enter search term and/or author name
Hadoop on Named Data Networking: Experience and Results
Mathias Gibbens, Chris Gniady, Lei Ye, Beichuan Zhang
Article No.: 2
The Named Data Networking (NDN) architecture retrieves content by names rather than connecting to specific hosts. It provides benefits such as highly efficient and resilient content distribution, which fit well to data-intensive distributed...
Most present day switching systems, in Internet routers and data-center switches, employ a single input-queued crossbar to interconnect input ports with output ports. Such switches need to compute a matching, between input and output ports, for...
Investigation of the 2016 Linux TCP Stack Vulnerability at Scale
Alan Quach, Zhongjie Wang, Zhiyun Qian
Article No.: 4
To combat blind in-window attacks against TCP, changes proposed in RFC 5961 have been implemented by Linux since late 2012. While successfully eliminating the old vulnerabilities, the new TCP implementation was reported in August 2016 to have...
Portfolio-driven Resource Management for Transient Cloud Servers
Prateek Sharma, David Irwin, Prashant Shenoy
Article No.: 5
Cloud providers have begun to offer their surplus capacity in the form of low-cost transient servers, which can be revoked unilaterally at any time. While the low cost of transient servers makes them attractive for a wide range of applications,...
Modeling the energy consumption of applications on mobile devices is an important topic that has received much attention in recent years. However, there has been very little research on modeling the energy consumption of the mobile Web. This is...
On Optimal Two-Sided Pricing of Congested Networks
Xin Wang, Richard T.B. Ma, Yinlong Xu
Article No.: 7
Traditionally, Internet Access Providers (APs) only charge end-users for Internet access services; however, to recoup infrastructure costs and increase revenues, some APs have recently adopted two-sided pricing schemes under which both end-users...
Accelerating Performance Inference over Closed Systems by Asymptotic Methods
Article No.: 8
Recent years have seen a rapid growth of interest in exploiting monitoring data collected from enterprise applications for automated management and performance analysis. In spite of this trend, even simple performance inference problems involving...
Hieroglyph: Locally-Sufficient Graph Processing via Compute-Sync-Merge
Xiaoen Ju, Hani Jamjoom, Kang G. Shin
Article No.: 9
Despite their widespread adoption, large-scale graph processing systems do not fully decouple computation and communication, often yielding suboptimal performance. Locally-sufficient computation-computation that relies only on the graph state...
Understanding Reduced-Voltage Operation in Modern DRAM Devices: Experimental Characterization, Analysis, and Mechanisms
Kevin K. Chang, Onur Mutlu, A. Giray Yağlıkçı, Saugata Ghose, Aditya Agrawal, Niladrish Chatterjee, Abhijith Kashyap, Donghyuk Lee, Mike O'Connor, Hasan Hassan
Article No.: 10
The energy consumption of DRAM is a critical concern in modern computing systems. Improvements in manufacturing process technology have allowed DRAM vendors to lower the DRAM supply voltage conservatively, which reduces some of the DRAM energy...
Using Burstable Instances in the Public Cloud: Why, When and How?
Cheng Wang, Bhuvan Urgaonkar, Neda Nasiriani, George Kesidis
Article No.: 11
Amazon EC2 and Google Compute Engine (GCE) have recently introduced a new class of virtual machines called "burstable" instances that are cheaper than even the smallest traditional/regular instances. These lower prices come with reduced average...
Stein's Method for Mean Field Approximations in Light and Heavy Traffic Regimes
Article No.: 12
Mean-field analysis is an analytical method for understanding large-scale stochastic systems such as large-scale data centers and communication networks. The idea is to approximate the stationary distribution of a large-scale stochastic system...
Security Game with Non-additive Utilities and Multiple Attacker Resources
Sinong Wang, Ness Shroff
Article No.: 13
There has been significant interest in studying security games for modeling the interplay of attacks and defenses on various systems involving critical infrastructure, financial system security, political campaigns, and civil safeguarding....
A Simple Yet Effective Balanced Edge Partition Model for Parallel Computing
Lingda Li, Robel Geda, Ari B. Hayes, Yanhao Chen, Pranav Chaudhari, Eddy Z. Zhang, Mario Szegedy
Article No.: 14
Graph edge partition models have recently become an appealing alternative to graph vertex partition models for distributed computing due to their flexibility in balancing loads and their performance in reducing communication cost [6,...
Persistent Spread Measurement for Big Network Data Based on Register Intersection
You Zhou, Yian Zhou, Min Chen, Shigang Chen
Article No.: 15
Persistent spread measurement is to count the number of distinct elements that persist in each network flow for predefined time periods. It has many practical applications, including detecting long-term stealthy network activities in the...
Quality and Cost of Deterministic Network Calculus: Design and Evaluation of an Accurate and Fast Analysis
Steffen Bondorf, Paul Nikolaus, Jens B. Schmitt
Article No.: 16
Networks are integral parts of modern safety-critical systems and certification demands the provision of guarantees for data transmissions. Deterministic Network Calculus (DNC) can compute a worst-case bound on a data flow's end-to-end delay....
Expected Values Estimated via Mean-Field Approximation are 1/N-Accurate
Article No.: 17
Mean-field approximation is a powerful tool to study large-scale stochastic systems such as data-centers -- one example being the famous power of two-choice paradigm. It is shown in the literature that under quite general conditions, the empirical...
Industrial Control Systems (ICS) are widely deployed in mission critical infrastructures such as manufacturing, energy, and transportation. The mission critical nature of ICS devices poses important security challenges for ICS vendors and asset...
The modern world is becoming increasingly dependent on computing and communication technology to function, but unfortunately its application and impact on areas such as critical infrastructure and industrial control system (ICS) networks remains...
Outward Influence and Cascade Size Estimation in Billion-scale Networks
Hung T. Nguyen, Tri P. Nguyen, Tam N. Vu, Thang N. Dinh
Article No.: 20
Estimating cascade size and nodes' influence is a fundamental task in social, technological, and biological networks. Yet this task is extremely challenging due to the sheer size and the structural heterogeneity of networks. We investigate a new...