The Blog

Pluginzing QUIC

by Quentin De Coninck, François Michel, Maxime Piraux, Florentin Rochet, Thomas Given-Wilson, Axel Legay, Olivier Pereira, Olivier Bonaventure Application requirements evolve over time and the...

Testé comme jamais...

Cet article présente SolverCheck, une bibliothèque libre de "test par propriétés" (property-based testing, PBT) qui a été spécifiquement conçue pour  tester les solveurs CP. En...

Implementation of a Feature-Based Context-Oriented...

This paper will be presented at The 11th International Workshop on Context-Oriented Programming and Advanced Modularity (COP), at ECOOP 2019 - 15-19 July 2019 - Hammersmith, London, United...

Beyond socket options: making the Linux TCP stack truly...

The Transmission Control Protocol (TCP) is one of the most important protocols in today’s Internet. It was designed to be extensible for various use cases. A client can propose to use an...

QUIC-FEC: Bringing the benefits of Forward Erasure...

Originally implemented by Google, QUIC gathers a growing interest by providing, on top of UDP, the same service as the classical TCP/TLS/HTTP/2 stack. The IETF will finalise the QUIC specification...

The superpowers of eBPF in the networking stack

eBPF is the extended Berkeley Packet Filter, a simple virtual machine that has been added to the Linux kernel. This virtual machine implements a simple RISC-like assembly language that enables...

Measurements As First-class Artifacts

The emergence of programmable switches has sparked a significant amount of work on new techniques to performmore powerful measurement tasks, for instance, to obtain fine-grained traffic and...

CG4SR: Near Optimal Traffic Engineering for Segment...

Segment Routing (SR) is a powerful tool to solve traffic engineering in large networks. It enables steering the traffic along any arbitrary network path while limiting scalability issues as...

Observing the Evolution of QUIC Implementations

The QUIC protocol combines features that were initially found inside the TCP, TLS and HTTP/2 protocols. The IETF is actively working on a complete specification of this protocol. More than a dozen...

Learning Computationally Efficient Metrics for Large...

Nearest neighbor (NN) classifiers rely on a distance metric either a priori fixed or previously estimated through metric learning. When such metric learning occurs, a natural objective is to...

The prize to the most visionary contribution in Data...

Thomas Bollen (Eura Nova), Guillaume Leurquin and Siegfried Nijssen (INGI) who received the IDA frontier prize for their article "ConvoMap: Using Convolution to Order Boolean Data" on the...

HomePad: A Privacy-aware Smart Hub for Home Environments

The adoption of smart home devices is hindered today by the privacy concerns users have regarding their personal data. Since these devices depend on remote service providers, users remain...

Leveraging eBPF for programmable network functions with...

With the advent of Software Defined Networks (SDN), Network Function Virtualisation (NFV) or Service Function Chaining (SFC), operators expect networks to support flexible services beyond the mere...

A Two-level Intrusion Detection System for Industrial...

Industrial Control Systems (ICS) can be defined as any systems used to monitor and control industrial processes, such as the ones in power plants or water treatment facilities. They are typically...