Browse by Subject "networking"

  • Xiao, Li; Nahrstedt, Klara (2005-07)
    Service Composition is a promising technology for providing on-demand composed services in dynamic and loosely coupled peer-to-peer (P2P) networks. Because of system dynamics, such as the peer leaving from the system, end ...

    application/pdf

    application/pdfPDF (257Kb)
  • Liang, Jin; Ko, Steven Y.; Gupta, Indranil; Nahrstedt, Klara (2005-04)
    While large-scale distributed clusters such as PlanetLab and TeraGrid are being increasingly used to run complex appli- cations, there is a paucity of software that provides sim- ple management functions to developers and ...

    application/pdf

    application/pdfPDF (164Kb)
  • Ko, Steven Y.; Morales, Ramses V.; Gupta, Indranil (2006-05)
    In this paper we argue that a worker-centric scheduler design is more desirable for data-intensive applications in Grid environments. Previous research on task-centric scheduling for dataintensive applications has identi ...

    application/pdf

    application/pdfPDF (173Kb)
  • Zhang, Honghai (2004-02)
    In this paper, we explore the fundamental limits of sensor network lifetime that all algorithms can possibly achieve. Specifically, under the assumptions that nodes are deployed as a Poisson point process with density ...

    application/pdf

    application/pdfPDF (399Kb)
  • Schear, Nabil A. (2011-05-25)
    Many existing encrypted Internet protocols leak information through packet sizes and timing. Though seemingly innocuous, prior work has shown that such leakage can be used to recover part or all of the plaintext being ...

    application/pdf

    application/pdfPDF (1Mb)
  • Conner, William G.; Nahrstedt, Klara (2008-07)
    As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to grow in importance for Voice-over-IP ...

    application/pdf

    application/pdfPDF (102Kb)
  • Yi, Seung; Harris III, Albert F.; Kravets, Robin (2007-08)
    With the emergence of ad hoc networking technology came efforts to provide necessary security support for ad hoc networks. However, due to challenging characteristics of ad hoc environments, providing the same level of ...

    application/pdf

    application/pdfPDF (204Kb)
  • Xiao, Li; Nahrstedt, Klara; Wang, Jun (2005-07)
    A reliable routing control plane in Internal Border Gateway Protocol (IBGP) is very important for achieving dependable Internet data communication. However, the reliability modeling of IBGP and the design of reliable IBGP ...

    application/pdf

    application/pdfPDF (372Kb)
  • Kapadia, Apu C.; Naldurg, Prasad G.; Campbell, Roy H. (2006-01)
    We present a model for trustworthy communication with respect to security and privacy in heterogeneous networks. In general, existing privacy protocols assume independently operated nodes spread over the Internet. Most of ...

    application/pdf

    application/pdfPDF (380Kb)
  • Yang, Yong; Hou, I-Hong; Hou, Jennifer C.; Shankar, Millikarjun; Rao, Nageswara S. (2007-04)
    Ad-hoc networks of devices and sensors with (limited) sensing and wireless communication capabilities are becoming increasingly available for commercial and military applications. Under a national SensorNet initiative, we ...

    application/pdf

    application/pdfPDF (994Kb)
  • He, Wenbo; Huang, Ying; Nahrstedt, Klara; Lee, Whay C. (2006-06)
    In this paper, we study challenges and possible solutions to cryptographic key management in mission-critical networks. Existing symmetric key cryptography mechanisms do not scale well when supporting end-to-end secure and ...

    application/pdf

    application/pdfPDF (199Kb)
  • Gu, Xiaohui (2004-07)
    Internet has evolved into an indispensable service delivery infrastructure. Various application services such as multimedia services and web services have been widely deployed and used. However, due to the problems pertaining ...

    application/pdf

    application/pdfPDF (2Mb)
  • Jeon, Won J.; Campbell, Roy H. (2007-12)
    Virtual worlds provide 3D-immersive experiences to users and some of them already have already launched commercial service to users. As computing environment becomes more heterogeneous, more mobile users are anticipated ...

    application/pdf

    application/pdfPDF (451Kb)
  • Gao, Yan; Hou, Jennifer C.; Nguyen, Hoang (2007-05)
    In this paper we study the issue of topology control under the physical Signal-to-Interference-Noise-Ratio (SINR) model, with the objective of maximizing network capacity. We show that existing graph-model-based topology ...

    application/pdf

    application/pdfPDF (253Kb)
  • Wu, Wanmin; Yang, Zhenyu; Gupta, Indranil; Nahrstedt, Klara (2008-03)
    3D tele-immersion (3DTI) has recently emerged as a new way of video- mediated collaboration across the Internet. Unlike conventional 2D video-conferencing systems, it can immerse remote users into a shared 3D virtual space ...

    application/pdf

    application/pdfPDF (999Kb)
  • Xiao, Li; He, Guanghui; Nahrstedt, Klara (2004-10)
    The reliability and robustness of the Border Gateway Protocol (BGP) play very important roles in achieving highly stable and prompt Internet data communication. The present BGP uses TCP/IP to exchange routing control ...

    application/pdf

    application/pdfPDF (484Kb)
  • Conner, William G.; Hwang, Seung-won; Nahrstedt, Klara (2007-05)
    Supporting queries over dispersed data stored in large-scale distributed systems, such as peer-to-peer networks, naturally calls for ranked retrieval in order to effectively focus on the most relevant (i.e., top-k) results. ...

    application/pdf

    application/pdfPDF (151Kb)
  • Sobeih, Ahmed A. (2008-08)
    Verifiation and Validation (V&V) is a critically important phase in the development life cycle of a simulation model. In the context of network simulation, traditional network simulators perform well in using a simulation ...

    application/pdf

    application/pdfPDF (829Kb)
  • Sobeih, Ahmed A.; d'Amorim, Marcelo; Viswanathan, Mahesh; Marinov, Darko; Hou, Jennifer C. (2007-08)
    Verification and Validation (V&V) is a critically important phase in the development life cycle of a simulation model. In the context of network simulation, traditional network simulators perform well in using a simulation ...

    application/pdf

    application/pdfPDF (298Kb)
  • Jia, Yuntao; Hoberock, Jared; Garland, Michael; Hart, John C. (2008-04)
    This paper proposes novel methods for visualizing specifically the large power-law graphs that arise in sociology and the sciences. In such cases a large portion of edges can be shown to be less important and removed while ...

    application/pdf

    application/pdfPDF (5Mb)