Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICNP
ICNP 2017
Generate Citations
2017 IEEE 25th International Conference on Network Protocols (ICNP)
Oct. 10 2017 to Oct. 13 2017
Toronto, ON, Canada
Table of Contents
[Title page]
Freely available from IEEE.
pp. 1-1
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Conference committees
Freely available from IEEE.
pp. 1-5
Sponsor
Freely available from IEEE.
pp. 1-1
Welcome: Message from the ICNP 2017 general chair
Freely available from IEEE.
pp. 1-4
[Back cover]
Freely available from IEEE.
pp. c4-c4
A concise forwarding information base for scalable and fast name lookups
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Ye Yu
,
Djamal Belazzougui
,
Chen Qian
,
Qin Zhang
A framework for anonymous routing in delay tolerant networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Kazuya Sakai
,
Min-Te Sun
,
Wei-Shinn Ku
,
Jie Wu
A multiple vehicle sensing approach for collision avoidance in progressively deployed vehicle networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Yi Gao
,
Xue Liu
,
Wei Dong
A programmable buffer management platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Kirill Kogan
,
Danushka Menikkumbura
,
Gustavo Petri
,
Yangtae Noh
,
Sergey Nikolenko
,
Alexander Sirotkin
,
Patrick Eugster
BlueCoDE: Bluetooth coordination in dense environment for better coexistence
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Weiping Sun
,
Jonghoe Koo
,
Seongho Byeon
,
Woojin Park
,
Sangsoon Lim
,
Daehyun Ban
,
Sunghyun Choi
BoLTE: Efficient network-wide LTE broadcasting
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Rajarajan Sivaraj
,
Mustafa Arslan
,
Karthikeyan Sundaresan
,
Sampath Rangarajan
,
Prasant Mohapatra
Characterizing and optimizing background data transfers on smartwatches
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Yi Yang
,
Guohong Cao
Coordinating rolling software upgrades for cellular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Mubashir Adnan Qureshi
,
Ajay Mahimkar
,
Lili Qiu
,
Zihui Ge
,
Max Zhang
,
Ioannis Broustis
Cost of not arbitrarily splitting in routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Yingjie Bi
,
Ao Tang
Deploying default paths by joint optimization of flow table and group table in SDNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Gongming Zhao
,
Hongli Xu
,
Shigang Chen
,
Liusheng Huang
,
Pengzhan Wang
Experimental evaluation of BBR congestion control
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Mario Hock
,
Roland Bless
,
Martina Zitterbart
Fast testing network data plane with RuleChecker
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Peng Zhang
,
Cheng Zhang
,
Chengchen Hu
General ternary bit strings on commodity longest-prefix-match infrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Pavel Chuprikov
,
Kirill Kogan
,
Sergey Nikolenko
GeneWave: Fast authentication and key agreement on commodity mobile devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Pengjin Xie
,
Jingchao Feng
,
Zhichao Cao
,
Jiliang Wang
iMUTE: Energy-optimal update policy for perishable mobile contents
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Joohyun Lee
,
Fang Liu
,
Kyunghan Lee
,
Ness B. Shroff
Making multipath TCP friendlier to load balancers and anycast
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Fabien Duchene
,
Olivier Bonaventure
Mrs. Z: Improving ZigBee throughput via multi-rate transmission
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Yifeng Cao
,
Linghe Kong
,
Liang He
,
Guihai Chen
,
Min-You Wu
,
Tian He
Multipath TCP traffic diversion attacks and countermeasures
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Ali Munir
,
Zhiyun Qian
,
Zubair Shafiq
,
Alex Liu
,
Franck Le
P4DB: On-the-fly debugging of the programmable data plane
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Cheng Zhang
,
Jun Bi
,
Yu Zhou
,
Jianping Wu
,
Bingyang Liu
,
Zhaogeng Li
,
Abdul Basit Dogar
,
Yangyang Wang
Peering vs. transit: Performance comparison of peering and transit interconnections
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Adnan Ahmed
,
Zubair Shafiq
,
Harkeerat Bedi
,
Amir Khakpour
PMC: Parallel multi-protocol communication to heterogeneous IoT radios within a single WiFi channel
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Zicheng Chi
,
Yan Li
,
Yao Yao
,
Ting Zhu
Popularity-aware differentiated distributed stream processing on skewed streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Hanhua Chen
,
Fan Zhang
,
Hai Jin
Preferential link tomography in dynamic networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Huikang Li
,
Yi Gao
,
Wei Dong
,
Chun Chen
Reflection: Automated test location selection for cellular network upgrades
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Mubashir Adnan Qureshi
,
Ajay Mahimkar
,
Lili Qiu
,
Zihui Ge
,
Sarat Puthenpura
,
Nabeel Mir
,
Sanjeev Ahuja
Rethinking LTE network functions virtualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Muhammad Taqi Raza
,
Dongho Kim
,
Kyu-Han Kim
,
Songwu Lu
,
Mario Gerla
SDN-based service automation for IoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Mostafa Uddin
,
Sarit Mukherjee
,
Hyunseok Chang
,
T. V. Lakshman
Secure crowdsourced radio environment map construction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Yidan Hu
,
Rui Zhang
Selective HTTPS traffic manipulation at middleboxes for BYOD devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Xing Liu
,
Feng Qian
,
Zhiyun Qian
SoftRing: Taming the reactive model for software defined networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Chengchen Hu
,
Kaiyu Hou
,
Hao Li
,
Ruilong Wang
,
Peng Zheng
,
Peng Zhang
,
Huanzhao Wang
Spatio-temporal analysis and prediction of cellular traffic in metropolis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Xu Wang
,
Zimu Zhou
,
Zheng Yang
,
Yunhao Liu
,
Chunyi Peng
Stabilizing BGP through distributed elimination of recurrent routing loops
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
João Luís Sobrinho
,
David Fialho
,
Paulo Mateus
Suffering from buffering? Detecting QoE impairments in live video streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Adnan Ahmed
,
Zubair Shafiq
,
Harkeerat Bedi
,
Amir Khakpour
SyncCoding: A compression technique exploiting references for data synchronization services
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Wooseung Nam
,
Joohyun Lee
,
Kyunghan Lee
The dynamic cuckoo filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Hanhua Chen
,
Liangyi Liao
,
Hai Jin
,
Jie Wu
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Zhuotao Liu
,
Yushan Liu
,
Philipp Winter
,
Prateek Mittal
,
Yih-Chun Hu
Towards higher throughput rate adaptation for backscatter networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Wei Gong
,
Si Chen
,
Jiangchuan Liu
VMS: Traffic balancing based on virtual switches in datacenter networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Zhaogeng Li
,
Jun Bi
,
Yiran Zhang
,
Abdul Basit Dogar
,
Chengwei Qin
vPROM: VSwitch enhanced programmable measurement in SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
An Wang
,
Yang Guo
,
Songqing Chen
,
Fang Hao
,
T.V. Lakshman
,
Doug Montgomery
,
Kotikalapudi Sriram
Wireless network instabilities in the wild: Prevalence, App (non)resilience, and OS remedy
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Zeqi Lai
,
Yong Cui
,
Yimin Jiang
,
Xiaomeng Chen
,
Y. Charlie Hu
,
Kun Tan
,
Minglong Dai
,
Kai Zheng
Adaptively adjusting ECN marking thresholds for datacenter networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Shuo Wang
,
Jiao Zhang
,
Tao Huang
,
Tian Pan
,
Jiang Liu
,
Yunjie Liu
Enabling seamless WiGig/WiFi handovers in tri-band wireless systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Yao-Yu Li
,
Chi-Yu Li
,
Wei-Han Chen
,
Chia-Jui Yeh
,
Kuochen Wang
Investigating the impact of cache pollution attacks in heterogeneous cellular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Sibendu Paul
,
Anand Seetharam
,
Amitava Mukherjee
,
Mrinal Kanti Naskar
MSAID: Automated interference detection for multiple SDN applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Yahui Li
,
Zhiliang Wang
,
Jiangyuan Yao
,
Xia Yin
,
Xingang Shi
,
Jianping Wu
On an impact of large content on packet-level caching of information centric networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Yoji Yamamoto
,
Junji Takemasa
,
Yuki Koizumi
,
Toru Hasegawa
Performance enhancement of multipath TCP in mobile Ad Hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Tongguang Zhang
,
Shuai Zhao
,
Bingfei Ren
,
Yulong Shi
,
Bo Cheng
,
Junliang Chen
Planning in compute-aggregate problems as optimization problems on graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Pavel Chuprikov
,
Alex Davydow
,
Kirill Kogan
,
Sergey I. Nikolenko
,
Alexander V. Sirotkin
The first experimental SDR platform for inband D2D communications in 5G
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Max Engelhardt
,
Arash Asadi
SICS: Secure and dynamic middlebox outsourcing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Huazhe Wang
,
Xin Li
,
Chen Qian
The implementation of improved MPTCP in MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Tongguang Zhang
,
Shuai Zhao
,
Yulong Shi
,
Bingfei Ren
,
Bo Cheng
,
Junliang Chen
Toward a programmable FIB caching architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Garegin Grigoryan
,
Yaoqing Liu
When deep learning meets edge computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Yutao Huang
,
Xiaoqiang Ma
,
Xiaoyi Fan
,
Jiangchuan Liu
,
Wei Gong
Yosemite: Efficient scheduling of weighted coflows in data centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Han Zhang
,
Xingang Shi
,
Xia Yin
,
Zhiliang Wang
Cotask scheduling in cloud computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Yangming Zhao
,
Shouxi Luo
,
Yi Wang
,
Sheng Wang
GSC: Greedy shard caching algorithm for improved I/O efficiency in GraphChi
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Dagang Li
,
Zehua Zheng
Impacts of task placement and bandwidth allocation on stream analytics
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Walid A. Y. Aljoby
,
Tom Z. J. Fu
,
Richard T. B. Ma
SocialGate: Managing large-scale social data on home gateways
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
David Koll
,
Dieter Lechler
,
Xiaoming Fu
When creek meets river: Exploiting high-bandwidth circuit switch in scheduling multicast data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Xiaoye Steven Sun
,
T. S. Eugene Ng
Algorithm-data driven optimization of adaptive communication networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mu He
,
Patrick Kalmbach
,
Andreas Blenk
,
Wolfgang Kellerer
,
Stefan Schmid
Analyzing public transportation mobility data for networking purposes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Kais Elmurtadi Suleiman
,
Otman Basir
Machine learning at the network edge for automated home intrusion monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Aditya Dhakal
,
K. K. Ramakrishnan
A customized and cost-efficient backup scheme in software-defined networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Zhijie Zhu
,
Qing Li
,
Mingwei Xu
,
Ziyan Song
,
Shutao Xia
A network-centric TCP for interactive video delivery networks (VDN)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Md Iftakharul Islam
,
Javed I Khan
An empirical model of packet processing delay of the Open vSwitch
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Danish Sattar
,
Ashraf Matrawy
Comparing OpenFlow and NETCONF when interconnecting data centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Thomas Kunz
,
Karpakamurthy Muthukumar
Distributed Mininet placement algorithm for fat-tree topologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Philippos Isaia
,
Lin Guan
MDP modeling of resource provisioning in virtualized content-delivery networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ali A. Haghighi
,
Shahram Shah Heydari
,
Shahram ShahbazPanahi
NF-switch: VNFs-enabled SDN switches for high performance service function chaining
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Cheng-Liang Hsieh
,
Ning Weng
Experimental evaluation of two OpenFlow controllers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mohamad Darianian
,
Carey Williamson
,
Israat Haque
Showing 74 out of 74