Welcome to the 2010 ACM CoNext Student Workshop in Philadelphia, USA!
The program committee accepted 24 short papers. The topics range across many aspects of networking research including network measurement, wireless networking, protocol design, and data center security. Authors from over 15 countries submitted papers, and the final program includes authors from 13 countries and over 30 organizations.
We had the distinct pleasure of working with an outstanding technical program committee of 17 members spanning the globe and drawn from both industry and academia. All the submitted papers got at least 3 TPC reviews and were discussed among TPC members before a decision was made. As a tradition, we also invited PhD students to comment on several submitted papers. This will allow the students to see the ongoing research of the others before the workshop to facilitate discussion, feedback, and potential collaboration. These comments were not used by the TPC to select which posters appear at the workshop. We saw active students participation, with many papers receiving 2-3 review comments.
Proceeding Downloads
Towards characterization of wireless traffic in coexisting 802.11a/g and 802.11n network
The number of wireless devices and the traffic volume generated by these devices become significant today, and many devices begin supporting 802.11n protocol for higher-speed wireless access. However, the diversification in link types of end-hosts may ...
Towards hardware accelerated software routers
We propose an alternative router design to fill the gap between PC-based open source software routers and commercial high-end routers. Our hardware accelerated software router uses commodity PC hardware running an open source software router for the ...
Characterizing the file hosting service ecosystem
File Hosting Services (FHS) such as Rapidshare and Mega-upload have recently become popular. The decline of P2P file sharing has prompted various services including FHS to replace it. We propose a comprehensive multi-level characterization of the FHS ...
Tracking of mobile devices through Bluetooth contacts
We investigate if it is possible to reconstruct a mobile phone's mobility using its Bluetooth contacts with other mobile devices, some of which are equipped with GPS receivers. Our data mining analysis, based on two different data sets, shows that in ...
Multipath transport protocol for heterogeneous multi-homing networks
We present a new multipath transport protocol - Heterogeneous Multipath Transport Protocol (HMTP), powered by fountain codes to improve throughput performance and path utilization of heterogeneous multi-homing networks. HMTP solves the receive buffer ...
Reducing TIV interference in network coordinate systems
The network coordinate (NC) systems, which are scalable in estimating the latencies between network hosts, are significantly limited by the Triangle Inequality Violations (TIVs). Previously, two-layer Vivaldi systems like Pharos were proposed to remedy ...
Towards a nation-centric understanding of the internet
Data communication in the Internet is based on the borderless interplay of Autonomous Systems (ASes). An AS abstracts one or multiple IP networks, which may be globally distributed, but is owned by an organization located in a country. Current research ...
Experience level agreements in wireless metropolitan area sharing networks
Nowadays, mobile wireless users are in constant demand of connectivity.
Satisfying the connectivity requirements of the users requires a large amount of Access Points (APs) in order to enlarge the wireless service coverage. Wireless Metropolitan Area ...
Power scaling in network devices
The largest part of routers and switches, today deployed in production networks, has very limited energy saving capabilities, and substantially requires the same amount of energy both when working at full speed or when being idle. In order to ...
Robust traffic anomaly detection with principal component pursuit
Principal component analysis (PCA) is a statistical technique that has been used for data analysis and dimensionality reduction. It was introduced as a network traffic anomaly detection technique firstly in [1]. Since then, a lot of research attention ...
Inferring router statistics with IP timestamps
This paper describes our initial experiences with using the IP timestamp option to infer router statistics such as traffic shape and CPU load. By deducing this information through the use of an IP option, we can gather these statistics without ...
Exploring potential vulnerabilities in data center network
In this paper, we study the potential security issues in data center networks (DCN). We focus on TCP, and propose a synchronized denial of service (SDoS) attack model. In SDoS, malicious tenants may employ multiple virtual machines (VM) as attackers and ...
CommonCode: a code reuse platform for co-simulation and experimentation
Experimentation of a wireless network protocol over the air is of significant interest. However it is rarely performed compared to the simulation because of the difficulties in coding and debugging as well as scalability and repeatability. CommonCode is ...
An interactive visualization framework for next generation networks
Next-Generation Internet applications demand inherent flexibility and programmability from the underlying network. OpenFlow-based substrate, as a potential solution, provides the required support to enable network innovations by separating the ...
A framework for nation-centric classification and observation of the internet
The Internet has matured to a mission-critical infrastructure, and recently attracted much attention at political and legal levels in many countries. Civil actions regarding the Internet infrastructure require a thorough understanding of the national ...
Have your cake and eat it too!: enabling frequency diversity through opportunism
The broadcast nature of wireless networks is both a boon and a bane. On the one hand, multiple receivers may overhear a single transmission on the same channel at no additional cost above a point-to-point transmission; this property has been exploited ...
Towards joint routing and spread-spectrum channelization in cognitive ad hoc networks
We consider a spread-spectrum channelization based secondary network that operates cognitively to coexist with primary users. A new framework for cross-layer design that incorporates adaptation between spectrum-spreading channelization and routing is ...
Understanding the impact of internet exchange points on internet topology and routing performance
The growth of Internet eXchange Points (IXPs) as an important component in the Internet Autonomous System (AS) level topology has led to the need for a detailed evaluation of their effect on Internet topology evolution and inter-domain packet routing. ...
On the interaction between ISP revenue sharing and network neutrality
Flows typically pass through multiple networks owned and managed by different ISPs (Internet Service Providers). Users pay usage fee to the traversed networks, and each ISP typically applies different charging rules, depending on their own economic ...
Spectrum handoff strategies for multiple channels cognitive radio network
This paper proposes a new spectrum handoff approach for multiple channels cognitive radio networks to support delay sensitive applications such as VoIP. The delay probability is estimated to determine whether and how to perform the handoff operation. ...
The peer-to-peer trace archive: design and comparative trace analysis
Peer-to-Peer (P2P) systems have gained a phenomenal popularity in the past few years; BitTorrent serves daily tens of millions of people and generates an important fraction of the Internet traffic. Measurement data collected from real P2P systems are ...
Prefetching Bloom filters to control flooding in content-centric networks
We address an issue relevant to Content-Centric Networks, in which content is discovered by flooding a request over the entire network. In our design, the collection of objects resolvable by a router is represented using Bloom filters. In response to ...
NetQuery: a knowledge plane for reasoning about network properties
Depending on their configuration, administration, and provisioning, networks provide drastically different features. For instance, some networks provide little failure resilience while others provision failover capacity and deploy middleboxes to protect ...
Understanding data-center driven content distribution
Cloud services are radically changing the way we access the information from the Internet and how the "digital goods" are delivered to users. To enable such services, large scale data centers are deployed at various geographical locations, and the ...
Index Terms
- Proceedings of the ACM CoNEXT Student Workshop
Recommendations
ACM CoNEXT 2016 Student Workshop
CoNEXT '16: Proceedings of the 12th International on Conference on emerging Networking EXperiments and TechnologiesThe ACM CoNEXT 2016 Student Workshop is held in Irvine, California, USA on December 12, 2016 and co-located with the ACM 12th International Conference on emerging Networking Experiments and Technologies (CoNEXT 2016). The main objective of the workshop ...
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
CoNEXT '22 | 151 | 28 | 19% |
CoNEXT '19 Companion | 52 | 34 | 65% |
CoNEXT '16 | 160 | 30 | 19% |
CoNEXT '14 | 133 | 27 | 20% |
CoNEXT Student Workshop '14 | 34 | 17 | 50% |
CoNEXT '13 | 226 | 44 | 19% |
CoNEXT Student Workhop '13 | 33 | 18 | 55% |
Overall | 789 | 198 | 25% |