Conference Schedule
Day 1
08:15 - 08:45 Registration
08:45 - 09:00 Welcome
9:00 - 10:40

Session 1: Security & Privacy (Chair: Bernhard Plattner)

- Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement   --  J. Amann (International Computer Science Institute), R. Sommer (International Computer Science Institute / Lawrence Berkeley National Laboratory)

- Measuring the latency and pervasiveness of TLS certificate revocation  --  L. Zhu (USC Information Sciences Institute), J. Amann (International Computer Science Institute), J. Heidemann (USC Information Sciences Institute)

- Tracking Personal Identifiers Across the Web  --  M. Falahrastegar, H. Haddadi, and S. Uhlig (QMUL), R. Mortier (CAM)

- Like a Pack of Wolves: Community Structure of Web Trackers  --  V. Kalavri (KTH Royal Institute of Technology), J. Blackburn, M. Varvello, K. Papagiannaki (Telefonica Research)

10:40 - 11:10 Coffee break
11:10 - 12:50

Session 2: Mobile & Cellular (Chair: Maria Papadopouli)

- A First Analysis of Multipath TCP on Smartphones  --  Q. De Coninck(Université catholique de Louvain), M. Baerts (Tessares), B. Hesmans and O. Bonaventure (Université catholique de Louvain)

- Crowdsourcing Measurements of Mobile Network Performance and Mobility during a Large Scale Event  --   A. Frömmgen, J. Heuschkel, P. Jahnke, F. Cuozzo, I. Schweizer, P. Eugster, M. Mühlhäuser, and A. Buchmann

- A Study of MVNO Data Paths and Performance  --  P. Schmitt, M. Vigil, E. Belding (University of California, Santa Barbara)

- Detecting Cellular Middleboxes using Passive Measurement Techniques  --  U. Goel (Montana State University), M. Steiner (Akamai Technologies, Inc.), M. Wittie (Montana State University), M. Flack and S. Ludin (Akamai Technologies, Inc.)

12:50 - 14:30 Lunch
14:30 - 16:10

Session 3: The Last mile (Chair: Michael Rabinovich)

- Home Network or Access Link? Locating Last-Mile DownstreamThroughput Bottlenecks  --   S. Sundaresan (ICSI), N. Feamster (Princeton University), R. Teixeira (Inria)

- A Case Study of Traffic Demand Response to Broadband Service-Plan Upgrades  --  S. Grover, R. Ensafi, N. Feamster (Princeton University)

- eXploring Xfinity: A first look at provider-enabled community networks  --  D. Jha, J. Rula, F. Bustamante (Northwestern University)

- NAT Revelio: Detecting NAT444 in the ISP  --  A. Lutu (Simula Research Laboratory), M. Bagnulo (UC3M), A. Dhamdhere and K. Claffy (CAIDA/UC San Diego)

16:10 - 16:40 Coffee break
16:40 - 17:45

Session 4: Testbeds & Frameworks (Chair: Alan Mislove)

- GPLMT: A Lightweight Experimentation and Testbed Management Framework  --  M. Wachs, N. Herold, Stephan-A.Posselt, F. Dold, G. Carle (Technische Universität München)

- Periscope: Unifying Looking Glass Querying  --   V. Giotsas, A. Dhamdhere, K. Claffy (UCSD/CAIDA)

- Analyzing Locality of Mobile Messaging Traffic using the MATAdOR Framework  --  Q. Scheitle, M. Wachs, J. Zirngibl, G. Carle (Technische Universität München)

21:00 Social Event

Day 2
8:30 - 9:00 Registration
9:00 - 10:40

Session 1: Web (Chair: Evangelos Markatos)

- Scout: A Point of Presence Recommendation System Using Real User Monitoring Data  --  Y. Yang, L. Zhang, R. Maheshwari, Z. Kahn, D. Agarwal, S. Dubey (LinkedIn)

- Is The Web HTTP/2 Yet?  --  M. Varvello (Telefonica Research), K. Schomp (Case Western Reserve University), D. Naylor (Carnegie Mellon University), and J. Blackburn, A. Finamore, and K. Papagiannaki (Telefonica Research)

- Modeling HTTP/2 Speed from HTTP/1 Traces  --  K. Zarifis (University of Southern California), M. Holland and M. Jain (Akamai Technologies), E. Katz-Bassett and R. Govindan (University of Southern California)

- Behind Box-Office Sales: Understanding Automation Spam in Online Classifieds  --  A. Kaizer, M. Gupta, M. Sajib, A. Acharjee, Q. Ismail (Indiana University)

10:40 - 11:10 Coffee break
11:10 - 12:50

Session 2: DNS & Routing (Chair: Steve  Uhlig)

- Towards a Model of DNS Client Behavior  --  K. Schomp, M. Rabinovich (Case Western Reserve University), M. Allman (USC Information Sciences Institute)

- Detecting DNS Root Manipulation  --  B. Jones and N. Feamster (Princeton University), V. Paxson (ICSI/ UC Berkeley), N. Weaver and M. Allman (ICSI)

- Behind IP Prefix Overlaps in the BGP Routing Table  --   Q. Jacquemart (Eurecom), G. Urvoy-Keller (University Nice Sophia Antipolis), E. Biersack (Eurecom)

- Characterizing Rule Compression Mechanisms in Software-defined Networks  --  C. Yu (UC Riverside), C. Lumezanu (NEC Labs), H. Madhyastha (University of Michigan), G. Jiang (NEC Labs)

12:50 - 14:30 Lunch
14:30 - 16:10

Session 3: IXPs & MPLS (Chair: Simon  Leinen)

- Blackholing at IXPs: On the Effectiveness of DDoS Mitigation in the Wild  --  C. Dietzel (TU Berlin / DE-CIX), A. Feldmann (TU Berlin), T. King (DE-CIX)

- Dissecting the Largest National Ecosystem of Public Internet eXchange Points in Brazil  -- S. Brito, M. Santos, R. Fontes, D. Perez, C. Rothenberg (University of Campinas) (UNICAMP)

- traIXroute: Detecting IXPs in traceroute paths  --   G. Nomikos (FORTH), X. Dimitropoulos (University of Crete / FORTH)

- A Brief History of MPLS Usage in IPv6  --   Y. Vanaubel (Université de Liège), P. Mérindol and J.-J. Pansiot (Université de Strasbourg), B. Donnet (Université de Liège)

16:10 - 16:40 Coffee break
16:40 - 17:45

Session 4: Scheduling & Timing (Chair: Matteo Varvello)

- An Empirical Study of Android Alarm Usage for Application Scheduling  --  M. Almeida and M. Bilal (Universitat Politecnica de Catalunya), J. Blackburn and K. Papagiannaki (Telefonica Research)

- Network Timing and the 2015 Leap Second  --   D. Veitch (University of Technology Sydney), K. Vijayalayan (The University of Melbourne)

- Can Machine Learning Benefit Bandwidth Estimation at Ultra High-speeds?  --  Q. Yin, J. Kaur (University of North Carolina at Chapel Hill)

17:45 - 18:00 Closing Remarks