Abstract is missing.
- CLEO: Machine Learning for ECMPHeesang Jin, Minkoo Kang, Gyeongsik Yang, Chuck Yoo. 1-3 [doi]
- A first look into Alexa's interaction securityIsmael Castell-Uroz, Xavier Marrugat-Plaza, Josep Solé-Pareta, Pere Barlet-Ros. 4-6 [doi]
- PKN: Improving Survivability of LEO Satellite Network through Protecting Key NodesShaoqing Wang, Youjian Zhao, Hui Xie. 7-8 [doi]
- Mobility profiling: Identifying scouters in the crowdLicia Amichi, Aline Carneiro Viana, Mark Crovella, Antonio A. F. Loureiro. 9-11 [doi]
- Transparent Coded BlockchainLi Quan, Qin Huang. 12-13 [doi]
- Towards more realistic network models based on Graph Neural NetworksArnau Badia-Sampera, José Suárez-Varela, Paul Almasan, Krzysztof Rusek, Pere Barlet-Ros, Albert Cabellos-Aparicio. 14-16 [doi]
- iLoad: In-network Load Balancing with Programmable Data PlaneGaregin Grigoryan, Yaoqing Liu, Minseok Kwon. 17-19 [doi]
- Network in the AirAmir Varasteh, Wolfgang Kellerer, Carmen Mas Machuca. 20-22 [doi]
- On the Learnability of Software Router Performance via CPU MeasurementsCharles Shelbourne, Leonardo Linguaglossa, Aldo Lipani, Tianzhu Zhang, Fabien Geyer. 23-25 [doi]
- Asynchronous LOS Discovery Algorithm for Aerial Nodes Using In-band Full-Duplex TransceiversA. F. M. Saniul Haq, Mahmudur Khan, Murat Yuksel. 26-28 [doi]
- When Network Slicing meets Deep Reinforcement LearningQiang Liu 0013, Tao Han 0002. 29-30 [doi]
- Adversarial Network Algorithm BenchmarkingSebastian Lettner, Andreas Blenk. 31-33 [doi]
- Ward: Implementing Arbitrary Hierarchical Policies using Packet Resubmit in Programmable SwitchesMojtaba MalekpourShahraki, Brent Stephens, Balajee Vamanan. 34-36 [doi]
- Exploiting content similarity to address cold start in container deploymentsKunal Mahajan, Saket Mahajan, Vishal Misra, Dan Rubenstein. 37-39 [doi]
- Dynamically Sharing Memory between Memcached Tenants using TingoAmirHossein Seyri, Abhisek Pan, Balajee Vamanan. 40-42 [doi]
- Preliminary Study on Indoor Localization using Smartphone-Based IEEE 802.11mcAbhishek Kulkarni, Alvin Lim. 43-44 [doi]
- Investigating DNS Manipulation by Open DNS ResolversJeman Park 0001, Manar Mohaisen, Aziz Mohaisen. 45-46 [doi]
- Improving Survivability of LEO Satellite Network with guaranteed based approachShaoqing Wang, Youjian Zhao, Hui Xie. 47-48 [doi]
- Examining the Security of DDoS Detection Systems in Software Defined NetworksAhmed Abusnaina, DaeHun Nyang, Murat Yuksel, Aziz Mohaisen. 49-50 [doi]
- Tracking Down Sources of Spoofed IP PacketsOsvaldo L. H. M. Fonseca, Ítalo Cunha, Elverton C. Fazzion, Brivaldo Junior, Ronaldo A. Ferreira, Ethan Katz-Bassett. 51-53 [doi]
- One Pixel Image and RF Signal Based Split Learning for mmWave Received Power PredictionYusuke Koda, Jihong Park, Mehdi Bennis, Koji Yamamoto, Takayuki Nishio, Masahiro Morikura. 54-56 [doi]
- EBS: Electric Burst Scheduling system that supports future large bandwidth applications in scaleJingcheng Zhang, Min Zha, Lehong Niu. 57-58 [doi]
- In-network P4-based Low Latency Robot Arm ControlFabricio Rodriguez, Christian Esteve Rothenberg, Gergely Pongrácz. 59-61 [doi]
- IoT Resource-aware Orchestration Framework for Edge ComputingNiket Agrawal, Jan S. Rellermeyer, Aaron Yi Ding. 62-64 [doi]
- Efficient Microservices with Elastic ContainersGreg Cusack, Maziyar Nazari, Sepideh Goodarzy, Prerit Oberai, Eric Rozner, Eric Keller, Richard Han. 65-67 [doi]
- Towards a Scalable, Flexible and High Performance NFV Execution ModelPeng Zheng, Arvind Narayanan, Zhi-Li Zhang. 68-69 [doi]
- Stateless TCPMarcelo Abranches, Eric Keller. 70-71 [doi]
- An SVM Based DDoS Attack Detection Method for Ryu SDN ControllerShideh Yavary Mehr, Byrav Ramamurthy. 72-73 [doi]
- Fast Multi-string Pattern Matching using PISAShicheng Wang, Chang Liu, Ying Liu, Guanyu Li, Menghao Zhang, Yangyang Wang, Mingwei Xu. 74-75 [doi]
- Clé: Enhancing Security with Programmable Dataplane Enabled Hybrid SDNWendi Feng, Zhi-Li Zhang, Chuanchang Liu, Junliang Chen. 76-77 [doi]
- A Hybrid ICN Caching Strategy Based on Region DivisionHaibo Wu, Jun Li 0002, Jiang Zhi, Yongmao Ren, Lingling Li. 78-79 [doi]
- ML-Pushback: Machine Learning Based Pushback Defense Against DDoSYu Mi, an Wang. 80-81 [doi]
- Demo Proposal - Distrinet: a Mininet implementation for the CloudGiuseppe Di Lena, Andrea Tomassilli, Damien Saucez, Frédéric Giroire, Thierry Turletti, Chidung Lac. 82-83 [doi]
- PI2 for P4: An Active Queue Management Scheme for Programmable Data PlanesChrysa Papagianni, Koen De Schepper. 84-86 [doi]