Skip to main content

Showing 1–9 of 9 results for author: Sander, C

Searching in archive cs. Search in all archives.
.
  1. Does It Spin? On the Adoption and Use of QUIC's Spin Bit

    Authors: Ike Kunze, Constantin Sander, Klaus Wehrle

    Abstract: Encrypted QUIC traffic complicates network management as traditional transport layer semantics can no longer be used for RTT or packet loss measurements. Addressing this challenge, QUIC includes an optional, carefully designed mechanism: the spin bit. While its capabilities have already been studied in test settings, its real-world usefulness and adoption are unknown. In this paper, we thus invest… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

  2. ECN with QUIC: Challenges in the Wild

    Authors: Constantin Sander, Ike Kunze, Leo Blöcher, Mike Kosek, Klaus Wehrle

    Abstract: TCP and QUIC can both leverage ECN to avoid congestion loss and its retransmission overhead. However, both protocols require support of their remote endpoints and it took two decades since the initial standardization of ECN for TCP to reach 80% ECN support and more in the wild. In contrast, the QUIC standard mandates ECN support, but there are notable ambiguities that make it unclear if and how EC… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

    Comments: Accepted at the ACM Internet Measurement Conference 2023 (IMC'23)

  3. Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact

    Authors: Markus Dahlmanns, Constantin Sander, Robin Decker, Klaus Wehrle

    Abstract: Containerization allows bundling applications and their dependencies into a single image. The containerization framework Docker eases the use of this concept and enables sharing images publicly, gaining high momentum. However, it can lead to users creating and sharing images that include private keys or API secrets-either by mistake or out of negligence. This leakage impairs the creator's security… ▽ More

    Submitted 8 July, 2023; originally announced July 2023.

    Comments: 15 pages, 7 figures

    Journal ref: In Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (ASIA CCS '23), Association for Computing Machinery, New York, NY, USA, pages 797-811

  4. Tracking the QUIC Spin Bit on Tofino

    Authors: Ike Kunze, Constantin Sander, Klaus Wehrle, Jan Rüth

    Abstract: QUIC offers security and privacy for modern web traffic by closely integrating encryption into its transport functionality. In this process, it hides transport layer information often used for network monitoring, thus obsoleting traditional measurement concepts. To still enable passive RTT estimations, QUIC introduces a dedicated measurement bit - the spin bit. While simple in its design, tracking… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

    ACM Class: C.2.3

  5. Sharding and HTTP/2 Connection Reuse Revisited: Why Are There Still Redundant Connections?

    Authors: Constantin Sander, Leo Blöcher, Klaus Wehrle, Jan Rüth

    Abstract: HTTP/2 and HTTP/3 avoid concurrent connections but instead multiplex requests over a single connection. Besides enabling new features, this reduces overhead and enables fair bandwidth sharing. Redundant connections should hence be a story of the past with HTTP/2. However, they still exist, potentially hindering innovation and performance. Thus, we measure their spread and analyze their causes in t… ▽ More

    Submitted 27 October, 2021; originally announced October 2021.

    Comments: Accepted at the ACM Internet Measurement Conference 2021 (IMC'21)

  6. Video Conferencing and Flow-Rate Fairness: A First Look at Zoom and the Impact of Flow-Queuing AQM

    Authors: Constantin Sander, Ike Kunze, Klaus Wehrle, Jan Rüth

    Abstract: Congestion control is essential for the stability of the Internet and the corresponding algorithms are commonly evaluated for interoperability based on flow-rate fairness. In contrast, video conferencing software such as Zoom uses custom congestion control algorithms whose fairness behavior is mostly unknown. Aggravatingly, video conferencing has recently seen a drastic increase in use - partly ca… ▽ More

    Submitted 2 July, 2021; originally announced July 2021.

    Journal ref: International Conference on Passive and Active Network Measurement (PAM) 2021

  7. arXiv:2104.06467  [pdf, other

    q-bio.MN cs.LG

    Inference of cell dynamics on perturbation data using adjoint sensitivity

    Authors: Weiqi Ji, Bo Yuan, Ciyue Shen, Aviv Regev, Chris Sander, Sili Deng

    Abstract: Data-driven dynamic models of cell biology can be used to predict cell response to unseen perturbations. Recent work (CellBox) had demonstrated the derivation of interpretable models with explicit interaction terms, in which the parameters were optimized using machine learning techniques. While the previous work was tested only in a single biological setting, this work aims to extend the range of… ▽ More

    Submitted 13 April, 2021; originally announced April 2021.

    Comments: Accepted as a workshop paper at ICLR 2021 SimDL Workshop

  8. DeePCCI: Deep Learning-based Passive Congestion Control Identification

    Authors: Constantin Sander, Jan Rüth, Oliver Hohlfeld, Klaus Wehrle

    Abstract: Transport protocols use congestion control to avoid overloading a network. Nowadays, different congestion control variants exist that influence performance. Studying their use is thus relevant, but it is hard to identify which variant is used. While passive identification approaches exist, these require detailed domain knowledge and often also rely on outdated assumptions about how congestion cont… ▽ More

    Submitted 4 July, 2019; originally announced July 2019.

    Journal ref: NetAI '19: ACM SIGCOMM 2019 Workshop on Network Meets AI & ML, August 23, 2019, Bei**g, China

  9. arXiv:1110.5091  [pdf, other

    q-bio.BM cs.CE physics.bio-ph physics.data-an

    3D Protein Structure Predicted from Sequence

    Authors: Debora S. Marks, Lucy J. Colwell, Robert Sheridan, Thomas A. Hopf, Andrea Pagnani, Riccardo Zecchina, Chris Sander

    Abstract: The evolutionary trajectory of a protein through sequence space is constrained by function and three-dimensional (3D) structure. Residues in spatial proximity tend to co-evolve, yet attempts to invert the evolutionary record to identify these constraints and use them to computationally fold proteins have so far been unsuccessful. Here, we show that co-variation of residue pairs, observed in a larg… ▽ More

    Submitted 25 October, 2011; v1 submitted 23 October, 2011; originally announced October 2011.

    Comments: Debora S Marks and Lucy J Colwell are joint first authors. Supplement and Appendices at: http://cbio.mskcc.org/foldingproteins. Updated version 25-Oct-2011 with '3D' added to the title and corrections of details in the methods section to make it compatible with derivation of equations in the main text and in the supplement