Default Cover Image

2017 IEEE 25th International Conference on Network Protocols (ICNP)

Oct. 10 2017 to Oct. 13 2017

Toronto, ON, Canada

Table of Contents

[Title page]Freely available from IEEE.pp. 1-1
[Copyright notice]Freely available from IEEE.pp. 1-1
Conference committeesFreely available from IEEE.pp. 1-5
SponsorFreely available from IEEE.pp. 1-1
Welcome: Message from the ICNP 2017 general chairFreely available from IEEE.pp. 1-4
[Back cover]Freely available from IEEE.pp. c4-c4
A concise forwarding information base for scalable and fast name lookupsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
A framework for anonymous routing in delay tolerant networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
A multiple vehicle sensing approach for collision avoidance in progressively deployed vehicle networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
A programmable buffer management platformFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
BoLTE: Efficient network-wide LTE broadcastingFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Characterizing and optimizing background data transfers on smartwatchesFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Coordinating rolling software upgrades for cellular networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Cost of not arbitrarily splitting in routingFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Deploying default paths by joint optimization of flow table and group table in SDNsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Experimental evaluation of BBR congestion controlFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Fast testing network data plane with RuleCheckerFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
General ternary bit strings on commodity longest-prefix-match infrastructuresFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
GeneWave: Fast authentication and key agreement on commodity mobile devicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
iMUTE: Energy-optimal update policy for perishable mobile contentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Making multipath TCP friendlier to load balancers and anycastFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Mrs. Z: Improving ZigBee throughput via multi-rate transmissionFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Multipath TCP traffic diversion attacks and countermeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
P4DB: On-the-fly debugging of the programmable data planeFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Peering vs. transit: Performance comparison of peering and transit interconnectionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
PMC: Parallel multi-protocol communication to heterogeneous IoT radios within a single WiFi channelFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Popularity-aware differentiated distributed stream processing on skewed streamsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Preferential link tomography in dynamic networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Rethinking LTE network functions virtualizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
SDN-based service automation for IoTFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Secure crowdsourced radio environment map constructionFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Selective HTTPS traffic manipulation at middleboxes for BYOD devicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
SoftRing: Taming the reactive model for software defined networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Spatio-temporal analysis and prediction of cellular traffic in metropolisFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Stabilizing BGP through distributed elimination of recurrent routing loopsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Suffering from buffering? Detecting QoE impairments in live video streamsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
SyncCoding: A compression technique exploiting references for data synchronization servicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
The dynamic cuckoo filterFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Towards higher throughput rate adaptation for backscatter networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
VMS: Traffic balancing based on virtual switches in datacenter networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
vPROM: VSwitch enhanced programmable measurement in SDNFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Adaptively adjusting ECN marking thresholds for datacenter networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Enabling seamless WiGig/WiFi handovers in tri-band wireless systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
MSAID: Automated interference detection for multiple SDN applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
On an impact of large content on packet-level caching of information centric networkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Performance enhancement of multipath TCP in mobile Ad Hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
The first experimental SDR platform for inband D2D communications in 5GFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
SICS: Secure and dynamic middlebox outsourcingFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
The implementation of improved MPTCP in MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Toward a programmable FIB caching architectureFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
When deep learning meets edge computingFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Yosemite: Efficient scheduling of weighted coflows in data centersFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Cotask scheduling in cloud computingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
GSC: Greedy shard caching algorithm for improved I/O efficiency in GraphChiFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Impacts of task placement and bandwidth allocation on stream analyticsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
SocialGate: Managing large-scale social data on home gatewaysFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
When creek meets river: Exploiting high-bandwidth circuit switch in scheduling multicast dataFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Algorithm-data driven optimization of adaptive communication networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Analyzing public transportation mobility data for networking purposesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Machine learning at the network edge for automated home intrusion monitoringFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A customized and cost-efficient backup scheme in software-defined networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A network-centric TCP for interactive video delivery networks (VDN)Full-text access may be available. Sign in or learn about subscription options.pp. 1-6
An empirical model of packet processing delay of the Open vSwitchFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Comparing OpenFlow and NETCONF when interconnecting data centersFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Distributed Mininet placement algorithm for fat-tree topologiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
MDP modeling of resource provisioning in virtualized content-delivery networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
NF-switch: VNFs-enabled SDN switches for high performance service function chainingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Experimental evaluation of two OpenFlow controllersFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Showing 74 out of 74