default search action
HotNets 2013: College Park, MD, USA
- Dave Levine, Sachin Katti, Dave Oran:
Twelfth ACM Workshop on Hot Topics in Networks, HotNets-XII, College Park, MD, USA, November 21-22, 2013. ACM 2013, ISBN 978-1-4503-2596-7 - Jeffrey C. Mogul, Alvin AuYoung, Sujata Banerjee, Lucian Popa, Jeongkeun Lee, Jayaram Mudigonda, Puneet Sharma, Yoshio Turner:
Corybantic: towards the modular composition of SDN control programs. 1:1-1:7 - Matthew Monaco, Oliver Michel, Eric Keller:
Applying operating system principles to SDN controller design. 2:1-2:7 - Yang Wu, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
Answering why-not queries in software-defined networks with negative provenance. 3:1-3:7 - Dinesh Bharadia, Kiran Raj Joshi, Sachin Katti:
Full duplex backscatter. 4:1-4:7 - Pan Hu, Liqun Li, Chunyi Peng, Guobin Shen, Feng Zhao:
Pharos: enable physical analytics through visible light based indoor localization. 5:1-5:7 - Tan Zhang, Suman Banerjee:
Inaccurate spectrum databases?: public transit to its rescue! 6:1-6:7 - Lenin Ravindranath, Sharad Agarwal, Jitendra Padhye, Christopher J. Riederer:
Give in to procrastination and stop prefetching. 7:1-7:7 - Vimalkumar Jeyakumar, Mohammad Alizadeh, Changhoon Kim, David Mazières:
Tiny packet programs for low-latency network control and monitoring. 8:1-8:7 - Ilias Marinos, Robert N. M. Watson, Mark Handley:
Network stack specialization for performance. 9:1-9:7 - Sangjin Han, Norbert Egi, Aurojit Panda, Sylvia Ratnasamy, Guangyu Shi, Scott Shenker:
Network support for resource disaggregation in next-generation datacenters. 10:1-10:7 - Zengbin Zhang, Lin Zhou, Xiaohan Zhao, Gang Wang, Yu Su, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao:
On the validity of geosocial mobility traces. 11:1-11:7 - Bin Liu, Anmol Sheth, Udi Weinsberg, Jaideep Chandrashekar, Ramesh Govindan:
AdReveal: improving transparency into online targeted advertising. 12:1-12:7 - Harsha V. Madhyastha, Megha Maiya:
Towards comprehensive social sharing of recommendations: augmenting push with pull. 13:1-13:7 - John Maheswaran, David Isaac Wolinsky, Bryan Ford:
Crypto-Book: an architecture for privacy preserving online identities. 14:1-14:7 - M. Zubair Shafiq, Franck Le, Mudhakar Srivatsa, Alex X. Liu:
Cross-path inference attacks on multipath TCP. 15:1-15:7 - Danny Cooper, Ethan Heilman, Kyle Brogle, Leonid Reyzin, Sharon Goldberg:
On the risk of misbehaving RPKI authorities. 16:1-16:7 - Ryan Hand, Michael Ton, Eric Keller:
Active security. 17:1-17:7 - Mihai Dobrescu, Katerina J. Argyraki:
Toward a verifiable software dataplane. 18:1-18:7 - Anirudh Sivaraman, Keith Winstein, Suvinay Subramanian, Hari Balakrishnan:
No silver bullet: extending SDN to the data plane. 19:1-19:7 - Ratul Mahajan, Roger Wattenhofer:
On consistent updates in software defined networks. 20:1-20:7 - Lei Chen, Shuihai Hu, Kai Chen, Haitao Wu, Danny H. K. Tsang:
Towards minimal-delay deadline-driven data center TCP. 21:1-21:7 - George Parisis, Toby Moncaster, Anil Madhavapeddy, Jon Crowcroft:
Trevi: watering down storage hotspots with cool fountain codes. 22:1-22:7 - Navid Hamed Azimi, Himanshu Gupta, Vyas Sekar, Samir R. Das:
Patch panels in the sky: a case for free-space optics in data centers. 23:1-23:7 - Robert Soulé, Shrutarshi Basu, Robert Kleinberg, Emin Gün Sirer, Nate Foster:
Managing the network with Merlin. 24:1-24:7 - Radhika Mittal, Justine Sherry, Sylvia Ratnasamy, Scott Shenker:
How to improve your network performance by asking your provider for worse service. 25:1-25:7 - Brent E. Stephens, Alan L. Cox, Scott Rixner:
Plinko: building provably resilient forwarding tables. 26:1-26:7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.