Abstract is missing.
- Traffic classification using deep learning: being highly accurate is not enoughKang-Hee Lee, Seunghun Lee, Hyun-Chul Kim. 1-2 [doi]
- MeshScope: a bottom-up approach for configuration inspection in service meshXing Li, Xiao Wang, Yan Chen. 3-5 [doi]
- AnnaBellaDB: a key value store for stateless network functionsMárk Szalay, Péter Mátray, László Toka. 6-8 [doi]
- FSO clusters for data center network management and packet telemetryAmer AlGhadhban. 9-11 [doi]
- Large scale symmetric network malfunction detectionChe Zhang, Zhen Wang, Shiwei Zhang, Weichao Li, Qing Li, Yi Wang. 12-14 [doi]
- BeamSurfer: simple in-band beam management for mobile mm-wave devicesVenkata Siva Santosh Ganji, Tzu-Hsiang Lin, Francisco A. Espinal, P. R. Kumar 0001. 15-17 [doi]
- In-network defense against AR-DDoS attacksXin Zhe Khooi, Levente Csikor, Min-Suk Kang, Dinil Mon Divakaran. 18-20 [doi]
- Network protocol safe configuration search in one shotYou Li, Kaiyu Hou, Hai Zhou, Yan Chen. 21-23 [doi]
- Corona-warn-app: tracing the start of the official COVID-19 exposure notification app for germanyJens Helge Reelfs, Oliver Hohlfeld, Ingmar Poese. 24-26 [doi]
- Automatic optimization of software data planesSebastiano Miano, Gábor Rétvári, Fulvio Risso, Andrew W. Moore 0002, Gianni Antichi. 27-29 [doi]
- Defending lightweight virtual switches from cross-app poisoning attacks with vIFCGuilherme Bueno, Mateus Saquetti, José Rodrigo Azambuja, Weverton Cordeiro. 30-32 [doi]
- Dynamic latency control of serverless applications operated on AWS lambda and greengrassIstván Pelle, János Czentye, János Dóka, Balázs Sonkoly. 33-34 [doi]
- How good is your mobile (web) surfing?: speed index inference from encrypted trafficSarah Wassermann, P. Casas, Michael Seufert, Nikolas Wehner, J. Schüler, Tobias Hossfeld. 35-36 [doi]
- Model predictive control for load balancingPham Tran Anh Quang, Youcef Magnouche, Jeremie Leguay, Xu Gong, Feng Zeng. 37-38 [doi]
- SSRDM: semi-supervised real-time DDoS detection mechanismRuihao Wang, Yangyang Wang, Mingwei Xu. 39-41 [doi]
- Visualizing QUIC and HTTP/3 with qlog and qvisRobin Marx, Wim Lamotte, Peter Quax. 42-43 [doi]
- AR over NDN: augmented reality applications and the rise of information centric networkingJános Dóka, Bálint György Nagy, Muhammad Atif Ur Rehman, Dong-Hak Kim, Byung-Seo Kim, László Toka, Balázs Sonkoly. 44-45 [doi]
- Optimized bitrate ladders for adaptive video streaming with deep reinforcement learningTianchi Huang, Lifeng Sun. 46-48 [doi]
- Revisiting heavy-hitters: don't count packets, compute flow inter-packet metrics in the data planeSuneet Kumar Singh, Christian Esteve Rothenberg, Marcelo Caggiani Luizelli, Gianni Antichi, Gergely Pongrácz. 49-51 [doi]
- Towards optimal path encoding using SAT solverDong Guo, Ying Zhang. 52-54 [doi]
- RAL: reinforcement active learning for network traffic monitoring and analysisSarah Wassermann, Thibaut Cuvelier, Pedro Casas. 55-56 [doi]
- System call interception for serverless isolationNishant Baranwal Somy, Abhijit Mondal, Bishakh Chandra Ghosh, Sandip Chakraborty. 57-59 [doi]
- Fenglin-I: an open-source TSN chip for scenario-driven customizationWenwen Fu, Jinli Yan, Wei Quan 0004, ZhiGang Sun. 60-61 [doi]
- Network anomaly detection with net-GAN, a generative adversarial network for analysis of multivariate time-seriesGastón García González, Pedro Casas, Alicia Fernández, Gabriel Gómez. 62-64 [doi]
- 5G tracker: a crowdsourced platform to enable research using commercial 5g servicesArvind Narayanan, Eman Ramadan, Jacob Quant, Peiqi Ji, Feng Qian, Zhi-Li Zhang. 65-67 [doi]
- A proof-of-concept 5G mobile gateway with eBPFFederico Parola, Sebastiano Miano, Fulvio Risso. 68-69 [doi]
- Millimeter wave wireless network on chip using deep reinforcement learningSuraj Jog, Zikun Liu, Antonio Franques, Vimuth Fernando, Haitham Hassanieh, Sergi Abadal, Josep Torrellas. 70-72 [doi]
- Accelerating disaggregated data centers using unikernelWonsup Yoon, Jinyoung Oh, Sue B. Moon, Youngjin Kwon. 73-75 [doi]
- Real-time deep learning based traffic analyticsMassimo Gallo, Alessandro Finamore, Gwendal Simon, Dario Rossi. 76-78 [doi]
- TSNTag: a multi-semantic flow identification mechanism enabling full-custom TSN designJinli Yan, Wenwen Fu, Wei Quan 0004, ZhiGang Sun. 79-81 [doi]
- COC: hierarchical coflow ordering for WAN bandwidth optimization in inter-data centerJingxuan Zhang, Y. Richard Yang. 82-84 [doi]
- AS relationships inference from the internet routing registriesAkmal Khan, Hyunchul Kim, Ted "Taekyoung" Kwon. 85-87 [doi]
- Towards in-network time-decaying aggregates for heavy-hitter detectionXin Zhe Khooi, Levente Csikor, Min-Suk Kang, Dinil Mon Divakaran. 88-90 [doi]
- Optimized tracing of iCF-enabled programmable data planesLucas Castanheira, Alberto Schaeffer-Filho, Theophilus A. Benson. 91-93 [doi]
- Observing BGP route poisoning in the wildYangyang Wang, Mingwei Xu. 94-96 [doi]