Default Cover Image

2019 IEEE 27th International Conference on Network Protocols (ICNP)

Oct. 8 2019 to Oct. 10 2019

Chicago, IL, USA

ISBN: 978-1-7281-2700-2

Table of Contents

[Copyright notice]Freely available from IEEE.pp. i-i
Table of contentsFreely available from IEEE.pp. i-viii
ICNP 2019 Author IndexFreely available from IEEE.pp. i-vi
Microservice Fingerprinting and Classification using Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Graph-based Namespaces and Load Sharing for Efficient Information Dissemination in DisastersFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Optimal Strategies for Live Video Streaming in the Low-latency RegimeFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
FlowShader: a Generalized Framework for GPU-accelerated VNF Flow ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Placement and Allocation of Virtual Network Functions: Multi-dimensional CaseFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
LoRaBee: Cross-Technology Communication from LoRa to ZigBee via Payload EncodingFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Forward the Collision Decomposition in ZigBeeFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
BDAC: A Behavior-aware Dynamic Adaptive Configuration on DHCP in Wireless LANsFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
BeaconRider: Opportunistic Sharing of Beacon Air-Time in Densely Deployed WLANsFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
A (Near) Zero-cost and Universal Method to Combat Multipaths for RFID SensingFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
mLoRa: A Multi-Packet Reception Protocol in LoRa networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Achieving Universal Low-Power Wide-Area Networks on Existing Wireless DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Re-Architecting the Packet Core and Control Plane for Future Cellular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
When Tags ‘Read’ Each Other: Enabling Low-cost and Convenient Tag Mutual IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Congestion Control for Cross-Datacenter NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
RobustPay: Robust Payment Routing Protocol in Blockchain-based Payment Channel NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Re-designing Compact-structure based Forwarding for Programmable NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic FilteringFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
A Precise and Expressive Lattice-theoretical Framework for Efficient Network VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
The Case for Pluginized Routing ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Perseverance-Aware Traffic Engineering in Rate-Adaptive Networks with Reconfiguration DelayFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Local Fast Rerouting with Low Congestion: A Randomized ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Unison: Enabling Content Provider/ISP Collaboration using a vSwitch AbstractionFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Unveil the Hidden Presence: Characterizing the Backend Interface of Content Delivery NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Robust Distributed Monitoring of Traffic FlowsFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
A Linguistics-based Stacking Approach to Disposable Domains DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Extended Abstract: Coordinated Communications for Next-Generation NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
A Heterogeneous Parallel Packet Processing Architecture for NFV AccelerationFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Privacy-Preserving Remote Knowledge SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Load Migration Protocol for SDN ControllersFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
CeforeSim: Cefore Compliant NS-3-Based Network SimulatorFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Intentionality-related Deep Learning Method in Web PrefetchingFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Poster Abstract: Physical-layer Cross-Technology Communication with Narrow-Band DecodingFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
CoRE: Non-Linear 3D Sampling for Robust 360° Video StreamingFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Migration Scheduling in Distributed SDN ControllersFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Hierarchical Congestion Control (HCC): Cooperation of Uncorrelated Flows for Better Fairness and ThroughputFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
On Verification of Remote Computing on Potentially Untrusted NodesFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Container Orchestration by Kubernetes for RDMA NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
A Study on Effective Congestion Control to Retrieve Distributed Data in ICNFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Demo: Measuring Distance Traveled by an Object using WiFi-CSI and IMU FusionFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Chameleon: A Large-Scale, Deeply Reconfigurable Testbed for Computer Science ResearchFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
On Studying CPU Performance of CloudLab HardwareFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
The EdgeNet SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Measuring Student Learning On Network TestbedsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Powering Hands-on Cybersecurity Practices with Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Defending Web Servers Against Flash Crowd AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Traffic Analysis Resistant Network (TARN) Anonymity AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Network Intrusion Detection System as a Service on OpenStack CloudFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
COMET: Distributed Metadata Service for Multi-cloud ExperimentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Experimenting with AWS Direct Connect using Chameleon, ExoGENI, and Internet2 Cloud ConnectFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Multi-Cloud Performance and Security-driven Brokering for Bioinformatics WorkflowsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
AutoWaze: Towards Automatic Event Inference in Intelligent Transportation SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Data-intensive Workflow Execution using Distributed Compute ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Elastic Data Transfer Infrastructure (DTI) on the Chameleon CloudFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
DyCOCo: A Dynamic Computation Offloading and Control Framework for Drone Video AnalyticsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
When NFV Meets ANN: Rethinking Elastic Scaling for ANN-based NFsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Reinforcement Learning Approach for Online Service Tree Placement in Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Towards Service Discovery and Invocation in Data-Centric Edge NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Light-weight Trust Mechanism for Cloud-Edge Collaboration FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
GreenEdge: Greening Edge Datacenters with Energy-Harvesting IoT DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Showing 85 out of 85