


default search action
Networking 2017: Stockholm, Sweden
- 2017 IFIP Networking Conference, IFIP Networking 2017 and Workshops, Stockholm, Sweden, June 12-16, 2017. IEEE Computer Society 2017, ISBN 978-3-901882-94-4

- Khondaker Musfakus Salehin, Vinitmadhukar Sahasrabudhe, Roberto Rojas-Cessa:

Remote measurement of interrupt-coalescence latency of internet hosts. 1-9 - Jose Yallouz, János Tapolcai, Attila Körösi, Kristóf Bérczi, László Gyimóthi, Ariel Orda:

Packing strictly-shortest paths in a tree for QoS-aware routing. 1-9 - Sukhpreet Kaur Khangura, Markus Fidler:

Available bandwidth estimation from passive TCP measurements using the probe gap model. 1-9 - Samuel Micka, Sean Yaw

, Brittany Terese Fasy, Brendan Mumey
, Mike P. Wittie:
Efficient multipath flow monitoring. 1-9 - Timmy Schüller, Nils Aschenbruck, Markus Chimani, Martin Horneffer, Stefan Schnitter:

Traffic engineering using segment routing and considering requirements of a carrier IP network. 1-9 - Shuya Abe, Go Hasegawa

, Masayuki Murata:
Design and performance evaluation of bearer aggregation method in mobile core network with C/U plane separation. 1-8 - Torsten Zimmermann, Jan Rüth

, Benedikt Wolters, Oliver Hohlfeld
:
How HTTP/2 pushes the web: An empirical study of HTTP/2 server push. 1-9 - Diman Zad Tootaghaj, Hana Khamfroush, Novella Bartolini

, Stefano Ciavarella, Seamus Hayes, Thomas La Porta:
Network recovery from massive failures under uncertain knowledge of damages. 1-9 - Junxiao Shi

, Eric Newberry
, Beichuan Zhang:
On broadcast-based self-learning in named data networking. 1-9 - Spencer Sevilla, J. J. Garcia-Luna-Aceves:

A deployable identifier-locator split architecture. 1-9 - Pavlos Sermpezis, Xenofontas A. Dimitropoulos:

Can SDN accelerate BGP convergence? - A performance analysis of inter-domain routing centralization. 1-9 - Naércio Magaia

, Carlos Borrego
, Paulo Pereira
, Miguel Correia:
PRIVO: A privacy-preserving opportunistic routing protocol for delay tolerant networks. 1-9 - Daniel S. Marcon, Marinho P. Barcellos

:
Packer: Minimizing multi-resource fragmentation and performance interference in datacenters. 1-9 - Nashid Shahriar, Shihabur Rahman Chowdhury

, Reaz Ahmed, Aimal Khan, Raouf Boutaba, Jeebak Mitra, Liu Liu:
Joint backup capacity allocation and embedding for survivable virtual networks. 1-9 - Rhaban Hark, Nils Richerzhagen, Björn Richerzhagen, Amr Rizk, Ralf Steinmetz

:
Towards an adaptive selection of loss estimation techniques in software-defined networks. 1-9 - Francesca Fossati, Stefano Moretti, Stefano Secci:

A mood value for fair resource allocations. 1-9 - Amr Rizk, Michael Zink

, Ramesh K. Sitaraman
:
Model-based design and analysis of cache hierarchies. 1-9 - Tatsuya Amano

, Shugo Kajita, Hirozumi Yamaguchi
, Teruo Higashino, Mineo Takai:
A crowdsourcing and simulation based approach for fast and accurate Wi-Fi radio map construction in urban environment. 1-9 - Ali Marandi

, Torsten Braun
, Kavé Salamatian
, Nikolaos Thomos:
BFR: A bloom filter-based routing approach for information-centric networks. 1-9 - Pravein Govindan Kannan

, Mun Choon Chan, Richard T. B. Ma
, Ee-Chien Chang
:
Raptor: Scalable rule placement over multiple path in software defined networks. 1-9 - Zhaogeng Li, Jun Bi, Yangyang Wang:

Multi-Channel Scatter (MCS): Traffic balancing based on edge-switching in datacenter networks. 1-9 - Christian Sieber, Raphael Durner, Wolfgang Kellerer

:
How fast can you reconfigure your partially deployed SDN network? 1-9 - Milan Schmittner

, Arash Asadi
, Matthias Hollick
:
SEMUD: Secure multi-hop device-to-device communication for 5G public safety networks. 1-9 - Matthias Wichtlhuber, Jan Kessler, Sebastian Bücker, Ingmar Poese, Jeremias Blendin, Christian Koch, David Hausheer:

SoDA: Enabling CDN-ISP collaboration with software defined anycast. 1-9 - Artur Sterz

, Lars Baumgärtner
, Ragnar Mogk, Mira Mezini, Bernd Freisleben
:
DTN-RPC: Remote procedure calls for disruption-tolerant networking. 1-9 - Peiyue Zhao, György Dán:

Resilient placement of virtual process control functions in mobile edge clouds. 1-9 - Marco Casazza

, Pierre Fouilhoux, Mathieu Bouet, Stefano Secci:
Securing virtual network function placement with high availability guarantees. 1-9 - Pradeep Bangera, Sergey Gorinsky

:
Ads versus regular contents: Dissecting the web hosting ecosystem. 1-9 - Paul Emmerich, Maximilian Pudelko, Sebastian Gallenmüller

, Georg Carle:
FlowScope: Efficient packet capture and storage in 100 Gbit/s networks. 1-9 - David A. Hayes

, David Ros, Andreas Petlund, Iffat Ahmed:
A framework for less than best effort congestion control with soft deadlines. 1-9 - Bruhadeshwar Bezawada

, Alex X. Liu, Xiaojiang Liang, Rui Li:
A template approach for group key distribution in dynamic ad-hoc groups. 1-9 - Anat Bremler-Barr, David Hay, Idan Moyal, Liron Schiff:

Load balancing memcached traffic using software defined networking. 1-9 - Paul Nikolaus, Jens B. Schmitt:

On per-flow delay bounds in tandem queues under (In)dependent arrivals. 1-9 - Siddharth Pal, Ertugrul N. Ciftcioglu, Prithwish Basu, Kevin S. Chan, Ananthram Swami:

Decentralized network protection games in adversarial environments. 1-9 - Argyrios G. Tasiopoulos, Sameer G. Kulkarni, Mayutan Arumaithurai, Ioannis Psaras, K. K. Ramakrishnan

, Xiaoming Fu
, George Pavlou:
DRENCH: A semi-distributed resource management framework for NFV based service function chaining. 1-9 - Bitan Banerjee

, Anand Seetharam, Chintha Tellambura:
Greedy caching: A latency-aware caching strategy for information-centric networks. 1-9 - Kuangyu Zheng, Xiaorui Wang, Jia Liu:

DISCO: Distributed traffic flow consolidation for power efficient data center network. 1-9 - Marc Mosko

, Ersin Uzun, Christopher A. Wood:
Mobile sessions in content-centric networks. 1-9 - Christopher A. Wood:

Protecting the long tail: Transparent packet security in content-centric networks. 1-9 - Naeem Khademi, Grenville Armitage, Michael Welzl

, Sebastian Zander, Gorry Fairhurst, David Ros:
Alternative backoff: Achieving low latency and high throughput with ECN and AQM. 1-9 - Zubair Shafiq, Alex X. Liu:

Cascade size prediction in online social networks. 1-9 - Zubair Shafiq, Alex X. Liu:

A graph theoretic approach to fast and accurate malware detection. 1-9 - Zainab Abaid, Mohamed Ali Kâafar

, Sanjay Jha
:
Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study. 1-9 - Christopher Scherb

, Balázs Faludi, Christian F. Tschudin:
Execution state management in named function networking. 1-6 - Christopher Scherb

, Claudio Marxer, Urs Schnurrenberger, Christian F. Tschudin:
In-network live stream processing with named functions. 1-6 - Junaid Ahmed Khan, Cédric Westphal, Yacine Ghamri-Doudane:

A content-based centrality metric for collaborative caching in information-centric fogs. 1-6 - Tom Jones, Gorry Fairhurst, Colin Perkins

:
Raising the datagram API to support transport protocol evolution. 1-6 - Imed Allal, Bruno Mongazon-Cazavet, Khaldoun Al Agha, Sidi-Mohammed Senouci

, Yvon Gourhant:
A green small cells deployment in 5G - Switch ON/OFF via IoT networks & energy efficient mesh backhauling. 1-2 - Mikhail Vilgelm

, Wolfgang Kellerer
:
Binary contention resolution for M2M random access prioritization in LTE-A and 5G. 1-2 - Rafael Pasquini

, Farnaz Moradi, Jawwad Ahmed, Andreas Johnsson, Christofer Flinta, Rolf Stadler:
Predicting SLA conformance for cluster-based services. 1-2 - Brian Trammell, Colin Perkins

, Mirja Kühlewind:
Post sockets: Towards an evolvable network transport interface. 1-6 - Mohammad Rajiullah, A. C. Mohideen, Felix Weinrank, Raffaello Secchi, Godred Fairhurst, Anna Brunström:

Understanding multistreaming for web traffic: An experimental study. 1-6 - Felix Weinrank, Michael Tüxen:

Transparent flow mapping for NEAT. 1-6 - Brenton D. Walker:

Benchmarking and simulating the fundamental scaling behaviors of a MapReduce engine. 1-6 - Hasan M. A. Islam

, Dmitrij Lagutin, Nikos Fotiou:
Observing IoT resources over ICN. 1-8 - Mikael Gasparian, Guillaume Corsini, Torsten Braun

, Eryk Schiller, Jonnahtan Saltarin:
Session support for SCN. 1-6 - Nikos Fotiou, Vasilios A. Siris

, George Xylomenos
, George C. Polyzos, Konstantinos V. Katsaros, George P. Petropoulos:
Edge-ICN and its application to the Internet of Things. 1-6 - Rhaban Hark, Amr Rizk, Nils Richerzhagen, Björn Richerzhagen, Ralf Steinmetz

:
Isolated in-band communication for distributed SDN controllers. 1-2 - Tor Christian Tangenes, David A. Hayes

, Andreas Petlund, David Ros:
Evaluating CAIA delay gradient as a candidate for deadline-aware less-than-best-effort transport. 1-6 - Rohit P. Tahiliani, Hitesh Tewari

:
Implementation of PI2 queuing discipline for classic TCP traffic in ns-3. 1-6 - V. Marbukh:

Fragility risks of low latency dynamic queuing in large-scale clouds: Complex system perspective. 1-6 - Kiran Yedugundla, Per Hurtig, Anna Brunström:

Probe or wait: Handling tail losses using multipath TCP. 1-6 - Ian Marsh:

A lightweight measurement platform for home internet monitoring. 1-2 - Ricardo Santos, Zdravko Bozakov, Simone Mangiante

, Anna Brunström, Andreas Kassler:
A NEAT framework for application-awareness in SDN environments. 1-2 - Charalampos Orfanidis, Laura Marie Feeney, Martin Jacobsson:

Measuring PHY layer interactions between LoRa and IEEE 802.15.4g networks. 1-2 - Ming Zeng

, Viktoria Fodor:
Distributing dynamic divisible loads. 1-2 - Felipe Boeira, Marinho P. Barcellos

, Edison Pignaton de Freitas
, Alexey V. Vinel, Mikael Asplund:
On the impact of sybil attacks in cooperative driving scenarios. 1-2 - Albert Potsch, Stefan Hujber, Andreas Springer

:
Remote controlled performance analysis of embedded wireless sensor networks. 1-2 - Berkin Guler, Öznur Özkasap

:
Secure chain replication. 1-2 - Sanaz Taheri Boshrooyeh

, Öznur Özkasap
:
Guard: Secure routing in skip graph. 1-2 - Tran Quang Thanh, Stefan Covaci, Marius Corici

, Thomas Magedanz:
Access control management and orchestration in NFV environment. 1-2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














