skip to main content
10.1145/3565477acmconferencesBook PagePublication PagesconextConference Proceedingsconference-collections
CoNEXT-SW '22: Proceedings of the 3rd International CoNEXT Student Workshop
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CoNEXT '22: The 18th International Conference on emerging Networking EXperiments and Technologies Rome Italy 9 December 2022
ISBN:
978-1-4503-9937-1
Published:
06 December 2022
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 02 Mar 2025Bibliometrics
Skip Abstract Section
Abstract

Following the success of previous years, the main CoNEXT conference will be accompanied by this one-day Student Workshop providing a platform for graduate students in the area of computer networks and communications to learn from senior researchers in the field and present their ongoing research efforts. The idea of this workshop is also to offer an opportunity for students to receive constructive feedback, guidance, and tips, moreover, to network with other junior researchers as well as more experienced ones.

Skip Table Of Content Section
SESSION: Application/social
extended-abstract
Covid-19 contact tracing through multipath profile similarity

Contact tracing is a key approach to control the spread of Covid-19 and any other pandemia. Recent attempts have followed either traditional ways of tracing (e.g. patient interviews) or unreliable app-based localization solutions. The latter has raised ...

extended-abstract
How to define political ads?

Online political advertising has grown significantly over the last few years. Currently, both policymakers and platforms are debating further restrictions on political advertising to deter misuse.

This work investigates whether we can reliably ...

SESSION: Measurements
extended-abstract
Flow-based network intrusion detection based on BERT masked language model

A Network Intrusion Detection System (NIDS) is an important tool that identifies potential threats to a network. Recently, different flow-based NIDS designs utilizing Machine Learning (ML) algorithms have been proposed as potential solutions to detect ...

extended-abstract
On the joint optimization of security, scalability and decentralization of real-time group communications

In this paper we consider the problem of how to optimize real-time communications for groups of any size assuming zero-trust in everything except the group members. The objective is to minimize the maximum load across group members while reducing ...

extended-abstract
Simulating SIMBox frauds for detection investigation

SIMBox fraud is one of the most prevalent scams in cellular networks that cause a significant monetary loss to mobile operators. It consists of diverting international voice traffic from regulated routes and rerouting it as local calls in the ...

SESSION: Protocols and performance
extended-abstract
FlexPort: transport scale-out with modern NICs

TCP is the de facto transport protocol for modern web and storage services. We propose FlexPort, a system that enables TCP connection migration without network support to increase the service capacity and reliability in the scale-out systems. We use ...

extended-abstract
Experimenting with bit index explicit replication

Bit Index Explicit Replication (BIER) is a recent multicast architecture that solves several problems with deployed IP multicast protocols. BIER embeds an implicit multicast tree representation inside each transmitted packet. With this new mechanism, it ...

extended-abstract
A high-speed QUIC implementation

Several implementations of the QUIC protocol exist. Unfortunately, they generally lack behind TCP ones in terms of performance as TCP stacks have been undergoing years of optimizations. In this work, we propose picoquic-dpdk, a modified version of ...

extended-abstract
Towards disaggregated P4 pipelines with information exchange minimization

With the advent of programmable data plane hardware and the use of P4 as a high-level programming language, switches not only implement existing protocols but can also offload other tasks easily. However, hardware switches introduce several constraints ...

SESSION: Security
extended-abstract
Challenges in inferring privacy properties of smart devices: towards scalable multi-vantage point testing methods

The growth of the number of Internet of Things (IoT) devices in the home has introduced unprecedented challenges for preserving consumers' privacy. To enhance the transparency and trustworthiness of IoT products, industry actors, regulators and ...

extended-abstract
Burstiness in data center topologies

Data center workloads are bursty but the impact of the underlying network topology on traffic burstiness is relatively unknown. We show that the symmetric nature of pervasive Clos topologies contributes to traffic burstiness. This is primarily due to a ...

SESSION: Machine learning in and of networks
extended-abstract
Toward flexible auditing for in-network functionality

Networks today increasingly support in-network functionality via network function virtualization (NFV) or similar technologies. Such approaches enable a wide range of functionality to be deployed on behalf of end systems, such as offloading Tor services ...

extended-abstract
AwareNet: using WSBMs for network traffic analyis

Characterizing network behavior, an essential building block for many network management tasks becomes increasingly difficult for administrators. Reasons for that are, among others, rising traffic volume and dynamicity in modern networks. To automate ...

extended-abstract
MetaABR: environment-adaptive video streaming system with meta-reinforcement learning

This work focuses on a video bitrate algorithm that quickly adapts to new and various environments with just a few update steps. This aspect is especially important for large-scale video streaming services used by a wide variety of users in different ...

extended-abstract
DeepQuic: multi-path QUIC scheduling for 5G core network

In the complex 5G network environment, the number of multiple access devices increases sharply, which requires a more efficient multi-path scheduling algorithm. However, traditional multi-path heuristic algorithms can only work in static scenarios ...

extended-abstract
Learned data structures for per-flow measurements

This work presents a generic framework that exploits learning to improve the quality of network measurements. The main idea of this work is to reuse measures collected by the network monitoring tasks to train an ML model that learns some per-flow ...

Contributors
  • University of Cambridge
Index terms have been assigned to the content through auto-classification.

Recommendations