


default search action
13th CoNEXT 2017: Incheon, Republic of Korea
- Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2017, Incheon, Republic of Korea, December 12 - 15, 2017. ACM 2017, ISBN 978-1-4503-5422-6

Keynote
- Mohammad Alizadeh:

Fast and Smart Network Resource Management for Datacenters and Beyond. 1
Cellular Networks
- Ghufran Baig, Dan Alistarh, Thomas Karagiannis, Bozidar Radunovic, Matthew Balkwill, Lili Qiu:

Towards unlicensed cellular networks in TV white spaces. 2-14 - Ramanujan K. Sheshadri

, Karthikeyan Sundaresan, Eugene Chai, Amir Khojastepour, Sampath Rangarajan, Dimitrios Koutsonikolas:
BLU: Blue-printing Interference for Robust LTE Access in Unlicensed Spectrum. 15-27 - Mário Almeida, Alessandro Finamore, Diego Perino, Narseo Vallina-Rodriguez

, Matteo Varvello:
Dissecting DNS Stakeholders in Mobile Networks. 28-34
CDN and Caching
- Youndo Lee, Neil Spring:

Identifying and Analyzing Broadband Internet Reverse DNS Names. 35-40 - Marc Anthony Warrior, Uri Klarman, Marcel Flores, Aleksandar Kuzmanovic:

Drongo: Speeding Up CDNs with Subnet Assimilation from the Client. 41-54 - Aditya Sundarrajan, Mingdong Feng, Mangesh Kasbekar, Ramesh K. Sitaraman

:
Footprint Descriptors: Theory and Practice of Cache Provisioning in a Global CDN. 55-67 - Matthew K. Mukerjee, Ilker Nadi Bozkurt, Devdeep Ray, Bruce M. Maggs, Srinivasan Seshan

, Hui Zhang:
Redesigning CDN-Broker Interactions for Improved Content Delivery. 68-80
Security
- Shinyoung Cho, Rishab Nithyanand, Abbas Razaghpanah

, Phillipa Gill:
A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography. 81-87 - David Naylor, Richard Li

, Christos Gkantsidis, Thomas Karagiannis, Peter Steenkiste
:
And Then There Were More: Secure Communication for More Than Two Parties. 88-100 - Yossi Gilad, Omar Sagga, Sharon Goldberg:

MaxLength Considered Harmful to the RPKI. 101-107 - Ren Zhang, Bart Preneel

:
On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol. 108-119 - Marco Chiesa

, Daniel Demmler, Marco Canini
, Michael Schapira, Thomas Schneider
:
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers. 120-133 - Azeem Aqil, Karim Khalil, Ahmed Osama Fathy Atya, Evangelos E. Papalexakis

, Srikanth V. Krishnamurthy
, Trent Jaeger, K. K. Ramakrishnan
, Paul L. Yu, Ananthram Swami:
Jaal: Towards Network Intrusion Detection at ISP Scale. 134-146
Transport Layer
- Yeon-Sup Lim, Erich M. Nahum, Don Towsley

, Richard J. Gibbens:
ECF: An MPTCP Path Scheduler to Manage Heterogeneous Paths. 147-159 - Quentin De Coninck

, Olivier Bonaventure:
Multipath QUIC: Design and Evaluation. 160-166 - Wai Kay Leong

, Zixiao Wang, Ben Leong
:
TCP Congestion Control Beyond Bandwidth-Delay Product for Mobile Cellular Networks. 167-179 - Cristina Marquez, Marco Gramaglia, Marco Fiore, Albert Banchs, Cezary Ziemlicki, Zbigniew Smoreda

:
Not All Apps Are Created Equal: Analysis of Spatiotemporal Heterogeneity in Nationwide Mobile Service Usage. 180-186
Light Communications
- Ander Galisteo

, Qing Wang
, Aniruddha Deshpande, Marco Zuniga
, Domenico Giustiniano
:
Follow that Light: Leveraging LEDs for Relative Two-Dimensional Localization. 187-198 - Qiongzheng Lin

, Lei Yang
, Huanyu Jia, Chunhui Duan, Yunhao Liu:
Revisiting Reading Rate with Mobility: Rate-Adaptive Reading in COTS RFID Systems. 199-211 - Hongjia Wu, Qing Wang

, Jie Xiong
, Marco Zuniga
:
SmartVLC: When Smart Lighting Meets VLC. 212-223
Wireless and Localization
- Adrian Loch, Hany Assasa

, Joan Palacios, Joerg Widmer
, Hans Suys, Björn Debaillie:
Zero Overhead Device Tracking in 60 GHz Wireless Networks using Multi-Lobe Beam Patterns. 224-237 - Zhe Chen, Zhongmin Li, Xu Zhang, Guorong Zhu, Yuedong Xu, Jie Xiong

, Xin Wang:
AWL: Turning Spatial Aliasing From Foe to Friend for Accurate WiFi Localization. 238-250 - Manikanta Kotaru, Pengyu Zhang, Sachin Katti:

Localizing Low-power Backscatter Tags Using Commodity WiFi. 251-262 - Dongyao Chen, Kang G. Shin, Yurong Jiang, Kyu-Han Kim:

Locating and Tracking BLE Beacons with Smartphones. 263-275
Network Management and SDN
- Rohan Gandhi, Ori Rottenstreich, Xin Jin:

Catalyst: Unlocking the Power of Choice to Speed up Network Updates. 276-282 - Huan Chen, Theophilus Benson:

Hermes: Providing Tight Control over High-Performance SDN Switches. 283-295 - Anubhavnidhi Abhashkumar, Joon-Myung Kang

, Sujata Banerjee
, Aditya Akella, Ying Zhang, Wenfei Wu:
Supporting Diverse Dynamic Intent-based Policies using Janus. 296-309 - Junguk Cho, Hyunseok Chang, Sarit Mukherjee, T. V. Lakshman, Jacobus E. van der Merwe:

Typhoon: An SDN Enhanced Real-Time Big Data Streaming Framework. 310-322 - Naga Praveen Katta, Aditi Ghag, Mukesh Hira, Isaac Keslassy

, Aran Bergman, Changhoon Kim, Jennifer Rexford
:
Clove: Congestion-Aware Load Balancing at the Virtual Edge. 323-335
Applications Layer
- Xiufeng Xie, Xinyu Zhang:

POI360: Panoramic Mobile Video Telephony over LTE Cellular Networks. 336-349 - Abbas Razaghpanah

, Arian Akhavan Niaki
, Narseo Vallina-Rodriguez
, Srikanth Sundaresan, Johanna Amann, Phillipa Gill:
Studying TLS Usage in Android Apps. 350-362 - Chaoyun Zhang, Xi Ouyang, Paul Patras

:
ZipNet-GAN: Inferring Fine-grained Mobile Traffic Patterns via a Generative Adversarial Neural Network. 363-375 - Rajdeep Das, Nimantha Thushan Baranasuriya, Venkata N. Padmanabhan, Christoffer Rødbro, Seth Gilbert

:
Informed Bandwidth Adaptation in Wi-Fi Networks using Ping-Pair. 376-388
Physical Layer
- Pengyu Zhang, Colleen Josephson

, Dinesh Bharadia, Sachin Katti:
FreeRider: Backscatter Communication Using Commodity Radios. 389-401 - Yue Qiao, Kannan Srinivasan, Anish Arora:

Channel Spoofer: Defeating Channel Variability and Unpredictability. 402-413 - Daniel Steinmetzer, Daniel Wegemer, Matthias Schulz, Joerg Widmer

, Matthias Hollick
:
Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.1 lad Devices. 414-425
Cloud and Datacenters
- Sajjad Rizvi, Bernard Wong, Srinivasan Keshav:

Canopus: A Scalable and Massively Parallel Consensus Protocol. 426-438 - Akshay Jajoo, Rohan Gandhi, Y. Charlie Hu, Cheng-Kok Koh:

Saath: Speeding up CoFlows by Exploiting the Spatial Dimension. 439-450 - Shuihai Hu, Yibo Zhu, Peng Cheng, Chuanxiong Guo

, Kun Tan, Jitendra Padhye, Kai Chen:
Tagger: Practical PFC Deadlock Prevention in Data Center Networks. 451-463 - Ruichuan Chen, Istemi Ekin Akkus, Bimal Viswanath, Ivica Rimac, Volker Hilt:

Towards Reliable Application Deployment in the Cloud. 464-477

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














