Author image not provided
 Don Fred Towsley

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article15.38
Citation Count5,446
Publication count354
Publication years1975-2016
Available for download180
Average downloads per article567.81
Downloads (cumulative)102,205
Downloads (12 Months)5,262
Downloads (6 Weeks)853
ACM Fellow
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas

KEYWORDS
See all author supplied keywords


AUTHOR PROFILE PAGES
Project background Author-Izer logoAuthor-Izer Service

BOOKMARK & SHARE


361 results found Export Results: bibtex | endnote | acmref | csv

Result 1 – 20 of 361
Result page: 1 2 3 4 5 6 7 8 9 10 >>

Sort by:

1
I/O-efficient calculation of H-group closeness centrality over disk-resident graphs
Junzhou Zhao, Pinghui Wang, John C.S. Lui, Don Towsley, Xiaohong Guan
August 2017 Information Sciences: an International Journal: Volume 400 Issue C, August 2017
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 0

We introduce H-group closeness centrality in this work. H-group closeness centrality of a group of nodes measures how close this node group is to other nodes in a graph, and can be used in numerous applications such as measuring the importance and influence of a group of users in a ...
Keywords: Greedy algorithm, Group centrality, Disk-resident graph, Online social network, Submodularity

2
Security importance assessment for system objects and malware detection
Weixuan Mao, Zhongmin Cai, Don Towsley, Qian Feng, Xiaohong Guan
July 2017 Computers and Security: Volume 68 Issue C, July 2017
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 0

System objects play different roles in computer systems and exhibit different levels of importance to system security. Assessing the importance of system objects helps us develop effective security protection methods. However, little work has focused on understanding and assessing the importance of system objects from a security perspective. In this ...
Keywords: Malware detection, Importance metric, Access behavior, Behavioral-based detection, Security dependency network

3 published by ACM
ECF: An MPTCP Path Scheduler to Manage Heterogeneous Paths
Yeon-sup Lim, Erich M. Nahum, Don Towsley, Richard J. Gibbens
June 2017 SIGMETRICS '17 Abstracts: Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 85,   Downloads (12 Months): 85,   Downloads (Overall): 85

Full text available: PDFPDF
Multi-Path TCP (MPTCP) is a new standardized transport protocol that enables devices to utilize multiple network interfaces. The default MPTCP path scheduler prioritizes paths with the smallest round trip time (RTT). In this work, we examine whether the default MPTCP path scheduler can provide applications the ideal aggregate bandwidth, i.e., ...
Keywords: packet scheduling, multi-path tcp

4
Enabling opportunistic search and placement in cache networks
Guilherme Domingues, Edmundo de Souza e Silva, Rosa M.M. Leo, Daniel S. Menasch, Don Towsley
June 2017 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 119 Issue C, June 2017
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 0

Content distribution networks have been extremely successful in todays Internet. Despite their success, there are still a number of scalability and performance challenges that motivate clean slate solutions for content dissemination, such as content centric networking. In this paper, we address two of the fundamental problems faced by any content ...
Keywords: Information-centric networking, Placement, Routing, Networking modeling and analysis, Cache networks, Performance evaluation

5
Network Capability in Localizing Node Failures via End-to-End Path Measurements
Liang Ma, Ting He, Ananthram Swami, Don Towsley, Kin K. Leung
February 2017 IEEE/ACM Transactions on Networking (TON): Volume 25 Issue 1, February 2017
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 6,   Downloads (Overall): 6

Full text available: PDFPDF
We investigate the capability of localizing node failures in communication networks from binary states normal/failed of end-to-end paths. Given a set of nodes of interest, uniquely localizing failures within this set requires that different observable path states associate with different node failure events. However, this condition is difficult to test ...

6
Covert Communication Gains From Adversary’s Ignorance of Transmission Time
Boulat A. Bash, Dennis Goeckel, Don Towsley
December 2016 IEEE Transactions on Wireless Communications: Volume 15 Issue 12, December 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

The recent square root law (SRL) for covert communication demonstrates that Alice can reliably transmit $\mathcal {O}(\sqrt {n})$ bits to Bob in $n$ uses of an additive white Gaussian noise (AWGN) channel while keeping ineffective any detector employed by the adversary; conversely, exceeding this ...

7 published by ACM
DSCA: a data stream caching algorithm
Antonio A. Rocha, Mostafa Dehghan, Theodoros Salonidis, Ting He, Don Towsley
December 2016 CCDWN '16: Proceedings of the 1st Workshop on Content Caching and Delivery in Wireless Networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 17,   Downloads (Overall): 17

Full text available: PDFPDF
The deployment of caches in the Internet has grown significantly in the last decade, thus enabling the vision of Content-Centric Networks (CCNs). The caching policy employed at these routers has significant impact on the potential gains in network performance. Policies that adapt to changes in content popularities are of special ...
Keywords: caching policy, data stream, content-centric network routers, least recently/frequently used

8 published by ACM
File Dissemination in Dynamic Graphs: The Case of Independent and Correlated Links in Series
Philippe Nain, Don Towsley
November 2016 ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS): Volume 2 Issue 1, November 2016
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 38,   Downloads (Overall): 38

Full text available: PDFPDF
In this article, we investigate the traversal time of a file across N communication links subject to stochastic changes in the sending rate of each link. Each link’s sending rate is modeled by a finite-state Markov process. Two cases, one where links evolve independently of one another ( N mutually ...
Keywords: Dynamic communication path, Laplace-Stietljes transform, stochastic bound, traversal time, Markov process, Pearson correlation coefficient

9 published by ACM
Search and Placement in Tiered Cache Networks
Guilherme Domingues, Edmundo de Souza e Silva, Rosa Leão, Daniel Menasché, Don Towsley
September 2016 ACM SIGMETRICS Performance Evaluation Review: Volume 44 Issue 2, September 2016
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 8,   Downloads (12 Months): 33,   Downloads (Overall): 33

Full text available: PDFPDF

10 published by ACM
On Allocating Cache Resources to Content Providers
Weibo Chu, Mostafa Dehghan, Don Towsley, Zhi-Li Zhang
September 2016 ACM-ICN '16: Proceedings of the 3rd ACM Conference on Information-Centric Networking
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 20,   Downloads (12 Months): 60,   Downloads (Overall): 60

Full text available: PDFPDF
In-network cache deployment is recognized as an effective technique for reducing content access delay. Caches serve content from multiple content providers, and wish to provide them differentiated services due to monetary incentives and legal obligations. Partitioning is a common approach in providing differentiated storage services. In this paper, we propose ...
Keywords: Cache Partitioning, Information-Centric Networking, Resource Allocation

11
MSPlayer: Multi-Source and Multi-Path Video Streaming
Yung-Chih Chen, Don Towsley, Ramin Khalili
August 2016 IEEE Journal on Selected Areas in Communications: Volume 34 Issue 8, August 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

Online video streaming through mobile devices has become extremely popular nowadays. YouTube, for example, reported that the percentage of its traffic streaming to mobile devices has soared from 6% to more than 40% over the past two years. Moreover, people are constantly seeking to stream high-quality videos for better experience ...

12 published by ACM
A Necessary and Sufficient Condition for Throughput Scalability of Fork and Join Networks with Blocking
Yun Zeng, Augustin Chaintreau, Don Towsley, Cathy H. Xia
June 2016 SIGMETRICS '16: Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 17,   Downloads (12 Months): 172,   Downloads (Overall): 186

Full text available: PDFPDF
Due to emerging applications such as cloud computing and big data analytics, modern information processing systems are growing increasingly large and complex. A critical issue concerns the throughput performance as the system grows in size. This paper models distributed information processing systems as fork and join queueing networks with blocking. ...
Keywords: throughput, queueing network, scalability, fork/join, performance bound
Also published in:
June 2016  ACM SIGMETRICS Performance Evaluation Review - Performance evaluation review: Volume 44 Issue 1, June 2016

13 published by ACM
On the Duration and Intensity of Competitions in Nonlinear Pólya Urn Processes with Fitness
Bo Jiang, Daniel R. Figueiredo, Bruno Ribeiro, Don Towsley
June 2016 SIGMETRICS '16: Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 8,   Downloads (12 Months): 139,   Downloads (Overall): 174

Full text available: PDFPDF
Cumulative advantage (CA) refers to the notion that accumulated resources foster the accumulation of further resources in competitions, a phenomenon that has been empirically observed in various contexts. The oldest and arguably simplest mathematical model that embodies this general principle is the Pólya urn process, which finds applications in a ...
Keywords: cumulative advantage, duration, Pólya urn, intensity, competition, nonlinearity, fitness
Also published in:
June 2016  ACM SIGMETRICS Performance Evaluation Review - Performance evaluation review: Volume 44 Issue 1, June 2016

14 published by ACM
Design and Analysis of Incentive and Reputation Mechanisms for Online Crowdsourcing Systems
Hong Xie, John C. S. Lui, Don Towsley
May 2016 ACM Transactions on Modeling and Performance Evaluation of Computing Systems: Volume 1 Issue 3, May 2016
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 11,   Downloads (12 Months): 124,   Downloads (Overall): 172

Full text available: PDFPDF
Today, online crowdsourcing services like Amazon Mechanical Turk, UpWork, and Yahoo! Answers are gaining in popularity. For such online services, it is important to attract “workers” to provide high-quality solutions to the “tasks” outsourced by “requesters.” The challenge is that workers have different skill sets and can provide different amounts ...
Keywords: equilibrium, repeated game, Bayesian game

15
Capacity bounds and robustness in multipath networks
Andrei Bejan, Richard Gibbens, Robert Hancock, Don Towsley
January 2016 VALUETOOLS'15: Proceedings of the 9th EAI International Conference on Performance Evaluation Methodologies and Tools
Publisher: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 37,   Downloads (Overall): 48

Full text available: PDFPDF
The recent developments of multipath data transport protocols such as Multipath TCP allow end-systems to explore and share available resources within networks. Through dynamic load balancing over subflows these protocols ensure high levels of robustness to network failures and traffic overloads. In this paper we use fluid models to study ...
Keywords: mutlipath, capacity bounds, performance analysis

16 published by ACM
Cashing in on caching: on-demand contract design with linear pricing
Richard T. B. Ma, Don Towsley
December 2015 CoNEXT '15: Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 5,   Downloads (12 Months): 33,   Downloads (Overall): 33

Full text available: PDFPDF
There has been increasing interest in designing and developing highly scalable infrastructures to support the efficient distribution of content. This has led to the recent development of content-oriented network architectures that rely on on-demand caching. This paper addresses the question of how a cache provider can monetize its service. Standard ...
Keywords: monetization, content delivery, caching, economics

17 published by ACM
Design, implementation, and evaluation of energy-aware multi-path TCP
Yeon-sup Lim, Yung-Chih Chen, Erich M. Nahum, Don Towsley, Richard J. Gibbens, Emmanuel Cecchet
December 2015 CoNEXT '15: Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 8,   Downloads (12 Months): 44,   Downloads (Overall): 44

Full text available: PDFPDF
Multi-Path TCP (MPTCP) is a new transport protocol that enables systems to exploit available paths through multiple network interfaces. MPTCP is particularly useful for mobile devices, which usually have multiple wireless interfaces. However, these devices have limited power capacity and thus judicious use of these interfaces is required. In this ...
Keywords: multi-path TCP, energy efficiency, measurements

18
Coalitions improve performance in data swarming systems
Honggang Zhang, Sudarshan Vasudevan, Ran Li, Don Towsley
December 2015 IEEE/ACM Transactions on Networking (TON): Volume 23 Issue 6, December 2015
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 11,   Downloads (Overall): 11

Full text available: PDFPDF
We present an argument in favor of forming coalitions of peers in a data swarming system consisting of peers with heterogeneous upload capacities. In this paper, a coalition refers to a set of peers that explicitly cooperate with other peers inside the coalition via choking, piece selection , and capacity ...
Keywords: bittorrent, cooperative game theory, tit-for-tat, coalitions, data swarming, peer-to-peer

19 published by ACM
Tracking Triadic Cardinality Distributions for Burst Detection in Social Activity Streams
Junzhou Zhao, John C.S. Lui, Don Towsley, Pinghui Wang, Xiaohong Guan
November 2015 COSN '15: Proceedings of the 2015 ACM on Conference on Online Social Networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 53,   Downloads (Overall): 92

Full text available: PDFPDF
In everyday life, we often observe unusually frequent interactions among people before or during important events, i.e., people receive/send more greetings from/to their friends on Christmas Day than regular days. We also observe that some videos suddenly go viral through people's sharing in online social networks (OSNs). Do these seemingly ...
Keywords: burst detection, data stream algorithms, sampling methods, social activity stream

20
Probabilistic Inference on Integrity for Access Behavior Based Malware Detection
Weixuan Mao, Zhongmin Cai, Don Towsley, Xiaohong Guan
November 2015 RAID 2015: Proceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 9404
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Integrity protection has proven an effective way of malware detection and defense. Determining the integrity of subjects programs and objects files and registries plays a fundamental role in integrity protection. However, the large numbers of subjects and objects, and intricate behaviors place burdens on revealing their integrities either manually or ...
Keywords: Integrity protection, Malware, Probabilistic graphical model



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2017 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us