Browse by Subject "networking"

  • Sobeih, Ahmed A.; Viswanathan, Mahesh; Hou, Jennifer C. (2005-04)
    Network simulators perform well in evaluating the performance of network protocols, but lack the capability of verifying their correctness. In order to address this lacuna, we have extended the J- Sim network simulator ...

    application/pdf

    application/pdfPDF (185Kb)
  • Jeon, Won J.; Nahrstedt, Klara (2004-12)
    Traditional data caching, such as web caching, only focuses on how to boost the hit rate of requested objects in caches, and therefore, how to reduce the initial delay for object retrieval. However, for multimedia objects, ...

    application/pdf

    application/pdfPDF (153Kb)
  • He, Wenbo; Huang, Ying; Nahrstedt, Klara; Lee, Whay C. (2007-12)
    Reliable message propagation is an important means of communication in mobile ad hoc networks (MANETs), and serves as a fundamental component for various applications, such as mobile advertising, inter-vehicle safety message ...

    application/pdf

    application/pdfPDF (231Kb)
  • Anwar, Zahid; Potter, Shaya; Narayanaswami, Chandra; Yurcik, William; Gunter, Carl; Campbell, Roy H. (2008-04)
    Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter. We describe the design of our VoIP Vulnerability Assessment Tool ...

    application/pdf

    application/pdfPDF (622Kb)
  • Huang, Ying; He, Wenbo; Nahrstedt, Klara; Lee, Whay C. (2008-03)
    In mission-critical networks, command, alerts, and critical data are frequently broadcast over wireless networks. Broadcast traffic must be protected from malicious attacks, wherein sources are impersonated or broadcast ...

    application/pdf

    application/pdfPDF (230Kb)
  • Kim, Sun-Il (2008-04)
    Optical networks have played a major role in allowing us to meet the bandwidth demands driven by the explosive growth of the Internet. As more and more bandwidth-hungry applications emerge, the aggregated traffic at the ...

    application/pdf

    application/pdfPDF (1Mb)
  • Nayyeri, Amir; Abdelzaher, Tarek F. (2008-08)
    In this paper we address the reliability problem in storage-centric sensor networks deployed in hazardous environments. We use the nodes' extra flash memory to save distributed encoded blocks of data. We employ erasure ...

    application/pdf

    application/pdfPDF (341Kb)
  • Jin, Jingwen; Nahrstedt, Klara (2005-05)
    The importance of the component service model has been widely recognized in the Internet community due to its high flexibility in creating customized applications from primitive services in a plug-and-play manner. Deployment ...

    application/pdf

    application/pdfPDF (480Kb)
  • Liu, Xue (2006-09)
    Performance management and fault tolerance are two important issues faced by computing systems research. In this dissertation, we exploit the use of feedback control for performance management and fault tolerance. Specifically, ...

    application/pdf

    application/pdfPDF (877Kb)
  • Sachs, Daniel Grobe; Yuan, Wanghong; Hughes, Christopher J.; Harris III, Albert F.; Adve, Sarita V.; Jones, Douglas L.; Kravets, Robin H.; Nahrstedt, Klara (2004-02)
    Mobile systems primarily processing multimedia data are expected to become important platforms for pervasive computing. These systems, however, must satisfy large, dynamic demands of multimedia applications subject to ...

    application/pdf

    application/pdfPDF (141Kb)
  • He, Guanghui; Hou, Jennifer C. (2004-10)
    Internet traffic sampling techniques are very important to understand the traffic characteristics of the Internet, and have received increasing attention. In spite of all the research efforts, none has taken into account ...

    application/pdf

    application/pdfPDF (3Mb)
  • Sobeih, Ahmed A.; Viswanathan, Mahesh; Hou, Jennifer C. (2004-07)
    Existing network simulators perform reasonably well in evaluating the performance of network protocols, but lack the capability of verifying the correctness of network protocols. In this paper, we present our ongoing ...

    application/pdf

    application/pdfPDF (274Kb)
  • Xiao, Li; Nahrstedt, Klara (2005-07)
    Service Composition is a promising technology for providing on-demand composed services in dynamic and loosely coupled peer-to-peer (P2P) networks. Because of system dynamics, such as the peer leaving from the system, end ...

    application/pdf

    application/pdfPDF (257Kb)
  • Liang, Jin; Ko, Steven Y.; Gupta, Indranil; Nahrstedt, Klara (2005-04)
    While large-scale distributed clusters such as PlanetLab and TeraGrid are being increasingly used to run complex appli- cations, there is a paucity of software that provides sim- ple management functions to developers and ...

    application/pdf

    application/pdfPDF (164Kb)
  • Ko, Steven Y.; Morales, Ramses V.; Gupta, Indranil (2006-05)
    In this paper we argue that a worker-centric scheduler design is more desirable for data-intensive applications in Grid environments. Previous research on task-centric scheduling for dataintensive applications has identi ...

    application/pdf

    application/pdfPDF (173Kb)
  • Zhang, Honghai (2004-02)
    In this paper, we explore the fundamental limits of sensor network lifetime that all algorithms can possibly achieve. Specifically, under the assumptions that nodes are deployed as a Poisson point process with density ...

    application/pdf

    application/pdfPDF (399Kb)
  • Schear, Nabil A. (2011-05-25)
    Many existing encrypted Internet protocols leak information through packet sizes and timing. Though seemingly innocuous, prior work has shown that such leakage can be used to recover part or all of the plaintext being ...

    application/pdf

    application/pdfPDF (1Mb)
  • Conner, William G.; Nahrstedt, Klara (2008-07)
    As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to grow in importance for Voice-over-IP ...

    application/pdf

    application/pdfPDF (102Kb)
  • Yi, Seung; Harris III, Albert F.; Kravets, Robin (2007-08)
    With the emergence of ad hoc networking technology came efforts to provide necessary security support for ad hoc networks. However, due to challenging characteristics of ad hoc environments, providing the same level of ...

    application/pdf

    application/pdfPDF (204Kb)
  • Xiao, Li; Nahrstedt, Klara; Wang, Jun (2005-07)
    A reliable routing control plane in Internal Border Gateway Protocol (IBGP) is very important for achieving dependable Internet data communication. However, the reliability modeling of IBGP and the design of reliable IBGP ...

    application/pdf

    application/pdfPDF (372Kb)