Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1658997acmconferencesBook PagePublication PagesconextConference Proceedingsconference-collections
Co-Next Student Workshop '09: Proceedings of the 5th international student workshop on Emerging networking experiments and technologies
ACM2009 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
Co-NEXT '09: Conference on emerging Networking EXperiments and Technologies Rome Italy 1 December 2009
ISBN:
978-1-60558-751-6
Published:
01 December 2009
Sponsors:
Next Conference
Reflects downloads up to 22 Sep 2024Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the Student Workshop of the 5th ACM International Conference on emerging Networking EXperiments and Technologies -- CoNEXT 2009. Ever since its inception, CoNEXT has put an emphasis on students by organizing a specific workshop in order to provide them with the opportunity to divulge their ongoing research efforts, even if at an early stage. This year's edition continues the successful tradition, with a novelty consisting in the introduction of the option for students to review the submitted papers of their colleagues. Such an initiative was not only meant to let students have a deeper look to other submissions and boost discussion during the face to face meeting in Rome, but also to give the opportunity to exercise with reviewing, which is part of every day professional life of a researcher.

The technical program committee included members from all the continents, proving, once again, the world wide scope of the workshop. The call for papers attracted 48 submissions from Asia, North America, Europe, and New Zealand. The technical program committee accepted 29 papers that cover a variety of topics, including traffic measurements and modeling, wireless networks, security, multimedia, network coding, peer to peer systems, and delay tolerant networks. In addition, the program includes a keynote speech by Prof. Jim Kurose on "10 things I wish my advisor had told me, 2nd Edition".

Skip Table Of Content Section
POSTER SESSION: Poster session 1
poster
Scalable landmark flooding: a scalable routing protocol for WSNs

Wireless sensor networks (WSNs) are about to become a popular and inexpensive tool for all kinds of applications. More advanced applications also need end-to-end routing, which goes beyond the simple data dissemination and collection mechanisms of early ...

poster
An adaptive three-party accounting protocol

Three-party tunnel-based roaming infrastructures may become a future trend to permit mobile users to connect to the Internet when they are not at home. Those solutions takle security issues for both visited networks and mobile users, but require an ...

poster
On the characterization of multi-channel applications

We are assisting to the evolution of new generation applications and services, progressively providing - through a single interface - more interactions among the users and between the users and the network. This is promoting the development of multi-...

poster
Deep diving into BitTorrent locality

Localizing BitTorrent traffic within an ISP in order to avoid excessive and often times unnecessary transit costs has recently received a lot of attention. In this work we attempt to answer yet unanswered questions like "what are the boundaries of win-...

poster
Deterministic, reduced-visibility inter-domain forwarding

Inter-domain forwarding state is growing at a super-linear rate, rendering older routers obsolete and increasing the cost of replacement. A reduction of state will alleviate this problem. In this paper, we outline a new reduced-state inter-domain ...

poster
A spectrum assignment method based on genetic algorithm in WiMAX/WiFi integrated network

Recently, the lack of spectrum resources becomes an important problem for advanced wireless networks. To overcome this problem, dynamic spectrum access receives much attention. In this paper, we propose a spectrum assignment method based on a genetic ...

poster
poster
Improving roamer retention by exposing weak locations in GSM networks

One of the most valuable clients of cellular GSM networks are roaming clients, due to the pricing policy set by network operators. Despite that each operator applies a lot of effort in network signal coverage in order to achieve the best conditions for ...

research-article
An a priori estimator for the delay distribution in global hybrid multicast

Hybrid multicast is regarded a promising technology to overcome the inter-domain deployment problem for group communication. Realistic performance estimators are difficult to obtain due to the diversity of overlay concepts and their complex dependence ...

poster
What level of estimating accuracy does TCP need and can TCP achieve

Accurate and effective estimation of TCP operating point impacts directly on TCP performance, especially in modern high-speed networks. In this paper, we focus on two crucial questions: 1) In order to guarantee the performance and stability of TCP, how ...

poster
Netflow based system for NAT detection

Revealing the misuse of network resources is one of the important fields in the network security, especially for the network administrators. One of them is the use of unauthorized NAT (Network Address Translation) devices (e.g. small office routers or ...

poster
A robust pair-wise rekeying protocol in hierarchical wireless sensor networks

To support secure communications for many applications in wireless sensor networks (WSNs), some strategies have been proposed to develop the pair-wise rekeying protocol. However, most existing schemes suffer the node capture attack. In this paper, we ...

poster
Random key pre-distribution with transitory master key for wireless sensor networks

Many Wireless Sensor Networks (WSNs) employ security schemes based on the symmetric encryption, which requires the establishment and management of cryptographic keys. This paper presents a new key management scheme based on Random Key Pre-Distribution. ...

poster
Investigating the relationship between QoS and QoE in a mixed desktop/handheld gaming setting

Innovative software and system development requires a multi-disciplinary approach where technical, objectively quantifiable Quality of Service aspects are integrated with and correlated to subjective Quality of Experience measures such as usability, ...

POSTER SESSION: Poster session 2
poster
Self-propagating worms in wireless sensor networks

Malicious code is defined as software designed to execute attacks on software systems. This work demonstrates the possibility of executing malware on wireless sensor nodes that are based on the von Neumann architecture. This is achieved by exploiting a ...

poster
Is it me?: understanding the impact of the home network on end-to-end measurements

End users are often curious to verify the performance of their network connection. Mostly, they accomplish this task with end-to-end active measurements. Unfortunately, the home network can affect end-to-end measurement and can lead to erroneous ...

poster
Maximizing streaming quality in heterogeneous overlays through incentives

The upload contribution of peers in a peer-to-peer streaming system depends on their willingness to contribute as well as their physical limitation. Several incentive schemes have been proposed to enforce non-willing peers to cooperate. But we find it ...

poster
Secure interference reporting for dense Wi-Fi deployments

We study the problem of interference detection in dense Wi-Fi deployments, which are a reality in most modern metropolitan areas. Interference among neighbor Wi-Fi cells stems from the anarchic deployment of Wi-Fi access points (APs) and the fact that ...

poster
LT network codes: low complexity network codes

This paper proposes LTNC, a new recoding algorithm to build low complexity network codes. At the core of LTNC is a decentralized version of LT codes that allows the use of fast belief propagation decoding instead of high complexity Gauss reduction used ...

poster
Adding emulation to planetlab nodes

Network testbeds have become very popular to support research on network protocols and distributed applications. When it comes to reproduce network behaviour, testbeds range between two extremes: use a fully emulated network, as in EmuLab, which yields ...

poster
Bloom filters and overlays for routing in pocket switched networks

Pocket Switched Networks (PSN) [3] have become a promising approach for providing communication between scarcely connected human-carried devices. Such devices, e.g. mobile phones or sensor nodes, are exposed to human mobility and can therewith leverage ...

poster
Peer the peers: an overlay id assignment service at internet exchange points

P2P networks enable end users to establish services relying neither on a dedicated infrastructure nor on an ISP deployment of enhanced services at the network layer. Regrettably, overlay traffic is not optimal with respect to native connections and ...

poster
Practical DHT-based location service for wireless mesh networks

Mobility management in Wireless Mesh Networks (WMN) is a hot topic still lacking a final, widely accepted, and deployed solution. The major drawbacks of existing proposals is the fact that they rely on some sort of flooding-based technique and very ...

poster
Relative delay estimator for multipath transport

Due to the dynamic nature of the Internet, the characteristic parameters of network paths are continually changing. The round trip time (RTT) can be used to estimate retransmission timeouts with reasonable accuracy. However, using RTT to evaluate ...

poster
When stochastic rate-delay services meet stochastic network calculus

The delay-sensitive applications has been rapidly growing in recent years, while the current Internet is not well equipped to support such delay-sensitive traffic. The proposed SRD (Stochastic Rate-Delay) services enable a user to choose between a ...

poster
On the utility of rate adaptation for broadcast/multicast media traffic in 802.11 networks

As there is no MAC layer acknowledgment from the receiver for broadcast/multicast transmission in the 802.11 network, using the lowest transmission rate is understandably the safest approach because it minimizes reception error for clients with the ...

poster
Reliable asymmetric path capacity measurement

Existing non-cooperative methods for network capacity measurement are quite restrictive for capacity-asymmetric paths, and their results could be affected by adverse network conditions (e.g., packet delay, packet loss, and packet reordering). In this ...

poster
Behavior rule based intrusion detection
Contributors
  • University of Illinois Urbana-Champaign
  • National Taiwan University
  • Huawei Technologies Co., Ltd.
  1. Proceedings of the 5th international student workshop on Emerging networking experiments and technologies
    Please enable JavaScript to view thecomments powered by Disqus.

    Recommendations

    Acceptance Rates

    Overall Acceptance Rate 198 of 789 submissions, 25%
    YearSubmittedAcceptedRate
    CoNEXT '221512819%
    CoNEXT '19 Companion523465%
    CoNEXT '161603019%
    CoNEXT '141332720%
    CoNEXT Student Workshop '14341750%
    CoNEXT '132264419%
    CoNEXT Student Workhop '13331855%
    Overall78919825%