{"title":"EZ-PC: program committee selection made easy","authors":"V. Sekar","doi":"10.1145/3243157.3243163","DOIUrl":"https://doi.org/10.1145/3243157.3243163","url":null,"abstract":"Selecting a technical program committee (PC) for a conference or a workshop can be an intimidating and time consuming process. PC selection needs to balance several potential considerations; e.g., industry vs. academic participation, inclusion of under-represented communities, ensuring coverage over topic areas, among others. This paper presents the design of an open-source tool called EZ-PC which formulates these considerations as a simple constraint satisfaction problem to help PC chairs systematize this selection process. We report on some of the features we have incorporated and our experience in using the tool.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115391262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Report on the workshop on research and applications of internet measurements (RAIM)","authors":"M. Ford, L. Eggert","doi":"10.1145/3243157.3243167","DOIUrl":"https://doi.org/10.1145/3243157.3243167","url":null,"abstract":"This report is a brief summary of the Internet Research Task Force and Internet Society workshop on Research and Applications of Internet Measurements (RAIM) in co-operation with ACM SIGCOMM that took place on Saturday, October 31, 2015 in Yokohama, Japan. The workshop provided an opportunity for researchers and practitioners in the field of Internet measurements to become acquainted and share their work.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125140213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Mogul, Bruce S. Davie, H. Balakrishnan, R. Govindan
{"title":"Opening up attendance at HotNets","authors":"J. Mogul, Bruce S. Davie, H. Balakrishnan, R. Govindan","doi":"10.1145/3243157.3243162","DOIUrl":"https://doi.org/10.1145/3243157.3243162","url":null,"abstract":"HotNets has historically been invitation-only. The SIGCOMM community has recently encouraged HotNets to allow broader participation. This note reports on a HotNets 2015 experiment with a more open attendance policy, and on the results of a post-workshop survey of the attendees. Based on this experiment and the survey, the HotNets Steering Committee believes it is possible for the workshop to support broader attendance, while preserving an atmosphere that encourages free-flowing discussions.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125663625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research impacting the practice of congestion control","authors":"Nandita Dukkipati, Yuchung Cheng, Amin Vahdat","doi":"10.1145/3243157.3243171","DOIUrl":"https://doi.org/10.1145/3243157.3243171","url":null,"abstract":"Many algorithms proposed in networking research papers are widely used in many areas, including Congestion Control, Routing, Traffic Engineering, and Load Balancing. In this paper, we present algorithmic advancements that have impacted the practice of Congestion Control (CC) in datacenters and the Internet. Where possible, we also describe negative examples, ideas that looked promising on paper or in simulations but that performed poorly in practice. We conclude the paper with observations on the characteristics shared by these ideas in taking them from research to impacting practice.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125086674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Bano, P. Richter, M. Javed, S. Sundaresan, Z. Durumeric, S. Murdoch, R. Mortier, V. Paxson
{"title":"Scanning the Internet for Liveness","authors":"S. Bano, P. Richter, M. Javed, S. Sundaresan, Z. Durumeric, S. Murdoch, R. Mortier, V. Paxson","doi":"10.1145/3213232.3213234","DOIUrl":"https://doi.org/10.1145/3213232.3213234","url":null,"abstract":"Internet-wide scanning depends on a notion of liveness: does a target IP address respond to a probe packet? However, the interpretation of such responses, or lack of them, is nuanced and depends on multiple factors, including: how we probed, how different protocols in the network stack interact, the presence of filtering policies near the target, and temporal churn in IP responsiveness. Although often neglected, these factors can significantly affect the results of active measurement studies. We develop a taxonomy of liveness which we employ to develop a method to perform concurrent IPv4 scans using ICMP, five TCP-based, and two UDP-based protocols, comprehensively capturing all responses to our probes, including negative and cross-layer responses. Leveraging our methodology, we present a systematic analysis of liveness and how it manifests in active scanning campaigns, yielding practical insights and methodological improvements for the design and the execution of active Internet measurement studies.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114201481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quirin Scheitle, Taejoong Chung, Jens Hiller, Oliver Gasser, Johannes Naab, R. V. Rijswijk-Deij, O. Hohlfeld, Ralph Holz, D. Choffnes, A. Mislove, G. Carle
{"title":"A First Look at Certification Authority Authorization (CAA)","authors":"Quirin Scheitle, Taejoong Chung, Jens Hiller, Oliver Gasser, Johannes Naab, R. V. Rijswijk-Deij, O. Hohlfeld, Ralph Holz, D. Choffnes, A. Mislove, G. Carle","doi":"10.1145/3213232.3213235","DOIUrl":"https://doi.org/10.1145/3213232.3213235","url":null,"abstract":"Shaken by severe compromises, the Web’s Public Key Infrastructure has seen the addition of several security mechanisms over recent years. One such mechanism is the Certification Authority Authorization (CAA) DNS record, that gives domain name holders control over which Certification Authorities (CAs) may issue certificates for their domain. First defined in RFC 6844, adoption by the CA/B forum mandates that CAs validate CAA records as of September 8, 2017. The success of CAA hinges on the behavior of three actors: CAs, domain name holders, and DNS operators. We empirically study their behavior, and observe that CAs exhibit patchy adherence in issuance experiments, domain name holders configure CAA records in encouraging but error-prone ways, and only six of the 31 largest DNS operators enable customers to add CAA records. Furthermore, using historic CAA data, we uncover anomalies for already-issued certificates. We disseminated our results in the community. This has already led to specific improvements at several CAs and revocation of mis-issued certificates. Furthermore, in this work, we suggest ways to improve the security impact of CAA. To foster further improvements and to practice reproducible research, we share raw data and analysis tools.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133273564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Failures from the Environment, a Report on the First FAILSAFE workshop","authors":"Michael J. Breza, Ivana Tomic, J. Mccann","doi":"10.1145/3213232.3213238","DOIUrl":"https://doi.org/10.1145/3213232.3213238","url":null,"abstract":"This document presents the views expressed in the submissions and discussions at the FAILSAFE workshop about the common problems that plague embedded sensor system deployments in the wild. We present analysis gathered from the submissions and the panel session of the FAILSAFE 2017 workshop held at the SenSys 2017 conference. The FAILSAFE call for papers specifically asked for descriptions of wireless sensor network (WSN) deployments and their problems and failures. The submissions, the questions raised at the presentations, and the panel discussion give us a sufficient body of work to review, and draw conclusions regarding the effect that the environment has as the most common cause of embedded sensor system failures.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"2 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120904243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elmano Ramalho Cavalcanti, Jose Anderson Rodrigues de Souza, M. Spohn, R. Gomes, A. Costa
{"title":"VANETs' research over the past decade: overview, credibility, and trends","authors":"Elmano Ramalho Cavalcanti, Jose Anderson Rodrigues de Souza, M. Spohn, R. Gomes, A. Costa","doi":"10.1145/3213232.3213237","DOIUrl":"https://doi.org/10.1145/3213232.3213237","url":null,"abstract":"Since its inception, Vehicular Ad hoc Networks (VANETs) have been attracting much attention from both academia and industry. As for other wireless networking areas, scientific advancements are mainly due to the employment of simulation tools and mathematical models. After surveying 283 papers published in the last decade on vehicular networking, we pinpoint the main studied topics as well the most employed tools, pointing out the changes in research subject preference over the years. As a key contribution, we also evaluate to what extent the research community has evolved concerning the principles of credibility in simulation-based studies, such as repeatability and replicability, comparing our results with previous studies.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124588045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The April 2018 issue","authors":"O. Bonaventure","doi":"10.1145/3213232.3213233","DOIUrl":"https://doi.org/10.1145/3213232.3213233","url":null,"abstract":"The April 2018 issue of SIGCOMM Computer Communication Review.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122749379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Slack-Aware Networking","authors":"Fahad R. Dogar","doi":"10.1145/3213232.3213236","DOIUrl":"https://doi.org/10.1145/3213232.3213236","url":null,"abstract":"We are moving towards an Internet where most of the packets may be consumed by emph{machines} -- set-top-boxes or smart-phone apps prefetching content, Internet of Things (IoT) devices uploading their data to the cloud, or data centers doing geo-distributed replication. We observe that such machine centric communication can afford to have emph{slack} built into it: every packet can be marked as to when it will be consumed in future. Slack could be anywhere from seconds to hours or even days. In this paper, we make a case for slack-aware networking by illustrating slack opportunities that arise for a wide range of applications as they interact with the cloud and its pricing models (e.g., spot pricing). We also sketch the design of SlackStack, a network stack with explicit support for slack at multiple levels of the stack, from a slack-based interface to slack-aware optimizations at the transport and network layers.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131755501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}