Abstract is missing.
- Zen and the art of network architectureLarry Peterson. 1-2 [doi]
- B4: experience with a globally-deployed software defined wanSushant Jain, Alok Kumar, Subhasree Mandal, Joon Ong, Leon Poutievski, Arjun Singh, Subbaiah Venkata, Jim Wanderer, Junlan Zhou, Min Zhu, Jon Zolla, Urs Hölzle, Stephen Stuart, Amin Vahdat. 3-14 [doi]
- Achieving high utilization with software-driven WANChi-Yao Hong, Srikanth Kandula, Ratul Mahajan, Ming Zhang, Vijay Gill, Mohan Nanduri, Roger Wattenhofer. 15-26 [doi]
- SIMPLE-fying middlebox policy enforcement using SDNZafar Ayyub Qazi, Cheng-Chun Tu, Luis Chiang, Rui Miao, Vyas Sekar, Minlan Yu. 27-38 [doi]
- Ambient backscatter: wireless communication out of thin airVincent Liu, Aaron N. Parks, Vamsi Talla, Shyamnath Gollakota, David Wetherall, Joshua R. Smith. 39-50 [doi]
- Dude, where's my card?: RFID positioning that works with multipath and non-line of sightJue Wang, Dina Katabi. 51-62 [doi]
- Dhwani: secure peer-to-peer acoustic NFCRajalakshmi Nandakumar, Krishna Kant Chintalapudi, Venkata N. Padmanabhan, Ramarathnam Venkatesan. 63-74 [doi]
- See through walls with WiFi!Fadel Adib, Dina Katabi. 75-86 [doi]
- Maple: simplifying SDN programming using algorithmic policiesAndreas Voellmy, Junchang Wang, Y. Richard Yang, Bryan Ford, Paul Hudak. 87-98 [doi]
- Forwarding metamorphosis: fast programmable match-action processing in hardware for SDNPat Bosshart, Glen Gibb, Hun-Seok Kim, George Varghese, Nick McKeown, Martin Izzard, Fernando A. Mujica, Mark Horowitz. 99-110 [doi]
- Compressing IP forwarding tables: towards entropy bounds and beyondGábor Rétvári, János Tapolcai, Attila Korösi, András Majdán, Zalán Heszberger. 111-122 [doi]
- TCP ex machina: computer-generated congestion controlKeith Winstein, Hari Balakrishnan. 123-134 [doi]
- FCP: a flexible transport framework for accommodating diversityDongsu Han, Robert Grandl, Aditya Akella, Srinivasan Seshan. 135-146 [doi]
- Less pain, most of the gain: incrementally deployable ICNSeyed Kaveh Fayazbakhsh, Yin Lin, Amin Tootoonchian, Ali Ghodsi, Teemu Koponen, Bruce M. Maggs, K. C. Ng, Vyas Sekar, Scott Shenker. 147-158 [doi]
- Reducing web latency: the virtue of gentle aggressionTobias Flach, Nandita Dukkipati, Andreas Terzis, Barath Raghavan, Neal Cardwell, Yuchung Cheng, Ankur Jain, Shuai Hao, Ethan Katz-Bassett, Ramesh Govindan. 159-170 [doi]
- BGP security in partial deployment: is the juice worth the squeeze?Robert Lychev, Sharon Goldberg, Michael Schapira. 171-182 [doi]
- PoiRoot: investigating the root cause of interdomain path changesUmar Javed, Ítalo Cunha, David R. Choffnes, Ethan Katz-Bassett, Thomas E. Anderson, Arvind Krishnamurthy. 183-194 [doi]
- Verifiable auctions for online ad exchangesSebastian Angel, Michael Walfish. 195-206 [doi]
- Ananta: cloud scale load balancingParveen Patel, Deepak Bansal, Lihua Yuan, Ashwin Murthy, Albert G. Greenberg, David A. Maltz, Randy Kern, Hemant Kumar, Marios Zikos, Hongyu Wu, Changhoon Kim, Naveen Karri. 207-218 [doi]
- Speeding up distributed request-response workflowsVirajith Jalaparti, Peter Bodík, Srikanth Kandula, Ishai Menache, Mikhail Rybalkin, Chenyu Yan. 219-230 [doi]
- Leveraging endpoint flexibility in data-intensive clustersMosharaf Chowdhury, Srikanth Kandula, Ion Stoica. 231-242 [doi]
- A provider-side view of web search response timeYingying Chen, Ratul Mahajan, Baskar Sridharan, Zhi-Li Zhang. 243-254 [doi]
- Trinocular: understanding internet reliability through adaptive probingLin Quan, John S. Heidemann, Yuri Pradkin. 255-266 [doi]
- An empirical reexamination of global DNS behaviorHongyu Gao, Vinod Yegneswaran, Yan Chen, Phillip A. Porras, Shalini Ghosh, Jian Jiang, Hai-Xin Duan. 267-278 [doi]
- Mosaic: quantifying privacy leakage in mobile networksNing Xia, Han Hee Song, Yong Liao, Marios Iliofotou, Antonio Nucci, Zhi-Li Zhang, Aleksandar Kuzmanovic. 279-290 [doi]
- Expressive privacy control with pseudonymsSeungyeop Han, Vincent Liu, Qifan Pu, Simon Peter, Thomas E. Anderson, Arvind Krishnamurthy, David Wetherall. 291-302 [doi]
- Towards efficient traffic-analysis resistant anonymity networksStevens Le-Blond, David R. Choffnes, Wenxuan Zhou, Peter Druschel, Hitesh Ballani, Paul Francis. 303-314 [doi]
- SplitX: high-performance private analyticsRuichuan Chen, Istemi Ekin Akkus, Paul Francis. 315-326 [doi]
- Participatory networking: an API for application control of SDNsAndrew D. Ferguson, Arjun Guha, Chen Liang, Rodrigo Fonseca, Shriram Krishnamurthi. 327-338 [doi]
- Developing a predictive model of quality of experience for internet videoAthula Balachandran, Vyas Sekar, Aditya Akella, Srinivasan Seshan, Ion Stoica, Hui Zhang 0001. 339-350 [doi]
- ElasticSwitch: practical work-conserving bandwidth guarantees for cloud computingLucian Popa, Praveen Yalagandula, Sujata Banerjee, Jeffrey C. Mogul, Yoshio Turner, Jose Renato Santos. 351-362 [doi]
- An in-depth study of LTE: effect of network protocol and application behavior on performanceJunxian Huang, Feng Qian, Yihua Guo, Yuanyuan Zhou, Qiang Xu, Zhuoqing Morley Mao, Subhabrata Sen, Oliver Spatscheck. 363-374 [doi]
- Full duplex radiosDinesh Bharadia, Emily McMilin, Sachin Katti. 375-386 [doi]
- Bringing cross-layer MIMO to today's wireless LANsSwarun Kumar, Diego Cifuentes, Shyamnath Gollakota, Dina Katabi. 387-398 [doi]
- BigStation: enabling scalable real-time signal processingin large mu-mimo systemsQing Yang, Xiaoxiao Li, Hongyi Yao, Ji Fang, Kun Tan, Wenjun Hu, Jiansong Zhang, Yongguang Zhang. 399-410 [doi]
- zUpdate: updating data center networks with zero lossHongqiang Harry Liu, Xin Wu, Ming Zhang, Lihua Yuan, Roger Wattenhofer, David A. Maltz. 411-422 [doi]
- Got loss?: get zOVN!Daniel Crisan, Robert Birke, Gilles Cressier, Cyriel Minkenberg, Mitchell Gusat. 423-434 [doi]
- pFabric: minimal near-optimal datacenter transportMohammad Alizadeh, Shuang Yang, Milad Sharif, Sachin Katti, Nick McKeown, Balaji Prabhakar, Scott Shenker. 435-446 [doi]
- Integrating microsecond circuit switching into the data centerGeorge Porter, Richard D. Strong, Nathan Farrington, Alex Forencich, Pang-Chen Sun, Tajana Rosing, Yeshaiahu Fainman, George Papen, Amin Vahdat. 447-458 [doi]
- Dispatch: secure, resilient mobile reportingKanak Biscuitwala, Willem Bult, Mathias Lécuyer, T. J. Purtell, Madeline K. B. Ross, Augustin Chaintreau, Chris Haseman, Monica S. Lam, Susan E. McGregor. 459-460 [doi]
- Contextualized information-centric home networkTrisha Biswas, Asit Chakraborti, Ravishankar Ravindran, Xinwen Zhang, Guoqiang Wang. 461-462 [doi]
- Locating using prior information: wireless indoor localization algorithmYuanfang Chen, Noël Crespi, Lin Lv, MingChu Li, Antonio M. Ortiz, Lei Shu. 463-464 [doi]
- AutoEmbed: automated multi-provider virtual network embeddingDavid Dietrich, Amr Rizk, Panagiotis Papadimitriou. 465-466 [doi]
- Design and implementation of a framework for software-defined middlebox networkingAaron Gember, Robert Grandl, Junaid Khalid, Aditya Akella. 467-468 [doi]
- An evaluation testbed for adaptive, topology-aware deployment of elastic applicationsMatthias Keller, Christoph Robbert, Manuel Peuster. 469-470 [doi]
- Automated configuration and measurement of emulated networks with AutoNetkitSimon Knight. 471-472 [doi]
- Incremental SDN deployment in enterprise networksDan Levin, Marco Canini, Stefan Schmid, Anja Feldmann. 473-474 [doi]
- Seamless interworking of SDN and IPPingping Lin, Jonathan Hart, Umesh Krishnaswamy, Tetsuya Murakami, Masayoshi Kobayashi, Ali Al-Shabibi, Kuang-Ching Wang, Jun Bi. 475-476 [doi]
- Qphone: a quantum security VoIP phoneBo Liu, BaoKang Zhao, Ziling Wei, Chunqing Wu, Jinshu Su, Wanrong Yu, Fei Wang 0007, Shihai Sun. 477-478 [doi]
- Security risks evaluation toolbox for smart grid devicesYang Liu, Jiahe Liu, Ting Liu, Xiaohong Guan, Yanan Sun. 479-480 [doi]
- A large-scale multipath playground for experimenters and early adoptersFelician Németh, Balázs Sonkoly, Levente Csikor, András Gulyás. 481-482 [doi]
- D-tunes: self tuning datastores for geo-distributed interactive applicationsShankaranarayanan P. N., Ashiwan Sivakumar, Sanjay G. Rao, Mohit Tawarmalani. 483-484 [doi]
- Whole-home gesture recognition using wireless signals (demo)Qifan Pu, Siyu Jiang, Shyamnath Gollakota. 485-486 [doi]
- Application-awareness in SDNZafar Ayyub Qazi, Jeongkeun Lee, Tao Jin, Gowtham Bellala, Manfred Arndt, Guevara Noubir. 487-488 [doi]
- On HTTP live streaming in large enterprisesRoberto Roverso, Sameh El-Ansary, Mikael Högqvist. 489-490 [doi]
- Automatic configuration of routing control platforms in OpenFlow networksSachin Sharma, Dimitri Staessens, Didier Colle, Mario Pickavet, Piet Demeester. 491-492 [doi]
- HomeLab: a platform for conducting experiments with connected devices in the homeRayman Preet Singh, A. J. Bernheim Brush, Evgeni Filippov, Danny Huang, Ratul Mahajan, Khurshed Mazhar, Amar Phanishayee, Arjmand Samuel. 493-494 [doi]
- Named data networking on a router: forwarding at 20gbps and beyondWon So, Ashok Narayanan, David Oran, Mark Stapp. 495-496 [doi]
- OMware: an open measurement ware for stable residential broadband measurementLei Xue, Ricky K. P. Mok, Rocky K. C. Chang. 497-498 [doi]
- Cloud3DView: an interactive tool for cloud data center operationsJianxiong Yin, Peng Sun, Yonggang Wen, Haigang Gong, Ming Liu, Xuelong Li, Haipeng You, Jinqi Gao, Cynthia Lin. 499-500 [doi]
- To 4, 000 compute nodes and beyond: network-aware vertex placement in large-scale graph processing systemsKarim Awara, Hani Jamjoom, Panos Kalnis. 501-502 [doi]
- Don't drop, detour!Matt Calder, Rui Miao, Kyriakos Zarifis, Ethan Katz-Bassett, Minlan Yu, Jitendra Padhye. 503-504 [doi]
- Harnessing receive diversity in distributed multi-user MIMO networksBo-Si Chen, Kate Ching-Ju Lin, Hung-Yu Wei. 505-506 [doi]
- R2D2: bufferless, switchless data center networks using commodity ethernet hardwareMatthew P. Grosvenor, Malte Schwarzkopf, Andrew W. Moore. 507-508 [doi]
- Smart in-network deduplication for storage-aware SDNYu Hua, Xue Liu, Dan Feng. 509-510 [doi]
- The architecture and traffic management of wireless collaborated hybrid data center networkHe Huang, Xiangke Liao, Shanshan Li, Shaoliang Peng, Xiaodong Liu, Bin Lin. 511-512 [doi]
- Toward content-centric privacy in ICN: attribute-based encryption and routingMihaela Ion, Jianqing Zhang, Eve M. Schooler. 513-514 [doi]
- Interest set mechanism to improve the transport of named data networkingXiaoke Jiang, Jun Bi. 515-516 [doi]
- M2cloud: software defined multi-site data center network control framework for multi-tenantZhongjin Liu, Yong Li 0008, Li Su, Depeng Jin, Lieguang Zeng. 517-518 [doi]
- Supporting application-specific in-network processing in data centresLuo Mai, Lukas Rupprecht, Paolo Costa, Matteo Migliavacca, Peter Pietzuch, Alexander L. Wolf. 519-520 [doi]
- In-network caching assisted wireless AP storage management: challenges and algorithmsZhongxing Ming, Mingwei Xu, Dan Wang. 521-522 [doi]
- Using DAIM as a reactive interpreter for openflow networks to enable autonomic functionalityPakawat Pupatwibul, Ameen Banjar, Robin Braun. 523-524 [doi]
- Characterizing correlated latency anomalies in broadband access networksSwati Roy, Nick Feamster. 525-526 [doi]
- A (not) NICE way to verify the openflow switch specification: formal modelling of the openflow switch using alloyNatali Ruchansky, Davide Proserpio. 527-528 [doi]
- An empirical study of analog channel feedbackWei-Liang Shen, Kate Ching-Ju Lin, Ming-Syan Chen. 529-530 [doi]
- Towards fast regular expression matching in practiceKai Wang, Jun Li 0003. 531-532 [doi]
- Cooperation policies for efficient in-network cachingLiang Wang, Suzan Bayhan, Jussi Kangasharju. 533-534 [doi]
- Collaborative caching based on hash-routing for information-centric networkingSen Wang, Jun Bi, Jianping Wu. 535-536 [doi]
- Characterizing and detecting malicious crowdsourcingTianyi Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao. 537-538 [doi]
- Replication free rule grouping for packet classificationXiang Wang, Chang Chen, Jun Li. 539-540 [doi]
- Which flows are hiding behind my wildcard rule?: adding packet sampling to openflowPhilip Wette, Holger Karl. 541-542 [doi]
- The contagion of malicious behaviors in online gamesJiyoung Woo, Ah Reum Kang, Huy Kang Kim. 543-544 [doi]
- CSPAN: cost-effective geo-replicated storage spanning multiple cloud servicesZhe Wu, Michael Butkiewicz, Dorian Perkins, Ethan Katz-Bassett, Harsha V. Madhyastha. 545-546 [doi]
- A software defined approach to unified IPv6 transitionWenfeng Xia, Tina Tsou, Diego R. Lopez, Qiong Sun, Felix Lu, Haiyong Xie. 547-548 [doi]
- OpenRAN: a software-defined ran architecture via virtualizationMao Yang, Yong Li 0008, Depeng Jin, Li Su, Shaowu Ma, Lieguang Zeng. 549-550 [doi]
- Exponential quantization: user-centric rate control for skype callsYu-Chuan Yen, Cing-yu Chu, Chien Nan Chen, Su-Ling Yeh, Hao-Hua Chu, Polly Huang. 551-552 [doi]
- Making intra-domain traffic engineering resistant to failuresBaobao Zhang, Jun Bi, Jianping Wu. 553-554 [doi]
- Greedy forwarding for mobile social networks embedded in hyperbolic spacesJingwei Zhang. 555-556 [doi]
- The effectiveness of time dependent pricing in controlling usage incentives in wireless data networkLiang Zhang, Weijie Wu, Dan Wang. 557-558 [doi]
- Topology-aware content-centric networkingXinggong Zhang, Tong Niu, Feng Lao, Zongming Guo. 559-560 [doi]