Abstract is missing.
- Corybantic: towards the modular composition of SDN control programsJeffrey C. Mogul, Alvin AuYoung, Sujata Banerjee, Lucian Popa, Jeongkeun Lee, Jayaram Mudigonda, Puneet Sharma, Yoshio Turner. 1 [doi]
- Applying operating system principles to SDN controller designMatthew Monaco, Oliver Michel, Eric Keller. 2 [doi]
- Answering why-not queries in software-defined networks with negative provenanceYang Wu, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo. 3 [doi]
- Full duplex backscatterDinesh Bharadia, Kiran Raj Joshi, Sachin Katti. 4 [doi]
- Pharos: enable physical analytics through visible light based indoor localizationPan Hu, Liqun Li, Chunyi Peng, Guobin Shen, Feng Zhao. 5 [doi]
- Inaccurate spectrum databases?: public transit to its rescue!Tan Zhang, Suman Banerjee. 6 [doi]
- Give in to procrastination and stop prefetchingLenin Ravindranath, Sharad Agarwal, Jitendra Padhye, Christopher Riederer. 7 [doi]
- Tiny packet programs for low-latency network control and monitoringVimalkumar Jeyakumar, Mohammad Alizadeh, Changhoon Kim, David Mazières. 8 [doi]
- Network stack specialization for performanceIlias Marinos, Robert N. M. Watson, Mark Handley. 9 [doi]
- Network support for resource disaggregation in next-generation datacentersSangjin Han, Norbert Egi, Aurojit Panda, Sylvia Ratnasamy, Guangyu Shi, Scott Shenker. 10 [doi]
- On the validity of geosocial mobility tracesZengbin Zhang, Lin Zhou, Xiaohan Zhao, Gang Wang, Yu Su, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao. 11 [doi]
- AdReveal: improving transparency into online targeted advertisingBin Liu 0004, Anmol Sheth, Udi Weinsberg, Jaideep Chandrashekar, Ramesh Govindan. 12 [doi]
- Towards comprehensive social sharing of recommendations: augmenting push with pullHarsha V. Madhyastha, Megha Maiya. 13 [doi]
- Crypto-Book: an architecture for privacy preserving online identitiesJohn Maheswaran, David Isaac Wolinsky, Bryan Ford. 14 [doi]
- Cross-path inference attacks on multipath TCPM. Zubair Shafiq, Franck Le, Mudhakar Srivatsa, Alex X. Liu. 15 [doi]
- On the risk of misbehaving RPKI authoritiesDanny Cooper, Ethan Heilman, Kyle Brogle, Leonid Reyzin, Sharon Goldberg. 16 [doi]
- Active securityRyan Hand, Michael Ton, Eric Keller. 17 [doi]
- Toward a verifiable software dataplaneMihai Dobrescu, Katerina J. Argyraki. 18 [doi]
- No silver bullet: extending SDN to the data planeAnirudh Sivaraman, Keith Winstein, Suvinay Subramanian, Hari Balakrishnan. 19 [doi]
- On consistent updates in software defined networksRatul Mahajan, Roger Wattenhofer. 20 [doi]
- Towards minimal-delay deadline-driven data center TCPLi Chen, Shuihai Hu, Kai Chen 0005, Haitao Wu, Danny H. K. Tsang. 21 [doi]
- Trevi: watering down storage hotspots with cool fountain codesGeorge Parisis, Toby Moncaster, Anil Madhavapeddy, Jon Crowcroft. 22 [doi]
- Patch panels in the sky: a case for free-space optics in data centersNavid Hamed Azimi, Himanshu Gupta, Vyas Sekar, Samir R. Das. 23 [doi]
- Managing the network with MerlinRobert Soulé, Shrutarshi Basu, Robert Kleinberg, Emin Gün Sirer, Nate Foster. 24 [doi]
- How to improve your network performance by asking your provider for worse serviceRadhika Mittal, Justine Sherry, Sylvia Ratnasamy, Scott Shenker. 25 [doi]
- Plinko: building provably resilient forwarding tablesBrent Stephens, Alan L. Cox, Scott Rixner. 26 [doi]