![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
ANRW 2024: Vancouver, BC, Canada
- Proceedings of the 2024 Applied Networking Research Workshop, ANRW 2024, Vancouver, BC, Canada, 23 July 2024. ACM 2024
- Joris Herbots
, Robin Marx
, Maarten Wijnants
, Peter Quax
, Wim Lamotte
:
HTTP/3's Extensible Prioritization Scheme in the Wild. - Tal Mizrahi
, Michael Schapira
, Yoram Moses
:
The Observer Effect in Computer Networks. - Savvas Kastanakis
, Vasileios Giotsas
, Ioana Livadariu
, Neeraj Suri
:
Investigating Location-aware Advertisements in Anycast IP Networks. - Bernhard Degen
, Mattijs Jonker
, Roland van Rijswijk-Deij
, Raffaele Sommese
:
An Empirical Characterization of Anycast Convergence Time. - J. J. Garcia-Luna-Aceves
, Morteza Moghaddassian
:
DARE: Making Diffusing Computations More Efficient for Loop-Free Shortest-Path Routing. - Szilveszter Nádas
, Lars Ernström
, László Szilágyi
, Gyanesh Patra
, Dmitri Krylov
, Jonathan Lynam
:
To QoE or not to QoE. - Fatih Berkay Sarpkaya
, Ashutosh Srivastava
, Fraida Fund
, Shivendra S. Panwar
:
To switch or not to switch to TCP Prague? Incentives for adoption in a partial L4S deployment. - Edwin Sutherland
, Iain Phillips
:
Low-Carb BGP: A Carbon-Aware Inter-Domain Routing Extension to BGP. - Justin Iurman
, Benoit Donnet
:
Implementing and Evaluating Ioam Integrity Protection. - Shyam Krishna Khadka
, Suzan Bayhan
, Ralph Holz
, Cristian Hesselman
:
Assessing the security of Internet paths: A case study of Dutch critical infrastructures. - Elias Heftrig
, Haya Schulmann
, Niklas Vogel
, Michael Waidner
:
Protocol Fixes for KeyTrap Vulnerabilities. - Lancheng Qin
, Libin Liu
, Li Chen
, Dan Li
, Yuqian Shi
, Hongbing Yang
:
UniSAV: A Unified Framework for Internet-Scale Source Address Validation. - James I. Madeley
, Amreesh Phokeer
, Aftab Siddiqui
, Theophilus A. Benson
:
Towards Measuring Content Locality. - Peter Willis
, Nirmala Shenoy
, Yin Pan
, Bill Stackpole
:
Investigating Data Center Network Protocols. - Y A Joarder
, Carol J. Fung
:
QUICPro: Integrating Deep Reinforcement Learning to Defend against QUIC Handshake Flooding Attacks. - Danesh Zeynali
, Emilia N. Weyulu
, Seifeddine Fathalli
, Balakrishnan Chandrasekaran
, Anja Feldmann
:
BBRv3 in the public Internet: a boon or a bane? - Punnal Ismail Khan
, Satyandra Guthula
, Roman Beltiukov
, Roland Schmid
, Tobias Bühler
, Arpit Gupta
, Laurent Vanbever
, Walter Willinger
:
Harnessing Public Code Repositories to Develop Production-Ready ML Artifacts for Networking. - Jari Arkko
, Dag Lindbo
, Martin Klitte
:
Do Large Language Models Dream of Sockets?
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.