It is our pleasure to welcome you to the eleventh ACM SIGCOMM Workshop on Hot Topics in Networks---HotNets XI. As with previous instances of this workshop, the goal has been to provide a venue for publication and discussion of early-stage, provocative research. We received 120 submissions and accepted 23 papers. The accepted papers cover topics ranging from novel network architectures to wireless networks, data center networks, software defined networks, privacy and security, routing and performance optimization.
Proceeding Downloads
Compressing IP forwarding tables for fun and profit
- Gábor Rétvári,
- Zoltán Csernátony,
- Attila Körösi,
- János Tapolcai,
- András Császár,
- Gábor Enyedi,
- Gergely Pongrácz
About what is the smallest size we can compress an IP Forwarding Information Base (FIB) down to, while still guaranteeing fast lookup? Is there some notion of FIB entropy that could serve as a compressibility metric? As an initial step in answering ...
Toward software-defined middlebox networking
Current middlebox (MB) management mechanisms are clumsy and unsuitable for taking full advantage of new MB deployment models and diverse MB functionality. Instead, we advocate for mechanisms that help exercise unified control over the key factors ...
More is less: reducing latency via redundancy
Low latency is critical for interactive networked applications. But while we know how to scale systems to increase capacity, reducing latency --- especially the tail of the latency distribution --- can be much more difficult.
We argue that the use of ...
LOUP: who's afraid of the big bad loop?
We consider the intra-AS route dissemination problem from first principles, and illustrate that when known route dissemination techniques propagate even a single external routing change, they can cause transient anomalies. These anomalies are not ...
Power-aware rateless codes in mobile wireless communication
Rateless error correction codes hold great potential for increasing the capacity of practical wireless networks by obviating the need for transmitters to estimate the highest reliable rate of an unpredictable wireless channel and send information at ...
Coflow: a networking abstraction for cluster applications
Cluster computing applications -- frameworks like MapReduce and user-facing applications like search platforms -- have application-level requirements and higher-level abstractions to express them. However, there exists no networking abstraction that can ...
A new approach to interdomain routing based on secure multi-party computation
- Debayan Gupta,
- Aaron Segal,
- Aurojit Panda,
- Gil Segev,
- Michael Schapira,
- Joan Feigenbaum,
- Jenifer Rexford,
- Scott Shenker
Interdomain routing involves coordination among mutually distrustful parties, leading to the requirements that BGP provide policy autonomy, flexibility, and privacy. BGP provides these properties via the distributed execution of policy-based decisions ...
Software-defined internet architecture: decoupling architecture from infrastructure
In current networks, a domain can effectively run a network architecture only if it is explicitly supported by the network infrastructure. This coupling between architecture and infrastructure means that any significant architectural change involves ...
Cognitive bias in network services
The assumption of rationality is fundamental to large part of network economics literature. In this paper, we use a simple definition of rationality based on economic self-interest and test for such behavior using real data on how users purchase and ...
Outsourcing the routing control logic: better internet routing based on SDN principles
Inter-domain routing is based on a fully decentralized model, where multiple Autonomous Systems (AS) interact via the BGP protocol. Although BGP is the "glue" of the Internet, it faces a lot of problems regarding its fully distributed nature, policy ...
Rethinking end-to-end congestion control in software-defined networks
TCP is designed to operate in a wide range of networks. Without any knowledge of the underlying network and traffic characteristics, TCP is doomed to continuously increase and decrease its congestion window size to embrace changes in network or traffic. ...
One strategy does not serve all: tailoring wireless transmission strategies to user profiles
- Shailendra Singh,
- Karthikeyan Sundaresan,
- Amir Khojastepour,
- Sampath Rangarajan,
- Srikanth V. Krishnamurthy
The proliferation of smartphones and tablet devices is changing the landscape of user connectivity and data access from predominantly static users to a mix of static and mobile users. While significant advances have been made in wireless transmission ...
Creating shared secrets out of thin air
Current security systems typically rely on the adversary's computational limitations (e.g., the fact that it cannot invert a hash function or perform large-integer factorization). Wireless networks offer the opportunity for a different, complementary ...
Detecting price and search discrimination on the internet
Price discrimination, setting the price of a given product for each customer individually according to his valuation for it, can benefit from extensive information collected online on the customers and thus contribute to the profitability of e-commerce ...
When David helps Goliath: the case for 3G onloading
- Narseo Vallina-Rodriguez,
- Vijay Erramilli,
- Yan Grunenberger,
- Laszlo Gyarmati,
- Nikolaos Laoutaris,
- Rade Stanojevic,
- Konstantina Papagiannaki
Access link can often be the bottleneck for application performance. In this paper, we propose to augment wired connections using cellular ones, that we term "3G onloading (3GOL)". 3GOL utilizes available mobile devices and already-paid-for data volumes ...
Towards systematic roadmaps for networked systems
Networked systems have benefited from unprecedented growth in hardware capabilities, but, as we move closer to the end of the Moore's law era, future networked systems are likely to be more constrained by hardware capabilities than they have been in the ...
A quest for an Internet video quality-of-experience metric
An imminent challenge that content providers, CDNs, third-party analytics and optimization services, and video player designers in the Internet video ecosystem face is the lack of a single "gold standard" to evaluate different competing solutions. ...
Act for affordable data care
Data breaches, e.g. malware, network intrusions, or physical theft, that lead to the compromise of users' personal data, happen often. The impacted companies lose reputation and have to spend millions of dollars providing affected users with identity ...
Live migration of an entire network (and its hosts)
Live virtual machine (VM) migration can move applications from one location to another without a disruption in service. However, applications often consist of multiple VMs and rely on the state of the underlying network for basic reachability, access ...
Hunting mice with microsecond circuit switches
Recently, there have been proposals for constructing hybrid data center networks combining electronic packet switching with either wireless or optical circuit switching, which are ideally suited for supporting bulk traffic. Previous work has relied on a ...
FreeDOM: a new baseline for the web
Free web services often face growing pains. In the current client-server access model, the cost of providing a service increases with its popularity. This leads organizations that want to provide services free-of-charge to rely to donations, ...
CARE: content aware redundancy elimination for challenged networks
- Udi Weinsberg,
- Qingxi Li,
- Nina Taft,
- Athula Balachandran,
- Vyas Sekar,
- Gianluca Iannaccone,
- Srinivasan Seshan
This paper presents the design of a novel architecture called CARE (Content-Aware Redundancy Elimination) that enables maximizing the informational value that challenged networks offer their users. We focus on emerging applications for situational ...
Deconstructing datacenter packet transport
We present, pFabric, a minimalistic datacenter fabric design that provides near-optimal performance in terms of completion time for high-priority flows and overall network utilization. pFabric's design eliminates nearly all buffering on switches (...
- Proceedings of the 11th ACM Workshop on Hot Topics in Networks
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
HotNets '17 | 124 | 28 | 23% |
HotNets '16 | 108 | 30 | 28% |
HotNets-XIII | 118 | 26 | 22% |
HotNets-XII | 110 | 26 | 24% |
Overall | 460 | 110 | 24% |