


default search action
27th ICNP 2019: Chicago, IL, USA
- 27th IEEE International Conference on Network Protocols, ICNP 2019, Chicago, IL, USA, October 8-10, 2019. IEEE 2019, ISBN 978-1-7281-2700-2

- Jan Pennekamp

, Jens Hiller
, Sebastian Reuter
, Wladimir De la Cadena, Asya Mitseva, Martin Henze
, Thomas Engel
, Klaus Wehrle
, Andriy Panchenko:
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing. 1-2 - Yimeng Zhao, Ahmed Saeed

, Mostafa H. Ammar, Ellen W. Zegura:
Unison: Enabling Content Provider/ISP Collaboration using a vSwitch Abstraction. 1-11 - Jens Hiller

, Jan Pennekamp
, Markus Dahlmanns
, Martin Henze
, Andriy Panchenko, Klaus Wehrle
:
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments. 1-12 - Ziyao Zhang

, Liang Ma, Konstantinos Poularakis, Kin K. Leung, Jeremy Tucker, Ananthram Swami:
MACS: Deep Reinforcement Learning based SDN Controller Synchronization Policy Design. 1-11 - Zhipeng Gao, Chenxi Xia, Zhuojun Jin, Qian Wang, Junmeng Huang, Yang Yang, Lanlan Rui:

A Light-weight Trust Mechanism for Cloud-Edge Collaboration Framework. 1-6 - Xiong Wang, Linghe Kong

, Liang He, Guihai Chen
:
mLoRa: A Multi-Packet Reception Protocol in LoRa networks. 1-11 - Ali Mohammadkhan, K. K. Ramakrishnan

:
Re-Architecting the Packet Core and Control Plane for Future Cellular Networks. 1-4 - Gaoxiong Zeng

, Wei Bai, Ge Chen, Kai Chen, Dongsu Han
, Yibo Zhu, Lei Cui:
Congestion Control for Cross-Datacenter Networks. 1-12 - Yige Chen

, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Yipeng Wang:
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach. 1-11 - Hyunjoong Lee, Jungjun Kim, Changhee Joo, Saewoong Bahk:

BeaconRider: Opportunistic Sharing of Beacon Air-Time in Densely Deployed WLANs. 1-11 - Mohammad Amin Beiruti, Yashar Ganjali:

Migration Scheduling in Distributed SDN Controllers. 1-2 - Vitalii Demianiuk

, Sergey Gorinsky, Sergey I. Nikolenko
, Kirill Kogan
:
Robust Distributed Monitoring of Traffic Flows. 1-11 - Mohammad Jahanian, Jiachen Chen, K. K. Ramakrishnan

:
Graph-based Namespaces and Load Sharing for Efficient Information Dissemination in Disasters. 1-12 - Congcong Miao, Jilong Wang, Tianying Ji

, Hui Wang, Chao Xu, Fenghua Li, Fengyuan Ren:
BDAC: A Behavior-aware Dynamic Adaptive Configuration on DHCP in Wireless LANs. 1-11 - Shouqian Shi, Chen Qian, Minmei Wang:

Re-designing Compact-structure based Forwarding for Programmable Networks. 1-11 - Yifeng Cao, Zhe Wang, Linghe Kong

, Guihai Chen
, Jiadi Yu, Shaojie Tang, Yingying Chen:
Forward the Collision Decomposition in ZigBee. 1-11 - Xiaoyan Hu

, Shaoqi Zheng, Lixia Zhao, Guang Cheng, Jian Gong:
Exploration and Exploitation of Off-path Cached Content in Network Coding Enabled Named Data Networking. 1-6 - Ting Qu, Raj Joshi, Mun Choon Chan, Ben Leong

, Deke Guo, Zhong Liu:
SQR: In-network Packet Loss Recovery from Link Failures for Highly Reliable Datacenter Networks. 1-12 - Sepehr Taeb, Nashid Shahriar, Shihabur Rahman Chowdhury, Massimo Tornatore

, Raouf Boutaba, Jeebak Mitra, Mahdi Hemmati
:
Virtual Network Embedding with Path-based Latency Guarantees in Elastic Optical Networks. 1-12 - Guanyu Li, Menghao Zhang

, Chang Liu, Xiao Kong
, Ang Chen, Guofei Gu, Haixin Duan:
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering. 1-12 - Lin Jin

, Shuai Hao, Haining Wang, Chase Cotton:
Unveil the Hidden Presence: Characterizing the Backend Interface of Content Delivery Networks. 1-11 - Ning Wang, Yunsheng Wang

:
AutoWaze: Towards Automatic Event Inference in Intelligent Transportation Systems. 1-2 - Ruipeng Zhang

, Chen Xu
, Mengjun Xie
:
Powering Hands-on Cybersecurity Practices with Cloud Computing. 1-2 - Hiroki Masuda, Kentaro Kita, Yuki Koizumi, Toru Hasegawa:

On Verification of Remote Computing on Potentially Untrusted Nodes. 1-2 - Thomas Wirtgen, Cyril Dénos, Quentin De Coninck

, Mathieu Jadin, Olivier Bonaventure:
The Case for Pluginized Routing Protocols. 1-12 - Zhijun Li, Yongrui Chen:

Achieving Universal Low-Power Wide-Area Networks on Existing Wireless Devices. 1-11 - Kate Keahey, Joe Mambretti, Paul Ruth

, Dan Stanzione:
Chameleon: A Large-Scale, Deeply Reconfigurable Testbed for Computer Science Research. 1-2 - Naoki Moriyama, Yusuke Ito, Hiroyuki Koga:

A Study on Effective Congestion Control to Retrieve Distributed Data in ICN. 1-2 - Maxine D. Brown, Luc Renambot, Lance Long

, Timothy Bargo, Andrew E. Johnson
:
COMPaaS DLV: Composable Infrastructure for Deep Learning in an Academic Research Environment. 1-2 - Minh Nguyen, Saptarshi Debroy, Prasad Calyam, Zhen Lyu, Trupti Joshi:

Multi-Cloud Performance and Security-driven Brokering for Bioinformatics Workflows. 1-2 - Joaquin Chung, Zhengchun Liu, Rajkumar Kettimuthu, Ian T. Foster:

Elastic Data Transfer Infrastructure (DTI) on the Chameleon Cloud. 1-2 - Haofan Cai, Ge Wang, Xiaofeng Shi, Junjie Xie, Minmei Wang, Chen Qian:

When Tags 'Read' Each Other: Enabling Low-cost and Convenient Tag Mutual Identification. 1-11 - Jingling Liu, Jiawei Huang, Weihe Li, Jianxin Wang:

AG: Adaptive Switching Granularity for Load Balancing with Asymmetric Topology in Data Center Network. 1-11 - Hyunseok Chang, Murali S. Kodialam, T. V. Lakshman, Sarit Mukherjee:

Microservice Fingerprinting and Classification using Machine Learning. 1-11 - Chen Xu

, Ruipeng Zhang
, Mengjun Xie
, Li Yang:
Network Intrusion Detection System as a Service on OpenStack Cloud. 1-2 - Shiva Ketabi, Yashar Ganjali:

Hierarchical Congestion Control (HCC): Cooperation of Uncorrelated Flows for Better Fairness and Throughput. 1-2 - Spyridon Mastorakis, Abderrahmen Mtibaa:

Towards Service Discovery and Invocation in Data-Centric Edge Networks. 1-6 - Wenbo Zou, Jiwoong Won, Jemin Ahn, Kyungtae Kang:

Intentionality-related Deep Learning Method in Web Prefetching. 1-2 - Raghav Hampapur Venkatnarayan

, Muhammad Shahzad:
Demo: Measuring Distance Traveled by an Object using WiFi-CSI and IMU Fusion. 1-2 - Gregor Bankhamer, Robert Elsässer, Stefan Schmid

:
Local Fast Rerouting with Low Congestion: A Randomized Approach. 1-11 - Kiran Makhijani

, Hamed Yousefi, K. K. Ramakrishnan
, Richard Li
:
Extended Abstract: Coordinated Communications for Next-Generation Networks. 1-2 - Chengyi Qu

, Songjie Wang, Prasad Calyam:
DyCOCo: A Dynamic Computation Offloading and Control Framework for Drone Video Analytics. 1-2 - Bashir Mohammed, Mariam Kiran, Nandini Krishnaswamy:

DeepRoute on Chameleon: Experimenting with Large-scale Reinforcement Learning and SDN on Chameleon Testbed. 1-2 - Yuhui Zhang, Dejun Yang

:
RobustPay: Robust Payment Routing Protocol in Blockchain-based Payment Channel Networks. 1-4 - Paul Ruth

, Mert Cevik:
Experimenting with AWS Direct Connect using Chameleon, ExoGENI, and Internet2 Cloud Connect. 1-2 - Yuwei Zeng

, Yongzheng Zhang, Tianning Zang, Xunxun Chen
, Yipeng Wang:
A Linguistics-based Stacking Approach to Disposable Domains Detection. 1-4 - Shih-Hao Tseng:

Perseverance-Aware Traffic Engineering in Rate-Adaptive Networks with Reconfiguration Delay. 1-10 - Xiaoxi Zhang, Siqi Chen, Youngbin Im, Maria Gorlatova, Sangtae Ha

, Carlee Joe-Wong:
Towards Automated Network Management: Learning the Optimal Protocol Selection. 1-4 - Paul Lepe, Aashray Aggarwal, Jelena Mirkovic, Jens Mache, Richard Weiss, David Weinmann:

Measuring Student Learning On Network Testbeds. 1-2 - Mohammad Amin Beiruti, Yashar Ganjali:

Load Migration Protocol for SDN Controllers. 1-2 - Zhi Zhou:

GreenEdge: Greening Edge Datacenters with Energy-Harvesting IoT Devices. 1-6 - Osamah L. Barakat, Pier Luigi Ventre, Stefano Salsano, Xiaoming Fu

:
Busoni: Policy Composition and Northbound Interface for IPv6 Segment Routing Networks. 1-4 - Rajat Tandon, Abhinav Palia, Jaydeep Ramani, Brandon Paulsen, Genevieve Bartlett, Jelena Mirkovic:

Defending Web Servers Against Flash Crowd Attacks. 1-2 - Jinshu Su

, Biao Han
, Gaofeng Lv, Tao Li, Zhigang Sun:
A Heterogeneous Parallel Packet Processing Architecture for NFV Acceleration. 1-2 - Bálint György Nagy, János Dóka, Sándor Rácz, Géza Szabó, István Pelle

, János Czentye, László Toka, Balázs Sonkoly
:
Towards Human-Robot Collaboration: An Industry 4.0 VR Platform with Clouds Under the Hood. 1-2 - Craig Gutterman, Gil Zussman, Artur Minakhmetov

, Jiakai Yu, Michael Sherman
, Tingjun Chen, Shengxiang Zhu, Ivan Seskar, Dipankar Raychaudhuri, Daniel C. Kilper
:
Programmable Optical x-Haul Network in the COSMOS Testbed. 1-2 - Qing Gao, Limin Zhu, Yuxin Lin, Xun Chen:

Anomaly Noise Filtering with Logistic Regression and a New Method for Time Series Trend Computation for Monitoring Systems. 1-6 - Yusaku Hayamizu, Kazuhisa Matsuzono, Hitoshi Asaeda

:
CeforeSim: Cefore Compliant NS-3-Based Network Simulator. 1-2 - Jiachen Chen, Yuxuan Xing, K. K. Ramakrishnan

, Mohammad Jahanian, Hulya Seferoglu, Murat Yuksel:
ReDiCom: Resilient Communication for First Responders in Disaster Management. 1-2 - Coleman Link, Jesse Sarran, Garegin Grigoryan

, Minseok Kwon, M. Mustafa Rafique, Warren R. Carithers:
Container Orchestration by Kubernetes for RDMA Networking. 1-2 - Ashish Pandey, Songjie Wang, Prasad Calyam:

Data-intensive Workflow Execution using Distributed Compute Resources. 1-2 - Markus Dahlmanns

, Chris Dax, Roman Matzutt, Jan Pennekamp
, Jens Hiller
, Klaus Wehrle
:
Privacy-Preserving Remote Knowledge System. 1-2 - Timur Friedman, Rick McGeer, Berat Can Senel

, Matt Hemmings, Glenn Ricart
:
The EdgeNet System. 1-2 - Gongming Zhao, Hongli Xu, Jianchun Liu, Chen Qian, Juncheng Ge, Liusheng Huang:

SAFE-ME: Scalable and Flexible Middlebox Policy Enforcement with Software Defined Networking. 1-11 - Yuuichi Teranishi, Takashi Kimata, Hiroaki Yamanaka

, Eiji Kawai, Hiroaki Harai:
Demo Abstract: LASK: A Distributed Service Discovery Platform on Edge Computing Environments. 1-2 - Jianhua He

, Andrew Radford, Laura Li, Zhiliang Xiong, Zuoyin Tang
, Xiaoming Fu
, Supeng Leng, Fan Wu, Kaisheng Huang, Jianye Huang, Jie Zhang
, Yan Zhang:
Cooperative Connected Autonomous Vehicles (CAV): Research, Applications and Challenges. 1-6 - Liyang Sun

, Tongyu Zong, Yong Liu
, Yao Wang
, Haihong Zhu:
Optimal Strategies for Live Video Streaming in the Low-latency Regime. 1-4 - Dmitry Duplyakin, Alexandru Uta

, Aleksander Maricq, Robert Ricci
:
On Studying CPU Performance of CloudLab Hardware. 1-2 - Xiaodong Yi

, Junjie Wang, Jingpu Duan, Wei Bai, Chuan Wu
, Yongqiang Xiong, Dongsu Han
:
FlowShader: a Generalized Framework for GPU-accelerated VNF Flow Processing. 1-12 - Lingang Li, Yongrui Chen, Zhijun Li:

Poster Abstract: Physical-layer Cross-Technology Communication with Narrow-Band Decoding. 1-2 - Menghao Zhang

, Jiasong Bai, Guanyu Li, Zili Meng
, Hongda Li, Hongxin Hu, Mingwei Xu:
When NFV Meets ANN: Rethinking Elastic Scaling for ANN-based NFs. 1-6 - Nathan Tusing

, Jonathan Oakley, C. Geddings Barrineau, Lu Yu, Kuang-Ching Wang
, Richard R. Brooks:
Traffic Analysis Resistant Network (TARN) Anonymity Analysis. 1-2 - Mijanur R. Palash, Voicu Popescu, Amit Sheoran, Sonia Fahmy

:
CoRE: Non-Linear 3D Sampling for Robust 360° Video Streaming. 1-2 - Komal Thareja, Cong Wang

, Paul Ruth
, Anirban Mandal
, Ilya Baldin
, Michael J. Stealey:
COMET: Distributed Metadata Service for Multi-cloud Experiments. 1-2 - Ge Wang, Chen Qian, Kaiyan Cui, Han Ding, Haofan Cai, Wei Xi, Jinsong Han, Jizhong Zhao:

A (Near) Zero-cost and Universal Method to Combat Multipaths for RFID Sensing. 1-4 - Alex Horn, Ali Kheradmand, Mukul R. Prasad:

A Precise and Expressive Lattice-theoretical Framework for Efficient Network Verification. 1-12 - Junyang Shi, Di Mu, Mo Sha

:
LoRaBee: Cross-Technology Communication from LoRa to ZigBee via Payload Encoding. 1-11 - Tingjun Chen, Jackson Welles, Manav Kohli, Mahmood Baraani Dastjerdi

, Jakub Kolodziejski, Michael Sherman
, Ivan Seskar, Harish Krishnaswamy, Gil Zussman:
Experimentation with Full-Duplex Wireless in the COSMOS Testbed. 1-2 - Gamal Sallam, Zizhan Zheng, Bo Ji

:
Placement and Allocation of Virtual Network Functions: Multi-dimensional Case. 1-11 - Xiaofeng Shi, Minmei Wang, Ge Wang, Baiwen Huang, Haofan Cai, Junjie Xie, Chen Qian:

TagAttention: Mobile Object Tracing without Object Appearance Information by Vision-RFID Fusion. 1-11 - Yimeng Wang, Yongbo Li, Tian Lan, Nakjung Choi

:
A Reinforcement Learning Approach for Online Service Tree Placement in Edge Computing. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














