Abstract is missing.
- Boosting the BGP Convergence in SDXes with SWIFTPhilipp Mao, Rüdiger Birkner, Thomas Holterbach, Laurent Vanbever. 1-2 [doi]
- Automatic Custom Generation of Topologies and Configuration of Routing protocols in SDNApoorv Shukla, Mengchen Shi, Anja Feldmann. 3-5 [doi]
- Privacy-Preserving Detection of Inter-Domain SDN Rules OverlapsArnaud Dethise, Marco Chiesa, Marco Canini. 6-8 [doi]
- Quick Incremental Routing Logic for Dynamic Network GraphsDesislava C. Dimitrova, John Liagouris, Moritz Hoffmann, Vasiliki Kalavri, Sebastian Wicki, Timothy Roscoe. 9-11 [doi]
- Gather: A Way to Optimize the Routing Process of In-band Control NetworkYabo Yan, Jun Bi, Yu Zhou, Cheng Zhang. 12-14 [doi]
- SDN/NFV-enabled Security Architecture for Fine-grained Policy Enforcement and Threat Mitigation for Enterprise NetworksBenedikt Pfaff, Johann Scherer, David Hock, Nicholas Gray, Thomas Zinner, Phuoc Tran-Gia, Raphael Durner, Wolfgang Kellerer, Claas Lorenz. 15-16 [doi]
- HERO: A Hybrid Electrical and Optical Multicast for Accelerating High-Performance Data Center ApplicationsJinzhen Bao, BaoKang Zhao, Dezun Dong, Zhenghu Gong. 17-18 [doi]
- Cooperative Active Distribution of Videos in Telco-CDNsKhaled M. Diab, Mohamed Hefeeda. 19-21 [doi]
- Enhancing Mobile Video Delivery over an Heterogeneous Network Access with Information-Centric NetworkingJacques Samain, Jordan Augé, Giovanna Carofiglio, Luca Muscariello, Michele Papalini, Mauro Sardara. 22-24 [doi]
- A Case for Information Centric Networking For Smart Grid CommunicationsDan Ameme, Satyajayant Misra, Abderrahmen Mtibaa. 25-27 [doi]
- Towards Zero Copy Dataflows using RDMABairen Yi, Jiacheng Xia, Li Chen, Kai Chen 0005. 28-30 [doi]
- uniprof: A Unikernel Stack ProfilerFlorian Schmidt. 31-33 [doi]
- SymPerf: Predicting Network Function PerformanceFelix Rath, Johannes Krude, Jan Rüth, Daniel Schemmel, Oliver Hohlfeld, Jó Ágila Bitsch, Klaus Wehrle. 34-36 [doi]
- Network Data Monetization Using Net2VecRoberto Gonzalez, Alberto García-Durán, Filipe Manco, Mathias Niepert, Pelayo Vallina. 37-39 [doi]
- Closing the Network Diagnostics Gap with VigilBehnaz Arzani, Selim Ciraci, Luiz Chamon, Yibo Zhu, Hongqiang Harry Liu, Jitu Padhye, Geoff Outhred, Boon Thau Loo. 40-42 [doi]
- Demystifying Hardware Bottlenecks in Mobile Web Quality of ExperienceMallesham Dasari, Conor Kelton, Javad Nejati, Aruna Balasubramanian, Samir R. Das. 43-45 [doi]
- Ruru: High-speed, Flow-level Latency Measurement and Visualization of Live Internet TrafficRichard Cziva, Christopher Lorier, Dimitrios P. Pezaros. 46-47 [doi]
- AS Hegemony: A Robust Metric for AS CentralityRomain Fontugne, Anant Shah, Emile Aben. 48-50 [doi]
- The Implications of Twitterbot Generated Data Traffic on Networked SystemsZafar Gilani, Jon Crowcroft, Reza Farahbakhsh, Gareth Tyson. 51-53 [doi]
- Characterizing the Click and Share Dynamics of Micro-Videos in Social MediaJingtao Ding, Yanghao Li, Yong Li, Pan Hui, Depeng Jin. 54-56 [doi]
- Demonstration of the Marple System for Network Performance MonitoringVikram Nathan, Srinivas Narayana, Anirudh Sivaraman, Prateesh Goyal, Venkat Arun, Mohammad Alizadeh, Vimalkumar Jeyakumar, Changhoon Kim. 57-59 [doi]
- LDplayer: DNS Experimentation at ScaleLiang Zhu, John S. Heidemann. 60-62 [doi]
- The Root Canary: Monitoring and Measuring the DNSSEC Root Key RolloverRoland van Rijswijk-Deij, Taejoong Chung, David R. Choffnes, Alan Mislove, W. Toorop. 63-64 [doi]
- TIDE: Threat Identification Using Active DNS MeasurementsAnna Sperotto, Olivier van der Toorn, Roland van Rijswijk-Deij. 65-67 [doi]
- Authentication-Bypass Vulnerabilities in SOHO RoutersNadav Rotenberg, Haya Shulman, Michael Waidner, Benjamin Zeltser. 68-70 [doi]
- A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data CentersHenri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Nik Sultana, Bowen Wang, Jingyu Qian, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou. 71-73 [doi]
- DPS-Discuss: Demonstrating Decentralized, Pseudonymous, Sybil-resistant CommunicationSebastian Friebe, Martin Florian. 74-75 [doi]
- Towards Distributed Threat Intelligence in Real-TimePhilipp Meyer, Raphael Hiesgen, Thomas C. Schmidt, Marcin Nawrocki, Matthias Wählisch. 76-78 [doi]
- WVCC: Weighted Virtual Congestion Control for Datacenter NetworksJiaqing Dong, Yi Wang, Chen Tian, Bo Jin, Hao Yin, Gong Zhang. 79-81 [doi]
- 3D Fabric: Differential Deceleration and Detour for Congestion Free Data Center NetworksHaoyu Song, Zhigang Ji, Yali Zhang, Yinben Xia. 82-84 [doi]
- Rethinking TCP Throughput and Latency ModelingYi Cao, Aruna Balasubramanian, Anshul Gandhi. 85-87 [doi]
- TCP Proxy Bypass: All the Gain with No Pain!Giuseppe Siracusano, Roberto Bifulco, Stefano Salsano. 88-90 [doi]
- HARMLESS: Cost-Effective Transitioning to SDNMark Szalay, László Toka, Gábor Rétvári, Gergely Pongrácz, Levente Csikor, Dimitrios P. Pezaros. 91-93 [doi]
- Network-Assisted Raft Consensus AlgorithmYang Zhang, Bo Han, Zhi-Li Zhang, Vijay Gopalakrishnan. 94-96 [doi]
- Making the Data Plane Ready for NFV: An Effective Way of Handling ResourcesMarton Szabo, András Majdán, Gergely Pongrácz, László Toka, Balázs Sonkoly. 97-99 [doi]
- ClickP4: Towards Modular Programming of P4Yu Zhou, Jun Bi. 100-102 [doi]
- Sandboxing Data Plane Programs for Fun and ProfitMiguel C. Neves, Kirill Levchenko, Marinho P. Barcellos. 103-104 [doi]
- NS4: A P4-driven Network SimulatorChengze Fan, Jun Bi, Yu Zhou, Cheng Zhang, Haisu Yu. 105-107 [doi]
- CacheP4: A Behavior-level Caching Mechanism for P4Zijun Ma, Jun Bi, Cheng Zhang, Yu Zhou, Abdul Basit Dogar. 108-110 [doi]
- Wi-Fi Goes to Town: Rapid Picocell Switching for Wireless Transit NetworksZhenyu Song, Longfei Shangguan, Kyle Jamieson. 111-112 [doi]
- Deploy a 5G Network in Less Than 5 MinutesMohamed Naoufal Mahfoudi, Thierry Parmentelat, Thierry Turletti, Walid Dabbous, Raymond Knopp. 113-115 [doi]
- Fine-grained RFID Localization via Ultra-wideband EmulationYunfei Ma, Nicholas Selby, Manish Singh, Fadel Adib. 116-118 [doi]
- Time Synchronization in a Network of Bluetooth Low Energy BeaconsFarzad Asgarian, Khalil Najafi. 119-120 [doi]
- Cognitive IoT Gateways: Automatic Task Sharing and Switching between Cloud and Edge/Fog ComputingFatemeh Jalali, Olivia J. Smith, Timothy Lynar, Frank Suits. 121-123 [doi]
- Enabling Fine-Grained Edge Offloading for IoTVittorio Cozzolino, Aaron Yi Ding, Jörg Ott, Dirk Kutscher. 124-126 [doi]
- Use of Cuckoo Filters with FD.io VPP for Software IPv6 Routing LookupMinseok Kwon, Shailesh Vajpayee, Pragash Vijayaragavan, Arjun Dhuliya, John Marshall. 127-129 [doi]
- bitFA: A Novel Data Structure for Fast and Update-friendly Regular Expression MatchingZhe Fu, Shijie Zhou, Jun Li. 130-132 [doi]
- Stateful Layer-4 Load Balancing in Switching ASICsJeongkeun Lee, Rui Miao, Changhoon Kim, Minlan Yu, Hongyi Zeng. 133-135 [doi]
- BLOP: Batch-Level Order Preserving for GPU-Accelerated Packet ProcessingZhilong Zheng, Jun Bi, Heng Yu, Chen Sun, Jianping Wu. 136-137 [doi]
- Is it a SmartNIC or a Key-Value Store?: Both!Giuseppe Siracusano, Roberto Bifulco. 138-140 [doi]
- FTGuard: A Priority-Aware Strategy Against the Flow Table Overflow Attack in SDNMenghao Zhang, Jun Bi, Jiasong Bai, Zhao Dong, Yongbin Li, Zhaogeng Li. 141-143 [doi]
- Safeguarding VNF Credentials with Intel SGXNicolae Paladi, Linus Karlsson. 144-146 [doi]