


default search action
10th CoNEXT 2014: Sydney, Australia - Student Workshop
- George Iosifidis, Eric Keller, Sun Yi:
Proceedings of the 2014 CoNEXT on Student Workshop, CoNEXT Student Workshop '14, Sydney, Australia, December 2, 2014. ACM 2014, ISBN 978-1-4503-3282-8
Best Paper Session
- Peng Wang, Hong Xu
:
Expeditus: Distributed Load Balancing with Global Congestion Information in Data Center Networks. 1-3
Big Data
- Jiaqi Zheng, Hong Xu
, Guihai Chen, Haipeng Dai:
Minimizing Transient Congestion during Network Update in Data Centers. 4-6 - Yusuke Ito, Hiroyuki Koga, Katsuyoshi Iida
:
A Bandwidth Allocation Scheme to Improve Fairness in Data Center Networks. 7-8 - Se-Young Yu
, Nevil Brownlee
, Aniket Mahanti
:
Performance and Fairness Issues in Big Data Transfers. 9-11 - Naveen Gupta, Anurag Singh
:
A Novel Strategy for Link Prediction in Social Networks. 12-14
Wireless
- Ankur Sial, Abhishek Jain, Amarjeet Singh, Aniket Mahanti
:
Profiling Energy Consumption in a Residential Campus. 15-17 - Mirko Schiavone, Peter Romirer-Maierhofer, Pierdomenico Fiadino, Pedro Casas:
Diagnosing Device-Specific Anomalies in Cellular Networks. 18-20 - Ayub Bokani
:
Location-Based Adaptation for DASH in Vehicular Environment. 21-23 - Jagmohan Chauhan, Anirban Mahanti, Mohamed Ali Kâafar
:
Towards the Era of Wearable Computing? 24-25
Security
- Qinwen Hu, Nevil Brownlee
:
How Interface ID Allocation Mechanisms are Performed in IPv6. 26-27 - Yasutaka Shindo, Akihiro Satoh, Yutaka Nakamura, Katsuyoshi Iida
:
Lightweight Approach to Detect Drive-by Download Attacks Based on File Type Transition. 28-30 - Muhammad Ikram, Hassan Asghar
, Mohamed Ali Kâafar
, Anirban Mahanti:
On the Intrusiveness of JavaScript on the Web. 31-33 - David Gugelmann, Bernhard Ager, Vincent Lenders
:
Towards Classifying Third-Party Web Services at Scale. 34-36
Future Internet
- Jiangyuan Yao, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Yahui Li:
Model Based Black-Box Testing of SDN Applications. 37-39 - Zainab Abaid, Mohsen Rezvani, Sanjay K. Jha
:
MalwareMonitor: An SDN-based Framework for Securing Large Networks. 40-42 - Lirim Osmani, Heikki Lindholm, Binoy Chemmagate, Ashwin Rao
, Sasu Tarkoma
, Johanna Heinonen, Hannu Flinck:
Building Blocks for an Elastic Mobile Core. 43-45 - Sugi Lee, Yusung Kim, Younghoon Kim, Ikjun Yeom:
Active Interest Management for Improving Flow Completion Time in Named-Data Networking. 46-48

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.