Export Citations
Following the success of previous years, the main CoNEXT conference will be accompanied by this one-day Student Workshop providing a platform for graduate students in the area of computer networks and communications to learn from senior researchers in the field and present their ongoing research efforts. The idea of this workshop is also to offer an opportunity for students to receive constructive feedback, guidance, and tips, moreover, to network with other junior researchers as well as more experienced ones.
Proceeding Downloads
Covid-19 contact tracing through multipath profile similarity
Contact tracing is a key approach to control the spread of Covid-19 and any other pandemia. Recent attempts have followed either traditional ways of tracing (e.g. patient interviews) or unreliable app-based localization solutions. The latter has raised ...
How to define political ads?
Online political advertising has grown significantly over the last few years. Currently, both policymakers and platforms are debating further restrictions on political advertising to deter misuse.
This work investigates whether we can reliably ...
Flow-based network intrusion detection based on BERT masked language model
A Network Intrusion Detection System (NIDS) is an important tool that identifies potential threats to a network. Recently, different flow-based NIDS designs utilizing Machine Learning (ML) algorithms have been proposed as potential solutions to detect ...
On the joint optimization of security, scalability and decentralization of real-time group communications
In this paper we consider the problem of how to optimize real-time communications for groups of any size assuming zero-trust in everything except the group members. The objective is to minimize the maximum load across group members while reducing ...
Simulating SIMBox frauds for detection investigation
SIMBox fraud is one of the most prevalent scams in cellular networks that cause a significant monetary loss to mobile operators. It consists of diverting international voice traffic from regulated routes and rerouting it as local calls in the ...
FlexPort: transport scale-out with modern NICs
TCP is the de facto transport protocol for modern web and storage services. We propose FlexPort, a system that enables TCP connection migration without network support to increase the service capacity and reliability in the scale-out systems. We use ...
Experimenting with bit index explicit replication
Bit Index Explicit Replication (BIER) is a recent multicast architecture that solves several problems with deployed IP multicast protocols. BIER embeds an implicit multicast tree representation inside each transmitted packet. With this new mechanism, it ...
A high-speed QUIC implementation
Several implementations of the QUIC protocol exist. Unfortunately, they generally lack behind TCP ones in terms of performance as TCP stacks have been undergoing years of optimizations. In this work, we propose picoquic-dpdk, a modified version of ...
Towards disaggregated P4 pipelines with information exchange minimization
With the advent of programmable data plane hardware and the use of P4 as a high-level programming language, switches not only implement existing protocols but can also offload other tasks easily. However, hardware switches introduce several constraints ...
Challenges in inferring privacy properties of smart devices: towards scalable multi-vantage point testing methods
- Aniketh Girish,
- Vijay Prakash,
- Serge Egelman,
- Joel Reardon,
- Juan Tapiador,
- Danny Yuxing Huang,
- Srdjan Matic,
- Narseo Vallina-Rodriguez
The growth of the number of Internet of Things (IoT) devices in the home has introduced unprecedented challenges for preserving consumers' privacy. To enhance the transparency and trustworthiness of IoT products, industry actors, regulators and ...
Burstiness in data center topologies
Data center workloads are bursty but the impact of the underlying network topology on traffic burstiness is relatively unknown. We show that the symmetric nature of pervasive Clos topologies contributes to traffic burstiness. This is primarily due to a ...
Toward flexible auditing for in-network functionality
Networks today increasingly support in-network functionality via network function virtualization (NFV) or similar technologies. Such approaches enable a wide range of functionality to be deployed on behalf of end systems, such as offloading Tor services ...
AwareNet: using WSBMs for network traffic analyis
Characterizing network behavior, an essential building block for many network management tasks becomes increasingly difficult for administrators. Reasons for that are, among others, rising traffic volume and dynamicity in modern networks. To automate ...
MetaABR: environment-adaptive video streaming system with meta-reinforcement learning
This work focuses on a video bitrate algorithm that quickly adapts to new and various environments with just a few update steps. This aspect is especially important for large-scale video streaming services used by a wide variety of users in different ...
DeepQuic: multi-path QUIC scheduling for 5G core network
In the complex 5G network environment, the number of multiple access devices increases sharply, which requires a more efficient multi-path scheduling algorithm. However, traditional multi-path heuristic algorithms can only work in static scenarios ...
Learned data structures for per-flow measurements
This work presents a generic framework that exploits learning to improve the quality of network measurements. The main idea of this work is to reuse measures collected by the network monitoring tasks to train an ML model that learns some per-flow ...
Index Terms
- Proceedings of the 3rd International CoNEXT Student Workshop
Recommendations
ACM CoNEXT 2016 Student Workshop
CoNEXT '16: Proceedings of the 12th International on Conference on emerging Networking EXperiments and TechnologiesThe ACM CoNEXT 2016 Student Workshop is held in Irvine, California, USA on December 12, 2016 and co-located with the ACM 12th International Conference on emerging Networking Experiments and Technologies (CoNEXT 2016). The main objective of the workshop ...