Bolt:{Sub-RTT} congestion control for {Ultra-Low} latency
… Ultimately, even a single incorrect or slow CC decision may end up creating tens of
microseconds of tail queuing [12], or cause under-utilization [53] which prolongs the flow completion …
microseconds of tail queuing [12], or cause under-utilization [53] which prolongs the flow completion …
Klonet: an {Easy-to-Use} and scalable platform for computer networks education
… The reasons are (1) Container light-weight nature versus VM and better file isolation feature
than the namespace technology used by emulators like Mininet [12], in line with our goal to …
than the namespace technology used by emulators like Mininet [12], in line with our goal to …
Let it flow: Resilient asymmetric load balancing with flowlet switching
Datacenter networks require efficient multi-path load balancing to achieve high bisection
bandwidth. Despite much progress in recent years towards addressing this challenge, a load …
bandwidth. Despite much progress in recent years towards addressing this challenge, a load …
[PDF][PDF] The Numbers
RIK FARROW - usenix.org
… Finally, we have two reports, for NSDI ’12 and LEET ’12. There were many interesting
papers at NSDI this year, and LEET combined academic and commercial research for a very …
papers at NSDI this year, and LEET combined academic and commercial research for a very …
[CITATION][C] NSDI'12 and LEET'12.
AA Dixit, R Farrow, A Ferguson, K LaCurts, M Martins… - login Usenix Mag …, 2012 - usenix.org
NSDI '12 and LEET '12 | USENIX … NSDI '12 and LEET '12 …
Precedence: Enabling compact program layout by table dependency resolution
The rise of the programmable switching ASIC has allowed switches to handle the complexity
and diversity of modern networking programs while meeting the performance demands of …
and diversity of modern networking programs while meeting the performance demands of …
Flow algebra: Towards an efficient, unifying framework for network management tasks
A modern network needs to conduct a diverse set of tasks, and the existing approaches
focus on developing specific tools for specific tasks, resulting in increasing complexity and …
focus on developing specific tools for specific tasks, resulting in increasing complexity and …
[PDF][PDF] Insights from the Inside: A View of Botnet Management from Infiltration.
Recent work has leveraged botnet infiltration techniques to track the activities of bots over
time, particularly with regard to spam campaigns. Building on our previous success in …
time, particularly with regard to spam campaigns. Building on our previous success in …
A survey on enterprise network security: Asset behavioral monitoring and distributed attack detection
Enterprise networks that host valuable assets and services are popular and frequent targets
of distributed network attacks. In order to cope with the ever-increasing threats, industrial …
of distributed network attacks. In order to cope with the ever-increasing threats, industrial …
[PDF][PDF] Toward the first SDN programming capacity theorem on realizing high-level programs on low-level datapaths
High-level programming and programmable data paths are two key capabilities of software-defined
networking (SDN). A fundamental problem linking these two capabilities is whether a …
networking (SDN). A fundamental problem linking these two capabilities is whether a …