Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2390231acmconferencesBook PagePublication PagescommConference Proceedingsconference-collections
HotNets-XI: Proceedings of the 11th ACM Workshop on Hot Topics in Networks
ACM2012 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
HotNets-XI: 11th ACM Workshop on Hot Topics in Networks Redmond Washington October 29 - 30, 2012
ISBN:
978-1-4503-1776-4
Published:
29 October 2012
Sponsors:

Reflects downloads up to 10 Oct 2024Bibliometrics
Skip Abstract Section
Abstract

It is our pleasure to welcome you to the eleventh ACM SIGCOMM Workshop on Hot Topics in Networks---HotNets XI. As with previous instances of this workshop, the goal has been to provide a venue for publication and discussion of early-stage, provocative research. We received 120 submissions and accepted 23 papers. The accepted papers cover topics ranging from novel network architectures to wireless networks, data center networks, software defined networks, privacy and security, routing and performance optimization.

Skip Table Of Content Section
research-article
Compressing IP forwarding tables for fun and profit

About what is the smallest size we can compress an IP Forwarding Information Base (FIB) down to, while still guaranteeing fast lookup? Is there some notion of FIB entropy that could serve as a compressibility metric? As an initial step in answering ...

research-article
Toward software-defined middlebox networking

Current middlebox (MB) management mechanisms are clumsy and unsuitable for taking full advantage of new MB deployment models and diverse MB functionality. Instead, we advocate for mechanisms that help exercise unified control over the key factors ...

research-article
More is less: reducing latency via redundancy

Low latency is critical for interactive networked applications. But while we know how to scale systems to increase capacity, reducing latency --- especially the tail of the latency distribution --- can be much more difficult.

We argue that the use of ...

research-article
LOUP: who's afraid of the big bad loop?

We consider the intra-AS route dissemination problem from first principles, and illustrate that when known route dissemination techniques propagate even a single external routing change, they can cause transient anomalies. These anomalies are not ...

research-article
Power-aware rateless codes in mobile wireless communication

Rateless error correction codes hold great potential for increasing the capacity of practical wireless networks by obviating the need for transmitters to estimate the highest reliable rate of an unpredictable wireless channel and send information at ...

research-article
Coflow: a networking abstraction for cluster applications

Cluster computing applications -- frameworks like MapReduce and user-facing applications like search platforms -- have application-level requirements and higher-level abstractions to express them. However, there exists no networking abstraction that can ...

research-article
A new approach to interdomain routing based on secure multi-party computation

Interdomain routing involves coordination among mutually distrustful parties, leading to the requirements that BGP provide policy autonomy, flexibility, and privacy. BGP provides these properties via the distributed execution of policy-based decisions ...

research-article
Software-defined internet architecture: decoupling architecture from infrastructure

In current networks, a domain can effectively run a network architecture only if it is explicitly supported by the network infrastructure. This coupling between architecture and infrastructure means that any significant architectural change involves ...

research-article
Cognitive bias in network services

The assumption of rationality is fundamental to large part of network economics literature. In this paper, we use a simple definition of rationality based on economic self-interest and test for such behavior using real data on how users purchase and ...

research-article
Outsourcing the routing control logic: better internet routing based on SDN principles

Inter-domain routing is based on a fully decentralized model, where multiple Autonomous Systems (AS) interact via the BGP protocol. Although BGP is the "glue" of the Internet, it faces a lot of problems regarding its fully distributed nature, policy ...

research-article
Rethinking end-to-end congestion control in software-defined networks

TCP is designed to operate in a wide range of networks. Without any knowledge of the underlying network and traffic characteristics, TCP is doomed to continuously increase and decrease its congestion window size to embrace changes in network or traffic. ...

research-article
One strategy does not serve all: tailoring wireless transmission strategies to user profiles

The proliferation of smartphones and tablet devices is changing the landscape of user connectivity and data access from predominantly static users to a mix of static and mobile users. While significant advances have been made in wireless transmission ...

research-article
Creating shared secrets out of thin air

Current security systems typically rely on the adversary's computational limitations (e.g., the fact that it cannot invert a hash function or perform large-integer factorization). Wireless networks offer the opportunity for a different, complementary ...

research-article
Detecting price and search discrimination on the internet

Price discrimination, setting the price of a given product for each customer individually according to his valuation for it, can benefit from extensive information collected online on the customers and thus contribute to the profitability of e-commerce ...

research-article
When David helps Goliath: the case for 3G onloading

Access link can often be the bottleneck for application performance. In this paper, we propose to augment wired connections using cellular ones, that we term "3G onloading (3GOL)". 3GOL utilizes available mobile devices and already-paid-for data volumes ...

research-article
Towards systematic roadmaps for networked systems

Networked systems have benefited from unprecedented growth in hardware capabilities, but, as we move closer to the end of the Moore's law era, future networked systems are likely to be more constrained by hardware capabilities than they have been in the ...

research-article
A quest for an Internet video quality-of-experience metric

An imminent challenge that content providers, CDNs, third-party analytics and optimization services, and video player designers in the Internet video ecosystem face is the lack of a single "gold standard" to evaluate different competing solutions. ...

research-article
Act for affordable data care

Data breaches, e.g. malware, network intrusions, or physical theft, that lead to the compromise of users' personal data, happen often. The impacted companies lose reputation and have to spend millions of dollars providing affected users with identity ...

research-article
Live migration of an entire network (and its hosts)

Live virtual machine (VM) migration can move applications from one location to another without a disruption in service. However, applications often consist of multiple VMs and rely on the state of the underlying network for basic reachability, access ...

research-article
Hunting mice with microsecond circuit switches

Recently, there have been proposals for constructing hybrid data center networks combining electronic packet switching with either wireless or optical circuit switching, which are ideally suited for supporting bulk traffic. Previous work has relied on a ...

research-article
FreeDOM: a new baseline for the web

Free web services often face growing pains. In the current client-server access model, the cost of providing a service increases with its popularity. This leads organizations that want to provide services free-of-charge to rely to donations, ...

research-article
CARE: content aware redundancy elimination for challenged networks

This paper presents the design of a novel architecture called CARE (Content-Aware Redundancy Elimination) that enables maximizing the informational value that challenged networks offer their users. We focus on emerging applications for situational ...

research-article
Deconstructing datacenter packet transport

We present, pFabric, a minimalistic datacenter fabric design that provides near-optimal performance in terms of completion time for high-priority flows and overall network utilization. pFabric's design eliminates nearly all buffering on switches (...

Contributors
  • Microsoft Corporation
  • Microsoft Corporation
  • Cornell University
  • University of Southern California
  1. Proceedings of the 11th ACM Workshop on Hot Topics in Networks

        Recommendations

        Acceptance Rates

        Overall Acceptance Rate 110 of 460 submissions, 24%
        YearSubmittedAcceptedRate
        HotNets '171242823%
        HotNets '161083028%
        HotNets-XIII1182622%
        HotNets-XII1102624%
        Overall46011024%