Wednesday,
October 24, 2007
· I Tube, You
Tube, Everybody Tubes: Analyzing the World's Largest User Generated Content
Video System,
Meeyoung Cha, Telefonica Research, Barcelona; Haewoon Kwak, KAIST; Pablo
Rodriguez, Telefonica Research, Barcelona; Yong-Yeol Ahn, KAIST; Sue Moon,
KAIST (30 minutes) Best Paper Award
· YouTube
Traffic Characterization: A View From the Edge,
Phillipa Gill, University of Calgary; Martin Arlitt, University of Calgary and
HP Labs; Zongpeng Li, University of Calgary; Anirban Mahanti, Indian Institute
of Technology, Delhi (30 minutes)
· Measurement
and Analysis of Online Social Networks,
Alan Mislove, Max Planck Institute for Software Systems and Rice University;
Massimiliano Marcon, Max Planck Institute for Software Systems; Krishna P.
Gummadi, Max Planck Institute for Software Systems; Peter Druschel, Max Planck
Institute for Software Systems; Bobby Bhattacharjee, University of Maryland (30
minutes)
· Characterizing
Residential Broadband Networks,
Marcel Dischinger, MPI for Software Systems; Andreas Haeberlen, MPI for
Software Systems and Rice University; Krishna P. Gummadi, MPI for Software
Systems; Stefan Saroiu, University of Toronto (30 minutes)
· Understanding
Passive and Active Service Discovery,
Genevieve Bartlett, USC/Information Sciences Institute; John Heidemann,
USC/Information Sciences Institute; Christos Papadopoulos,
· UsageBased
DHCP Lease Time Optimization,
Manas Khadilkar, Georgia Tech; Nick Feamster, Georgia Tech; Matt Sanders,
Georgia Tech; Russ Clark, Georgia Tech (15 minutes)
· A Brief
History of Scanning,
Mark Allman, ICSI; Vern Paxson, ICSI and LBNL; Jeff Terrell, UNC-Chapel Hill
(15 minutes)
· Cryptographic
Strength of SSL/TLS Servers: Current and Recent Practices,
Homin K. Lee, Columbia University; Tal Malkin, Columbia University; Erich
Nahum, IBM T.J. Watson Research Ctr (30 minutes)
· Using
Uncleanliness to Predict Future Botnet Addresses,
M. Patrick Collins, CERT Network Situational Awareness Group; Timothy J.
Shimeall, CERT Network Situational Awareness Group; Sidney Faber, CERT Network
Situational Awareness Group; Jeff Janies, CERT Network Situational Awareness
Group; Rhiannon Weaver, CERT Network Situational Awareness Group; Markus De
Shon, CERT Network Situational Awareness Group (30 minutes)
· Challenging
the Supremacy of Traffic Matrices in Anomaly Detection,
Augustin Soule, Thomson; Fernando Silveira, Thomson; Haakon Ringberg, Princeton
University; Christophe Diot, Thomson (15 minutes)
· Analysis of
Internet Backbone Traffic and Header Anomalies observed,
Wolfgang John, Chalmers University of Technology; Sven Tafvelin, Chalmers
University of Technology (15 minutes)
· A Global View
of KAD,
Moritz Steiner, Institut Eurecom; Taoufik En-Najjary, Institut Eurecom; Ernst
W. Biersack, Institut Eurecom (15 minutes)
· The Web is
Smaller than it Seems,
Craig A. Shue, Indiana University at Bloomington; Andrew J. Kalafut, Indiana
University at Bloomington; Minaxi Gupta, Indiana University at Bloomington (15
minutes)
· Profiling a
Million User DHT,
Jarret Falkner, University of Washington; Michael Piatek, University of
Washington; John P. John, University of Washington; Arvind Krishnamurthy,
University of Washington; Thomas Anderson, University of Washington (15
minutes)
· Issues and
Etiquette Concerning Use of Shared Measurement Data,
Mark Allman, ICSI; Vern Paxson, ICSI and LBNL (15 minutes)
· Legal Issues
Surrounding Monitoring During Network Research (Invited Paper),
Paul Ohm, University of Colorado, Boulder; Douglas Sicker, University of
Colorado, Boulder; Dirk Grunwald, University of Colorado, Boulder (30 minutes)
· Measuring
Load-balanced Paths in the Internet,
Brice Augustin, University Pierre and Marie Curie and CNRS; Timur Friedman,
University Pierre and Marie Curie and CNRS; Renata Teixeira, University Pierre
and Marie Curie and CNRS; (30 minutes)
· Diversity of
Forwarding Paths in Pocket Switched Networks,
Vijay Erramilli, Boston University; Augustin Chaintreau, Thomson Paris; Mark
Crovella, Boston University; Christophe Diot, Thomson Paris (30 minutes)
· Towards
Network Triangle Inequality Violation Aware Distributed Systems,
Guohui Wang, Rice University; Bo Zhang, Rice University; T. S. Eugene Ng, Rice
University (30 minutes)
· NetworkMD:
Topology Inference and Failure Diagnosis in the Last Mile,
Yun Mao, University of Pennsylvania; Hani Jamjoom, IBM T. J. Watson Research;
Shu Tao, IBM T. J. Watson Research; Jonathan M. Smith, University of
Pennsylvania (30 minutes)
· Inferring
Subnets in Router-level Topology Collection Studies,
Mehmet H. Gunes, University of Texas at Dallas; Kamil Sarac, University of
Texas at Dallas (15 minutes)
· Learning
Network Structure from Passive Measurements,
Brian Eriksson, UW-Madison; Paul Barford, UW-Madison; Robert Nowak, UW-Madison;
Mark Crovella, Boston University (15 minutes)
· On the
Impact of Route Monitor Selection,
Ying Zhang, University of Michigan; Zheng Zhang, Purdue University; Z. Morley
Mao, University of Michigan; Y. Charlie Hu, Purdue University; Bruce M. Maggs,
Carnegie Mellon and Akamai Technologies (15 minutes)
· Acyclic
Type-of-Relationship Problems on the Internet: An Experimental Analysis,
Benjamin Hummel, Technische Universität München; Sven Kosub, Technische
Universität München (15 minutes)
· Network Loss
Inference with Second Order Statistics of End-to-End Flows,
Hung X. Nguyen, EPFL; Patrick Thiran, EPFL (30 minutes)
· Compressed
network monitoring for IP and all-optical networks,
Mark Coates,
· Quality-Of-Service
Class Specific Traffic Matrices in IP/MPLS Networks,
Stefan Schnitter, Deutsche Telekom, T-Systems; Franz Hartleb, Deutsche Telekom,
T-Systems; Martin Horneffer, Deutsche Telekom, T-Com (15 minutes)
· Blind Source
Separation Approach to Performance Diagnosis and Dependency Discovery,
Gaurav Chandalia, IBM T.J. Watson Research; Irina Rish, IBM T.J. Watson
Research (15 minutes)
· Algorithms
and Estimators for Accurate Summarization of Internet Traffic,
Edith Cohen, AT&T Labs-Research; Nick Duffield, AT&T Labs-Research;
Haim Kaplan, Tel Aviv University; Carsten Lund, AT&T Labs-Research; Mikkel
Thorup, AT&T Labs-Research (30 minutes)
· A Data
Streaming Algorithm for Estimating Entropies of OD Flows,
Haiquan (Chuck) Zhao, Georgia Inst. of Technology; Ashwin Lall, University of
Rochester; Mitsunori Ogihara, University of Rochester; Oliver Spatscheck,
AT&T Labs-Research; Jia Wang, AT&T Labs-Research; Jun (Jim) Xu, Georgia
Inst. of Technology (30 minutes)
· On Optimal
Probing for Delay and Loss Measurement,
Francois Baccelli, INRIA-ENS, Ecole Normale Superieure; Sridhar Machiraju,
Sprint; Darryl Veitch, University of Melbourne; Jean Bolot, Sprint (30 minutes)
· An Active
Measurement System for Shared Environments,
Joel Sommers,
· Network
Monitoring using Traffic Dispersion Graphs (TDGs),
Marios Iliofotou, UC Riverside; Prashanth Pappu, Rinera Networks; Michalis
Faloutsos, UC Riverside; Michael Mitzenmacher, Harvard University; Sumeet
Singh, Cisco Systems; George Varghese, UC San Diego (15 minutes)
· Understanding
WiFi-based Connectivity from Moving Vehicles,
Ratul Mahajan, Microsoft Research; John Zahorjan, University of Washington;
Brian Zill, Microsoft Research (15 minutes)
· Studying
Wireless Routing Link Metric Dynamics,
Saumitra M. Das, Purdue University; Himabindu Pucha, Purdue University;
Konstantina Papagiannaki, Intel Research, Pittsburgh; Y. Charlie Hu, Purdue
University (15 minutes)
· Understanding
Handoffs in Large IEEE 802.11 Wireless Networks,
Ramya Raghavendra, University of California, Santa Barbara; Elizabeth M.
Belding, University of California, Santa Barbara; Konstantina Papagiannaki,
Intel Research, Pittsburgh; Kevin C. Almeroth, University of California, Santa
Barbara (15 minutes)
· Interference
Map for 802.11 Networks,
Dragos Niculescu, NEC Laboratories America (30 minutes)
· Understanding
the Limitations of Transmit Power Control for Indoor WLANs,
Vivek Shrivastava, University of Wisconsin-Madison; Dheeraj Agrawal, University
of Wisconsin-Madison; Arunesh Mishra, University of Wisconsin-Madison; Suman
Banerjee, University of Wisconsin-Madison; Tamer Nadeem, Siemens Corporate
Research (30 minutes)
· Passive
Online Rogue Access Point Detection Using Sequential Hypothesis Testing with
TCP ACK-Pairs,
Wei Wei, United Technologies Research Center; Kyoungwon Suh, Illinois State
University; Bing Wang, University of Connecticut; Yu Gu, University of
Massachusetts, Amherst; Jim Kurose, University of Massachusetts, Amherst; Don
Towsley, University of Massachusetts, Amherst (30 minutes)