喜欢紫色的人是什么性格| 红顶商人是什么意思| 兔死狐悲指什么生肖| 一个木一个号念什么| 白血病有什么症状| 吃西洋参有什么好处| 尿路感染去医院挂什么科| 50年属什么生肖| 阑尾炎可以吃什么水果| 酸奶和牛奶有什么区别| 什么样的人容易中风| 为什么筋膜炎一躺下才会疼| 激素六项是查什么的| 葛优躺是什么意思| 什么是离子| 丁火是什么火| 木薯粉在超市里叫什么| 奶芙是什么| 为什么身上一热就痒| 养肝护肝吃什么最好| 棉纶是什么面料| 十一月十九是什么星座| 牛什么饭| 脚水肿是什么原因| 卟啉症是什么病| 挂号特需是什么意思| 08属什么生肖| 抑郁吃什么药可以缓解情绪| 客服是什么意思| vg是什么意思| 青岛有什么特产| 血液透析是什么意思| t恤搭配什么裤子好看| 什么啤酒好喝| 黄皮什么时候上市| 心室早复极是什么意思| 前列腺炎该吃什么药| 人打嗝是什么原因| 中医四诊指的是什么| 人工智能是什么意思| 什么样的大树| 什么不能托运| 鸡婆什么意思| 提报是什么意思| 什么地坐着| 收入是什么意思| 蚊子会传播什么疾病| 先祖是什么意思| 宫颈管短有什么症状| 眩晕看什么科| 嘴角上扬是什么意思| 为什么会长血管瘤| 湖南湖北以什么湖为界| 双亲是什么意思| 收获颇丰什么意思| 脑控是什么| 枣庄古代叫什么| 总蛋白是什么意思| 孕中期头疼是什么原因| 肌腱炎是什么症状| 血液科是看什么病| 睡觉为什么会打呼噜| 洋芋是什么东西| 关帝庙求什么最灵| 西亚是什么人种| 隐是什么意思| 护士节送什么鲜花| 普通门诊和专家门诊有什么区别| 八仙过海指什么生肖| 2月9号什么星座| 水猴子长什么样子| 子字属于五行属什么| 什么是割礼| 六月十七是什么星座| 胃泌素瘤是什么意思| 疝气长在什么位置图片| 春晓描写的是什么季节| 脚趾抽筋是什么原因| 人为什么会缺钾| 女人梦见老鼠什么征兆| saa是什么意思| browser什么意思| 鸟喜欢吃什么| 无极是什么意思| 白带正常是什么样子| 78年的马是什么命| 土鳖吃什么| 明胶是什么做的| 晚上胃疼是什么原因| 鱼爱吃什么| 处级上面是什么级别| 松绿色是什么颜色| 小时的单位是什么| 宝宝为什么吐奶| 吃什么增肥最快| 2月18什么星座| 汗脚是什么原因引起的| 鸡子是什么东西| 孩子是ab型父母是什么血型| 蛇靠什么爬行| 爱情是什么样子的| 胃烧灼吃什么立马缓解| 郎酒是什么香型| 得了幽门螺杆菌是什么症状| 胰腺炎为什么喝水就死| 田可以加什么偏旁| 什么的威尼斯| 中元节是什么节| 拉墨绿色的大便是什么原因| 时间是什么意思| 右侧卵巢内囊性结构什么意思| 预祝是什么意思| 几月初几是叫什么历| 什么是hpv感染| 松香是什么| 洗耳朵用什么药水| 插入阴道什么感觉| 手脱皮用什么药膏最好| 胸腺肿瘤是什么病| 前戏是什么意思| 阴道出血是什么样的| 87年是什么命| 拔罐紫色说明什么| 3475是什么罩杯| 什么叫npc| 梦见死去的亲人是什么意思| 黑猫警长是什么猫| 喉咙痰多吃什么药最好| 4月28日是什么日子| 临终关怀的目的是什么| nos是什么单位| 什么是sop流程| 翊什么意思| 81岁属什么| 盂是什么意思| 汉堡是什么意思| 华为最新款手机是什么型号| ad是什么病的简称| 子宫有积液是什么原因引起的| 胃不好吃什么最养胃| 缺铁性贫血吃什么水果| 肺结核阳性是什么意思| c2可以开什么车| 吃什么降羊水最快| 躯体化什么意思| 吃海带有什么好处| 药鱼用什么药效果最好| 腺肌症是什么病| 胩是什么意思| 牵连是什么意思| 为什么会梦魇| 挪车打什么电话| 跌打损伤用什么药好得快| 王字旁行念什么| 戊肝阳性是什么意思| 肚子痛是什么原因| 津液是什么| 甍是什么意思| 电饭煲内胆什么材质好| 如什么如什么成语| 身上有淤青是什么原因| 生脉饮适合什么人群| 吃什么可以修复子宫内膜| 颈椎病吃什么药最好效果| 月季黑斑病用什么药| 蝉又叫什么名字| 下巴肿大是什么原因| 浮木是什么意思| 花对什么| 狮子座的幸运色是什么| 无忧什么意思| 尿常规粘液丝高是什么意思| 人为什么会得肿瘤| 吃什么食物对心脏有好处| 夫星是什么意思| 口水歌是什么意思| 涵字属于五行属什么| 长期服用丙戊酸钠有什么副作用| 下元节是什么节日| 月子能吃什么水果| ltp是什么意思| 什么是熵| sunny是什么意思| 为什么故宫龙椅坐不得| 睡眠浅是什么原因| 为什么气血不足| 隐血是什么意思| 总咳嗽是什么原因| z是什么品牌| 前置胎盘需要注意什么| 蛋糕用什么奶油好| 清洁度111是什么意思| 内痔用什么药治最好效果最快| 妈妈像什么| 热水器什么品牌好| 勾心斗角是什么生肖| 12月14号是什么星座| 宝宝胎动频繁说明什么| 左眼跳什么意思| 肝脏纤维化是什么意思| 脾阳不足吃什么中成药| AB型血型有什么优势| 什么地喝| 胜字五行属什么| 孕妇血糖高可以吃什么水果| 式可以加什么偏旁| 什么颜色的包包招财并聚财| 吃皮蛋有什么好处和坏处| 气血不足吃什么比较好| 血红蛋白偏低什么意思| 丝瓜不能和什么食物一起吃| 结石是什么原因引起的| 肛瘘是什么意思| 手麻脚麻吃什么药| 右眼上眼皮跳是什么预兆| 脖子上长小肉疙瘩是什么原因| pyq是什么意思| 手上的三条线分别代表什么| 志司是什么意思| 胸是什么| 脉沉细是什么意思| 肚子胀气放屁吃什么药| 为什么女生会来月经| 什么冰箱好| 头顶长白头发是什么原因造成的| 喷的右边念什么| 白参是什么参| philips是什么牌子| 10月9日什么星座| stories是什么意思| 契丹族现在是什么族| 20岁属什么的生肖| living是什么意思| 西瓜又什么又什么填空| 逐是什么意思| 什么叫窦性心律不齐| 橙子皮泡水喝有什么好处| 大年初一是什么生肖| 脚脖子肿是什么原因| 公主抱是什么意思| 第一次是什么感觉| 做梦房子倒塌什么预兆| 大便失禁吃什么药| 孙耀威为什么被雪藏| 咳嗽流鼻涕吃什么药| 三个耳读什么| 缺钾有什么症状| dw是什么| 生育能力检查挂什么科| emba是什么意思| 本科生是什么意思| 阳历九月份是什么星座| 萌宠是什么意思| 脂肪肝吃什么最好| 吃什么除体内湿气最快| 心脏痛吃什么药效果好| 掉头发多是什么原因| 巴基斯坦人说什么语言| 好好活着比什么都重要| 拉油便是什么原因| 1972属什么| 三文鱼长什么样| 春天有什么花开| 五十岁是什么之年| 百度

国防部の呉謙報道官、日本の「中国安全保障レポート」にコメント

ANRP Winners for 2025

百度   另外,此次是分团而战:“新百人团”由12岁以下的少儿团、12岁以上在校学生的青年团、社会各行各业的百行团、参赛者亲属的家庭团四个团组成。

The following will receive the Applied Networking Research Prize during the IRTF Open Meeting at IETF-123 in Madrid on Thursday, July 24, 2025:

Haarika Manda
For her work on studying Internet Access Inequities in the US:
Haarika Manda, Varshika Srinivasavaradhan, Laasya Koduru, Kevin Zhang, Xuanhe Zhou, Udit Paul, Elizabeth Belding, Arpit Gupta, and Tejas N. Narechania. The Efficacy of the Connect America Fund in Addressing US Internet Access Inequities Proceedings SIGCOMM 2024.
Paper Slides
Hendrik Cech
For his work on Starlink performance measurements:
Nitinder Mohan, Andrew E. Ferguson, Hendrik Cech, Rohan Bose, Prakita Rayyan Renatin, Mahesh K. Marina, and J?rg Ott. A Multifaceted Look at Starlink Performance. Proceedings of the ACM Web Conference 2024 (WWW ‘24).
Paper Slides

The following people will receive the Applied Networking Research Prize at IETF meetings later in 2025: Jacob Ginesin, Saksham Agarwal,

A total of 69 nominations were received for the Applied Networking Research Prize (ANRP) 2025. Each nomination was reviewed by several members of the selection committee according to a diverse set of criteria, including scientific merit, relevance to IETF and/or IRTF activities, and the potential of the nominee to have impact in the community.

Nominations

Nominations for ANRP 2026 will be accepted starting in September 2025.

Contact anrp@irtf.org if you have questions about the ANRP.

About the ANRP

The Applied Networking Research Prize (ANRP) is awarded to recognise the best recent results in applied networking, interesting new research ideas of potential relevance to the Internet standards community, and upcoming people that are likely to have an impact on Internet standards and technologies, with a particular focus on cases where these people or ideas would not otherwise get much exposure or be able to participate in the discussion.

We encourage nominations of researchers with relevant research results, interesting ideas, and new perspectives. The award will offer them the opportunity to present and discuss their work with the engineers, network operators, policy makers, and scientists that participate in the Internet Engineering Task Force (IETF) and its research arm, the Internet Research Task Force (IRTF). Both self- and third-party nominations for this prize are encouraged.

The Applied Networking Research Prize (ANRP) consists of:

  • a cash prize of $1000 (USD)
  • an invited talk at the IRTF Open Meeting
  • a travel grant to attend a week-long IETF meeting (airfare, hotel, registration, stipend)
  • recognition at the IETF plenary
  • an invitation to related social activities

In addition, prize winners may be offered additional travel grants to attend future IETF and/or IRTF meetings. Such grants are made at the discretion of the award committee, based on community feedback, engagement with the community, and potential future impact.

Applied Networking Research Prize awards are made once per calendar year with a nomination deadline in late November. Each year, several winners will be chosen and invited to present their work at one of the three IETF meetings during the following year.

How to Nominate

Nominations are for a single author of an original, peer-reviewed, journal, conference or workshop paper that was recently published or accepted for publication. The nominee must be one of the main authors of the nominated paper. Both self-nominations (nominating one’s own paper) and third-party nominations (nominating someone else’s paper, with their permission) are encouraged.

The nominated paper should provide a scientific foundation for possible future engineering work in the IETF, or research and experimentation in the IRTF. It should analyze the behavior of Internet protocols in operational deployments or realistic testbeds, make an important contribution to the understanding of Internet scalability, performance, reliability, security or capability, or otherwise be of relevance to ongoing or future IETF or IRTF activities.

Nominations must briefly describe how the nominated paper relates to these goals. They should describe how involving the nominee in the IETF and IRTF process, and bringing them to an IETF meeting, would help to foster the transition of the results and/or ideas into new IETF engineering work or IRTF experimentation, or otherwise seed new activities that will have an impact on the real-world Internet.

The goal of the Applied Networking Research Prize (ANRP) is to foster the transitioning of research results into real-world benefits for the Internet. Therefore, applicants must indicate that they (or the nominee, in case of third-party nominations) are available to attend at least one of the IETF meetings in the following year.

Nominations are submitted via the submission site and must include:

  • the name and email address of the nominee;
  • a bibliographic reference to the published (or accepted) nominated paper;
  • a PDF copy of the nominated paper;
  • a statement that describes how the nominated paper fulfills the goals of the award and how the nominee would engage with the IETF and/or IRTF community;
  • a statement of the nominees availability to present their work at the IETF meetings in the award year;
  • a statement that the nominee accepts that the IRTF Intellectual Property Rights disclosure rules will apply to their award talk at the IRTF open meeting;
  • a brief biography for the nominee; and
  • optionally, any other supporting information (link to nominee’s web site, etc.)

All nominees will be notified by email about the decision regarding their nomination.

Papers nominated for the Applied Networking Research Prize (ANRP) are not considered to be contributions to the IETF or IRTF. However, the invited talks about those papers given at the IRTF Open Meeting are considered to be contributions and the IRTF Intellectual Property Rights disclosure rules apply.

Nominees should note that their award talk will be streamed live online and recorded. The recording will be made availably online after the meeting along with a record of the award.

Sponsors

The Applied Networking Research Prize (ANRP) is supported by the Internet Society in coordination with the Internet Research Task Force (IRTF).

? ? ? ? ? Comcast

Additional corporate sponsorship for the ANRP is kindly provided by:

? ? ? ? ? NBC Universal

?

? ? ? ? ? Comcast

If your organization would like to support the ANRP, please contact anrp@irtf.org.

“We like the Applied Network Research Prize because it encourages novel research that helps companies like Comcast and our partners build better Internet services and technologies for end users, and helps the community move important standards work into deployable technology more effectively.”

Jason Livingood, Vice President - Internet Services, Comcast

Award Committee

An award committee comprised of individuals knowledgeable about the IRTF, IETF and the broader networking research community will evaluate the submissions against these selection criteria.

The ANRP award committee for 2025 will comprise:

Past Prize Winners

The following Applied Networking Prizes have been awarded in the past:

At IETF-121, to Sawsan El-Zahr
For her work to reduce the carbon footprint of Internet routing:
Sawsan El-Zahr, Paul Gunning, and Noa Zilberman, Exploring the Benefits of Carbon-Aware Routing, Proceedings ACM CoNEXT 2023.
Paper Slides
At IETF-121, to Mingshi Wu
For his work to understand censorship of fully encrypted traffic:
Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, and Eric Wustrow, How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic, USENIX Security Symposium 2023.
Paper Slides
At IETF-120, to Xieyang Xu
For his work on improving test coverage for network configurations:
Xieyang Xu, Weixin Deng, Ryan Beckett, Ratul Mahajan, and David Walker, Test Coverage for Network Configurations, Proceedings of USENIX NSDI 2023.
Paper Slides
At IETF-120, to Yevheniya Nosyk
For her work on understsnding root causes of DNS resolution failures:
Yevheniya Nosyk, Maciej Korczyński, and Andrzej Duda, Extended DNS Errors: Unlocking the Full Potential of DNS Troubleshooting, Proceedings of ACM IMC 2023.
Paper Slides
At IETF-120, to Harjasleen Malvai
For her work on key transparency for encrypted messaging:
Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh∥, Ercan Oztürk, Kevin Lewi, and Sean Lawlo, Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging, Proceedings of the Network and Distributed System Security (NDSS) Symposium 2023.
Paper Slides
At IETF-119, to Dongqi Han for his work on context shift adaptation in anomaly detection systems
Dongqi Han, Zhiliang Wang, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Zhihua Wang, Minghui Jin, Jiahai Yang, Xingang Shi, Xia Yin, Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation, Proceedings of the Network and Distributed System Security (NDSS) Symposium 2023.
Paper Slides
At IETF-118, to Siva Kakarla for his work on verifying the correctness of nameservers
Siva Kesava Reddy Kakarla, Ryan Beckett, Todd Millstein, and George Varghese, “SCALE: Automatically Finding RFC Compliance Bugs in DNS Nameservers”, Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI) 2022.
Paper Slides
At IETF-118, to Dennis Trautwein for his work on content-addressable peer-to-peer storage:
Dennis Trautwein, Aravindh Raman, Gareth Tyson, Ignacio Castro, Will Scott, Moritz Schubotz, Bela Gipp, and Yiannis Psaras, “Design and Evaluation of IPFS: A Storage Layer for the Decentralized Web” Proceedings of the ACM SIGCOMM Conference 2022.
Paper Slides
At IETF-118, to Ram Sundara Raman for his work on identifying and locating in-network censorship devices:
Ram Sundara Raman, Mona Wang, Jakub Dalek, Jonathan Mayer, and Roya Ensafi “Network Measurement Methods for Locating and Examining Censorship Devices” Proceedings of ACM CoNEXT 2022.
Paper Slides
At IETF-117, to Simon Scherrer for his work on modelling the BBR congestion control algorithm
Simon Scherrer, Markus Legner, Adrian Perrig, and Stefan Schmid, “Model-Based Insights on the Performance, Fairness, and Stability of BBR”, Proceedings of the ACM Internet Measurement Conference, 2022.
Paper Slides
At IETF-116, to Boris Pismenny for his work on novel NIC offloading architectures:
Boris Pismenny, Haggai Eran, Aviad Yehezkel, Liran Liss, Adam Morrison, and Dan Tsafrir, “Autonomous NIC Offloads” Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) 2021.
Paper Slides Video
At IETF-116, to Arthur Selle Jacobs for his work on evaluating machine learning for network security:
Arthur S. Jacobs, Roman Beltiukov, Walter Willinger, Ronaldo A. Ferreira, Arpit Gupta, and Lisandro Z. Granville, “AI/ML for Network Security: The Emperor has no Clothes” Proceedings of the Conference on Computer and Communications Security (CCS) 2022
Paper ?Slides
At IETF-115, to Gautam Akiwate for his work on the risks of domain hijacking due to registrar practices:
Gautam Akiwate, Stefan Savage, Geoffrey M. Voelker, and K. C. Claffy, “Risky BIZness: Risks Derived from Registrar Name Management” Proceedings of the Internet Measurement Conference, 2021.
Paper Slides
At IETF-115, to Corinne Cath for her ethnographic work on the IETF’s distinct organizational culture and how its ‘rough’ edges limit the ability of human rights’ advocates to get their concerns included in technical discussions:
Corinne Cath, “The Technology We Choose to Create: Human Rights Advocacy in the Internet Engineering Task Force” Telecommunications Policy Journal, volume 45, number 6, 2021
Paper Thesis Slides
At IETF-115, to Daniel Wagner for his work on DDoS attack detection and mitigation:
Daniel Wagner, Daniel Kopp, Matthias Wichtlhuber, Christoph Dietzel, Oliver Hohlfeld, Georgios Smaragdakis, and Anja Feldmann, “United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale”, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2021
Paper Slides
At IETF-114, to Tushar Swamy for his work on data plane architectures for line-rate inference:
Tushar Swamy, Alexander Rucker, Muhammad Shahbaz, Ishan Gaur, and Kunle Olukotun “Taurus: A Data Plane Architecture for Per-Packet ML”, Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems, 2022. Also available on arXiv.
Paper slides
At IETF-114, to Sam Kumar for his work on TCP for low-power wireless networks:
Sam Kumar, Michael Andersen, Hyung-Sin Kim, and David Culler “Performant TCP for Low-Power Wireless Networks”, Proceedings of the USENIX Symposium on Networked Systems Design and Implementation, 2020.
Paper Slides
At IETF-113, to Sangeetha Abdu Jyothi for her work on the resilience of the Internet infrastructure to solar superstorms (large scale coronal mass ejections):
Sangeetha Abdu Jyothi, “Solar superstorms: planning for an internet apocalypse”, Proceedings of the ACM SIGCOMM Conference, 2021
Paper Slides
At IETF-113, to Bruce Spang for his work showing that networking algorithm A/B tests can be biased because of network congestion:
Bruce Spang, Veronica Hannan, Shravya Kunamalla, Te-Yuan Huang, Nick McKeown, and Ramesh Johari “Unbiased experiments in congested networks”, Proceedings of the ACM Internet Measurement Conference Conference, 2021
Paper Slides
At IETF-112, to Thomas Wirtgen for his work on the extensibility of BGP implementations, and other routing protocols:
Thomas Wirtgen, Quentin De Coninck, Randy Bush, Laurent Vanbever, and Olivier Bonaventure, “xBGP: When You Can’t Wait for the IETF and Vendors”, Proceedings of ACM HotNets, 2020
Paper Slides
At IETF-112, to Aqsa Kashaf for her work studying the effects of third-party service dependencies in the Internet
Aqsa Kashaf, Vyas Sekar, and Yuvraj Agarwal, “Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?”, Proceedings of ACM IMC 2020
Paper Slides
At IETF-112, to Kevin Bock for his work on Internet censorship:
Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, and Dave Levin, “Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion”, Proceedings of ACM SIGCOMM 2020
Paper Slides
At IETF-111, to Rüdiger Birkner for his work on network specification and verification:
Rüdiger Birkner, Dana Drachsler-Cohen, Laurent Vanbever, and Martin Vechev, “Config2spec: Mining Network Specifications from Network Configurations”, Proceedings of USENIX NSDI 2020.
Paper Slides
At IETF-111, to Sadjad Fouladi for his work on low-latency video streaming (awarded in 2020):
Sadjad Fouladi, John Emmons, Emre Orbay, Catherine Wu, Riad S. Wahby, and Keith Winstein, “Salsify: low-latency network video through tighter integration between a video codec and a transport protocol”, Proceedings of USENIX NSDI 2018.
Paper Slides
At IETF-110, to Francis Y. Yan for his work on applying machine learning to video bit-rate adaptation:
Francis Y. Yan, Hudson Ayers, Chenzhi Zhu, Sadjad Fouladi, James Hong, Keyi Zhang, Philip Levis, and Keith Winstein, “Learning in situ: a randomized experiment in video streaming”, Proceedings of USENIX NSDI 2020
Paper Slides
At IETF-110, to Audrey Randall for her work on DNS caching and privacy :
Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, and Aaron Schulman, “Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers”, Proceedings of ACM IMC 2020
Paper Slides
At IETF-109, to Debopam Bhattacherjee for his work on the design of network topologies for low-earth orbit satellite constellations:
Debopam Bhattacherjee and Ankit Singla, “Network topology design at 27,000 km/hour”, Proceedings of ACM CoNEXT, Orlando, FL, USA, December 2019.
Paper Slides
At IETF-109, to Georgia Fragkouli for her work on Internet transparency:
Georgia Fragkouli, Katerina Argyraki, and Bryan Ford, “MorphIT: Morphing Packet Reports for Internet Transparency”, Proceedings on Privacy Enhancing Technologies, 2019
Paper Slides
At IETF-109, to Ranysha Ware for her work on congestion control fairness:
Ranysha Ware, Matthew K. Mukerjee, Srinivasan Seshan, and Justine Sherry, “Beyond Jain’s Fairness Index: Setting the Bar For The Deployment of Congestion Control Algorithms”, Proceedings of ACM HotNets, Princeton, NJ, USA, November 2019.
Paper Slides
At IETF-108, to Shehar Bano for her work to develop a taxonomy of Internet host liveness:
Shehar Bano, Philipp Richter, Mobin Javed, Srikanth Sundaresan, Zakir Durumeric, Steven J. Murdoch, Richard Mortier, and Vern Paxson, “Scanning the Internet for Liveness”, ACM Computer Communication Review, April 2018.
Paper Slides
At IETF-108, to Chaoyi Lu for his work on measuring DNS-over-encryption:
Chaoyi Lu, Baojun Liu, Zhou Li, Shuang Hao, Haixin Duan, Mingming Zhang, Chunying Leng, Ying Liu, Zaifeng Zhang, and Jian-ping Wu, “An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?”, Proceedings of the ACM Internet Measurement Conference, Amsterdam, The Netherlands, October 2019.
Paper Slides
At IETF-108, to Ingmar Poese for his work on traffic engineering:
Enric Pujol, Ingmar Poese, Johannes Zerwas, Georgios Smaragdakis, and Anja Feldmann, “Steering Hyper-Giants’ Traffic at Scale”, Proceedings of ACM CoNEXT, Orlando, FL, USA, December 2019.
Paper Slides
No awards were made at IETF-107, due to COVID-19 pandemic.
?
At IETF-106, to Weiteng Chen for his work on wireless network security:
Weiteng Chen and Zhiyun Qian Off-path TCP exploit: how wireless routers can jeopardize your secrets, Proceedings of the USENIX Security Symposium, Baltimore, MD, USA, August 2018.

At IETF-105, to Neta Rozen Schiff for her work on NTP security:
Omer Deutsch, Neta Rozen Schiff, Danny Dolev, and Michael Schapira, Preventing (Network) Time Travel with Chronos Proc. Network and Distributed Systems Security (NDSS) Symposium 2018, San Diego, CA, USA, February 2018.
At IETF-105, to Taejoong Chung for his work on Understanding the Role of Registrars in DNSSEC Deployment:
Taejoong Chung, Roland van Rijswijk-Deij, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, and Christo Wilson, Understanding the Role of Registrars in DNSSEC Deployment Proc. ACM Internet Measurement Conference (IMC), London, UK, November 2017.
At IETF-104, to Florian Streibelt for showing how BGP communities can be exploited by remote parties to influence Internet routing:
Florian Streibelt, Franziska Lichtblau, Robert Beverly, Anja Feldmann, Cristel Pelsser, Georgios Smaragdakis, and Randy Bush. BGP Communities: Even more Worms in the Routing Can. Proc. ACM Internet Measurement Conference 2018 (IMC ‘18). Boston, MA, USA, October 2018.
At IETF-104, to Brandon Schlinker for presenting the first public analysis of a global, SDN-based content delivery solution serving over two billion users including real-time performance measurements:
Brandon Schlinker, Hyojeong Kim, Timothy Cui, Ethan Katz-Bassett, Harsha V. Madhyastha, Italo Cunha, James Quinn, Saif Hasan, Petr Lapukhov, and Hongyi Zeng. Engineering Egress with Edge Fabric: Steering Oceans of Content to the World. Proc. ACM SIGCOMM Conference. Los Angeles, CA, USA, August 2017.
At IETF-103, to Johanna Amann for the first large scale investigation of recently deployed web security features including their combined impact:
J. Amman, O. Gasser, Q. Scheitle, L. Brent, G. Carle, R. Holz. Mission Accomplished? HTTPS Security after DigiNotar. Proc. 17th Internet Measurement Conference (IMC’17), November 2017.
At IETF-103, to Arash Molavi Kakhki for a detailed analysis of multiple versions of a rapidly evolving, new transport protocol in a large number of environments:
Arash Molavi Kakhki, Samuel Jero, David Choffnes, Alan Mislove, Cristina Nita-Rotaru. Taking a Long Look at QUIC: An Approach for Rigorous Evaluation of Rapidly Evolving Transport Protocols. Proc. 17th Internet Measurement Conference (IMC’17), November 2017.
At IETF-102, to Maria Apostolaki for a detailed analysis of the impact that Internet routing attacks (such as BGP hijacks) and malicious Internet Service Providers (ISP) can have on the Bitcoin cryptocurrency:
Maria Apostolaki, Aviv Zohar, Laurent Vanbever. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. Proc. IEEE Symposium on Security and Privacy 2017. San Jose, CA , USA (May 2017).
At IETF-102, to Panos Papadimitratos for improving our understanding of vehicular public key infrastructure in terms of security, privacy protection, and efficiency:
M. Khodaei, H. Jin, and P. Papadimitratos. SECMACE: Scalable and Robust Identity and Credential Infrastructure in Vehicular Communication. IEEE Transactions on Intelligent Transportation Systems (IEEE ITS), April 2018.
At IETF-101, to Mojgan Ghasemi for a detailed analysis of the performance of a commercial video streaming service:
Mojgan Ghasemi, Partha Kanuparthy, Ahmed Mansy, Theophilus Benson, Jennifer Rexford. Performance Characterization of a Commercial Video Streaming Service. Proc. Internet Measurement Conference (IMC) 2016, Santa Monica, California, USA, Nov. 2016.
At IETF-101, to Vaspol Ruamviboonsuk for improving web client and server interactions to enhance webpage load times:
V. Ruamviboonsuk, R. Netravali, M. Uluyol, H. Madhyastha. Vroom: Accelerating the Mobile Web with Server-Aided Dependency Resolution. Proc. Conference of the ACM Special Interest Group on Data Communication (SIGCOMM ‘17). ACM, New York, NY, USA.
At IETF-100, to Paul Emmerich for developing the high-speed packet generator MoonGen:
Paul Emmerich, Sebastian Gallenmüller, Daniel Raumer, Florian Wohlfart, and Georg Carle. MoonGen: A Scriptable High-Speed Packet Generator. Proc. Internet Measurement Conference (IMC) 2015, Tokyo, Japan, Oct. 2015.
At IETF-100, to Roland van Rijswijk-Deij for analysing the impact of elliptic curve cryptography on DNSSEC validation performance:
Roland van Rijswijk-Deij, Kaspar Hageman, Anna Sperotto and Aiko Pras. The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation. Proc. IEEE/ACM Transactions on Networking, Volume 25, Issue 2, April 2017.
At IETF-99, to Stephen Checkoway for a Systematic Analysis of the Juniper Dual EC Incident:
Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, and Hovav Shacham. A Systematic Analysis of the Juniper Dual EC Incident Proc. ACM Conference on Computer and Communications Security 2016, pp. 468–479. ACM Press, Oct. 2016.
At IETF-99, to Philipp Richter for a Multi-perspective Analysis of Carrier-Grade NAT Deployment:
P. Richter, F. Wohlfart, N. Vallina-Rodriguez, M. Allman, R. Bush, A. Feldmann, C. Kreibich, N. Weaver, and V. Paxson. A Multi-perspective Analysis of Carrier-Grade NAT Deployment Proc. ACM IMC, Santa Monica, CA, USA, December 2016.
At IETF-98, to Yossi Gilad for the “path-end validation” extension to the RPKI:
Avichai Cohen, Yossi Gilad, Amir Herzberg and Michael Schapira. Jumpstarting BGP Security with Path-End Validation. Proc. ACM SIGCOMM, Florianópolis, Brazil, August 2016.
At IETF-98, to Alistair King for a framework to enable efficient processing of large amounts of distributed and/or live BGP data:
Chiara Orsini, Alistair King, Danilo Giordano, Vasileios Giotsas and Alberto Dainotti. BGPStream: A Software Framework for Live and Historical BGP Data Analysis. Proc. ACM IMC, Santa Monica, CA, USA, December 2016.
At IETF-97, to Olivier Tilmans for the Fibbing architecture that enables central control over distributed routing:
Stefano Vissicchio, Olivier Tilmans, Laurent Vanbever and Jennifer Rexford. Central Control Over Distributed Routing. Proc. ACM SIGCOMM, London, UK, August 2015.
At IETF-97, to Benjamin Hesmans for enabling applications to control how Multipath TCP transfers data:
Benjamin Hesmans, Gregory Detal, Sebastien Barre, Raphael Bauduin and Olivier Bonaventure. SMAPP: Towards Smart Multipath TCP-enabled APPlications. Proc. ACM CoNEXT, Heidelberg, Germany, December 2015.
At IETF-96, to Samuel Jero for a security analysis of the QUIC protocol:
Robert Lychev, Samuel Jero, Alexandra Boldyreva and Cristina Nita-Rotaru. How Secure and Quick is QUIC? Provable Security and Performance Analyses. Proc. IEEE Symposium on Security and Privacy, pp. 214–231, San Jose, CA, USA, May 2015.
At IETF-96, to Dario Rossi for characterizing anycast adoption and deployment in the IPv4 Internet:
Danilo Cicalese, Jordan Augé, Diana Joumblatt, Timur Friedman and Dario Rossi. Characterizing IPv4 Anycast Adoption and Deployment. Proc. ACM CoNEXT, Heidelberg, Germany, December 2015.
At IETF-95, to Roya Ensafi for examining how the Chinese “great firewall” discovers hidden circumvention servers:
Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, and Vern Paxson. Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proc. ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 28-30, 2015.
At IETF-95, to Zakir Durumeric for an empirical analysis of email delivery security:
Zakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Elie Bursztein, Nicolas Lidzborski, Kurt Thomas, Vijay Eranti, Michael Bailey, and J. Alex Halderman. Neither Snow Nor Rain Nor MITM… An Empirical Analysis of Email Delivery Security. Proc. ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 28-30, 2015.
At IETF-94, to Xiao Sophia Wang for a systematic study of web page load times under SPDY:
Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy and David Wetherall. How Speedy is SPDY? Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, USA, April 2-4, 2014.
At IETF-94, to Roland van Rijswijk-Deij for a detailed measurement study on a large dataset of DNSSEC-signed domains:
Roland van Rijswijk-Deij, Anna Sperotto, and Aiko Pras. DNSSEC and its Potential for DDoS Attacks: A Comprehensive Measurement Study. Proc. ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014.
At IETF-93, to Haya Shulman for analyzing the deficiencies of DNS privacy approaches:
Haya Shulman. Pretty Bad Privacy: Pitfalls of DNS Encryption. Proc. ACM Workshop on Privacy in the Electronic Society (WPES), Scottsdale, AZ, USA, November 3, 2014.
At IETF-93, to Jo?o Luís Sobrinho for designing a route-aggregation technique that allows filtering while respecting routing policies:
Jo?o Luís Sobrinho, Laurent Vanbever, Franck Le and Jennifer Rexford. Distributed Route Aggregation on the Global Network. Proc. ACM CoNEXT, Sydney, Australia, December 2-5, 2014.
At IETF-92, to Aaron Gember-Jacobson for designing and evaluating an NFV control plane:
Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das and Aditya Akella. OpenNF: Enabling Innovation in Network Function Control. Proc. ACM SIGCOMM, Chicago, IL, USA, August 2014.
At IETF-91, to Sharon Goldberg for discussing threats when BGP RPKI authorities are faulty, misconfigured, compromised, or compelled to misbehave:
Danny Cooper, Ethan Heilman, Kyle Brogle, Leonid Reyzin and Sharon Goldberg. On the Risk of Misbehaving RPKI Authorities. Proc. ACM Workshop on Hot Topics in Networks (HotNets-XII), College Park, MD, USA, November 2013.
At IETF-91, to Tobias Flach for the design of novel loss recovery mechanisms for TCP that minimize timeout-driven recovery:
Tobias Flach, Nandita Dukkipati, Andreas Terzis, Barath Raghavan, Neal Cardwell, Yuchung Cheng, Ankur Jain, Shuai Hao, Ethan Katz-Bassett, Ramesh Govindan. Reducing Web Latency: the Virtue of Gentle Aggression. Proc. ACM SIGCOMM, Hong Kong, China, August 2013.
At IETF-91, to Misbah Uddin for developing matching and ranking for network search queries to make operational data available in real-time to management applications:
Misbah Uddin, Rolf Stadler and Alexander Clemm. Scalable Matching and Ranking for Network Search. Proc. International Conference on Network and Service Management (CNSM), Zürich, Switzerland, October 2013.
At IETF-90, to Robert Lychev for studying the security benefits provided by partially-deployed S*BGP:
Robert Lychev, Sharon Goldberg and Michael Schapira. BGP Security in Partial Deployment. Proc. ACM SIGCOMM, Hong Kong, China, August 2013.
At IETF-89, to Kenny Paterson for finding and documenting new attacks against TLS and DTLS:
N. J. Al Fardan and K. G. Paterson. Lucky Thirteen: Breaking the TLS and DTLS Record Protocols. Proc. IEEE Symposium on Security and Privacy, pp. 526–540, San Francisco, CA, USA, May 2013.
At IETF-89, to Keith Winstein for designing a transport protocol for interactive applications that desire high throughput and low delay:
Keith Winstein, Anirudh Sivaraman, and Hari Balakrishnan. Stochastic Forecasts Achieve High Throughput and Low Delay over Cellular Networks. Proc. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI), Lombard, IL, USA, April 2013.
At IETF-88, to Idilio Drago for characterizing traffic and workloads of the Dropbox cloud storage system:
Idilio Drago, Marco Mellia, Maurizio M. Munafo, Anna Sperotto, Ramin Sadre and Aiko Pras. Inside Dropbox: Understanding Personal Cloud Storage Services. Proc. ACM Internet Measurement Conference (IMC), Boston, MA, USA, November 2012.
At IETF-87, to Te-Yuan Huang for insights into the difficulties of rate adaptation for streaming video:
Te-Yuan Huang, Nikhil Handigol, Brandon Heller, Nick McKeown and Ramesh Johari. Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard. Proc. ACM Internet Measurement Conference (IMC), Boston, MA, USA, November 2012.
At IETF-87, to Laurent Vanbever for proposing a framework to allow seamless BGP reconfigurations:
Stefano Vissicchio, Laurent Vanbever, Cristel Pelsser, Luca Cittadini, Pierre Francois and Olivier Bonaventure. Improving Network Agility with Seamless BGP Recon?gurations. Proc. IEEE/ACM Transactions on Networking (TON), Volume 21, Issue 3, June 2013, pp 990-1002.
At IETF-86, to Gonca Gürsun for defining a metric that allows an analysis of BGP routing policies:
Gonca Gürsun, Natali Ruchansky, Evimaria Terzi and Mark Crovella. Routing State Distance: A Path-based Metric For Network Analysis. Proc. ACM Internet Measurement Conference (IMC), Boston, MA, USA, November 2012.
At IETF-85, to Srikanth Sundaresan for his measurement study of access link performance on home gateway devices:
Srikanth Sundaresan, Walter de Donato, Nick Feamster, Renata Teixeira, Sam Crawford and Antonio Pescapè. Broadband Internet Performance: A View From the Gateway. Proc. ACM SIGCOMM, Toronto, Canada, August 2011.
At IETF-85, to Peyman Kazemian for developing a general and protocol-agnostic framework for statically checking network specifications and configurations:
Peyman Kazemian, George Varghese and Nick McKeown. Header Space Analysis: Static Checking For Networks. Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, USA, April 2012.
At IETF-84, to Alberto Dainotti for his research into Internet communication disruptions due to filtering:
Alberto Dainotti, Claudio Squarcella, Emile Aben, K.C. Claffy, Marco Chiesa, Michele Russo and Antonio Pescapè. Analysis of Country-wide Internet Outages Caused by Censorship. Proc. ACM Internet Measurement Conference (IMC), Berlin, Germany, November 2011.
(No ANRP was awarded at IETF-83, due to the change to a yearly award cycle.)
At IETF-82, to Michio Honda for his research into determining the future extensibility of TCP:
Michio Honda, Yoshifumi Nishida, Costin Raiciu, Adam Greenhalgh, Mark Handley and Hideyuki Tokuda. Is it Still Possible to Extend TCP? Proc. ACM Internet Measurement Conference (IMC), Berlin, Germany, November 2011.
At IETF-82, to Nasif Ekiz for his analysis of misbehaving TCP receivers:
Nasif Ekiz, Abuthahir Habeeb Rahman and Paul D. Amer. Misbehaviors in TCP SACK Generation. ACM SIGCOMM Computer Communication Review, Volume 41, Issue 2, April 2011.
At IETF-81, to Mattia Rossi for his research into reducing BGP traffic:
Geoff Huston, Mattia Rossi and Grenville Armitage. A Technique for Reducing BGP Update Announcements through Path Exploration Damping. IEEE Journal on Selected Areas in Communications (JSAC), Vol. 28, No. 8, pp. 1271–1286, October 2010.
At IETF-81, to Beichuan Zhang for his research into “green” traffic engineering:
Mingui Zhang, Cheng Yi, Bin Liu and Beichuan Zhang. GreenTE: Power-Aware Traffic Engineering. Proc. IEEE International Conference on Network Protocols (ICNP), pp. 21–30, October 2010.
不解之谜的意思是什么 烧心反酸水吃什么药 鲜卑族现在是什么族 美背是什么 二月一日是什么星座
纳肛是什么意思 藏红花泡水喝有什么功效 不可翻转干燥是什么意思 红颜知己的意思是什么 丙肝病毒抗体阴性是什么意思
胰岛素抵抗吃什么药 碱性食物都有什么 大乔叫什么 一什么彩虹 俄狄浦斯情结是什么意思
pubg什么意思 张国立的老婆叫什么名字 白化病是什么原因引起的 人间烟火什么意思 孕前检查挂什么科室
恋足癖是什么意思hcv9jop5ns0r.cn 包皮痒用什么药hcv8jop2ns1r.cn 腰椎骶化是什么意思imcecn.com 周杰伦得了什么病mmeoe.com 失落感是什么意思hcv8jop0ns2r.cn
咖啡渣子有什么用途hebeidezhi.com 去香港澳门旅游需要准备什么hcv8jop1ns5r.cn 28岁属什么的hcv8jop6ns3r.cn 合肥有什么特产hcv8jop5ns0r.cn 困水是什么意思hcv8jop9ns5r.cn
看日历是什么生肖hcv9jop5ns6r.cn 双字五行属什么hcv8jop0ns9r.cn 家庭长期饮用什么水最好hcv8jop6ns5r.cn 金不换是什么hcv9jop6ns5r.cn mlf操作是什么意思hcv7jop5ns5r.cn
什么酒好喝hcv9jop3ns1r.cn 什么情况下需要会诊hcv7jop5ns6r.cn 眉中间有竖纹代表什么hcv7jop9ns0r.cn 反清复明的组织叫什么hcv9jop1ns9r.cn 白带黄用什么药hcv9jop4ns5r.cn
百度