Abstract is missing.
- Circuit Switching Under the Radar with REACToRHe Liu, Feng Lu, Alex Forencich, Rishi Kapoor, Malveeka Tewari, Geoffrey M. Voelker, George Papen, Alex C. Snoeren, George Porter. 1-15 [doi]
- Catch the Whole Lot in an Action: Rapid Precise Packet Loss Notification in Data CenterPeng Cheng, Fengyuan Ren, Ran Shu, Chuang Lin. 17-28 [doi]
- High Throughput Data Center Topology DesignAnkit Singla, Philip Brighten Godfrey, Alexandra Kolla. 29-41 [doi]
- Adtributor: Revenue Debugging in Advertising SystemsRanjita Bhagwan, Rahul Kumar, Ramachandran Ramjee, George Varghese, Surjyakanta Mohapatra, Hemanth Manoharan, Piyush Shah. 43-55 [doi]
- DECAF: Detecting and Characterizing Ad Fraud in Mobile AppsBin Liu 0004, Suman Nath, Ramesh Govindan, Jie Liu. 57-70 [doi]
- I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot NetworksNikhil Handigol, Brandon Heller, Vimalkumar Jeyakumar, David Mazières, Nick McKeown. 71-85 [doi]
- Libra: Divide and Conquer to Verify Forwarding Tables in Huge NetworksHongyi Zeng, Shidong Zhang, Fei Ye, Vimalkumar Jeyakumar, Mickey Ju, Junda Liu, Nick McKeown, Amin Vahdat. 87-99 [doi]
- Software Dataplane VerificationMihai Dobrescu, Katerina J. Argyraki. 101-114 [doi]
- NetCheck: Network Diagnoses from Blackbox TracesYanyan Zhuang, Eleni Gessiou, Steven Portzer, Fraida Fund, Monzur Muhammad, Ivan Beschastnikh, Justin Cappos. 115-128 [doi]
- Exalt: Empowering Researchers to Evaluate Large-Scale Storage SystemsYang Wang 0009, Manos Kapritsos, Lara Schmidt, Lorenzo Alvisi, Mike Dahlin. 129-141 [doi]
- ipShield: A Framework For Enforcing Context-Aware PrivacySupriyo Chakraborty, Chenguang Shen, Kasturi Rangan Raghavan, Yasser Shoukry, Matt Millar, Mani B. Srivastava. 143-156 [doi]
- Building Web Applications on Top of Encrypted Data Using MylarRaluca Ada Popa, Emily Stark, Steven Valdez, Jonas Helfer, Nickolai Zeldovich, Hari Balakrishnan. 157-172 [doi]
- PHY Covert Channels: Can you see the Idles?Ki-Suh Lee, Han Wang, Hakim Weatherspoon. 173-185 [doi]
- cTPM: A Cloud TPM for Cross-Device Trusted ApplicationsChen Chen, Himanshu Raj, Stefan Saroiu, Alec Wolman. 187-201 [doi]
- Network Virtualization in Multi-tenant DatacentersTeemu Koponen, Keith Amidon, Peter Balland, Martin Casado, Anupam Chanda, Bryan Fulton, Igor Ganichev, Jesse Gross, Paul Ingram, Ethan Jackson, Andrew Lambeth, Romain Lenglet, Shih-Hao Li, Amar Padmanabhan, Justin Pettit, Ben Pfaff, Rajiv Ramanathan, Scott Shenker, Alan Shieh, Jeremy Stribling, Pankaj Thakkar, Dan Wendlandt, Alexander Yip, Ronghua Zhang. 203-216 [doi]
- Operational Experiences with Disk Imaging in a Multi-Tenant DatacenterKevin Atkinson, Gary Wong, Robert Ricci. 217-228 [doi]
- VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship FirewallsDaiyuu Nobori, Yasushi Shinjo. 229-241 [doi]
- Bolt: Data Management for Connected HomesTrinabh Gupta, Rayman Preet Singh, Amar Phanishayee, Jaeyeon Jung, Ratul Mahajan. 243-256 [doi]
- Blizzard: Fast, Cloud-scale Block Storage for Cloud-oblivious ApplicationsJames W. Mickens, Edmund B. Nightingale, Jeremy Elson, Darren Gehring, Bin Fan, Asim Kadav, Vijay Chidambaram, Osama Khan, Krishna Nareddy. 257-273 [doi]
- Aggregation and Degradation in JetStream: Streaming Analytics in the Wide AreaAriel Rabkin, Matvey Arye, Siddhartha Sen, Vivek S. Pai, Michael J. Freedman. 275-288 [doi]
- GRASS: Trimming Stragglers in Approximation AnalyticsGanesh Ananthanarayanan, Michael Chien-Chun Hung, Xiaoqi Ren, Ion Stoica, Adam Wierman, Minlan Yu. 289-302 [doi]
- Bringing Gesture Recognition to All DevicesBryce Kellogg, Vamsi Talla, Shyamnath Gollakota. 303-316 [doi]
- 3D Tracking via Body Radio ReflectionsFadel Adib, Zachary Kabelac, Dina Katabi, Robert C. Miller. 317-329 [doi]
- Epsilon: A Visible Light Based Positioning SystemLiqun Li, Pan Hu, Chunyi Peng, Guobin Shen, Feng Zhao. 331-343 [doi]
- Enabling Bit-by-Bit Backscatter Communication in Severe Energy Harvesting EnvironmentsPengyu Zhang, Deepak Ganesan. 345-357 [doi]
- Full Duplex MIMO RadiosDinesh Bharadia, Sachin Katti. 359-372 [doi]
- Recursively Cautious Congestion ControlRadhika Mittal, Justine Sherry, Sylvia Ratnasamy, Scott Shenker. 373-385 [doi]
- How Speedy is SPDY?Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy, David Wetherall. 387-399 [doi]
- FaRM: Fast Remote MemoryAleksandar Dragojevic, Dushyanth Narayanan, Miguel Castro, Orion Hodson. 401-414 [doi]
- Easy Freshness with Pequod Cache JoinsBryan Kate, Eddie Kohler, Michael S. Kester, Neha Narula, Yandong Mao, Robert Morris. 415-428 [doi]
- MICA: A Holistic Approach to Fast In-Memory Key-Value StorageHyeontaek Lim, Dongsu Han, David G. Andersen, Michael Kaminsky. 429-444 [doi]
- NetVM: High Performance and Flexible Networking Using Virtualization on Commodity PlatformsJinho Hwang, K. K. Ramakrishnan, Timothy Wood. 445-458 [doi]
- ClickOS and the Art of Network Function VirtualizationJoão Martins, Mohamed Ahmed, Costin Raiciu, Vladimir Andrei Olteanu, Michio Honda, Roberto Bifulco, Felipe Huici. 459-473 [doi]
- SENIC: Scalable NIC for End-Host Rate LimitingSivasankar Radhakrishnan, Yilong Geng, Vimalkumar Jeyakumar, Abdul Kabbani, George Porter, Amin Vahdat. 475-488 [doi]
- mTCP: a Highly Scalable User-level TCP Stack for Multicore SystemsEunyoung Jeong, Shinae Woo, Muhammad Asim Jamshed, Haewon Jeong, Sunghwan Ihm, Dongsu Han, KyoungSoo Park. 489-502 [doi]
- Warranties for Faster Strong ConsistencyJed Liu, Tom Magrino, Owen Arden, Michael D. George, Andrew C. Myers. 503-517 [doi]
- Tierless Programming and Reasoning for Software-Defined NetworksTimothy Nelson, Andrew D. Ferguson, Michael J. G. Scheer, Shriram Krishnamurthi. 519-531 [doi]
- Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTagsSeyed Kaveh Fayazbakhsh, Luis Chiang, Vyas Sekar, Minlan Yu, Jeffrey C. Mogul. 543-546 [doi]