Browse College of Engineering by Contributor "Caesar, Matthew"

  • Douglas, Frederick E (2017-07-10)
    Internet censorship of one form or another affects on the order of half of all internet users. Previous work has studied this censorship, and proposed techniques for circumventing it, ranging from making proxy servers ...

    application/pdf

    application/pdfPDF (13MB)
  • Jalaparti, Virajith; Nguyen, Giang D. (2010-12-02)
    Cloud computing is a newly emerging paradigm in which a client pays as it uses computing resources owned by a cloud provider. Since multiple clients share the cloud's resources, they could potentially interfere with each ...

    application/pdf

    application/pdfPDF (169kB)
  • Wan, Zhichun (2019-04-23)
    Internet of Things (IoT) is an active area of research in both academia and industry. It has attracted a large amount of interest due to its potential of revolutionizing different industries by “giving intelligence” to ...

    application/pdf

    application/pdfPDF (1MB)Restricted Access
  • Verma, Abhishek; Venkataraman, Shivaram (2010-01-19)
    Cloud computing applications require a scalable, elastic and fault tolerant storage system. In this paper, we describe how metadata management can be improved for a file system built for large scale data-intensive applications. ...

    application/pdf

    application/pdfPDF (211kB)
  • Zhou, Wenxuan (2017-12-05)
    In the past decades, the world has witnessed how essential modern networks, such as data centers and enterprise networks, have become in our daily lives. However, on the other hand, configuring and maintaining a modern ...

    application/pdf

    application/pdfPDF (3MB)Restricted Access
  • Jalaparti, Virajith (2015-07-14)
    To handle millions of user requests every second and process hundreds of terabytes of data each day, many organizations have turned to large datacenter-scale computing systems. The applications running in these datacenters ...

    application/pdf

    application/pdfPDF (3MB)
  • Ku, Christopher (2016-05)
    This thesis is to investigating the performance of Internet protocols. We set up several real and virtual devices in various configurations and tested them to see the performance of the network we built. We have used Avaya ...

    application/pdf

    application/pdfPDF (370kB)Restricted to U of Illinois
  • Juen, Joshua Paul Joseph (2015-08-18)
    Mobile devices contain sensors which allow continuous recording of a user's motion allowing the development of activity, fitness and health applications. With varied applications, the motion sensors present new privacy ...

    application/pdf

    application/pdfPDF (6MB)
  • Nguyen, Giang Truong Khoa (2017-07-12)
    The Internet has become an integral part of modern life. At the same time, as we spend increasingly more time online, our digital trails, including the identities of the websites we visit, can reveal sensitive personal ...

    application/pdf

    application/pdfPDF (823kB)
  • Gardner, Conor (2015-05)
    During normal operation, a cluster of computers containing multiple nodes may suffer the following problem: one of the nodes will have a large workload and must resort to using slow swap memory from the hard disk when ...

    application/pdf

    application/pdfPDF (216kB)Restricted to U of Illinois
  • Tahir, Rashid (2018-04-13)
    Modern day commercial clouds are subject to various forms of infrastructural abuse. Whether it is SaaS, PaaS or IaaS model, attackers and cybercriminals are exploiting clouds to service their needs and using them as a ...

    application/pdf

    application/pdfPDF (6MB)Restricted Access
  • Hong, Chi-Yao (2015-01-21)
    We advocate a software defined transport (SDT) architecture in which a transport controller schedules and dynamically re-schedules the flow sending rates based on current network conditions and the network operator's goals. ...

    application/pdf

    application/pdfPDF (3MB)
  • Chen, Yongli (2017-07-17)
    Understanding router software performance is crucial for organizations which demand the optimal network quality. Because processing capability has heavy influence to communication networks [1], we need a benchmark for network ...

    application/pdf

    application/pdfPDF (507kB)
  • Croft, Jason (2017-12-05)
    Traditional computer networks require manual configuration of potentially hundreds of forwarding devices. To ease this configuration burden, software-defined networking (SDN) provides centralized, programmatic control of ...

    application/pdf

    application/pdfPDF (1MB)Restricted to U of Illinois
  • Das, Anupam (2016-07-01)
    The widespread use of smartphones in our everyday life gives rise to privacy concerns. Fingerprinting smartphones can jeopardize user privacy by enabling remote identification of users without users' awareness. In this ...

    application/pdf

    application/pdfPDF (13MB)