Abstract is missing.
- Can Censorship Measurements Be Safe(r)?Ben Jones, Nick Feamster. 1 [doi]
- A Case for Marrying Censorship Measurements with CircumventionAqib Nisar, Aqsa Kashaf, Zartash Afzal Uzmi, Ihsan Ayyub Qazi. 2 [doi]
- Web Identity Translator: Behavioral Advertising and Identity Privacy with WITFotios Papaodyssefs, Costas Iordanou, Jeremy Blackburn, Nikolaos Laoutaris, Konstantina Papagiannaki. 3 [doi]
- Do You Know Where Your Headers Are? Comparing the Privacy of Network Architectures with Share Count AnalysisDavid Naylor, Peter Steenkiste. 4 [doi]
- Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-ThingsTianlong Yu, Vyas Sekar, Srinivasan Seshan, Yuvraj Agarwal, Chenren Xu. 5 [doi]
- Destroying networks for fun (and profit)Nick Shelly, Brendan Tschaen, Klaus-Tycho Förster, Michael Alan Chang, Theophilus Benson, Laurent Vanbever. 6 [doi]
- A First Step Towards Leveraging Commodity Trusted Execution Environments for Network ApplicationsSeong-Min Kim, Youjung Shin, Jaehyung Ha, Taesoo Kim, Dongsu Han. 7 [doi]
- SpaceHub: A Smart Relay System for Smart HomeMeng Meng, Lizhao You, Kun Tan, Jiansong Zhang, Wenjie Wang. 8 [doi]
- Room-Area NetworksPeter Anthony Iannucci, Ravi Netravali, Ameesh K. Goyal, Hari Balakrishnan. 9 [doi]
- One Hop for RPKI, One Giant Leap for BGP SecurityAvichai Cohen, Yossi Gilad, Amir Herzberg, Michael Schapira. 10 [doi]
- RiPKI: The Tragic Story of RPKI Deployment in the Web EcosystemMatthias Wählisch, Robert Schmidt, Thomas C. Schmidt, Olaf Maennel, Steve Uhlig, Gareth Tyson. 11 [doi]
- Bootstrapping Evolvability for Inter-Domain RoutingRaja R. Sambasivan, David Tran-Lam, Aditya Akella, Peter Steenkiste. 12 [doi]
- Why didn't my (great!) protocol get adopted?Mehdi Nikkhah, Constantine Dovrolis, Roch Guérin. 13 [doi]
- High Speed Networks Need Proactive Congestion ControlLavanya Jose, Lisa Yan, Mohammad Alizadeh, George Varghese, Nick McKeown, Sachin Katti. 14 [doi]
- Taking an AXE to L2 Spanning TreesJames McCauley, Alice Sheng, Ethan J. Jackson, Barath Raghavan, Sylvia Ratnasamy, Scott Shenker. 15 [doi]
- Xpander: Unveiling the Secrets of High-Performance DatacentersAsaf Valadarsky, Michael Dinitz, Michael Schapira. 16 [doi]
- Micro Load Balancing in Data Centers with DRILLSoudeh Ghorbani, Brighten Godfrey, Yashar Ganjali, Amin Firoozshahian. 17 [doi]
- Time's Forgotten: Using NTP to understand Internet LatencyRamakrishnan Durairajan, Sathiya Kumaran Mani, Joel Sommers, Paul Barford. 18 [doi]
- Leveraging the Power of Cloud for Reliable Wide Area CommunicationOsama Haq, Fahad R. Dogar. 19 [doi]
- Re-evaluating Measurement Algorithms in SoftwareOmid Alipourfard, Masoud Moshref, Minlan Yu. 20 [doi]
- Enabling a "RISC" Approach for Software-Defined Monitoring using Universal StreamingZaoxing Liu, Gregory Vorsanger, Vladimir Braverman, Vyas Sekar. 21 [doi]
- Transparency Instead of NeutralityChristos Pappas, Katerina J. Argyraki, Stefan Bechtold, Adrian Perrig. 22 [doi]
- Towards Programmable Packet SchedulingAnirudh Sivaraman, Suvinay Subramanian, Anurag Agrawal, Sharad Chole, Shang-Tse Chuang, Tom Edsall, Mohammad Alizadeh, Sachin Katti, Nick McKeown, Hari Balakrishnan. 23 [doi]
- Universal Packet SchedulingRadhika Mittal, Rachit Agarwal 0001, Sylvia Ratnasamy, Scott Shenker. 24 [doi]
- Differential Provenance: Better Network Diagnostics with Reference EventsAng Chen, Yang Wu, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo. 25 [doi]
- Automated Network Repair with Meta ProvenanceYang Wu, Ang Chen, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo. 26 [doi]