AUGUST 17-22
SEATTLE, WA, USA
(authors: please see the logistics page)
Enhancing Resilience of P2P Systems to DDoS Reflector Attacks |
Xin Sun (Purdue University); Ruben Torres (Purdue University); Sanjay Rao (Purdue University) |
Towards Automated Auditing for Network Configuration Changes |
Yu-Wei Sung (Purdue University); Sanjay Rao (Purdue University); Subhabrata Sen (AT&T Labs); Stephen Leggett (AT&T Inc.) |
A Novel Approach to Reduce Traffic Chaos in Emergency and Evacuation Scenarios |
Syed R. Rizvi (Old Dominion University); Stephan Olariu (Old Dominion University); Mona E. Rizvi (Norfolk State University); Michele C. Weigle (Old Dominion University) |
Packets with Provenance |
Anirudh Ramachandran (Georgia Tech); Kaushik Bhandankar (Georgia Tech); Mukarram Bin Tariq (Georgia Tech); Nick Feamster (Georgia Tech) |
Towards Disruption-Free Intra-Domain Routing |
Ang Li (UC Irvine); Xiaowei Yang (UC Irvine); David Wetherall (Intel Research) |
FaceTrust: Collaborative Unwanted Traffic Mitigation based on Social Networks |
Michael Sirivianos (UC Irvine); Xiaowei Yang (UC Irvine) |
Path Based Network Modeling and Emulation |
Pramod Sanaga (University of Utah); Jonathon Duerig (University of Utah); Robert Ricci (University of Utah); Jay Lepreau (University of Utah) |
The Local and Global Effects of Traffic Shaping in the Internet |
Massimiliano Marcon (MPI-SWS); Marcel Dischinger (MPI-SWS); Krishna P. Gummadi (MPI-SWS); Amin Vahdat (UC San Diego) |
Predicting Wi-Fi Availability using Bluetooth and Cellular Signals |
Ganesh Ananthanarayanan (UC Berkeley); Ion Stoica (UC Berkeley) |
ISP-Friendly Peer Matching Algorithms |
ChengHsin Hsu (Simon Fraser University); Nitin Chiluka (Simon Fraser University); Mohamed Hefeeda (Simon Fraser University) |
Reachability Monitoring and Verification in Enterprise Networks |
Bo Zhang (Rice University); T. S. Eugene Ng (Rice University) |
Active Probing to Classify Internet Address Blocks |
Xue Cai (USC/ISI); John Heidemann (USC/ISI) |
A Pipelined Indexing Hash Table using Bloom and Fingerprint Filters for IP Lookup |
Heeyeol Yu (Texas A&M University); Rabi Mahapatra (Texas A&M University) |
Two bits are enough |
Ihsan Ayyub Qazi (University of Pittsburgh); Lachlan L. H. Andrew (Caltech); Taieb Znati (University of Pittsburgh and NSF) |
Ratpack: Communication in a Sparse Dynamic Network |
Jo Bitsch (RWTH Aachen University); Klaus Wehrle (RWTH Aachen University); Okuary Osechas (Tubingen University); Johannes Thiele (Tubingen University) |
Topological Transformation Approaches to Optimizing TCAM-Based Packet Processing Systems |
Chad R. Meiners (Michigan State University); Alex X. Liu (Michigan State University); Eric Torng (Michigan State University) |
A Taxonomy of Capabilities Based DDoS Defense Architectures |
Vamsi Kambhampati (Colorado State University); Dan Massey (Colorado State University); Christos Papadopoulos (Colorado State University) |
Unraveling the Subtleties of Link Estimation and Routing in Wireless Sensor Networks |
Hongwei Zhang (Wayne State University); Lifeng Sang (The Ohio State University); Anish Arora (The Ohio State University) |
Monitoring Network Bias |
Gergely Biczok (Northwestern University); Whitney Young (Northwestern University); Aleksandar Kuzmanovic (Northwestern University) |
Leveraging Altruistic Peers to Reduce the Bandwidth Costs of Free Content Downloads |
Cameron Dale (Simon Fraser University); Jiangchuan Liu (Simon Fraser University) |
Revisiting HTTP Traffic in the New Age |
Wei Li (University of Cambridge); Andrew W. Moore (University of Cambridge); Marco Canini (University of Genoa) |
Coverage Maximization in Small World Network Under Bandwidth Constraint |
Subrata Nandi (Indian Institute of Technology, Kharagpur); Lutz Brusch (Technical University of Dresden); Ajit Pal (Indian Institute of Technology, Kharagpur); Niloy Ganguly (Indian Institute of Technology, Kharagpur) |
Relaying a Fountain code across multiple nodes |
Ramakrishna Gummadi; Ramavarapu Sreenivas |
OneClick: A Framework for Capturing Users' Network Experiences |
Cheng-Chun Tu (Academia Sinica); Kuan-Ta Chen (Academia Sinica); Yu-Chun Chang (National Taiwan University); Chin-Laung Lei (National Taiwan University) |
Detecting Peer-to-Peer Activity by Signaling Packet Counting |
Chen-Chi Wu (National Taiwan University); Kuan-Ta Chen (Academia Sinica); Yu-Chun Chang (National Taiwan University); Chin-Laung Lei (National Taiwan University) |
A User-Centric Framework for Comparing Applications' Network Robustness |
Hung-Hsuan Chen (Academia Sinica); Kuan-Ta Chen (Academia Sinica); Cheng-Chun Tu (Academia Sinica) |
Stealthy IP Prefix Hijacking: Don't Bite More Than You Can Chew |
Christian McArthur (Texas State University-San Marcos); Mina Guirguis (Texas State University-San Marcos) |
Digging into KAD Users' Shared Folders |
Marcin Pietrzyk (Orange Labs); Guillaume Urvoy-Keller (Institut Eurecom); Jean-Laurent Costeux (Orange Labs) |
On the Problem of Channel Selection in Live Streaming IPTV Systems |
Meeyoung Cha (MPI-SWS); Krishna P. Gummadi (MPI-SWS); Pablo Rodriguez (Telefonica Research Barcelona) |
Detecting DDoS Attacks Against Web Server via Lightweight TCM-KNN Algorithm |
Yang Li (Institute of Computing Technology; Chinese Academy of Sciences); Li Guo (Institute of Computing Technology; Chinese Academy of Sciences); Bin-Xing Fang (Institute of Computing Technology; Chinese Academy of Sciences) |
Towards Zero-Cost Retransmission through Physical-Layer Network Coding in Wireless Networks |
Sangki Yun (Korea University); Hyogon Kim (Korea University) |
On the Accurate Identification of Network Paths having a Common Bottleneck |
Muhammad Murtaza Yousaf (University of Innsbruck); Michael Welzl (University of Innsbruck); Bulent Yener (Rensselaer Polytechnic Institute) |
Modeling the Flow of Information in a Social Network |
Sarita Yardi (Georgia Tech); Amy Bruckman (Georgia Tech) |