skip to main content
10.1145/3365609acmconferencesBook PagePublication PagescommConference Proceedingsconference-collections
HotNets '19: Proceedings of the 18th ACM Workshop on Hot Topics in Networks
ACM2019 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
HotNets '19: The 18th ACM Workshop on Hot Topics in Networks Princeton NJ USA November 13 - 15, 2019
ISBN:
978-1-4503-7020-2
Published:
13 November 2019
Sponsors:

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Revisiting old beliefs
research-article
On Eliminating Root Nameservers from the DNS

The Domain Name System (DNS) leverages nearly 1K distributed servers to provide information about the root of the Internet's namespace. The large size and broad distribution of the root nameserver infrastructure has a number of benefits, including ...

research-article
Beating BGP is Harder than we Thought

Online services all seek to provide their customers with the best Quality of Experience (QoE) possible. Milliseconds of delay can cause users to abandon a cat video or move onto a different shopping site, which translates into lost revenue. Thus, ...

research-article
Open Access
Beyond Jain's Fairness Index: Setting the Bar For The Deployment of Congestion Control Algorithms

The Internet community faces an explosion in new congestion control algorithms such as Copa, Sprout, PCC, and BBR. In this paper, we discuss considerations for deploying new algorithms on the Internet. While past efforts have focused on achieving '...

SESSION: The role of learning in networking
research-article
Do Switches Dream of Machine Learning?: Toward In-Network Classification

Machine learning is currently driving a technological and societal revolution. While programmable switches have been proven to be useful for in-network computing, machine learning within programmable switches had little success so far. Not using network ...

research-article
(Self) Driving Under the Influence: Intoxicating Adversarial Network Inputs

Traditional network control planes can be slow and require manual tinkering from operators to change their behavior. There is thus great interest in a faster, data-driven approach that uses signals from real-time traffic instead. However, the promise of ...

research-article
Open Access
Towards Oblivious Network Analysis using Generative Adversarial Networks

Modern systems across diverse application domains (e.g., IoT, automotive) have many black-box devices whose internal structures and/or protocol formats are unknown. We currently lack the tools to systematically understand the behavior and learn the ...

SESSION: Server designs for networking
research-article
Public Access
The Case for a Network Fast Path to the CPU

For the past two decades, the communication channel between the NIC and CPU has largely remained the same---issuing memory requests across a slow PCIe peripheral interconnect. Today, with application service times and network fabric delays measuring ...

research-article
Mind the Gap: A Case for Informed Request Scheduling at the NIC

Recent research in high-throughput networked systems has established the need for centralized and preemptive request scheduling in order to achieve good hardware utilization and low tail latency for a wide variety of workloads. However, this approach is ...

SESSION: Network verification
research-article
Public Access
Learning Network Design Objectives Using A Program Synthesis Approach

While the networking community has extensively tackled network design problems using optimization or other techniques (e.g., in areas such as traffic-engineering, and resource allocation), much of this work focuses on efficiently generating designs ...

research-article
Putting network verification to good use

The past decade has witnessed remarkable progress in the field of network verification, and interest from academia and industry has spurred the development of increasingly sophisticated verification tools and algorithms. However, outside of a handful of ...

research-article
Robustifying Network Protocols with Adversarial Examples

Ideally, network protocols (e.g., for routing, congestion control, video streaming, etc.) will perform well across the entire range of environments in which they might operate. Unfortunately, this is typically not the case; a protocol might fail to ...

SESSION: On how we do research
research-article
Open Access
An Effort to Democratize Networking Research in the Era of AI/ML

A growing concern within today's networking community is that with the proliferation of Artificial Intelligence/Machine Learning (AI/ML) techniques, a lack of access to real-world production networks is putting academic researchers at a significant ...

research-article
BatteryLab, A Distributed Power Monitoring Platform For Mobile Devices

Recent advances in cloud computing have simplified the way that both software development and testing are performed. Unfortunately, this is not true for battery testing for which state of the art test-beds simply consist of one phone attached to a power ...

SESSION: New directions
research-article
Open Access
ShareAR: Communication-Efficient Multi-User Mobile Augmented Reality

Augmented reality is an emerging application on mobile devices. However, there is a lack of understanding of the communication requirements and challenges of multi-user AR scenarios. In this position paper, we propose several important research issues ...

research-article
Wi-LE: Can WiFi Replace Bluetooth?

Despite the ubiquity of WiFi devices, Bluetooth is widely used for communication in low-power, low data-rate devices. This is because Bluetooth consumes much less power than WiFi which results in longer battery life. The higher power consumption of WiFi ...

research-article
Using ground relays for low-latency wide-area routing in megaconstellations

Large low earth orbit satellite constellations have the potential to provide global high-capacity low-latency Internet access, but early deployments lack dedicated inter-satellite links (ISLs). We investigate the use of ground-based relays as a ...

SESSION: Programmable network infrastructure
research-article
Event-Driven Packet Processing

The rise of programmable network devices and the P4 programming language has sparked an interest in developing new applications for packet processing data planes. Current data-plane programming models allow developers to express packet processing on a ...

research-article
Public Access
Accelerated Service Chaining on a Single Switch ASIC

Network functions and service function chaining are prevalent in cloud and ISP networks. In traditional software-based solutions, scaling up the capacity of these functions requires a large number of server cores. However, edge clouds are severely ...

research-article
Autogenerating Fast Packet-Processing Code Using Program Synthesis

Packet-processing code should be fast. But, it is hard to write fast code for programmable substrates such as high-speed switches, multicore SoC SmarfNICs, FP-GAs, middleboxes, and the end-host stack. Today, expert developers with deep familiarity with ...

research-article
Public Access
Architecting Programmable Data Plane Defenses into the Network with FastFlex

This paper is motivated by the ever increasing scale and diversity of attacks that are best handled by the network infrastructure. FastFlex builds upon recent progress, which has developed a variety of network defenses in programmable data planes, and ...

Recommendations

Acceptance Rates

Overall Acceptance Rate110of460submissions,24%
YearSubmittedAcceptedRate
HotNets '171242823%
HotNets '161083028%
HotNets-XIII1182622%
HotNets-XII1102624%
Overall46011024%