callback( { "result":{ "query":":facetid:toc:\"db/conf/conext/conext2017.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.06" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"42", "@dc":"42", "@oc":"42", "@id":"43373615", "text":":facetid:toc:db/conf/conext/conext2017.bht" } }, "hits":{ "@total":"42", "@computed":"42", "@sent":"42", "@first":"0", "hit":[{ "@score":"1", "@id":"2898357", "info":{"authors":{"author":[{"@pid":"197/7071","text":"Anubhavnidhi Abhashkumar"},{"@pid":"63/5816","text":"Joon-Myung Kang"},{"@pid":"b/SuBanerjee","text":"Sujata Banerjee"},{"@pid":"a/AdityaAkella","text":"Aditya Akella"},{"@pid":"13/6769-22","text":"Ying Zhang 0022"},{"@pid":"55/8398","text":"Wenfei Wu"}]},"title":"Supporting Diverse Dynamic Intent-based Policies using Janus.","venue":"CoNEXT","pages":"296-309","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/AbhashkumarKBAZ17","doi":"10.1145/3143361.3143380","ee":"https://doi.org/10.1145/3143361.3143380","url":"https://dblp.org/rec/conf/conext/AbhashkumarKBAZ17"}, "url":"URL#2898357" }, { "@score":"1", "@id":"2898359", "info":{"authors":{"author":{"@pid":"37/8397","text":"Mohammad Alizadeh"}},"title":"Fast and Smart Network Resource Management for Datacenters and Beyond.","venue":"CoNEXT","pages":"1","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/Alizadeh17","doi":"10.1145/3143361.3157913","ee":"https://doi.org/10.1145/3143361.3157913","url":"https://dblp.org/rec/conf/conext/Alizadeh17"}, "url":"URL#2898359" }, { "@score":"1", "@id":"2898360", "info":{"authors":{"author":[{"@pid":"122/3298","text":"Mário Almeida"},{"@pid":"09/2252","text":"Alessandro Finamore"},{"@pid":"03/3645","text":"Diego Perino"},{"@pid":"50/7563","text":"Narseo Vallina-Rodriguez"},{"@pid":"01/6280","text":"Matteo Varvello"}]},"title":"Dissecting DNS Stakeholders in Mobile Networks.","venue":"CoNEXT","pages":"28-34","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/AlmeidaFPVV17","doi":"10.1145/3143361.3143375","ee":"https://doi.org/10.1145/3143361.3143375","url":"https://dblp.org/rec/conf/conext/AlmeidaFPVV17"}, "url":"URL#2898360" }, { "@score":"1", "@id":"2898361", "info":{"authors":{"author":[{"@pid":"31/9587","text":"Azeem Aqil"},{"@pid":"08/4035","text":"Karim Khalil"},{"@pid":"133/3859","text":"Ahmed Osama Fathy Atya"},{"@pid":"48/9024","text":"Evangelos E. Papalexakis"},{"@pid":"k/SrikanthVKrishnamurthy","text":"Srikanth V. Krishnamurthy"},{"@pid":"45/576","text":"Trent Jaeger"},{"@pid":"r/KKRamakrishnan","text":"K. K. Ramakrishnan"},{"@pid":"12/6699","text":"Paul L. Yu"},{"@pid":"89/5072","text":"Ananthram Swami"}]},"title":"Jaal: Towards Network Intrusion Detection at ISP Scale.","venue":"CoNEXT","pages":"134-146","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/AqilKAPKJRYS17","doi":"10.1145/3143361.3143399","ee":"https://doi.org/10.1145/3143361.3143399","url":"https://dblp.org/rec/conf/conext/AqilKAPKJRYS17"}, "url":"URL#2898361" }, { "@score":"1", "@id":"2898362", "info":{"authors":{"author":[{"@pid":"115/5126","text":"Ghufran Baig"},{"@pid":"36/3251","text":"Dan Alistarh"},{"@pid":"76/1767","text":"Thomas Karagiannis"},{"@pid":"16/2843","text":"Bozidar Radunovic"},{"@pid":"209/2874","text":"Matthew Balkwill"},{"@pid":"54/4031","text":"Lili Qiu"}]},"title":"Towards unlicensed cellular networks in TV white spaces.","venue":"CoNEXT","pages":"2-14","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/BaigAKRBQ17","doi":"10.1145/3143361.3143367","ee":"https://doi.org/10.1145/3143361.3143367","url":"https://dblp.org/rec/conf/conext/BaigAKRBQ17"}, "url":"URL#2898362" }, { "@score":"1", "@id":"2898363", "info":{"authors":{"author":[{"@pid":"03/2050","text":"Ruichuan Chen"},{"@pid":"09/6562","text":"Istemi Ekin Akkus"},{"@pid":"24/604","text":"Bimal Viswanath"},{"@pid":"17/5202","text":"Ivica Rimac"},{"@pid":"29/1947","text":"Volker Hilt"}]},"title":"Towards Reliable Application Deployment in the Cloud.","venue":"CoNEXT","pages":"464-477","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/ChenAVRH17","doi":"10.1145/3143361.3143388","ee":"https://doi.org/10.1145/3143361.3143388","url":"https://dblp.org/rec/conf/conext/ChenAVRH17"}, "url":"URL#2898363" }, { "@score":"1", "@id":"2898364", "info":{"authors":{"author":[{"@pid":"132/8300","text":"Huan Chen"},{"@pid":"49/7538","text":"Theophilus Benson"}]},"title":"Hermes: Providing Tight Control over High-Performance SDN Switches.","venue":"CoNEXT","pages":"283-295","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/ChenB17","doi":"10.1145/3143361.3143391","ee":"https://doi.org/10.1145/3143361.3143391","url":"https://dblp.org/rec/conf/conext/ChenB17"}, "url":"URL#2898364" }, { "@score":"1", "@id":"2898366", "info":{"authors":{"author":[{"@pid":"06/4240","text":"Zhe Chen"},{"@pid":"42/1675","text":"Zhongmin Li"},{"@pid":"98/5660-21","text":"Xu Zhang 0021"},{"@pid":"167/7757","text":"Guorong Zhu"},{"@pid":"26/340","text":"Yuedong Xu"},{"@pid":"75/198-1","text":"Jie Xiong 0001"},{"@pid":"10/5630-2","text":"Xin Wang 0002"}]},"title":"AWL: Turning Spatial Aliasing From Foe to Friend for Accurate WiFi Localization.","venue":"CoNEXT","pages":"238-250","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/ChenLZZXXW17","doi":"10.1145/3143361.3143377","ee":"https://doi.org/10.1145/3143361.3143377","url":"https://dblp.org/rec/conf/conext/ChenLZZXXW17"}, "url":"URL#2898366" }, { "@score":"1", "@id":"2898367", "info":{"authors":{"author":[{"@pid":"153/5746","text":"Dongyao Chen"},{"@pid":"s/KangGShin","text":"Kang G. Shin"},{"@pid":"01/7909","text":"Yurong Jiang"},{"@pid":"10/5900","text":"Kyu-Han Kim"}]},"title":"Locating and Tracking BLE Beacons with Smartphones.","venue":"CoNEXT","pages":"263-275","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/ChenSJK17","doi":"10.1145/3143361.3143385","ee":"https://doi.org/10.1145/3143361.3143385","url":"https://dblp.org/rec/conf/conext/ChenSJK17"}, "url":"URL#2898367" }, { "@score":"1", "@id":"2898368", "info":{"authors":{"author":[{"@pid":"78/9826","text":"Marco Chiesa"},{"@pid":"148/1556","text":"Daniel Demmler"},{"@pid":"24/5715","text":"Marco Canini"},{"@pid":"15/5634","text":"Michael Schapira"},{"@pid":"06/3872-3","text":"Thomas Schneider 0003"}]},"title":"SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.","venue":"CoNEXT","pages":"120-133","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/ChiesaDCS017","doi":"10.1145/3143361.3143362","ee":"https://doi.org/10.1145/3143361.3143362","url":"https://dblp.org/rec/conf/conext/ChiesaDCS017"}, "url":"URL#2898368" }, { "@score":"1", "@id":"2898369", "info":{"authors":{"author":[{"@pid":"89/1207","text":"Junguk Cho"},{"@pid":"50/2529","text":"Hyunseok Chang"},{"@pid":"72/5978","text":"Sarit Mukherjee"},{"@pid":"43/2247","text":"T. V. Lakshman"},{"@pid":"m/JEvanderMerwe","text":"Jacobus E. van der Merwe"}]},"title":"Typhoon: An SDN Enhanced Real-Time Big Data Streaming Framework.","venue":"CoNEXT","pages":"310-322","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/ChoCMLM17","doi":"10.1145/3143361.3143398","ee":"https://doi.org/10.1145/3143361.3143398","url":"https://dblp.org/rec/conf/conext/ChoCMLM17"}, "url":"URL#2898369" }, { "@score":"1", "@id":"2898370", "info":{"authors":{"author":[{"@pid":"157/1128","text":"Shinyoung Cho"},{"@pid":"35/8412","text":"Rishab Nithyanand"},{"@pid":"149/9322","text":"Abbas Razaghpanah"},{"@pid":"52/2893","text":"Phillipa Gill"}]},"title":"A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography.","venue":"CoNEXT","pages":"81-87","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/ChoNRG17","doi":"10.1145/3143361.3143386","ee":"https://doi.org/10.1145/3143361.3143386","url":"https://dblp.org/rec/conf/conext/ChoNRG17"}, "url":"URL#2898370" }, { "@score":"1", "@id":"2898371", "info":{"authors":{"author":[{"@pid":"167/5916","text":"Quentin De Coninck"},{"@pid":"91/2043","text":"Olivier Bonaventure"}]},"title":"Multipath QUIC: Design and Evaluation.","venue":"CoNEXT","pages":"160-166","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/ConinckB17","doi":"10.1145/3143361.3143370","ee":"https://doi.org/10.1145/3143361.3143370","url":"https://dblp.org/rec/conf/conext/ConinckB17"}, "url":"URL#2898371" }, { "@score":"1", "@id":"2898373", "info":{"authors":{"author":[{"@pid":"177/2107","text":"Rajdeep Das"},{"@pid":"147/7772","text":"Nimantha Thushan Baranasuriya"},{"@pid":"p/VenkataNPadmanabhan","text":"Venkata N. Padmanabhan"},{"@pid":"40/6218","text":"Christoffer Rødbro"},{"@pid":"84/3601","text":"Seth Gilbert"}]},"title":"Informed Bandwidth Adaptation in Wi-Fi Networks using Ping-Pair.","venue":"CoNEXT","pages":"376-388","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/DasBPRG17","doi":"10.1145/3143361.3143390","ee":"https://doi.org/10.1145/3143361.3143390","url":"https://dblp.org/rec/conf/conext/DasBPRG17"}, "url":"URL#2898373" }, { "@score":"1", "@id":"2898374", "info":{"authors":{"author":[{"@pid":"209/2993","text":"Ander Galisteo"},{"@pid":"97/6505-7","text":"Qing Wang 0007"},{"@pid":"209/2895","text":"Aniruddha Deshpande"},{"@pid":"z/MarcoZuniga","text":"Marco Zuniga"},{"@pid":"07/1247","text":"Domenico Giustiniano"}]},"title":"Follow that Light: Leveraging LEDs for Relative Two-Dimensional Localization.","venue":"CoNEXT","pages":"187-198","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/GalisteoWDZG17","doi":"10.1145/3143361.3143371","ee":"https://doi.org/10.1145/3143361.3143371","url":"https://dblp.org/rec/conf/conext/GalisteoWDZG17"}, "url":"URL#2898374" }, { "@score":"1", "@id":"2898375", "info":{"authors":{"author":[{"@pid":"28/9706","text":"Rohan Gandhi"},{"@pid":"48/2092","text":"Ori Rottenstreich"},{"@pid":"68/3340-8","text":"Xin Jin 0008"}]},"title":"Catalyst: Unlocking the Power of Choice to Speed up Network Updates.","venue":"CoNEXT","pages":"276-282","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/GandhiRJ17","doi":"10.1145/3143361.3143397","ee":"https://doi.org/10.1145/3143361.3143397","url":"https://dblp.org/rec/conf/conext/GandhiRJ17"}, "url":"URL#2898375" }, { "@score":"1", "@id":"2898377", "info":{"authors":{"author":[{"@pid":"84/7357","text":"Yossi Gilad"},{"@pid":"189/1708","text":"Omar Sagga"},{"@pid":"87/2320","text":"Sharon Goldberg"}]},"title":"MaxLength Considered Harmful to the RPKI.","venue":"CoNEXT","pages":"101-107","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/GiladSG17","doi":"10.1145/3143361.3143363","ee":"https://doi.org/10.1145/3143361.3143363","url":"https://dblp.org/rec/conf/conext/GiladSG17"}, "url":"URL#2898377" }, { "@score":"1", "@id":"2898379", "info":{"authors":{"author":[{"@pid":"143/8245","text":"Shuihai Hu"},{"@pid":"65/8854","text":"Yibo Zhu"},{"@pid":"76/185-5","text":"Peng Cheng 0005"},{"@pid":"95/4962","text":"Chuanxiong Guo"},{"@pid":"42/5784","text":"Kun Tan"},{"@pid":"p/JPadhye","text":"Jitendra Padhye"},{"@pid":"c/KaiChen5","text":"Kai Chen 0005"}]},"title":"Tagger: Practical PFC Deadlock Prevention in Data Center Networks.","venue":"CoNEXT","pages":"451-463","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/HuZCGTP017","doi":"10.1145/3143361.3143382","ee":"https://doi.org/10.1145/3143361.3143382","url":"https://dblp.org/rec/conf/conext/HuZCGTP017"}, "url":"URL#2898379" }, { "@score":"1", "@id":"2898380", "info":{"authors":{"author":[{"@pid":"82/5820","text":"Akshay Jajoo"},{"@pid":"28/9706","text":"Rohan Gandhi"},{"@pid":"93/89","text":"Y. Charlie Hu"},{"@pid":"65/5850","text":"Cheng-Kok Koh"}]},"title":"Saath: Speeding up CoFlows by Exploiting the Spatial Dimension.","venue":"CoNEXT","pages":"439-450","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/JajooGHK17","doi":"10.1145/3143361.3143364","ee":"https://doi.org/10.1145/3143361.3143364","url":"https://dblp.org/rec/conf/conext/JajooGHK17"}, "url":"URL#2898380" }, { "@score":"1", "@id":"2898382", "info":{"authors":{"author":[{"@pid":"125/8691","text":"Naga Praveen Katta"},{"@pid":"190/1373","text":"Aditi Ghag"},{"@pid":"183/9612","text":"Mukesh Hira"},{"@pid":"68/2276","text":"Isaac Keslassy"},{"@pid":"56/4995","text":"Aran Bergman"},{"@pid":"55/4381","text":"Changhoon Kim"},{"@pid":"r/JenniferRexford","text":"Jennifer Rexford"}]},"title":"Clove: Congestion-Aware Load Balancing at the Virtual Edge.","venue":"CoNEXT","pages":"323-335","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/KattaGHKBKR17","doi":"10.1145/3143361.3143401","ee":"https://doi.org/10.1145/3143361.3143401","url":"https://dblp.org/rec/conf/conext/KattaGHKBKR17"}, "url":"URL#2898382" }, { "@score":"1", "@id":"2898383", "info":{"authors":{"author":[{"@pid":"162/2040","text":"Manikanta Kotaru"},{"@pid":"33/4816","text":"Pengyu Zhang"},{"@pid":"50/1133","text":"Sachin Katti"}]},"title":"Localizing Low-power Backscatter Tags Using Commodity WiFi.","venue":"CoNEXT","pages":"251-262","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/KotaruZK17","doi":"10.1145/3143361.3143379","ee":"https://doi.org/10.1145/3143361.3143379","url":"https://dblp.org/rec/conf/conext/KotaruZK17"}, "url":"URL#2898383" }, { "@score":"1", "@id":"2898386", "info":{"authors":{"author":[{"@pid":"90/3438","text":"Youndo Lee"},{"@pid":"s/NeilTSpring","text":"Neil Spring"}]},"title":"Identifying and Analyzing Broadband Internet Reverse DNS Names.","venue":"CoNEXT","pages":"35-40","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/LeeS17","doi":"10.1145/3143361.3143392","ee":"https://doi.org/10.1145/3143361.3143392","url":"https://dblp.org/rec/conf/conext/LeeS17"}, "url":"URL#2898386" }, { "@score":"1", "@id":"2898387", "info":{"authors":{"author":[{"@pid":"38/7655","text":"Wai Kay Leong"},{"@pid":"141/1943","text":"Zixiao Wang"},{"@pid":"02/2726","text":"Ben Leong"}]},"title":"TCP Congestion Control Beyond Bandwidth-Delay Product for Mobile Cellular Networks.","venue":"CoNEXT","pages":"167-179","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/LeongWL17","doi":"10.1145/3143361.3143378","ee":"https://doi.org/10.1145/3143361.3143378","url":"https://dblp.org/rec/conf/conext/LeongWL17"}, "url":"URL#2898387" }, { "@score":"1", "@id":"2898388", "info":{"authors":{"author":[{"@pid":"233/3351","text":"Yeon-Sup Lim"},{"@pid":"06/2055","text":"Erich M. Nahum"},{"@pid":"t/DonaldFTowsley","text":"Don Towsley"},{"@pid":"g/RichardJGibbens","text":"Richard J. Gibbens"}]},"title":"ECF: An MPTCP Path Scheduler to Manage Heterogeneous Paths.","venue":"CoNEXT","pages":"147-159","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/LimNTG17","doi":"10.1145/3143361.3143376","ee":"https://doi.org/10.1145/3143361.3143376","url":"https://dblp.org/rec/conf/conext/LimNTG17"}, "url":"URL#2898388" }, { "@score":"1", "@id":"2898389", "info":{"authors":{"author":[{"@pid":"148/1927","text":"Qiongzheng Lin"},{"@pid":"50/2484-25","text":"Lei Yang 0025"},{"@pid":"209/2864","text":"Huanyu Jia"},{"@pid":"184/3475","text":"Chunhui Duan"},{"@pid":"27/2403","text":"Yunhao Liu 0001"}]},"title":"Revisiting Reading Rate with Mobility: Rate-Adaptive Reading in COTS RFID Systems.","venue":"CoNEXT","pages":"199-211","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/LinYJDL17","doi":"10.1145/3143361.3143387","ee":"https://doi.org/10.1145/3143361.3143387","url":"https://dblp.org/rec/conf/conext/LinYJDL17"}, "url":"URL#2898389" }, { "@score":"1", "@id":"2898390", "info":{"authors":{"author":[{"@pid":"46/10471","text":"Adrian Loch"},{"@pid":"167/2257","text":"Hany Assasa"},{"@pid":"182/9962","text":"Joan Palacios"},{"@pid":"07/3803","text":"Joerg Widmer"},{"@pid":"137/1438","text":"Hans Suys"},{"@pid":"23/4563","text":"Björn Debaillie"}]},"title":"Zero Overhead Device Tracking in 60 GHz Wireless Networks using Multi-Lobe Beam Patterns.","venue":"CoNEXT","pages":"224-237","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/LochAPWSD17","doi":"10.1145/3143361.3143395","ee":"https://doi.org/10.1145/3143361.3143395","url":"https://dblp.org/rec/conf/conext/LochAPWSD17"}, "url":"URL#2898390" }, { "@score":"1", "@id":"2898392", "info":{"authors":{"author":[{"@pid":"209/2851","text":"Cristina Marquez"},{"@pid":"25/10042","text":"Marco Gramaglia"},{"@pid":"75/1476","text":"Marco Fiore"},{"@pid":"b/AlbertBanchs","text":"Albert Banchs"},{"@pid":"48/8344","text":"Cezary Ziemlicki"},{"@pid":"46/8344","text":"Zbigniew Smoreda"}]},"title":"Not All Apps Are Created Equal: Analysis of Spatiotemporal Heterogeneity in Nationwide Mobile Service Usage.","venue":"CoNEXT","pages":"180-186","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/MarquezGFBZS17","doi":"10.1145/3143361.3143369","ee":"https://doi.org/10.1145/3143361.3143369","url":"https://dblp.org/rec/conf/conext/MarquezGFBZS17"}, "url":"URL#2898392" }, { "@score":"1", "@id":"2898395", "info":{"authors":{"author":[{"@pid":"77/8397","text":"Matthew K. Mukerjee"},{"@pid":"74/7075","text":"Ilker Nadi Bozkurt"},{"@pid":"209/2828","text":"Devdeep Ray"},{"@pid":"m/BruceMMaggs","text":"Bruce M. Maggs"},{"@pid":"s/SrinivasanSeshan","text":"Srinivasan Seshan"},{"@pid":"z/HuiZhang1","text":"Hui Zhang 0001"}]},"title":"Redesigning CDN-Broker Interactions for Improved Content Delivery.","venue":"CoNEXT","pages":"68-80","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/MukerjeeBRMSZ17","doi":"10.1145/3143361.3143366","ee":"https://doi.org/10.1145/3143361.3143366","url":"https://dblp.org/rec/conf/conext/MukerjeeBRMSZ17"}, "url":"URL#2898395" }, { "@score":"1", "@id":"2898396", "info":{"authors":{"author":[{"@pid":"39/457","text":"David Naylor"},{"@pid":"62/5158","text":"Richard Li"},{"@pid":"70/3800","text":"Christos Gkantsidis"},{"@pid":"76/1767","text":"Thomas Karagiannis"},{"@pid":"s/PeterSteenkiste","text":"Peter Steenkiste"}]},"title":"And Then There Were More: Secure Communication for More Than Two Parties.","venue":"CoNEXT","pages":"88-100","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/NaylorLGKS17","doi":"10.1145/3143361.3143383","ee":"https://doi.org/10.1145/3143361.3143383","url":"https://dblp.org/rec/conf/conext/NaylorLGKS17"}, "url":"URL#2898396" }, { "@score":"1", "@id":"2898401", "info":{"authors":{"author":[{"@pid":"33/3932","text":"Yue Qiao"},{"@pid":"73/1997-1","text":"Kannan Srinivasan 0001"},{"@pid":"a/AArora","text":"Anish Arora"}]},"title":"Channel Spoofer: Defeating Channel Variability and Unpredictability.","venue":"CoNEXT","pages":"402-413","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/QiaoSA17","doi":"10.1145/3143361.3143396","ee":"https://doi.org/10.1145/3143361.3143396","url":"https://dblp.org/rec/conf/conext/QiaoSA17"}, "url":"URL#2898401" }, { "@score":"1", "@id":"2898402", "info":{"authors":{"author":[{"@pid":"149/9322","text":"Abbas Razaghpanah"},{"@pid":"208/4182","text":"Arian Akhavan Niaki"},{"@pid":"50/7563","text":"Narseo Vallina-Rodriguez"},{"@pid":"47/8093","text":"Srikanth Sundaresan"},{"@pid":"150/8002","text":"Johanna Amann"},{"@pid":"52/2893","text":"Phillipa Gill"}]},"title":"Studying TLS Usage in Android Apps.","venue":"CoNEXT","pages":"350-362","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/RazaghpanahNVSA17","doi":"10.1145/3143361.3143400","ee":"https://doi.org/10.1145/3143361.3143400","url":"https://dblp.org/rec/conf/conext/RazaghpanahNVSA17"}, "url":"URL#2898402" }, { "@score":"1", "@id":"2898403", "info":{"authors":{"author":[{"@pid":"24/8633","text":"Sajjad Rizvi"},{"@pid":"34/2603-1","text":"Bernard Wong 0001"},{"@pid":"59/739","text":"Srinivasan Keshav"}]},"title":"Canopus: A Scalable and Massively Parallel Consensus Protocol.","venue":"CoNEXT","pages":"426-438","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/RizviWK17","doi":"10.1145/3143361.3143394","ee":"https://doi.org/10.1145/3143361.3143394","url":"https://dblp.org/rec/conf/conext/RizviWK17"}, "url":"URL#2898403" }, { "@score":"1", "@id":"2898404", "info":{"authors":{"author":[{"@pid":"133/3868","text":"Ramanujan K. Sheshadri"},{"@pid":"42/3793","text":"Karthikeyan Sundaresan"},{"@pid":"33/8356","text":"Eugene Chai"},{"@pid":"84/3606","text":"Amir Khojastepour"},{"@pid":"67/43","text":"Sampath Rangarajan"},{"@pid":"92/442","text":"Dimitrios Koutsonikolas"}]},"title":"BLU: Blue-printing Interference for Robust LTE Access in Unlicensed Spectrum.","venue":"CoNEXT","pages":"15-27","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/SheshadriSCKRK17","doi":"10.1145/3143361.3143373","ee":"https://doi.org/10.1145/3143361.3143373","url":"https://dblp.org/rec/conf/conext/SheshadriSCKRK17"}, "url":"URL#2898404" }, { "@score":"1", "@id":"2898409", "info":{"authors":{"author":[{"@pid":"164/7346","text":"Daniel Steinmetzer"},{"@pid":"164/7422","text":"Daniel Wegemer"},{"@pid":"62/177-1","text":"Matthias Schulz 0001"},{"@pid":"07/3803","text":"Joerg Widmer"},{"@pid":"95/1816","text":"Matthias Hollick"}]},"title":"Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.1 lad Devices.","venue":"CoNEXT","pages":"414-425","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/SteinmetzerWSWH17","doi":"10.1145/3143361.3143384","ee":"https://doi.org/10.1145/3143361.3143384","url":"https://dblp.org/rec/conf/conext/SteinmetzerWSWH17"}, "url":"URL#2898409" }, { "@score":"1", "@id":"2898410", "info":{"authors":{"author":[{"@pid":"135/6272","text":"Aditya Sundarrajan"},{"@pid":"14/2809","text":"Mingdong Feng"},{"@pid":"77/5792","text":"Mangesh Kasbekar"},{"@pid":"s/RameshKSitaraman","text":"Ramesh K. Sitaraman"}]},"title":"Footprint Descriptors: Theory and Practice of Cache Provisioning in a Global CDN.","venue":"CoNEXT","pages":"55-67","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/SundarrajanFKS17","doi":"10.1145/3143361.3143368","ee":"https://doi.org/10.1145/3143361.3143368","url":"https://dblp.org/rec/conf/conext/SundarrajanFKS17"}, "url":"URL#2898410" }, { "@score":"1", "@id":"2898412", "info":{"authors":{"author":[{"@pid":"209/2825","text":"Marc Anthony Warrior"},{"@pid":"177/6680","text":"Uri Klarman"},{"@pid":"127/2799","text":"Marcel Flores"},{"@pid":"k/AleksandarKuzmanovic","text":"Aleksandar Kuzmanovic"}]},"title":"Drongo: Speeding Up CDNs with Subnet Assimilation from the Client.","venue":"CoNEXT","pages":"41-54","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/WarriorKFK17","doi":"10.1145/3143361.3143365","ee":"https://doi.org/10.1145/3143361.3143365","url":"https://dblp.org/rec/conf/conext/WarriorKFK17"}, "url":"URL#2898412" }, { "@score":"1", "@id":"2898413", "info":{"authors":{"author":[{"@pid":"209/2684","text":"Hongjia Wu"},{"@pid":"97/6505-7","text":"Qing Wang 0007"},{"@pid":"75/198-1","text":"Jie Xiong 0001"},{"@pid":"z/MarcoZuniga","text":"Marco Zuniga"}]},"title":"SmartVLC: When Smart Lighting Meets VLC.","venue":"CoNEXT","pages":"212-223","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/WuWXZ17","doi":"10.1145/3143361.3149824","ee":"https://doi.org/10.1145/3143361.3149824","url":"https://dblp.org/rec/conf/conext/WuWXZ17"}, "url":"URL#2898413" }, { "@score":"1", "@id":"2898414", "info":{"authors":{"author":[{"@pid":"142/1755","text":"Xiufeng Xie"},{"@pid":"58/4582-3","text":"Xinyu Zhang 0003"}]},"title":"POI360: Panoramic Mobile Video Telephony over LTE Cellular Networks.","venue":"CoNEXT","pages":"336-349","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/XieZ17","doi":"10.1145/3143361.3143381","ee":"https://doi.org/10.1145/3143361.3143381","url":"https://dblp.org/rec/conf/conext/XieZ17"}, "url":"URL#2898414" }, { "@score":"1", "@id":"2898415", "info":{"authors":{"author":[{"@pid":"33/4816","text":"Pengyu Zhang"},{"@pid":"209/2782","text":"Colleen Josephson"},{"@pid":"52/10159","text":"Dinesh Bharadia"},{"@pid":"50/1133","text":"Sachin Katti"}]},"title":"FreeRider: Backscatter Communication Using Commodity Radios.","venue":"CoNEXT","pages":"389-401","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/ZhangJBK17","doi":"10.1145/3143361.3143374","ee":"https://doi.org/10.1145/3143361.3143374","url":"https://dblp.org/rec/conf/conext/ZhangJBK17"}, "url":"URL#2898415" }, { "@score":"1", "@id":"2898416", "info":{"authors":{"author":[{"@pid":"174/1652","text":"Chaoyun Zhang"},{"@pid":"174/1636","text":"Xi Ouyang"},{"@pid":"03/7603","text":"Paul Patras"}]},"title":"ZipNet-GAN: Inferring Fine-grained Mobile Traffic Patterns via a Generative Adversarial Neural Network.","venue":"CoNEXT","pages":"363-375","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/ZhangOP17","doi":"10.1145/3143361.3143393","ee":"https://doi.org/10.1145/3143361.3143393","url":"https://dblp.org/rec/conf/conext/ZhangOP17"}, "url":"URL#2898416" }, { "@score":"1", "@id":"2898417", "info":{"authors":{"author":[{"@pid":"68/6577-3","text":"Ren Zhang 0003"},{"@pid":"p/BartPreneel","text":"Bart Preneel"}]},"title":"On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol.","venue":"CoNEXT","pages":"108-119","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/conext/ZhangP17","doi":"10.1145/3143361.3143389","ee":"https://doi.org/10.1145/3143361.3143389","url":"https://dblp.org/rec/conf/conext/ZhangP17"}, "url":"URL#2898417" }, { "@score":"1", "@id":"3034424", "info":{"title":"Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2017, Incheon, Republic of Korea, December 12 - 15, 2017","venue":"CoNEXT","publisher":"ACM","year":"2017","type":"Editorship","key":"conf/conext/2017","doi":"10.1145/3143361","ee":"https://doi.org/10.1145/3143361","url":"https://dblp.org/rec/conf/conext/2017"}, "url":"URL#3034424" } ] } } } )