Program


Wednesday, November 9, 2016

07:45 - 08:45Breakfast
08:45 - 09:00Introductions
09:00 - 10:00Session 1 (Alex Snoeren)
Helping the lone operator in the vast frontier
Thomas Pötsch (NYU-AD), Paul Schmitt (UCSB), Jay Chen (NYU-AD), Barath Raghavan (ICSI)
A case for personal virtual networks
David Choffnes (Northeastern University)
Towards comprehensive repositories of opinions
Han Zhang (University of Michigan), Kasra Edalat Nejad (University of Michigan), Amir Rahmati (University of Michigan), Harsha V. Madhyastha (University of Michigan)
10:00 - 11:00Session 2 (Stefano Vissicchio)
A knowledge-based systems approach to reason about networking
Zied Ben Houidi (Nokia Bell Labs)
Automatic synthesis of NF models by program analysis
Wenfei Wu (Hewlett Packard Labs), Ying Zhang (Hewlett Packard Labs), Sujata Banerjee (Hewlett Packard Labs)
Canaries in the network
Danyang Zhuo (University of Washington), Qiao Zhang (University of Washington), Xin Yang (University of Washington), Vincent Liu (University of Pennsylvania)
11:00 - 11:30Coffee Break
11:30 - 12:30Session 3 (George Porter)
Free Flow: High-Performance Container Networking
Tianlong Yu (CMU), Shadi Abdollahian Noghabi (UIUC), Shachar Raindel (Microsoft Azure), Hongqiang Liu (MSR), Jitu Padhye (MSR), Vyas Sekar (CMU)
Resource management with deep reinforcement learning
Hongzi Mao (MIT), Mohammad Alizadeh (MIT), Ishai Menache (Microsoft Research), Srikanth Kandula (Microsoft Research)
Towards a redundancy-aware network stack for data centers
Ali Musa Iftikhar (Tufts University), Fahad Dogar (Tufts University), Ihsan Ayyub Qazi (LUMS)
12:30 - 13:30Lunch
13:30 - 14:30Session 4 (Harsha Madhayastha)
Fat-FREE topologies
Ankit Singla (ETH Zurich)
Flat-tree: A Convertible Data Center Network Architecture from Clos to Random Graph
Yiting Xia (Rice University), T. S. Eugene Ng (Rice University)
P-FatTree: A multi-channel datacenter network topology
William M. Mellette (UC San Diego), Alex C. Snoeren (UC San Diego), George Porter (UC San Diego)
14:30 - 15:15Session 5 (Dina Papagiannaki)
Unlocking credit loop deadlocks
Alex Shpiner (Mellanox Technologies), Eitan Zahavi (Mellanox Technologies), Vladimir Zdornov (Mellanox Technologies), Tal Anker (Mellanox Technologies), Matty Kadosh (Mellanox Technologies)
Deadlocks in datacenter networks: why do they form, and how to avoid them
Shuihai Hu (HKUST), Yibo Zhu (Microsoft), Peng Cheng (Microsoft), Chuanxiong Guo (Microsoft), Kun Tan (Microsoft), Jitendra Padhye (Microsoft), Kai Chen (HKUST)
15:15 - 15:45Coffee Break
15:45 - 16:45Session 6 (Andreas Haeberlen)
Switches are monitors too!: Stateful property monitoring as a switch design criterion
Tim Nelson (Brown University), Nicholas DeMarinis (Brown University), Rodrigo Fonseca (Brown University), Shriram Krishnamurthi (Brown University)
Traffic monitoring as a streaming analytics problem
Arpit Gupta (Princeton University), Rüdiger Birkner (ETH Zürich), Marco Canini (KAUST), Nick Feamster (Princeton University), Chris Mac-Stoker (Niksun Inc.), Walter Willinger (Niksun Inc.)
Mille-Feuille: Putting ISP traffic under the scalpel
Olivier Tilmans (Université Catholique de Louvain), Tobias Bühler (ETH Zürich), Stefano Vissicchio (Université Catholique de Louvain), Laurent Vanbever (ETH Zürich)
18:00 - 22:00Reception (High Museum, 1280 Peachtree Street, N.E., Atlanta, GA 30309)


Thursday, November 10, 2016

07:45 - 09:00Breakfast
09:00 - 10:00Session 7 (Dave Choffnes)
Independent auditing of online display advertising campaigns
Patricia Callejo (IMDEA Networks and Universidad Carlos III de Madrid), Rubén Cuevas (Universidad Carlos III de Madrid), Ángel Cuevas (Universidad Carlos III de Madrid), Mikko Kotila (Botlab)
The impact of brokers on the future of content delivery
Matthew K. Mukerjee (Carnegie Mellon University), Ilker Nadi Bozkurt (Duke University), Bruce Maggs (Duke University / Akamai Technologies), Srinivasan Seshan (Carnegie Mellon University), Hui Zhang (Conviva Inc.)
Rethinking cloud service marketplaces
Zhe Wu (University of Michigan), Harsha V. Madhyastha (University of Michigan)
10:00 - 11:00Session 8 (Jitu Padhye)
Exploiting multipath congestion control for fun and profit
Matei Popovici (University Politehnica of Bucharest), Costin Raiciu (University Politehnica of Bucharest)
Rack-level congestion control
Danyang Zhuo (University of Washington), Qiao Zhang (University of Washington), Thomas Anderson (University of Washington), Arvind Krishnamurthy (University of Washington), Vincent Liu (University of Pennsylvania)
CLOVE: How I learned to stop worrying about the core and love the edge
Naga Katta (Princeton University), Aditi Ghag (VMWare), Changhoon Kim (Barefoot Networks), Mukesh Hira (VMWare), Isaac Keslassy (VMWare, Technion), Jennifer Rexford (Princeton University)
11:00 - 11:30Coffee Break
11:30 - 12:30Session 9 (Fadel Adib)
Cutting the cord in virtual reality
Omid Abari (MIT), Dinesh Bharadia (MIT), Dina Katabi (MIT)
Millimeter wave communications: from point-to-point links to agile network connections
Omid Abari (MIT), Haitham Hassanieh (UIUC), Michael Rodriguez (MIT), Dina Katabi (MIT)
Trimming the smartphone network stack
Yanzi Zhu (UC Santa Barbara), Yibo Zhu (UC Santa Barbara), Ana Nika (UC Santa Barbara), Ben Y. Zhao (UC Santa Barbara), Haitao Zheng (UC Santa Barbara)
12:30 - 1:30Lunch
13:30 - 14:15Session 10 (Shachar Raindel)
PASTE: Network Stacks must Integrate with NVMM Abstractions
Michio Honda (NetApp), Lars Eggert (NetApp), Douglas Santry (NetApp)
Co-designing software and hardware for declarative network performance management
Srinivas Narayana (MIT), Anirudh Sivaraman (MIT), Vikram Nathan (MIT), Mohammad Alizadeh (MIT), David Walker (Princeton University), Jennifer Rexford (Princeton University), Vimalkumar Jeyakumar (Cisco Tetration Analytics), Changhoon Kim (Barefoot Networks)
14:15 - 15:00Session 11 (Bryan Ford)
Dispersing asymmetric DDoS attacks with splitstack
Ang Chen (University of Pennsylvania), Akshay Sriraman (University of Pennsylvania), Tavish Vaidya (Georgetown University), Yuankai Zhang (Georgetown University), Andreas Haeberlen (University of Pennsylvania), Boon Thau Loo (University of Pennsylvania), Linh Thi Xuan Phan (University of Pennsylvania), Micah Sherr (Georgetown University), Clay Shields (Georgetown University), Wenchao Zhou (Georgetown University)
The Internet Blockchain: A distributed, tamper-resistant transaction framework for the Internet
Adiseshu Hari (Nokia Bell Labs), T. V. Lakshman (Nokia Bell Labs)

Anti-Harassment Policy

The open exchange of ideas and the freedom of thought and expression are central to ACM’s aims and goals. These require an environment that recognizes the inherent worth of every person and group, that fosters dignity, understanding, and mutual respect, and that embraces diversity. For these reasons, ACM is dedicated to providing a harassment-free experience for participants at our events and in our programs.

Harassment is unwelcome or hostile behavior, including speech that intimidates, creates discomfort, or interferes with a person's participation or opportunity for participation, in a conference, event or program. Harassment in any form, including but not limited to harassment based on alienage or citizenship, age, color, creed, disability, marital status, military status, national origin, pregnancy, childbirth- and pregnancy-related medical conditions, race, religion, sex, gender, veteran status, sexual orientation or any other status protected by laws in which the conference or program is being held, will not be tolerated. Harassment includes the use of abusive or degrading language, intimidation, stalking, harassing photography or recording, inappropriate physical contact, sexual imagery and unwelcome sexual attention. A response that the participant was “just joking,” or “teasing,” or being “playful,” will not be accepted.

Individuals violating these standards may be sanctioned or excluded from further participation at the discretion of the organizers or responsible committee.

If you believe you have been harassed or notice that someone else is being harassed, or have any other concerns, you are encouraged to report the incident in confidence to either of the conference General Chair (Ellen Zegura the SIGCOMM Chair (S. Keshav), or to the SIGCOMM Vice-Chair (Renata Teixeira).