Program at a Glance

Technical Session 1-A: IoT Networking

Packet delay minimization in multi-hop wireless sensor networks with periodic traffic
Bartłomiej Ostrowski, Michal Pióro and Artur Tomaszewski (Warsaw University of Technology, Poland)
pp. 1-9
Performance Comparison of Messaging Protocols and Serialization Formats
Daniel Persson Proos and Niklas Carlsson (Linköping University, Sweden)
pp. 10-18
IoT Content Object Security with OSCoRE and NDN: A First Experimental Comparison
Cenk Gündogan (Hamburg University of Applied Sciences, Germany); Christian Amsüss (N/A, Austria); Thomas C. Schmidt (Hamburg University of Applied Sciences, Germany); Matthias Wählisch (Freie Universität Berlin, Germany)
pp. 19-27

Technical Session 1-B: User Behavior Modeling

Revealing QoE of Web Users from Encrypted Network Traffic
Antoine Saverimoutou (Orange, France); Alexis Huet and Zied Ben Houidi (Huawei Technologies Co. Ltd, France); Hao Shi (Huawei Technologies Co., Ltd, China); Sheng-Ming Cai (Huawei Technologies Co., Ltd., China); Jinchun Xu (Huawei Technologies Co., Ltd, China); Bertrand Mathieu (Orange Labs, France); Dario Rossi (Telecom ParisTech, France)
pp. 28-36
On the Practical Detection of Hierarchical Heavy Hitters
Jalil Moraney (Technion - Israel Institute of Technology, Israel); Danny Raz (Nokia and Technion, Israel)
pp. 37-45
How Online Social Ties Influence the Epidemic Spreading of a Multiplex Network?
Xianzhe Tang (Fudan University, China); Yuan Zhang (University of Fudan, China); Cong Li and Xiang Li (Fudan University, China)
pp. 46-54

Technical Session 1-C: Service Function Chaining

Virtual Network Functions Placement and Routing Problem: Path formulation
Ahlam Mouaci (University of Paris Dauphine & Orange Labs, France); Ivana Ljubic (ESSEC Business School, France); Eric Gourdin and Nancy Perrot (Orange Labs, France)
pp. 55-63
A Rank-based Mechanism for Service Placement in the Fog
Karima Velasquez, David Perez Abreu, Luis Paquete, Marilia Curado and Edmundo Monteiro (University of Coimbra, Portugal)
pp. 64-72
FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime
Yu Zhou, Jun Bi, Cheng Zhang, Mingwei Xu and Jianping Wu (Tsinghua University, China)
pp. 73-81

Technical Session 2-A: DC Networking

Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing
Stephan Kunne (LRI, Université Paris-Sud, France); Lorenzo Maggi (Nokia Bell Labs, France); Johanne Cohen (LRI-CNRS, France); XU Xinneng (Université Paris Saclay, France)
pp. 82-90
NFV Performance Profiling on Multi-core Servers
Peng Zheng (Xi'an Jiaotong University, China); Wendi Feng (Beijing University of Posts and Telecommunications, China); Arvind Narayanan and Zhi-Li Zhang (University of Minnesota, USA)
pp. 91-99
On Max-Min Fairness of Completion Times for Multi-Task Job Scheduling
Mehrnoosh Shafiee and Javad Ghaderi (Columbia University, USA)
pp. 100-108
Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks
Weifeng Zhang (Hunan University, China); Dongfang Ling (Hunan University); Yuanrong Zhang, Pengfei Li and Guo Chen (Hunan University, China)
pp. 109-117

Technical Session 2-B: Streaming Services

Measuring Decentralized Video Streaming: A Case Study of DTube
Trinh Viet Doan, Tat Dat Pham and Markus Oberprieler (Technical University of Munich, Germany); Vaibhav Bajpai (Technische Universität München, Germany)
pp. 118-126
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks
Abhijit Mondal (IIT Kharagpur, India); Basabdatta Palit (Indian Institute of Technology, Kharagpur, India); Somesh Khandelia (IIT Kharagpur, India); Nibir Pal (Indian Institute of Technology, Kharagpur, India); Jay Jayatheerthan (Intel Technology Pvt. Ltd., India); Krishna Paul (Intel Corporation, India); Niloy Ganguly and Sandip Chakraborty (Indian Institute of Technology Kharagpur, India)
pp. 127-135
On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences
Ioannis Selinis and Ning Wang (University of Surrey, United Kingdom (Great Britain)); Bin Da (Beijing Huawei Digital Technologies Co., Ltd., China); Delei Yu (Huawei Technologies, China); Rahim Tafazolli (University of Surrey, United Kingdom (Great Britain))
pp. 136-144
Optimized Dynamic Cache Instantiation
Niklas Carlsson (Linköping University, Sweden); Derek Eager (University of Saskatchewan, Canada)
pp. 145-153

Technical Session 2-C: AI for Networks

Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler
Binbin Liao (Institute of Computing Technology, Chinese Academy Sciences, China); Guangxing Zhang (Institute of Computing Technology Chinese Academy of Sciences, China); Zulong Diao (Institute of Computing Technology, Chinese Academy Sciences, China); Gaogang Xie (Institute of Computing Technology, Chinese Academy of Sciences, China)
pp. 154-162
Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach
Weixi Mao, Lei Wang, Jin Zhao and Yuedong Xu (Fudan University, China)
pp. 163-171
Joint Coreset Construction and Quantization for Distributed Machine Learning
Hanlin Lu (Pennsylvania State University, USA); Changchang Liu (IBM Research, USA); Shiqiang Wang (IBM T. J. Watson Research Center, USA); Ting He (Penn State University, USA); Vijaykrishnan Narayanan (Pennsylvania State University, USA); Kevin S Chan (US CCDC Army Research Laboratory, USA); Stephen Pasteris (University College London, United Kingdom (Great Britain))
pp. 172-180
Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning
Daqing Yun (Harrisburg University, USA); Wuji Liu (New Jersey Institute of Technology, USA); Chase Q. Wu (New Jersey Institute of Technology & Oak Ridge National Laboratory, USA); Nageswara Rao (Oak Ridge National Laboratory, USA); Rajkumar Kettimuthu (Argonne National Lab, USA)
pp. 181-189

Technical Session 3-A: Network Security

Characterizing the Root Landscape of Certificate Transparency Logs
Nikita Korzhitskii and Niklas Carlsson (Linköping University, Sweden)
pp. 190-198
Scaling website fingerprinting
Vincent Ghiette (Delft University of Technology, The Netherlands); Christian Doerr (Hasso Plattner Institute, Germany)
pp. 199-207
Tracking Down Sources of Spoofed IP Packets
Osvaldo Fonseca and Italo Cunha (Universidade Federal de Minas Gerais, Brazil); Elverton Fazzion (UFSJ, Brazil); Wagner Meira, Jr. (Universidade Federal de Minas Gerais, Brazil); Brivaldo A. S. Junior (Federal University of Mato Grosso do Sul, Brazil); Ronaldo Alves Ferreira (UFMS, Brazil); Ethan Katz-Bassett (Columbia University, USA)
pp. 208-216
Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services
Harm Griffioen and Christian Doerr (Hasso Plattner Institute, Germany)
pp. 217-225

Technical Session 3-B: Streaming Services

Efficient User-Cell Association for 360 Video Streaming over Wireless Networks
Po-Han Huang and Konstantinos Psounis (University of Southern California, USA)
pp. 226-234
RTCP - Reduce Delay Variability with an End-to-end Approach
Longbo Huang and Yuxing Li (Tsinghua University, China); Jean Walrand (University of California, Berkeley, USA)
pp. 235-243
Enabling Premium Service for Streaming Video in Cellular Networks
Xing Xu (Google, USA); Ramesh Govindan (University of Southern California, USA); Ajay A Mahimkar (AT&T Labs - Research, USA); Nemmara K. Shankaranarayanan (AT&T Laboratories - Research, USA); Jia Wang (AT&T Labs - Research, USA); Minlan Yu (University of Southern California, USA)
pp. 244-252

Technical Session 3-C: AI for Networks

A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers
Gaurav Ghosal (University of California, Berkeley, USA); Dipak Ghosal (University of California, Davis, USA); Alex Sim (Lawrence Berkeley National Laboratory, USA); Aditya Thakur (University of California, Davis, USA); Kesheng Wu (Lawrence Berkeley National Laboratory, USA)
pp. 253-261
Approaching Fair Collision-Free Channel Access with Slotted ALOHA Using Collaborative Policy-Based Reinforcement Learning
Luca de Alfaro and Molly Zhang (University of California, Santa Cruz, USA); JJ Garcia-Luna-Aceves (University of California at Santa Cruz & Palo Alto Research Center, USA)
pp. 262-270
Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers
Yuang Jiang (Yale University, USA); Murali Kodialam (Nokia Bell Labs, USA); T. V Lakshman (Bell Labs, Nokia, USA); Sarit Mukherjee (Nokia Bell Labs, USA); Leandros Tassiulas (Yale University, USA)
pp. 271-279

Technical Session 4-A: Blockchain Networking

Privacy-Preserving Blockchain-Based Data Sharing Platform for Decentralized Storage Systems
Van Hoan Hoang (Oodrive & University of La Rochelle, France); Elyes Lehtihet (Oodrive, France); Yacine Ghamri-Doudane (University of la Rochelle, France)
pp. 280-288
Mapping the Interplanetary Filesystem
Sebastian Henningsen (Humboldt-Universität zu Berlin & Weizenbaum Institute, Germany); Martin Florian (Humboldt-Universität zu Berlin & Weizenbaum Institute for the Networked Society, Germany); Sebastian Rust (Humboldt-Universität zu Berlin, Germany); Björn Scheuermann (Humboldt University of Berlin, Germany)
pp. 289-297
How to Securely Prune Bitcoin's Blockchain
Roman Matzutt, Benedikt Kalde, Jan Pennekamp and Arthur Drichel (RWTH Aachen University, Germany); Martin Henze (Fraunhofer FKIE, Germany); Klaus Wehrle (RWTH Aachen University, Germany)
pp. 298-306

Technical Session 4-B: Network Modeling

An Analytical Model for Assessing the Performance of IEEE 802.11ad Beamforming Training
Mohammed Dahhani, André-Luc Beylot and Gentian Jakllari (University of Toulouse, France)
pp. 307-315
Implications of Routing Coherence and Consistency on Network Optimization
Yvonne-Anne Pignolet (DFINITY, Switzerland); Stefan Schmid (University of Vienna, Austria); Gilles Tredan (LAAS-CNRS, France)
pp. 316-324
Performance Analysis of VPN Gateways
Maximilian Pudelko, Paul Emmerich and Sebastian Gallenmüller (Technical University of Munich, Germany); Georg Carle (Technische Universität München, Germany)
pp. 325-333

Technical Session 4-C: Network Security

Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations
Márcio Carvalho (Federal University of Rio Grande do Sul, Brazil); Vitor A Cunha (Instituto de Telecomunicações, Portugal); Eduardo da Silva (Catarinense Federal Institute, Brazil); Daniel Corujo (Instituto de Telecomunicações Aveiro & Universidade de Aveiro, Portugal); João Paulo Barraca and Rui L Aguiar (University of Aveiro & Instituto de Telecomunicações, Portugal); Lisandro Z Granville (Federal University of Rio Grande do Sul, Brazil)
pp. 334-342
Evaluation of Centralised vs Distributed Collaborative Intrusion Detection Systems in Multi-Access Edge Computing
Rahul Sharma (University of Melbourne, Australia)
pp. 343-351
Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning
Qiaofeng Qin and Konstantinos Poularakis (Yale University, USA); Kin K. Leung (Imperial College, United Kingdom (Great Britain)); Leandros Tassiulas (Yale University, USA)
pp. 352-360

Technical Session 5-A: Traffic Monitoring and Analysis

A data centric computational model of IPv6 adoption
Ioana Livadariu and Ahmed Mustafa Elmokashfi (Simula Research Laboratory, Norway); Amogh Dhamdhere (CAIDA, University of California, San Diego, USA)
pp. 361-369
A Nation-Wide Wi-Fi RSSI Dataset: Statistical Analysis and Resulting Insights
Germán Capdehourat (Universidad de la República & Centro Ceibal, Uruguay); Federico Larroca and Gastón Morales (Universidad de la República, Uruguay)
pp. 370-378
Estimating Server Load Based on its Correlation with TCP SYN Response Time
Luis de Pedro (Universidad Autonoma de Madrid, Spain); Marta Martínez Redondo and Cristina Mancha (Universidad Autónoma de Madrid, Spain); Jorge E. López de Vergara (Universidad Autónoma de Madrid (UAM) & Naudit High Performance Computing and Networking, Spain)
pp. 379-385

Technical Session 5-B: Industrial and Vehicular networking

QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation
Martin Serror, Eric Wagner, René Glebke and Klaus Wehrle (RWTH Aachen University, Germany)
pp. 386-394
MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks
Teri Lenard, Roland Bolboaca, Bela Genge and Piroska Haller (University of Medicine, Pharmacy, Science and Technology of Targu Mures, Romania)
pp. 395-403
CSBR: A Cosine Similarity Based Selective Broadcast Routing Protocol for Vehicular Ad-Hoc Networks
Ankur Nahar (Indian Institute of Technology(IIT) Jodhpur, Rajasthan, India); Himani Sikarwar and Debasis Das (IIT Jodhpur, Rajasthan, India)
pp. 404-412

Technical Session 6-A: Programmable Control and Data Planes

P4rt-OVS: Programming Protocol-Independent, Runtime Extensions for Open vSwitch with P4
Tomasz Osiński (Orange Labs & Warsaw University of Technology, Poland); Halina Tarasiuk (Warsaw University of Technology, Poland); Paul Chaignon (Isovalent, The Netherlands); Mateusz Kossakowski (Orange Labs & Warsaw University of Technology, Poland)
pp. 413-421
Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware
Belma Turkovic (Delft University of Technology, The Netherlands); Jorik Oostenbrink (TU Delft, The Netherlands); Fernando A. Kuipers (Delft University of Technology, The Netherlands); Isaac Keslassy (Technion, VMware, Israel); Ariel Orda (Technion, Israel)
pp. 422-430
Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification
Abir Laraba (Université de Lorraine, LORIA, Inria, France); Jérôme François (INRIA Nancy Grand Est, France); Isabelle Chrisment (LORIA-TELECOM Nancy, Université de Lorraine, France); Shihabur R. Chowdhury and Raouf Boutaba (University of Waterloo, Canada)
pp. 431-439

Technical Session 6-B: Advanced Forwarding and Routing Schemes

PBC: Effective Prefix Caching for Fast Name Lookups
Chuwen Zhang and Yong Feng (Tsinghua University, China); Haoyu Song (Futurewei Technologies, USA); Beichuan Zhang (University of Arizona, USA); Yi Wang (Southern University of Science and Technology, China); Ying Wan, Wenquan Xu and Bin Liu (Tsinghua University, China)
pp. 440-448
Routing Oblivious Measurement Analytics
Ran Ben Basat (Harvard University, USA); Xiaoqi Chen (Princeton University, USA); Gil Einziger (Ben-Gurion University Of The Negev, Israel); Shir Landau Feibish (Princeton University, USA); Danny Raz (Nokia and Technion, Israel); Minlan Yu (Harvard University, USA)
pp. 449-457
Moving a step forward in the quest for Deterministic Networks (DetNet)
Vamsi Addanki (Telecom ParisTech & Sorbonne University, France); Luigi Iannone (Huawei, France)
pp. 458-466

Technical Session 7: Programmable Control and Data Planes

Decoupling of Distributed Consensus, Failure Detection and Agreement in SDN Control Plane
Ermin Sakic (Siemens AG, Germany); Wolfgang Kellerer (Technische Universität München, Germany)
pp. 467-475
Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility
Balázs Németh (Budapest University of Technology and Economics, Hungary); Yvonne-Anne Pignolet (DFINITY, Switzerland); Matthias Rost (TU Berlin, Germany); Stefan Schmid (University of Vienna, Austria); Balázs Vass (Budapest University of Technology and Economics, Hungary)
pp. 476-484
Baking the ruleset: A heat propagation relaxation to packet classification
Xinyi Zhang (Institute of Computing Technology, Chinese Academy of Sciences & University of Chinese Academy of Sciences, China); Kave Salamatian (University of Savoie, France); Gaogang Xie (Institute of Computing Technology, Chinese Academy of Sciences, China)
pp. 485-493

Short Papers 1: Network Security

Polymorphic Encryption and Pseudonymisation of IP Network Flows
Abraham Westerbaan (Radboud University, The Netherlands); Luuk Hendriks (University of Twente, The Netherlands)
pp. 494-498
Encrypted Application Classification with Convolutional Neural Network
Kun Yang and Lu Xu (New York University, USA); Yang Xu (Fudan University, China); H. Jonathan Chao (NYU Tandon School of Engineering, USA)
pp. 499-503
Securing Route Origin Authorization with Blockchain for Inter-Domain Routing
Guobiao He, Wei Su, Shuai Gao and Jiarui Yue (Beijing Jiaotong University, China)
pp. 504-508
Securing Route Leaks using a Decentralized Approach
Miquel Ferriol Galmés, Roger Coll and Albert Cabellos-Aparicio (Universitat Politècnica de Catalunya, Spain); Shoushou Ren (Huawei Technologies Co., Ltd., China); XinPeng Wei (Huawei Technologies, China); Bingyang Liu (Huawei, China)
pp. 509-513

Short Papers 2: SFC and Cloud Networking

Multi-Cloud Chaining with Segment Routing
Francesco Spinelli (IMDEA Networks Institute & Universidad Carlos III de Madrid, Spain); Luigi Iannone (Huawei, France); Jerome Tollet (Cisco Systems, France)
pp. 514-518
Amalgam: Distributed Network Control With Scalabale Service Chaining
Subhrendu Chattopadhyay and Sukumar Nandi (Indian Institute of Technology Guwahati, India); Sandip Chakraborty (Indian Institute of Technology Kharagpur, India); Abhinandan Sridhara Rao Prasad (NIE Mysuru, India)
pp. 519-523
Optimizing Social Welfare for Task Offloading in Mobile Edge Computing
Hsiang-Jen Hong and Wenjun Fan (University of Colorado Colorado Springs, USA); C. Edward Chow (University of Colorado at Colorado Springs, USA); Xiaobo Zhou (University of Colorado, Colorado Springs, USA); Sang-Yoon Chang (University of Colorado Colorado Springs, USA)
pp. 524-528
Toward an Efficient Real-Time Anomaly Detection System for Cloud Datacenters
Ricardo Souza Dias (Pontifícia Universidade Católica do Rio de Janeiro & Globo.com, Brazil); Leopoldo Alexandre Freitas Mauricio (Universidade Federal do Rio de Janeiro / GTA / UFRJ & Globo.com Company, Brazil); Marcus Poggi (PUC-Rio, Brazil)
pp. 529-533

Short Papers 3: Network Modeling

A Delicate Union of Batching and Parallelization Models in Distributed Computing and Communication
Sounak Kar (Technical University of Darmstadt, Germany); Amr Rizk (Universität Ulm, Germany)
pp. 534-538
Modelling Edge Computing in Urban Mobility Simulation Scenarios
Katja Gilly and Salvador Alcaraz (Miguel Hernandez University, Spain); Noura Aknin (Abdelmalek Essaadi University, Morocco); Sonja Filiposka (Faculty of Computer Science and Engineering, Macedonia, the former Yugoslav Republic of); Anastas Mishev (Ss. Cyril and Methodius University, Macedonia, the former Yugoslav Republic of)
pp. 539-543
A Social Spider Optimisation Algorithm for 3D Unmanned Aerial Base Stations Placement
Elhadja Chaalal and Laurent Reynaud (Orange Labs, France); Sidi-Mohammed Senouci (University of Bourgogne - ISAT Nevers, France)
pp. 544-548
Feedback-Based Hidden-Terminal Mitigation for Distributed Scheduling in Cellular V2X
Philip Wendland (Technische Universität Ilmenau, Germany); Guenter Schaefer (Technische Universitaet Ilmenau, Germany)
pp. 549-553
Virtual Cross-Flow Detouring in the Deterministic Network Calculus Analysis
Steffen Bondorf (Ruhr University Bochum, Germany); Fabien Geyer (Technical University of Munich, Germany)
pp. 554-558

Short Papers 4: AI for Networks

Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine
Dong Jin, Shuangwu Chen, Jinsen Xie and Jian Yang (University of Science and Technology of China, China); Xinmin Liu and Wei Wang (New H3C Technologies Co., China)
pp. 559-563
Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone
Andrea Tundis (Technische Universität Darmstadt, Germany); Muhammad Uzair (Incloud Engineering GmbH, Germany); Max Mühlhäuser (Technische Universität Darmstadt, Germany)
pp. 564-568
Optimizing Spectrum Use in Wireless Networks by Learning Agents
Artur Popławski (NOKIA & AGH University of Science and Technology, Poland); Szymon Szott (AGH University of Science and Technology, Poland)
pp. 569-573
Dynamic Backup Workers for Parallel Machine Learning
Chuan Xu and Giovanni Neglia (Inria, France); Nicola Sebastianelli (Inria, Italy)
pp. 574-578
Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond
Nazih Salhab (University Gustave Eiffel, France & Lebanese University, Lebanon); Rana Rahim (Lebanese University, Lebanon); Rami Langar (University Gustave Eiffel, France); Raouf Boutaba (University of Waterloo, Canada)
pp. 579-583

Short Papers 5: 5G Networking, Credential Management and AI for Networks

Multi-User collaborative scheduling in 5G massive MIMO heterogeneous networks
Marie Masson and Zwi Altman (Orange Labs, France); Eitan Altman (INRIA, France)
pp. 584-588
MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks
Gabriel C Ferreira and Priscila Solis (Universidade de Brasilia, Brazil); Geraldo Rocha Filho and Marcos Fagundes Caetano (University of Brasilia, Brazil); Heikki Karvonen (University of Oulu, Centre for Wireless Communications, Finland); Johanna Vartiainen (Centre for Wireless Communications, Finland)
pp. 589-593
Voting Credential Management System for Electronic Voting Privacy
Arijet Sarker, SangHyun Byun, Wenjun Fan, Maria Psarakis and Sang-Yoon Chang (University of Colorado Colorado Springs, USA)
pp. 594-598
Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter
KeKe Zhu (TsingHua University, China); Gengbiao Shen (Tsinghua University, China); Yong Jiang (Graduate School at Shenzhen, Tsinghua University, China); Jianhui Lv (Northeastern University, China); Qing Li (Southern University of Science and Technology, China); Mingwei Xu (Tsinghua University, China)
pp. 599-603

Short Papers 6: IoT Networking

An Energy-Aware SDN/NFV Architecture for the Internet of Things
Dipon Saha and Meysam Shojaee (Dalhousie University, Canada); Michael Baddeley (Toshiba Research Europe Ltd., United Kingdom (Great Britain)); Israat Haque (Dalhousie University, Canada)
pp. 604-608
LoRaWAN Class B Multicast Scalability
Yonatan Woldeleul Shiferaw, MSc (TNO, The Netherlands); Apoorva Arora and Fernando A. Kuipers (Delft University of Technology, The Netherlands)
pp. 609-613
Practical evaluation of carrier sensing for a LoRa wildlife monitoring network
Morgan Roy O'Kennedy (University of Stellenbosch, South Africa); Thomas Niesler (Stellenbosch University, South Africa); Riaan Wolhuter (University of Stellenbosch, South Africa); Nathalie Mitton (Inria Lille - Nord Europe, France)
pp. 614-618

Poster Session 1: NFV/SDN/5G

CO2: Collaborative Packet Classification for Network Functions with Overselection
Yunhong Xu (Texas A&M University, USA); Hao Wu (Tsinghua University, China); Nick Duffield (Texas A&M University, USA); Bin Liu (Tsinghua University, China); Minlan Yu (Harvard University, USA)
pp. 619-621
Priority-Aware Per-flow Measurement using Cuckoo Sketch
Yibo Yan (Peking University & School of Electronics and Computer Engineering (SECE), China); Cheng Chen, Huiping Lin, Olivier Ruas, Tengjiao Wang and Tong Yang (Peking University, China)
pp. 622-624
Word embedding for deployment descriptors in NFV
Wassim Sellil Atoui (Télécom SudParis & Orange Labs, France); Imen Grida Ben Yahia (Orange Labs, France); Walid Gaaloul (Telecom SudParis, Samovar, France)
pp. 625-627
Im-OFDP: An Improved OpenFlow-based Topology Discovery Protocol for Software Defined Network
Dong Li and Yongpu Gu (Huazhong University of Science and Technology, China); Junqing Yu (Huazhong University of Science & Technology, China)
pp. 628-630
SmartSharing: A CDN with Smart Contract-based Local OTT Sharing
Jiamin Fan and Kui Wu (University of Victoria, Canada); Daming Liu (Shanghai University of Electric Power, China); Guoming Tang (National University of Defense Technology, China)
pp. 631-633
IsoRAN: Isolation and Scaling for 5G RAN via User-Level Data Plane Virtualization
Nishant Budhdev and Mun Choon Chan (National University of Singapore, Singapore); Tulika Mitra (NUS Singapore, Singapore)
pp. 634-636

Poster Session 2: VANETs/WMNs

Poster: Seamless Client Integration for Fast Roaming in Wireless Mesh Networks
Martin Backhaus, Markus Theil and Michael Rossberg (Technische Universität Ilmenau, Germany); Guenter Schaefer (Technische Universitaet Ilmenau, Germany)
pp. 637-639
Poster: Distributed and Privacy Preserving Routing of Connected Vehicles to Minimize Congestion
Surabhi Boob (North Carolina State University, USA); Shakir Mahmood (National University of Sciences and Technology, Pakistan); Muhammad Shahzad (North Carolina State University, USA)
pp. 640-642
SafeSmart: A VANET system for efficient communication for emergency vehicles
Luis Antonio Leite Francisco da Costa and Eduardo Kochenborger Duarte (Federal University of Rio Grande do Sul, Brazil); Mikael Erneberg (H&E Solutions AB, Sweden); Edison Pignaton de Freitas (Federal University of Rio Grande do Sul, Brazil); Alexey Vinel (Halmstad University, Sweden)
pp. 643-645
TrueNets: a Topology Generator for Realistic Network Analysis
Gabriele Gemmi (University of Trento, Italy); Renato Lo Cigno (University of Brescia, Italy); Leonardo Maccari (University of Venice, Italy)
pp. 646-648

Poster Session 3: ML/Privacy

Poster: A Semi-Supervised Framework to Detect Botnets in IoT Devices
Muhammad Naveed and Hui Wu (The University of New South Wales, Australia)
pp. 649-651
Evolution of Ethereum: A Temporal Graph Perspective
Qianlan Bai, Chao Zhang and Yuedong Xu (Fudan University, China); Xiaowei Chen (The Chinese University of Hong Kong, USA); Xin Wang (Fudan University, China)
pp. 652-654
OIDPR: Optimized Insulin Dosage based on Privacy-Preserving Reinforcement Learning
Zuobin Ying, Yun Zhang and Shuanglong Cao (Anhui University, China); Shengmin Xu (Singapore Management University, Singapore); Ximeng Liu (Fuzhou University, China)
pp. 655-657
Auditable secure network overlays for multi-domain distributed applications
Reginald S Cushing, Paola Grosso, Ralph Koning and Cees de Laat (University of Amsterdam, The Netherlands)
pp. 658-660
CONtrol: Controlling Quality of Service of Container Networks in a Hyperconverged Platform
Sumitro Bhaumik (Indian Institute of Technology, Kharagpur, India); Kaustav Chanda (Manipal Institute of Technology, India); Sandip Chakraborty (Indian Institute of Technology Kharagpur, India)
pp. 661-663
Per-Hop Bridge-Local Latency Bounds with Strict Priority Transmission Selection
Alexej Grigorjew (University of Wuerzburg, Germany); Florian Metzger and Tobias Hoßfeld (University of Würzburg, Germany); Johannes Specht (University of Duisburg-Essen, Germany); Franz-Josef Goetz, Juergen Schmitt and Feng Chen (Siemens AG, Germany)
pp. 664-666

Demo Session 1: Security

A Practical Analysis on Mirai Botnet Traffic
Getoar Gallopeni, Bruno Rodrigues and Muriel Franco (University of Zurich, Switzerland); Burkhard Stiller (University of Zürich, Switzerland)
pp. 667-668
Securing messages in C-ITS: a proof of concept
Jun Zhang (Telecom Paris, France); Houda Labiod (Telecom ParisTech, France); Ghassen Chaabane (Telecom Paris, France); Clément Ruffin and André Perpey (NeoGLS, France)
pp. 669-670
User identification by matching radio ``vision'' and computer vision through means of machine learning
Vinicius Mesquita de Pinho and Dalia Georgiana Popescu (Nokia Bell Labs, France)
pp. 671-672

Demo Session 2: Performance

Autonomous Anomaly Detector for Cloud-Radio Access Network Key Performance Indicators
Nazih Salhab (University Gustave Eiffel, France & Lebanese University, Lebanon); Rana Rahim (Lebanese University, Lebanon); Rami Langar (University Gustave Eiffel, France)
pp. 673-674
Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations
Markus Theil, Martin Backhaus and Michael Rossberg (Technische Universität Ilmenau, Germany); Guenter Schaefer (Technische Universitaet Ilmenau, Germany)
pp. 675-676

Demo Session 3: Management and Configuration

FORCH: An Orchestrator for Fog Computing service deployment
Gianluca Davoli, Davide Borsatti, Daniele Tarchi and Walter Cerroni (University of Bologna, Italy)
pp. 677-678
Demo: Crawling the IPFS Network
Sebastian Henningsen (Humboldt-Universität zu Berlin & Weizenbaum Institute, Germany); Sebastian Rust (Humboldt-Universität zu Berlin, Germany); Martin Florian (Humboldt-Universität zu Berlin & Weizenbaum Institute for the Networked Society, Germany); Björn Scheuermann (Humboldt University of Berlin, Germany)
pp. 679-680
Optimum Rooted Trees for Failover in Switched Networks
Peter Willis and Nirmala Shenoy (Rochester Institute of Technology, USA)
pp. 681-682
Evaluation of Path States of Large IoT Networks Using Locally and Remotely Controlled Measurements
Agnieszka Chodorek (Kielce University of Technology, Poland); Robert R. Chodorek (AGH University of Science and Technology, Poland)
pp. 683-684