AUGUST 17-22
SEATTLE, WA, USA
(authors: please see the logistics page)
| Enhancing Resilience of P2P Systems to DDoS Reflector Attacks |
| Xin Sun (Purdue University); Ruben Torres (Purdue University); Sanjay Rao (Purdue University) |
| Towards Automated Auditing for Network Configuration Changes |
| Yu-Wei Sung (Purdue University); Sanjay Rao (Purdue University); Subhabrata Sen (AT&T Labs); Stephen Leggett (AT&T Inc.) |
| A Novel Approach to Reduce Traffic Chaos in Emergency and Evacuation Scenarios |
| Syed R. Rizvi (Old Dominion University); Stephan Olariu (Old Dominion University); Mona E. Rizvi (Norfolk State University); Michele C. Weigle (Old Dominion University) |
| Packets with Provenance |
| Anirudh Ramachandran (Georgia Tech); Kaushik Bhandankar (Georgia Tech); Mukarram Bin Tariq (Georgia Tech); Nick Feamster (Georgia Tech) |
| Towards Disruption-Free Intra-Domain Routing |
| Ang Li (UC Irvine); Xiaowei Yang (UC Irvine); David Wetherall (Intel Research) |
| FaceTrust: Collaborative Unwanted Traffic Mitigation based on Social Networks |
| Michael Sirivianos (UC Irvine); Xiaowei Yang (UC Irvine) |
| Path Based Network Modeling and Emulation |
| Pramod Sanaga (University of Utah); Jonathon Duerig (University of Utah); Robert Ricci (University of Utah); Jay Lepreau (University of Utah) |
| The Local and Global Effects of Traffic Shaping in the Internet |
| Massimiliano Marcon (MPI-SWS); Marcel Dischinger (MPI-SWS); Krishna P. Gummadi (MPI-SWS); Amin Vahdat (UC San Diego) |
| Predicting Wi-Fi Availability using Bluetooth and Cellular Signals |
| Ganesh Ananthanarayanan (UC Berkeley); Ion Stoica (UC Berkeley) |
| ISP-Friendly Peer Matching Algorithms |
| ChengHsin Hsu (Simon Fraser University); Nitin Chiluka (Simon Fraser University); Mohamed Hefeeda (Simon Fraser University) |
| Reachability Monitoring and Verification in Enterprise Networks |
| Bo Zhang (Rice University); T. S. Eugene Ng (Rice University) |
| Active Probing to Classify Internet Address Blocks |
| Xue Cai (USC/ISI); John Heidemann (USC/ISI) |
| A Pipelined Indexing Hash Table using Bloom and Fingerprint Filters for IP Lookup |
| Heeyeol Yu (Texas A&M University); Rabi Mahapatra (Texas A&M University) |
| Two bits are enough |
| Ihsan Ayyub Qazi (University of Pittsburgh); Lachlan L. H. Andrew (Caltech); Taieb Znati (University of Pittsburgh and NSF) |
| Ratpack: Communication in a Sparse Dynamic Network |
| Jo Bitsch (RWTH Aachen University); Klaus Wehrle (RWTH Aachen University); Okuary Osechas (Tubingen University); Johannes Thiele (Tubingen University) |
| Topological Transformation Approaches to Optimizing TCAM-Based Packet Processing Systems |
| Chad R. Meiners (Michigan State University); Alex X. Liu (Michigan State University); Eric Torng (Michigan State University) |
| A Taxonomy of Capabilities Based DDoS Defense Architectures |
| Vamsi Kambhampati (Colorado State University); Dan Massey (Colorado State University); Christos Papadopoulos (Colorado State University) |
| Unraveling the Subtleties of Link Estimation and Routing in Wireless Sensor Networks |
| Hongwei Zhang (Wayne State University); Lifeng Sang (The Ohio State University); Anish Arora (The Ohio State University) |
| Monitoring Network Bias |
| Gergely Biczok (Northwestern University); Whitney Young (Northwestern University); Aleksandar Kuzmanovic (Northwestern University) |
| Leveraging Altruistic Peers to Reduce the Bandwidth Costs of Free Content Downloads |
| Cameron Dale (Simon Fraser University); Jiangchuan Liu (Simon Fraser University) |
| Revisiting HTTP Traffic in the New Age |
| Wei Li (University of Cambridge); Andrew W. Moore (University of Cambridge); Marco Canini (University of Genoa) |
| Coverage Maximization in Small World Network Under Bandwidth Constraint |
| Subrata Nandi (Indian Institute of Technology, Kharagpur); Lutz Brusch (Technical University of Dresden); Ajit Pal (Indian Institute of Technology, Kharagpur); Niloy Ganguly (Indian Institute of Technology, Kharagpur) |
| Relaying a Fountain code across multiple nodes |
| Ramakrishna Gummadi; Ramavarapu Sreenivas |
| OneClick: A Framework for Capturing Users' Network Experiences |
| Cheng-Chun Tu (Academia Sinica); Kuan-Ta Chen (Academia Sinica); Yu-Chun Chang (National Taiwan University); Chin-Laung Lei (National Taiwan University) |
| Detecting Peer-to-Peer Activity by Signaling Packet Counting |
| Chen-Chi Wu (National Taiwan University); Kuan-Ta Chen (Academia Sinica); Yu-Chun Chang (National Taiwan University); Chin-Laung Lei (National Taiwan University) |
| A User-Centric Framework for Comparing Applications' Network Robustness |
| Hung-Hsuan Chen (Academia Sinica); Kuan-Ta Chen (Academia Sinica); Cheng-Chun Tu (Academia Sinica) |
| Stealthy IP Prefix Hijacking: Don't Bite More Than You Can Chew |
| Christian McArthur (Texas State University-San Marcos); Mina Guirguis (Texas State University-San Marcos) |
| Digging into KAD Users' Shared Folders |
| Marcin Pietrzyk (Orange Labs); Guillaume Urvoy-Keller (Institut Eurecom); Jean-Laurent Costeux (Orange Labs) |
| On the Problem of Channel Selection in Live Streaming IPTV Systems |
| Meeyoung Cha (MPI-SWS); Krishna P. Gummadi (MPI-SWS); Pablo Rodriguez (Telefonica Research Barcelona) |
| Detecting DDoS Attacks Against Web Server via Lightweight TCM-KNN Algorithm |
| Yang Li (Institute of Computing Technology; Chinese Academy of Sciences); Li Guo (Institute of Computing Technology; Chinese Academy of Sciences); Bin-Xing Fang (Institute of Computing Technology; Chinese Academy of Sciences) |
| Towards Zero-Cost Retransmission through Physical-Layer Network Coding in Wireless Networks |
| Sangki Yun (Korea University); Hyogon Kim (Korea University) |
| On the Accurate Identification of Network Paths having a Common Bottleneck |
| Muhammad Murtaza Yousaf (University of Innsbruck); Michael Welzl (University of Innsbruck); Bulent Yener (Rensselaer Polytechnic Institute) |
| Modeling the Flow of Information in a Social Network |
| Sarita Yardi (Georgia Tech); Amy Bruckman (Georgia Tech) |