- Sponsor:
- sigcomm
It is our great pleasure to welcome you to ACM CoNEXT 2010, the 6th International COnference on emerging Networking EXperiments and Technologies. The conference is hosted by Drexel University and is held in the City of Brotherly Love, Philadelphia. We hope that the vibe of the city in combination with an outstanding technical and social program will lead to stimulating discussions and exchange of ideas among the attending members of our world-spanning community.
This year's edition continues the tradition of CoNEXT to foster the scientific and technological intersection between different research communities in networking from both academia and industry. The main conference is preceded by two interesting workshops that reflect the communities' renewed interest in fundamentally rethinking network architecture (ReArch) and what networking elements should and can do (PRESTO). In addition to those, we also have a student workshop to give the next generation of networking researchers a platform to discuss their work in an open and informal setting. The main conference is again organized along a single track of thematically grouped sessions to foster the interaction and discussions among all participants and across different points of views.
CoNEXT strives to be an affordable conference and we managed to keep registration fees at the same level for the third consecutive year, despite a tough climate for attracting supporters. We are especially grateful to CISCO, for its outstanding commitment to research and education by becoming a Gold Supporter of ACM CoNEXT 2010; many thanks to our Bronze Supporter AT&T, and also to our Patrons: INTEL, NICTA and Drexel University. We thank the National Science Foundation and SIGCOMM for providing generous support for student travel grants.
Proceeding Downloads
Verifiable network-performance measurements
In the current Internet, there is no clean way for affected parties to react to poor forwarding performance: to detect and assess Service Level Agreement (SLA) violations by a contractual partner, a domain must resort to ad-hoc monitoring using probes. ...
Profiling-By-Association: a resilient traffic profiling solution for the internet backbone
Profiling Internet backbone traffic is becoming an increasingly hard problem since users and applications are avoiding detection using traffic obfuscation and encryption. The key question addressed here is: Is it possible to profile traffic at the ...
Spatio-temporal patterns in network events
Operational networks typically generate massive monitoring data that consist of local (in both space and time) observations of the status of the networks. It is often hypothesized that such data exhibit both spatial and temporal correlation based on the ...
Optimal content placement for a large-scale VoD system
IPTV service providers offering Video-on-Demand currently use servers at each metropolitan office to store all the videos in their library. With the rapid increase in library sizes, it will soon become infeasible to replicate the entire library at each ...
G-RCA: a generic root cause analysis platform for service quality management in large IP networks
As IP networks have become the mainstay of an increasingly diverse set of applications ranging from Internet games and streaming videos, to e-commerce and online-banking, and even to mission-critical 911, best effort service is no longer acceptable. ...
Declarative configuration management for complex and dynamic networks
Network management and operations are complicated, tedious, and error-prone, requiring signifcant human involvement and domain knowledge. As the complexity involved inevitably grows due to larger scale networks and more complex protocol features, human ...
NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems
Traditional DSL troubleshooting solutions are reactive, relying mainly on customers to report problems, and tend to be labor-intensive, time consuming, prone to incorrect resolutions and overall can contribute to increased customer dissatisfaction. In ...
MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking
Evaluating anomaly detectors is a crucial task in traffic monitoring made particularly difficult due to the lack of ground truth. The goal of the present article is to assist researchers in the evaluation of detectors by providing them with labeled ...
Internet traffic classification demystified: on the sources of the discriminative power
Recent research on Internet traffic classification has yield a number of data mining techniques for distinguishing types of traffic, but no systematic analysis on "Why" some algorithms achieve high accuracies. In pursuit of empirically grounded answers ...
Balancing throughput, robustness, and in-order delivery in P2P VoD
Peer-to-peer has emerged in recent years as a promising approach to providing Video-on-Demand streaming. The design space, however, is vast and still not well understood---yet choosing the right approach is critical to system performance. This paper ...
Is content publishing in BitTorrent altruistic or profit-driven?
BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity of BitTorrent is primarily due to the availability of valuable content ...
Federation of virtualized infrastructures: sharing the value of diversity
By federating virtualized computing and network resources one can significantly increase their value thanks to gains from statistical multiplexing and increases in resource diversity (more distinct locations, technologies, etc.). Successful federation ...
ICTCP: Incast Congestion Control for TCP in data center networks
TCP incast congestion happens in high-bandwidth and low-latency networks, when multiple synchronized servers send data to a same receiver in parallel [15]. For many important data center applications such as MapReduce[5] and Search, this many-to-one ...
LEGUP: using heterogeneity to reduce the cost of data center network upgrades
Fundamental limitations of traditional data center network architectures have led to the development of architectures that provide enormous bisection bandwidth for up to hundreds of thousands of servers. Because these architectures rely on homogeneous ...
SecondNet: a data center network virtualization architecture with bandwidth guarantees
In this paper, we propose virtual data center (VDC) as the unit of resource allocation for multiple tenants in the cloud. VDCs are more desirable than physical data centers because the resources allocated to VDCs can be rapidly adjusted as tenants' ...
A cost comparison of datacenter network architectures
There is a growing body of research exploring new network architectures for the data center. These proposals all seek to improve the scalability and cost-effectiveness of current data center networks, but adopt very different approaches to doing so. For ...
Personal data vaults: a locus of control for personal data streams
The increasing ubiquity of the mobile phone is creating many opportunities for personal context sensing, and will result in massive databases of individuals' sensitive information incorporating locations, movements, images, text annotations, and even ...
Network-wide deployment of intrusion detection and prevention systems
Traditional efforts for scaling network intrusion detection (NIDS) and intrusion prevention systems (NIPS) have largely focused on a single-vantage-point view. In this paper, we explore an alternative design that exploits spatial, network-wide ...
Strengthening forensic investigations of child pornography on P2P networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and application-level identifiers in the context of forensic measurement, as exemplified in the policing of ...
Scalable routing on flat names
We introduce a protocol which routes on flat, location-independent identifiers with guaranteed scalability and low stretch. Our design builds on theoretical advances in the area of compact routing, and is the first to realize these guarantees in a ...
The Internet is flat: modeling the transition from a transit hierarchy to a peering mesh
Recent measurements and anecdotal evidence indicate that the Internet ecosystem is rapidly evolving from a multi-tier hierarchy built mostly with transit (customer-provider) links to a dense mesh formed with mostly peering links. This transition can ...
Inferring invisible traffic
A traffic matrix encompassing the entire Internet would be very valuable. Unfortunately, from any given vantage point in the network, most traffic is invisible. In this paper we describe results that hold some promise for this problem. First, we show a ...
Enabling high-bandwidth vehicular content distribution
- Upendra Shevade,
- Yi-Chao Chen,
- Lili Qiu,
- Yin Zhang,
- Vinoth Chandar,
- Mi Kyung Han,
- Han Hee Song,
- Yousuk Seung
We present VCD, a novel system for enabling high-bandwidth content distribution in vehicular networks. In VCD, a vehicle opportunistically communicates with nearby access points (APs) to download the content of interest. To fully take advantage of such ...
Assessing the vulnerability of replicated network services
Client-server networks are pervasive, fundamental, and include such key networks as the Internet, power grids, and road networks. In a client-server network, clients obtain a service by connecting to one of a redundant set of servers. These networks are ...
Exploiting locality of interest in online social networks
Online Social Networks (OSN) are fun, popular, and socially significant. An integral part of their success is the immense size of their global user base. To provide a consistent service to all users, Facebook, the world's largest OSN, is heavily ...
Mobile data offloading: how much can WiFi deliver?
This paper presents a quantitative study on the performance of 3G mobile data offloading through WiFi networks. We recruited about 100 iPhone users from metropolitan areas and collected statistics on their WiFi connectivity during about a two and half ...
Auto-configuration of 802.11n WLANs
- Mustafa Y. Arslan,
- Konstantinos Pelechrinis,
- Ioannis Broustis,
- Srikanth V. Krishnamurthy,
- Sateesh Addepalli,
- Konstantina Papagiannaki
Channel Bonding (CB) combines two adjacent frequency bands to form a new, wider band to facilitate high data rate transmissions in MIMO-based 802.11n networks. However, the use of a wider band with CB can exacerbate interference effects. Furthermore, CB ...
Simple yet efficient, transparent airtime allocation for TCP in wireless mesh networks
In this paper, we explore a simple yet effective technique for explicitly allocating airtime to each active pair of communicating neighbors in a wireless neighborhood so that TCP starvation in a wireless mesh network is avoided. Our explicit allocation ...
- Proceedings of the 6th International COnference
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
CoNEXT '22 | 151 | 28 | 19% |
CoNEXT '19 Companion | 52 | 34 | 65% |
CoNEXT '16 | 160 | 30 | 19% |
CoNEXT '14 | 133 | 27 | 20% |
CoNEXT Student Workshop '14 | 34 | 17 | 50% |
CoNEXT '13 | 226 | 44 | 19% |
CoNEXT Student Workhop '13 | 33 | 18 | 55% |
Overall | 789 | 198 | 25% |