Abstract is missing.
- Designing a quantum network protocolWojciech Kozlowski, Axel Dahlberg, Stephanie Wehner. 1-16 [doi]
- RoCC: robust congestion control for RDMAParvin Taheri, Danushka Menikkumbura, Erico Vanini, Sonia Fahmy, Patrick Eugster, Tom Edsall. 17-30 [doi]
- Near-optimal multihop scheduling in general circuit-switched networksHimanshu Gupta, Max Curran, Caitao Zhan. 31-45 [doi]
- When wells run dry: the 2020 IPv4 address marketLars Prehn, Franziska Lichtblau, Anja Feldmann. 46-54 [doi]
- DynamIPs: analyzing address assignment practices in IPv4 and IPv6Ramakrishna Padmanabhan, John P. Rula, Philipp Richter, Stephen D. Strowes, Alberto Dainotti. 55-70 [doi]
- Drop the packets: using coarse-grained data to detect video performance issuesTarun Mangla, Emir Halepovic, Ellen W. Zegura, Mostafa H. Ammar. 71-77 [doi]
- FCM-sketch: generic network measurements with data plane supportCha Hwan Song, Pravein Govindan Kannan, Bryan Kian Hsiang Low, Mun Choon Chan. 78-92 [doi]
- Optimizing distributed training deployment in heterogeneous GPU clustersXiaodong Yi 0001, Shiwei Zhang, Ziyue Luo, Guoping Long, Lansong Diao, Chuan Wu, Zhen Zheng, Jun Yang, Wei Lin. 93-107 [doi]
- Job scheduling for large-scale machine learning clustersHaoyu Wang 0002, Zetian Liu, Haiying Shen. 108-120 [doi]
- MPCC: online learning multipath transportTomer Gilad, Neta Rozen Schiff, Philip Brighten Godfrey, Costin Raiciu, Michael Schapira. 121-135 [doi]
- CEFS: compute-efficient flow scheduling for iterative synchronous applicationsShuai Wang, Dan Li, Jiansong Zhang, Wei Lin. 136-148 [doi]
- Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSHDimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis. 149-156 [doi]
- Return of version downgrade attack in the era of TLS 1.3Sangtae Lee, Youngjoo Shin, Junbeom Hur. 157-168 [doi]
- RIoTMAN: a systematic analysis of IoT malware behaviorAhmad Darki, Michalis Faloutsos. 169-182 [doi]
- You do (not) belong here: detecting DPI evasion attacks with context learningShitong Zhu, Shasha Li, Zhongjie Wang 0002, Xun Chen, Zhiyun Qian, Srikanth V. Krishnamurthy, Kevin S. Chan, Ananthram Swami. 183-197 [doi]
- A modular compiler for network programming languagesHao Li 0011, Peng Zhang, Guangda Sun, Chengchen Hu, Danfeng Shan, Tian Pan 0001, Qiang Fu 0011. 198-210 [doi]
- Testing compilers for programmable switches through switch hardware simulationMichael D. Wong, Aatish Kishan Varma, Anirudh Sivaraman. 211-217 [doi]
- Finding hard-to-find data plane bugs with a PTAPietro Bressana, Noa Zilberman, Robert Soulé. 218-231 [doi]
- Agora: Real-time massive MIMO baseband processing in softwareJian Ding, Rahman Doost-Mohammady, Anuj Kalia, Lin Zhong 0001. 232-244 [doi]
- LiBRA: learning-based link adaptation leveraging PHY layer information in 60 GHz WLANsShivang Aggarwal, Urjit Satish Sardesai, Viral Sinha, Deen Dayal Mohan, Moinak Ghoshal, Dimitrios Koutsonikolas. 245-260 [doi]
- Multiprotocol backscatter for personal IoT sensorsWei Gong 0001, Longzhi Yuan, Qiwei Wang, Jia Zhao. 261-273 [doi]
- Parking packet payload with P4Swati Goswami, Nodir Kodirov, Craig Mustard, Ivan Beschastnikh, Margo I. Seltzer. 274-281 [doi]
- Forwarding and routing with packet subscriptionsTheo Jepsen, Ali Fattaholmanan, Masoud Moshref, Nate Foster, Antonio Carzaniga, Robert Soulé. 282-294 [doi]
- Newton: intent-driven network traffic monitoringYu Zhou, Dai Zhang, Kai Gao, Chen Sun, Jiamin Cao, Yangyang Wang, Mingwei Xu, Jianping Wu. 295-308 [doi]
- Optimal approximations for traffic distribution in bounded switch memoriesYaniv Sadeh, Ori Rottenstreich, Haim Kaplan. 309-322 [doi]
- Palmtrie: a ternary key matching algorithm for IP packet filtering rulesHirochika Asai. 323-335 [doi]
- DeepMatch: practical deep packet inspection in the data plane using network processorsJoel Hypolite, John Sonchack, Shlomo Hershkop, Nathan Dautenhahn, André DeHon, Jonathan M. Smith. 336-350 [doi]
- Domino: using network measurements to reduce state machine replication latency in WANsXinan Yan, Linguan Yang, Bernard Wong. 351-363 [doi]
- Mind the delay: the adverse effects of delay-based TCP on HTTPNeil Agarwal, Matteo Varvello, Andrius Aucinas, Fabián E. Bustamante, Ravi Netravali 0001. 364-370 [doi]
- Judicious QoS using cloud overlaysOsama Haq, Cody Doucette, John W. Byers, Fahad R. Dogar. 371-385 [doi]
- Multi-user augmented reality with communication efficient and spatially consistent virtual objectsXukan Ran, Carter Slocum, Yi-Zhen Tsai, Kittipat Apicharttrisorn, Maria Gorlatova, Jiasi Chen. 386-398 [doi]
- ZipLine: in-network compression at line speedSébastien Vaucher, Niloofar Yazdani, Pascal Felber, Daniel E. Lucani, Valerio Schiavoni. 399-405 [doi]
- Metronome: adaptive and precise intermittent packet retrieval in DPDKMarco Faltelli, Giacomo Belocchi, Francesco Quaglia, Salvatore Pontarelli, Giuseppe Bianchi 0001. 406-420 [doi]
- IntSight: diagnosing SLO violations with in-band network telemetryJonatas Adilson Marques, Kirill Levchenko, Luciano Paschoal Gaspary. 421-434 [doi]
- When filtering is not possible caching negatives with fingerprints comes to the rescuePedro Reviriego, Salvatore Pontarelli. 435-442 [doi]
- Keep your communities clean: exploring the routing message impact of BGP communitiesThomas Krenc, Robert Beverly, Georgios Smaragdakis. 443-450 [doi]
- Chameleon: predictable latency and high utilization with queue-aware and adaptive source routingAmaury Van Bemten, Nemanja Deric, Amir Varasteh, Stefan Schmid 0001, Carmen Mas Machuca, Andreas Blenk, Wolfgang Kellerer. 451-465 [doi]
- Detecting routing loops in the data planeJan Kucera 0004, Ran Ben-Basat, Mário Kuka, Gianni Antichi, Minlan Yu, Michael Mitzenmacher. 466-473 [doi]
- AalWiNes: a fast and quantitative what-if analysis tool for MPLS networksPeter Gjøl Jensen, Dan Kristiansen, Stefan Schmid 0001, Morten Konggaard Schou, Bernhard Clemens Schrenk, Jirí Srba. 474-481 [doi]
- AED: incrementally synthesizing policy-compliant and manageable configurationsAnubhavnidhi Abhashkumar, Aaron Gember-Jacobson, Aditya Akella. 482-495 [doi]
- SD-access: practical experiences in designing and deploying software defined enterprise networksJordi Paillisse, Marc Portoles, Albert Lopez, Alberto Rodríguez Natal, David Iacobacci, Johnson Leong, Victor Moreno, Albert Cabellos, Fabio Maino, Sanjay Hooda. 496-508 [doi]
- Meeting SLOs in cross-platform NFVJane Yen, Jianfeng Wang, Sucha Supittayapornpong, Marcos Augusto M. Vieira, Ramesh Govindan, Barath Raghavan. 509-523 [doi]
- FDP: a teaching and demo platform for SDNHeena Nagda, Rakesh Nagda, Isaac Pedisich, Nik Sultana, Boon Thau Loo. 524-525 [doi]
- OpenQUIC: software-defined transmission like building blocksLizhuang Tan, Wei Su, Xiaochuan Gao, Wei Zhang. 526-527 [doi]
- Performance penalties of resilient SDN infrastructuresDaniel Senf, Haya Shulman, Michael Waidner. 528-529 [doi]
- Evaluating RPKI ROV identification methodologies in automatically generated mininet topologiesNils Rodday, Ruben van Baaren, Luuk Hendriks, Roland van Rijswijk-Deij, Aiko Pras, Gabi Dreo. 530-531 [doi]
- Realistic testing of RTC applications under mobile networksGianluca Perna, Martino Trevisan, Danilo Giordano. 532-533 [doi]
- Slicing 5G fronthaul networks using programmable switchesNishant Budhdev, Raj Joshi, Pravein Govindan Kannan, Mun Choon Chan, Tulika Mitra. 534-535 [doi]
- DISCOvering the heavy hitters with disaggregated sketchesValerio Bruschi, Ran Ben-Basat, Zaoxing Liu, Gianni Antichi, Giuseppe Bianchi 0001, Michael Mitzenmacher. 536-537 [doi]
- q-MAX algorithmRan Ben-Basat, Gil Einziger, Bilal Tayh. 538-539 [doi]
- Popularity-based transcoding workload allocation for improving video quality in live streaming systemsDayoung Lee, Minseok Song 0002. 540-541 [doi]
- Cross-layer metrics sharing for QUICker video streamingJoris Herbots, Maarten Wijnants 0001, Wim Lamotte, Peter Quax. 542-543 [doi]
- Delay-aware distributed caching scheme in edge networkChang Kyung Kim, Taeyoung Kim, Anna Cho, SuKyoung Lee. 544-545 [doi]
- A distributed reinforcement learning approach for energy and congestion-aware edge networksAlessio Sacco, Flavio Esposito, Guido Marchetto. 546-547 [doi]
- Stateless CPU-aware datacenter load-balancingTom Barbette, Marco Chiesa, Gerald Q. Maguire Jr., Dejan Kostic. 548-549 [doi]
- Multi-directional CPU resource control in edge computingYoung Ki Kim, Albert Y. Zomaya. 550-551 [doi]
- PANGU: a cloud-edge collaborative resource management platform centered on supercomputingMeihong Yang, Wei Zhang, Yuhan Zhao, Lizhuang Tan. 552-553 [doi]
- Auto-tuning of large-scale iterative operations on modern streaming platformsM. Reza Hoseinyfarahabady, Javid Taheri, Albert Y. Zomaya, Zahir Tari. 554-555 [doi]
- Distributing deep learning inference on edge devicesBuddhi Gunarathne, Chiranthana Prabhath, Vinura Perera, Kutila Gunasekara. 556-557 [doi]
- Towards explainable artificial intelligence for network function virtualizationSachin Sharma, Avishek Nag, Luís Cordeiro, Omran Ayoub, Massimo Tornatore, Maziar Nekovee. 558-559 [doi]
- Estimation of traffic matrices via super-resolution and federated learningRoberto Amoroso, Flavio Esposito, Maria Luisa Merani. 560-561 [doi]
- Combining split and federated architectures for efficiency and privacy in deep learningValeria Turina, Zongshun Zhang, Flavio Esposito, Ibrahim Matta. 562-563 [doi]
- Black-box caches fingerprintingAmit Klein, Elias Heftrig, Haya Shulman, Michael Waidner. 564-565 [doi]