Matthew Caesar
YOU?
Author Swipe
View article: Fine-grained Distributed Data Plane Verification with Intent-based Slicing
Fine-grained Distributed Data Plane Verification with Intent-based Slicing Open
Data plane verification has grown into a powerful tool to ensure network correctness. However, existing methods with monolithic models have memory requirements tied to network sizes, and the existing method of scaling out is too limited in…
View article: Drone-Hosted Computation for Emergency Response
Drone-Hosted Computation for Emergency Response Open
Ad hoc computing needs at remote locations or locations with insufficient resources due to reasons such as natural disasters require flexible solutions that are readily deployed on demand. We consider one such scenario where unmanned aeria…
View article: Tracking Grow-Finish Pigs Across Large Pens Using Multiple Cameras
Tracking Grow-Finish Pigs Across Large Pens Using Multiple Cameras Open
Increasing demand for meat products combined with farm labor shortages has resulted in a need to develop new real-time solutions to monitor animals effectively. Significant progress has been made in continuously locating individual pigs us…
View article: Vision-based Behavioral Recognition of Novelty Preference in Pigs
Vision-based Behavioral Recognition of Novelty Preference in Pigs Open
Behavioral scoring of research data is crucial for extracting domain-specific metrics but is bottlenecked on the ability to analyze enormous volumes of information using human labor. Deep learning is widely viewed as a key advancement to r…
View article: Great educators in computer networking
Great educators in computer networking Open
This interview is part of a series on Great Educators in Computer Networking, where we interview some of the most impactful and skilled educators in our field. Here, we interviewed Australian Bruce Davie, the self-described computer scient…
View article: Update on ACM SIGCOMM CCR reviewing process
Update on ACM SIGCOMM CCR reviewing process Open
This editorial note aims to first inform the SIGCOMM community on the reviewing process in place currently at CCR, and second, share our plans to make CCR a more open and welcoming venue by making changes to the review process, adding more…
View article: Plankton: Scalable network configuration verification through model checking
Plankton: Scalable network configuration verification through model checking Open
Network configuration verification enables operators to ensure that the network will behave as intended, prior to deployment of their configurations. Although techniques ranging from graph algorithms to SMT solvers have been proposed, scal…
View article: High-coverage testing of softwarized networks
High-coverage testing of softwarized networks Open
Network operators face a challenge of ensuring correctness as networks grow more complex, in terms of scale and increasingly in terms of diversity of software components. Network-wide verification approaches can spot errors, but assume a s…
View article: Let me rephrase that
Let me rephrase that Open
Enterprise networks today have highly diverse correctness requirements and relatively common performance objectives. As a result, preferred abstractions for enterprise networks are those which allow matching correctness specification, whil…
View article: Salmon: Robust Proxy Distribution for Censorship Circumvention
Salmon: Robust Proxy Distribution for Censorship Circumvention Open
Many governments block their citizens’ access to much of the Internet. Simple workarounds are unreliable; censors quickly discover and patch them. Previously proposed robust approaches either have non-trivial obstacles to deployment, or re…
View article: Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses
Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses Open
Modern smartphones contain motion sensors, such as accelerometers and gyroscopes.These sensors have many useful applications; however, they can also be used to uniquely identify a phone by measuring anomalies in the signals, which are a re…
View article: Conjoining Emulation and Network Simulators on Linux Multiprocessors
Conjoining Emulation and Network Simulators on Linux Multiprocessors Open
Conjoinment of emulation and simulation in virtual time requires that emulated execution bursts be ascribed a duration in virtual time, and that emulated execution and simulation executions be coordinated within this common virtual time ba…
View article: Defending Tor from Network Adversaries: A Case Study of Network Path Prediction
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction Open
The Tor anonymity network has been shown vulnerable to traffic analysis attacks by autonomous systems (ASes) and Internet exchanges (IXes), which can observe different overlay hops belonging to the same circuit. We evaluate whether network…
View article: Exploring Ways To Mitigate Sensor-Based Smartphone Fingerprinting
Exploring Ways To Mitigate Sensor-Based Smartphone Fingerprinting Open
Modern smartphones contain motion sensors, such as accelerometers and gyroscopes. These sensors have many useful applications; however, they can also be used to uniquely identify a phone by measuring anomalies in the signals, which are a r…