default search action
ACM SIGCOMM Conference Posters and Demos 2017: Los Angeles, CA, USA
- Jeff Burke, Matthias Wählisch, Nicholas Zhang, David Meyer, Puneet Sharma:
Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, SIGCOMM 2017, Los Angeles, CA, USA, August 21-25, 2017. ACM 2017, ISBN 978-1-4503-5057-0
SDN & Routing
- Philipp Mao, Rüdiger Birkner, Thomas Holterbach, Laurent Vanbever:
Boosting the BGP Convergence in SDXes with SWIFT. 1-2 - Apoorv Shukla, Mengchen Shi, Anja Feldmann
:
Automatic Custom Generation of Topologies and Configuration of Routing protocols in SDN. 3-5 - Arnaud Dethise
, Marco Chiesa
, Marco Canini
:
Privacy-Preserving Detection of Inter-Domain SDN Rules Overlaps. 6-8 - Desislava C. Dimitrova, John Liagouris, Moritz Hoffmann, Vasiliki Kalavri
, Sebastian Wicki, Timothy Roscoe:
Quick Incremental Routing Logic for Dynamic Network Graphs. 9-11 - Yabo Yan, Jun Bi, Yu Zhou, Cheng Zhang:
Gather: A Way to Optimize the Routing Process of In-band Control Network. 12-14
SDN & Data Centers, Enterprise Networks
- Benedikt Pfaff, Johann Scherer, David Hock, Nicholas Gray, Thomas Zinner, Phuoc Tran-Gia, Raphael Durner, Wolfgang Kellerer
, Claas Lorenz:
SDN/NFV-enabled Security Architecture for Fine-grained Policy Enforcement and Threat Mitigation for Enterprise Networks. 15-16 - Jinzhen Bao, Baokang Zhao, Dezun Dong, Zhenghu Gong:
HERO: A Hybrid Electrical and Optical Multicast for Accelerating High-Performance Data Center Applications. 17-18
ICN & CDN
- Khaled Diab, Mohamed Hefeeda
:
Cooperative Active Distribution of Videos in Telco-CDNs. 19-21 - Jacques Samain, Jordan Augé, Giovanna Carofiglio, Luca Muscariello, Michele Papalini, Mauro Sardara:
Enhancing Mobile Video Delivery over an Heterogeneous Network Access with Information-Centric Networking. 22-24 - Dan Ameme, Satyajayant Misra, Abderrahmen Mtibaa:
A Case for Information Centric Networking For Smart Grid Communications. 25-27
Network monitoring and diagnosis
- Bairen Yi, Jiacheng Xia, Li Chen
, Kai Chen:
Towards Zero Copy Dataflows using RDMA. 28-30 - Florian Schmidt
:
uniprof: A Unikernel Stack Profiler. 31-33 - Felix Rath, Johannes Krude, Jan Rüth
, Daniel Schemmel
, Oliver Hohlfeld
, Jó Ágila Bitsch, Klaus Wehrle
:
SymPerf: Predicting Network Function Performance. 34-36 - Roberto Gonzalez, Alberto García-Durán, Filipe Manco, Mathias Niepert
, Pelayo Vallina
:
Network Data Monetization Using Net2Vec. 37-39 - Behnaz Arzani, Selim Ciraci, Luiz F. O. Chamon, Yibo Zhu, Hongqiang Harry Liu, Jitu Padhye, Geoff Outhred, Boon Thau Loo
:
Closing the Network Diagnostics Gap with Vigil. 40-42
Measurement
- Mallesham Dasari, Conor Kelton, Javad Nejati, Aruna Balasubramanian, Samir R. Das:
Demystifying Hardware Bottlenecks in Mobile Web Quality of Experience. 43-45 - Richard Cziva, Christopher Lorier, Dimitrios P. Pezaros:
Ruru: High-speed, Flow-level Latency Measurement and Visualization of Live Internet Traffic. 46-47 - Romain Fontugne, Anant Shah, Emile Aben:
AS Hegemony: A Robust Metric for AS Centrality. 48-50 - Zafar Gilani, Jon Crowcroft, Reza Farahbakhsh, Gareth Tyson:
The Implications of Twitterbot Generated Data Traffic on Networked Systems. 51-53 - Jingtao Ding, Yanghao Li, Yong Li, Pan Hui, Depeng Jin:
Characterizing the Click and Share Dynamics of Micro-Videos in Social Media. 54-56 - Vikram Nathan, Srinivas Narayana, Anirudh Sivaraman, Prateesh Goyal, Venkat Arun, Mohammad Alizadeh, Vimalkumar Jeyakumar, Changhoon Kim:
Demonstration of the Marple System for Network Performance Monitoring. 57-59
DNS
- Liang Zhu, John S. Heidemann
:
LDplayer: DNS Experimentation at Scale. 60-62 - Roland van Rijswijk-Deij
, Taejoong Chung, David R. Choffnes, Alan Mislove, Willem Toorop:
The Root Canary: Monitoring and Measuring the DNSSEC Root Key Rollover. 63-64 - Anna Sperotto
, Olivier van der Toorn, Roland van Rijswijk-Deij
:
TIDE: Threat Identification Using Active DNS Measurements. 65-67
Security and privacy
- Nadav Rotenberg, Haya Schulmann, Michael Waidner
, Benjamin Zeltser:
Authentication-Bypass Vulnerabilities in SOHO Routers. 68-70 - Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Nik Sultana, Bowen Wang, Jingyu Qian, Yuankai Zhang, Ang Chen, Andreas Haeberlen
, Boon Thau Loo
, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou:
A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers. 71-73 - Sebastian Friebe, Martin Florian:
DPS-Discuss: Demonstrating Decentralized, Pseudonymous, Sybil-resistant Communication. 74-75 - Philipp Meyer, Raphael Hiesgen, Thomas C. Schmidt
, Marcin Nawrocki, Matthias Wählisch
:
Towards Distributed Threat Intelligence in Real-Time. 76-78
Congestion control and avoidance
- Jiaqing Dong, Yi Wang, Chen Tian, Bo Jin
, Hao Yin, Gong Zhang:
WVCC: Weighted Virtual Congestion Control for Datacenter Networks. 79-81 - Haoyu Song
, Zhigang Ji, Yali Zhang, Yinben Xia:
3D Fabric: Differential Deceleration and Detour for Congestion Free Data Center Networks. 82-84 - Yi Cao, Aruna Balasubramanian, Anshul Gandhi:
Rethinking TCP Throughput and Latency Modeling. 85-87 - Giuseppe Siracusano, Roberto Bifulco
, Stefano Salsano
:
TCP Proxy Bypass: All the Gain with No Pain! 88-90
SDN
- Mark Szalay
, László Toka, Gábor Rétvári, Gergely Pongrácz, Levente Csikor, Dimitrios P. Pezaros:
HARMLESS: Cost-Effective Transitioning to SDN. 91-93 - Yang Zhang, Bo Han, Zhi-Li Zhang, Vijay Gopalakrishnan:
Network-Assisted Raft Consensus Algorithm. 94-96 - Marton Szabo, András Majdán, Gergely Pongrácz, László Toka, Balázs Sonkoly
:
Making the Data Plane Ready for NFV: An Effective Way of Handling Resources. 97-99
P4
- Yu Zhou, Jun Bi:
ClickP4: Towards Modular Programming of P4. 100-102 - Miguel C. Neves, Kirill Levchenko, Marinho P. Barcellos
:
Sandboxing Data Plane Programs for Fun and Profit. 103-104 - Chengze Fan, Jun Bi, Yu Zhou, Cheng Zhang, Haisu Yu:
NS4: A P4-driven Network Simulator. 105-107 - Zijun Ma, Jun Bi, Cheng Zhang, Yu Zhou, Abdul Basit Dogar:
CacheP4: A Behavior-level Caching Mechanism for P4. 108-110
Wireless, mobile, and sensor networks
- Zhenyu Song, Longfei Shangguan, Kyle Jamieson
:
Wi-Fi Goes to Town: Rapid Picocell Switching for Wireless Transit Networks. 111-112 - Mohamed Naoufal Mahfoudi, Thierry Parmentelat, Thierry Turletti, Walid Dabbous, Raymond Knopp:
Deploy a 5G Network in Less Than 5 Minutes. 113-115 - Yunfei Ma, Nicholas S. Selby, Manish Singh
, Fadel Adib:
Fine-grained RFID Localization via Ultra-wideband Emulation. 116-118 - Farzad Asgarian, Khalil Najafi:
Time Synchronization in a Network of Bluetooth Low Energy Beacons. 119-120
IoT
- Fatemeh Jalali, Olivia J. Smith
, Timothy M. Lynar
, Frank Suits
:
Cognitive IoT Gateways: Automatic Task Sharing and Switching between Cloud and Edge/Fog Computing. 121-123 - Vittorio Cozzolino, Aaron Yi Ding, Jörg Ott, Dirk Kutscher
:
Enabling Fine-Grained Edge Offloading for IoT. 124-126
Lookup & Matching
- Minseok Kwon, Shailesh Vajpayee, Pragash Vijayaragavan, Arjun Dhuliya, John Marshall:
Use of Cuckoo Filters with FD.io VPP for Software IPv6 Routing Lookup. 127-129 - Zhe Fu, Shijie Zhou, Jun Li:
bitFA: A Novel Data Structure for Fast and Update-friendly Regular Expression Matching. 130-132
Hardware-assisted acceleration
- Jeongkeun Lee, Rui Miao, Changhoon Kim, Minlan Yu, Hongyi Zeng:
Stateful Layer-4 Load Balancing in Switching ASICs. 133-135 - Zhilong Zheng, Jun Bi, Heng Yu, Chen Sun, Jianping Wu:
BLOP: Batch-Level Order Preserving for GPU-Accelerated Packet Processing. 136-137 - Giuseppe Siracusano, Roberto Bifulco
:
Is it a SmartNIC or a Key-Value Store?: Both! 138-140 - Menghao Zhang
, Jun Bi, Jiasong Bai, Zhao Dong, Yongbin Li, Zhaogeng Li:
FTGuard: A Priority-Aware Strategy Against the Flow Table Overflow Attack in SDN. 141-143 - Nicolae Paladi, Linus Karlsson:
Safeguarding VNF Credentials with Intel SGX. 144-146
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.