Katerina J. Argyraki

Orcid: 0009-0004-9470-2819

Affiliations:
  • Swiss Federal Institute of Technology in Lausanne, Switzerland


According to our database1, Katerina J. Argyraki authored at least 58 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Localizing Traffic Differentiation.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Using Gaming Footage as a Source of Internet Latency Information.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

The Case for Performance Interfaces for Hardware Accelerators.
Proceedings of the 19th Workshop on Hot Topics in Operating Systems, 2023

Learning a QoE Metric from Social Media and Gaming Footage.
Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, 2023

Caching and Neutrality.
Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, 2023

2022
Automated Verification of Network Function Binaries.
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022

Performance Interfaces for Network Functions.
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022

2021
When to Hedge in Interactive Services.
Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation, 2021

2019
MorphIT: Morphing Packet Reports for Internet Transparency.
Proc. Priv. Enhancing Technol., 2019

Retroactive Packet Sampling for Traffic Receipts.
Proc. ACM Meas. Anal. Comput. Syst., 2019

Verifying software network functions with no verification expertise.
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 2019

Performance Contracts for Software Network Functions.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019

2018
Automated synthesis of adversarial workloads for network functions.
Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, 2018

ResQ: Enabling SLOs in Network Function Virtualization.
Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation, 2018

2017
How to Measure the Killer Microsecond.
Comput. Commun. Rev., 2017

A Formally Verified NAT.
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

Verifying Reachability in Networks with Mutable Datapaths.
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017

Generating Steganographic Text with LSTMs.
Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017

2016
Creating Secrets Out of Packet Erasures.
IEEE Trans. Inf. Forensics Secur., 2016

Matryoshka: Hiding Secret Communication in Plain Sight.
Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet, 2016

VNToR: Network Virtualization at the Top-of-Rack Switch.
Proceedings of the Seventh ACM Symposium on Cloud Computing, 2016

2015
Software dataplane verification.
Commun. ACM, 2015

New Directions for Network Verification.
Proceedings of the 1st Summit on Advances in Programming Languages, 2015

Towards unconditional tor-like anonymity.
Proceedings of the 2015 International Symposium on Network Coding, 2015

Transparency Instead of Neutrality.
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16, 2015

2014
Verifying Isolation Properties in the Presence of Middleboxes.
CoRR, 2014

Network neutrality inference.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

2013
SenseCode: Network coding for reliable sensor networks.
ACM Trans. Sens. Networks, 2013

Toward accurate and practical network tomography.
ACM SIGOPS Oper. Syst. Rev., 2013

Creating secrets out of erasures.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

Exchanging pairwise secrets efficiently.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Toward a verifiable software dataplane.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

2012
Optimal Source-Based Filtering of Malicious Traffic.
IEEE/ACM Trans. Netw., 2012

Toward Predictable Performance in Software Packet-Processing Platforms.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

Creating shared secrets out of thin air.
Proceedings of the 11th ACM Workshop on Hot Topics in Networks, 2012

2011
RouteBricks: enabling general purpose network infrastructure.
ACM SIGOPS Oper. Syst. Rev., 2011

Exchanging Secrets without Using Cryptography
CoRR, 2011

Evaluation of network coding techniques for a sniper detection application.
Proceedings of the 9th International Symposium on Modeling and Optimization in Mobile, 2011

Shifting network tomography toward a practical goal.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

2010
Joint identity-message coding.
IEEE J. Sel. Areas Commun., 2010

Netscope: Practical Network Loss Tomography.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Network tomography on correlated links.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

Evaluating the suitability of server network cards for software routers.
Proceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow, 2010

Controlling parallelism in a multicore software router.
Proceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow, 2010

Verifiable network-performance measurements.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

2009
Scalable network-layer defense against internet bandwidth-flooding attacks.
IEEE/ACM Trans. Netw., 2009

RouteBricks: exploiting parallelism to scale software routers.
Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, 2009

Compressed network coding vectors.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Optimal Filtering of Source Address Prefixes: Models and Algorithms.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Identity Aware Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Optimal Filtering of Malicious IP Sources
CoRR, 2008

Can software routers scale?
Proceedings of the ACM SIGCOMM 2008 Workshop on Programmable Routers for Extensible Services of Tomorrow, 2008

2007
Loss and Delay Accountability for the Internet.
Proceedings of the IEEE International Conference on Network Protocols, 2007

2006
Optimal Filtering for DDoS Attacks
CoRR, 2006

2005
Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks.
Proceedings of the 2005 USENIX Annual Technical Conference, 2005

2004
Protecting Public-Access Sites Against Distributed Denial-of-Service Attacks
CoRR, 2004

Loose source routing as a mechanism for traffic policies.
Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, 2004

2001
Rate - distortion optimal fast thresholding for MPEG - 2 image sequence coding.
Eur. Trans. Telecommun., 2001


  Loading...