[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 13 Dec 2024Bibliometrics
research-article
SDNShield: NFV-Based Defense Framework Against DDoS Attacks on SDN Control Plane

Software-defined networking (SDN) is increasingly popular in today’s information technology industry, but existing SDN control plane is insufficiently scalable to support on-demand, high-frequency flow requests. Weaknesses along SDN control paths ...

research-article
Learning to Cache and Caching to Learn: Regret Analysis of Caching Algorithms

Crucial performance metrics of a caching algorithm include its ability to quickly and accurately learn a popularity distribution of requests. However, a majority of work on analytical performance analysis focuses on hit probability after an asymptotically ...

research-article
QFlow: A Learning Approach to High QoE Video Streaming at the Wireless Edge

The predominant use of wireless access networks is for media streaming applications. However, current access networks treat all packets identically, and lack the agility to determine which clients are most in need of service at a given time. Software ...

research-article
From Conception to Retirement: A Lifetime Story of a 3-Year-Old Wireless Beacon System in the Wild

We report a 3-year city-wide study of an operational indoor sensing system based on Bluetooth Low Energy (BLE) called <monospace>aBeacon</monospace> (short for <underline>a</underline>libaba <underline>Beacon</underline>). <monospace>aBeacon</monospace> ...

research-article
A Coverage-Aware Distributed <italic>k</italic>-Connectivity Maintenance Algorithm for Arbitrarily Large <italic>k</italic> in Mobile Sensor Networks

Mobile sensor networks (MSNs) have emerged from the interaction between mobile robotics and wireless sensor networks. MSNs can be deployed in harsh environments, where failures in some nodes can partition MSNs into disconnected network segments or reduce ...

research-article
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet

Open DNS resolvers are resolvers that perform recursive resolution on behalf of any user. They can be exploited by adversaries because they are open to the public and require no authorization to use. Therefore, it is important to understand the state of ...

research-article
SEAD Counter: Self-Adaptive Counters With Different Counting Ranges

The Sketch is a compact data structure useful for network measurements. However, to cope with the high speeds of the current data plane, it needs to be held in the small on-chip memory (SRAM). Therefore, the product of the counter size and the number of ...

research-article
Selection of Sensors for Efficient Transmitter Localization

We address the problem of localizing an (unauthorized) transmitter using a distributed set of sensors. Our focus is on developing techniques that perform the transmitter localization in an efficient manner, wherein the efficiency is defined in terms of ...

research-article
Open Access
Optimal Deployment of SRv6 to Enable Network Interconnection Service

Many organizations nowadays have multiple sites at different geographic locations. Typically, transmitting massive data among these sites relies on the interconnection service offered by ISPs. Segment Routing over IPv6 (SRv6) is a new simple and flexible ...

research-article
MDLdroid: A ChainSGD-Reduce Approach to Mobile Deep Learning for Personal Mobile Sensing

Personal mobile sensing is fast permeating our daily lives to enable activity monitoring, healthcare and rehabilitation. Combined with deep learning, these applications have achieved significant success in recent years. Different from conventional cloud-...

research-article
CodedReduce: A Fast and Robust Framework for Gradient Aggregation in Distributed Learning

We focus on the commonly used synchronous Gradient Descent paradigm for large-scale distributed learning, for which there has been a growing interest to develop efficient and robust gradient aggregation strategies that overcome two key system bottlenecks: ...

research-article
MAX-Tree: A Novel Topology Formation for Maximal Area Coverage in Wireless Ad-Hoc Networks

For many wireless ad-hoc network (WANET) applications, including wireless sensor, robotic, and flying ad-hoc networks, area coverage is a major challenge. This challenge, which may include the number of required nodes, cumulative energy consumption, or ...

research-article
Quality-Aware Incentive Mechanisms Under Social Influences in Data Crowdsourcing

Incentive mechanism design and quality control are two key challenges in data crowdsourcing, because of the need for recruitment of crowd users and their limited capabilities. Without considering users&#x2019; social influences, existing mechanisms often ...

research-article
Universal Scaling of Distributed Queues Under Load Balancing in the Super-Halfin-Whitt Regime

This paper considers the steady-state performance of load balancing algorithms in a many-server system with distributed queues. The system has <inline-formula> <tex-math notation="LaTeX">$N$ </tex-math></inline-formula> servers, and each server maintains ...

research-article
Exploring Partitioning Attacks on the Bitcoin Network

Bitcoin is the leading example of a blockchain application that facilitates peer-to-peer transactions without the need for a trusted third party. This paper considers possible attacks related to the decentralized network architecture of Bitcoin. We ...

research-article
Machine Learning on Volatile Instances: Convergence, Runtime, and Cost Tradeoffs

Due to the massive size of the neural network models and training datasets used in machine learning today, it is imperative to distribute stochastic gradient descent (SGD) by splitting up tasks such as gradient evaluation across multiple worker nodes. ...

research-article
Unifying AoI Minimization and Remote Estimation&#x2014;Optimal Sensor/Controller Coordination With Random Two-Way Delay

The ubiquitous usage of communication networks in modern sensing and control applications has kindled new interests on the timing coordination between sensors and controllers, i.e., how to use the &#x201C;waiting time&#x201D; to improve the system ...

research-article
Processing-While-Transmitting: Cost-Minimized Transmission in SDN-Based STINs

Existing Space-Terrestrial Integrated Network (STIN) applications collect all data from multiple satellites and terrestrial nodes to the specific analyze center on the earth for processing, which wastes lots of network resources. To save these resources, ...

research-article
Virtualization-Aware Traffic Control for Soft Real-Time Network Traffic on Xen

As the role of virtualization technology becomes more prevalent, the range of applications deployed in virtualized systems is steadily growing. This increasingly includes applications with soft real-time requirements that benefit from low and predictable ...

research-article
NCScale: Toward Optimal Storage Scaling via Network Coding

To adapt to the increasing storage demands and varying storage redundancy requirements, practical distributed storage systems need to support <italic>storage scaling</italic> by relocating currently stored data to different storage nodes. However, the ...

research-article
Adaptive Configuration Selection and Bandwidth Allocation for Edge-Based Video Analytics

Major cities worldwide have millions of cameras deployed for surveillance, business intelligence, traffic control, crime prevention, etc. Real-time analytics on video data demands intensive computation resources and high energy consumption. Traditional ...

research-article
Super Spreader Identification Using Geometric-Min Filter

Super spreader identification has a lot of applications in network management and security monitoring. It is a more difficult problem than heavy hitter identification because flow spread is harder to measure than flow size due to the requirement of ...

research-article
COIN: An Efficient Indexing Mechanism for Unstructured Data Sharing Systems

Edge computing promises a dramatic reduction in the network latency and the traffic volume, where many edge servers are placed at the edge of the Internet. Furthermore, those edge servers cache data to provide services for edge users. The data sharing ...

research-article
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams

Truth discovery is an effective paradigm which could reveal the truth from crowdsouced data with conflicts, enabling data-driven decision-making systems to make quick and smart decisions. The increasing privacy concern promotes users to perturb or encrypt ...

research-article
Improved Load Balancing in Large Scale Systems Using Attained Service Time Reporting

Our interest lies in load balancing jobs in large scale systems consisting of multiple dispatchers and FCFS servers. In the absence of any information on job sizes, a popular load balancing method is the SQ(<inline-formula> <tex-math notation="LaTeX">$d$ <...

research-article
Open Access
Cheetah: A High-Speed Programmable Load-Balancer Framework With Guaranteed Per-Connection-Consistency

Large service providers use load balancers to dispatch millions of incoming connections per second towards thousands of servers. There are two basic yet critical requirements for a load balancer: <italic>uniform load distribution</italic> of the incoming ...

research-article
An Adaptive Robustness Evolution Algorithm With Self-Competition and its 3D Deployment for Internet of Things

Internet of Things (IoT) includes numerous sensing nodes that constitute a large scale-free network. Optimizing the network topology to increase resistance against malicious attacks is a complex problem, especially on 3-dimension (3D) topological ...

research-article
LB Scalability: Achieving the Right Balance Between Being Stateful and Stateless

A high performance Layer-4 load balancer (LB) is one of the most important components of a cloud service infrastructure. Such an LB uses network and transport layer information for deciding how to distribute client requests across a group of servers. A ...

research-article
Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting

With the popularization of Internet of Things (IoT) devices in smart home and industry fields, a huge number of IoT devices are connected to the Internet. However, what devices are connected to a network may not be known by the Internet Service Provider (...

research-article
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID

In this paper, we uncover a new off-path TCP hijacking attack that can be used to terminate victim TCP connections or inject forged data into victim TCP connections by manipulating the new mixed IPID assignment method, which is widely used in Linux kernel ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.