Paper Digest: SIGCOMM 2015 Highlights
SIGCOMM (ACM Special Interest Group on Data Communications) is one of the top data communications and networking conferences in the world.
To help the community quickly catch up on the work presented in this conference, Paper Digest Team processed all accepted papers, and generated one highlight sentence (typically the main topic) for each paper. Readers are encouraged to read these machine generated highlights / summaries to quickly get the main idea of each paper.
If you do not want to miss any interesting academic paper, you are welcome to sign up our free daily paper digest service to get updates on new papers published in your area every day. You are also welcome to follow us on Twitter and Linkedin to get updated with new conference digests.
Paper Digest Team
team@paperdigest.org
TABLE 1: SIGCOMM 2015 Papers
Title | Authors | Highlight | |
---|---|---|---|
1 | BwE: Flexible, Hierarchical Bandwidth Allocation for WAN Distributed Computing | Alok Kumar, Sushant Jain, Uday Naik, Anand Raghuraman, Nikhil Kasinadhuni, Enrique Cauich Zermeno, C. Stephen Gunn, Jing Ai, Björn Carlin, Mihai Amarandei-Stavila, Mathieu Robin, Aspi Siganporia, Stephen Stuart, Amin Vahdat | Motivated by the observation that individual flows with fixed priority may not be the ideal basis for bandwidth allocation, we present the design and implementation of Bandwidth Enforcer (BwE), a global, hierarchical bandwidth allocation infrastructure. |
2 | A Declarative and Expressive Approach to Control Forwarding Paths in Carrier-Grade Networks | Renaud Hartert, Stefano Vissicchio, Pierre Schaus, Olivier Bonaventure, Clarence Filsfils, Thomas Telkamp, Pierre Francois | We propose a solution to support those features while preserving high robustness and scalability as needed in carrier-grade networks. |
3 | PGA: Using Graphs to Express and Automatically Reconcile Network Policies | Chaithan Prakash, Jeongkeun Lee, Yoshio Turner, Joon-Myung Kang, Aditya Akella, Sujata Banerjee, Charles Clark, Yadi Ma, Puneet Sharma, Ying Zhang | We tackle the open problem of automatic, correct and fast composition of multiple independently specified network policies. |
4 | Central Control Over Distributed Routing | Stefano Vissicchio, Olivier Tilmans, Laurent Vanbever, Jennifer Rexford | In this paper, we present Fibbing, an architecture that achieves both flexibility and robustness through central control over distributed routing. |
5 | Poptrie: A Compressed Trie with Population Count for Fast and Scalable Software IP Routing Table Lookup | Hirochika Asai, Yasuhiro Ohara | We contribute by a fast and scalable software routing lookup algorithm based on a multiway trie, called Poptrie. |
6 | How to Bid the Cloud | Liang Zheng, Carlee Joe-Wong, Chee Wei Tan, Mung Chiang, Xinyu Wang | We address these questions in three steps: (1) modeling the cloud provider’s setting of the spot price and matching the model to historically offered prices, (2) deriving optimal bidding strategies for different job requirements and interruption overheads, and (3) adapting these strategies to MapReduce jobs with master and slave nodes having different interruption overheads. |
7 | Coracle: Evaluating Consensus at the Internet Edge | Heidi Howard, Jon Crowcroft | Our insight is that current consensus algorithms have significant availability issues when deployed outside the well defined context of the datacenter. |
8 | Challenging Entropy-based Anomaly Detection and Diagnosis in Cellular Networks | Pierdomenico Fiadino, Alessandro D’Alconzo, Mirko Schiavone, Pedro Casas | In this paper we challenge the applicability of entropy-based approaches for detecting and diagnosis network traffic anomalies, and claim that full statistics (i.e., empirical probability distributions) should be applied to improve the change-detection capabilities. |
9 | Toward Automated Testing of Geo-Distributed Replica Selection Algorithms | Kirill Bogdanov, Miguel Peón-Quirós, Gerald Q. Maguire, Dejan Kostić | In this work we present GeoPerf, a tool that tries to automate testing of geo-distributed replica selection algorithms. |
10 | The Internet of Names: A DNS Big Dataset | Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto, Aiko Pras | With this novel approach we aim for a quantum leap in DNS-based measurement and analysis of the Internet. |
11 | BitMiner: Bits Mining in Internet Traffic Classification | Zhenlong Yuan, Yibo Xue, Mihaela van der Schaar | In this poster, we creatively construct bit-level signatures by associating the bit-values with their bit-positions in each traffic flow. |
12 | Coarse-grained Scheduling with Software-Defined Networking Switches | Myriana Rifai, Dino Lopez-Pacheco, Guillaume Urvoy-Keller | In this work, we demonstrate that some coarse-grained scheduling mechanisms can be easily offered by SDN switches without requiring any unsupported operation in OpenFlow. |
13 | FlyCast: Free-Space Optics Accelerating Multicast Communications in Physical Layer | Jinzhen Bao, Dezun Dong, Baokang Zhao, Zhang Luo, Chunqing Wu, Zhenghu Gong | In this paper, we propose FlyCast, an architecture using the physical layer of free-space optics (FSO) to accelerate multicast communication. |
14 | Analysis of Game Bot’s Behavioral Characteristics in Social Interaction Networks of MMORPG | Seong Hoon Jeong, Ah Reum Kang, Huy Kang Kim | In collaboration with a leading online game company, NCSoft, we can observe all behaviors in a large-scale of commercialized MMORPG. |
15 | Could End System Caching and Cooperation Replace In-Network Caching in CCN? | Haibo Wu, Jun Li, Jiang Zhi | To this end, we present an End System Caching and Cooperation scheme in CCN, called ESCC to realize content distribution of CCN, without using costly in-network caching. |
16 | Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism | Mor Sides, Anat Bremler-Barr, Elisha Rosensweig | Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism |
17 | Towards the 5G Revolution: A Software Defined Network Architecture Exploiting Network Coding as a Service | Dávid Szabó, Felicián Németh, Balázs Sonkoly, András Gulyás, Frank H.P. Fitzek | In this demo we present a prototype architecture supporting such services by making use of automatically configured multipath service chains implementing network coding based transport solutions over off-the-shelf software defined networking (SDN) components. |
18 | RPKI MIRO: Monitoring and Inspection of RPKI Objects | Andreas Reuter, Matthias Wählisch, Thomas C. Schmidt | In this demo, we present RPKI MIRO, an open source software framework to monitor and inspect these RPKI objects. |
19 | WiMAC: Rapid Implementation Platform for User Definable MAC Protocols Through Separation | Simon Yau, Liang Ge, Ping-Chun Hsieh, I-Hong Hou, Shuguang Cui, P.R. Kumar, Amal Ekbal, Nikhil Kundargi | To enable quick prototyping, we employ the mechanism vs. policy separation to decompose the functionality in the MAC layer and the PHY layer. |
20 | Extreme Web Caching for Faster Web Browsing | Ali Raza, Yasir Zaki, Thomas Pötsch, Jay Chen, Lakshmi Subramanian | In this demo, we present Extreme Cache, a web caching architecture that enhances the web browsing experience through a smart pre-fetching engine. |
21 | i-tee: A fully automated Cyber Defense Competition for Students | Margus Ernits, Johannes Tammekänd, Olaf Maennel | We present an Intelligent Training Exercise Environment (i-tee), a fully automated Cyber Defense Competition platform. |
22 | See How ISPs Care: An RPKI Validation Extension for Web Browsers | Matthias Wählisch, Thomas C. Schmidt | In this demo, we present a software extension which performs prefix origin validation in the web browser of end users. |
23 | Programming the Home and Enterprise WiFi with OpenSDWN | Julius Schulz-Zander, Carlos Mayer, Bogdan Ciobotaru, Stefan Schmid, Anja Feldmann, Roberto Riggio | In this paper, we present and evaluate OpenSDWN, a novel WiFi architecture based on an SDN/NFV approach. |
24 | A Real-time 802.11 Compatible Distributed MIMO System | Ezzeldin Hamed, Hariharan Rahul, Mohammed A. Abdelghany, Dina Katabi | We present a demonstration of a real-time distributed MIMO system, DMIMO. |
25 | Sub-Nanosecond Time of Flight on Commercial Wi-Fi Cards | Deepak Vasisht, Swarun Kumar, Dina Katabi | In this demo, we will present Chronos, a system that combines a set of novel algorithms to measure the time-of-flight to sub-nanosecond accuracy on commercial Wi-Fi cards. |
26 | Inside the Social Network’s (Datacenter) Network | Arjun Roy, Hongyi Zeng, Jasmeet Bagga, George Porter, Alex C. Snoeren | In this work, we report upon the network traffic observed in some of Facebook’s datacenters. |
27 | Pingmesh: A Large-Scale System for Data Center Network Latency Measurement and Analysis | Chuanxiong Guo, Lihua Yuan, Dong Xiang, Yingnong Dang, Ray Huang, Dave Maltz, Zhaoyi Liu, Vin Wang, Bin Pang, Hua Chen, Zhi-Wei Lin, Varugis Kurien | We have developed the Pingmesh system for large-scale data center network latency measurement and analysis to answer the above question affirmatively. |
28 | Large-scale Measurements of Wireless Network Behavior | Sanjit Biswas, John Bicket, Edmund Wong, Raluca Musaloiu-E, Apurv Bhartia, Dan Aguayo | This paper observes the following phenomena: wireless network usage continues to grow quickly, driven most by growth in the number of devices connecting to each network. |
29 | End-User Mapping: Next Generation Request Routing for Content Delivery | Fangfei Chen, Ramesh K. Sitaraman, Marcelo Torres | Using measurements from Akamai’s production network during the roll-out, we show that end-user mapping provides significant performance benefits for clients who use public resolvers, including an eight-fold decrease in mapping distance, a two-fold decrease in RTT and content download time, and a 30% improvement in the time-to-first byte. |
30 | Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google’s Datacenter Network | Arjun Singh, Joon Ong, Amit Agarwal, Glen Anderson, Ashby Armistead, Roy Bannon, Seb Boving, Gaurav Desai, Bob Felderman, Paulie Germano, Anand Kanagala, Jeff Provost, Jason Simmons, Eiichi Tanda, Jim Wanderer, Urs Hölzle, Stephen Stuart, Amin Vahdat | We present our approach for overcoming the cost, operational complexity, and limited scale endemic to datacenter networks a decade ago. |
31 | Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS | David Naylor, Kyle Schomp, Matteo Varvello, Ilias Leontiadis, Jeremy Blackburn, Diego R. López, Konstantina Papagiannaki, Pablo Rodriguez Rodriguez, Peter Steenkiste | In this paper we introduce multi-context TLS (mcTLS), which extends TLS to support middleboxes. |
32 | BlindBox: Deep Packet Inspection over Encrypted Traffic | Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy | We propose BlindBox, the first system that simultaneously provides {\em both} of these properties. |
33 | Rollback-Recovery for Middleboxes | Justine Sherry, Peter Xiang Gao, Soumya Basu, Aurojit Panda, Arvind Krishnamurthy, Christian Maciocco, Maziar Manesh, João Martins, Sylvia Ratnasamy, Luigi Rizzo, Scott Shenker | We present a new design for fault-tolerance in middleboxes that achieves these three goals. |
34 | Scaling Up Clustered Network Appliances with ScaleBricks | Dong Zhou, Bin Fan, Hyeontaek Lim, David G. Andersen, Michael Kaminsky, Michael Mitzenmacher, Ren Wang, Ajaypal Singh | This paper presents ScaleBricks, a new design for building scalable, clustered network appliances that must "pin" flow state to a specific handling node without being able to choose which node that should be. |
35 | Laissez-Faire: Fully Asymmetric Backscatter Communication | Pan Hu, Pengyu Zhang, Deepak Ganesan | In this paper, we present a new {\em fully asymmetric} backscatter communication protocol where nodes blindly transmit data as and when they sense. |
36 | SpotFi: Decimeter Level Localization Using WiFi | Manikanta Kotaru, Kiran Joshi, Dinesh Bharadia, Sachin Katti | This paper presents the design and implementation of SpotFi, an accurate indoor localization system that can be deployed on commodity WiFi infrastructure. |
37 | BackFi: High Throughput WiFi Backscatter | Dinesh Bharadia, Kiran Raj Joshi, Manikanta Kotaru, Sachin Katti | We present BackFi, a novel communication system that enables high throughput, long range communication between very low power backscatter devices and WiFi APs using ambient WiFi transmissions as the excitation signal. |
38 | Caraoke: An E-Toll Transponder Network for Smart Cities | Omid Abari, Deepak Vasisht, Dina Katabi, Anantha Chandrakasan | This paper presents Caraoke, a networked system for delivering smart services using e-toll transponders. |
39 | Practical, Real-time Centralized Control for CDN-based Live Video Delivery | Matthew K. Mukerjee, David Naylor, Junchen Jiang, Dongsu Han, Srinivasan Seshan, Hui Zhang | We introduce VDN, a practical approach to a video delivery network that uses a centralized algorithm for live video optimization. |
40 | A Control-Theoretic Approach for Dynamic Adaptive Video Streaming over HTTP | Xiaoqi Yin, Abhishek Jindal, Vyas Sekar, Bruno Sinopoli | Previous studies have shown key limitations of state-of-art commercial solutions and proposed a range of heuristic fixes. |
41 | BitCuts: Towards Fast Packet Classification for Order-Independent Rules | Zhi Liu, Xiang Wang, Baohua Yang, Jun Li | BitCuts: Towards Fast Packet Classification for Order-Independent Rules |
42 | Supercharge me: Boost Router Convergence with SDN | Michael Alan Chang, Thomas Holterbach, Markus Happe, Laurent Vanbever | In this abstract, we supercharge one particular aspect of the router performance: its convergence time after a link or a node failure. |
43 | Towards Scalable SDN Switches: Enabling Faster Flow Table Entries Installation | Roberto Bifulco, Anton Matsiuk | Towards Scalable SDN Switches: Enabling Faster Flow Table Entries Installation |
44 | Sampling and Large Flow Detection in SDN | Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schiff | Sampling and Large Flow Detection in SDN |
45 | On the Optimization of Request Routing for Content Delivery | Walid Benchaita, Samir Ghamri-Doudane, Sébastien Tixeuil | We present a flexible scheme and an optimization algorithm for request routing in Content Delivery Networks (CDN). |
46 | Short vs. Long Flows: A Battle That Both Can Win | Morteza Kheirkhah, Ian Wakeman, George Parisis | In this paper, we introduce MMPTCP, a novel transport protocol which aims at unifying the way data is transported in data centres. |
47 | Extreme Data-rate Scheduling for the Data Center | Neelakandan Manihatty Bojan, Noa Zilberman, Gianni Antichi, Andrew W. Moore | In this paper we propose a framework that can be used to explore and evaluate hardware based hybrid schedulers. |
48 | Alternative Trust Sources: Reducing DNSSEC Signature Verification Operations with TLS | Sean Donovan, Nick Feamster | We pose the question: is it possible to achieve practical security without always verifying this certificate chain if we use a different, outside source of trust between resolvers? |
49 | A Case for a Stateful Middlebox Networking Stack | Muhammad A. Jamshed, Donghwi Kim, YoungGyoun Moon, Dongsu Han, KyoungSoo Park | A Case for a Stateful Middlebox Networking Stack |
50 | FreeSurf: Application-Centric Wireless Access with SDN | Zhen Cao, Jürgen Fitschen, Panagiotis Papadimitriou | FreeSurf: Application-Centric Wireless Access with SDN |
51 | EPOXIDE: A Modular Prototype for SDN Troubleshooting | Tamás Lévai, István Pelle, Felicián Németh, András Gulyás | In this demonstration we present EPOXIDE, an Emacs based modular framework, which can effectively combine existing network and software troubleshooting tools in a single platform and defines a possible way of integrated SDN troubleshooting. |
52 | nf.io: A File System Abstraction for NFV Orchestration | Md. Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, Raouf Boutaba | nf.io: A File System Abstraction for NFV Orchestration |
53 | NetFPGA: Rapid Prototyping of Networking Devices in Open Source | Noa Zilberman, Yury Audzevich, Georgina Kalogeridou, Neelakandan Manihatty-Bojan, Jingyun Zhang, Andrew Moore | We demonstrate NetFPGA, an open-source platform for rapid prototyping of networking devices with I/O capabilities up to 100Gbps. |
54 | A Mininet-based Virtual Testbed for Distributed SDN Development | Bob Lantz, Brian O’Connor | We demonstrate a simpler and more efficient approach: using Mininet’s cluster mode to easily deploy a virtual testbed of lightweight containers on a single machine, an ad hoc cluster, or a dedicated hardware testbed. |
55 | A High-Radix, Low-Latency Optical Switch for Data Centers | Dan Alistarh, Hitesh Ballani, Paolo Costa, Adam Funnell, Joshua Benjamin, Philip Watts, Benn Thomsen | We demonstrate an optical switch design that can scale up to a thousand ports with high per-port bandwidth (25 Gbps+) and low switching latency (40 ns). |
56 | Enabling Performance Evaluation Beyond 10 Gbps | Gianni Antichi, Charalampos Rotsos, Andrew W. Moore | Enabling Performance Evaluation Beyond 10 Gbps |
57 | Chaos Monkey: Increasing SDN Reliability through Systematic Network Destruction | Michael Alan Chang, Bredan Tschaen, Theophilus Benson, Laurent Vanbever | Chaos Monkey: Increasing SDN Reliability through Systematic Network Destruction |
58 | Network Policy Whiteboarding and Composition | Jeongkeun Lee, Joon-Myung Kang, Chaithan Prakash, Sujata Banerjee, Yoshio Turner, Aditya Akella, Charles Clark, Yadi Ma, Puneet Sharma, Ying Zhang | We present Policy Graph Abstraction (PGA) that graphically expresses network policies and service chain requirements, just as simple as drawing whiteboard diagrams. |
59 | Virtual Network Function Orchestration with Scylla | Roberto Riggio, Julius Schulz-Zander, Abbas Bradai | Virtual Network Function Orchestration with Scylla |
60 | Multi-Domain Service Orchestration Over Networks and Clouds: A Unified Approach | Balázs Sonkoly, János Czentye, Robert Szabo, Dávid Jocha, János Elek, Sahel Sahhaf, Wouter Tavernier, Fulvio Risso | We designed and implemented a joint cloud and network resource virtualization and programming API. |
61 | Hopper: Decentralized Speculation-aware Cluster Scheduling at Scale | Xiaoqi Ren, Ganesh Ananthanarayanan, Adam Wierman, Minlan Yu | In this work, we present Hopper, a job scheduler that is speculation-aware, i.e., that integrates the tradeoffs associated with speculation into job scheduling decisions. |
62 | Efficient Coflow Scheduling Without Prior Knowledge | Mosharaf Chowdhury, Ion Stoica | In this paper, we present Aalo that strikes a balance and efficiently schedules coflows without prior knowledge. |
63 | Network-Aware Scheduling for Data-Parallel Jobs: Plan When You Can | Virajith Jalaparti, Peter Bodik, Ishai Menache, Sriram Rao, Konstantin Makarychev, Matthew Caesar | With this intuition, we develop Corral, a scheduling framework that uses characteristics of future workloads to determine an offline schedule which (i) jointly places data and compute to achieve better data locality, and (ii) isolates jobs both spatially (by scheduling them in different parts of the cluster) and temporally, improving their performance. |
64 | Low Latency Geo-distributed Data Analytics | Qifan Pu, Ganesh Ananthanarayanan, Peter Bodik, Srikanth Kandula, Aditya Akella, Paramvir Bahl, Ion Stoica | We present Iridium, a system for low latency geo-distributed analytics. |
65 | Silo: Predictable Message Latency in the Cloud | Keon Jang, Justine Sherry, Hitesh Ballani, Toby Moncaster | We present Silo, a system that offers these guarantees in multi-tenant datacenters. |
66 | Condor: Better Topologies Through Declarative Design | Brandon Schlinker, Radhika Niranjan Mysore, Sean Smith, Jeffrey C. Mogul, Amin Vahdat, Minlan Yu, Ethan Katz-Bassett, Michael Rubin | We present Condor, our approach to enabling a rapid, efficient design cycle. |
67 | Presto: Edge-based Load Balancing for Fast Datacenter Networks | Keqiang He, Eric Rozner, Kanak Agarwal, Wes Felter, John Carter, Aditya Akella | We propose a mechanism that avoids these limitations by (i) pushing load-balancing functionality into the soft network edge (e.g., virtual switches) such that no changes are required in the transport layer, customer VMs, or networking hardware, and (ii) load balancing on fine-grained, near-uniform units of data (flowcells) that fit within end-host segment offload optimizations used to support fast networking speeds. |
68 | Packet-Level Telemetry in Large Datacenter Networks | Yibo Zhu, Nanxi Kang, Jiaxin Cao, Albert Greenberg, Guohan Lu, Ratul Mahajan, Dave Maltz, Lihua Yuan, Ming Zhang, Ben Y. Zhao, Haitao Zheng | We present Everflow, a packet-level network telemetry system for large DCNs. |
69 | Enabling End-Host Network Functions | Hitesh Ballani, Paolo Costa, Christos Gkantsidis, Matthew P. Grosvenor, Thomas Karagiannis, Lazaros Koromilas, Greg O’Shea | In this paper, we argue that the end hosts are a natural enforcement point for these functions and we present Eden, an architecture for implementing network functions at datacenter end hosts with minimal network support. |
70 | Adaptive Congestion Control for Unpredictable Cellular Networks | Yasir Zaki, Thomas Pötsch, Jay Chen, Lakshminarayanan Subramanian, Carmelita Görg | To cope with these challenges, we present Verus, an end-to-end congestion control protocol that uses delay measurements to react quickly to the capacity changes in cellular networks without explicitly attempting to predict the cellular channel dynamics. |
71 | Congestion Control for Large-Scale RDMA Deployments | Yibo Zhu, Haggai Eran, Daniel Firestone, Chuanxiong Guo, Marina Lipshteyn, Yehonatan Liron, Jitendra Padhye, Shachar Raindel, Mohamad Haj Yahia, Ming Zhang | To alleviates these problems, we introduce DCQCN, an end-to-end congestion control scheme for RoCEv2. |
72 | TIMELY: RTT-based Congestion Control for the Datacenter | Radhika Mittal, Vinh The Lam, Nandita Dukkipati, Emily Blem, Hassan Wassel, Monia Ghobadi, Amin Vahdat, Yaogong Wang, David Wetherall, David Zats | We show that simple packet delay, measured as round-trip times at hosts, is an effective congestion signal without the need for switch feedback. |
73 | R2C2: A Network Stack for Rack-scale Computers | Paolo Costa, Hitesh Ballani, Kaveh Razavi, Ian Kash | We introduce R2C2, a network stack for rack-scale computers that provides flexible and efficient routing and congestion control. |
74 | InterTubes: A Study of the US Long-haul Fiber-optic Infrastructure | Ramakrishnan Durairajan, Paul Barford, Joel Sommers, Walter Willinger | In this paper, we study the characteristics and implications of infrastructure sharing by analyzing the long-haul fiber-optic network in the US. |
75 | Spatiotemporal Traffic Matrix Synthesis | Paul Tune, Matthew Roughan | Our goal is to develop techniques to synthesize traffic matrices for researchers who wish to test new network applications or protocols. |
76 | Extractocol: Automatic Extraction of Application-level Protocol Behaviors for Android Applications | Hyunwoo Choi, Jeongmin Kim, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, Dongsu Han | Extractocol: Automatic Extraction of Application-level Protocol Behaviors for Android Applications |
77 | Rule-level Data Plane Monitoring With Monocle | Peter Perešíni, Maciej Kuzniar, Dejan Kostić | We present Monocle, a system that systematically monitors the network data plane, and verifies that it corresponds to the view that the SDN controller builds and tries to enforce in the switches. |
78 | Santa: Faster Packet Delivery for Commonly Wished Replies | Florian Schmidt, Oliver Hohlfeld, René Glebke, Klaus Wehrle | To mitigate this overhead, we propose Santa, an application agnostic kernel-level cache of frequent requests. |
79 | Cache’n DASH: Efficient Caching for DASH | Parikshit Juluri, Deep Medhi | In order to optimize the cache hits and minimize the misses for DASH video streaming services we propose an Adaptation Aware Cache (AAC) framework to determine the segments that are to be prefetched and retained in the cache. |
80 | FALE: Fine-grained Device Free Localization that can Adaptively work in Different Areas with Little Effort | Liqiong Chang, Xiaojiang Chen, Dingyi Fang, Ju Wang, Tianzhang Xing, Chen Liu, Zhanyong Tang | In this paper, we propose FALE, a fine-grained transferring DFL method that can adaptively work in different areas with little human effort and low energy consumption. |
81 | Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC | Tobias Markmann, Thomas C. Schmidt, Matthias Wählisch | Leveraging locally managed IPv6 addresses with identity-based cryptography (IBC), we propose an efficient end-to-end authentication that (a) assigns a robust and deployment-friendly federation scheme to gateways of IoT subnetworks, and (b) has been evaluated with a modern twisted Edwards elliptic curve cryptography (ECC). |
82 | eSDN: Rethinking Datacenter Transports Using End-Host SDN Controllers | Hasnain Ali Pirzada, Muhammad Raza Mahboob, Ihsan Ayyub Qazi | We propose eSDN; a practical approach for deploying new datacenter transports without requiring any changes to the switches. |
83 | BRB: BetteR Batch Scheduling to Reduce Tail Latencies in Cloud Data Stores | Waleed Reda, Lalith Suresh, Marco Canini, Sean Braithwaite | We address these challenges through BetteR Batch (BRB). |
84 | Design and Implementation: the Native Web Browser and Server for Content-Centric Networking | Guoshun Nan, Xiuquan Qiao, Yukai Tu, Wei Tan, Lei Guo, Junliang Chen | Existing research mainly focuses on plug-in or proxy/gateway approaches at client and server sides, and these schemes seriously impact the service performance due to multiple protocol conversions. |
85 | Alibi Routing | Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee | This paper introduces the problem of finding "proofs of avoidance": evidence that the paths taken by a packet and its response avoided a user-specified set of "forbidden" geographic regions. |
86 | ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes | Maria Konte, Roberto Perdisci, Nick Feamster | ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes |
87 | Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems | Stevens Le Blond, David Choffnes, William Caldwell, Peter Druschel, Nicholas Merritt | In this paper, we present the design, implementation, and experimental evaluation of Herd, an anonymity network where a set of dedicated, fully interconnected cloud-based proxies yield suitably low-delay circuits, while untrusted superpeers add scalability. |
88 | Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests | Sam Burnett, Nick Feamster | We present Encore, a system that harnesses cross-origin requests to measure Web filtering from a diverse set of vantage points without requiring users to install custom software, enabling longitudinal measurements from many vantage points. |