Abstract is missing.
- Network recovery from massive failures under uncertain knowledge of damagesDiman Zad Tootaghaj, Hana Khamfroush, Novella Bartolini, Stefano Ciavarella, Seamus Hayes, Thomas F. La Porta. 1-9 [doi]
- Post sockets: Towards an evolvable network transport interfaceBrian Trammell, Colin Perkins, Mirja Kühlewind. 1-6 [doi]
- 2 queuing discipline for classic TCP traffic in ns-3Rohit P. Tahiliani, Hitesh Tewari. 1-6 [doi]
- A content-based centrality metric for collaborative caching in information-centric fogsJunaid Ahmed Khan, Cédric Westphal, Yacine Ghamri-Doudane. 1-6 [doi]
- SEMUD: Secure multi-hop device-to-device communication for 5G public safety networksMilan Schmittner, Arash Asadi, Matthias Hollick. 1-9 [doi]
- A crowdsourcing and simulation based approach for fast and accurate Wi-Fi radio map construction in urban environmentTatsuya Amano, Shugo Kajita, Hirozumi Yamaguchi, Teruo Higashino, Mineo Takai. 1-9 [doi]
- Benchmarking and simulating the fundamental scaling behaviors of a MapReduce engineBrenton Walker. 1-6 [doi]
- Mobile sessions in content-centric networksMarc Mosko, Ersin Uzun, Christopher A. Wood. 1-9 [doi]
- Efficient multipath flow monitoringSamuel Micka, Sean Yaw, Brittany Terese Fasy, Brendan Mumey, Mike P. Wittie. 1-9 [doi]
- Packing strictly-shortest paths in a tree for QoS-aware routingJose Yallouz, János Tapolcai, Attila Körösi, Kristóf Bérczi, László Gyimóthi, Ariel Orda. 1-9 [doi]
- Raptor: Scalable rule placement over multiple path in software defined networksPravein Govindan Kannan, Mun Choon Chan, Richard T. B. Ma, Ee-Chien Chang. 1-9 [doi]
- A deployable identifier-locator split architectureSpencer Sevilla, J. J. Garcia-Luna-Aceves. 1-9 [doi]
- DRENCH: A semi-distributed resource management framework for NFV based service function chainingArgyrios G. Tasiopoulos, Sameer G. Kulkarni, Mayutan Arumaithurai, Ioannis Psaras, K. K. Ramakrishnan, Xiaorning Fu, George Pavlou. 1-9 [doi]
- Remote measurement of interrupt-coalescence latency of internet hostsKhondaker M. Salehin, Vinitmadhukar Sahasrabudhe, Roberto Rojas-Cessa. 1-9 [doi]
- FlowScope: Efficient packet capture and storage in 100 Gbit/s networksPaul Emmerich, Maximilian Pudelko, Sebastian Gallenmüller, Georg Carle. 1-9 [doi]
- Guard: Secure routing in skip graphSanaz Taheri-Boshrooyeh, Oznur Ozkasap. 1-2 [doi]
- Understanding multistreaming for web traffic: An experimental studyMohammad Rajiullah, A. C. Mohideen, Felix Weinrank, Raffaello Secchi, Godred Fairhurst, Anna Brunstrom. 1-6 [doi]
- Design and performance evaluation of bearer aggregation method in mobile core network with C/U plane separationShuya Abe, Go Hasegawa, Masayuki Murata. 1-8 [doi]
- BFR: A bloom filter-based routing approach for information-centric networksAli Marandi, Torsten Braun, Kavé Salamatian, Nikolaos Thomos. 1-9 [doi]
- Model-based design and analysis of cache hierarchiesAmr Rizk, Michael Zink, Ramesh K. Sitaraman. 1-9 [doi]
- Isolated in-band communication for distributed SDN controllersRhaban Hark, Amr Rizk, Nils Richerzhagen, Björn Richerzhagen, Ralf Steinmetz. 1-2 [doi]
- Evaluating CAIA delay gradient as a candidate for deadline-aware less-than-best-effort transportTor Christian Tangenes, David A. Hayes, Andreas Petlund, David Ros. 1-6 [doi]
- Ads versus regular contents: Dissecting the web hosting ecosystemPradeep Bangera, Sergey Gorinsky. 1-9 [doi]
- Towards an adaptive selection of loss estimation techniques in software-defined networksRhaban Hark, Nils Richerzhagen, Björn Richerzhagen, Amr Rizk, Ralf Steinmetz. 1-9 [doi]
- Predicting SLA conformance for cluster-based servicesRafael Pasquini, Farnaz Moradi, Jawwad Ahmed, Andreas Johnsson, Christofer Flinta, Rolf Stadler. 1-2 [doi]
- A framework for less than best effort congestion control with soft deadlinesDavid A. Hayes, David Ros, Andreas Petlund, Iffat Ahmed. 1-9 [doi]
- Observing IoT resources over ICNHasan M. A. Islam, Dmitrij Lagutin, Nikos Fotiou. 1-8 [doi]
- Access control management and orchestration in NFV environmentTran Quang Thanh, Stefan Covaci, Marius Corici, Thomas Magedanz. 1-2 [doi]
- Decentralized network protection games in adversarial environmentsSiddharth Pal, Ertugrul N. Ciftcioglu, Prithwish Basu, Kevin S. Chan, Ananthram Swami. 1-9 [doi]
- Joint backup capacity allocation and embedding for survivable virtual networksNashid Shahriar, Shihabur Rahman Chowdhury, Reaz Ahmed, Aimal Khan, Raouf Boutaba, Jeebak Mitra, Liu Liu. 1-9 [doi]
- Protecting the long tail: Transparent packet security in content-centric networksChristopher A. Wood. 1-9 [doi]
- Remote controlled performance analysis of embedded wireless sensor networksAlbert Potsch, Stefan Hujber, Andreas Springer. 1-2 [doi]
- Fragility risks of low latency dynamic queuing in large-scale clouds: Complex system perspectiveV. Marbukh. 1-6 [doi]
- SoDA: Enabling CDN-ISP collaboration with software defined anycastMatthias Wichtlhuber, Jan Kessler, Sebastian Bucker, Ingmar Poese, Jeremias Blendin, Christian Koch 0003, David Hausheer. 1-9 [doi]
- A mood value for fair resource allocationsFrancesca Fossati, Stefano Moretti, Stefano Secci. 1-9 [doi]
- On the impact of sybil attacks in cooperative driving scenariosFelipe Boeira, Marinho P. Barcellos, Edison Pignaton de Freitas, Alexey Vinel, Mikael Asplund. 1-2 [doi]
- Load balancing memcached traffic using software defined networkingAnat Bremler-Barr, David Hay, Idan Moyal, Liron Schiff. 1-9 [doi]
- Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical studyZainab Abaid, Mohamed Ali Kâafar, Sanjay Jha. 1-9 [doi]
- A NEAT framework for application-awareness in SDN environmentsRicardo Santos, Zdravko Bozakov, Simone Mangiante, Anna Brunstrom, Andreas Kassler. 1-2 [doi]
- Traffic engineering using segment routing and considering requirements of a carrier IP networkTimmy Schuller, Nils Aschenbruck, Markus Chimani, Martin Horneffer, Stefan Schnitter. 1-9 [doi]
- On broadcast-based self-learning in named data networkingJunxiao Shi, Eric Newberry, Beichuan Zhang. 1-9 [doi]
- DISCO: Distributed traffic flow consolidation for power efficient data center networkKuangyu Zheng, Xiaorui Wang, Jia Liu. 1-9 [doi]
- Distributing dynamic divisible loadsMing Zeng, Viktoria Fodor. 1-2 [doi]
- Packer: Minimizing multi-resource fragmentation and performance interference in datacentersDaniel S. Marcon, Marinho P. Barcellos. 1-9 [doi]
- Raising the datagram API to support transport protocol evolutionTom Jones, Gorry Fairhurst, Colin Perkins. 1-6 [doi]
- Session support for SCNMikael Gasparian, Guillaume Corsini, Torsten Braun, Eryk Schiller, Jonnahtan Saltarin. 1-6 [doi]
- Secure chain replicationBerkin Guler, Öznur Özkasap. 1-2 [doi]
- Securing virtual network function placement with high availability guaranteesMarco Casazza, Pierre Fouilhoux, Mathieu Bouet, Stefano Secci. 1-9 [doi]
- Multi-Channel Scatter (MCS): Traffic balancing based on edge-switching in datacenter networksZhaogeng Li, Jun Bi, Yangyang Wang. 1-9 [doi]
- Measuring PHY layer interactions between LoRa and IEEE 802.15.4g networksCharalampos Orfanidis, Laura Marie Feeney, Martin Jacobsson. 1-2 [doi]
- Alternative backoff: Achieving low latency and high throughput with ECN and AQMNaeem Khademi, Grenville Armitage, Michael Welzl, Sebastian Zander, Gorry Fairhurst, David Ros. 1-9 [doi]
- Can SDN accelerate BGP convergence? - A performance analysis of inter-domain routing centralizationPavlos Sermpezis, Xenofontas A. Dimitropoulos. 1-9 [doi]
- Binary contention resolution for M2M random access prioritization in LTE-A and 5GMikhail Vilgelm, Wolfgang Kellerer. 1-2 [doi]
- A lightweight measurement platform for home internet monitoringIan Marsh. 1-2 [doi]
- Execution state management in named function networkingChristopher Scherb, Balazs Faludi, Christian F. Tschudin. 1-6 [doi]
- How fast can you reconfigure your partially deployed SDN network?Christian Sieber, Raphael Durner, Wolfgang Kellerer. 1-9 [doi]
- A graph theoretic approach to fast and accurate malware detectionZubair Shafiq, Alex Liu. 1-9 [doi]
- Available bandwidth estimation from passive TCP measurements using the probe gap modelSukhpreet Kaur Khangura, Markus Fidler. 1-9 [doi]
- A template approach for group key distribution in dynamic ad-hoc groupsBruhadeshwar Bezawada, Alex X. Liu, Xiaojiang Liang, Rui Li. 1-9 [doi]
- In-network live stream processing with named functionsChristopher Scherb, Claudio Marxer, Urs Schnurrenberger, Christian F. Tschudin. 1-6 [doi]
- On per-flow delay bounds in tandem queues under (In)dependent arrivalsPaul Nikolaus, Jens B. Schmitt. 1-9 [doi]
- Edge-ICN and its application to the Internet of ThingsNikos Fotiou, Vasilios A. Siris, George Xylomenos, George C. Polyzos, Konstantinos V. Katsaros, George Petropoulos. 1-6 [doi]
- A green small cells deployment in 5G - Switch ON/OFF via IoT networks & energy efficient mesh backhaulingImed Allal, Bruno Mongazon-Cazavet, Khaldoun Al Agha, Sidi-Mohammed Senouci, Yvon Gourhant. 1-2 [doi]
- Transparent flow mapping for NEATFelix Weinrank, Michael Tüxen. 1-6 [doi]
- Greedy caching: A latency-aware caching strategy for information-centric networksBitan Banerjee, Anand Seetharam, Chintha Tellambura. 1-9 [doi]
- Resilient placement of virtual process control functions in mobile edge cloudsPeiyue Zhao, György Dán. 1-9 [doi]
- PRIVO: A privacy-preserving opportunistic routing protocol for delay tolerant networksNaercio Magaia, Carlos Borrego, Paulo Pereira, Miguel Correia. 1-9 [doi]
- Probe or wait: Handling tail losses using multipath TCPKiran Yedugundla, Per Hurtig, Anna Brunstrom. 1-6 [doi]
- How HTTP/2 pushes the web: An empirical study of HTTP/2 server pushTorsten Zimmermann, Jan Rüth, Benedikt Wolters, Oliver Hohlfeld. 1-9 [doi]
- DTN-RPC: Remote procedure calls for disruption-tolerant networkingArtur Sterz, Lars Baumgärtner, Ragnar Mogk, Mira Mezini, Bernd Freisleben. 1-9 [doi]
- Cascade size prediction in online social networksZubair Shafiq, Alex Liu. 1-9 [doi]