- Sponsor:
- sigcomm
It's a great pleasure to welcome everyone to ACM CoNEXT 2008 - the 4th International Conference on emerging Networking EXperiments and Technologies. The first three CoNEXT conferences were held in Toulouse, Lisbon and New York, and this year returned to its roots in Europe. This year's edition has been co-organized by IMDEA Networks and University of Carlos III, and held in Madrid: one of the world's leading cities in terms of cultural and artistic activity along with a lively nightlife. We hope that this conference facilitates a stimulating exchange of ideas among many of the members of our international research community.
The ACM CoNEXT '08 Conference received 166 papers of high quality, of which 29 were selected for publication after a thorough peer review process. The ACM CoNEXT Student Workshop received 66 poster submissions out of which 30 were accepted; ReArch'08 --- Re-Architecting the Internet workshop received 50 papers submitted and 13 accepted; and ROADS'08---3rd International Workshop on Real Overlays & Distributed Systems received 20 paper submissions out of which 6 were accepted.
Proceeding Downloads
Is there life in Second Life?
Social virtual worlds such as Second Life are digital representations of the real world where human-controlled avatars evolve and interact through social activities. Understanding the characteristics of existing virtual worlds can be extremely valuable ...
Troubleshooting chronic conditions in large IP networks
Chronic network conditions are caused by performance impairing events that occur intermittently over an extended period of time. Such conditions can cause repeated performance degradation to customers, and sometimes can even turn into serious hard ...
Packet doppler: network monitoring using packet shift detection
Due to recent large-scale deployments of delay and loss-sensitive applications, there are increasingly stringent demands on the monitoring of service level agreement metrics. Although many end-to-end monitoring methods have been proposed, they are ...
Online estimation of RF interference
Increased AP density in enterprise WLANs leads to increasing RF interference and decreasing performance. An important step towards mitigating this problem is to construct precise RF maps in the form of a conflict graph. Prior work on conflict graph ...
MOSAIC: unified declarative platform for dynamic overlay composition
Overlay networks create new networking services across nodes that communicate using pre-existing networks. MOSAIC is a unified declarative platform for constructing new overlay networks from multiple existing overlays, each possessing a subset of the ...
EGOIST: overlay routing using selfish neighbor selection
- Georgios Smaragdakis,
- Vassilis Lekakis,
- Nikolaos Laoutaris,
- Azer Bestavros,
- John W. Byers,
- Mema Roussopoulos
A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of connectivity management, i.e., folding new arrivals into an existing overlay, and re-wiring to cope with changing network ...
On cooperative settlement between content, transit and eyeball internet service providers
Internet service providers (ISPs) depend on one another to provide global network services. However, the profit-seeking nature of the ISPs leads to selfish behaviors that result in inefficiencies and disputes in the network. This concern is at the heart ...
On the scalability of BGP: the roles of topology growth and update rate-limiting
The scalability of BGP routing is a major concern for the Internet community. Scalability is an issue in two different aspects: increasing routing table size, and increasing rate of BGP updates. In this paper, we focus on the latter. Our objective is to ...
Instability free routing: beyond one protocol instance
Today, a large body of research exists regarding the correctness of routing protocols. However, many reported global disruptions of Internet connectivity, e.g., inter-AS persistent loops, cannot be explained by looking at a single routing protocol at a ...
Balancing performance, robustness and flexibility in routing systems
Modern networks face the daunting task of handling increasingly diverse traffic that is displaying a growing intolerance to disruptions. This has given rise to many initiatives, and in this paper we focus on multiple topology routing as the primary ...
Internet traffic classification demystified: myths, caveats, and the best practices
Recent research on Internet traffic classification algorithms has yield a flurry of proposed approaches for distinguishing types of traffic, but no systematic comparison of the various algorithms. This fragmented approach to traffic classification ...
Observing slow crustal movement in residential user traffic
It is often argued that rapidly increasing video content along with the penetration of high-speed access is leading to explosive growth in the Internet traffic. Contrary to this popular claim, technically solid reports show only modest traffic growth ...
Capacity estimation of ADSL links
Most tools designed to estimate the capacity of an Internet path require access on both end hosts of the path, which makes them difficult to deploy and use. In this paper we present a single-sided technique for measuring the capacity without the active ...
A priority-layered approach to transport for high bandwidth-delay product networks
High-speed organizational networks running over leased fiber-optic lines or VPNs suffer from the well-known limitations of TCP over long-fat pipes. High-performance protocols like XCP require changes in the network. Other protocols like FastTCP assume ...
DaVinci: dynamically adaptive virtual networks for a customized internet
Running multiple virtual networks, customized for different performance objectives, is a promising way to support diverse applications over a shared substrate. Despite being simple, a static division of resources between virtual networks can be highly ...
Implementation of end-to-end abstractions in a network service architecture
To support the increasing diversity of systems and protocols in the Internet, modern routers offer a variety of data path processing functions. Such "network services" are easy to implement on a single node, but a network-wide deployment is difficult. ...
Peer-assisted content distribution with prices
Peer-assisted content distribution matches user demand for content with available supply at other peers in the network. Inspired by this supply-and-demand interpretation of the nature of content sharing, we employ price theory to study peer-assisted ...
Uplink allocation beyond choke/unchoke: or how to divide and conquer best
Motivated by emerging cooperative P2P applications we study new uplink allocation algorithms for substituting the rate-based choke/unchoke algorithm of BitTorrent which was developed for non-cooperative environments. Our goal is to shorten the download ...
Maintaining replicas in unstructured P2P systems
Replication is widely used in unstructured peer-to-peer systems to improve search or achieve availability. We identify and solve a subclass of replication problems where each object is associated with a maintainer node, and its replicas should only be ...
Towards high performance virtual routers on commodity hardware
Modern commodity hardware architectures, with their multiple multi-core CPUs and high-speed system interconnects, exhibit tremendous power. In this paper, we study performance limitations when building both software routers and software virtual routers ...
Efficient IP-address lookup with a shared forwarding table for multiple virtual routers
Virtual routers are a promising way to provide network services such as customer-specific routing, policy-based routing, multi-topology routing, and network virtulization. However, the need to support a separate forwarding information base (FIB) for ...
Towards systematic design of enterprise networks
Enterprise networks are important, with size and complexity even surpassing carrier networks. Yet, the design of enterprise networks is ad-hoc and poorly understood. In this paper, we show how a systematic design approach can handle two key areas of ...
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in such networks quintessentially depends on mechanisms to verify the ...
Packet-dropping adversary identification for data plane security
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly elusive. In this paper, we propose a secure and practical packet-dropping ...
Extending finite automata to efficiently match Perl-compatible regular expressions
Regular expression matching is a crucial task in several networking applications. Current implementations are based on one of two types of finite state machines. Non-deterministic finite automata (NFAs) have minimal storage demand but have high memory ...
Quality of monitoring of stochastic events by periodic & proportional-share scheduling of sensor coverage
We analyze the quality of monitoring (QoM) of stochastic events by a periodic sensor which monitors a point of interest (PoI) for q time every p time. We show how the amount of information captured at a PoI is affected by the proportion q/p, the time ...
Improving the performance of multi-hop wireless networks using frame aggregation and broadcast for TCP ACKs
As data rates supported by the physical layer increase, PHY and especially MAC overheads increasingly dominate the throughput achievable by wireless networks. A promising approach for reducing these overheads is to aggregate a number of frames together ...
TDM MAC protocol design and implementation for wireless mesh networks
- Dimitrios Koutsonikolas,
- Theodoros Salonidis,
- Henrik Lundgren,
- Pascal LeGuyadec,
- Y. Charlie Hu,
- Irfan Sheriff
We present the design, implementation, and evaluation of a Time Division Multiplex (TDM) MAC protocol for multi-hop wireless mesh networks using a programmable wireless platform. Extensive research has been devoted to optimal scheduling algorithms for ...
Opportunistic use of client repeaters to improve performance of WLANs
Currently deployed IEEE 802.11 WLANs (Wi-Fi networks) share access point (AP) bandwidth on a per-packet basis. However, the various stations communicating with the AP often have different signal qualities, resulting in different transmission rates. This ...
Distributed event delivery model for collaborative virtual simulations
Networked Virtual Environments (NVEs) are computer generated, synthetic worlds that allow simultaneous interactions of multiple participants. IP multicast and application layer multicasting has been used for supporting collaborative virtual simulations. ...
Cited By
-
Wu Y, Wang X and Saxena S (2022). Performance of cloud native network function date plane International Conference on Cloud Computing, Performance Computing, and Deep Learning (CCPCDL 2022), 10.1117/12.2640714, 9781510655867, (7)
- Kuenzer S, Ivanov A, Manco F, Mendes J, Volchkov Y, Schmidt F, Yasukata K, Honda M and Huici F Unikernels Everywhere Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, (15-29)
- Kuenzer S, Ivanov A, Manco F, Mendes J, Volchkov Y, Schmidt F, Yasukata K, Honda M and Huici F (2017). Unikernels Everywhere, ACM SIGPLAN Notices, 52:7, (15-29), Online publication date: 14-Sep-2017.
- Proceedings of the 2008 ACM CoNEXT Conference
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
CoNEXT '22 | 151 | 28 | 19% |
CoNEXT '19 Companion | 52 | 34 | 65% |
CoNEXT '16 | 160 | 30 | 19% |
CoNEXT '14 | 133 | 27 | 20% |
CoNEXT Student Workshop '14 | 34 | 17 | 50% |
CoNEXT '13 | 226 | 44 | 19% |
CoNEXT Student Workhop '13 | 33 | 18 | 55% |
Overall | 789 | 198 | 25% |