skip to main content
10.1145/2680821acmconferencesBook PagePublication PagesconextConference Proceedingsconference-collections
CoNEXT Student Workshop '14: Proceedings of the 2014 CoNEXT on Student Workshop
ACM2014 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CoNEXT '14: Conference on emerging Networking Experiments and Technologies Sydney Australia 2 December 2014
ISBN:
978-1-4503-3282-8
Published:
02 December 2014
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 2014 ACM CoNEXT Student Workshop in Sydney, Australia. This year's workshop continues the tradition of being an engaging and interactive forum for graduate students to present their early research results and receive feedback from the research community.

The call for papers attracted 34 submissions from 28 universities, research institutes and industry research labs, across 16 different countries. The submissions spanned all areas of networking research with emphasis on emerging technologies and architectures such as SDN, Big Data, and wearable computing. All the submissions received detailed and high quality reviews from the program committee members who were carefully selected based on their research experience and expertise. The final program consists of 17 papers, including one paper that received the best paper award and will be presented in a special session.

Skip Table Of Content Section
SESSION: Best Paper Session
research-article
Expeditus: Distributed Load Balancing with Global Congestion Information in Data Center Networks

We propose Expeditus, a distributed congestion-aware load balancing mechanism for Clos data center networks. The fundamental challenge in making load balancing congestion-aware is, how to collect real-time (in the order of RTT) congestion information ...

SESSION: Big Data
research-article
Minimizing Transient Congestion during Network Update in Data Centers

Data centers are increasingly relying on software defined networking (SDN) to orchestrate data transmission. To maximize network utilization, the SDN controller needs to frequently update the data plane as the network conditions change. Due to its ...

research-article
A Bandwidth Allocation Scheme to Improve Fairness in Data Center Networks

The development of various Internet technologies has enabled users to connect to the Internet through a wide variety of access networks and communication terminals. This has brought a great demand for cloud computing which allows users to enjoy various ...

research-article
Performance and Fairness Issues in Big Data Transfers

We present performance and fairness analysis of two TCP- based (GridFTP and FDT) and one UDP-based (UDT) big data transfer protocols. We perform long-haul performance experiments using a 10 Gb/s national network, and conduct fairness tests in our 10 Gb/...

research-article
A Novel Strategy for Link Prediction in Social Networks

The problem of link prediction has gained a lot of attention recently from the research community. It can be formalized as, given a snapshot of a social network at time t, can it be predicted which new connections among its members are likely to occur ...

SESSION: Wireless
research-article
Profiling Energy Consumption in a Residential Campus

We present preliminary analysis of energy consumption in a residential academic campus in India. We deployed over 200 smart electric meters across the campus, collecting over 5 million data points every day. The analysis is based on data collected over ...

research-article
Diagnosing Device-Specific Anomalies in Cellular Networks

The ever-increasing number of mobile devices is heavily modifying the traffic observed in cellular networks. From smartphones and tablets to Machine-to-Machine (M2M) devices, the traffic volumes and patterns generated by end-user and M2M applications ...

research-article
Location-Based Adaptation for DASH in Vehicular Environment

In dynamic adaptive streaming over HTTP (DASH), a video file is encoded at different bitrates and segmented into small chunks. Each time, the most appropriate bitrate will be selected for a video chunk based on the network condition observed by ...

research-article
Towards the Era of Wearable Computing?

With over 250 million devices to be sold, wearable devices revenue is forecasted to hit $2 billion by 2018. Wearables are expected to be the next generation of mobile devices. However, before we usher into the era of wearables, there are two key ...

SESSION: Security
research-article
How Interface ID Allocation Mechanisms are Performed in IPv6

IPv6 addresses contain a 64-bit Interface ID (IID) that is allocated by site administrators. A random IID allows them to reduce the effectiveness of IPv6 reconnaissance attacks. In this paper, we look at how IPv6 IIDs are assigned in practice. In ...

research-article
Lightweight Approach to Detect Drive-by Download Attacks Based on File Type Transition

A web-based attack, drive-by download attack, has been posing serious threats to Internet users. There are code analysis based methods and rule-based methods as countermeasures against drive-by download attacks. However, code analysis based methods ...

research-article
On the Intrusiveness of JavaScript on the Web

Various web components and JavaScripts have been used for collecting personal identifiable information resulting in privacy concerns. Although several privacy preserving tools have been proposed to limit online advertising and tracking their use has ...

research-article
Towards Classifying Third-Party Web Services at Scale

Many people are concerned about privacy in the Web. This has resulted in the emergence of various tools and suggestions for blocking tracking services. However, in order to block or analyze tracking services, these services have to be identified first. ...

SESSION: Future Internet
research-article
Model Based Black-Box Testing of SDN Applications

The quality of control plane applications determines reliability of the Software-Defined Networking (SDN). The risk of bugs and challenges for testing actually have been increased due to the programmability of SDN. In this paper, we propose a model ...

research-article
MalwareMonitor: An SDN-based Framework for Securing Large Networks

Large high-speed networks such as in campuses and enterprises teem with malware infections; current solutions are either incapable of coping with the high data rates, or lacking in effective and speedy threat detection and mitigation. This work presents ...

research-article
Building Blocks for an Elastic Mobile Core

The mobile core is currently served by gateways having a convoluted control plane and data plane. We abstract and modularize the key functions of these gateways, and separate the control and data plane in nwEPC, an open source implementation of the ...

research-article
Active Interest Management for Improving Flow Completion Time in Named-Data Networking

Interest aggregation is the primary feature of named-data networking (NDN). The interest aggregation reduces duplicated transmissions for multiple requests on the same data, but can delay loss recovery when data packets are lost. Since retransmitted ...

Contributors
  • University of Colorado Boulder

Recommendations

Acceptance Rates

CoNEXT Student Workshop '14 Paper Acceptance Rate17of34submissions,50%Overall Acceptance Rate198of789submissions,25%
YearSubmittedAcceptedRate
CoNEXT '221512819%
CoNEXT '19 Companion523465%
CoNEXT '161603019%
CoNEXT '141332720%
CoNEXT Student Workshop '14341750%
CoNEXT '132264419%
CoNEXT Student Workhop '13331855%
Overall78919825%