Paper Digest: SIGCOMM 2013 Highlights
SIGCOMM (ACM Special Interest Group on Data Communications) is one of the top data communications and networking conferences in the world.
To help the community quickly catch up on the work presented in this conference, Paper Digest Team processed all accepted papers, and generated one highlight sentence (typically the main topic) for each paper. Readers are encouraged to read these machine generated highlights / summaries to quickly get the main idea of each paper.
If you do not want to miss any interesting academic paper, you are welcome to sign up our free daily paper digest service to get updates on new papers published in your area every day. You are also welcome to follow us on Twitter and Linkedin to get updated with new conference digests.
Paper Digest Team
team@paperdigest.org
TABLE 1: SIGCOMM 2013 Papers
Title | Authors | Highlight | |
---|---|---|---|
1 | Zen and the art of network architecture | Larry Peterson | Zen and the art of network architecture |
2 | B4: experience with a globally-deployed software defined wan | Sushant Jain, Alok Kumar, Subhasree Mandal, Joon Ong, Leon Poutievski, Arjun Singh, Subbaiah Venkata, Jim Wanderer, Junlan Zhou, Min Zhu, Jon Zolla, Urs Hölzle, Stephen Stuart, Amin Vahdat | We present the design, implementation, and evaluation of B4, a private WAN connecting Google’s data centers across the planet. |
3 | Achieving high utilization with software-driven WAN | Chi-Yao Hong, Srikanth Kandula, Ratul Mahajan, Ming Zhang, Vijay Gill, Mohan Nanduri, Roger Wattenhofer | We present SWAN, a system that boosts the utilization of inter-datacenter networks by centrally controlling when and how much traffic each service sends and frequently re-configuring the network’s data plane to match current traffic demand. |
4 | SIMPLE-fying middlebox policy enforcement using SDN | Zafar Ayyub Qazi, Cheng-Chun Tu, Luis Chiang, Rui Miao, Vyas Sekar, Minlan Yu | This paper presents SIMPLE, a SDN-based policy enforcement layer for efficient middlebox-specific "traffic steering”. |
5 | Ambient backscatter: wireless communication out of thin air | Vincent Liu, Aaron Parks, Vamsi Talla, Shyamnath Gollakota, David Wetherall, Joshua R. Smith | We present the design of a communication system that enables two devices to communicate using ambient RF as the only source of power. |
6 | Dude, where’s my card?: RFID positioning that works with multipath and non-line of sight | Jue Wang, Dina Katabi | This paper introduces the first fine-grained RFID positioning system that is robust to multipath and non-line-of-sight scenarios. |
7 | Dhwani: secure peer-to-peer acoustic NFC | Rajalakshmi Nandakumar, Krishna Kant Chintalapudi, Venkat Padmanabhan, Ramarathnam Venkatesan | In this paper, we address the challenge of enabling NFC-like capability on the existing base of mobile phones. |
8 | See through walls with WiFi! | Fadel Adib, Dina Katabi | In this paper, we show that Wi-Fi can also extend our senses, enabling us to see moving objects through walls and behind closed doors. |
9 | Maple: simplifying SDN programming using algorithmic policies | Andreas Voellmy, Junchang Wang, Y Richard Yang, Bryan Ford, Paul Hudak | In this pa- per, we present Maple, a system that simplifies SDN programming by (1) allowing a programmer to use a standard programming language to design an arbitrary, centralized algorithm, which we call an algorithmic policy, to decide the behaviors of an entire network, and (2) providing an abstraction that the programmer-defined, centralized policy runs, conceptually, "afresh" on every packet entering a network, and hence is oblivious to the challenge of translating a high-level policy into sets of rules on distributed individual switches. |
10 | Forwarding metamorphosis: fast programmable match-action processing in hardware for SDN | Pat Bosshart, Glen Gibb, Hun-Seok Kim, George Varghese, Nick McKeown, Martin Izzard, Fernando Mujica, Mark Horowitz | We propose the RMT (reconfigurable match tables) model, a new RISC-inspired pipelined architecture for switching chips, and we identify the essential minimal set of action primitives to specify how headers are processed in hardware. |
11 | Compressing IP forwarding tables: towards entropy bounds and beyond | Gábor Rétvári, János Tapolcai, Attila Kőrösi, András Majdán, Zalán Heszberger | The main goal of this paper is to demonstrate how data compression can benefit the networking community, by showing how to squeeze the IP Forwarding Information Base (FIB), the giant table consulted by IP routers to make forwarding decisions, into information-theoretical entropy bounds, with essentially zero cost on longest prefix match and FIB update. |
12 | TCP ex machina: computer-generated congestion control | Keith Winstein, Hari Balakrishnan | This paper describes a new approach to end-to-end congestion control on a multi-user network. |
13 | FCP: a flexible transport framework for accommodating diversity | Dongsu Han, Robert Grandl, Aditya Akella, Srinivasan Seshan | This paper presents a flexible framework for network resource allocation, called FCP, that accommodates diversity by exposing a simple abstraction for resource allocation. |
14 | Less pain, most of the gain: incrementally deployable ICN | Seyed Kaveh Fayazbakhsh, Yin Lin, Amin Tootoonchian, Ali Ghodsi, Teemu Koponen, Bruce Maggs, K.C. Ng, Vyas Sekar, Scott Shenker | Building on these insights, we present a proof-of-concept design of an incrementally deployable ICN architecture. |
15 | Reducing web latency: the virtue of gentle aggression | Tobias Flach, Nandita Dukkipati, Andreas Terzis, Barath Raghavan, Neal Cardwell, Yuchung Cheng, Ankur Jain, Shuai Hao, Ethan Katz-Bassett, Ramesh Govindan | In this paper, we present the design of novel loss recovery mechanisms for TCP that judiciously use redundant transmissions to minimize timeout-driven recovery. |
16 | BGP security in partial deployment: is the juice worth the squeeze? | Robert Lychev, Sharon Goldberg, Michael Schapira | We therefore use theoretical and experimental approach to study the security benefits provided by partially-deployed S*BGP, vis-a-vis those already provided by origin authentication. |
17 | PoiRoot: investigating the root cause of interdomain path changes | Umar Javed, Italo Cunha, David Choffnes, Ethan Katz-Bassett, Thomas Anderson, Arvind Krishnamurthy | In this work, we design and evaluate PoiRoot, a real-time system that allows a provider to accurately isolate the root cause (the network responsible) of path changes affecting its prefixes. |
18 | Verifiable auctions for online ad exchanges | Sebastian Angel, Michael Walfish | VEX introduces a technique for efficient, privacy-preserving integer comparisons; couples these with careful protocol design; and adds little latency and tolerable overhead. |
19 | Ananta: cloud scale load balancing | Parveen Patel, Deepak Bansal, Lihua Yuan, Ashwin Murthy, Albert Greenberg, David A. Maltz, Randy Kern, Hemant Kumar, Marios Zikos, Hongyu Wu, Changhoon Kim, Naveen Karri | In this paper, we describe the requirements of a cloud-scale load balancer, the design of Ananta and lessons learnt from its implementation and operation in the Windows Azure public cloud. |
20 | Speeding up distributed request-response workflows | Virajith Jalaparti, Peter Bodik, Srikanth Kandula, Ishai Menache, Mikhail Rybalkin, Chenyu Yan | We present Kwiken, a framework that takes an end-to-end view of latency improvements and costs. |
21 | Leveraging endpoint flexibility in data-intensive clusters | Mosharaf Chowdhury, Srikanth Kandula, Ion Stoica | In this paper, we focus on leveraging the flexibility in replica placement during writes to cluster file systems (CFSes), which account for almost half of all cross-rack traffic in data-intensive clusters. |
22 | A provider-side view of web search response time | Yingying Chen, Ratul Mahajan, Baskar Sridharan, Zhi-Li Zhang | Using a large Web search service as a case study, we highlight the challenges that modern Web services face in understanding and diagnosing the response time experienced by users. |
23 | Trinocular: understanding internet reliability through adaptive probing | Lin Quan, John Heidemann, Yuri Pradkin | We describe Trinocular, an outage detection system that uses active probing to understand reliability of edge networks. |
24 | An empirical reexamination of global DNS behavior | Hongyu Gao, Vinod Yegneswaran, Yan Chen, Phillip Porras, Shalini Ghosh, Jian Jiang, Haixin Duan | In this paper, we present measurement results from a unique dataset containing more than 26 billion DNS query-response pairs collected from more than 600 globally distributed recursive DNS resolvers. |
25 | Mosaic: quantifying privacy leakage in mobile networks | Ning Xia, Han Hee Song, Yong Liao, Marios Iliofotou, Antonio Nucci, Zhi-Li Zhang, Aleksandar Kuzmanovic | To demonstrate its feasibility, we develop the Tessellation methodology. |
26 | Expressive privacy control with pseudonyms | Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter, Thomas Anderson, Arvind Krishnamurthy, David Wetherall | Instead, our goal is to provide users with more control over linkability—which activites of the user can be correlated at the remote services—not necessarily more anonymity. |
27 | Towards efficient traffic-analysis resistant anonymity networks | Stevens Le Blond, David Choffnes, Wenxuan Zhou, Peter Druschel, Hitesh Ballani, Paul Francis | In this paper, we present the design, implementation, and evaluation of Aqua, a high-bandwidth anonymity system that resists traffic analysis. |
28 | SplitX: high-performance private analytics | Ruichuan Chen, Istemi Ekin Akkus, Paul Francis | This paper presents SplitX, a high-performance analytics system for making differentially private queries over distributed user data. |
29 | Participatory networking: an API for application control of SDNs | Andrew D. Ferguson, Arjun Guha, Chen Liang, Rodrigo Fonseca, Shriram Krishnamurthi | We present the design, implementation, and evaluation of an API for applications to control a software-defined network (SDN). |
30 | Developing a predictive model of quality of experience for internet video | Athula Balachandran, Vyas Sekar, Aditya Akella, Srinivasan Seshan, Ion Stoica, Hui Zhang | The goal of this paper is to develop a predictive model of Internet video QoE. |
31 | ElasticSwitch: practical work-conserving bandwidth guarantees for cloud computing | Lucian Popa, Praveen Yalagandula, Sujata Banerjee, Jeffrey C. Mogul, Yoshio Turner, Jose Renato Santos | In this paper, we propose ElasticSwitch, an efficient and practical approach for providing bandwidth guarantees. |
32 | An in-depth study of LTE: effect of network protocol and application behavior on performance | Junxian Huang, Feng Qian, Yihua Guo, Yuanyuan Zhou, Qiang Xu, Z. Morley Mao, Subhabrata Sen, Oliver Spatscheck | In this work, we conduct an in-depth study of these interactions and their impact on performance, using a combination of active and passive measurements. |
33 | Full duplex radios | Dinesh Bharadia, Emily McMilin, Sachin Katti | This paper presents the design and implementation of the first in-band full duplex WiFi radios that can simultaneously transmit and receive on the same channel using standard WiFi 802.11ac PHYs and achieves close to the theoretical doubling of throughput in all practical deployment scenarios. |
34 | Bringing cross-layer MIMO to today’s wireless LANs | Swarun Kumar, Diego Cifuentes, Shyamnath Gollakota, Dina Katabi | We present OpenRF, a cross-layer architecture for managing MIMO signal processing. |
35 | BigStation: enabling scalable real-time signal processingin large mu-mimo systems | Qing Yang, Xiaoxiao Li, Hongyi Yao, Ji Fang, Kun Tan, Wenjun Hu, Jiansong Zhang, Yongguang Zhang | This paper presents BigStation, a scalable architecture that enables realtime signal processing in large-scale MIMO systems which may have tens or hundreds of antennas. |
36 | zUpdate: updating data center networks with zero loss | Hongqiang Harry Liu, Xin Wu, Ming Zhang, Lihua Yuan, Roger Wattenhofer, David Maltz | We present one primitive, zUpdate, to perform congestion-free network updates under asynchronous switch and traffic matrix changes. |
37 | Got loss? Get zOVN! | Daniel Crisan, Robert Birke, Gilles Cressier, Cyriel Minkenberg, Mitch Gusat | We describe its architecture and detail the design of its key component, the zVALE lossless virtual switch. |
38 | pFabric: minimal near-optimal datacenter transport | Mohammad Alizadeh, Shuang Yang, Milad Sharif, Sachin Katti, Nick McKeown, Balaji Prabhakar, Scott Shenker | In this paper we present pFabric, a minimalistic datacenter transport design that provides near theoretically optimal flow completion times even at the 99th percentile for short flows, while still minimizing average flow completion time for long flows. |
39 | Integrating microsecond circuit switching into the data center | George Porter, Richard Strong, Nathan Farrington, Alex Forencich, Pang Chen-Sun, Tajana Rosing, Yeshaiahu Fainman, George Papen, Amin Vahdat | In this paper, we design and implement an OCS prototype capable of switching in 11.5 us, and we use this prototype to expose a set of challenges that arise when supporting switching at microsecond time scales. |
40 | Dispatch: secure, resilient mobile reporting | Kanak Biscuitwala, Willem Bult, Mathias Lécuyer, T.J. Purtell, Madeline K.B. Ross, Augustin Chaintreau, Chris Haseman, Monica S. Lam, Susan E. McGregor | Dispatch: secure, resilient mobile reporting |
41 | Contextualized information-centric home network | Trisha Biswas, Asit Chakraborti, Ravishankar Ravindran, Xinwen Zhang, Guoqiang Wang | We develop a prototype and demonstrate several desirable features of ICN for homenets such as contextual service publishing and subscription, zero-configuration based node and service discovery, policy based routing and forwarding with name-based firewall, and device-to-device communication. |
42 | Locating using prior information: wireless indoor localization algorithm | Yuanfang Chen, Noel Crespi, Lin Lv, Mingchu Li, Antonio M. Ortiz, Lei Shu | In this study, we investigate the characteristics of RSS (e.g., how the RSS values change as time goes on and between consecutive positions?) |
43 | AutoEmbed: automated multi-provider virtual network embedding | David Dietrich, Amr Rizk, Panagiotis Papadimitriou | We present AutoEmbed, a fully-automated framework for VN embedding across multiple substrate networks. |
44 | Design and implementation of a framework for software-defined middlebox networking | Aaron Gember, Robert Grandl, Junaid Khalid, Aditya Akella | Design and implementation of a framework for software-defined middlebox networking |
45 | An evaluation testbed for adaptive, topology-aware deployment of elastic applications | Matthias Keller, Christoph Robbert, Manuel Peuster | An evaluation testbed for adaptive, topology-aware deployment of elastic applications |
46 | Automated configuration and measurement of emulated networks with AutoNetkit | Simon Knight | Automated configuration and measurement of emulated networks with AutoNetkit |
47 | Incremental SDN deployment in enterprise networks | Dan Levin, Marco Canini, Stefan Schmid, Anja Feldmann | Incremental SDN deployment in enterprise networks |
48 | Seamless interworking of SDN and IP | Pingping Lin, Jonathan Hart, Umesh Krishnaswamy, Tetsuya Murakami, Masayoshi Kobayashi, Ali Al-Shabibi, Kuang-Ching Wang, Jun Bi | Seamless interworking of SDN and IP |
49 | Qphone: a quantum security VoIP phone | Bo Liu, Baokang Zhao, Ziling Wei, Chunqing Wu, Jinshu Su, Wanrong Yu, Fei Wang, Shihai Sun | This work presents a novel quantum security VoIP phone, called Qphone. |
50 | Security risks evaluation toolbox for smart grid devices | Yang Liu, Jiahe Liu, Ting Liu, Xiaohong Guan, Yanan Sun | Security risks evaluation toolbox for smart grid devices |
51 | A large-scale multipath playground for experimenters and early adopters | Felicián Németh, Balázs Sonkoly, Levente Csikor, András Gulyás | Here, we demonstrate a large-scale multipath playground deployed on PlanetLab Europe, which can be used either by experimenters and researchers to test and verify their multipath-related ideas (e.g. enhancing congestion control, fairness or even the arrangement of multiple paths) and also by early adopters to enhance their Internet connection even if single-homed. |
52 | D-tunes: self tuning datastores for geo-distributed interactive applications | Shankaranarayanan P N, Ashiwan Sivakumar, Sanjay Rao, Mohit Tawarmalani | In this work, we adopt a systematic approach where we develop analytical models that capture the performance of a datastore based on application workload and build a system that can automatically configure the datastore for optimal performance. |
53 | Whole-home gesture recognition using wireless signals (demo) | Qifan Pu, Siyu Jiang, Shyamnath Gollakota | We integrate WiSee with applications and demonstrate how WiSee enables users to use gestures and control applications including music players and gaming systems. |
54 | Application-awareness in SDN | Zafar Ayyub Qazi, Jeongkeun Lee, Tao Jin, Gowtham Bellala, Manfred Arndt, Guevara Noubir | We present a framework, Atlas, which incorporates application-awareness into Software-Defined Networking (SDN), which is currently capable of L2/3/4-based policy enforcement but agnostic to higher layers. |
55 | On HTTP live streaming in large enterprises | Roberto Roverso, Sameh El-Ansary, Mikael Högqvist | In this work, we present a distributed caching solution which addresses the problem of efficient delivery of HTTP live streams in large private networks. |
56 | Automatic configuration of routing control platforms in OpenFlow networks | Sachin Sharma, Dimitri Staessens, Didier Colle, Mario Pickavet, Piet Demeester | We propose and demonstrate a framework that can automatically configure RouteFlow. |
57 | HomeLab: a platform for conducting experiments with connected devices in the home | Rayman Preet Singh, A.J. Bernheim Brush, Evgeni Filippov, Danny Huang, Ratul Mahajan, Khurshed Mazhar, Amar Phanishayee, Arjmand Samuel | HomeLab: a platform for conducting experiments with connected devices in the home |
58 | Named data networking on a router: forwarding at 20gbps and beyond | Won So, Ashok Narayanan, David Oran, Mark Stapp | We have designed and implemented an NDN data plane with a software forwarding engine on an Intel Xeon-based line card in a Cisco ASR9000 router. |
59 | OMware: an open measurement ware for stable residential broadband measurement | Lei Xue, Ricky K.P. Mok, Rocky K.C. Chang | In this poster, we propose a network measurement ware, OMware, to increase the stability of residential broadband measurement. |
60 | Cloud3DView: an interactive tool for cloud data center operations | Jianxiong Yin, Peng Sun, Yonggang Wen, Haigang Gong, Ming Liu, Xuelong Li, Haipeng You, Jinqi Gao, Cynthia Lin | In particular, we apply data visualization techniques to overlay operational status upon a data center 3D model, allowing the operators to monitor the real-time situation and control the data center from a friendly user interface. |
61 | To 4,000 compute nodes and beyond: network-aware vertex placement in large-scale graph processing systems | Karim Awara, Hani Jamjoom, Panos Kanlis | This poster describes our ongoing work in characterizing and minimizing the communication cost of Bulk Synchronous Parallel (BSP) graph mining systems, like Pregel, when scaling to 4,096 compute nodes. |
62 | Don’t drop, detour! | Matt Calder, Rui Miao, Kyriakos Zarifis, Ethan Katz-Bassett, Minlan Yu, Jitendra Padhye | We present detour-induced buffer sharing (DIBS), a mechanism that achieves a near lossless network without requiring additional buffers. |
63 | Harnessing receive diversity in distributed multi-user MIMO networks | Bo-Si Chen, Kate Ching-Ju Lin, Hung-Yu Wei | We introduce Multiplex-Diversity Medium Access (MDMA), a MU-MIMO MAC protocol that achieves both the multiplex gain and the receive diversity gain at the same time. |
64 | R2D2: bufferless, switchless data center networks using commodity ethernet hardware | Matthew P. Grosvenor, Malte Schwarzkopf, Andrew W. Moore | R2D2: bufferless, switchless data center networks using commodity ethernet hardware |
65 | Smart in-network deduplication for storage-aware SDN | Yu Hua, Xue Liu, Dan Feng | In order to efficiently handle the rapid growth of data and reduce the overhead of network transmission, we propose an in-network deduplication for storage-aware Software Defined Network (SDN), called SMIND. |
66 | The architecture and traffic management of wireless collaborated hybrid data center network | He Huang, Xiangke Liao, Shanshan Li, Shaoliang Peng, Xiaodong Liu, Bin Lin | This paper introduces a novel wireless collaborated hybrid data center architecture called RF-HYBRID that could optimize the effect of wireless transmission while reduce the complexity of wired network. |
67 | Toward content-centric privacy in ICN: attribute-based encryption and routing | Mihaela Ion, Jianqing Zhang, Eve M. Schooler | We design a content-centric privacy scheme for Information-Centric Networking (ICN). |
68 | Interest set mechanism to improve the transport of named data networking | Xiaoke Jiang, Jun Bi | In this paper, we proposal an Interest Set mechanism which aggregate similar Interest packets from same flow to one packet to improve the efficient of transport of NDN. |
69 | M2cloud: software defined multi-site data center network control framework for multi-tenant | Zhongjin Liu, Yong Li, Li Su, Depeng Jin, Lieguang Zeng | To address this, we propose M2cloud, a software defined framework providing scalable network control for multi-site data centers (DCs). |
70 | Supporting application-specific in-network processing in data centres | Luo Mai, Lukas Rupprecht, Paolo Costa, Matteo Migliavacca, Peter Pietzuch, Alexander L. Wolf | Supporting application-specific in-network processing in data centres |
71 | In-network caching assisted wireless AP storage management: challenges and algorithms | Zhongxing Ming, Mingwei Xu, Dan Wang | The goal of this paper is to improve wireless AP caching by leveraging in-network caching. |
72 | Using DAIM as a reactive interpreter for openflow networks to enable autonomic functionality | Pakawat Pupatwibul, Ameen Banjar, Robin Braun | We evaluate the number of approaches to solve these limitations, and propose DAIM model (Distributed Active information Model) which can be integrated into the OpenFlow structure at the level of the switches to provide a reactive interpreter that will manage the flow tables autonomically. |
73 | Characterizing correlated latency anomalies in broadband access networks | Swati Roy, Nick Feamster | In this work, we provide an preliminary glimpse into these sudden latency increases and attempt to understand their causes. |
74 | A (not) NICE way to verify the openflow switch specification: formal modelling of the openflow switch using alloy | Natali Ruchansky, Davide Proserpio | A (not) NICE way to verify the openflow switch specification: formal modelling of the openflow switch using alloy |
75 | An empirical study of analog channel feedback | Wei-Liang Shen, Kate Ching-Ju Lin, Ming-Syan Chen | An empirical study of analog channel feedback |
76 | Towards fast regular expression matching in practice | Kai Wang, Jun Li | Towards fast regular expression matching in practice |
77 | Cooperation policies for efficient in-network caching | Liang Wang, Suzan Bayhan, Jussi Kangasharju | In this paper we model cache cooperation under a game theoretical framework and show how cache cooperation policy can allow the system to converge to a Pareto optimal configuration. |
78 | Collaborative caching based on hash-routing for information-centric networking | Sen Wang, Jun Bi, Jianping Wu | Collaborative caching based on hash-routing for information-centric networking |
79 | Characterizing and detecting malicious crowdsourcing | Tianyi Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao | In this work, we leverage access to two large crowdturfing sites to gather a large corpus of ground-truth data generated by crowdturfing campaigns. |
80 | Replication free rule grouping for packet classification | Xiang Wang, Chang Chen, Jun Li | This work proposes a novel rule grouping algorithm without any replication. |
81 | Which flows are hiding behind my wildcard rule?: adding packet sampling to openflow | Philip Wette, Holger Karl | To find out about these individual flows we propose an extension to the current OpenFlow standard to enable packet sampling of wildcard flow entries. |
82 | The contagion of malicious behaviors in online games | Jiyoung Woo, Ah Reum Kang, Huy Kang Kim | This article investigates whether individual users are more likely to display malicious behavior after receiving social reinforcement from friends in their online social networks. |
83 | CSPAN: cost-effective geo-replicated storage spanning multiple cloud services | Zhe Wu, Michael Butkiewicz, Dorian Perkins, Ethan Katz-Bassett, Harsha V. Madhyastha | In our work, we propose the CSPAN key-value store to instead export a unified view of storage services in several geographically distributed data centers. |
84 | A software defined approach to unified IPv6 transition | Wenfeng Xia, Tina Tsou, Diego R. Lopez, Qiong Sun, Felix Lu, Haiyong Xie | Recognizing these difficulties, we propose an software defined approach to unifying the deployment of IPv6 in a cost-effective, flexible manner. |
85 | OpenRAN: a software-defined ran architecture via virtualization | Mao Yang, Yong Li, Depeng Jin, Li Su, Shaowu Ma, Lieguang Zeng | We propose OpenRAN, an architecture for software-defined RAN via virtualization. |
86 | Exponential quantization: user-centric rate control for skype calls | Yu-Chuan Yen, Cing-Yu Chu, Chien-Nan Chen, Su-Ling Yeh, Hao-Hua Chu, Polly Huang | This study proposes a rate control mechanism for Skype calls that satisfies more users and satisfies users more than the greedy-naïve mechanism, as well as the mechanism implemented in Skype. |
87 | Making intra-domain traffic engineering resistant to failures | Baobao Zhang, Jun Bi, Jianping Wu | Making intra-domain traffic engineering resistant to failures |
88 | Greedy forwarding for mobile social networks embedded in hyperbolic spaces | Jingwei Zhang | In this work, we design and evaluate a novel greedy forwarding algorithm using metrics in hyperbolic spaces. |
89 | The effectiveness of time dependent pricing in controlling usage incentives in wireless data network | Liang Zhang, Weijie Wu, Dan Wang | The effectiveness of time dependent pricing in controlling usage incentives in wireless data network |
90 | Topology-aware content-centric networking | Xinggong Zhang, Tong Niu, Feng Lao, Zongming Guo | In this paper, we propose a topology-aware name-based routing protocol which combines the benefits of location-oriented routing and content-centric routing together. |