Bolt:{Sub-RTT} congestion control for {Ultra-Low} latency

S Arslan, Y Li, G Kumar, N Dukkipati - … Design and Implementation (NSDI …, 2023 - usenix.org
… Ultimately, even a single incorrect or slow CC decision may end up creating tens of
microseconds of tail queuing [12], or cause under-utilization [53] which prolongs the flow completion …

Klonet: an {Easy-to-Use} and scalable platform for computer networks education

T Ma, L Luo, H Yu, X Chen, J Xie, C Ma, Y Xie… - … Implementation (NSDI …, 2024 - usenix.org
… The reasons are (1) Container light-weight nature versus VM and better file isolation feature
than the namespace technology used by emulators like Mininet [12], in line with our goal to …

Let it flow: Resilient asymmetric load balancing with flowlet switching

E Vanini, R Pan, M Alizadeh, P Taheri… - … and Implementation (NSDI …, 2017 - usenix.org
Datacenter networks require efficient multi-path load balancing to achieve high bisection
bandwidth. Despite much progress in recent years towards addressing this challenge, a load …

[PDF][PDF] The Numbers

RIK FARROW - usenix.org
… Finally, we have two reports, for NSDI12 and LEET12. There were many interesting
papers at NSDI this year, and LEET combined academic and commercial research for a very …

[CITATION][C] NSDI'12 and LEET'12.

AA Dixit, R Farrow, A Ferguson, K LaCurts, M Martins… - login Usenix Mag …, 2012 - usenix.org
NSDI '12 and LEET '12 | USENIX … NSDI '12 and LEET '12

Precedence: Enabling compact program layout by table dependency resolution

C Leet, S Chen, K Gao, YR Yang - … of the 2019 ACM Symposium on …, 2019 - dl.acm.org
The rise of the programmable switching ASIC has allowed switches to handle the complexity
and diversity of modern networking programs while meeting the performance demands of …

Flow algebra: Towards an efficient, unifying framework for network management tasks

C Leet, R Soulé, YR Yang… - IEEE INFOCOM 2021-IEEE …, 2021 - ieeexplore.ieee.org
A modern network needs to conduct a diverse set of tasks, and the existing approaches
focus on developing specific tools for specific tasks, resulting in increasing complexity and …

[PDF][PDF] Insights from the Inside: A View of Botnet Management from Infiltration.

CY Cho, J Caballero, C Grier, V Paxson, D Song - LEET, 2010 - usenix.org
Recent work has leveraged botnet infiltration techniques to track the activities of bots over
time, particularly with regard to spam campaigns. Building on our previous success in …

A survey on enterprise network security: Asset behavioral monitoring and distributed attack detection

M Lyu, HH Gharakheili, V Sivaraman - IEEE Access, 2024 - ieeexplore.ieee.org
Enterprise networks that host valuable assets and services are popular and frequent targets
of distributed network attacks. In order to cope with the ever-increasing threats, industrial …

[PDF][PDF] Toward the first SDN programming capacity theorem on realizing high-level programs on low-level datapaths

C Leet, X Wang, YR Yang, J Aspnes - IEEE International Conference on …, 2018 - cs.yale.edu
High-level programming and programmable data paths are two key capabilities of software-defined
networking (SDN). A fundamental problem linking these two capabilities is whether a …