


default search action
14. HotNets 2015: Philadelphia, PA, USA
- Jaudelice de Oliveira, Jonathan Smith, Katerina J. Argyraki, Philip Alexander Levis:

Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16 - 17, 2015. ACM 2015, ISBN 978-1-4503-4047-2 - Ben Jones, Nick Feamster:

Can Censorship Measurements Be Safe(r)? 1:1-1:7 - Aqib Nisar, Aqsa Kashaf, Zartash Afzal Uzmi, Ihsan Ayyub Qazi

:
A Case for Marrying Censorship Measurements with Circumvention. 2:1-2:7 - Fotios Papaodyssefs, Costas Iordanou

, Jeremy Blackburn, Nikolaos Laoutaris
, Konstantina Papagiannaki:
Web Identity Translator: Behavioral Advertising and Identity Privacy with WIT. 3:1-3:7 - David Naylor, Peter Steenkiste

:
Do You Know Where Your Headers Are? Comparing the Privacy of Network Architectures with Share Count Analysis. 4:1-4:7 - Tianlong Yu, Vyas Sekar, Srinivasan Seshan

, Yuvraj Agarwal, Chenren Xu:
Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things. 5:1-5:7 - Nick Shelly, Brendan Tschaen, Klaus-Tycho Förster

, Michael Alan Chang, Theophilus Benson, Laurent Vanbever:
Destroying networks for fun (and profit). 6:1-6:7 - Seong-Min Kim

, Youjung Shin, Jaehyung Ha, Taesoo Kim, Dongsu Han
:
A First Step Towards Leveraging Commodity Trusted Execution Environments for Network Applications. 7:1-7:7 - Meng Meng, Lizhao You

, Kun Tan, Jiansong Zhang, Wenjie Wang:
SpaceHub: A Smart Relay System for Smart Home. 8:1-8:7 - Peter Anthony Iannucci, Ravi Netravali, Ameesh K. Goyal, Hari Balakrishnan:

Room-Area Networks. 9:1-9:7 - Avichai Cohen, Yossi Gilad, Amir Herzberg, Michael Schapira:

One Hop for RPKI, One Giant Leap for BGP Security. 10:1-10:7 - Matthias Wählisch

, Robert Schmidt, Thomas C. Schmidt
, Olaf Maennel
, Steve Uhlig, Gareth Tyson:
RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem. 11:1-11:7 - Raja R. Sambasivan

, David Tran-Lam, Aditya Akella, Peter Steenkiste
:
Bootstrapping Evolvability for Inter-Domain Routing. 12:1-12:7 - Mehdi Nikkhah, Constantine Dovrolis, Roch Guérin:

Why didn't my (great!) protocol get adopted? 13:1-13:7 - Lavanya Jose, Lisa Yan, Mohammad Alizadeh, George Varghese, Nick McKeown, Sachin Katti:

High Speed Networks Need Proactive Congestion Control. 14:1-14:7 - James Murphy McCauley, Alice Sheng, Ethan J. Jackson, Barath Raghavan, Sylvia Ratnasamy

, Scott Shenker:
Taking an AXE to L2 Spanning Trees. 15:1-15:7 - Asaf Valadarsky, Michael Dinitz

, Michael Schapira:
Xpander: Unveiling the Secrets of High-Performance Datacenters. 16:1-16:7 - Soudeh Ghorbani

, Brighten Godfrey, Yashar Ganjali, Amin Firoozshahian:
Micro Load Balancing in Data Centers with DRILL. 17:1-17:7 - Ramakrishnan Durairajan, Sathiya Kumaran Mani, Joel Sommers, Paul Barford:

Time's Forgotten: Using NTP to understand Internet Latency. 18:1-18:7 - Osama Haq, Fahad R. Dogar:

Leveraging the Power of Cloud for Reliable Wide Area Communication. 19:1-19:7 - Omid Alipourfard, Masoud Moshref, Minlan Yu:

Re-evaluating Measurement Algorithms in Software. 20:1-20:7 - Zaoxing Liu, Gregory Vorsanger, Vladimir Braverman, Vyas Sekar:

Enabling a "RISC" Approach for Software-Defined Monitoring using Universal Streaming. 21:1-21:7 - Christos Pappas, Katerina J. Argyraki

, Stefan Bechtold, Adrian Perrig:
Transparency Instead of Neutrality. 22:1-22:7 - Anirudh Sivaraman, Suvinay Subramanian

, Anurag Agrawal, Sharad Chole, Shang-Tse Chuang, Tom Edsall, Mohammad Alizadeh, Sachin Katti, Nick McKeown, Hari Balakrishnan:
Towards Programmable Packet Scheduling. 23:1-23:7 - Radhika Mittal, Rachit Agarwal, Sylvia Ratnasamy

, Scott Shenker
:
Universal Packet Scheduling. 24:1-24:7 - Ang Chen, Yang Wu, Andreas Haeberlen

, Wenchao Zhou, Boon Thau Loo
:
Differential Provenance: Better Network Diagnostics with Reference Events. 25:1-25:7 - Yang Wu, Ang Chen, Andreas Haeberlen

, Wenchao Zhou, Boon Thau Loo
:
Automated Network Repair with Meta Provenance. 26:1-26:7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














