It is our great pleasure to welcome you to the Student Workshop of the 5th ACM International Conference on emerging Networking EXperiments and Technologies -- CoNEXT 2009. Ever since its inception, CoNEXT has put an emphasis on students by organizing a specific workshop in order to provide them with the opportunity to divulge their ongoing research efforts, even if at an early stage. This year's edition continues the successful tradition, with a novelty consisting in the introduction of the option for students to review the submitted papers of their colleagues. Such an initiative was not only meant to let students have a deeper look to other submissions and boost discussion during the face to face meeting in Rome, but also to give the opportunity to exercise with reviewing, which is part of every day professional life of a researcher.
The technical program committee included members from all the continents, proving, once again, the world wide scope of the workshop. The call for papers attracted 48 submissions from Asia, North America, Europe, and New Zealand. The technical program committee accepted 29 papers that cover a variety of topics, including traffic measurements and modeling, wireless networks, security, multimedia, network coding, peer to peer systems, and delay tolerant networks. In addition, the program includes a keynote speech by Prof. Jim Kurose on "10 things I wish my advisor had told me, 2nd Edition".
Proceeding Downloads
Scalable landmark flooding: a scalable routing protocol for WSNs
Wireless sensor networks (WSNs) are about to become a popular and inexpensive tool for all kinds of applications. More advanced applications also need end-to-end routing, which goes beyond the simple data dissemination and collection mechanisms of early ...
An adaptive three-party accounting protocol
Three-party tunnel-based roaming infrastructures may become a future trend to permit mobile users to connect to the Internet when they are not at home. Those solutions takle security issues for both visited networks and mobile users, but require an ...
On the characterization of multi-channel applications
We are assisting to the evolution of new generation applications and services, progressively providing - through a single interface - more interactions among the users and between the users and the network. This is promoting the development of multi-...
Deep diving into BitTorrent locality
Localizing BitTorrent traffic within an ISP in order to avoid excessive and often times unnecessary transit costs has recently received a lot of attention. In this work we attempt to answer yet unanswered questions like "what are the boundaries of win-...
Deterministic, reduced-visibility inter-domain forwarding
Inter-domain forwarding state is growing at a super-linear rate, rendering older routers obsolete and increasing the cost of replacement. A reduction of state will alleviate this problem. In this paper, we outline a new reduced-state inter-domain ...
A spectrum assignment method based on genetic algorithm in WiMAX/WiFi integrated network
Recently, the lack of spectrum resources becomes an important problem for advanced wireless networks. To overcome this problem, dynamic spectrum access receives much attention. In this paper, we propose a spectrum assignment method based on a genetic ...
Improving roamer retention by exposing weak locations in GSM networks
One of the most valuable clients of cellular GSM networks are roaming clients, due to the pricing policy set by network operators. Despite that each operator applies a lot of effort in network signal coverage in order to achieve the best conditions for ...
An a priori estimator for the delay distribution in global hybrid multicast
Hybrid multicast is regarded a promising technology to overcome the inter-domain deployment problem for group communication. Realistic performance estimators are difficult to obtain due to the diversity of overlay concepts and their complex dependence ...
What level of estimating accuracy does TCP need and can TCP achieve
Accurate and effective estimation of TCP operating point impacts directly on TCP performance, especially in modern high-speed networks. In this paper, we focus on two crucial questions: 1) In order to guarantee the performance and stability of TCP, how ...
Netflow based system for NAT detection
Revealing the misuse of network resources is one of the important fields in the network security, especially for the network administrators. One of them is the use of unauthorized NAT (Network Address Translation) devices (e.g. small office routers or ...
A robust pair-wise rekeying protocol in hierarchical wireless sensor networks
To support secure communications for many applications in wireless sensor networks (WSNs), some strategies have been proposed to develop the pair-wise rekeying protocol. However, most existing schemes suffer the node capture attack. In this paper, we ...
Random key pre-distribution with transitory master key for wireless sensor networks
Many Wireless Sensor Networks (WSNs) employ security schemes based on the symmetric encryption, which requires the establishment and management of cryptographic keys. This paper presents a new key management scheme based on Random Key Pre-Distribution. ...
Investigating the relationship between QoS and QoE in a mixed desktop/handheld gaming setting
Innovative software and system development requires a multi-disciplinary approach where technical, objectively quantifiable Quality of Service aspects are integrated with and correlated to subjective Quality of Experience measures such as usability, ...
Self-propagating worms in wireless sensor networks
Malicious code is defined as software designed to execute attacks on software systems. This work demonstrates the possibility of executing malware on wireless sensor nodes that are based on the von Neumann architecture. This is achieved by exploiting a ...
Is it me?: understanding the impact of the home network on end-to-end measurements
End users are often curious to verify the performance of their network connection. Mostly, they accomplish this task with end-to-end active measurements. Unfortunately, the home network can affect end-to-end measurement and can lead to erroneous ...
Maximizing streaming quality in heterogeneous overlays through incentives
The upload contribution of peers in a peer-to-peer streaming system depends on their willingness to contribute as well as their physical limitation. Several incentive schemes have been proposed to enforce non-willing peers to cooperate. But we find it ...
Secure interference reporting for dense Wi-Fi deployments
We study the problem of interference detection in dense Wi-Fi deployments, which are a reality in most modern metropolitan areas. Interference among neighbor Wi-Fi cells stems from the anarchic deployment of Wi-Fi access points (APs) and the fact that ...
LT network codes: low complexity network codes
This paper proposes LTNC, a new recoding algorithm to build low complexity network codes. At the core of LTNC is a decentralized version of LT codes that allows the use of fast belief propagation decoding instead of high complexity Gauss reduction used ...
Adding emulation to planetlab nodes
Network testbeds have become very popular to support research on network protocols and distributed applications. When it comes to reproduce network behaviour, testbeds range between two extremes: use a fully emulated network, as in EmuLab, which yields ...
Bloom filters and overlays for routing in pocket switched networks
Pocket Switched Networks (PSN) [3] have become a promising approach for providing communication between scarcely connected human-carried devices. Such devices, e.g. mobile phones or sensor nodes, are exposed to human mobility and can therewith leverage ...
Peer the peers: an overlay id assignment service at internet exchange points
P2P networks enable end users to establish services relying neither on a dedicated infrastructure nor on an ISP deployment of enhanced services at the network layer. Regrettably, overlay traffic is not optimal with respect to native connections and ...
Practical DHT-based location service for wireless mesh networks
Mobility management in Wireless Mesh Networks (WMN) is a hot topic still lacking a final, widely accepted, and deployed solution. The major drawbacks of existing proposals is the fact that they rely on some sort of flooding-based technique and very ...
Relative delay estimator for multipath transport
Due to the dynamic nature of the Internet, the characteristic parameters of network paths are continually changing. The round trip time (RTT) can be used to estimate retransmission timeouts with reasonable accuracy. However, using RTT to evaluate ...
When stochastic rate-delay services meet stochastic network calculus
The delay-sensitive applications has been rapidly growing in recent years, while the current Internet is not well equipped to support such delay-sensitive traffic. The proposed SRD (Stochastic Rate-Delay) services enable a user to choose between a ...
On the utility of rate adaptation for broadcast/multicast media traffic in 802.11 networks
As there is no MAC layer acknowledgment from the receiver for broadcast/multicast transmission in the 802.11 network, using the lowest transmission rate is understandably the safest approach because it minimizes reception error for clients with the ...
Reliable asymmetric path capacity measurement
Existing non-cooperative methods for network capacity measurement are quite restrictive for capacity-asymmetric paths, and their results could be affected by adverse network conditions (e.g., packet delay, packet loss, and packet reordering). In this ...
- Proceedings of the 5th international student workshop on Emerging networking experiments and technologies
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
CoNEXT '22 | 151 | 28 | 19% |
CoNEXT '19 Companion | 52 | 34 | 65% |
CoNEXT '16 | 160 | 30 | 19% |
CoNEXT '14 | 133 | 27 | 20% |
CoNEXT Student Workshop '14 | 34 | 17 | 50% |
CoNEXT '13 | 226 | 44 | 19% |
CoNEXT Student Workhop '13 | 33 | 18 | 55% |
Overall | 789 | 198 | 25% |