default search action
14. HotNets 2015: Philadelphia, PA, USA
- Jaudelice de Oliveira, Jonathan Smith, Katerina J. Argyraki, Philip Alexander Levis:
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16 - 17, 2015. ACM 2015, ISBN 978-1-4503-4047-2 - Ben Jones, Nick Feamster:
Can Censorship Measurements Be Safe(r)? 1:1-1:7 - Aqib Nisar, Aqsa Kashaf, Zartash Afzal Uzmi, Ihsan Ayyub Qazi:
A Case for Marrying Censorship Measurements with Circumvention. 2:1-2:7 - Fotios Papaodyssefs, Costas Iordanou, Jeremy Blackburn, Nikolaos Laoutaris, Konstantina Papagiannaki:
Web Identity Translator: Behavioral Advertising and Identity Privacy with WIT. 3:1-3:7 - David Naylor, Peter Steenkiste:
Do You Know Where Your Headers Are? Comparing the Privacy of Network Architectures with Share Count Analysis. 4:1-4:7 - Tianlong Yu, Vyas Sekar, Srinivasan Seshan, Yuvraj Agarwal, Chenren Xu:
Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things. 5:1-5:7 - Nick Shelly, Brendan Tschaen, Klaus-Tycho Förster, Michael Alan Chang, Theophilus Benson, Laurent Vanbever:
Destroying networks for fun (and profit). 6:1-6:7 - Seong Min Kim, Youjung Shin, Jaehyung Ha, Taesoo Kim, Dongsu Han:
A First Step Towards Leveraging Commodity Trusted Execution Environments for Network Applications. 7:1-7:7 - Meng Meng, Lizhao You, Kun Tan, Jiansong Zhang, Wenjie Wang:
SpaceHub: A Smart Relay System for Smart Home. 8:1-8:7 - Peter Anthony Iannucci, Ravi Netravali, Ameesh K. Goyal, Hari Balakrishnan:
Room-Area Networks. 9:1-9:7 - Avichai Cohen, Yossi Gilad, Amir Herzberg, Michael Schapira:
One Hop for RPKI, One Giant Leap for BGP Security. 10:1-10:7 - Matthias Wählisch, Robert Schmidt, Thomas C. Schmidt, Olaf Maennel, Steve Uhlig, Gareth Tyson:
RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem. 11:1-11:7 - Raja R. Sambasivan, David Tran-Lam, Aditya Akella, Peter Steenkiste:
Bootstrapping Evolvability for Inter-Domain Routing. 12:1-12:7 - Mehdi Nikkhah, Constantine Dovrolis, Roch Guérin:
Why didn't my (great!) protocol get adopted? 13:1-13:7 - Lavanya Jose, Lisa Yan, Mohammad Alizadeh, George Varghese, Nick McKeown, Sachin Katti:
High Speed Networks Need Proactive Congestion Control. 14:1-14:7 - James Murphy McCauley, Alice Sheng, Ethan J. Jackson, Barath Raghavan, Sylvia Ratnasamy, Scott Shenker:
Taking an AXE to L2 Spanning Trees. 15:1-15:7 - Asaf Valadarsky, Michael Dinitz, Michael Schapira:
Xpander: Unveiling the Secrets of High-Performance Datacenters. 16:1-16:7 - Soudeh Ghorbani, Brighten Godfrey, Yashar Ganjali, Amin Firoozshahian:
Micro Load Balancing in Data Centers with DRILL. 17:1-17:7 - Ramakrishnan Durairajan, Sathiya Kumaran Mani, Joel Sommers, Paul Barford:
Time's Forgotten: Using NTP to understand Internet Latency. 18:1-18:7 - Osama Haq, Fahad R. Dogar:
Leveraging the Power of Cloud for Reliable Wide Area Communication. 19:1-19:7 - Omid Alipourfard, Masoud Moshref, Minlan Yu:
Re-evaluating Measurement Algorithms in Software. 20:1-20:7 - Zaoxing Liu, Gregory Vorsanger, Vladimir Braverman, Vyas Sekar:
Enabling a "RISC" Approach for Software-Defined Monitoring using Universal Streaming. 21:1-21:7 - Christos Pappas, Katerina J. Argyraki, Stefan Bechtold, Adrian Perrig:
Transparency Instead of Neutrality. 22:1-22:7 - Anirudh Sivaraman, Suvinay Subramanian, Anurag Agrawal, Sharad Chole, Shang-Tse Chuang, Tom Edsall, Mohammad Alizadeh, Sachin Katti, Nick McKeown, Hari Balakrishnan:
Towards Programmable Packet Scheduling. 23:1-23:7 - Radhika Mittal, Rachit Agarwal, Sylvia Ratnasamy, Scott Shenker:
Universal Packet Scheduling. 24:1-24:7 - Ang Chen, Yang Wu, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
Differential Provenance: Better Network Diagnostics with Reference Events. 25:1-25:7 - Yang Wu, Ang Chen, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
Automated Network Repair with Meta Provenance. 26:1-26:7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.