Abstract is missing.
- Improving Backpressure-based Adaptive Routing via Incremental Expansion of Routing ChoicesPing Yin, Sen Yang, Jun Xu, Jim Dai, Bill Lin. 1-12 [doi]
- Using Indirect Routing to Recover from Network Traffic Scheduling Estimation ErrorConglong Li, Matthew K. Mukerjee, David G. Andersen, Srinivasan Seshan, Michael Kaminsky, George Porter, Alex C. Snoeren. 13-24 [doi]
- ZeroSDN: A Highly Flexible and Modular Architecture for Full-Range Network Control DistributionThomas Kohler 0001, Frank Dürr, Kurt Rothermel. 25-37 [doi]
- BPFabric: Data Plane Programmability for Software Defined NetworksSimon Jouet, Dimitrios P. Pezaros. 38-48 [doi]
- Designing Virtual Network Functions for 100 GbE Network Using Multicore ProcessorsPeilong Li, Xiaoban Wu, Yongyi Ran, Yan Luo. 49-59 [doi]
- Enhancing Scalable Name-Based ForwardingHaowei Yuan, Patrick Crowley, Tian Song. 60-69 [doi]
- Controlling Strategy Retransmissions in Named Data NetworkingHila Ben Abraham, Patrick Crowley. 70-81 [doi]
- On Incremental Deployment of Named Data Networking in Local Area NetworksHao Wu, Junxiao Shi, Yaxuan Wang, Yilun Wang, Gong Zhang, Yi Wang, Bin Liu 0001, Beichuan Zhang. 82-94 [doi]
- OpenSched: Programmable Packet Queuing and Scheduling for Centralized QoS ControlTian Pan, Tao Huang, Jianwei Mao, Cong Li, Yunjie Liu. 95-96 [doi]
- Rule Compilation in Multi-Tenant NetworksKhalil Blaiech, Salaheddine Hamadi, Stefan Hommes, Petko Valtchev, Omar Cherkaoui, Radu State. 97-98 [doi]
- Virtual Network Embedding in Hybrid Data CentersZhenhua Li, Yuanyuan Yang. 99-100 [doi]
- Building Fast but Flexible Software RoutersSebastian Gallenmüller, Paul Emmerich, Rainer Schonberger, Daniel Raumer, Georg Carle. 101-102 [doi]
- CODIS: A New Compression Scheme for Bitmap IndexesWenxun Zheng, Yin Liu, Zhen Chen 0001, Junwei Cao. 103-104 [doi]
- On the Latency Benefits of Edge NFVRichard Cziva, Dimitrios P. Pezaros. 105-106 [doi]
- P5: Programmable Parsers with Packet-level Parallel Processing for FPGA-based SwitchesJunnan Li, ZhiGang Sun, Biao Han. 107-108 [doi]
- An Attack-Resilient Source Authentication Protocol in Controller Area NetworkKi-Dong Kang, Young-mi Baek, Seonghun Lee, Sang Hyuk Son. 109-118 [doi]
- Time Pattern Analysis of Malware by Circular StatisticsLiuxuan Pan, Allan Tomlinson, Alexey A. Koloydenko. 119-130 [doi]
- Detecting Remote Access Trojans through External Control at Area Network BordersShuang Wu, Shengli Liu, Wei Lin, Xing Zhao, Shi Chen. 131-141 [doi]
- RwHash: Rewritable Hash Table for Fast Network Processing with Dynamic Membership UpdatesTian Song, Yating Yang, Patrick Crowley. 142-152 [doi]
- Statistical Optimal Hash-Based Longest Prefix MatchYi Wang, Zhuyun Qi, Huichen Dai, Hao Wu, Kai Lei, Bin Liu. 153-164 [doi]
- SLIM: Enabling Transparent Extensibility and Dynamic Configuration via Session-Layer AbstractionsUmar Kalim, Mark K. Gardner, Eric J. Brown, Wu Feng. 165-177 [doi]
- Life on the Edge: Unraveling Policies into ConfigurationsShrutarshi Basu, Nate Foster, Hossein Hojjat, Paparao Palacharla, Christian Skalka, Xi Wang 0001. 178-190 [doi]
- Mind the Gap - A Comparison of Software Packet GeneratorsPaul Emmerich, Sebastian Gallenmüller, Gianni Antichi, Andrew W. Moore 0002, Georg Carle. 191-203 [doi]
- ClassBench-ng: Recasting ClassBench after a Decade of Network EvolutionJirí Matousek, Gianni Antichi, Adam Lucansky, Andrew W. Moore 0002, Jan Korenek. 204-216 [doi]