Tues, Aug. 16, 2011 |
Session 1 |
Automatic Inference of Movements from Contact Histories |
Pengcheng Wang, Zhaoyu Gao, Xinhui Xu, Yujiao Zhou, Haojin Zhu, Kenny Q. Zhu |
Towards Fully Distributed N-Tuple Store |
Yan Shvartzshnaider, Maximilian Ott |
ASAP: A Low-Latency Transport Layer |
Qingxi Li, Wenxuan Zhou, Matthew Caesar, P. Brighten Godfrey |
What Can Free Money Tell Us on the Virtual Black Market? |
Kyungmoon Woo, Hyukmin Kwon, Hyun-chul Kim, Chong-kwon Kim, Huy Kang Kim |
LoKI: Location-based PKI for Social Networks |
Randy Baden |
"Roto-Rooting" your Router: Solution against new potential DoS attacks on modern routers |
Danai Chasaki |
Limiting Large-scale Crawls of Social Networking Sites |
Mainack Mondal, Bimal Viswanath, Allen Clement, Peter Druschel, Krishna P. Gummadi, Alan Mislove, Ansley Post |
Designing a Testbed for Large-scale Distributed Systems |
Christof Leng, Max Lehn, Robert Rehner, Alejandro Buchmann |
Spider: Improving Mobile Networking with Concurrent Wi-Fi Connections |
Hamed Soroush, Peter Gilbert, Nilanjan Banerjee, Mark D. Corner, Brian N. Levine, Landon Cox |
Covert Channels in Multiple Access Protocols |
Seyed Ali Ahmadzadeh, Gordon Agnew |
Pomelo: Accurate and Decentralized Shortest-path Distance Estimation in Social Graphs |
Zhuo Chen, Yang Chen, Cong Ding, Beixing Deng, Xing Li |
Dummy Rate Analysis of Buffer Constrained Chaum Mix |
Abhishek Mishra, Parv Venkitasubramaniam |
Weds, Aug. 17, 2011 |
Session 2 |
Minimising Cell Transmit Power: Towards Self-organized Resource Allocation in OFDMA Femtocells |
David Loppez-Perez, Xiaoli Chu, Athanasios V. Vasilakos, Holger Claussen |
Building Virtual Networks Across Multiple Domains |
Christoph Werle, Panagiotis Papadimitriou, Ines Houidi, Wajdi Louati, Djamal Zeghlache, Roland Bless, Laurent Mathy |
Multi-relational Social Networks in a Large-scale MMORPG |
Seokshin Son, Ah Reum Kang, Hyun-chul Kim, Ted Taekyoung Kwon, Juyong Park, Huy Kang Kim |
Taming Power Peaks in MapReduce Clusters |
Nan Zhu, Lei Rao, Xue Liu, Jie Liu, Haibi Guan |
Towards Scalable and Realistic Node Models for Network Simulators |
Stein Kristiansen, Thomas Plagemann, Vera Goebel |
Revisiting Next-hop Selection in Multipath Networks |
Simon van der Linden, Gregory Detal, Olivier Bonaventure |
netmap: memory mapped access to network devices |
Luigi Rizzo, Matteo Landi |
Detecting and Assessing the Importance of Hybrid IPv4/IPv6 AS Relationships |
Vasileios Giotsas, Shi Zhou |
CloudProphet: Towards Application Performance Prediction in Cloud |
Ang Li, Xuanran Zong, Srikanth Kandula, Xiaowei Yang, Ming Zhang |
A Novel Approach for Making Energy Efficient PON |
S.H. Shah Newaz, Angel Cuevas, Gyu Myoung Lee, Noel Crespi, JunKyun Choi |
On the Efficacy of Fine-Grained Traffic Splitting Protocols in Data Center Networks |
Advait Dixit, Pawan Prakash, Ramana Rao Kompella |
Wide-area Routing Dynamics of Malicious Networks |
Maria Konte, Nick Feamster |