default search action
11th NSDI 2014: Seattle, WA, USA
- Ratul Mahajan, Ion Stoica:
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2014, Seattle, WA, USA, April 2-4, 2014. USENIX Association 2014, ISBN 978-1-931971-09-6 - He Liu, Feng Lu, Alex Forencich, Rishi Kapoor, Malveeka Tewari, Geoffrey M. Voelker, George Papen, Alex C. Snoeren, George Porter:
Circuit Switching Under the Radar with REACToR. 1-15 - Peng Cheng, Fengyuan Ren, Ran Shu, Chuang Lin:
Catch the Whole Lot in an Action: Rapid Precise Packet Loss Notification in Data Center. 17-28 - Ankit Singla, Philip Brighten Godfrey, Alexandra Kolla:
High Throughput Data Center Topology Design. 29-41 - Ranjita Bhagwan, Rahul Kumar, Ramachandran Ramjee, George Varghese, Surjyakanta Mohapatra, Hemanth Manoharan, Piyush Shah:
Adtributor: Revenue Debugging in Advertising Systems. 43-55 - Bin Liu, Suman Nath, Ramesh Govindan, Jie Liu:
DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps. 57-70 - Nikhil Handigol, Brandon Heller, Vimalkumar Jeyakumar, David Mazières, Nick McKeown:
I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks. 71-85 - Hongyi Zeng, Shidong Zhang, Fei Ye, Vimalkumar Jeyakumar, Mickey Ju, Junda Liu, Nick McKeown, Amin Vahdat:
Libra: Divide and Conquer to Verify Forwarding Tables in Huge Networks. 87-99 - Mihai Dobrescu, Katerina J. Argyraki:
Software Dataplane Verification. 101-114 - Yanyan Zhuang, Eleni Gessiou, Steven Portzer, Fraida Fund, Monzur Muhammad, Ivan Beschastnikh, Justin Cappos:
NetCheck: Network Diagnoses from Blackbox Traces. 115-128 - Yang Wang, Manos Kapritsos, Lara Schmidt, Lorenzo Alvisi, Mike Dahlin:
Exalt: Empowering Researchers to Evaluate Large-Scale Storage Systems. 129-141 - Supriyo Chakraborty, Chenguang Shen, Kasturi Rangan Raghavan, Yasser Shoukry, Matt Millar, Mani B. Srivastava:
ipShield: A Framework For Enforcing Context-Aware Privacy. 143-156 - Raluca Ada Popa, Emily Stark, Steven Valdez, Jonas Helfer, Nickolai Zeldovich, Hari Balakrishnan:
Building Web Applications on Top of Encrypted Data Using Mylar. 157-172 - Ki Suh Lee, Han Wang, Hakim Weatherspoon:
PHY Covert Channels: Can you see the Idles? 173-185 - Chen Chen, Himanshu Raj, Stefan Saroiu, Alec Wolman:
cTPM: A Cloud TPM for Cross-Device Trusted Applications. 187-201 - Teemu Koponen, Keith Amidon, Peter Balland, Martín Casado, Anupam Chanda, Bryan Fulton, Igor Ganichev, Jesse Gross, Paul Ingram, Ethan J. Jackson, Andrew Lambeth, Romain Lenglet, Shih-Hao Li, Amar Padmanabhan, Justin Pettit, Ben Pfaff, Rajiv Ramanathan, Scott Shenker, Alan Shieh, Jeremy Stribling, Pankaj Thakkar, Dan Wendlandt, Alexander Yip, Ronghua Zhang:
Network Virtualization in Multi-tenant Datacenters. 203-216 - Kevin Atkinson, Gary Wong, Robert Ricci:
Operational Experiences with Disk Imaging in a Multi-Tenant Datacenter. 217-228 - Daiyuu Nobori, Yasushi Shinjo:
VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls. 229-241 - Trinabh Gupta, Rayman Preet Singh, Amar Phanishayee, Jaeyeon Jung, Ratul Mahajan:
Bolt: Data Management for Connected Homes. 243-256 - James W. Mickens, Edmund B. Nightingale, Jeremy Elson, Darren Gehring, Bin Fan, Asim Kadav, Vijay Chidambaram, Osama Khan, Krishna Nareddy:
Blizzard: Fast, Cloud-scale Block Storage for Cloud-oblivious Applications. 257-273 - Ariel Rabkin, Matvey Arye, Siddhartha Sen, Vivek S. Pai, Michael J. Freedman:
Aggregation and Degradation in JetStream: Streaming Analytics in the Wide Area. 275-288 - Ganesh Ananthanarayanan, Michael Chien-Chun Hung, Xiaoqi Ren, Ion Stoica, Adam Wierman, Minlan Yu:
GRASS: Trimming Stragglers in Approximation Analytics. 289-302 - Bryce Kellogg, Vamsi Talla, Shyamnath Gollakota:
Bringing Gesture Recognition to All Devices. 303-316 - Fadel Adib, Zachary Kabelac, Dina Katabi, Robert C. Miller:
3D Tracking via Body Radio Reflections. 317-329 - Liqun Li, Pan Hu, Chunyi Peng, Guobin Shen, Feng Zhao:
Epsilon: A Visible Light Based Positioning System. 331-343 - Pengyu Zhang, Deepak Ganesan:
Enabling Bit-by-Bit Backscatter Communication in Severe Energy Harvesting Environments. 345-357 - Dinesh Bharadia, Sachin Katti:
Full Duplex MIMO Radios. 359-372 - Radhika Mittal, Justine Sherry, Sylvia Ratnasamy, Scott Shenker:
Recursively Cautious Congestion Control. 373-385 - Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy, David Wetherall:
How Speedy is SPDY? 387-399 - Aleksandar Dragojevic, Dushyanth Narayanan, Miguel Castro, Orion Hodson:
FaRM: Fast Remote Memory. 401-414 - Bryan Kate, Eddie Kohler, Michael S. Kester, Neha Narula, Yandong Mao, Robert Tappan Morris:
Easy Freshness with Pequod Cache Joins. 415-428 - Hyeontaek Lim, Dongsu Han, David G. Andersen, Michael Kaminsky:
MICA: A Holistic Approach to Fast In-Memory Key-Value Storage. 429-444 - Jinho Hwang, K. K. Ramakrishnan, Timothy Wood:
NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms. 445-458 - João Martins, Mohamed Ahmed, Costin Raiciu, Vladimir Andrei Olteanu, Michio Honda, Roberto Bifulco, Felipe Huici:
ClickOS and the Art of Network Function Virtualization. 459-473 - Sivasankar Radhakrishnan, Yilong Geng, Vimalkumar Jeyakumar, Abdul Kabbani, George Porter, Amin Vahdat:
SENIC: Scalable NIC for End-Host Rate Limiting. 475-488 - Eunyoung Jeong, Shinae Woo, Muhammad Asim Jamshed, Haewon Jeong, Sunghwan Ihm, Dongsu Han, KyoungSoo Park:
mTCP: a Highly Scalable User-level TCP Stack for Multicore Systems. 489-502 - Jed Liu, Tom Magrino, Owen Arden, Michael D. George, Andrew C. Myers:
Warranties for Faster Strong Consistency. 503-517 - Tim Nelson, Andrew D. Ferguson, Michael J. G. Scheer, Shriram Krishnamurthi:
Tierless Programming and Reasoning for Software-Defined Networks. 519-531 - Seyed Kaveh Fayazbakhsh, Luis Chiang, Vyas Sekar, Minlan Yu, Jeffrey C. Mogul:
Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags. 543-546
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.