoT networks & energy efficient mesh backhauling. 1-2 - Mikhail Vilgelm, Wolfgang Kellerer:
Binary contention resolution for M2M random access prioritization in LTE-A and 5G. 1-2 - Rafael Pasquini, Farnaz Moradi, Jawwad Ahmed, Andreas Johnsson, Christofer Flinta, Rolf Stadler:
Predicting SLA conformance for cluster-based services. 1-2 - Brian Trammell, Colin Perkins, Mirja Kühlewind:
Post sockets: Towards an evolvable network transport interface. 1-6 - Mohammad Rajiullah, A. C. Mohideen, Felix Weinrank, Raffaello Secchi, Godred Fairhurst, Anna Brunström:
Understanding multistreaming for web traffic: An experimental study. 1-6 - Felix Weinrank, Michael Tüxen:
Transparent flow mapping for NEAT. 1-6 - Brenton D. Walker:
Benchmarking and simulating the fundamental scaling behaviors of a MapReduce engine. 1-6 - Hasan M. A. Islam, Dmitrij Lagutin, Nikos Fotiou:
Observing IoT resources over ICN. 1-8 - Mikael Gasparian, Guillaume Corsini, Torsten Braun, Eryk Schiller, Jonnahtan Saltarin:
Session support for SCN. 1-6 - Nikos Fotiou, Vasilios A. Siris, George Xylomenos, George C. Polyzos, Konstantinos V. Katsaros, George P. Petropoulos:
Edge-ICN and its application to the Internet of Things. 1-6 - Rhaban Hark, Amr Rizk, Nils Richerzhagen, Björn Richerzhagen, Ralf Steinmetz:
Isolated in-band communication for distributed SDN controllers. 1-2 - Tor Christian Tangenes, David A. Hayes, Andreas Petlund, David Ros:
Evaluating CAIA delay gradient as a candidate for deadline-aware less-than-best-effort transport. 1-6 - Rohit P. Tahiliani, Hitesh Tewari:
Implementation of PI2 queuing discipline for classic TCP traffic in ns-3. 1-6 - V. Marbukh:
Fragility risks of low latency dynamic queuing in large-scale clouds: Complex system perspective. 1-6 - Kiran Yedugundla, Per Hurtig, Anna Brunström:
Probe or wait: Handling tail losses using multipath TCP. 1-6 - Ian Marsh:
A lightweight measurement platform for home internet monitoring. 1-2 - Ricardo Santos, Zdravko Bozakov, Simone Mangiante, Anna Brunström, Andreas Kassler:
A NEAT framework for application-awareness in SDN environments. 1-2 - Charalampos Orfanidis, Laura Marie Feeney, Martin Jacobsson:
Measuring PHY layer interactions between LoRa and IEEE 802.15.4g networks. 1-2 - Ming Zeng, Viktoria Fodor:
Distributing dynamic divisible loads. 1-2 - Felipe Boeira, Marinho P. Barcellos, Edison Pignaton de Freitas, Alexey V. Vinel, Mikael Asplund:
On the impact of sybil attacks in cooperative driving scenarios. 1-2 - Albert Potsch, Stefan Hujber, Andreas Springer:
Remote controlled performance analysis of embedded wireless sensor networks. 1-2 - Berkin Guler, Öznur Özkasap:
Secure chain replication. 1-2 - Sanaz Taheri Boshrooyeh, Öznur Özkasap:
Guard: Secure routing in skip graph. 1-2 - Tran Quang Thanh, Stefan Covaci, Marius Corici, Thomas Magedanz:
Access control management and orchestration in NFV environment. 1-2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.