[PDF][PDF] WireGuard: Next Generation Kernel Network Tunnel.

JA Donenfeld - NDSS, 2017 - cs.wm.edu
WireGuard is a secure network tunnel, operating at layer 3, implemented as a kernel virtual
network interface for Linux, which aims to replace both IPsec for most use cases, as well as …

Salsify:{Low-Latency} network video through tighter integration between a video codec and a transport protocol

S Fouladi, J Emmons, E Orbay, C Wu… - … USENIX Symposium on …, 2018 - usenix.org
Salsify is a new architecture for real-time Internet video that tightly integrates a video codec
and a network transport protocol, allowing it to respond quickly to changing network …

Outatime: Using speculation to enable low-latency continuous interaction for mobile cloud gaming

K Lee, D Chu, E Cuervo, J Kopf, Y Degtyarev… - Proceedings of the 13th …, 2015 - dl.acm.org
Gaming on phones, tablets and laptops is very popular. Cloud gaming-where remote
servers perform game execution and rendering on behalf of thin clients that simply send …

Restructuring endpoint congestion control

A Narayan, F Cangialosi, D Raghavan… - Proceedings of the …, 2018 - dl.acm.org
This paper describes the implementation and evaluation of a system to implement complex
congestion control functions by placing them in a separate agent outside the datapath. Each …

Towards optimization-safe systems: Analyzing the impact of undefined behavior

X Wang, N Zeldovich, MF Kaashoek… - Proceedings of the …, 2013 - dl.acm.org
This paper studies an emerging class of software bugs called optimization-unstable code:
code that is unexpectedly discarded by compiler optimizations due to undefined behavior in …

Pound: A multi-master ROS node for reducing delay and jitter in wireless multi-robot networks

D Tardioli, R Parasuraman, P Ögren - Robotics and Autonomous Systems, 2019 - Elsevier
Abstract The Robot Operating System (ROS) is a popular and widely used software
framework for building robotics systems. With the growth of its popularity, it has started to be …

Learning networking by reproducing research results

L Yan, N McKeown - ACM SIGCOMM Computer Communication Review, 2017 - dl.acm.org
In the past five years, the graduate networking course at Stanford has assigned over 200
students the task of reproducing results from over 40 networking papers. We began the …

{SpotProxy}: Rediscovering the Cloud for Censorship Circumvention

PTJ Kon, S Kamali, J Pei, D Barradas, A Chen… - 33rd USENIX Security …, 2024 - usenix.org
Censorship circumvention is often fueled by supporters out of goodwill. However, hosting
circumvention proxies can be costly, especially when they are placed in the cloud. We argue …

Leveraging strategic connection migration-powered traffic splitting for privacy

M Wang, A Kulshrestha, L Wang, P Mittal - arxiv preprint arxiv:2205.03326, 2022 - arxiv.org
Network-level adversaries have developed increasingly sophisticated techniques to surveil
and control users' network traffic. In this paper, we exploit our observation that many …

Unix shell programming: the next 50 years

M Greenberg, K Kallas, N Vasilakis - … of the Workshop on Hot Topics in …, 2021 - dl.acm.org
The Unix shell is a powerful, ubiquitous, and reviled tool for managing computer systems.
The shell has been largely ignored by academia and industry. While many replacement …