skip to main content
10.1145/3155921acmconferencesBook PagePublication PagesconextConference Proceedingsconference-collections
CAN '17: Proceedings of the 2nd Workshop on Cloud-Assisted Networking
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CoNEXT '17: The 13th International Conference on emerging Networking EXperiments and Technologies Incheon Republic of Korea December 11 - 12, 2017
ISBN:
978-1-4503-5423-3
Published:
11 December 2017
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

We take great pleasure in welcoming you to 2nd Cloud-Assisted Networking (CAN) 2017 Workshop co-located with ACM CoNEXT in Seoul/Incheon, South Korea. CAN'17 continues the pursuit of providing a forum to bring together researchers focusing on proactively integrating cloud resources and network components to solve complex networking problems as started by 1st CAN workshop.

Skip Table Of Content Section
research-article
Considerations on deploying high-performance container-based NFV

Over the last few years, the idea of network function virtualization (NFV) has become widespread, shifting the workload of hardware-based middleboxes onto applications on commodity hardware. Virtual machine is the common building block of the NFV ...

research-article
Towards optimal adaptation of NFV packet processing to modern CPU memory architectures

Network Functions Virtualization (NFV) aims to move network functions away from expensive hardware appliances to off-the-shelf server hardware. NFV promises higher flexibility and cost reduction for the network operator. In order to achieve high ...

research-article
Unveiling performance of NFV software dataplanes

The key technology of NFV is software dateplane, which has attracted much attention in both academia and industry recently. Yet, in practice, there is very little understanding about its performance till now. We make a comprehensive measurement study of ...

research-article
SDN on ACIDs

Software-defined networks (SDN) do not guarantee coherent network operations, when uncoordinated SDN applications concurrently update the network forwarding state. As this problem has not so far received considerable attention, in this paper, we ...

research-article
Public Access
Switch-visor: towards infrastructure-level virtualization of SDN switches

To test and update switch operating systems, developers and testers need to install run beta-switch OSes (switch agents) alongside production versions. However, today's network virtualization solutions fail to support infrastructure-level virtualization ...

research-article
Cloud assisted home networks

Managed services for the home have traditionally been shunned by Internet Service Providers (ISPs) as having high overheads and low margins. In this paper we argue that the maturing ecosystem around Software Defined Networking (SDN) changes the equation,...

research-article
MISE: MIddleboxes SElection for multi-domain service function chains

In-network services, usually implemented through middle-boxes, play a key role in today's Internet. They enhance end-to-end connections with the ability to provide content optimization, performance enhancement, privacy protection, etc. Multiple in-...

research-article
DeepFlow: a deep learning framework for software-defined measurement

Providing fine grained traffic measurement is crucial for many network management tasks such as traffic engineering, anomaly detection, traffic accounting, and load balancing. Software-defined networks can potentially enable fine-grained measurement by ...

research-article
Controlling migration performance of virtual machines according to user's requirements

Live Virtual Machine (VM) migration is an important technology for cloud management and guaranteeing a high service quality. However, existing studies are mainly focusing on improving migration performance but without much consideration of user's ...

research-article
Semantic virtualization for Edge-IoT cloud: issues and challenges

It is well expected that a collection of smart objects such as IoT devices dynamically form an edge cloud allowing acquiring, storing, communicating, and processing of information done at the edge of the network. Edge cloud workers (i.e. IoT devices) ...

research-article
Cloud-assisted trajectory data management and analysis: a case study

Massive trajectory data with spatio-temporal information are generated from various devices everyday. Due to a wide variety of devices and data collection methods, these data differ in terms of frequency and precision, which brings challenges to data ...

research-article
Fending off IoT-hunting attacks at home networks

Many attacks target vulnerabilities of home IoT devices, such as bugs in outdated software and weak passwords. The home network is at a vantage point for deploying security appliances to deal with such IoT attacks. We propose a comprehensive home ...

Contributors
  1. Proceedings of the 2nd Workshop on Cloud-Assisted Networking

    Recommendations