Abstract is missing.
- Efficient User-Cell Association for 360 Video Streaming over Wireless NetworksPo-Han Huang, Konstantinos Psounis. 1-9 [doi]
- Packet Delay Minimization in Multi-hop Wireless Sensor Networks with Periodic TrafficBartlomiej Ostrowski, Michal Pióro, Artur Tomaszewski. 1-9 [doi]
- PBC: Effective Prefix Caching for Fast Name LookupsChuwen Zhang, Yong Feng, Haoyu Song, Beichuan Zhang, Yi Wang 0004, Ying Wan, Wenquan Xu, Bin Liu 0001. 1-9 [doi]
- Performance Comparison of Messaging Protocols and Serialization Formats for Digital Twins in IoVDaniel Persson Proos, Niklas Carlsson. 10-18 [doi]
- IoT Content Object Security with OSCORE and NDN: A First Experimental ComparisonCenk Gündogan, Christian Amsüss, Thomas C. Schmidt, Matthias Wählisch. 19-27 [doi]
- Revealing QoE of Web Users from Encrypted Network TrafficAlexis Huet, Antoine Saverimoutou, Zied Ben-Houidi, Hao Shi, Shengming Cai, Jinchun Xu, Bertrand Mathieu, Dario Rossi. 28-36 [doi]
- On the Practical Detection of Hierarchical Heavy HittersJalil Moraney, Danny Raz. 37-45 [doi]
- How Online Social Ties Influence the Epidemic Spreading of a Multiplex Network?Xianzhe Tang, Yuan Zhang, Cong Li, Xiang Li. 46-54 [doi]
- Virtual Network Functions Placement and Routing Problem: Path formulationAhlam Mouaci, Éric Gourdin, Ivana Ljubic, Nancy Perrot. 55-63 [doi]
- A Rank-based Mechanism for Service Placement in the FogKarima Velasquez, David Perez Abreu, Luís Paquete, Marília Curado, Edmundo Monteiro. 64-72 [doi]
- FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at RuntimeYu Zhou 0008, Jun Bi, Cheng Zhang, Mingwei Xu, Jinaping Wu. 73-81 [doi]
- Anytime Backtrack Unimodal Bandits and Applications to Cloud ComputingStephan Kunne, Lorenzo Maggi, Johanne Cohen, Xinneng Xu. 82-90 [doi]
- NFV Performance Profiling on Multi-core ServersPeng Zheng, Wendi Feng, Arvind Narayanan, Zhi-Li Zhang. 91-99 [doi]
- On Max-Min Fairness of Completion Times for Multi-Task Job SchedulingMehrnoosh Shafiee, Javad Ghaderi. 100-108 [doi]
- Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center NetworksWeifeng Zhangy, Dongfang Lingy, Yuanrong Zhangy, Pengfei Liy, Guo Cheny. 109-117 [doi]
- Measuring Decentralized Video Streaming: A Case Study of DTubeTrinh Viet Doan, Tat Dat Pham, Markus Oberprieler, Vaibhav Bajpai. 118-126 [doi]
- EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular NetworksAbhijit Mondal, Basabdatta Palit, Somesh Khandelia, Nibir Pal, Jay Jayatheerthan, Krishna Paul, Niloy Ganguly, Sandip Chakraborty. 127-135 [doi]
- On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of ExperiencesIoannis Selinis, Ning Wang, Bin Da, Delei Yu, Rahim Tafazolli. 136-144 [doi]
- Optimized Dynamic Cache InstantiationNiklas Carlsson, Derek L. Eager. 145-153 [doi]
- Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath SchedulerBinbin Liao, Guangxing Zhang, Zulong Diao, Gaogang Xie. 154-162 [doi]
- Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning ApproachWeixi Mao, Lei Wang, Jin Zhao, Yuedong Xu. 163-171 [doi]
- Joint Coreset Construction and Quantization for Distributed Machine LearningHanlin Lu, Changchang Liu, Shiqiang Wang, Ting He 0001, Vijaykrishnan Narayanan, Kevin S. Chan, Stephen Pasteris. 172-180 [doi]
- Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine LearningDaqing Yun, Wuji Liu, Chase Q. Wu, Nageswara S. V. Rao, Rajkumar Kettimuthu. 181-189 [doi]
- Characterizing the Root Landscape of Certificate Transparency LogsNikita Korzhitskii, Niklas Carlsson. 190-198 [doi]
- Scaling website fingerprintingVincent Ghiëtte, Christian Doerr. 199-207 [doi]
- Tracking Down Sources of Spoofed IP PacketsOsvaldo L. H. M. Fonseca, Ítalo Cunha, Elverton C. Fazzion, Wagner Meira Jr., Brivaldo Junior, Ronaldo A. Ferreira, Ethan Katz-Bassett. 208-216 [doi]
- Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet ServicesHarm Griffioen, Christian Doerr. 217-225 [doi]
- RTCP - Reduce Delay Variability with an End-to-end ApproachLongbo Huang, Yuxing Li, Jean C. Walrand. 235-243 [doi]
- Enabling Premium Service for Streaming Video in Cellular NetworksXing Xu, Ramesh Govindan, Ajay Mahimkar, N. K. Shankaranarayanan, Jia Wang, Minlan Yu. 244-252 [doi]
- A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data TransfersGaurav R. Ghosal, Dipak Ghosal, Alex Sim, Aditya V. Thakur, Kesheng Wu. 253-261 [doi]
- Approaching Fair Collision-Free Channel Access with Slotted ALOHA Using Collaborative Policy-Based Reinforcement LearningLuca de Alfaro, Molly Zhang, J. J. Garcia-Luna-Aceves. 262-270 [doi]
- Fast Reinforcement Learning Algorithms for Resource Allocation in Data CentersYuang Jiang, Murali S. Kodialam, T. V. Lakshman, Sarit Mukherjee, Leandros Tassiulas. 271-279 [doi]
- Privacy-Preserving Blockchain-Based Data Sharing Platform for Decentralized Storage SystemsVan-Hoan Hoang, Elyes Lehtihet, Yacine Ghamri-Doudane. 280-288 [doi]
- Mapping the Interplanetary FilesystemSebastian A. Henningsen, Martin Florian, Sebastian Rust, Björn Scheuermann 0001. 289-297 [doi]
- How to Securely Prune Bitcoin's BlockchainRoman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle. 298-306 [doi]
- An Analytical Model for Assessing the Performance of IEEE 802.11ad Beamforming TrainingMohammed Dahhani, André-Luc Beylot, Gentian Jakllari. 307-315 [doi]
- Implications of Routing Coherence and Consistency on Network OptimizationYvonne Anne Pignolet, Stefan Schmid 0001, Gilles Trédan. 316-324 [doi]
- Performance Analysis of VPN GatewaysMaximilian Pudelko, Paul Emmerich, Sebastian Gallenmüller, Georg Carle. 325-333 [doi]
- Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality ViolationsMarcio Barbosa de Carvalho, Vitor A. Cunha, Eduardo da Silva, Daniel Corujo, João Paulo Barraca, Rui L. Aguiar, Lisandro Zambenedetti Granville. 334-342 [doi]
- Evaluation of Centralised vs Distributed Collaborative Intrusion Detection Systems in Multi-Access Edge ComputingRahul Sharma, Chien Aun Chan, Christopher Leckie. 343-351 [doi]
- Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated LearningQiaofeng Qin, Konstantinos Poularakis, Kin K. Leung, Leandros Tassiulas. 352-360 [doi]
- An agent-based model of IPv6 adoptionIoana Livadariu, Ahmed Elmokashfi, Amogh Dhamdhere. 361-369 [doi]
- A Nation-Wide Wi-Fi RSSI Dataset: Statistical Analysis and Resulting InsightsGermán Capdehourat, Federico Larroca, Gastón Morales. 370-378 [doi]
- Estimating Server Load Based on its Correlation with TCP SYN Response TimeLuis de Pedro, Marta Martínez Redondo, Cristina Mancha, Jorge E. López de Vergara. 379-385 [doi]
- QWIN: Facilitating QoS in Wireless Industrial Networks Through CooperationMartin Serror, Eric Wagner 0003, René Glebke, Klaus Wehrle. 386-394 [doi]
- MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area NetworksTeri Lenard, Roland Bolboaca, Béla Genge, Piroska Haller. 395-403 [doi]
- CSBR: A Cosine Similarity Based Selective Broadcast Routing Protocol for Vehicular Ad-Hoc NetworksAnkur Nahar, Himani Sikarwar, Debasis Das. 404-412 [doi]
- P4rt-OVS: Programming Protocol-Independent, Runtime Extensions for Open vSwitch with P4Tomasz Osinski, Halina Tarasiuk, Paul Chaignon, Mateusz Kossakowski. 413-421 [doi]
- Sequential Zeroing: Online Heavy-Hitter Detection on Programmable HardwareBelma Turkovic, Jorik Oostenbrink, Fernando A. Kuipers, Isaac Keslassy, Ariel Orda. 422-430 [doi]
- Defeating Protocol Abuse with P4: Application to Explicit Congestion NotificationAbir Laraba, Jérôme François, Isabelle Chrisment, Shihabur Rahman Chowdhury, Raouf Boutaba. 431-439 [doi]
- Routing Oblivious Measurement AnalyticsRan Ben-Basat, Xiaoqi Chen, Gil Einziger, Shir Landau Feibish, Danny Raz, Minlan Yu. 449-457 [doi]
- Moving a step forward in the quest for Deterministic Networks (DetNet)Vamsi Addanki, Luigi Iannone. 458-466 [doi]
- Decoupling of Distributed Consensus, Failure Detection and Agreement in SDN Control PlaneErmin Sakic, Wolfgang Kellerer. 467-475 [doi]
- Cost-Efficient Embedding of Virtual Networks With and Without Routing FlexibilityBalázs Németh, Yvonne Anne Pignolet, Matthias Rost, Stefan Schmid 0001, Balázs Vass. 476-484 [doi]
- Baking the ruleset: A heat propagation relaxation to packet classificationXinyi Zhang, Kavé Salamalian, Gaogang Xie. 485-493 [doi]
- Polymorphic Encryption and Pseudonymisation of IP Network FlowsAbraham Westerbaan, Luuk Hendriks. 494-498 [doi]
- Encrypted Application Classification with Convolutional Neural NetworkKun Yang, Lu Xu 0002, Yang Xu, Jonathan Chao. 499-503 [doi]
- Securing Route Origin Authorization with Blockchain for Inter-Domain RoutingGuobiao He, Wei Su 0006, Shuai Gao, Jiarui Yue. 504-508 [doi]
- Preventing Route Leaks using a Decentralized ApproachMiquel Ferriol Galmés, Roger Coll Aumatell, Albert Cabellos-Aparicio, Shoushou Ren, Xinpeng Wei, Bingyang Liu. 509-513 [doi]
- Multi-Cloud Chaining with Segment RoutingFrancesco Spinelli, Luigi Iannone, Jerome Tollet. 514-518 [doi]
- Amalgam: Distributed Network Control With Scalable Service ChainingSubhrendu Chattopadhyay, Sukumar Nandi, Sandip Chakraborty, Abhinandan S. Prasad. 519-523 [doi]
- Optimizing Social Welfare for Task Offloading in Mobile Edge ComputingHsiang-Jen Hong, Wenjun Fan, C. Edward Chow, Xiaobo Zhou 0002, Sang-Yoon Chang. 524-528 [doi]
- Toward an Efficient Real-Time Anomaly Detection System for Cloud DatacentersRicardo Dias, Leopoldo Alexandre F. Mauricio, Marcus Poggi. 529-533 [doi]
- A Delicate Union of Batching and Parallelization Models in Distributed Computing and CommunicationSounak Kar, Amr Rizk. 534-538 [doi]
- Modelling Edge Computing in Urban Mobility Simulation ScenariosKatja Gilly, Salvador Alcaraz, Noura Aknin, Sonja Filiposka, Anastas Mishev. 539-543 [doi]
- A Social Spider Optimisation Algorithm for 3D Unmanned Aerial Base Stations PlacementElhadja Chaalal, Laurent Reynaud, Sidi-Mohammed Senouci. 544-548 [doi]
- Feedback-Based Hidden-Terminal Mitigation for Distributed Scheduling in Cellular V2XPhilip Wendland, Guenter Schaefer. 549-553 [doi]
- Virtual Cross-Flow Detouring in the Deterministic Network Calculus AnalysisSteffen Bondorf, Fabien Geyer. 554-558 [doi]
- Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder MachineDong Jin, Jinsen Xie, Shuangwu Chen, Jian Yang, Xinmin Liu, Wei Wang. 559-563 [doi]
- Human Physical Status detection related to Danger Situations based on Smartwatch and SmartphoneAndrea Tundis, Muhammad Uzair, Max Mühlhäuser. 564-568 [doi]
- Optimizing Spectrum Use in Wireless Networks by Learning AgentsArtur Poplawski, Szymon Szott. 569-573 [doi]
- Dynamic Backup Workers for Parallel Machine LearningChuan Xu, Giovanni Neglia, Nicola Sebastianelli. 574-578 [doi]
- Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and BeyondNazih Salhab, Rana Rahim, Rami Langar, Raouf Boutaba. 579-583 [doi]
- Multi-User collaborative scheduling in 5G massive MIMO heterogeneous networksMarie Masson, Zwi Altman, Eitan Altman. 584-588 [doi]
- MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G NetworksGabriel de Carvalho Ferreira, Priscila Solís Barreto, Geraldo P. Rocha Filho, Marcos F. Caetano, Heikki Karvonen, Johanna Vartiainen. 589-593 [doi]
- Voting Credential Management System for Electronic Voting PrivacyArijet Sarker, SangHyun Byun, Wenjun Fan, Maria Psarakis, Sang-Yoon Chang. 589-593 [doi]
- Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenterKeke Zhu, Gengbiao Shen, Yong Jiang, Jianhui Lv, Qing Li, Mingwei Xu. 599-603 [doi]
- An Energy-Aware SDN/NFV Architecture for the Internet of ThingsDipon Saha, Meysam Shojaee, Michael Baddeley, Israat Haque. 604-608 [doi]
- LoRaWAN Class B Multicast ScalabilityYonatan Shiferaw, Apoorva Arora, Fernando Kuipers. 609-613 [doi]
- Practical evaluation of carrier sensing for a LoRa wildlife monitoring networkMorgan O'Kennedy, Thomas Niesler, Riaan Wolhuter, Nathalie Mitton. 614-618 [doi]
- Poster: CO2: Collaborative Packet Classification for Network Functions with OverselectionYunhong Xu, Hao Wu, Nick Duffield, Bin Liu, Minlan Yu. 619-621 [doi]
- Priority-Aware Per-flow Measurement using Cuckoo SketchYibo Yan, Cheng Chen, Huiping Lin, Olivier Ruas, Tengjiao Wang, Tong Yang 0003. 622-624 [doi]
- Poster: Word embedding for deployment descriptors in NFVWassim Sellil Atoui, Imen Grida Ben Yahia, Walid Gaaloul. 625-627 [doi]
- Im-OFDP: An Improved OpenFlow-based Topology Discovery Protocol for Software Defined NetworkYongpu Gu, Dong Li, Junqing Yu. 628-630 [doi]
- SmartSharing: A CDN with Smart Contract-based Local OTT SharingJiamin Fan, Kui Wu 0001, Daming Liu, Guoming Tang. 631-633 [doi]
- Poster: IsoRAN: Isolation and Scaling for 5G RAN via User-Level Data Plane VirtualizationNishant Budhdev, Mun Choon Chan, Tulika Mitra. 634-636 [doi]
- Poster: Seamless Client Integration for Fast Roaming in Wireless Mesh NetworksMartin Backhaus, Markus Theil, Michael Rossberg, Guenter Schaefer. 637-639 [doi]
- Poster: Distributed and Privacy Preserving Routing of Connected Vehicles to Minimize CongestionSurabhi Boob, Shakir Mahmood, Muhammad Shahzad. 640-642 [doi]
- Poster: SafeSmart - A VANET system for efficient communication for emergency vehiclesLuis Antonio Leite Francisco da Costa, Eduardo K. Duarte, Mikael Erneberg, Edison Pignaton de Freitas, Alexey V. Vinel. 643-645 [doi]
- Poster: TrueNets, a Topology Generator for Realistic Network AnalysisGabriele Gemmi, Renato Lo Cigno, Leonardo Maccari. 646-648 [doi]
- Poster: A Semi-Supervised Framework to Detect Botnets in IoT DevicesKashif Naveed, Hui Wu. 649-651 [doi]
- Poster: Evolution of Ethereum: A Temporal Graph PerspectiveQianlan Bai, Chao Zhang, Yuedong Xu, Xiaowei Chen, Xin Wang. 652-654 [doi]
- OIDPR: Optimized Insulin Dosage based on Privacy-Preserving Reinforcement LearningZuobin Ying, Yun Zhang, Shuanglong Cao, Shengmin Xu, Ximeng Liu. 655-657 [doi]
- Auditable secure network overlays for multi-domain distributed applicationsReginald Cushing, Ralph Koning, Lu Zhang 0046, Cees de Laat, Paola Grosso. 658-660 [doi]
- Poster: Controlling Quality of Service of Container Networks in a Hyperconverged PlatformSumitro Bhaumik, Kaustav Chanda, Sandip Chakraborty. 661-663 [doi]
- Poster: Per-Hop Bridge-Local Latency Bounds with Strict Priority Transmission SelectionAlexej Grigorjew, Florian Metzger, Tobias Hoßfeld, Johannes Specht, Franz-Josef Götz, Feng Chen, Jürgen Schmitt. 664-666 [doi]
- A Practical Analysis on Mirai Botnet TrafficGetoar Gallopeni, Bruno Rodrigues, Muriel Figueredo Franco, Burkhard Stiller. 667-668 [doi]
- Securing messages in C-ITS: a proof of conceptJun Zhang, Houda Labiod, Ghassen Chaabane, Clément Ruffin, Andre-Perpey. 669-670 [doi]
- User identification by matching radio "vision" and computer vision through means of machine learningVinicius M. de Pinho, Dalia Popescu. 671-672 [doi]
- Autonomous Anomaly Detector for Cloud-Radio Access Network Key Performance IndicatorsNazih Salhab, Rana Rahim, Rami Langar. 673-674 [doi]
- Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile StationsMarkus Theil, Martin Backhaus, Michael Rossberg, Guenter Schaefer. 675-676 [doi]
- FORCH: An Orchestrator for Fog Computing service deploymentGianluca Davoli, Davide Borsatti, Daniele Tarchi, Walter Cerroni. 677-678 [doi]
- Crawling the IPFS NetworkSebastian A. Henningsen, Sebastian Rust, Martin Florian, Björn Scheuermann 0001. 679-680 [doi]
- Optimum Rooted Trees for Failover in Switched NetworksPeter Willis, Nirmala Shenoy. 681-682 [doi]
- Evaluation of Path States of Large IoT Networks Using Locally and Remotely Controlled MeasurementsAgnieszka Chodorek, Robert R. Chodorek. 683-684 [doi]
- Evolution Toward the Next Generation Radio Access NetworkWilliam Diego. 685 [doi]
- Cost Effective Troubleshooting of NFV InfrastructureRan Ben-Basat, Gil Einziger, Maayan Goldstein, Liat Pele, Itai Segall. 686-694 [doi]
- A Lightweight Network-based Android Malware Detection SystemIgor Jochem Sanz, Martin Andreoni Lopez, Eduardo Kugler Viegas, Vinicius Rodrigues Sanches. 695-703 [doi]
- Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and ImplicationsQian Liu, Yanyan Mu, Jin Zhao, Jingxia Feng, Bin Wang. 704-712 [doi]
- A DRAM-friendly priority queue Internet packet scheduler implementation and its effects on TCPKatsushi Kobayashi. 713-718 [doi]
- SRPT-ECF: challenging Round-Robin for stream-aware multipath schedulingBaptiste Jonglez, Martin Heusse, Bruno Gaujal. 719-724 [doi]
- Rethinking ACKs at the Transport LayerAna Custura, Tom Jones, Gorry Fairhurst. 731-736 [doi]
- A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio IssueTimo Völker, Ekaterina Volodina, Michael Tüxen, Erwin P. Rathgeb. 737-742 [doi]
- SABES: Statistical Available Bandwidth EStimation from passive TCP measurementsFrancesco Ciaccia, Ivan Romero, Oriol Arcas-Abella, Diego Montero, René Serral-Gracià, Mario Nemirovsky. 743-748 [doi]
- On the Incompatibility of Scalable Congestion Controls over the InternetFerenc Fejes, Gergo Gombos, Sándor Laki, Szilveszter Nádas. 749-754 [doi]
- Evaluating QUIC's Performance Against Performance Enhancing Proxy over Satellite LinkJohn Border, Bhavit Shah, Chi-Jiun Su, Rob Torres. 755-760 [doi]
- Evaluation of Multi-operator dynamic 5G Network Slicing for Vehicular Emergency ScenariosHanif Kukkalli, Sumit Maheshwari, Ivan Seskar, Martin Skorupski. 761-766 [doi]
- Integration of U-space and 5GS for UAV servicesLechoslaw Tomaszewski, Robert Kolakowski, Slawomir Kuklinski. 767-772 [doi]
- Information Exchange to Support Multi-Domain Slice Service Provision for 5G/NFVAlberto Solano, Luis M. Contreras. 773-778 [doi]
- The case for serverless mobile networkingMarco Gramaglia, Pablo Serrano 0001, Albert Banchs, Gines Garcia-Aviles, Andres Garcia-Saavedra, Ramon Perez. 779-784 [doi]
- Load Balancing for Deterministic NetworksShuang Chen, Jérémie Leguay, Sébastien Martin, Paolo Medagliani. 785-790 [doi]
- P4 In-Network Source Protection for Sensor FailoverSteffen Lindner, Marco Häberle, Florian Heimgaertner, Naresh Nayak, Sebastian Schildt, Dennis Grewe, Hans Löhr, Michael Menth. 791-796 [doi]
- Coupling Source Routing with Time-Sensitive NetworkingGagan Nandha Kumar, Kostas Katsalis, Panagiotis Papadimitriou 0001. 797-802 [doi]
- Integrated Industrial Ethernet Networks: Time-sensitive Networking over SDN Infrastructure for mixed ApplicationsMohamed Abdel Metaal, Rene Guillaume, Ralf Steinmetz, Amr Rizk. 803-808 [doi]
- The Internet in Crimea: a Case Study on Routing InterregnumRomain Fontugne, Ksenia Ermoshina, Emile Aben. 809-814 [doi]
- Measuring Basic Load-Balancing and Fail-Over Setups for Email Delivery via DNS MX RecordsJukka Ruohonen. 815-820 [doi]
- General Knapsack Bounds of Web Caching Performance Regarding the Properties of each Cacheable ObjectGerhard Hasslinger, Konstantinos Ntougias, Frank Hasslinger, Oliver Hohlfeld. 821-826 [doi]
- A Link Scheduling Algorithm for Underwater Optical Wireless NetworksZhengxin Fan, Lei Wang 0005, Bingxian Lu, Yongda Yu, Chi Lin, Zhongxuan Luo, Zhenquan Qin, Ming Zhu 0001. 827-832 [doi]