A first look at commercial 5G performance on smartphones

A Narayanan, E Ramadan, J Carpenter, Q Liu… - Proceedings of The …, 2020 - dl.acm.org
We conduct to our knowledge a first measurement study of commercial 5G performance on
smartphones by closely examining 5G networks of three carriers (two mmWave carriers, one …

Multi-context TLS (mcTLS) enabling secure in-network functionality in TLS

D Naylor, K Schomp, M Varvello, I Leontiadis… - ACM SIGCOMM …, 2015 - dl.acm.org
A significant fraction of Internet traffic is now encrypted and HTTPS will likely be the default
in HTTP/2. However, Transport Layer Security (TLS), the standard protocol for encryption in …

Polaris: Faster page loads using fine-grained dependency tracking

R Netravali, A Goyal, J Mickens… - 13th USENIX Symposium …, 2016 - usenix.org
To load a web page, a browser must fetch and evaluate objects like HTML files and
JavaScript source code. Evaluating an object can result in additional objects being fetched …

Speeding up web page loads with shandian

XS Wang, A Krishnamurthy, D Wetherall - 13th USENIX Symposium on …, 2016 - usenix.org
Web page loads are slow due to intrinsic inefficiencies in the page load process. Our study
shows that the inefficiencies are attributable not only to the contents and structure of the Web …

Mobile cyber physical systems: Current challenges and future networking applications

Y Guo, X Hu, B Hu, J Cheng, M Zhou, RYK Kwok - IEEE Access, 2017 - ieeexplore.ieee.org
Mobile cyber-physical systems (CPS) that take the advantages and extend the application
domains of CPS have become increasingly popular in recent years. For example, mobile …

From rank estimation to rank approximation: Rank residual constraint for image restoration

Z Zha, X Yuan, B Wen, J Zhou… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we propose a novel approach to the rank minimization problem, termed rank
residual constraint (RRC) model. Different from existing low-rank based approaches, such …

A Survey and Analysis of TLS Interception Mechanisms and Motivations: Exploring how end-to-end TLS is made “end-to-me” for web traffic

X de Carné de Carnavalet, PC van Oorschot - ACM Computing Surveys, 2023 - dl.acm.org
TLS is an end-to-end protocol designed to provide confidentiality and integrity guarantees
that improve end-user security and privacy. While TLS helps defend against pervasive …

Towards a SPDY'ier mobile web?

J Erman, V Gopalakrishnan, R Jana… - Proceedings of the …, 2013 - dl.acm.org
Despite its widespread adoption and popularity, the Hypertext Transfer Protocol (HTTP)
suffers from fundamental performance limitations. SPDY, a recently proposed alternative to …

Slicer:{Auto-Sharding} for datacenter applications

A Adya, D Myers, J Howell, J Elson, C Meek… - … USENIX Symposium on …, 2016 - usenix.org
Sharding is a fundamental building block of large-scale applications, but most have their
own custom, ad-hoc implementations. Our goal is to make sharding as easily reusable as a …

An in-depth study of mobile browser performance

J Nejati, A Balasubramanian - … of the 25th International Conference on …, 2016 - dl.acm.org
Mobile page load times are an order of magnitude slower compared to non-mobile pages. It
is not clear what causes the poor performance: the slower network, the slower computational …