


default search action
15th CoNEXT 2019: Orlando, FL, USA - Companion
- Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2019, Companion Volume, Orlando, FL, USA, December 9-12, 2019. ACM 2019, ISBN 978-1-4503-7006-6

Student Workshop
- Heesang Jin, Minkoo Kang, Gyeongsik Yang

, Chuck Yoo:
CLEO: Machine Learning for ECMP. 1-3 - Ismael Castell-Uroz

, Xavier Marrugat-Plaza, Josep Solé-Pareta
, Pere Barlet-Ros:
A first look into Alexa's interaction security. 4-6 - Shaoqing Wang, Youjian Zhao, Hui Xie:

PKN: Improving Survivability of LEO Satellite Network through Protecting Key Nodes. 7-8 - Licia Amichi, Aline Carneiro Viana

, Mark Crovella, Antonio A. F. Loureiro:
Mobility profiling: Identifying scouters in the crowd. 9-11 - Li Quan

, Qin Huang:
Transparent Coded Blockchain. 12-13 - Arnau Badia-Sampera, José Suárez-Varela

, Paul Almasan, Krzysztof Rusek
, Pere Barlet-Ros, Albert Cabellos-Aparicio:
Towards more realistic network models based on Graph Neural Networks. 14-16 - Garegin Grigoryan

, Yaoqing Liu, Minseok Kwon:
iLoad: In-network Load Balancing with Programmable Data Plane. 17-19 - Amir Varasteh, Wolfgang Kellerer

, Carmen Mas Machuca:
Network in the Air. 20-22 - Charles Shelbourne, Leonardo Linguaglossa, Aldo Lipani

, Tianzhu Zhang
, Fabien Geyer:
On the Learnability of Software Router Performance via CPU Measurements. 23-25 - A. F. M. Saniul Haq, Mahmudur Khan, Murat Yuksel:

Asynchronous LOS Discovery Algorithm for Aerial Nodes Using In-band Full-Duplex Transceivers. 26-28 - Qiang Liu, Tao Han:

When Network Slicing meets Deep Reinforcement Learning. 29-30 - Sebastian Lettner, Andreas Blenk:

Adversarial Network Algorithm Benchmarking. 31-33 - Mojtaba MalekpourShahraki, Brent E. Stephens, Balajee Vamanan:

Ward: Implementing Arbitrary Hierarchical Policies using Packet Resubmit in Programmable Switches. 34-36 - Kunal Mahajan, Saket Mahajan, Vishal Misra, Dan Rubenstein:

Exploiting content similarity to address cold start in container deployments. 37-39 - AmirHossein Seyri, Abhisek Pan, Balajee Vamanan:

Dynamically Sharing Memory between Memcached Tenants using Tingo. 40-42
Posters
- Abhishek Kulkarni, Alvin Lim:

Preliminary Study on Indoor Localization using Smartphone-Based IEEE 802.11mc. 43-44 - Jeman Park

, Manar Mohaisen
, Aziz Mohaisen
:
Investigating DNS Manipulation by Open DNS Resolvers. 45-46 - Shaoqing Wang, Youjian Zhao, Hui Xie:

Improving Survivability of LEO Satellite Network with guaranteed based approach. 47-48 - Ahmed Abusnaina, DaeHun Nyang, Murat Yuksel, Aziz Mohaisen:

Examining the Security of DDoS Detection Systems in Software Defined Networks. 49-50 - Osvaldo L. H. M. Fonseca, Ítalo Cunha, Elverton C. Fazzion, Brivaldo Junior, Ronaldo A. Ferreira, Ethan Katz-Bassett:

Tracking Down Sources of Spoofed IP Packets. 51-53 - Yusuke Koda, Jihong Park

, Mehdi Bennis
, Koji Yamamoto, Takayuki Nishio, Masahiro Morikura:
One Pixel Image and RF Signal Based Split Learning for mmWave Received Power Prediction. 54-56 - Jingcheng Zhang, Min Zha, Lehong Niu:

EBS: Electric Burst Scheduling system that supports future large bandwidth applications in scale. 57-58 - Fabricio Rodriguez

, Christian Esteve Rothenberg
, Gergely Pongrácz:
In-network P4-based Low Latency Robot Arm Control. 59-61 - Niket Agrawal

, Jan S. Rellermeyer
, Aaron Yi Ding
:
IoT Resource-aware Orchestration Framework for Edge Computing. 62-64 - Greg Cusack, Maziyar Nazari, Sepideh Goodarzy, Prerit Oberai, Eric Rozner, Eric Keller, Richard Han

:
Efficient Microservices with Elastic Containers. 65-67 - Peng Zheng, Arvind Narayanan, Zhi-Li Zhang:

Towards a Scalable, Flexible and High Performance NFV Execution Model. 68-69 - Marcelo Abranches, Eric Keller:

Stateless TCP. 70-71 - Shideh Yavary Mehr, Byrav Ramamurthy:

An SVM Based DDoS Attack Detection Method for Ryu SDN Controller. 72-73 - Shicheng Wang

, Chang Liu, Ying Liu, Guanyu Li, Menghao Zhang
, Yangyang Wang, Mingwei Xu:
Fast Multi-string Pattern Matching using PISA. 74-75 - Wendi Feng

, Zhi-Li Zhang, Chuanchang Liu, Junliang Chen:
Clé: Enhancing Security with Programmable Dataplane Enabled Hybrid SDN. 76-77 - Haibo Wu

, Jun Li, Jiang Zhi, Yongmao Ren
, Lingling Li:
A Hybrid ICN Caching Strategy Based on Region Division. 78-79 - Yu Mi, An Wang:

ML-Pushback: Machine Learning Based Pushback Defense Against DDoS. 80-81 - Giuseppe Di Lena, Andrea Tomassilli, Damien Saucez, Frédéric Giroire, Thierry Turletti, Chidung Lac:

Demo Proposal - Distrinet: a Mininet implementation for the Cloud. 82-83 - Chrysa Papagianni

, Koen De Schepper
:
PI2 for P4: An Active Queue Management Scheme for Programmable Data Planes. 84-86

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














