09:30-10:30
|
Welcome and Keynote
Welcome and Opening Remarks
Anna Brunström (Karlstad University), Ryan Becket (Microsoft)
Keynote: TBD
|
10:30-11:00
|
Video & CDN
Carbon-Intelligent Content Scheduling in CDNs
Author1,
Author2
End-to-End 360º Video Streaming over HTTP/3: Architecture and Implementation
Author 1,
Author 2,
|
11:30-13:00
|
Standards, Protocols & RFCs
Two Decades of IETF Affiliations: Evolution and Impact
Author1,
Author2
Empowering IETF Collaboration with NLP Search Innovations and LLM-Enhanced RFC Writing
Author 1,
Author 2,
Large Language Model Driven Automated Network Protocol Testing
Author 1,
Author 2,
|
12:15-13:00
|
Emulation & Diagnosis
Standards, Protocols & RFCs
Author1,
Author2
BrowsEm: Model-based Web Site Loading Emulation
Author 1,
Author 2,
Using Explicit (Host-to-Network) Flow Measurements for Network Tomography
Author 1,
Author 2,
|
14:30-15:45
|
Transport
Getting up to Speed with Neqo and Careful Resume
Author1,
Author2
TCP Congestion Control Performance over Starlink
Author 1,
Author 2,
Understanding QUIC’s Throughput Speedbumps
Author 1,
Author 2,
Cascades of Nested Acknowledgments in Multi-Hop MASQUE
Author 1,
Author 2,
Reproducing and Solving a Fallback Issue in TCP Prague
Author 1,
Author 2,
|
15:45-16:30
|
Lightning Talks / Poster Session
Towards Comprehensive Mapping of Africa’s Internet Infrastructure
Author1,
Author2
Towards Operational and Security Best Practices for DNS in the Internet of Things
Author 1,
Author 2,
The benefits and difficulties of replacing single-homing by switched-homing for Internet access
Author 1,
Author 2,
Identifying Roadblocks in Building Decentralized Apps
Author 1,
Author 2,
Straggler-Aware Observability for Flow Scheduling
Author 1,
Author 2,
Towards Understanding Middlebox Deployments in Dutch ASes: Impact of IP Sampling Size
Author 1,
Author 2,
Non-Standard Large TTLs in DNS Query Responses
Author 1,
Author 2,
|
18:00-19:00
|
Security
Secure Deployment of eBPF Programs Made Manifest
Author 1,
Author 2,
MAY is not enough! QUIC servers SHOULD skip packet numbers
Author 1,
Author 2,
PQC for DNSSEC: a format size analysis on Falcon signatures
Author 1,
Author 2,
A Framework for Secure Autonomic IoT Device Management in Constrained Networks
Author 1,
Author 2,
|