skip to main content
10.1145/2935663acmotherconferencesBook PagePublication PagescfiConference Proceedingsconference-collections
CFI '16: Proceedings of the 11th International Conference on Future Internet Technologies
ACM2016 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CFI '16: The 11th International Conference on Future Internet Technologies Nanjing China June 15 - 17, 2016
ISBN:
978-1-4503-4181-3
Published:
15 June 2016
In-Cooperation:
AsiaFI

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
Constructing Multiple Steiner Trees for Software-Defined Networking Multicast

A heuristic algorithm is proposed in this paper to construct a set of Steiner trees for multicast with multiple sources under the software-defined networking (SDN) architecture, where each source is associated with a group of receivers. It is based on ...

research-article
Detecting Network Topology and Packet Trajectory with SDN-enabled FPGA Platform

Software-defined networking brings extra complexity to debugging while enhancing network manageability. The competition between applications and subtle bugs in controllers or switches may cause inconformity between control plane logic and data plane ...

research-article
An Easy Defense Mechanism Against Botnet-based DDoS Flooding Attack Originated in SDN Environment Using sFlow

As today's networks become larger and more complex, the Distributed Denial of Service (DDoS) flooding attack threats may not only come from the outside of networks but also from inside, such as cloud computing network where exists multiple tenants ...

research-article
Public Access
Performance Evaluation of TCP Congestion Control Algorithms in Data Center Networks

TCP congestion control has been known for its crucial role in stabilizing the Internet and preventing congestion collapses. However, with the rapid advancement in networking technologies, resulting in the emergence of challenging network environments ...

research-article
Energy-Efficient Localization and Tracking on Smartphones: Design Principle and Solutions

In recent years, various location based services (LBS) have witnessed great development and are being prevalently used in our life. However, as the foundation of various LBS applications, localization consumes large energy of resource-constraint mobile ...

research-article
RBAS: A Real-Time User Behavior Analysis System for Internet TV in Cloud Computing

The characteristic of Internet TV user behavior is quite essential for designers to optimize resource schedule and improve user experience. With the rapid development of Internet, both Internet TV users and STB (set top boxes) models are booming. This ...

research-article
Optimized Root Selection Algorithm for Many-to-Many Communications in ICN

Information-centric networking (ICN) is a promising framework providing data through their names. It is expected that ICN will provide many-to-many communications enabling the efficient content sharing. To provide such many-to-many communications, ...

research-article
Spray and Hop Distance Routing Protocol in Multiple-island DTN Scenarios

Especially in rural areas, a high-speed but high-cost data communication infrastructure is not always available. In such conditions, a store-carry-and-forward-based message relaying over existing vehicle networks is a promising approach to delivery of ...

research-article
Directed-Propagation Link-State Routing Protocol for Information-Centric Networks

This paper presents the design of Directed-Propagation Link-State Routing Protocol (DPLSR), which tries to address the issue of prefix flooding storm in NDN Link-state Routing Protocol. Since the number of data object is several order of magnitude of ...

research-article
Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key

In order to enable intrinsic security without the Public Key Infrastructure (PKI) deployment, flat self-certifying addresses have been involved into the future Internet architecture (FIA) designs. In contrast to deriving a self-certifying address from ...

research-article
Verification of a Multi-Domain Authentication and Authorization Infrastructure Yamata-no-Orochi

Yamata-no-Orochi is an authentication and authorization infrastructure across multiple service domains and provides Internet services with unified authentication and authorization mechanisms. In this paper, Yamata-no-Orochi is incorporated into a video ...

research-article
Detecting Compromised Email Accounts from the Perspective of Graph Topology

While email plays a growingly important role on the Internet, we are faced with more severe challenges brought by compromised email accounts, especially for the administrators of institutional email service providers. Inspired by the previous experience ...

research-article
Protecting DNS services from IP spoofing: SDN collaborative authentication approach

As DNS packet are mostly UDP-based, make it as a perfect tool for hackers to launch a well-known type of distributed denial of service (DDoS). The purpose of this attack is to saturate the DNS server availability and resources. This type of attack ...

short-paper
Flo-v: Low Overhead Network Monitoring Framework in Virtualized Software Defined Networks

Network virtualization involves creating multiple virtual networks within a physical network, based on the flexible network environment of software-defined networking (SDN). In a virtualized SDN (vSDN), a network hypervisor plays a key role in ...

short-paper
Implementing a Dynamically Reconfigurable Wireless Mesh Network Testbed for Multi-Faceted QoS Support

Various mobile applications require different QoS requirements, thus there is a need to resolve the application requirement into the underlying mesh network to support them. Existing approach to coordinate the application traffic requirement to ...

short-paper
Efficient Matching Algorithm for Content-based Publish/Subscribe Systems with Compound Predicates

Publish/Subscribe paradigm has been widely used in large-scale distributed systems, as well as in information-centric networks (ICNs) due to its properties of asynchronous, loosely-coupled and many-to-many communications. This paper focuses on matching ...

short-paper
Enabling Fast Recovery from Unanticipated Data Access Failure in Named Data Networking

We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data as the Interest sent upstream in advance is recognized as a duplicate one due to its multipath forwarding and dropped by an upstream node. Furthermore, ...

short-paper
Quantifying the Flattening of Internet Topology

As the Internet grows, the Internet service providers (ISPs) and content providers tend to be more densely connected to the Internet to improve performance and redundancy, which leads to a flattening of the Internet topology at the autonomous system (AS)...

short-paper
Deployment and Evaluation of Software-Defined Inter-Connections for Multi-domain Federated SDN-Cloud

In this paper, we describe an on-going experimental effort to inter-connect and federate distributed SDN-cloud resources that are spread over separate administrative domains. The proposed Software-Defined Inter-Connections utilizes the mixture of tunnel-...

Recommendations

Acceptance Rates

Overall Acceptance Rate29of55submissions,53%
YearSubmittedAcceptedRate
CFI'1917847%
CFI'1715853%
CFI '14231357%
Overall552953%