Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICNP
ICNP 2019
Generate Citations
2019 IEEE 27th International Conference on Network Protocols (ICNP)
Oct. 8 2019 to Oct. 10 2019
Chicago, IL, USA
ISBN: 978-1-7281-2700-2
Table of Contents
ICNP 2019 Welcome Message from the ICNP 2019 General Chairs
Freely available from IEEE.
pp. i-ii
[Copyright notice]
Freely available from IEEE.
pp. i-i
Table of contents
Freely available from IEEE.
pp. i-viii
ICNP 2019 Author Index
Freely available from IEEE.
pp. i-vi
Microservice Fingerprinting and Classification using Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Hyunseok Chang
,
Murali Kodialam
,
T.V. Lakshman
,
Sarit Mukherjee
Graph-based Namespaces and Load Sharing for Efficient Information Dissemination in Disasters
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Mohammad Jahanian
,
Jiachen Chen
,
K. K. Ramakrishnan
Optimal Strategies for Live Video Streaming in the Low-latency Regime
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Liyang Sun
,
Tongyu Zong
,
Yong Liu
,
Yao Wang
,
Haihong Zhu
SAFE-ME: Scalable and Flexible Middlebox Policy Enforcement with Software Defined Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Gongming Zhao
,
Hongli Xu
,
Jianchun Liu
,
Chen Qian
,
Juncheng Ge
,
Liusheng Huang
Virtual Network Embedding with Path-based Latency Guarantees in Elastic Optical Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Sepehr Taeb
,
Nashid Shahriar
,
Shihabur Rahman Chowdhury
,
Massimo Tornatore
,
Raouf Boutaba
,
Jeebak Mitra
,
Mahdi Hemmati
MACS: Deep Reinforcement Learning based SDN Controller Synchronization Policy Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Ziyao Zhang
,
Liang Ma
,
Konstantinos Poularakis
,
Kin K. Leung
,
Jeremy Tucker
,
Ananthram Swami
FlowShader: a Generalized Framework for GPU-accelerated VNF Flow Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Xiaodong Yi
,
Junjie Wang
,
Jingpu Duan
,
Wei Bai
,
Chuan Wu
,
Yongqiang Xiong
,
Dongsu Han
Placement and Allocation of Virtual Network Functions: Multi-dimensional Case
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Gamal Sallam
,
Zizhan Zheng
,
Bo Ji
LoRaBee: Cross-Technology Communication from LoRa to ZigBee via Payload Encoding
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Junyang Shi
,
Di Mu
,
Mo Sha
Forward the Collision Decomposition in ZigBee
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Yifeng Cao
,
Zhe Wang
,
Linghe Kong
,
Guihai Chen
,
Jiadi Yu
,
Shaojie Tang
,
Yingying Chen
BDAC: A Behavior-aware Dynamic Adaptive Configuration on DHCP in Wireless LANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Congcong Miao
,
Jilong Wang
,
Tianying Ji
,
Hui Wang
,
Chao Xu
,
Fenghua Li
,
Fengyuan Ren
BeaconRider: Opportunistic Sharing of Beacon Air-Time in Densely Deployed WLANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Hyunjoong Lee
,
Jungjun Kim
,
Changhee Joo
,
Saewoong Bahk
A (Near) Zero-cost and Universal Method to Combat Multipaths for RFID Sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Ge Wang
,
Chen Qian
,
Kaiyan Cui
,
Han Ding
,
Haofan Cai
,
Wei Xi
,
Jinsong Han
,
Jizhong Zhao
mLoRa: A Multi-Packet Reception Protocol in LoRa networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Xiong Wang
,
Linghe Kong
,
Liang He
,
Guihai Chen
Achieving Universal Low-Power Wide-Area Networks on Existing Wireless Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Zhijun Li
,
Yongrui Chen
Re-Architecting the Packet Core and Control Plane for Future Cellular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Ali Mohammadkhan
,
K.K. Ramakrishnan
When Tags ‘Read’ Each Other: Enabling Low-cost and Convenient Tag Mutual Identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Haofan Cai
,
Ge Wang
,
Xiaofeng Shi
,
Junjie Xie
,
Minmei Wang
,
Chen Qian
TagAttention: Mobile Object Tracing without Object Appearance Information by Vision-RFID Fusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Xiaofeng Shi
,
Minmei Wang
,
Ge Wang
,
Baiwen Huang
,
Haofan Cai
,
Junjie Xie
,
Chen Qian
Congestion Control for Cross-Datacenter Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Gaoxiong Zeng
,
Wei Bai
,
Ge Chen
,
Kai Chen
,
Dongsu Han
,
Yibo Zhu
,
Lei Cui
SQR: In-network Packet Loss Recovery from Link Failures for Highly Reliable Datacenter Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Ting Qu
,
Raj Joshi
,
Mun Choon Chan
,
Ben Leong
,
Deke Guo
,
Zhong Liu
AG: Adaptive Switching Granularity for Load Balancing with Asymmetric Topology in Data Center Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Jingling Liu
,
Jiawei Huang
,
Weihe Li
,
Jianxin Wang
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Jens Hiller
,
Jan Pennekamp
,
Markus Dahlmanns
,
Martin Henze
,
Andriy Panchenko
,
Klaus Wehrle
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Yige Chen
,
Tianning Zang
,
Yongzheng Zhang
,
Yuan Zhou
,
Yipeng Wang
RobustPay: Robust Payment Routing Protocol in Blockchain-based Payment Channel Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Yuhui Zhang
,
Dejun Yang
Re-designing Compact-structure based Forwarding for Programmable Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Shouqian Shi
,
Chen Qian
,
Minmei Wang
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Guanyu Li
,
Menghao Zhang
,
Chang Liu
,
Xiao Kong
,
Ang Chen
,
Guofei Gu
,
Haixin Duan
Busoni: Policy Composition and Northbound Interface for IPv6 Segment Routing Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Osamah L. Barakat
,
Pier Luigi Ventre
,
Stefano Salsano
,
Xiaoming Fu
A Precise and Expressive Lattice-theoretical Framework for Efficient Network Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Alex Horn
,
Ali Kheradmand
,
Mukul R. Prasad
Towards Automated Network Management: Learning the Optimal Protocol Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Xiaoxi Zhang
,
Siqi Chen
,
Youngbin Im
,
Maria Gorlatova
,
Sangtae Ha
,
Carlee Joe-Wong
The Case for Pluginized Routing Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Thomas Wirtgen
,
Cyril Dénos
,
Quentin De Coninck
,
Mathieu Jadin
,
Olivier Bonaventure
Perseverance-Aware Traffic Engineering in Rate-Adaptive Networks with Reconfiguration Delay
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Shih-Hao Tseng
Local Fast Rerouting with Low Congestion: A Randomized Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Gregor Bankhamer
,
Robert Elsässer
,
Stefan Schmid
Unison: Enabling Content Provider/ISP Collaboration using a vSwitch Abstraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Yimeng Zhao
,
Ahmed Saeed
,
Mostafa Ammar
,
Ellen Zegura
Unveil the Hidden Presence: Characterizing the Backend Interface of Content Delivery Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Lin Jin
,
Shuai Hao
,
Haining Wang
,
Chase Cotton
Robust Distributed Monitoring of Traffic Flows
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Vitalii Demianiuk
,
Sergey Gorinsky
,
Sergey Nikolenko
,
Kirill Kogan
A Linguistics-based Stacking Approach to Disposable Domains Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Yuwei Zeng
,
Yongzheng Zhang
,
Tianning Zang
,
Xunxun Chen
,
Yipeng Wang
Extended Abstract: Coordinated Communications for Next-Generation Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Kiran Makhijani
,
Hamed Yousefi
,
K. K. Ramakrishnan
,
Richard Li
A Heterogeneous Parallel Packet Processing Architecture for NFV Acceleration
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Jinshu Su
,
Biao Han
,
Gaofeng Lv
,
Tao Li
,
Zhigang Sun
Privacy-Preserving Remote Knowledge System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Markus Dahlmanns
,
Chris Dax
,
Roman Matzutt
,
Jan Pennekamp
,
Jens Hiller
,
Klaus Wehrle
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Jan Pennekamp
,
Jens Hiller
,
Sebastian Reuter
,
Wladimir De la Cadena
,
Asya Mitseva
,
Martin Henze
,
Thomas Engel
,
Klaus Wehrle
,
Andriy Panchenko
Load Migration Protocol for SDN Controllers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Mohammad Amin Beiruti
,
Yashar Ganjali
CeforeSim: Cefore Compliant NS-3-Based Network Simulator
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Yusaku Hayamizu
,
Kazuhisa Matsuzono
,
Hitoshi Asaeda
Intentionality-related Deep Learning Method in Web Prefetching
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Wenbo Zou
,
Jiwoong Won
,
Jemin Ahn
,
Kyungtae Kang
Poster Abstract: Physical-layer Cross-Technology Communication with Narrow-Band Decoding
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Lingang Li
,
Yongrui Chen
,
Zhijun Li
CoRE: Non-Linear 3D Sampling for Robust 360° Video Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Mijanur R. Palash
,
Voicu Popescu
,
Amit Sheoran
,
Sonia Fahmy
Migration Scheduling in Distributed SDN Controllers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Mohammad Amin Beiruti
,
Yashar Ganjali
Hierarchical Congestion Control (HCC): Cooperation of Uncorrelated Flows for Better Fairness and Throughput
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Shiva Ketabi
,
Yashar Ganjali
On Verification of Remote Computing on Potentially Untrusted Nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Hiroki Masuda
,
Kentaro Kita
,
Yuki Koizumi
,
Toru Hasegawa
Container Orchestration by Kubernetes for RDMA Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Coleman Link
,
Jesse Sarran
,
Garegin Grigoryan
,
Minseok Kwon
,
M. Mustafa Rafique
,
Warren R. Carithers
A Study on Effective Congestion Control to Retrieve Distributed Data in ICN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Naoki Moriyama
,
Yusuke Ito
,
Hiroyuki Koga
Towards Human-Robot Collaboration: An Industry 4.0 VR Platform with Clouds Under the Hood
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Bálint György Nagy
,
János Dóka
,
Sáandor Rácz
,
Géza Szabó
,
István Pelle
,
János Czentye
,
László Toka
,
Balázs Sonkoly
Demo Abstract: LASK: A Distributed Service Discovery Platform on Edge Computing Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Yuuichi Teranishi
,
Takashi Kimata
,
Hiroaki Yamanaka
,
Eiji Kawai
,
Hiroaki Harai
ReDiCom: Resilient Communication for First Responders in Disaster Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Jiachen Chen
,
Yuxuan Xing
,
K. K. Ramakrishnan
,
Mohammad Jahanian
,
Hulya Seferoglu
,
Murat Yuksel
Demo: Measuring Distance Traveled by an Object using WiFi-CSI and IMU Fusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Raghav Hampapur Venkatnarayan
,
Muhammad Shahzad
Chameleon: A Large-Scale, Deeply Reconfigurable Testbed for Computer Science Research
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Kate Keahey
,
Joe Mambretti
,
Paul Ruth
,
Dan Stanzione
COMPaaS DLV: Composable Infrastructure for Deep Learning in an Academic Research Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Maxine Brown
,
Luc Renambot
,
Lance Long
,
Timothy Bargo
,
Andrew E. Johnson
On Studying CPU Performance of CloudLab Hardware
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Dmitry Duplyakin
,
Alexandru Uta
,
Aleksander Maricq
,
Robert Ricci
The EdgeNet System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Timur Friedman
,
Rick McGeer
,
Berat Can Senel
,
Matt Hemmings
,
Glenn Ricart
Measuring Student Learning On Network Testbeds
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Paul Lepe
,
Aashray Aggarwal
,
Jelena Mirkovic
,
Jens Mache
,
Richard Weiss
,
David Weinmann
Powering Hands-on Cybersecurity Practices with Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Ruipeng Zhang
,
Chen Xu
,
Mengjun Xie
Programmable Optical x-Haul Network in the COSMOS Testbed
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Craig Gutterman
,
Artur Minakhmetov
,
Jiakai Yu
,
Michael Sherman
,
Tingjun Chen
,
Shengxiang Zhu
,
Ivan Seskar
,
Dipankar Raychaudhuri
,
Daniel Kilper
,
Gil Zussman
Experimentation with Full-Duplex Wireless in the COSMOS Testbed
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Tingjun Chen
,
Jackson Welles
,
Manav Kohli
,
Mahmood Baraani Dastjerdi
,
Jakub Kolodziejski
,
Michael Sherman
,
Ivan Seskar
,
Harish Krishnaswamy
,
Gil Zussman
Defending Web Servers Against Flash Crowd Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Rajat Tandon
,
Abhinav Palia
,
Jaydeep Ramani
,
Brandon Paulsen
,
Genevieve Bartlett
,
Jelena Mirkovic
Traffic Analysis Resistant Network (TARN) Anonymity Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Nathan Tusing
,
Jonathan Oakley
,
Geddings Barrineau
,
Lu Yu
,
Kuang-Ching Wang
,
Richard R. Brooks
Network Intrusion Detection System as a Service on OpenStack Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Chen Xu
,
Ruipeng Zhang
,
Mengjun Xie
,
Li Yang
COMET: Distributed Metadata Service for Multi-cloud Experiments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Komal Thareja
,
Cong Wang
,
Paul Ruth
,
Anirban Mandal
,
Ilya Baldin
,
Michael Stealey
Experimenting with AWS Direct Connect using Chameleon, ExoGENI, and Internet2 Cloud Connect
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Paul Ruth
,
Mert Cevik
Multi-Cloud Performance and Security-driven Brokering for Bioinformatics Workflows
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Minh Nguyen
,
Saptarshi Debroy
,
Prasad Calyam
,
Zhen Lyu
,
Trupti Joshi
AutoWaze: Towards Automatic Event Inference in Intelligent Transportation Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Ning Wang
,
Yunsheng Wang
DeepRoute on Chameleon: Experimenting with Large-scale Reinforcement Learning and SDN on Chameleon Testbed
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Bashir Mohammed
,
Mariam Kiran
,
Nandini Krishnaswamy
Data-intensive Workflow Execution using Distributed Compute Resources
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Ashish Pandey
,
Songjie Wang
,
Prasad Calyam
Elastic Data Transfer Infrastructure (DTI) on the Chameleon Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Joaquin Chung
,
Zhengchun Liu
,
Rajkumar Kettimuthu
,
Ian Foster
DyCOCo: A Dynamic Computation Offloading and Control Framework for Drone Video Analytics
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Chengyi Qu
,
Songjie Wang
,
Prasad Calyam
When NFV Meets ANN: Rethinking Elastic Scaling for ANN-based NFs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Menghao Zhang
,
Jiasong Bai
,
Guanyu Li
,
Zili Meng
,
Hongda Li
,
Hongxin Hu
,
Mingwei Xu
Anomaly Noise Filtering with Logistic Regression and a New Method for Time Series Trend Computation for Monitoring Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Qing Gao
,
Limin Zhu
,
Yuxin Lin
,
Xun Chen
A Reinforcement Learning Approach for Online Service Tree Placement in Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Yimeng Wang
,
Yongbo Li
,
Tian Lan
,
Nakjung Choi
Cooperative Connected Autonomous Vehicles (CAV): Research, Applications and Challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jianhua He
,
Zuoyin Tang
,
Xiaoming Fu
,
Supeng Leng
,
Fan Wu
,
Kaisheng Huang
,
Jianye Huang
,
Jie Zhang
,
Yan Zhang
,
Andrew Radford
,
Laura Li
,
Zhiliang Xiong
Towards Service Discovery and Invocation in Data-Centric Edge Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Spyridon Mastorakis
,
Abderrahmen Mtibaa
A Light-weight Trust Mechanism for Cloud-Edge Collaboration Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Zhipeng Gao
,
Chenxi Xia
,
Zhuojun Jin
,
Qian Wang
,
Junmeng Huang
,
Yang Yang
,
Lanlan Rui
Exploration and Exploitation of Off-path Cached Content in Network Coding Enabled Named Data Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Xiaoyan Hu
,
Shaoqi Zheng
,
Lixia Zhao
,
Guang Cheng
,
Jian Gong
GreenEdge: Greening Edge Datacenters with Energy-Harvesting IoT Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Zhi Zhou
Showing 85 out of 85