


default search action
9. CoNEXT 2013: Santa Barbara, CA, USA
- Kevin C. Almeroth, Laurent Mathy, Konstantina Papagiannaki, Vishal Misra:

Conference on emerging Networking Experiments and Technologies, CoNEXT '13, Santa Barbara, CA, USA, December 9-12, 2013. ACM 2013, ISBN 978-1-4503-2101-3
Main street, wall street
- Jakub Mikians, László Gyarmati, Vijay Erramilli, Nikolaos Laoutaris

:
Crowd-assisted search for price discrimination in e-commerce: first results. 1-6 - Ioana Livadariu, Ahmed Elmokashfi, Amogh Dhamdhere, K. C. Claffy

:
A first look at IPv4 transfer markets. 7-12
Not hardware networking
- Nanxi Kang, Zhenming Liu, Jennifer Rexford

, David Walker
:
Optimizing the "one big switch" abstraction in software-defined networks. 13-24 - Ying Zhang:

An adaptive flow counting method for anomaly detection in SDN. 25-30 - Vijay Sivaraman, Tim Moors, Hassan Habibi Gharakheili

, Dennis Ong, John Matthews, Craig Russell:
Virtualizing the access network via open APIs. 31-42 - Gregory Lauer, Ryan Irwin, Chris Kappler, Itaru Nishioka:

Distributed resource control using shadowed subgraphs. 43-48
The roads taken, in a data center
- Jiaxin Cao, Rui Xia, Pengkun Yang, Chuanxiong Guo

, Guohan Lu, Lihua Yuan, Yixin Zheng, Haitao Wu, Yongqiang Xiong, David A. Maltz:
Per-packet load-balanced, low-latency routing for clos-based data center networks. 49-60 - Xiaozhou Li, Michael J. Freedman:

Scaling IP multicast on datacenter topologies. 61-72 - Yu Cao, Mingwei Xu, Xiaoming Fu

, Enhuan Dong:
Explicit multipath congestion control for data center networks. 73-84 - Meg Walraed-Sullivan, Amin Vahdat, Keith Marzullo:

Aspen trees: balancing data center fault tolerance, scalability and cost. 85-96
Moving packets
- Dong Zhou, Bin Fan, Hyeontaek Lim, Michael Kaminsky, David G. Andersen:

Scalable, high performance ethernet forwarding with CuckooSwitch. 97-108 - Kok-Kiong Yap, Te-Yuan Huang, Yiannis Yiakoumis, Sandeep Chinchali, Nick McKeown, Sachin Katti:

Scheduling packets over multiple interfaces while respecting user preferences. 109-120 - Animesh Trivedi, Bernard Metzler, Patrick Stuedi, Thomas R. Gross:

On limitations of network acceleration. 121-126 - Mahdi Asadpour, Domenico Giustiniano

, Karin Anna Hummel
, Simon Heimlicher, Simon Egli:
Now or later?: delaying data transfer in time-critical aerial communication. 127-132
Trains, lanes and autobalancing
- Rishi Kapoor, Alex C. Snoeren, Geoffrey M. Voelker, George Porter:

Bullet trains: a study of NIC burst behavior at microsecond timescales. 133-138 - Radhika Niranjan Mysore, George Porter, Amin Vahdat:

FasTrak: enabling express lanes in multi-tenant data centers. 139-150 - Siddhartha Sen, David Shue, Sunghwan Ihm, Michael J. Freedman:

Scalable, optimal flow routing in datacenters via local link balancing. 151-162
Less wires, more movement
- Xin Jin, Li Erran Li, Laurent Vanbever, Jennifer Rexford

:
SoftCell: scalable and flexible cellular core network architecture. 163-174 - Ajay Mahimkar, Zihui Ge, Jennifer Yates, Chris Hristov, Vincent Cordaro, Shane Smith, Jing Xu, Mark Stockert:

Robust assessment of changes in cellular networks. 175-186 - Claudio Rossi

, Narseo Vallina-Rodriguez
, Vijay Erramilli, Yan Grunenberger, László Gyarmati, Nikolaos Laoutaris
, Rade Stanojevic, Konstantina Papagiannaki, Pablo Rodriguez:
3GOL: power-boosting ADSL using 3G onloading. 187-198 - Ashish Patro, Shravan K. Rayanchu, Michael Griepentrog, Yadi Ma, Suman Banerjee:

Capturing mobile experience in the wild: a tale of two apps. 199-210 - Feng Qian, Subhabrata Sen, Oliver Spatscheck:

Silent TCP connection closure for cellular networks. 211-216
Tools
- Hajime Tazaki

, Frédéric Urbani, Emilio Mancini, Mathieu Lacage, Daniel Câmara, Thierry Turletti, Walid Dabbous:
Direct code execution: revisiting library OS architecture for reproducible network experiments. 217-228 - Pietro Marchetta, Valerio Persico

, Antonio Pescapè:
Pythia: yet another active probing technique for alias resolution. 229-234 - Simon Knight, Hung X. Nguyen, Olaf Maennel

, Iain Phillips
, Nickolas J. G. Falkner, Randy Bush, Matthew Roughan
:
An automated system for emulated network experimentation. 235-246 - Vasileios Giotsas

, Shi Zhou
, Matthew J. Luckie, K. C. Claffy
:
Inferring multilateral peering. 247-258
Falling water or stata?
- Xin Sun, Geoffrey G. Xie:

Minimizing network complexity through integrated top-down design. 259-270 - Matthew K. Mukerjee, Dongsu Han

, Srinivasan Seshan
, Peter Steenkiste
:
Understanding tradeoffs in incremental deployment of new network architectures. 271-282 - Ashish Vulimiri, Philip Brighten Godfrey, Radhika Mittal

, Justine Sherry, Sylvia Ratnasamy
, Scott Shenker
:
Low latency via redundancy. 283-294 - Philipp S. Schmidt

, Theresa Enghardt
, Ramin Khalili, Anja Feldmann
:
Socket intents: leveraging application awareness for multi-access connectivity. 295-300
Keynote address
- Sachin Katti:

Full duplex radios: from impossibility to practice. 301-302
With less power, comes great algorithmics
- Jeffrey Erman, Vijay Gopalakrishnan, Rittwik Jana, K. K. Ramakrishnan

:
Towards a SPDY'ier mobile web? 303-314 - Andrius Aucinas, Narseo Vallina-Rodriguez

, Yan Grunenberger, Vijay Erramilli, Konstantina Papagiannaki, Jon Crowcroft
, David Wetherall:
Staying online while mobile: the hidden costs. 315-320 - Alessandro Finamore, Marco Mellia

, Zafar Gilani, Konstantina Papagiannaki, Vijay Erramilli, Yan Grunenberger:
Is there a case for mobile phone content pre-staging? 321-326 - Lito Kriara, Matthew Alsup, Giorgio Corbellini, Matthew S. Trotter, Joshua D. Griffin, Stefan Mangold:

RFID shakables: pairing radio-frequency identification tags with the help of gesture recognition. 327-332
Moving pixels
- George Papageorgiou, John Gasparis, Srikanth V. Krishnamurthy

, Ramesh Govindan, Tom La Porta:
Resource thrifty secure mobile video transfers on open WiFi networks. 333-344 - Ashok Anand, Athula Balachandran, Aditya Akella, Vyas Sekar, Srinivasan Seshan

:
Enhancing video accessibility and availability using information-bound references. 345-356 - Junchen Jiang, Vyas Sekar, Ion Stoica, Hui Zhang:

Shedding light on the structure of internet video quality problems in the wild. 357-368 - Ahmed Elmokashfi, Eugene Myakotnykh, Jan Marius Evang, Amund Kvalbein, Tarik Cicic:

Geography matters: building an efficient transport network for a better video conferencing experience. 369-380
Moving packets farther
- Wenjie Zhou, Dong Li, Kannan Srinivasan, Prasun Sinha:

DOMINO: relative scheduling in enterprise wireless LANs. 381-392 - Christoph Paasch, Ramin Khalili, Olivier Bonaventure:

On the benefits of applying experimental design to improve multipath TCP. 393-398 - Yukihiro Nakagawa, Kazuki Hyoudou, Chunghan Lee

, Shinji Kobayashi, Osamu Shiraki, Takeshi Shimizu:
DomainFlow: practical flow management method using multiple flow tables in commodity switches. 399-404
Insecurity
- Brian Eriksson, Ramakrishnan Durairajan, Paul Barford:

RiskRoute: a framework for mitigating network outage threats. 405-416 - Soo Bum Lee, Min Suk Kang, Virgil D. Gligor:

CoDef: collaborative defense against large-scale link-flooding attacks. 417-428 - Mentari Djatmiko, Dominik Schatzmann, Xenofontas A. Dimitropoulos, Arik Friedman, Roksana Boreli:

Federated flow-based approach for privacy preserving connectivity tracking. 429-440

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














