It is our pleasure to welcome you to the ninth ACM SIGCOMM Workshop on Hot Topics in Networks---HotNets IX. As with previous instances of this workshop, the goal has been to provide a venue for publication and discussion of early-stage, provocative research. We received 104 submissions and accepted 22 papers. The accepted papers cover topics ranging from wireless networks and software radios to novel network architectures, data center networks, home networks and security issues.
Like many conferences, we adopted a 2-round review process. Our small and diligent program committee wrote over 400 reviews to ensure every paper received at least 3 reviews, with slightly more than half the papers proceeding to the second round and receiving up to 3 additional reviews. More than 50 papers were discussed in the full-day PC meeting. While there were plenty of papers that produced divided opinions among the PC, we managed to achieve consensus on the set of papers to accept in quite a collegial manner. We tried hard to ensure that innovative work would be accepted even if not quite "fully baked", in keeping with the Hotnets goals. The experiment of using high-quality IP video conferencing to connect a pair of PC meeting rooms in Cambridge, MA and Kaiserslautern, Germany was highly successful and somewhat reduced the carbon footprint of the conference.
Proceeding Downloads
DevoFlow: cost-effective flow management for high performance enterprise networks
The OpenFlow framework enables flow-level control over Ethernet switching, as well as centralized visibility of the flows in the network. OpenFlow's coupling of these features comes with costs, however: the distributed-system costs of involving the ...
Packet re-cycling: eliminating packet losses due to network failures
This paper presents Packet Re-cycling (PR), a technique that takes advantage of cellular graph embeddings to reroute packets that would otherwise be dropped in case of link or node failures. The technique employs only one bit in the packet header to ...
Putting BGP on the right path: a case for next-hop routing
BGP is plagued by many serious problems, ranging from protocol divergence and software bugs to misconfigurations and attacks. Rather than continuing to add mechanisms to an already complex protocol, or redesigning interdomain routing from scratch, we ...
A case for information-bound referencing
Links and content references form the foundation of the way that users interact today. Unfortunately, the links used today (URLs) are fragile since they tightly specify a protocol, host, and filename. Some past efforts have decoupled this binding to a ...
"Extra-sensory perception" for wireless networks
Commodity smartphones and tablet devices now come equipped with a variety of sensors, including accelerometers, multiple positioning sensors, magnetic compasses, and inertial sensors (gyros). In this paper, we posit that these sensors can be profitably ...
HTTP as the narrow waist of the future internet
Over the past decade a variety of network architectures have been proposed to address IP's limitations in terms of flexible forwarding, security, and data distribution. Meanwhile, fueled by the explosive growth of video traffic and HTTP infrastructure (...
CloudPolice: taking access control out of the network
Cloud computing environments impose new challenges on access control techniques due to multi-tenancy, the growing scale and dynamicity of hosts within the cloud infrastructure, and the increasing diversity of cloud network architectures. The majority of ...
Proteus: a topology malleable data center network
Full-bandwidth connectivity between all servers of a data center may be necessary for all-to-all traffic patterns, but such interconnects suffer from high cost, complexity, and energy consumption. Recent work has argued that if all-to-all traffic is ...
Using strongly typed networking to architect for tussle
Today's networks discriminate towards or against traffic for a wide range of reasons, and in response end users and their applications increasingly attempt to evade monitoring and control, resulting in an ongoing tussle whose roots run deep. In this ...
Data center networking with multipath TCP
Recently new data center topologies have been proposed that offer higher aggregate bandwidth and location independence by creating multiple paths in the core of the network. To effectively use this bandwidth requires ensuring different flows take ...
SecureAngle: improving wireless security using angle-of-arrival information
Wireless networks play an important role in our everyday lives, at the workplace and at home. However, they are also relatively vulnerable: physically located off site, attackers can circumvent wireless security protocols such as WEP, WPA, and even to ...
Next generation on-chip networks: what kind of congestion control do we need?
In this paper, we present network-on-chip (NoC) design and contrast it to traditional network design, highlighting core differences between NoCs and traditional networks. As an initial case study, we examine network congestion in bufferless NoCs. We ...
How to tell an airport from a home: techniques and applications
Today's Internet services increasingly use IP-based geolocation to specialize the content and service provisioning for each user. However, these systems focus almost exclusively on the current position of users and do not attempt to infer or exploit any ...
Automatic rate adaptation
Rate adaptation is a fundamental primitive in wireless networks. Since wireless channel strength varies quickly and unpredictably, senders have to constantly measure the channel and correspondingly adapt the bitrate so that the transmitted packet gets ...
Location, location, location!: modeling data proximity in the cloud
Cloud applications have increasingly come to rely on distributed storage systems that hide the complexity of handling network and node failures behind simple, data-centric interfaces (such as PUTs and GETs on key-value pairs). While these interfaces are ...
Listen (on the frequency domain) before you talk
Conventional WiFi networks perform channel contention in time domain. This is known to be wasteful because the channel is forced to remain idle, while all contending nodes are backing off for multiple time slots. This paper proposes to break away from ...
Successive interference cancellation: a back-of-the-envelope perspective
Successive interference cancellation (SIC) is a physical layer capability that allows a receiver to decode packets that arrive simultaneously. While the technique is well known in communications literature, emerging software radios are making practical ...
The home needs an operating system (and an app store)
We argue that heterogeneity is hindering technological innovation in the home---homes differ in terms of their devices and how those devices are connected and used. To abstract these differences, we propose to develop a home-wide operating system. A ...
A network in a laptop: rapid prototyping for software-defined networks
Mininet is a system for rapidly prototyping large networks on the constrained resources of a single laptop. The lightweight approach of using OS-level virtualization features, including processes and network namespaces, allows it to scale to hundreds of ...
Putting the software radio on a low-calorie diet
Modern software-defined radios are large, expensive, and power-hungry devices and this, we argue, hampers their more widespread deployment and use, particularly in low-power, size-constrained application settings like mobile phones and sensor networks. ...
SideCar: building programmable datacenter networks without programmable switches
This paper examines an extreme point in the design space of programmable switches and network policy enforcement. Rather than relying on extensive changes to switches to provide more programmability, SideCar distributes custom processing code between ...
Diagnosing mobile applications in the wild
There are a lot of applications that run on modern mobile operating systems. Inevitably, some of these applications fail in the hands of users. Diagnosing a failure to identify the culprit, or merely reproducing that failure in the lab is difficult. To ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
HotNets '17 | 124 | 28 | 23% |
HotNets '16 | 108 | 30 | 28% |
HotNets-XIII | 118 | 26 | 22% |
HotNets-XII | 110 | 26 | 24% |
Overall | 460 | 110 | 24% |