Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2619287acmotherconferencesBook PagePublication PagescfiConference Proceedingsconference-collections
CFI '14: Proceedings of The Ninth International Conference on Future Internet Technologies
ACM2014 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CFI '14: International Conference of Future Internet 2014 Tokyo Japan June 18 - 20, 2014
ISBN:
978-1-4503-2942-2
Published:
18 June 2014
Sponsors:
JSPS, WIDE
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 29 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

The Ninth International Conference on Future Internet Technologies (CFI 2014) continues the tradition of being the forum for early work on Future Internet research. This year we received 23 submissions (including 12 work-in-progress papers) and accepted 5 regular and 8 short papers for oral presentations out of them. Besides oral presentation we accepted 10 poster presentations, some of which are chosen from submissions that are not accepted as oral ones. The Technical Program Committee and external reviewers worked diligently on the submission reviews. Each submission was sent to three TPC members and all submissions received at least two separate reviews. As the goal of CFI 2014 is to be the nurturing platform for budding research, the Technical Program Committee put much effort to return encouraging reviews and scout for promising ideas.

Skip Table Of Content Section
research-article
Analyzing the effectiveness of content delivery network interconnection of 3G cellular traffic
Article No.: 1, Pages 1–6https://doi.org/10.1145/2619287.2619297

It has been a recent trend of Internet service providers (ISPs) to deploy content delivery networks (CDNs) extensively in their infrastructure in order to utilize their network resources and generate a new profit source. This 'telco CDN' has become an ...

research-article
Interest cash: an application-based countermeasure against interest flooding for dynamic content in named data networking
Article No.: 2, Pages 1–6https://doi.org/10.1145/2619287.2619298

As a design of information-centric network architecture, Named Data Networking (NDN) provides content-based security. The signature binding the name with the content is the key point of content-based security in NDN. However, signing a content will ...

research-article
User-defined actions for SDN
Article No.: 3, Pages 1–6https://doi.org/10.1145/2619287.2619292

In Software-Defined Networking (SDN), the control plane can program the data plane via SDN open APIs such as OpenFlow. An OpenFlow-like data plane applies <match, action> rules to every packet. However, it only supports a few actions that are all ...

research-article
SuVMF: software-defined unified virtual monitoring function for SDN-based large-scale networks
Article No.: 4, Pages 1–6https://doi.org/10.1145/2619287.2619299

Traffic and resource monitoring is the essential function for large-scale enterprises, service providers, and network operators to ensure reliability, availability, and security of their resources. For this reason, many large-scale enterprises and ...

research-article
Where are the bottlenecks in software packet processing and forwarding?: Towards high-performance network operating systems
Article No.: 5, Pages 1–6https://doi.org/10.1145/2619287.2619300

We analyze the performance bottlenecks in packet processing and forwarding with general-purpose computers to achieve high-throughput and low-latency, and to guarantee service quality. In this paper, we first demonstrate that the performance bottleneck ...

short-paper
Content-hierarchical intra-domain cooperative caching for information-centric networks
Article No.: 6, Pages 1–6https://doi.org/10.1145/2619287.2619289

Information-centric networking (ICN) is a clean-slate network architecture to achieve efficient content transmissions. In-network caching is an important issue in ICN, since the routers have a limited caching capacity. Several approaches have been ...

short-paper
PPP: prefix-based popularity prediction for effective caching in content-centric networking
Article No.: 7, Pages 1–6https://doi.org/10.1145/2619287.2619296

In the Content-Centric Networking (CCN) architecture, popular content can be cached in some intermediate network devices while being delivered, and the following requests for the cached content can be efficiently handled by the caches. Thus, how to ...

short-paper
Oblivious DDoS mitigation with locator/ID separation protocol
Article No.: 8, Pages 1–6https://doi.org/10.1145/2619287.2619291

The need to keep an attacker oblivious of an attack mitigation effort is a very important component of a defense against denial of services (DoS) and distributed denial of services (DDoS) attacks because it helps to dissuade attackers from changing ...

short-paper
Design and implementation of server cluster dynamic load balancing in virtualization environment based on OpenFlow
Article No.: 9, Pages 1–6https://doi.org/10.1145/2619287.2619288

This paper mainly studies dynamic load balancing in virtualization environment based on OpenFlow, where the Controller collected the server running status through virtual machine management techniques and calculated the aggregated load of the servers ...

short-paper
In-network cache simulations based on a YouTube traffic analysis at the edge network
Article No.: 10, Pages 1–6https://doi.org/10.1145/2619287.2619295

Recently, with the advent of YouTube and similar video streaming websites, online video playback has gained popularity. Further, video traffic, represents the largest portion of Internet traffic. However, online video traffic contains redundant traffic ...

short-paper
Towards an NLP-based log template generation algorithm for system log analysis
Article No.: 11, Pages 1–4https://doi.org/10.1145/2619287.2619290

System log from network equipment is one of the most important information for network management. Sophisticated log message mining could help in investigating a huge number of log messages for trouble shooting, especially in recent complicated network ...

short-paper
Inter-connection automation for OF@TEIN multi-point international OpenFlow islands
Article No.: 12, Pages 1–4https://doi.org/10.1145/2619287.2619293

In realizing futuristic services with agility, testbed environments that provide converged computing/networking resources based on SDN (Software--Defined Networking) and CC (Cloud Computing) are becoming important. Following this trend, OF@TEIN OpenFlow-...

short-paper
IP-NUMA for low-latency communication
Article No.: 13, Pages 1–4https://doi.org/10.1145/2619287.2619294

With cloud service becoming more popular, low-latency communication is required between servers in a data center. Low-latency node-to-node or application-to-application notification can be achieved in a NUMA [1] (Non-Uniform Memory Access) system, but ...

poster
Detecting anomalies in massive traffic with sketches
Article No.: 14, Pages 1–2https://doi.org/10.1145/2619287.2619301

Sketches have been considered as an efficient and scalable structure for processing massive data. In this work, we propose a sketch-based method for detecting anomalies in network traffic. The method divides an IP traffic stream into sub-streams using ...

poster
Future internet issues from the perspective of a generic network model
Article No.: 15, Pages 1–2https://doi.org/10.1145/2619287.2619302

This paper analyzes Future Internet issues from the perspective of a generic network model. The generic network model is developed by identifying the essential objects and bindings for data communication. Based on this model, this paper identifies the ...

poster
Fast failover mechanism for software defined networking: OpenFlow based
Article No.: 16, Pages 1–2https://doi.org/10.1145/2619287.2619303

Path protection and restoration mechanism must be implemented to provide a reliable network. Whenever there is a link failure in the network, OpenFlow controller can react by computing a new backup path and provide the information to the affected node ...

poster
Coins in cloud drives can use OAuth for micropayments and resource metering alike
Article No.: 17, Pages 1–2https://doi.org/10.1145/2619287.2619304

Resource metering in distributed environments is notoriously difficult. In clouds, the metering technology has to be distributed by design. This paper shows that the technology used for (financial) micropayments fulfills several objectives of the new ...

poster
Distributed GA for popularity based partial cache management in ICN
Article No.: 18, Pages 1–2https://doi.org/10.1145/2619287.2619305

Information Centric Networks (ICNs) is a new architecture for the Future Internet to deliver content at large-scale. It relies on named data and caching features, which consists of storing content across the delivery path to serve forthcoming requests. ...

poster
NECOMAtter: curating approach for sharing cyber threat information
Article No.: 19, Pages 1–2https://doi.org/10.1145/2619287.2619306

In this paper, we design and implement a novel system for connecting cyber threat information. The objective is to improve the information and its analysis results with machine intelligence assisted by human intelligence. This paper illustrates the ...

poster
Performance evaluation of an OpenFlow-based mirroring switch on a laptop/raspberry Pi
Article No.: 20, Pages 1–2https://doi.org/10.1145/2619287.2619307

This paper describes an implementation and performance evaluation of an OpenFlow-based laptop mirroring switch. We confirm that we can build a mirroring switch which can forward traffic faster than 200 Mbps with only an inexpensive laptop PC and USB 3.0 ...

poster
Internetworking with SDN using existing BGP
Article No.: 21, Pages 1–2https://doi.org/10.1145/2619287.2619308

The research on transiting the existing networks to SDN (Software defined networking) just starts. We propose to continue using the BGP (Border Gateway Protocol) and the legacy BGP border routers for the SDN network and connect the SDN network with ...

poster
Cross-layer network parameterization for application-aware networking in wireless ad-hoc networks
Article No.: 22, Pages 1–2https://doi.org/10.1145/2619287.2619309

Cross-layer networking is a promising approach which provides an optimal routing solution for achieving the goal of a target application. However, existing cross-layer networking approaches mostly support only a specific application type and do not ...

poster
Radio resource efficient cellular broadcast networks
Article No.: 23, Pages 1–2https://doi.org/10.1145/2619287.2619310

Rapid and relentless video traffic growth has brought about network congestion. To alleviate the problem, this paper considers a video content broadcast cellular network via the same frequency channels, enabling to save radio resource compared to the ...

Contributors

Index Terms

  1. Proceedings of The Ninth International Conference on Future Internet Technologies
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Acceptance Rates

        CFI '14 Paper Acceptance Rate 13 of 23 submissions, 57%;
        Overall Acceptance Rate 29 of 55 submissions, 53%
        YearSubmittedAcceptedRate
        CFI'1917847%
        CFI'1715853%
        CFI '14231357%
        Overall552953%