- Sponsor:
- sigcomm
It is our great pleasure to welcome you to the 2014 ACM CoNEXT Student Workshop in Sydney, Australia. This year's workshop continues the tradition of being an engaging and interactive forum for graduate students to present their early research results and receive feedback from the research community.
The call for papers attracted 34 submissions from 28 universities, research institutes and industry research labs, across 16 different countries. The submissions spanned all areas of networking research with emphasis on emerging technologies and architectures such as SDN, Big Data, and wearable computing. All the submissions received detailed and high quality reviews from the program committee members who were carefully selected based on their research experience and expertise. The final program consists of 17 papers, including one paper that received the best paper award and will be presented in a special session.
Proceeding Downloads
Expeditus: Distributed Load Balancing with Global Congestion Information in Data Center Networks
We propose Expeditus, a distributed congestion-aware load balancing mechanism for Clos data center networks. The fundamental challenge in making load balancing congestion-aware is, how to collect real-time (in the order of RTT) congestion information ...
Minimizing Transient Congestion during Network Update in Data Centers
Data centers are increasingly relying on software defined networking (SDN) to orchestrate data transmission. To maximize network utilization, the SDN controller needs to frequently update the data plane as the network conditions change. Due to its ...
A Bandwidth Allocation Scheme to Improve Fairness in Data Center Networks
The development of various Internet technologies has enabled users to connect to the Internet through a wide variety of access networks and communication terminals. This has brought a great demand for cloud computing which allows users to enjoy various ...
Performance and Fairness Issues in Big Data Transfers
We present performance and fairness analysis of two TCP- based (GridFTP and FDT) and one UDP-based (UDT) big data transfer protocols. We perform long-haul performance experiments using a 10 Gb/s national network, and conduct fairness tests in our 10 Gb/...
A Novel Strategy for Link Prediction in Social Networks
The problem of link prediction has gained a lot of attention recently from the research community. It can be formalized as, given a snapshot of a social network at time t, can it be predicted which new connections among its members are likely to occur ...
Profiling Energy Consumption in a Residential Campus
We present preliminary analysis of energy consumption in a residential academic campus in India. We deployed over 200 smart electric meters across the campus, collecting over 5 million data points every day. The analysis is based on data collected over ...
Diagnosing Device-Specific Anomalies in Cellular Networks
The ever-increasing number of mobile devices is heavily modifying the traffic observed in cellular networks. From smartphones and tablets to Machine-to-Machine (M2M) devices, the traffic volumes and patterns generated by end-user and M2M applications ...
Location-Based Adaptation for DASH in Vehicular Environment
In dynamic adaptive streaming over HTTP (DASH), a video file is encoded at different bitrates and segmented into small chunks. Each time, the most appropriate bitrate will be selected for a video chunk based on the network condition observed by ...
Towards the Era of Wearable Computing?
With over 250 million devices to be sold, wearable devices revenue is forecasted to hit $2 billion by 2018. Wearables are expected to be the next generation of mobile devices. However, before we usher into the era of wearables, there are two key ...
How Interface ID Allocation Mechanisms are Performed in IPv6
IPv6 addresses contain a 64-bit Interface ID (IID) that is allocated by site administrators. A random IID allows them to reduce the effectiveness of IPv6 reconnaissance attacks. In this paper, we look at how IPv6 IIDs are assigned in practice. In ...
Lightweight Approach to Detect Drive-by Download Attacks Based on File Type Transition
A web-based attack, drive-by download attack, has been posing serious threats to Internet users. There are code analysis based methods and rule-based methods as countermeasures against drive-by download attacks. However, code analysis based methods ...
On the Intrusiveness of JavaScript on the Web
Various web components and JavaScripts have been used for collecting personal identifiable information resulting in privacy concerns. Although several privacy preserving tools have been proposed to limit online advertising and tracking their use has ...
Towards Classifying Third-Party Web Services at Scale
Many people are concerned about privacy in the Web. This has resulted in the emergence of various tools and suggestions for blocking tracking services. However, in order to block or analyze tracking services, these services have to be identified first. ...
Model Based Black-Box Testing of SDN Applications
The quality of control plane applications determines reliability of the Software-Defined Networking (SDN). The risk of bugs and challenges for testing actually have been increased due to the programmability of SDN. In this paper, we propose a model ...
MalwareMonitor: An SDN-based Framework for Securing Large Networks
Large high-speed networks such as in campuses and enterprises teem with malware infections; current solutions are either incapable of coping with the high data rates, or lacking in effective and speedy threat detection and mitigation. This work presents ...
Building Blocks for an Elastic Mobile Core
The mobile core is currently served by gateways having a convoluted control plane and data plane. We abstract and modularize the key functions of these gateways, and separate the control and data plane in nwEPC, an open source implementation of the ...
Active Interest Management for Improving Flow Completion Time in Named-Data Networking
Interest aggregation is the primary feature of named-data networking (NDN). The interest aggregation reduces duplicated transmissions for multiple requests on the same data, but can delay loss recovery when data packets are lost. Since retransmitted ...
Recommendations
ACM CoNEXT 2016 Student Workshop
CoNEXT '16: Proceedings of the 12th International on Conference on emerging Networking EXperiments and TechnologiesThe ACM CoNEXT 2016 Student Workshop is held in Irvine, California, USA on December 12, 2016 and co-located with the ACM 12th International Conference on emerging Networking Experiments and Technologies (CoNEXT 2016). The main objective of the workshop ...
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
CoNEXT '22 | 151 | 28 | 19% |
CoNEXT '19 Companion | 52 | 34 | 65% |
CoNEXT '16 | 160 | 30 | 19% |
CoNEXT '14 | 133 | 27 | 20% |
CoNEXT Student Workshop '14 | 34 | 17 | 50% |
CoNEXT '13 | 226 | 44 | 19% |
CoNEXT Student Workhop '13 | 33 | 18 | 55% |
Overall | 789 | 198 | 25% |