This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2024-07-04
Creation time: 07-20-26
--- Number of references
13
article
2019-kunze-ccwild-tnsm
Congestion Control in the Wild - Investigating Content Provider Fairness
IEEE Transactions on Network and Service Management
2019
12
27
17
2
1224 - 1238
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-kunze-ccwild-tnsm.pdf
1932-4537
10.1109/TNSM.2019.2962607
1
IkeKunze
JanRüth
OliverHohlfeld
inproceedings
2019-rueth-quic-userstudy
Perceiving QUIC: Do Users Notice or Even Care?
2019
12
maki,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-quic-userstudy.pdf
https://arxiv.org/abs/1910.07729
ACM
In Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '19)
Orlando, Florida, USA
International Conference on emerging Networking EXperiments and Technologies
9.12.2019-12.12.2019
10.1145/3359989.3365416
1
JanRüth
KonradWolsing
KlausWehrle
OliverHohlfeld
inproceedings
2019-hiller-lcn-sessionsharing
The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads
2019
10
14
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hiller-lcn-case_for_tls_session_sharing.pdf
IEEE
IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany
Osnabrück, Germany
44th IEEE Conference on Local Computer Networks (LCN)
October 14-17, 2019
en
978-1-7281-2561-9
10.1109/LCNSymposium47956.2019.9000667
1
JensHiller
MartinHenze
TorstenZimmermann
OliverHohlfeld
KlausWehrle
inproceedings
2019-sander-depcci
DeePCCI: Deep Learning-based Passive Congestion Control Identification
2019
8
18
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-sander-deepcci.pdf
https://arxiv.org/abs/1907.02323
ACM
In Proceedings of the ACM SIGCOMM Workshop on Network Meets AI & ML (NetAI '19)
Beijing, China
Workshop on Network Meets AI & ML
18.08.2019
10.1145/3341216.3342211
1
ConstantinSander
JanRüth
OliverHohlfeld
KlausWehrle
inproceedings
2019-wolsing-quicperf
A Performance Perspective on Web Optimized Protocol Stacks: TCP+TLS+HTTP/2 vs. QUIC
2019
7
22
maki,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-wolsing-quicperf.pdf
https://arxiv.org/abs/1906.07415
ACM
In Proceedings of the Applied Networking Research Workshop (ANRW '19)
Montreal, Quebec, Canada
Applied Networking Research Workshop at IETF-105
2019-07-22
10.1145/3340301.3341123
1
KonradWolsing
JanRüth
KlausWehrle
OliverHohlfeld
inproceedings
2019-hohlfeld-bpfperf
Demystifying the Performance of XDP BPF
2019
6
25
maki,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-bpfperf.pdf
IEEE
IEEE International Conference on Network Softwarization (NetSoft)
IEEE International Conference on Network Softwarization
10.1109/NETSOFT.2019.8806651
1
OliverHohlfeld
JohannesKrude
Jens HelgeReelfs
JanRüth
KlausWehrle
inproceedings
2019-rueth-ccfness
An Empirical View on Content Provider Fairness
2019
6
19
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-ccfness.pdf
https://arxiv.org/abs/1905.07152
IFIP/IEEE
In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '19)
Paris, France
Network Traffic Measurement and Analysis Conference
19.06.2019 - 21.06.2019
10.23919/TMA.2019.8784684
1
JanRüth
IkeKunze
OliverHohlfeld
inproceedings
2019_pennekamp_doppelganger
Hi Doppelgänger: Towards Detecting Manipulation in News Comments
2019
5
13
197-205
Public opinion manipulation is a serious threat to society, potentially influencing elections and the political situation even in established democracies. The prevalence of online media and the opportunity for users to express opinions in comments magnifies the problem. Governments, organizations, and companies can exploit this situation for biasing opinions. Typically, they deploy a large number of pseudonyms to create an impression of a crowd that supports specific opinions. Side channel information (such as IP addresses or identities of browsers) often allows a reliable detection of pseudonyms managed by a single person. However, while spoofing and anonymizing data that links these accounts is simple, a linking without is very challenging. In this paper, we evaluate whether stylometric features allow a detection of such doppelgängers within comment sections on news articles. To this end, we adapt a state-of-the-art doppelgängers detector to work on small texts (such as comments) and apply it on three popular news sites in two languages. Our results reveal that detecting potential doppelgängers based on linguistics is a promising approach even when no reliable side channel information is available. Preliminary results following an application in the wild shows indications for doppelgängers in real world data sets.
online manipulation; doppelgänger detection; stylometry
comtex
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-doppelganger.pdf
ACM
Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 4th Workshop on Computational Methods in Online Misbehavior (CyberSafety '19), May 13–17, 2019, San Francisco, CA, USA
San Francisco, California, USA
May 13-17, 2019
978-1-4503-6675-5/19/05
10.1145/3308560.3316496
1
JanPennekamp
MartinHenze
OliverHohlfeld
AndriyPanchenko
inproceedings
ReelfsMHH2019
Hashtag Usage in a Geographically-Local Microblogging App
2019
5
13
919-927
Anonymous Messaging; Location Based Messaging; User Behavior and Engagement; Information Diffusion; Hashtag
comtex
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-reelfs-jodel-hashtags.pdf
ACM
Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 9th International Workshop on Location and the Web (LocWeb '19), May 13–17, 2019, San Francisco, CA, USA
San Francisco, California, USA
International Workshop on Location and the Web
May 13–17, 2019
978-1-4503-6675-5/19/05
10.1145/3308560.3316537
1
HelgeReelfs
TimonMohaupt
OliverHohlfeld
NiklasHenckell
techreport
2019-rueth-blitzstart
Blitz-starting QUIC Connections
2019
5
8
arXiv:1905.03144 [cs.NI]
1--8
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-blitzstart.pdf
https://arxiv.org/abs/1905.03144
Online
COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University
Technical Report
en
JanRüth
KonradWolsing
MartinSerror
KlausWehrle
OliverHohlfeld
techreport
2019-hohlfeld-santa-tr
Application-Agnostic Offloading of Packet Processing
2019
4
1
arXiv:1904.00671 [cs.NI]
1--14
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-santatr.pdf
https://arxiv.org/abs/1904.00671
Online
COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University
Technical Report
en
OliverHohlfeld
HelgeReelfs
JanRüth
FlorianSchmidt
TorstenZimmermann
JensHiller
KlausWehrle
inproceedings
2019-rueth-icmp
Hidden Treasures - Recycling Large-Scale Internet Measurements to Study the Internet’s Control Plane
2019
3
27
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-icmp.pdf
https://arxiv.org/abs/1901.07265
Springer
In Proceedings of the Passive and Active Measurement Conference (PAM '19)
Puerto Varas, Chile
Passive and Active Measurement Conference (PAM 2019)
27.3.2018 - 29.3.2018
en
10.1007/978-3-030-15986-3_4
1
JanRüth
TorstenZimmermann
OliverHohlfeld
article
rueth:iw:TNSM19
TCP’s Initial Window – Deployment in the Wild and its Impact on Performance
IEEE Transactions on Network and Service Management
2019
1
30
16
2
389--402
maki
http://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-iwtnsm.pdf
1932-4537
10.1109/TNSM.2019.2896335
1
JanRüth
IkeKunze
OliverHohlfeld