Program
All papers in one PDF!
- Forward by Eddie Kohler and Greg Minshall
- From the reviews
Wednesday 11/29/2006
- 8–9am: Breakfast
- 9–10:30am: Routing Trust (Session Chair: Eddie Kohler)
- (R)Evolutionary Bootstrapping of a Global PKI for Securing BGP Yih-Chun Hu (UIUC), David McGrew (Cisco Systems), Adrian Perrig (CMU), Brian Weis (Cisco Systems), and Dan Wendlandt (CMU)
- Don't Secure Routing Protocols, Secure Data Delivery Dan Wendlandt (CMU), Ioannis Avramopoulos (Princeton), David G. Andersen (CMU), and Jennifer Rexford (Princeton)
- A Technical Approach to Net Neutrality Xiaowei Yang, Gene Tsudik, and Xin Liu (UC Irvine)
- 10:30am–11am: Coffee break
- 11am–12:30pm: Clouds To Dirt (Session Chair: Sylvia Ratnasamy)
- An Axiomatic Basis for Communication Martin Karsten and S. Keshav (University of Waterloo) and Sanjiva Prasad (IIT Delhi)
- Protocol Design Beyond Graph-Based Models Thomas Moscibroda (Microsoft Research) and Roger Wattenhofer and Yves Weber (ETH Zurich)
- Some Implications of Low Power Wireless to IP Networking Kannan Srinivasan (Stanford), Prabal Dutta and Arsalan Tavakoli (UC Berkeley), and Philip Levis (Stanford)
- 12:30–2pm: Lunch
- 2–3:30pm: The Masses (Session Chair: John Wroclawski)
- Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications Andrew Parker, Sasank Reddy, Thomas Schmid, and Kevin Chang (UCLA), Ganeriwal Saurabh (Google), Mani Srivastava, Mark Hansen, Jeff Burke, and Deborah Estrin (UCLA), and Mark Allman and Vern Paxson (ICSI)
- Rethinking Wireless in the Developing World Lakshminarayanan Subramanian (Intel Research Berkeley & NYU), Sonesh Surana, Rabin Patra, Sergiu Nedevschi, Melissa Ho, and Eric Brewer (UC Berkeley), and Anmol Sheth (University of Colorado, Boulder)
- Service Portability Sumeet Singh (Cisco Systems), Scott Shenker (UC Berkeley), and George Varghese (UCSD)
- 3:30–4pm: Coffee and Cookie break
- 4–5:30pm: The Contrarians (Session Chair: Ratul Mahajan)
- The End of Internet Architecture Timothy Roscoe (Intel Research Berkeley)
- Decongestion Control Barath Raghavan and Alex C. Snoeren (UCSD)
- A Simple Approach to DNS DoS Defense Hitesh Ballani and Paul Francis (Cornell)
- 5:30–7pm: Reception
Thursday 11/30/2006
- 8–9am: Breakfast
- 9–10:30am: Anti/Social (Session Chair: Rebecca Isaacs)
- SPACE: Secure Protocol for Address Book based Connection Establishment
Ganesh Ananthanarayanan (Microsoft Research India), Ramarathnam Venkatesan (Microsoft Research India and Redmond), and Prasad Naldurg, Sean Blagsvedt, and Adithya Hemakumar (Microsoft Research India)
- Exploiting Social Networks for Internet Search
Alan Mislove (MPI-SWS and Rice University) and Krishna P. Gummadi and Peter Druschel (MPI-SWS)
- Free Riding in BitTorrent is Cheap
Thomas Locher (ETH Zurich), Patrick Moor (Google), and Stefan Schmid and Roger Wattenhofer (ETH Zurich)
- 10:30–11am: Coffee break
- 11am–12:30pm: Dependence (Session Chair: Vivek Pai)
- Capturing Complexity in Networked Systems Design: The Case for Improved Metrics
Sylvia Ratnasamy (Intel Research Berkeley)
- Discovering Dependencies for Network Management
Paramvir Bahl, Paul Barham, Richard Black, Ranveer Chandra, Moises Goldszmidt, Rebecca Isaacs, Srikanth Kandula, Lun Li, John MacCormick, David A. Maltz, Richard Mortier, Mike Wawrzoniak, and Ming Zhang (Microsoft Research)
- Flexlab: A Realistic, Controlled, and Friendly Environment for Evaluating Networked Systems
Jonathon Duerig, Robert Ricci, Junxing Zhang, Daniel Gebhardt, Sneha Kasera, and Jay Lepreau (University of Utah)
- 12:30–2pm: Lunch
- 2–3pm: Money (Session Chair: Xiaowei Yang)
- Interconnection Discrimination: A Two-Sided Markets Perspective
Peyman Faratin and Tom Wilkening (MIT)
- Achieving Good End-to-End Service Using Bill-Pay
Cristian Estan, Aditya Akella, and Suman Banerjee (University of Wisconsin, Madison)
- 3–3:30pm: Coffee and Cookie break
- 3:30–5pm: Information Theories (Session Chair: Cristian Estan)
- Fighting Coordinated Attackers with Cross-Organizational Information Sharing
Mark Allman (ICSI), Ethan Blanton (Purdue), Vern Paxson (ICSI & Lawrence Berkeley National Labs), and Scott Shenker (ICSI & UC Berkeley)
- Black Box Anomaly Detection: Is It Utopian?
Shobha Venkataraman, Juan Caballero, Dawn Song (CMU), and Avrim Blum (CMU) and Jennifer Yates (AT&T Labs—Research)
- Glavlit: Preventing Exfiltration at Wire Speed
Nabil Schear, Carmelo Kintana, Qing Zhang, and Amin Vahdat (UCSD)
- SPACE: Secure Protocol for Address Book based Connection Establishment Ganesh Ananthanarayanan (Microsoft Research India), Ramarathnam Venkatesan (Microsoft Research India and Redmond), and Prasad Naldurg, Sean Blagsvedt, and Adithya Hemakumar (Microsoft Research India)
- Exploiting Social Networks for Internet Search Alan Mislove (MPI-SWS and Rice University) and Krishna P. Gummadi and Peter Druschel (MPI-SWS)
- Free Riding in BitTorrent is Cheap Thomas Locher (ETH Zurich), Patrick Moor (Google), and Stefan Schmid and Roger Wattenhofer (ETH Zurich)
- Capturing Complexity in Networked Systems Design: The Case for Improved Metrics Sylvia Ratnasamy (Intel Research Berkeley)
- Discovering Dependencies for Network Management Paramvir Bahl, Paul Barham, Richard Black, Ranveer Chandra, Moises Goldszmidt, Rebecca Isaacs, Srikanth Kandula, Lun Li, John MacCormick, David A. Maltz, Richard Mortier, Mike Wawrzoniak, and Ming Zhang (Microsoft Research)
- Flexlab: A Realistic, Controlled, and Friendly Environment for Evaluating Networked Systems Jonathon Duerig, Robert Ricci, Junxing Zhang, Daniel Gebhardt, Sneha Kasera, and Jay Lepreau (University of Utah)
- Interconnection Discrimination: A Two-Sided Markets Perspective Peyman Faratin and Tom Wilkening (MIT)
- Achieving Good End-to-End Service Using Bill-Pay Cristian Estan, Aditya Akella, and Suman Banerjee (University of Wisconsin, Madison)
- Fighting Coordinated Attackers with Cross-Organizational Information Sharing Mark Allman (ICSI), Ethan Blanton (Purdue), Vern Paxson (ICSI & Lawrence Berkeley National Labs), and Scott Shenker (ICSI & UC Berkeley)
- Black Box Anomaly Detection: Is It Utopian? Shobha Venkataraman, Juan Caballero, Dawn Song (CMU), and Avrim Blum (CMU) and Jennifer Yates (AT&T Labs—Research)
- Glavlit: Preventing Exfiltration at Wire Speed Nabil Schear, Carmelo Kintana, Qing Zhang, and Amin Vahdat (UCSD)