


default search action
8. CoNEXT 2012: Nice, France
- Chadi Barakat, Renata Teixeira, K. K. Ramakrishnan, Patrick Thiran:

Conference on emerging Networking Experiments and Technologies, CoNEXT '12, Nice, France - December 10 - 13, 2012. ACM 2012, ISBN 978-1-4503-1775-7
Transport protocols
- Ramin Khalili, Nicolas Gast, Miroslav Popovic, Utkarsh Upadhyay, Jean-Yves Le Boudec:

MPTCP is not pareto-optimal: performance issues and a possible solution. 1-12 - Fahad R. Dogar, Peter Steenkiste

:
Architecting for edge diversity: supporting rich services over an unbundled transport. 13-24
Data centers
- Haitao Wu, Jiabo Ju, Guohan Lu, Chuanxiong Guo

, Yongqiang Xiong, Yongguang Zhang:
Tuning ECN for data center networks. 25-36 - Jiaxin Cao, Chuanxiong Guo

, Guohan Lu, Yongqiang Xiong, Yixin Zheng, Yongguang Zhang, Yibo Zhu, Chen Chen:
Datacast: a scalable and efficient reliable group data delivery service for data centers. 37-48 - Brent E. Stephens, Alan L. Cox, Wes Felter, Colin Dixon, John B. Carter:

PAST: scalable ethernet for data centers. 49-60
Routing and virtualization
- Luigi Rizzo

, Giuseppe Lettieri
:
VALE, a switched ethernet for virtual machines. 61-72 - Layong Luo, Gaogang Xie, Steve Uhlig

, Laurent Mathy, Kavé Salamatian
, Yingke Xie:
Towards TCAM-based scalable virtual routers. 73-84 - Xin Sun, Sanjay G. Rao, Geoffrey G. Xie:

Modeling complexity of enterprise routing design. 85-96
Video streaming
- Junchen Jiang, Vyas Sekar, Hui Zhang:

Improving fairness, efficiency, and stability in HTTP-based adaptive video streaming with FESTIVE. 97-108 - Guibin Tian, Yong Liu

:
Towards agile and smooth video adaptation in dynamic HTTP streaming. 109-120 - Jiasi Chen

, Amitabha Amitava Ghosh, Josphat Magutt, Mung Chiang:
QAVA: quota aware video adaptation. 121-132
Content distribution networks
- Wenjie Jiang, Stratis Ioannidis

, Laurent Massoulié, Fabio Picconi:
Orchestrating massively distributed CDNs. 133-144 - Minlan Yu, Wenjie Jiang, Haoyuan Li, Ion Stoica:

Tradeoffs in CDN designs for throughput oriented traffic. 145-156 - Mohammad Y. Hajjat, Shankaranarayanan P. N., David A. Maltz, Sanjay G. Rao, Kunwadee Sripanidkulchai:

Dealer: application-aware request splitting for interactive cloud applications. 157-168
Energy management for wireless
- Andres Garcia-Saavedra

, Pablo Serrano
, Albert Banchs, Giuseppe Bianchi
:
Energy consumption anatomy of 802.11 devices and its implication on modeling and design. 169-180 - Shuo Deng, Hari Balakrishnan:

Traffic-aware techniques to reduce 3G/LTE wireless energy consumption. 181-192 - Mustafa Y. Arslan, Indrajeet Singh, Shailendra Singh, Harsha V. Madhyastha, Karthikeyan Sundaresan, Srikanth V. Krishnamurthy

:
Computing while charging: building a distributed computing infrastructure using smartphones. 193-204
WiFi and MAC protocols
- Bozidar Radunovic, Ranveer Chandra, Dinan Gunawardena:

Weeble: enabling low-power nodes to coexist with high-power nodes in white space networks. 205-216 - Arpit Gupta, Jeongki Min, Injong Rhee:

WiFox: scaling WiFi performance for large audience environments. 217-228 - Giuseppe Bianchi

, Pierluigi Gallo
, Domenico Garlisi
, Fabrizio Giuliano
, Francesco Gringoli
, Ilenia Tinnirello
:
MAClets: active MAC protocols over hard-coded devices. 229-240
Network testing tools
- Hongyi Zeng, Peyman Kazemian, George Varghese, Nick McKeown:

Automatic test packet generation. 241-252 - Nikhil Handigol, Brandon Heller, Vimalkumar Jeyakumar, Bob Lantz, Nick McKeown:

Reproducible network experiments using container-based emulation. 253-264 - Maciej Kuzniar, Peter Peresíni

, Marco Canini
, Daniele Venzano, Dejan Kostic
:
A SOFT way for openflow switch interoperability testing. 265-276
Cloud computing and search engines
- Aruna Balasubramanian, Niranjan Balasubramanian, Samuel J. Huston, Donald Metzler, David Wetherall:

FindAll: a local search engine for mobile phones. 277-288 - Joshua Reich, Oren Laadan, Eli Brosh, Alex Sherman, Vishal Misra, Jason Nieh, Dan Rubenstein:

VMTorrent: scalable P2P virtual machine streaming. 289-300 - Zhi Wang, Baochun Li, Lifeng Sun, Shiqiang Yang:

Cloud-based social application deployment using local processing and global distribution. 301-312
Online social networks and privacy
- Md. Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos

:
FRAppE: detecting malicious facebook applications. 313-324 - Mainack Mondal, Bimal Viswanath, Allen Clement, Peter Druschel, Krishna P. Gummadi

, Alan Mislove, Ansley Post:
Defending against large-scale crawls in online social networks. 325-336 - Shirin Nilizadeh, Sonia Jahid, Prateek Mittal, Nikita Borisov

, Apu Kapadia:
Cachet: a decentralized architecture for privacy preserving social networking with caching. 337-348
Security
- Florian Tegeler, Xiaoming Fu

, Giovanni Vigna, Christopher Kruegel:
BotFinder: finding bots in network traffic without deep packet inspection. 349-360 - Victor Heorhiadi, Michael K. Reiter, Vyas Sekar:

New opportunities for load balancing in network-wide intrusion detection systems. 361-372

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














