Abstract is missing.
- Aggressive Internet-Wide Scanners: Network Impact and Longitudinal CharacterizationAniket Anand, Michalis Kallitsis 0001, Jackson Sippe, Alberto Dainotti. 1-8 [doi]
- Characterizing Distributed Mobile Augmented Reality Applications at the EdgeGiovanni Bartolomeo, Jacky Cao, Xiang Su, Nitinder Mohan. 9-18 [doi]
- The Performance of Post-Quantum TLS 1.3Markus Sosnowski, Florian Wiedner, Eric Hauser, Lion Steger, Dimitrios Schoinianakis, Sebastian Gallenmüller, Georg Carle. 19-27 [doi]
- Change Point Detection in WLANs with Random AP ForestsAlexis Huet, Jonatan Krolikowski, José Manuel Navarro, Fuxing Chen, Dario Rossi 0001. 29-36 [doi]
- Making Sense of Constellations: Methodologies for Understanding Starlink's Scheduling AlgorithmsHammas Bin Tanveer, Mike Puchol, Rachee Singh, Antonio Bianchi, Rishab Nithyanand. 37-43 [doi]
- LEO Satellite vs. Cellular Networks: Exploring the Potential for Synergistic IntegrationBin Hu 0001, Xumiao Zhang, Qixin Zhang, Nitin Varyani, Z. Morley Mao, Feng Qian 0001, Zhi-Li Zhang. 45-51 [doi]
- Poster: A Fast, Scalable, and Energy-efficient Edge Acceleration Architecture based on GPU ClusterYanwei Wang, Dongdong Su, Qianqian Zhao, Linge Xiao, Yanmei Shen, Kefeng Zhu. 53-54 [doi]
- Memory-efficient Random Forests in FPGA SmartNICsAndrea Monterubbiano, Raphaël Azorin, Gabriele Castellano, Massimo Gallo, Salvatore Pontarelli, Dario Rossi 0001. 55-56 [doi]
- Quantization-Aware In-Network Aggregation for Minimizing Communication OverheadHochan Lee, Heewon Kim, Chanbin Bae, Yujin Kim, Sangheon Pack. 57-58 [doi]
- Poster: What Keeps Your Network up at Night?Lukas Röllin, Romain Jacob, Laurent Vanbever. 59-60 [doi]
- Poster: Device Identification for Efficient Bluetooth BackscatterZhanxiang Huang, Wei Gong 0001. 61-62 [doi]
- Poster: Efficient BLE Backscatter with Excitation IdentificationMaoran Jiang, Wei Gong 0001. 63-64 [doi]
- Poster: Duty-Cycled Paging for LTE BackscatterYunyun Feng, Maoran Jiang, Wei Gong 0001. 65-66 [doi]
- The Cost of Retrying: Exploiting Retry-Mechanisms in Cloud Applications by DDoS AttacksJhonatan Tavori, Anat Bremler-Barr, Hanoch Levy. 67-68 [doi]
- How to Attack and Congest a Network? Worst-Case Link-Targeted DDoS AttacksJhonatan Tavori, Hanoch Levy. 69-70 [doi]
- Poster: Dynamic Clustered Federated Framework for Multi-domain Network Anomaly DetectionChunjiong Zhang, Byeong-hee Roh, Gaoyang Shan. 71-72 [doi]