ROLE
Author only
· Editor only
· Advisor only
· All roles
AUTHOR'S COLLEAGUES
See all colleagues of this author
SUBJECT AREAS
See all subject areas
KEYWORDS
See all author supplied keywords
AUTHOR PROFILE PAGES
Project background
Author-Izer Service
BOOKMARK & SHARE
|
|
361 results found
Export Results:
bibtex
| endnote
| acmref
| csv
Result page:
1
2
3
4
5
6
7
8
9
10
>>
1
I/O-efficient calculation of H-group closeness centrality over disk-resident graphs
August 2017
Information Sciences: an International Journal: Volume 400 Issue C, August 2017
Publisher: Elsevier Science Inc.
We introduce H-group closeness centrality in this work. H-group closeness centrality of a group of nodes measures how close this node group is to other nodes in a graph, and can be used in numerous applications such as measuring the importance and influence of a group of users in a ...
Keywords:
Greedy algorithm, Group centrality, Disk-resident graph, Online social network, Submodularity
2
Security importance assessment for system objects and malware detection
July 2017
Computers and Security: Volume 68 Issue C, July 2017
Publisher: Elsevier Advanced Technology Publications
System objects play different roles in computer systems and exhibit different levels of importance to system security. Assessing the importance of system objects helps us develop effective security protection methods. However, little work has focused on understanding and assessing the importance of system objects from a security perspective. In this ...
Keywords:
Malware detection, Importance metric, Access behavior, Behavioral-based detection, Security dependency network
3
ECF: An MPTCP Path Scheduler to Manage Heterogeneous Paths
Yeon-sup Lim,
Erich M. Nahum,
Don Towsley,
Richard J. Gibbens
June 2017
SIGMETRICS '17 Abstracts: Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 85, Downloads (12 Months): 85, Downloads (Overall): 85
Full text available:
 PDF
Multi-Path TCP (MPTCP) is a new standardized transport protocol that enables devices to utilize multiple network interfaces. The default MPTCP path scheduler prioritizes paths with the smallest round trip time (RTT). In this work, we examine whether the default MPTCP path scheduler can provide applications the ideal aggregate bandwidth, i.e., ...
Keywords:
packet scheduling, multi-path tcp
4
Enabling opportunistic search and placement in cache networks
Guilherme Domingues,
Edmundo de Souza e Silva,
Rosa M.M. Leo,
Daniel S. Menasch,
Don Towsley
June 2017
Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 119 Issue C, June 2017
Publisher: Elsevier North-Holland, Inc.
Content distribution networks have been extremely successful in todays Internet. Despite their success, there are still a number of scalability and performance challenges that motivate clean slate solutions for content dissemination, such as content centric networking. In this paper, we address two of the fundamental problems faced by any content ...
Keywords:
Information-centric networking, Placement, Routing, Networking modeling and analysis, Cache networks, Performance evaluation
5
Network Capability in Localizing Node Failures via End-to-End Path Measurements
Liang Ma,
Ting He,
Ananthram Swami,
Don Towsley,
Kin K. Leung
February 2017
IEEE/ACM Transactions on Networking (TON): Volume 25 Issue 1, February 2017
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 6, Downloads (Overall): 6
Full text available:
 PDF
We investigate the capability of localizing node failures in communication networks from binary states normal/failed of end-to-end paths. Given a set of nodes of interest, uniquely localizing failures within this set requires that different observable path states associate with different node failure events. However, this condition is difficult to test ...
6
Covert Communication Gains From Adversary’s Ignorance of Transmission Time
December 2016
IEEE Transactions on Wireless Communications: Volume 15 Issue 12, December 2016
Publisher: IEEE Press
The recent square root law (SRL) for covert communication demonstrates that Alice can reliably transmit $\mathcal {O}(\sqrt {n})$ bits to Bob in $n$ uses of an additive white Gaussian noise (AWGN) channel while keeping ineffective any detector employed by the adversary; conversely, exceeding this ...
7
DSCA: a data stream caching algorithm
Antonio A. Rocha,
Mostafa Dehghan,
Theodoros Salonidis,
Ting He,
Don Towsley
December 2016
CCDWN '16: Proceedings of the 1st Workshop on Content Caching and Delivery in Wireless Networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 17, Downloads (Overall): 17
Full text available:
 PDF
The deployment of caches in the Internet has grown significantly in the last decade, thus enabling the vision of Content-Centric Networks (CCNs). The caching policy employed at these routers has significant impact on the potential gains in network performance. Policies that adapt to changes in content popularities are of special ...
Keywords:
caching policy, data stream, content-centric network routers, least recently/frequently used
8
File Dissemination in Dynamic Graphs: The Case of Independent and Correlated Links in Series
November 2016
ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS): Volume 2 Issue 1, November 2016
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 38, Downloads (Overall): 38
Full text available:
 PDF
In this article, we investigate the traversal time of a file across N communication links subject to stochastic changes in the sending rate of each link. Each link’s sending rate is modeled by a finite-state Markov process. Two cases, one where links evolve independently of one another ( N mutually ...
Keywords:
Dynamic communication path, Laplace-Stietljes transform, stochastic bound, traversal time, Markov process, Pearson correlation coefficient
9
Search and Placement in Tiered Cache Networks
Guilherme Domingues,
Edmundo de Souza e Silva,
Rosa Leão,
Daniel Menasché,
Don Towsley
September 2016
ACM SIGMETRICS Performance Evaluation Review: Volume 44 Issue 2, September 2016
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 8, Downloads (12 Months): 33, Downloads (Overall): 33
Full text available:
 PDF
10
On Allocating Cache Resources to Content Providers
September 2016
ACM-ICN '16: Proceedings of the 3rd ACM Conference on Information-Centric Networking
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 20, Downloads (12 Months): 60, Downloads (Overall): 60
Full text available:
 PDF
In-network cache deployment is recognized as an effective technique for reducing content access delay. Caches serve content from multiple content providers, and wish to provide them differentiated services due to monetary incentives and legal obligations. Partitioning is a common approach in providing differentiated storage services. In this paper, we propose ...
Keywords:
Cache Partitioning, Information-Centric Networking, Resource Allocation
11
MSPlayer: Multi-Source and Multi-Path Video Streaming
August 2016
IEEE Journal on Selected Areas in Communications: Volume 34 Issue 8, August 2016
Publisher: IEEE Press
Online video streaming through mobile devices has become extremely popular nowadays. YouTube, for example, reported that the percentage of its traffic streaming to mobile devices has soared from 6% to more than 40% over the past two years. Moreover, people are constantly seeking to stream high-quality videos for better experience ...
12
A Necessary and Sufficient Condition for Throughput Scalability of Fork and Join Networks with Blocking
June 2016
SIGMETRICS '16: Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 17, Downloads (12 Months): 172, Downloads (Overall): 186
Full text available:
 PDF
Due to emerging applications such as cloud computing and big data analytics, modern information processing systems are growing increasingly large and complex. A critical issue concerns the throughput performance as the system grows in size. This paper models distributed information processing systems as fork and join queueing networks with blocking. ...
Keywords:
throughput, queueing network, scalability, fork/join, performance bound
Also published in:
June 2016
ACM SIGMETRICS Performance Evaluation Review - Performance evaluation review: Volume 44 Issue 1, June 2016
13
On the Duration and Intensity of Competitions in Nonlinear Pólya Urn Processes with Fitness
Bo Jiang,
Daniel R. Figueiredo,
Bruno Ribeiro,
Don Towsley
June 2016
SIGMETRICS '16: Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 8, Downloads (12 Months): 139, Downloads (Overall): 174
Full text available:
 PDF
Cumulative advantage (CA) refers to the notion that accumulated resources foster the accumulation of further resources in competitions, a phenomenon that has been empirically observed in various contexts. The oldest and arguably simplest mathematical model that embodies this general principle is the Pólya urn process, which finds applications in a ...
Keywords:
cumulative advantage, duration, Pólya urn, intensity, competition, nonlinearity, fitness
Also published in:
June 2016
ACM SIGMETRICS Performance Evaluation Review - Performance evaluation review: Volume 44 Issue 1, June 2016
14
Design and Analysis of Incentive and Reputation Mechanisms for Online Crowdsourcing Systems
May 2016
ACM Transactions on Modeling and Performance Evaluation of Computing Systems: Volume 1 Issue 3, May 2016
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 11, Downloads (12 Months): 124, Downloads (Overall): 172
Full text available:
 PDF
Today, online crowdsourcing services like Amazon Mechanical Turk, UpWork, and Yahoo! Answers are gaining in popularity. For such online services, it is important to attract “workers” to provide high-quality solutions to the “tasks” outsourced by “requesters.” The challenge is that workers have different skill sets and can provide different amounts ...
Keywords:
equilibrium, repeated game, Bayesian game
15
Capacity bounds and robustness in multipath networks
Andrei Bejan,
Richard Gibbens,
Robert Hancock,
Don Towsley
January 2016
VALUETOOLS'15: Proceedings of the 9th EAI International Conference on Performance Evaluation Methodologies and Tools
Publisher: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 37, Downloads (Overall): 48
Full text available:
 PDF
The recent developments of multipath data transport protocols such as Multipath TCP allow end-systems to explore and share available resources within networks. Through dynamic load balancing over subflows these protocols ensure high levels of robustness to network failures and traffic overloads. In this paper we use fluid models to study ...
Keywords:
mutlipath, capacity bounds, performance analysis
16
Cashing in on caching: on-demand contract design with linear pricing
December 2015
CoNEXT '15: Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 5, Downloads (12 Months): 33, Downloads (Overall): 33
Full text available:
 PDF
There has been increasing interest in designing and developing highly scalable infrastructures to support the efficient distribution of content. This has led to the recent development of content-oriented network architectures that rely on on-demand caching. This paper addresses the question of how a cache provider can monetize its service. Standard ...
Keywords:
monetization, content delivery, caching, economics
17
Design, implementation, and evaluation of energy-aware multi-path TCP
Yeon-sup Lim,
Yung-Chih Chen,
Erich M. Nahum,
Don Towsley,
Richard J. Gibbens,
Emmanuel Cecchet
December 2015
CoNEXT '15: Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 8, Downloads (12 Months): 44, Downloads (Overall): 44
Full text available:
 PDF
Multi-Path TCP (MPTCP) is a new transport protocol that enables systems to exploit available paths through multiple network interfaces. MPTCP is particularly useful for mobile devices, which usually have multiple wireless interfaces. However, these devices have limited power capacity and thus judicious use of these interfaces is required. In this ...
Keywords:
multi-path TCP, energy efficiency, measurements
18
Coalitions improve performance in data swarming systems
Honggang Zhang,
Sudarshan Vasudevan,
Ran Li,
Don Towsley
December 2015
IEEE/ACM Transactions on Networking (TON): Volume 23 Issue 6, December 2015
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3, Downloads (12 Months): 11, Downloads (Overall): 11
Full text available:
 PDF
We present an argument in favor of forming coalitions of peers in a data swarming system consisting of peers with heterogeneous upload capacities. In this paper, a coalition refers to a set of peers that explicitly cooperate with other peers inside the coalition via choking, piece selection , and capacity ...
Keywords:
bittorrent, cooperative game theory, tit-for-tat, coalitions, data swarming, peer-to-peer
19
Tracking Triadic Cardinality Distributions for Burst Detection in Social Activity Streams
November 2015
COSN '15: Proceedings of the 2015 ACM on Conference on Online Social Networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7, Downloads (12 Months): 53, Downloads (Overall): 92
Full text available:
 PDF
In everyday life, we often observe unusually frequent interactions among people before or during important events, i.e., people receive/send more greetings from/to their friends on Christmas Day than regular days. We also observe that some videos suddenly go viral through people's sharing in online social networks (OSNs). Do these seemingly ...
Keywords:
burst detection, data stream algorithms, sampling methods, social activity stream
20
Probabilistic Inference on Integrity for Access Behavior Based Malware Detection
November 2015
RAID 2015: Proceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 9404
Publisher: Springer-Verlag New York, Inc.
Integrity protection has proven an effective way of malware detection and defense. Determining the integrity of subjects programs and objects files and registries plays a fundamental role in integrity protection. However, the large numbers of subjects and objects, and intricate behaviors place burdens on revealing their integrities either manually or ...
Keywords:
Integrity protection, Malware, Probabilistic graphical model
|
|