Abstract is missing.
- A Programmable Framework for Validating Data PlanesPietro Bressana, Noa Zilberman, Robert Soulé. 1-3 [doi]
- Adaptive Network Security through Stream Machine LearningPavol Mulinka, Pedro Casas. 4-5 [doi]
- CircuitStart: A Slow Start For Multi-Hop Anonymity SystemsChristoph Döpmann, Florian Tschorsch. 6-8 [doi]
- CoFilter: A High-Performance Switch-Assisted Stateful Packet FilterJiamin Cao, Jun Bi, Yu Zhou, Cheng Zhang. 9-11 [doi]
- Dynam-IX: a Dynamic Interconnection eXchangePedro Marcos, Marco Chiesa, Lucas F. Müller, Pradeeban Kathiravelu, Christoph Dietzel, Marco Canini, Marinho P. Barcellos. 12-14 [doi]
- DynaShield: A Cost-Effective DDoS Defense ArchitectureShengbao Zheng, Xiaowei Yang. 15-17 [doi]
- Enabling Dense Spatial Reuse in mmWave NetworksSuraj Jog, Jiaming Wang, Haitham Hassanieh, Romit Roy Choudhury. 18-20 [doi]
- Equivalence and its applications to network verificationDragos Dumitrescu, Radu Stoenescu, Matei Popovici, Lorina Negreanu, Costin Raiciu. 21-23 [doi]
- Fast Congestion Control in RDMA-based Datacenter NetworksJaichen Xue, Muhammad Usama Chaudhry, Balajee Vamanan, T. N. Vijaykumar, Mithuna Thottethodi. 24-26 [doi]
- Fine-Grained, Multi-Domain Network Resource Abstraction as a Fundamental Primitive to Enable High-Performance, Collaborative Data SciencesQiao Xiang, J. Jensen Zhang, X. Tony Wang, Y. Jace Liu, Chin Guok, Franck Le, John Macauley, Harvey Newman, Y. Richard Yang. 27-29 [doi]
- Flowtree: Enabling Distributed Flow Summarization at ScaleSaid Jawad Saidi, Damien Foucard, Georgios Smaragdakis, Anja Feldmann. 30-32 [doi]
- High speed adaptive rack-scale fabricsOmer S. Sella, Andrew W. Moore 0002, Noa Zilberman. 33-35 [doi]
- High-Fidelity Interdomain Routing ExperimentsBrivaldo Junior, Ronaldo A. Ferreira, Ítalo Cunha, Brandon Schlinker, Ethan Katz-Bassett. 36-38 [doi]
- Immersion on the Edge: A Cooperative Framework for Mobile Immersive ComputingZeqi Lai, Yong Cui 0001, Ziyi Wang, Xiaoyu Hu. 39-41 [doi]
- In-band Network Function TelemetryJianzhe Liang, Jun Bi, Yu Zhou, Cheng Zhang. 42-44 [doi]
- KeySched: Timeslot-based Hot Key Scheduling for Load Balancing in Key-Value StoreHeng Yu, Jun Bi, Chen Sun. 45-47 [doi]
- Modeling IP-to-IP Communication using the Weighted Stochastic Block ModelPatrick Kalmbach, Lion Gleiter, Johannes Zerwas, Andreas Blenk, Wolfgang Kellerer, Stefan Schmid 0001. 48-50 [doi]
- Filtering Spoofed IP Traffic Using Switching ASICsJiasong Bai, Jun Bi, Menghao Zhang, Guanyu Li. 51-53 [doi]
- Observing Network Handovers with Multipath TCPQuentin De Coninck, Olivier Bonaventure. 54-56 [doi]
- On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXPNico Hinze, Marcin Nawrocki, Mattijs Jonker, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch. 57-59 [doi]
- Operating a DNS-based Active Internet ObservatoryOliver Hohlfeld. 60-62 [doi]
- PAM: When Overloaded, Push Your Neighbor Aside!Zili Meng, Jun Bi, Chen Sun, Shuhe Wang, Minhu Wang, Hongxin Hu. 63-65 [doi]
- perfbench: A Tool for Predictability Analysis in Multi-Tenant Software-Defined NetworksAndreas Blenk, Arsany Basta, Laurenz Henkel, Johannes Zerwas, Wolfgang Kellerer, Stefan Schmid 0001. 66-68 [doi]
- Polyraptor: Embracing Path and Data Redundancy in Data Centres for Efficient Data TransportMohammed Alasmar, George Parisis, Jon Crowcroft. 69-71 [doi]
- Poster: Towards a Collaborative and Retrospective Understanding of Security Events with Retro-FutureCalvin Ardi, John S. Heidemann, Gina Fisk, Mike Fisk, Christos Papadopoulos. 72-74 [doi]
- RawPower: Deep Learning based Anomaly Detection from Raw Network Traffic MeasurementsGonzalo Marín, Pedro Casas, Germán Capdehourat. 75-77 [doi]
- Redundant Logic Elimination in Network FunctionsBangwen Deng, Wenfei Wu. 78-80 [doi]
- Revealing Hidden Hierarchical Heavy Hitters in network trafficSalvator Galea, Andrew W. Moore 0002, Gianni Antichi, Giuseppe Bianchi 0001, Roberto Bifulco. 81-83 [doi]
- Scalable Surface Reconstruction in the Mobile EdgeDániel Varga, Sándor Laki. 84-86 [doi]
- SFP: Toward Interdomain Routing for SDN NetworksQiao Xiang, Chin Guok, Franck Le, John Macauley, Harvey Newman, Y. Richard Yang. 87-89 [doi]
- SN-FFC: Improving Survivability of LEO Satellite Network with Forward Fault CorrectionShaoqing Wang, Youjian Zhao, Hui Xie. 90-92 [doi]
- The Case for a Rackless Data Center Network ArchitectureDingming Wu 0002, Ang Chen, T. S. Eugene Ng. 93-95 [doi]
- vNS: a modular programmable virtual network switchMassimo Gallo, Fabio Pianese. 96-98 [doi]
- A Fully Portable TCP Implementation Using XFSMsGiuseppe Bianchi 0001, Michael Welzl, Angelo Tulumello, Giacomo Belocchi, Marco Faltelli, Salvatore Pontarelli. 99-101 [doi]
- A large-scale demonstration of SDN-based handover management in IEEE 802.11 networksEnsar Zeljkovic, Johann M. Márquez-Barja, Steven Latré. 102-104 [doi]
- A practical method for measuring Web above-the-fold timeDiego N. da Hora, Dario Rossi, Vassilis Christophides, Renata Teixeira. 105-107 [doi]
- Accelerating Linux Security with eBPF iptablesMatteo Bertrone, Sebastiano Miano, Fulvio Risso, Massimo Tumolo. 108-110 [doi]
- BB-Gen: A Packet Crafter for P4 Target EvaluationFabricio Rodriguez, P. Gyanesh Kumar Patra, Levente Csikor, Christian Esteve Rothenberg, Péter Vörös, Sándor Laki, Gergely Pongrácz. 111-113 [doi]
- Blockchain-based Decentralized Applications meet Multi-Administrative Domain NetworkingRaphael Vicente Rosa, Christian Esteve Rothenberg. 114-116 [doi]
- CLICK-UP: Towards Software Upgrades of Click-driven Stateful Network ElementsJunxiao Wang, Yuchen Huang, Heng Qi, Keqiu Li, Steve Uhlig. 117-119 [doi]
- Controlling Drones from 5G NetworksJános Czentye, János Dóka, Árpád Nagy, László Toka, Balázs Sonkoly, Róbert Szabó. 120-122 [doi]
- Controlling Real Cloud Experiments from BGP to the Server (and Back)Todd Arnold, Brandon Schlinker, Ítalo Cunha, Ethan Katz-Bassett. 123-125 [doi]
- Design of SOCKS Version 6Vladimir Olteanu, Dragos Niculescu. 126-128 [doi]
- Exploring various use cases for IPv6 Segment RoutingFabien Duchene, Mathieu Jadin, Olivier Bonaventure. 129-131 [doi]
- Fair dropping for multi-resource fairness in software routers Extended AbstractVamsi Addanki, Leonardo Linguaglossa, James Roberts, Dario Rossi. 132-134 [doi]
- FENDE: Marketplace and Federated Ecosystem for the Distribution and Execution of VNFsLucas Bondan, Muriel Figueredo Franco, Alberto E. Schaeffer Filho, Lisandro Zambenedetti Granville, Leonardo da Cruz Marcuzzo, Cassiano A. D. S. Schneider, Carlos Raniery Paula dos Santos, Giovanni Venâncio, Elias Procópio Duarte Jr.. 135-137 [doi]
- High-speed per-flow software monitoring with limited resourcesTianzhu Zhang, Leonardo Linguaglossa, Massimo Gallo, Paolo Giaccone, Dario Rossi. 138-140 [doi]
- Muses: Enabling Lightweight and Diversity for Learning Based Congestion ControlWei Wang, Yiyang Shao, Kai Zheng. 141-143 [doi]
- Overbooking Network Slices End-to-End: Implementation and DemonstrationLanfranco Zanzi, Josep Xavier Salvat, Vincenzo Sciancalepore, Andres Garcia-Saavedra, Xavier Costa-Pérez. 144-146 [doi]
- Policy Injection: A Cloud Dataplane DoS AttackLevente Csikor, Christian Esteve Rothenberg, Dimitrios P. Pezaros, Stefan Schmid 0001, László Toka, Gábor Rétvári. 147-149 [doi]
- ShadowP4: Building and Testing Modular ProgramsPeng Zheng, Theophilus Benson, Chengchen Hu. 150-152 [doi]
- Testing IDS using GENESIDS: Realistic Mixed Traffic Generation for IDS EvaluationFelix Erlacher, Falko Dressler. 153-155 [doi]