Abstract is missing.
- An Empirical Characterization of Anycast Convergence TimeBernhard Degen, Mattijs Jonker, Roland van Rijswijk-Deij, Raffaele Sommese. [doi]
- Towards Measuring Content LocalityJames I. Madeley, Amreesh Phokeer, Aftab Siddiqui, Theophilus A. Benson. [doi]
- To QoE or not to QoESzilveszter Nádas, Lars Ernström, László Szilágyi, Gyanesh Patra, Dmitri Krylov, Jonathan Lynam. [doi]
- Low-Carb BGP: A Carbon-Aware Inter-Domain Routing Extension to BGPEdwin Sutherland, Iain Phillips 0002. [doi]
- Investigating Location-aware Advertisements in Anycast IP NetworksSavvas Kastanakis, Vasileios Giotsas, Ioana Livadariu, Neeraj Suri. [doi]
- To switch or not to switch to TCP Prague? Incentives for adoption in a partial L4S deploymentFatih Berkay Sarpkaya, Ashutosh Srivastava, Fraida Fund, Shivendra S. Panwar. [doi]
- Harnessing Public Code Repositories to Develop Production-Ready ML Artifacts for NetworkingPunnal Ismail Khan, Satyandra Guthula, Roman Beltiukov, Roland Schmid, Tobias Bühler, Arpit Gupta, Laurent Vanbever, Walter Willinger. [doi]
- DARE: Making Diffusing Computations More Efficient for Loop-Free Shortest-Path RoutingJ. J. Garcia-Luna-Aceves, Morteza Moghaddassian. [doi]
- BBRv3 in the public Internet: a boon or a bane?Danesh Zeynali, Emilia N. Weyulu, Seifeddine Fathalli, Balakrishnan Chandrasekaran 0002, Anja Feldmann. [doi]
- HTTP/3's Extensible Prioritization Scheme in the WildJoris Herbots, Robin Marx, Maarten Wijnants 0001, Peter Quax, Wim Lamotte. [doi]
- The Observer Effect in Computer NetworksTal Mizrahi, Michael Schapira, Yoram Moses. [doi]
- Do Large Language Models Dream of Sockets?Jari Arkko, Dag Lindbo, Martin Klitte. [doi]
- Implementing and Evaluating Ioam Integrity ProtectionJustin Iurman, Benoit Donnet. [doi]
- Assessing the security of Internet paths: A case study of Dutch critical infrastructuresShyam Krishna Khadka, Suzan Bayhan, Ralph Holz, Cristian Hesselman. [doi]
- Protocol Fixes for KeyTrap VulnerabilitiesElias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner. [doi]
- Investigating Data Center Network ProtocolsPeter Willis 0003, Nirmala Shenoy, Yin Pan, Bill Stackpole. [doi]
- UniSAV: A Unified Framework for Internet-Scale Source Address ValidationLancheng Qin, Libin Liu, Li Chen, Dan Li, Yuqian Shi, Hongbing Yang. [doi]
- QUICPro: Integrating Deep Reinforcement Learning to Defend against QUIC Handshake Flooding AttacksY A Joarder, Carol J. Fung. [doi]