| Tues, Aug. 16, 2011 |
| Session 1 |
| Automatic Inference of Movements from Contact Histories |
| Pengcheng Wang, Zhaoyu Gao, Xinhui Xu, Yujiao Zhou, Haojin Zhu, Kenny Q. Zhu |
| Towards Fully Distributed N-Tuple Store |
| Yan Shvartzshnaider, Maximilian Ott |
| ASAP: A Low-Latency Transport Layer |
| Qingxi Li, Wenxuan Zhou, Matthew Caesar, P. Brighten Godfrey |
| What Can Free Money Tell Us on the Virtual Black Market? |
| Kyungmoon Woo, Hyukmin Kwon, Hyun-chul Kim, Chong-kwon Kim, Huy Kang Kim |
| LoKI: Location-based PKI for Social Networks |
| Randy Baden |
| "Roto-Rooting" your Router: Solution against new potential DoS attacks on modern routers |
| Danai Chasaki |
| Limiting Large-scale Crawls of Social Networking Sites |
| Mainack Mondal, Bimal Viswanath, Allen Clement, Peter Druschel, Krishna P. Gummadi, Alan Mislove, Ansley Post |
| Designing a Testbed for Large-scale Distributed Systems |
| Christof Leng, Max Lehn, Robert Rehner, Alejandro Buchmann |
| Spider: Improving Mobile Networking with Concurrent Wi-Fi Connections |
| Hamed Soroush, Peter Gilbert, Nilanjan Banerjee, Mark D. Corner, Brian N. Levine, Landon Cox |
| Covert Channels in Multiple Access Protocols |
| Seyed Ali Ahmadzadeh, Gordon Agnew |
| Pomelo: Accurate and Decentralized Shortest-path Distance Estimation in Social Graphs |
| Zhuo Chen, Yang Chen, Cong Ding, Beixing Deng, Xing Li |
| Dummy Rate Analysis of Buffer Constrained Chaum Mix |
| Abhishek Mishra, Parv Venkitasubramaniam |
| Weds, Aug. 17, 2011 |
| Session 2 |
| Minimising Cell Transmit Power: Towards Self-organized Resource Allocation in OFDMA Femtocells |
| David Loppez-Perez, Xiaoli Chu, Athanasios V. Vasilakos, Holger Claussen |
| Building Virtual Networks Across Multiple Domains |
| Christoph Werle, Panagiotis Papadimitriou, Ines Houidi, Wajdi Louati, Djamal Zeghlache, Roland Bless, Laurent Mathy |
| Multi-relational Social Networks in a Large-scale MMORPG |
| Seokshin Son, Ah Reum Kang, Hyun-chul Kim, Ted Taekyoung Kwon, Juyong Park, Huy Kang Kim |
| Taming Power Peaks in MapReduce Clusters |
| Nan Zhu, Lei Rao, Xue Liu, Jie Liu, Haibi Guan |
| Towards Scalable and Realistic Node Models for Network Simulators |
| Stein Kristiansen, Thomas Plagemann, Vera Goebel |
| Revisiting Next-hop Selection in Multipath Networks |
| Simon van der Linden, Gregory Detal, Olivier Bonaventure |
| netmap: memory mapped access to network devices |
| Luigi Rizzo, Matteo Landi |
| Detecting and Assessing the Importance of Hybrid IPv4/IPv6 AS Relationships |
| Vasileios Giotsas, Shi Zhou |
| CloudProphet: Towards Application Performance Prediction in Cloud |
| Ang Li, Xuanran Zong, Srikanth Kandula, Xiaowei Yang, Ming Zhang |
| A Novel Approach for Making Energy Efficient PON |
| S.H. Shah Newaz, Angel Cuevas, Gyu Myoung Lee, Noel Crespi, JunKyun Choi |
| On the Efficacy of Fine-Grained Traffic Splitting Protocols in Data Center Networks |
| Advait Dixit, Pawan Prakash, Ramana Rao Kompella |
| Wide-area Routing Dynamics of Malicious Networks |
| Maria Konte, Nick Feamster |