Changes between Version 59 and Version 60 of GENIBibliography

Show
Ignore:
Timestamp:
01/17/18 18:03:12 (9 months ago)
Author:
mberman@bbn.com
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIBibliography

    v59 v60  
    125125<li> 
    126126<b>Alaoui, Sara E. and Ramamurthy, Byrav</b>, 
    127 &quot;EAODR: A Novel Routing Algorithm Based on the Modified Temporal Graph Network Model for DTN-Based Interplanetary Networks.&quot; 
     127&quot;EAODR: A novel routing algorithm based on the Modified Temporal Graph network model for DTN-based Interplanetary Networks.&quot; 
    128128Computer Networks,  
    1291292017. 
     
    215215 
    216216<li> 
     217<b>Antequera, R. Bazan and Calyam, P. and Chemodanov, D. and de Donato, W. and Mishra, A. and Pescape, A. and Skubic, M.</b>, 
     218&quot;Socio-technical approach to engineer gigabit app performance for physicaltherapy-as-a-service.&quot; 
     2192017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom), Dalian, China, IEEE,  
     2202017. 
     221doi:10.1109/healthcom.2017.8210768. 
     222<a href="http://dx.doi.org/10.1109/healthcom.2017.8210768">http://dx.doi.org/10.1109/healthcom.2017.8210768</a> 
     223<br><br><b>Abstract: </b>The deployment of Gigabit Apps owing to their high-bandwidth and low-latency nature pushes the limits of today's end-to-end networking, and reveals new bottlenecks at multiple layers of networking, virtualization, application and user experience. In this paper, we use an exemplar smart health related Gigabit App use case viz., PhysicalTherapy-as-a-Service to show how a multi-layer instrumentation approach of measurement points was critical to successfully deploy our lab-tested App out to residential homes with Google Fiber connections. The salient instrumentation strategies involved an organized co-design method between the App Developer and Network Engineer roles, and a multi-domain network performance monitoring featuring perfSONAR extensions, both of which were realized through our Narada Metrics framework. Our instrumentation strategies engendered a ” socio-technical tool” for co-ordination between multi-layer stakeholders in identifying and overcoming the intertwined bottlenecks, and in tuning the App performance. Our results highlight the new instrumentation and measurement challenges to foster multi-layer stakeholder collaboration, and provide rare insights to the budding Gigabit App developer community for performance engineering their Apps to serve residential users. 
     224</li> 
     225<br> 
     226 
     227 
     228 
     229<li> 
    217230<b>Antequera, Ronny B. and Calyam, Prasad and Chandrashekara, Arjun A. and Malhotra, Shivoam</b>, 
    218231&quot;Recommending Resources to Cloud Applications Based on Custom Templates Composition.&quot; 
     
    254267 
    255268<li> 
     269<b>Arezoumand, Saeed</b>, 
     270&quot;End to End Orchestration of Distributed Cloud Applications (Master's Thesis).&quot; 
     271 
     2722017. 
     273 
     274<a href="https://tspace.library.utoronto.ca/handle/1807/79499">https://tspace.library.utoronto.ca/handle/1807/79499</a> 
     275<br><br><b>Abstract: </b>Centralized management provides benefits for cloud providers in terms of efficient and simple management of their infrastructure. However, tenants who use these infrastructures to deliver a software service to the end-users, are handicapped by having to work with traditional network primitives. Current service orchestration tools can automate most of the service configuration and deployment process, but these do not yet include significant SDN capabilities. In this thesis, we propose and examine high-level abstraction models for the orchestration of distributed cloud applications over multiple network domains and multiple infrastructure providers. We provide cloud application developers with a set of useful network functionalities that require no programming effort to provision and use. Our design relies on Hyperexchange, a protocol-agnostic exchange point for peering of virtual networks, to enable orchestration among multiple virtual network providers. 
     276</li> 
     277<br> 
     278 
     279 
     280 
     281<li> 
    256282<b>Arezoumand, Saeed and Bannazadeh, Hadi and Leon-Garcia, Alberto</b>, 
    257283&quot;HyperExchange: A protocol-agnostic exchange fabric enabling peering of Virtual Networks.&quot; 
     
    915941 
    916942<li> 
     943<b>Cecil, J. and Gupta, Avinash and Pirela-Cruz, Miguel and Ramanathan, Parmesh</b>, 
     944&quot;A cyber training framework for orthopedic surgery.&quot; 
     945Cogent Medicine,  
     9462017. 
     947doi:10.1080/2331205x.2017.1419792. 
     948<a href="http://dx.doi.org/10.1080/2331205x.2017.1419792">http://dx.doi.org/10.1080/2331205x.2017.1419792</a> 
     949<br><br><b>Abstract: </b>Purpose: This paper focuses on the development of a cyber training framework for an orthopaedic process termed Less Invasive Stabilization System (LISS) plating surgery. Research methodology: The methodology involved developing a simulator framework which is a complex task involving multiple systems, technologies and human experts. Expert surgeons played an important role in the design and develop the IoT based simulator. Finally, simulator's impact was validated through learning interactions with residents. Hypothesis: The hypothesis was that interactions with the simulator improve the residents' understanding of the LISS plating surgical process. Results: The results from the learning interactions con rm the hypothesis that the interactions with the simulation framework improve the residents' understanding of the LISS plating surgical process. Among the twenty-eight participants in this study, the majority showed improvements in their understanding of the LISS plating surgical process. Conclusion: This paper shows the process of design and development of simulation framework. The learning interactions conducted suggest that this IoT based framework can be used as a tool in medical education. 
     950</li> 
     951<br> 
     952 
     953 
     954 
     955<li> 
    917956<b>Cecil, J. and Gupta, Avinash and Ramanathan, P. and Pirela-Cruz, Miguel</b>, 
    918957&quot;A distributed collaborative simulation environment for orthopedic surgical training.&quot; 
     
    955994<li> 
    956995<b>Chen, Kang and Shen, Haiying</b>, 
     996&quot;Global optimization of file availability through replication for efficient file sharing in MANETs.&quot; 
     997Network Protocols (ICNP), 2011 19th IEEE International Conference on, Vancouver, AB, Canada, IEEE,  
     9982011. 
     999doi:10.1109/icnp.2011.6089056. 
     1000<a href="http://dx.doi.org/10.1109/icnp.2011.6089056">http://dx.doi.org/10.1109/icnp.2011.6089056</a> 
     1001<br><br><b>Abstract: </b>File sharing applications in mobile ad hoc networks (MANETs) have attracted more and more attention in recent years. The efficiency of file querying suffers from the distinctive properties of MANETs including node mobility and limited communication range and resource. An intuitive method to alleviate this problem is to create file replicas in the network. However, despite the efforts on file replication, no research has focused on the global optimal replica sharing with minimum average querying delay. Specifically, current file replication protocols in MANETs have two shortcomings. First, they lack a rule to allocate limited resource to different files in order to minimize the average querying delay. Second, they simply consider storage as resource for replicas, but neglect the fact that the file holders' frequency of meeting other nodes also plays an important role in determining file availability. A node having a higher meeting frequency with others provides higher availability to its files. In this paper, we introduce a new concept of resource for file replication, which considers both node storage and meeting frequency. We theoretically study the influence of resource allocation on the average querying delay and derive a resource allocation rule to minimize the average querying delay. We further propose a distributed file replication protocol that follows the rule. The trace-driven experiments on both the real-world GENI testbed and NS-2 show that our protocol can achieve shorter average querying delay at lower cost than current replication protocols, which justifies the correctness of our theoretical analysis and the effectiveness of the proposed protocol. 
     1002</li> 
     1003<br> 
     1004 
     1005<li> 
     1006<b>Chen, Kang and Shen, Haiying</b>, 
    9571007&quot;Cont2: Social-Aware Content and Contact Based File Search in Delay Tolerant Networks.&quot; 
    9581008Proceedings of the 2013 42Nd International Conference on Parallel Processing, IEEE Computer Society, Washington, DC, USA,  
     
    9611011<a href="http://dx.doi.org/10.1109/icpp.2013.28">http://dx.doi.org/10.1109/icpp.2013.28</a> 
    9621012<br><br><b>Abstract: </b>In this paper, we focus on distributed file search over a delay tolerant network (DTN) formed by mobile devices that exhibit the characteristics of social networks. Current file search methods in MANETs/DTNs are either content-based or contact-based. The former builds routing tables for node contents but is not resilient to high node mobility, while the latter exploits node contact patterns in the social networks but may lead to high latency. Recent research also reveal the importance of interests in realizing efficient file dissemination in DTNs. In this paper, we first analyze node interest and mobility from real traces, which confirms the shortcomings of a contact based method and show the importance of considering both content/interest and contact in file search. We then propose Cont2, a social-aware file search method which leverages both node social interests (content) and contact patterns to enhance search efficiency. First, considering people with common interests tend to share files and gather together, Cont2 virtually groups common-interest nodes into a community to direct file search. Second, considering human mobility follows a certain pattern, Cont2 exploits nodes that have high contact frequency with the queried content. Third, Cont2 also exploits active nodes that have more connections to others as a complementary approach to expedite file search. Trace-driven experimental on the real-world GENI test bed and NS-2 simulator show that Cont2 can significantly improve the search efficiency compared to current methods. 
    963 </li> 
    964 <br> 
    965  
    966 <li> 
    967 <b>Chen, Kang and Shen, Haiying</b>, 
    968 &quot;Global optimization of file availability through replication for efficient file sharing in MANETs.&quot; 
    969 Network Protocols (ICNP), 2011 19th IEEE International Conference on, Vancouver, AB, Canada, IEEE,  
    970 2011. 
    971 doi:10.1109/icnp.2011.6089056. 
    972 <a href="http://dx.doi.org/10.1109/icnp.2011.6089056">http://dx.doi.org/10.1109/icnp.2011.6089056</a> 
    973 <br><br><b>Abstract: </b>File sharing applications in mobile ad hoc networks (MANETs) have attracted more and more attention in recent years. The efficiency of file querying suffers from the distinctive properties of MANETs including node mobility and limited communication range and resource. An intuitive method to alleviate this problem is to create file replicas in the network. However, despite the efforts on file replication, no research has focused on the global optimal replica sharing with minimum average querying delay. Specifically, current file replication protocols in MANETs have two shortcomings. First, they lack a rule to allocate limited resource to different files in order to minimize the average querying delay. Second, they simply consider storage as resource for replicas, but neglect the fact that the file holders' frequency of meeting other nodes also plays an important role in determining file availability. A node having a higher meeting frequency with others provides higher availability to its files. In this paper, we introduce a new concept of resource for file replication, which considers both node storage and meeting frequency. We theoretically study the influence of resource allocation on the average querying delay and derive a resource allocation rule to minimize the average querying delay. We further propose a distributed file replication protocol that follows the rule. The trace-driven experiments on both the real-world GENI testbed and NS-2 show that our protocol can achieve shorter average querying delay at lower cost than current replication protocols, which justifies the correctness of our theoretical analysis and the effectiveness of the proposed protocol. 
    9741013</li> 
    9751014<br> 
     
    10571096<li> 
    10581097<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>, 
     1098&quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot; 
     1099MILCOM 2015 - 2015 IEEE Military Communications Conference, Tampa, FL, USA, IEEE,  
     11002015. 
     1101doi:10.1109/milcom.2015.7357519. 
     1102<a href="http://dx.doi.org/10.1109/milcom.2015.7357519">http://dx.doi.org/10.1109/milcom.2015.7357519</a> 
     1103<br><br><b>Abstract: </b>Software Defined Networking (SDN) has the potential to enable novel security applications that support flexible, on-demand deployment of system elements. It can offer targeted forensic evidence collection and investigation of computer network attacks. Such unique capabilities are instrumental to network intrusion detection that is challenged by large volumes of data and complex network topologies. This paper presents an innovative approach that coordinates distributed network traffic Monitors and attack Correlators supported by Open Virtual Switches (OVS). The Monitors conduct anomaly detection and the Correlators perform deep packet inspection for attack signature recognition. These elements take advantage of complementary views and information availability on both the data and control planes. Moreover, they collaboratively look for network flooding attack signature constituents that possess different characteristics in the level of information abstraction. Therefore, this approach is able to not only quickly raise an alert against potential threats, but also follow it up with careful verification to reduce false alarms. We experiment with this SDN-supported collaborative approach to detect TCP SYN flood attacks on the Global Environment for Network Innovations (GENI), a realistic virtual testbed. The response times and detection accuracy, in the context of a small to medium corporate network, have demonstrated its effectiveness and scalability. 
     1104</li> 
     1105<br> 
     1106 
     1107<li> 
     1108<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>, 
    10591109&quot;Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN).&quot; 
    10601110Distributed Computing Systems Workshops (ICDCSW), 2015 IEEE 35th International Conference on, IEEE,  
     
    10661116<br> 
    10671117 
    1068 <li> 
    1069 <b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>, 
    1070 &quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot; 
    1071 MILCOM 2015 - 2015 IEEE Military Communications Conference, Tampa, FL, USA, IEEE,  
    1072 2015. 
    1073 doi:10.1109/milcom.2015.7357519. 
    1074 <a href="http://dx.doi.org/10.1109/milcom.2015.7357519">http://dx.doi.org/10.1109/milcom.2015.7357519</a> 
    1075 <br><br><b>Abstract: </b>Software Defined Networking (SDN) has the potential to enable novel security applications that support flexible, on-demand deployment of system elements. It can offer targeted forensic evidence collection and investigation of computer network attacks. Such unique capabilities are instrumental to network intrusion detection that is challenged by large volumes of data and complex network topologies. This paper presents an innovative approach that coordinates distributed network traffic Monitors and attack Correlators supported by Open Virtual Switches (OVS). The Monitors conduct anomaly detection and the Correlators perform deep packet inspection for attack signature recognition. These elements take advantage of complementary views and information availability on both the data and control planes. Moreover, they collaboratively look for network flooding attack signature constituents that possess different characteristics in the level of information abstraction. Therefore, this approach is able to not only quickly raise an alert against potential threats, but also follow it up with careful verification to reduce false alarms. We experiment with this SDN-supported collaborative approach to detect TCP SYN flood attacks on the Global Environment for Network Innovations (GENI), a realistic virtual testbed. The response times and detection accuracy, in the context of a small to medium corporate network, have demonstrated its effectiveness and scalability. 
    1076 </li> 
    1077 <br> 
    1078  
    1079  
    1080  
    1081 <li> 
    1082 <b>Chin, Tommy and Xiong, Kaiqi</b>, 
    1083 &quot;Dynamic generation containment systems (DGCS): A Moving Target Defense approach.&quot; 
    1084 2016 3rd International Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical Systems (EITEC), IEEE,  
    1085 2016. 
    1086 doi:10.1109/eitec.2016.7503690. 
    1087 <a href="http://dx.doi.org/10.1109/eitec.2016.7503690">http://dx.doi.org/10.1109/eitec.2016.7503690</a> 
    1088 <br><br><b>Abstract: </b>Supervisory Control and Data Acquisition (SCADA) systems are critical assets to public utility and manufacturing organizations. These systems, although critical, are prone to numerous cyber security related threats and attacks. To combat such challenges, we propose a Dynamic Generated Containment System (DGCS), a moving target defense model as a method of threat evasion. Under the proposed approach, we employ the use of intrusion detection systems (IDS) in conjunction with virtualization solution - Docker. The proposed approach provides an individual Docker container for each threat detected by our IDS. We conduct several experiments using high performance computing systems to measure and demonstrate our proposed approach. 
    1089 </li> 
    1090 <br> 
     1118 
    10911119 
    10921120<li> 
     
    11031131<li> 
    11041132<b>Chin, Tommy and Xiong, Kaiqi</b>, 
     1133&quot;Dynamic generation containment systems (DGCS): A Moving Target Defense approach.&quot; 
     11342016 3rd International Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical Systems (EITEC), IEEE,  
     11352016. 
     1136doi:10.1109/eitec.2016.7503690. 
     1137<a href="http://dx.doi.org/10.1109/eitec.2016.7503690">http://dx.doi.org/10.1109/eitec.2016.7503690</a> 
     1138<br><br><b>Abstract: </b>Supervisory Control and Data Acquisition (SCADA) systems are critical assets to public utility and manufacturing organizations. These systems, although critical, are prone to numerous cyber security related threats and attacks. To combat such challenges, we propose a Dynamic Generated Containment System (DGCS), a moving target defense model as a method of threat evasion. Under the proposed approach, we employ the use of intrusion detection systems (IDS) in conjunction with virtualization solution - Docker. The proposed approach provides an individual Docker container for each threat detected by our IDS. We conduct several experiments using high performance computing systems to measure and demonstrate our proposed approach. 
     1139</li> 
     1140<br> 
     1141 
     1142<li> 
     1143<b>Chin, Tommy and Xiong, Kaiqi</b>, 
    11051144&quot;MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks.&quot; 
    11061145Wireless Algorithms, Systems, and Applications, Springer International Publishing,  
     
    20222061<li> 
    20232062<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>, 
     2063&quot;QoE management in DASH systems using the segment aware rate adaptation algorithm.&quot; 
     2064NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, IEEE,  
     20652016. 
     2066doi:10.1109/noms.2016.7502805. 
     2067<a href="http://dx.doi.org/10.1109/noms.2016.7502805">http://dx.doi.org/10.1109/noms.2016.7502805</a> 
     2068<br><br><b>Abstract: </b>Dynamic Adaptive Streaming over HTTP (DASH) enables the video player to adapt the bitrate of the video while streaming to ensure playback without interruptions even with varying throughput. A DASH server hosts multiple representations of the same video, each of which is broken down into small segments of fixed playback duration. The video bitrate adaptation is purely driven by the player at the endhost. Typically, the player employs an Adaptive Bitrate (ABR) algorithm, that determines the most appropriate representation for the next segment to be downloaded, based on the current network conditions and user preferences. The aim of an ABR algorithm is to dynamically manage the Quality of Experience (QoE) of the user during the playback. ABR algorithms manage the QoE by maximizing the bitrate while at the same time trying to minimize the other QoE metrics: playback start time, duration and number of buffering events, and the number of bitrate switching events. Typically, the ABR algorithms manage the QoE by using the measured network throughput and buffer occupancy to adapt the playback bitrate. However, due to the video encoding schemes employed, the sizes of the individual segments may vary significantly. For low bandwidth networks, fluctuation in the segment sizes results in inaccurate estimation the expected segment fetch times, thereby resulting in inaccurate estimation of the optimum bitrate. In this paper we demonstrate how the Segment-Aware Rate Adaptation (SARA) algorithm, that considers the measured throughput, buffer occupancy, and the variation in segment sizes helps in better management of the users' QoE in a DASH system. By comparing with a typical throughput-based and buffer-based adaptation algorithm under varying network conditions, we demonstrate that SARA manages the QoE better, especially in a low bandwidth network. We also developed AStream, an open-source Python-based emulated DASH-video player that was used to evaluate three different ABR algor- thms and measure the QoE metrics with each of them. 
     2069</li> 
     2070<br> 
     2071 
     2072<li> 
     2073<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>, 
    20242074&quot;SARA: Segment aware rate adaptation algorithm for dynamic adaptive streaming over HTTP.&quot; 
    20252075Communication Workshop (ICCW), 2015 IEEE International Conference on, IEEE,  
     
    20282078<a href="http://dx.doi.org/10.1109/iccw.2015.7247436">http://dx.doi.org/10.1109/iccw.2015.7247436</a> 
    20292079<br><br><b>Abstract: </b>Dynamic adaptive HTTP (DASH) based streaming is steadily becoming the most popular online video streaming technique. DASH streaming provides seamless playback by adapting the video quality to the network conditions during the video playback. A DASH server supports adaptive streaming by hosting multiple representations of the video and each representation is divided into small segments of equal playback duration. At the client end, the video player uses an adaptive bitrate selection (ABR) algorithm to decide the bitrate to be selected for each segment depending on the current network conditions. Currently, proposed ABR algorithms ignore the fact that the segment sizes significantly vary for a given video bitrate. Due to this, even though an ABR algorithm is able to measure the network bandwidth, it may fail to predict the time to download the next segment In this paper, we propose a segment-aware rate adaptation (SARA) algorithm that considers the segment size variation in addition to the estimated path bandwidth and the current buffer occupancy to accurately predict the time required to download the next segment We also developed an open source Python based emulated DASH video player, that was used to compare the performance of SARA and a basic ABR. Our results show that SARA provides a significant gain over the basic algorithm in the video quality delivered, without noticeably impacting the video switching rates. 
    2030 </li> 
    2031 <br> 
    2032  
    2033 <li> 
    2034 <b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>, 
    2035 &quot;QoE management in DASH systems using the segment aware rate adaptation algorithm.&quot; 
    2036 NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, IEEE,  
    2037 2016. 
    2038 doi:10.1109/noms.2016.7502805. 
    2039 <a href="http://dx.doi.org/10.1109/noms.2016.7502805">http://dx.doi.org/10.1109/noms.2016.7502805</a> 
    2040 <br><br><b>Abstract: </b>Dynamic Adaptive Streaming over HTTP (DASH) enables the video player to adapt the bitrate of the video while streaming to ensure playback without interruptions even with varying throughput. A DASH server hosts multiple representations of the same video, each of which is broken down into small segments of fixed playback duration. The video bitrate adaptation is purely driven by the player at the endhost. Typically, the player employs an Adaptive Bitrate (ABR) algorithm, that determines the most appropriate representation for the next segment to be downloaded, based on the current network conditions and user preferences. The aim of an ABR algorithm is to dynamically manage the Quality of Experience (QoE) of the user during the playback. ABR algorithms manage the QoE by maximizing the bitrate while at the same time trying to minimize the other QoE metrics: playback start time, duration and number of buffering events, and the number of bitrate switching events. Typically, the ABR algorithms manage the QoE by using the measured network throughput and buffer occupancy to adapt the playback bitrate. However, due to the video encoding schemes employed, the sizes of the individual segments may vary significantly. For low bandwidth networks, fluctuation in the segment sizes results in inaccurate estimation the expected segment fetch times, thereby resulting in inaccurate estimation of the optimum bitrate. In this paper we demonstrate how the Segment-Aware Rate Adaptation (SARA) algorithm, that considers the measured throughput, buffer occupancy, and the variation in segment sizes helps in better management of the users' QoE in a DASH system. By comparing with a typical throughput-based and buffer-based adaptation algorithm under varying network conditions, we demonstrate that SARA manages the QoE better, especially in a low bandwidth network. We also developed AStream, an open-source Python-based emulated DASH-video player that was used to evaluate three different ABR algor- thms and measure the QoE metrics with each of them. 
    20412080</li> 
    20422081<br> 
     
    22022241<li> 
    22032242<b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>, 
     2243&quot;Performance of GENI Cloud Testbeds for Real Time Scientific Application.&quot; 
     2244First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,  
     22452012. 
     2246 
     2247 
     2248<br><br><b>Abstract: </b>Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform. 
     2249</li> 
     2250<br> 
     2251 
     2252<li> 
     2253<b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>, 
    22042254&quot;Network capabilities of cloud services for a real time scientific application.&quot; 
    2205225537th Annual IEEE Conference on Local Computer Networks, Clearwater Beach, FL, USA, IEEE,  
     
    22082258<a href="http://dx.doi.org/10.1109/lcn.2012.6423665">http://dx.doi.org/10.1109/lcn.2012.6423665</a> 
    22092259<br><br><b>Abstract: </b>Dedicating high-end servers for executing scientific applications that run intermittently, such as severe weather detection or generalized weather forecasting, wastes resources. While the Infrastructure-as-a-Service (IaaS) model used by today's cloud platforms is well-suited for the bursty computational demands of these applications, it is unclear if the network capabilities of today's cloud platforms are sufficient. In this paper, we analyze the networking capabilities of multiple commercial (Amazon's EC2 and Rackspace) and research (GENICloud and ExoGENI cloud) platforms in the context of a Nowcasting application, a forecasting algorithm for highly accurate, near-term, e.g., 5-20 minutes, weather predictions. The application has both computational and network requirements. While it executes rarely, whenever severe weather approaches, it benefits from an IaaS model; However, since its results are time-critical, enough bandwidth must be available to transmit radar data to cloud platforms before it becomes stale. We conduct network capacity measurements between radar sites and cloud platforms throughout the country. Our results indicate that ExoGENI cloud performs the best for both serial and parallel data transfer with an average throughput of 110.22 Mbps and 17.2 Mbps, respectively. We also found that the cloud services perform better in the distributed data transfer case, where a subset of nodes transmit data in parallel to a cloud instance. Ultimately, we conclude that commercial and research clouds are capable of providing sufficient bandwidth for our real-time Nowcasting application. 
    2210 </li> 
    2211 <br> 
    2212  
    2213 <li> 
    2214 <b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>, 
    2215 &quot;Performance of GENI Cloud Testbeds for Real Time Scientific Application.&quot; 
    2216 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,  
    2217 2012. 
    2218  
    2219  
    2220 <br><br><b>Abstract: </b>Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform. 
    22212260</li> 
    22222261<br> 
     
    24722511 
    24732512<li> 
     2513<b>Liu, Shuhao and Li, Baochun</b>, 
     2514&quot;Stemflow: Software-Defined Inter-Datacenter Overlay as a Service.&quot; 
     2515IEEE Journal on Selected Areas in Communications,  
     25162017. 
     2517doi:10.1109/jsac.2017.2760159. 
     2518<a href="http://dx.doi.org/10.1109/jsac.2017.2760159">http://dx.doi.org/10.1109/jsac.2017.2760159</a> 
     2519<br><br><b>Abstract: </b>Modern Internet applications are typically hosted in the public cloud, with multiple server instances running within geographically distributed datacenters. Thanks to the abundantly available bandwidth on wide-area links that interconnect these datacenters, it is conceivable that bandwidth-intensive applications may improve their performance by relaying their traffic through such an inter-datacenter network. However, there does not yet exist a cloud service that provides a turn-key solution to tap into such available bandwidth resources conveniently. In this paper, we design and implement Stemflow, a new system framework that provides Inter-Datacenter Overlay as a Service based on the software-defined networking principle. It offers an attractive foundation that helps an Internet application to transparently improve its scalability and performance by using inter-datacenter networks for its traffic. With Stemflow, all deployed server instances will construct an overlay atop an interdatacenter network, and the routing decisions to relay application traffic are made by a centralized controller. The algorithms needed to make these decisions are customized to meet the needs of individual applications, and are cached within the data plane. We motivate and describe the design decisions, and present an extensive experimental evaluation in public cloud infrastructures, using two example applications as our case studies. 
     2520</li> 
     2521<br> 
     2522 
     2523 
     2524 
     2525<li> 
    24742526<b>Liu, Xuan</b>, 
    24752527&quot;Dynamic Virtual Network Restoration with Optimal Standby Virtual Router Selection (Doctoral dissertation).&quot; 
     
    26032655<li> 
    26042656<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>, 
     2657&quot;Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies.&quot; 
     2658Teletraffic Congress (ITC), 2014 26th International, IEEE,  
     26592014. 
     2660doi:10.1109/itc.2014.6932970. 
     2661<a href="http://dx.doi.org/10.1109/itc.2014.6932970">http://dx.doi.org/10.1109/itc.2014.6932970</a> 
     2662<br><br><b>Abstract: </b>Software Defined Networks (SDNs), primarily based on OpenFlow, are being deployed in single domain networks around the world. The popularity of SDNs has given rise to multiple considerations about designing, implementing, and operating Software-Defined Network Exchanges (SDXs), to enable SDNs to interconnect SDN islands and to extend SDNs across multiple domains. These goals can be accomplished only by developing new techniques that extend the single domain orientation of current SDN/OpenFlow approaches to include capabilities for multidomain control, including those for resource discovery, signaling, and dynamic provisioning. Several networking research communities have begun to investigate these concepts. Early architectural models of SDXs have been designed and implemented as prototypes. These SDXs are being used to conduct experiments and to demonstrate the potentials of SDXs. 
     2663</li> 
     2664<br> 
     2665 
     2666<li> 
     2667<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>, 
    26052668&quot;Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques.&quot; 
    26062669Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA,  
     
    26202683<a href="http://dx.doi.org/10.1016/j.bjp.2013.12.024">http://dx.doi.org/10.1016/j.bjp.2013.12.024</a> 
    26212684<br><br><b>Abstract: </b>Large scale national and international experimental research environments are required to advance communication services and supporting network architecture, technology, and infrastructure. Theories and concepts are often explored using simulation and modeling techniques within labs or on small scale testbeds. However, while such testbeds are valuable resources for the research process, these facilities alone cannot provide an appropriate approximation of the real world conditions required to explore ideas at scale. Very large scale global, experimental network research capabilities are required to deeply investigate innovative concepts. For many years, network testbeds were created to address fairly specific, well defined, limited research goals, and they were implemented for fairly short periods. Recently, taking advantage of a number of macro information technology trends, such as virtualization and programmable resources, several network research communities have been developing innovative types of network research environments. Instead of designing traditional network testbeds, research communities are designing large scale, highly flexible distributed platforms that can be used to create many different types of testbeds. Also, rather than creating short term testbeds for limited research objectives, these new environments are being designed as long term persistent resources to support many types of experimental research. This paper describes the motivations for this trend, provides several examples of large scale distributed network research environments based on the Global Lambda Integrated Facility (GLIF) and the StarLight Exchange Facility, including the Global Environment for Network Innovation (GENI), and indicates emerging future trends for these types of environments. 
    2622 </li> 
    2623 <br> 
    2624  
    2625 <li> 
    2626 <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>, 
    2627 &quot;Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies.&quot; 
    2628 Teletraffic Congress (ITC), 2014 26th International, IEEE,  
    2629 2014. 
    2630 doi:10.1109/itc.2014.6932970. 
    2631 <a href="http://dx.doi.org/10.1109/itc.2014.6932970">http://dx.doi.org/10.1109/itc.2014.6932970</a> 
    2632 <br><br><b>Abstract: </b>Software Defined Networks (SDNs), primarily based on OpenFlow, are being deployed in single domain networks around the world. The popularity of SDNs has given rise to multiple considerations about designing, implementing, and operating Software-Defined Network Exchanges (SDXs), to enable SDNs to interconnect SDN islands and to extend SDNs across multiple domains. These goals can be accomplished only by developing new techniques that extend the single domain orientation of current SDN/OpenFlow approaches to include capabilities for multidomain control, including those for resource discovery, signaling, and dynamic provisioning. Several networking research communities have begun to investigate these concepts. Early architectural models of SDXs have been designed and implemented as prototypes. These SDXs are being used to conduct experiments and to demonstrate the potentials of SDXs. 
    26332685</li> 
    26342686<br> 
     
    29883040 
    29893041<li> 
     3042<b>Neupane, Roshan L. and Neely, Travis and Chettri, Nishant and Vassell, Mark and Zhang, Yuanxun and Calyam, Prasad and Durairajan, Ramakrishnan</b>, 
     3043&quot;Dolus: Cyber Defense using Pretense against DDoS Attacks in Cloud Platforms.&quot; 
     3044Proceedings of the 19th International Conference on Distributed Computing and Networking (ICDCN '18), Varanasi, India,  
     30452018. 
     3046 
     3047<a href="https://www.semanticscholar.org/paper/Dolus-Cyber-Defense-using-Pretense-against-DDoS-At-Neupane-Neely/763f3e0d97a0b6acc96bdc8dd55212387164fbac">https://www.semanticscholar.org/paper/Dolus-Cyber-Defense-using-Pretense-against-DDoS-At-Neupane-Neely/763f3e0d97a0b6acc96bdc8dd55212387164fbac</a> 
     3048<br><br><b>Abstract: </b>Cloud-hosted services are being increasingly used in online businesses in e.g., retail, healthcare, manufacturing, entertainment due to benefits such as scalability and reliability. These benefits are fueled by innovations in orchestration of cloud platforms that make them totally programmable as Software Defined everything Infrastructures (SDxI). At the same time, sophisticated targeted attacks such as Distributed Denial-of-Service (DDoS) are growing on an unprecedented scale threatening the availability of online businesses. In this paper, we present a novel defense system called Dolus to mitigate the impact of DDoS attacks launched against high-value services hosted in SDxI-based cloud platforms. Our Dolus system is able to initiate a 'pretense' in a scalable and collaborative manner to deter the attacker based on threat intelligence obtained from attack feature analysis in a two-stage ensemble learning scheme. Using foundations from pretense theory in child play, Dolus takes advantage of elastic capacity provisioning via 'quarantine virtual machines' and SDxI policy co-ordination across multiple network domains to deceive the attacker by creating a false sense of success. From the time gained through pretense initiation, Dolus enables cloud service providers to decide on a variety of policies to mitigate the attack impact, without disrupting the cloud services experience for legitimate users. We evaluate the efficacy of Dolus using a GENI Cloud testbed and demonstrate its real-time capabilities to: (a) detect DDoS attacks and redirect attack traffic to quarantine resources to engage the attacker under pretense, and (b) coordinate SDxI policies to possibly block DDoS attacks closer to the attack source(s). 
     3049</li> 
     3050<br> 
     3051 
     3052 
     3053 
     3054<li> 
    29903055<b>Nozaki, Yoshihiro and Bakshi, Parth and Tuncer, Hasan and Shenoy, Nirmala</b>, 
    29913056&quot;Evaluation of tiered routing protocol in floating cloud tiered internet architecture.&quot; 
     
    30413106<li> 
    30423107<b>Ozcelik, Ilker and Brooks, Richard R.</b>, 
     3108&quot;Performance Analysis of DDoS Detection Methods on Real Network.&quot; 
     3109First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,  
     31102012. 
     3111 
     3112 
     3113<br><br><b>Abstract: </b>Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic. 
     3114</li> 
     3115<br> 
     3116 
     3117<li> 
     3118<b>Ozcelik, Ilker and Brooks, Richard R.</b>, 
    30433119&quot;Security experimentation using operational systems.&quot; 
    30443120Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, Tennessee, ACM, New York, NY, USA,  
     
    30613137<br> 
    30623138 
    3063 <li> 
    3064 <b>Ozcelik, Ilker and Brooks, Richard R.</b>, 
    3065 &quot;Performance Analysis of DDoS Detection Methods on Real Network.&quot; 
    3066 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,  
    3067 2012. 
    3068  
    3069  
    3070 <br><br><b>Abstract: </b>Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic. 
    3071 </li> 
    3072 <br> 
    3073  
    30743139 
    30753140 
     
    32963361 
    32973362<li> 
     3363<b>Rezgui, Abdelmounaam and Davis, Nickolas and Malik, Zaki and Medjahed, Brahim and Soliman, Hamdy</b>, 
     3364&quot;CloudFinder: A System for Processing Big Data Workloads on Volunteered Federated Clouds.&quot; 
     3365IEEE Transactions on Big Data,  
     33662017. 
     3367doi:10.1109/tbdata.2017.2703830. 
     3368<a href="http://dx.doi.org/10.1109/tbdata.2017.2703830">http://dx.doi.org/10.1109/tbdata.2017.2703830</a> 
     3369<br><br><b>Abstract: </b>The proliferation of private clouds that are often underutilized and the tremendous computational potential of these clouds when combined has recently brought forth the idea of volunteer cloud computing (VCC), a computing model where cloud owners contribute underutilized computing and/or storage resources on their clouds to support the execution of applications of other members in the community. This model is particularly suitable to solve big data scientific problems. Scientists in data-intensive scientific fields increasingly recognize that sharing volunteered resources from several clouds is a cost-effective alternative to solve many complex, data- and/or compute-intensive science problems. Despite the promise of the idea of VCC, it still remains at the vision stage at best. Challenges include the heterogeneity and autonomy of member clouds, access control and security, complex inter-cloud virtual machine scheduling, etc. In this paper, we present CloudFinder, a system that supports the efficient execution of big data workloads on volunteered federated clouds (VFCs). Our evaluation of the system indicates that VFCs are a promising cost-effective approach to enable big data science. 
     3370</li> 
     3371<br> 
     3372 
     3373 
     3374 
     3375<li> 
    32983376<b>Ricart, Glenn</b>, 
    32993377&quot;US Ignite testbeds: Advanced testbeds enable next-generation applications.&quot; 
     
    46314709 
    46324710<li> 
     4711<b>Xu, Zhiguang</b>, 
     4712&quot;Adaptive Flow Admission Control in a Software-Defined Network.&quot; 
     47132017 IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, IEEE,  
     47142017. 
     4715doi:10.1109/smartcloud.2017.27. 
     4716<a href="http://dx.doi.org/10.1109/smartcloud.2017.27">http://dx.doi.org/10.1109/smartcloud.2017.27</a> 
     4717<br><br><b>Abstract: </b>In this paper, we have followed the idea of exploiting the highly flexible architecture of Software-Defined Network (SDN) to provide an adaptive packet Flow Admission Control (FAC) system. Both Quality of Service (QoS) requirements of the packet flow and the current state and situation in the network are put under consideration when admission decisions are made. Furthermore, our proposed FAC monitors and dynamically adapts to the changes of network parameters such as bandwidth, delay, jitter, latency, and classification of traffics for better overall user experience. This paper finds ways to implement the proposed adaptive FAC for improved QoS using a custom built OpenFlow controller based on Floodlight in the production environment of GENI, a national testbed for innovative networking and distributed systems experiments. The experimental results indicate that the adaptive FAC delivers an improvement of up to 67&#x0025; in comparison with the traditional FAC when unsatisfied user percentage is measured. Also, the adaptive FAC enhanced the average end-to-end delay and network resource (i.e. bandwidth) utilization by up to 30&#x0025; and 50\\ respectively. 
     4718</li> 
     4719<br> 
     4720 
     4721 
     4722 
     4723<li> 
     4724<b>Yan, Bo and Shi, Shu and Liu, Yong and Yuan, Weizhe and He, Haoqin and Jana, Rittwik and Xu, Yang and Chao, H. Jonathan</b>, 
     4725&quot;LiveJack.&quot; 
     4726Proceedings of the 2017 ACM on Multimedia Conference - MM '17, Mountain View, California, USA, ACM Press,  
     47272017. 
     4728doi:10.1145/3123266.3123283. 
     4729<a href="http://dx.doi.org/10.1145/3123266.3123283">http://dx.doi.org/10.1145/3123266.3123283</a> 
     4730<br><br><b>Abstract: </b>Emerging commercial live content broadcasting platforms are facing great challenges to accommodate large scale dynamic viewer populations. Existing solutions constantly suffer from balancing the cost of deploying at the edge close to the viewers and the quality of content delivery. We propose LiveJack, a novel network service to allow CDN servers to seamlessly leverage ISP edge cloud resources. LiveJack can elastically scale the serving capacity of CDN servers by integrating Virtual Media Functions (VMF) in the edge cloud to accommodate flash crowds for very popular contents. LiveJack introduces minor application layer changes for streaming service providers and is completely transparent to end users. We have prototyped LiveJack in both LAN and WAN environments. Evaluations demonstrate that LiveJack can increase CDN server capacity by more than six times, and can effectively accommodate highly dynamic workloads with an improved service quality. 
     4731</li> 
     4732<br> 
     4733 
     4734 
     4735 
     4736<li> 
    46334737<b>Yi, Ping</b>, 
    46344738&quot;Peer-to-Peer based Trading and File Distribution for Cloud Computing (Doctoral dissertation).&quot; 
     
    47224826 
    47234827<li> 
     4828<b>Zhang, Yuanxun and Calyam, Prasad and Debroy, Saptarshi and Nuguri, Sai S.</b>, 
     4829&quot;Social Plane for Recommenders in Network Performance Expectation Management.&quot; 
     4830IEEE Transactions on Network and Service Management,  
     48312017. 
     4832doi:10.1109/tnsm.2017.2772905. 
     4833<a href="http://dx.doi.org/10.1109/tnsm.2017.2772905">http://dx.doi.org/10.1109/tnsm.2017.2772905</a> 
     4834<br><br><b>Abstract: </b>Multi-domain end-to-end network performance monitoring (NPM) federations such as perfSONAR are increasingly being used in Big Data application management. They rely on trustworthy collaborative measurement intelligence to identify and diagnose network anomaly events that impact application performance. Large volumes of end-to-end measurement traces are generated on a daily basis, and new Big Data analysis techniques are needed to isolate network-wide anomaly event(s) and to diagnose the root-cause(s). In addition, not all network operators and application users have enough knowledge and experience to understand the anomaly events. The lack of a platform for sharing knowledge and working collaboratively makes it difficult to isolate and diagnose network-wide anomaly events quickly and accurately. In this paper, we define a ” social plane” that relies on recommended measurements based on ” content-based filtering” and ” collaborative filtering” approaches to enable network performance expectation management. Based on similarity analysis, the ” content-based filtering” facilitates users to subscribe to useful measurements, and the ” collaborative filtering” promotes users to share knowledge on anomaly symptoms. Using real perfSONAR measurements and synthetic events, we show the effectiveness of our social plane approach within a SoyKB Big Data application case study using social network creation and mingling of experts. Our experimental results show that our measurements recommendation scheme has high precision, recall and accuracy, as well as efficiency in terms of the time taken for large volume measurement trace analysis. 
     4835</li> 
     4836<br> 
     4837 
     4838 
     4839 
     4840<li> 
    47244841<b>Zhao, Shuai and Sydney, Ali and Medhi, Deep</b>, 
    47254842&quot;Building Application-Aware Network Environments Using SDN for Optimizing Hadoop Applications.&quot; 
     
    48384955<li> 
    48394956<b>Alaoui, Sara E. and Ramamurthy, Byrav</b>, 
    4840 &quot;EAODR: A Novel Routing Algorithm Based on the Modified Temporal Graph Network Model for DTN-Based Interplanetary Networks.&quot 
     4957&quot;EAODR: A novel routing algorithm based on the Modified Temporal Graph network model for DTN-based Interplanetary Networks.&quot 
    48414958Computer Networks,  
    484249592017. 
     
    49145031 
    49155032<li> 
     5033<b>Antequera, R. Bazan and Calyam, P. and Chemodanov, D. and de Donato, W. and Mishra, A. and Pescape, A. and Skubic, M.</b>, 
     5034&quot;Socio-technical approach to engineer gigabit app performance for physicaltherapy-as-a-service.&quot 
     50352017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom), Dalian, China, IEEE,  
     50362017. 
     5037doi:10.1109/healthcom.2017.8210768. 
     5038</li> 
     5039<br> 
     5040 
     5041 
     5042 
     5043<li> 
    49165044<b>Antequera, Ronny B. and Calyam, Prasad and Chandrashekara, Arjun A. and Malhotra, Shivoam</b>, 
    49175045&quot;Recommending Resources to Cloud Applications Based on Custom Templates Composition.&quot 
     
    49475075 
    49485076<li> 
     5077<b>Arezoumand, Saeed</b>, 
     5078&quot;End to End Orchestration of Distributed Cloud Applications (Master's Thesis).&quot 
     5079 
     50802017. 
     5081 
     5082</li> 
     5083<br> 
     5084 
     5085 
     5086 
     5087<li> 
    49495088<b>Arezoumand, Saeed and Bannazadeh, Hadi and Leon-Garcia, Alberto</b>, 
    49505089&quot;HyperExchange: A protocol-agnostic exchange fabric enabling peering of Virtual Networks.&quot 
     
    55065645 
    55075646<li> 
     5647<b>Cecil, J. and Gupta, Avinash and Pirela-Cruz, Miguel and Ramanathan, Parmesh</b>, 
     5648&quot;A cyber training framework for orthopedic surgery.&quot 
     5649Cogent Medicine,  
     56502017. 
     5651doi:10.1080/2331205x.2017.1419792. 
     5652</li> 
     5653<br> 
     5654 
     5655 
     5656 
     5657<li> 
    55085658<b>Cecil, J. and Gupta, Avinash and Ramanathan, P. and Pirela-Cruz, Miguel</b>, 
    55095659&quot;A distributed collaborative simulation environment for orthopedic surgical training.&quot 
     
    55405690<li> 
    55415691<b>Chen, Kang and Shen, Haiying</b>, 
     5692&quot;Global optimization of file availability through replication for efficient file sharing in MANETs.&quot 
     5693Network Protocols (ICNP), 2011 19th IEEE International Conference on, Vancouver, AB, Canada, IEEE,  
     56942011. 
     5695doi:10.1109/icnp.2011.6089056. 
     5696</li> 
     5697<br> 
     5698 
     5699<li> 
     5700<b>Chen, Kang and Shen, Haiying</b>, 
    55425701&quot;Cont2: Social-Aware Content and Contact Based File Search in Delay Tolerant Networks.&quot 
    55435702Proceedings of the 2013 42Nd International Conference on Parallel Processing, IEEE Computer Society, Washington, DC, USA,  
    554457032013. 
    55455704doi:10.1109/icpp.2013.28. 
    5546 </li> 
    5547 <br> 
    5548  
    5549 <li> 
    5550 <b>Chen, Kang and Shen, Haiying</b>, 
    5551 &quot;Global optimization of file availability through replication for efficient file sharing in MANETs.&quot 
    5552 Network Protocols (ICNP), 2011 19th IEEE International Conference on, Vancouver, AB, Canada, IEEE,  
    5553 2011. 
    5554 doi:10.1109/icnp.2011.6089056. 
    55555705</li> 
    55565706<br> 
     
    56265776<li> 
    56275777<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>, 
     5778&quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot 
     5779MILCOM 2015 - 2015 IEEE Military Communications Conference, Tampa, FL, USA, IEEE,  
     57802015. 
     5781doi:10.1109/milcom.2015.7357519. 
     5782</li> 
     5783<br> 
     5784 
     5785<li> 
     5786<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>, 
    56285787&quot;Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN).&quot 
    56295788Distributed Computing Systems Workshops (ICDCSW), 2015 IEEE 35th International Conference on, IEEE,  
     
    56335792<br> 
    56345793 
    5635 <li> 
    5636 <b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>, 
    5637 &quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot 
    5638 MILCOM 2015 - 2015 IEEE Military Communications Conference, Tampa, FL, USA, IEEE,  
    5639 2015. 
    5640 doi:10.1109/milcom.2015.7357519. 
    5641 </li> 
    5642 <br> 
    5643  
    56445794 
    56455795 
    56465796<li> 
    56475797<b>Chin, Tommy and Xiong, Kaiqi</b>, 
    5648 &quot;Dynamic generation containment systems (DGCS): A Moving Target Defense approach.&quot 
    5649 2016 3rd International Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical Systems (EITEC), IEEE,  
    5650 2016. 
    5651 doi:10.1109/eitec.2016.7503690. 
     5798&quot;MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks.&quot 
     5799Wireless Algorithms, Systems, and Applications, Springer International Publishing,  
     58002016. 
     5801doi:10.1007/978-3-319-42836-9&#x005F;43. 
    56525802</li> 
    56535803<br> 
     
    56645814<li> 
    56655815<b>Chin, Tommy and Xiong, Kaiqi</b>, 
    5666 &quot;MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks.&quot 
    5667 Wireless Algorithms, Systems, and Applications, Springer International Publishing,  
    5668 2016. 
    5669 doi:10.1007/978-3-319-42836-9&#x005F;43. 
     5816&quot;Dynamic generation containment systems (DGCS): A Moving Target Defense approach.&quot 
     58172016 3rd International Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical Systems (EITEC), IEEE,  
     58182016. 
     5819doi:10.1109/eitec.2016.7503690. 
    56705820</li> 
    56715821<br> 
     
    64416591<li> 
    64426592<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>, 
     6593&quot;QoE management in DASH systems using the segment aware rate adaptation algorithm.&quot 
     6594NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, IEEE,  
     65952016. 
     6596doi:10.1109/noms.2016.7502805. 
     6597</li> 
     6598<br> 
     6599 
     6600<li> 
     6601<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>, 
    64436602&quot;SARA: Segment aware rate adaptation algorithm for dynamic adaptive streaming over HTTP.&quot 
    64446603Communication Workshop (ICCW), 2015 IEEE International Conference on, IEEE,  
    644566042015. 
    64466605doi:10.1109/iccw.2015.7247436. 
    6447 </li> 
    6448 <br> 
    6449  
    6450 <li> 
    6451 <b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>, 
    6452 &quot;QoE management in DASH systems using the segment aware rate adaptation algorithm.&quot 
    6453 NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, IEEE,  
    6454 2016. 
    6455 doi:10.1109/noms.2016.7502805. 
    64566606</li> 
    64576607<br> 
     
    65936743<li> 
    65946744<b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>, 
     6745&quot;Performance of GENI Cloud Testbeds for Real Time Scientific Application.&quot 
     6746First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,  
     67472012. 
     6748 
     6749</li> 
     6750<br> 
     6751 
     6752<li> 
     6753<b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>, 
    65956754&quot;Network capabilities of cloud services for a real time scientific application.&quot 
    6596675537th Annual IEEE Conference on Local Computer Networks, Clearwater Beach, FL, USA, IEEE,  
    659767562012. 
    65986757doi:10.1109/lcn.2012.6423665. 
    6599 </li> 
    6600 <br> 
    6601  
    6602 <li> 
    6603 <b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>, 
    6604 &quot;Performance of GENI Cloud Testbeds for Real Time Scientific Application.&quot 
    6605 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,  
    6606 2012. 
    6607  
    66086758</li> 
    66096759<br> 
     
    68216971 
    68226972<li> 
     6973<b>Liu, Shuhao and Li, Baochun</b>, 
     6974&quot;Stemflow: Software-Defined Inter-Datacenter Overlay as a Service.&quot 
     6975IEEE Journal on Selected Areas in Communications,  
     69762017. 
     6977doi:10.1109/jsac.2017.2760159. 
     6978</li> 
     6979<br> 
     6980 
     6981 
     6982 
     6983<li> 
    68236984<b>Liu, Xuan</b>, 
    68246985&quot;Dynamic Virtual Network Restoration with Optimal Standby Virtual Router Selection (Doctoral dissertation).&quot 
     
    69327093<li> 
    69337094<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>, 
     7095&quot;Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques.&quot 
     7096Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA,  
     70972016. 
     7098doi:10.1145/2955193.2955194. 
     7099</li> 
     7100<br> 
     7101 
     7102<li> 
     7103<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>, 
    69347104&quot;Creating environments for innovation: Designing and implementing advanced experimental network research testbeds based on the Global Lambda Integrated Facility and the StarLight Exchange.&quot 
    69357105Computer Networks,  
    693671062014. 
    69377107doi:10.1016/j.bjp.2013.12.024. 
    6938 </li> 
    6939 <br> 
    6940  
    6941 <li> 
    6942 <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>, 
    6943 &quot;Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques.&quot 
    6944 Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA,  
    6945 2016. 
    6946 doi:10.1145/2955193.2955194. 
    69477108</li> 
    69487109<br> 
     
    72577418 
    72587419<li> 
     7420<b>Neupane, Roshan L. and Neely, Travis and Chettri, Nishant and Vassell, Mark and Zhang, Yuanxun and Calyam, Prasad and Durairajan, Ramakrishnan</b>, 
     7421&quot;Dolus: Cyber Defense using Pretense against DDoS Attacks in Cloud Platforms.&quot 
     7422Proceedings of the 19th International Conference on Distributed Computing and Networking (ICDCN '18), Varanasi, India,  
     74232018. 
     7424 
     7425</li> 
     7426<br> 
     7427 
     7428 
     7429 
     7430<li> 
    72597431<b>Nozaki, Yoshihiro and Bakshi, Parth and Tuncer, Hasan and Shenoy, Nirmala</b>, 
    72607432&quot;Evaluation of tiered routing protocol in floating cloud tiered internet architecture.&quot 
     
    73117483<li> 
    73127484<b>Ozcelik, Ilker and Brooks, Richard R.</b>, 
     7485&quot;Performance Analysis of DDoS Detection Methods on Real Network.&quot 
     7486First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,  
     74872012. 
     7488 
     7489</li> 
     7490<br> 
     7491 
     7492<li> 
     7493<b>Ozcelik, Ilker and Brooks, Richard R.</b>, 
    73137494&quot;Security experimentation using operational systems.&quot 
    73147495Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, Tennessee, ACM, New York, NY, USA,  
    731574962011. 
    73167497doi:10.1145/2179298.2179388. 
    7317 </li> 
    7318 <br> 
    7319  
    7320 <li> 
    7321 <b>Ozcelik, Ilker and Brooks, Richard R.</b>, 
    7322 &quot;Performance Analysis of DDoS Detection Methods on Real Network.&quot 
    7323 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,  
    7324 2012. 
    7325  
    73267498</li> 
    73277499<br> 
     
    75177689 
    75187690<li> 
     7691<b>Rezgui, Abdelmounaam and Davis, Nickolas and Malik, Zaki and Medjahed, Brahim and Soliman, Hamdy</b>, 
     7692&quot;CloudFinder: A System for Processing Big Data Workloads on Volunteered Federated Clouds.&quot 
     7693IEEE Transactions on Big Data,  
     76942017. 
     7695doi:10.1109/tbdata.2017.2703830. 
     7696</li> 
     7697<br> 
     7698 
     7699 
     7700 
     7701<li> 
    75197702<b>Ricart, Glenn</b>, 
    75207703&quot;US Ignite testbeds: Advanced testbeds enable next-generation applications.&quot 
     
    86468829 
    86478830<li> 
     8831<b>Xu, Zhiguang</b>, 
     8832&quot;Adaptive Flow Admission Control in a Software-Defined Network.&quot 
     88332017 IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, IEEE,  
     88342017. 
     8835doi:10.1109/smartcloud.2017.27. 
     8836</li> 
     8837<br> 
     8838 
     8839 
     8840 
     8841<li> 
     8842<b>Yan, Bo and Shi, Shu and Liu, Yong and Yuan, Weizhe and He, Haoqin and Jana, Rittwik and Xu, Yang and Chao, H. Jonathan</b>, 
     8843&quot;LiveJack.&quot 
     8844Proceedings of the 2017 ACM on Multimedia Conference - MM '17, Mountain View, California, USA, ACM Press,  
     88452017. 
     8846doi:10.1145/3123266.3123283. 
     8847</li> 
     8848<br> 
     8849 
     8850 
     8851 
     8852<li> 
    86488853<b>Yi, Ping</b>, 
    86498854&quot;Peer-to-Peer based Trading and File Distribution for Cloud Computing (Doctoral dissertation).&quot 
     
    871789222013. 
    87188923doi:10.1145/2508859.2516752. 
     8924</li> 
     8925<br> 
     8926 
     8927 
     8928 
     8929<li> 
     8930<b>Zhang, Yuanxun and Calyam, Prasad and Debroy, Saptarshi and Nuguri, Sai S.</b>, 
     8931&quot;Social Plane for Recommenders in Network Performance Expectation Management.&quot 
     8932IEEE Transactions on Network and Service Management,  
     89332017. 
     8934doi:10.1109/tnsm.2017.2772905. 
    87198935</li> 
    87208936<br> 
     
    87949010<li> Angu, Pragatheeswaran </li> 
    87959011<li> Anifantis, Evangelos </li> 
    8796 <li> Antequera, Ronny B. (Antequera, R. B.) </li> 
     9012<li> Antequera, R. Bazan (Antequera, R. B., Antequera, Ronny B.) </li> 
    87979013<li> Antonenko, V. </li> 
    87989014<li> Appenzeller, Guido </li> 
     
    88739089<li> Chandrashekara, Arjun A. </li> 
    88749090<li> Channegowda, M. </li> 
     9091<li> Chao, H. Jonathan </li> 
    88759092<li> Chase, Jeffrey S. (Chase, J., Chase, Jeff, Chase, Jeffrey) </li> 
    88769093<li> Chase, Unc-Ch J. </li> 
     
    88849101<li> Chen, Yang </li> 
    88859102<li> Cherukuri, Ramkumar </li> 
     9103<li> Chettri, Nishant </li> 
    88869104<li> Chikkulapelly, Srikanth (Chikkulapelly, S.) </li> 
    88879105<li> Chin, Tommy </li> 
     
    89129130<li> Das, S. </li> 
    89139131<li> DaSilva, Luiz A. </li> 
     9132<li> Davis, Nickolas </li> 
    89149133<li> Day, John </li> 
    89159134<li> Daya, R. </li> 
     9135<li> de Donato, W. </li> 
    89169136<li> de Graaff, Ben </li> 
    89179137<li> de Laat, Cees </li> 
     9138<li> Debroy, Saptarshi </li> 
    89189139<li> Dechouniotis, Dimitrios </li> 
    89199140<li> Decker, Steven G. </li> 
     
    89439164<li> Dumba, Braulio </li> 
    89449165<li> Duplyakin, Dmitry </li> 
     9166<li> Durairajan, Ramakrishnan </li> 
    89459167<li> Dutta, Rudra (Dutta, R.) </li> 
    89469168<li> Edwards, Sarah (Edwards, S.) </li> 
     
    90209242<li> Hay, Brian </li> 
    90219243<li> Hayashi, Michiaki </li> 
     9244<li> He, Haoqin </li> 
    90229245<li> Heath, Alison </li> 
    90239246<li> Heerman, Chris (Heerman, C.) </li> 
     
    90489271<li> Jain, Raj </li> 
    90499272<li> Jain, Shweta </li> 
     9273<li> Jana, Rittwik </li> 
    90509274<li> Janak, Jan (Janak, J.) </li> 
    90519275<li> Javed, Umar </li> 
     
    91249348<li> Leto, Ray </li> 
    91259349<li> Levine, Brian </li> 
     9350<li> Li, Baochun </li> 
    91269351<li> Li, Chuan </li> 
    91279352<li> Li, Dawei </li> 
     
    91489373<li> Liu, Kaikai </li> 
    91499374<li> Liu, Lei </li> 
     9375<li> Liu, Shuhao </li> 
    91509376<li> Liu, Te-Lung </li> 
    91519377<li> Liu, Xinxin </li> 
     
    91719397<li> Makati, Mufaddal </li> 
    91729398<li> Malhotra, Shivoam </li> 
     9399<li> Malik, Zaki </li> 
    91739400<li> Malishevskiy, A. </li> 
    91749401<li> Mambretti, Joe (Mambretti, J.) </li> 
     
    91919418<li> McKeown, Nick (McKeown, N.) </li> 
    91929419<li> Medhi, Deepankar (Medhi, Deep) </li> 
     9420<li> Medjahed, Brahim </li> 
    91939421<li> Mehani, Olivier </li> 
    91949422<li> Mehto, RInkel </li> 
     
    92029430<li> Mills, Jonathan </li> 
    92039431<li> Mirkovic, Jelena </li> 
    9204 <li> Mishra, Anup </li> 
     9432<li> Mishra, Anup (Mishra, A.) </li> 
    92059433<li> Mitchell, Thomas </li> 
    92069434<li> Mitroff, Sarah </li> 
     
    92359463<li> Nayak, Ankur </li> 
    92369464<li> Naylor, David </li> 
     9465<li> Neely, Travis </li> 
    92379466<li> Nejabati, R. </li> 
    92389467<li> Nelson, Jude </li> 
    92399468<li> Nelson, Sam </li> 
     9469<li> Neupane, Roshan L. </li> 
    92409470<li> Nicho, J. </li> 
    92419471<li> Nishinaga, Nozomu </li> 
    92429472<li> Nishioka, Itaru </li> 
    92439473<li> Nozaki, Yoshihiro </li> 
     9474<li> Nuguri, Sai S. </li> 
    92449475<li> Nussbaum, Lucas </li> 
    92459476<li> Nutaro, J. </li> 
     
    92779508<li> Pentikousis, Kostas </li> 
    92789509<li> Perrig, Adrian </li> 
     9510<li> Pescape, A. </li> 
    92799511<li> Peter, Simon </li> 
    92809512<li> Peterson, Larry </li> 
     
    93169548<li> Reuther, Bernd </li> 
    93179549<li> Rexford, Jennifer </li> 
     9550<li> Rezgui, Abdelmounaam </li> 
    93189551<li> Ricart, Glenn </li> 
    93199552<li> Ricci, Robert (Ricci, R., Ricci, Rob) </li> 
     
    93759608<li> Sher-DeCusatis, Carolyn J. </li> 
    93769609<li> Shetty, Sachin (Shetty, S.) </li> 
     9610<li> Shi, Shu </li> 
    93779611<li> Shi, Xiaomeng </li> 
    93789612<li> Shimojo, Shinji </li> 
     
    93859619<li> Sivakumar, Ashiwan </li> 
    93869620<li> Sivalingam, KrishnaM </li> 
    9387 <li> Skubic, Marjorie </li> 
     9621<li> Skubic, Marjorie (Skubic, M.) </li> 
    93889622<li> Slezak, Joseph </li> 
    93899623<li> Smeliansky, R. </li> 
    93909624<li> Smith, F. Donelson </li> 
    93919625<li> Snoeren, Alex C. (Snoeren, Alex) </li> 
     9626<li> Soliman, Hamdy </li> 
    93929627<li> Sommers, Joel </li> 
    93939628<li> Song, Guanghua </li> 
     
    94499684<li> Vanbever, Laurent </li> 
    94509685<li> Vanhove, Thomas </li> 
     9686<li> Vassell, Mark </li> 
    94519687<li> Veeraraghavan, Malathi (Veeraraghavan, M.) </li> 
    94529688<li> Velayos, Celia </li> 
     
    94999735<li> Xu, Le </li> 
    95009736<li> Xu, Qingrong </li> 
     9737<li> Xu, Yang </li> 
    95019738<li> Xu, Yingxiao </li> 
     9739<li> Xu, Zhiguang </li> 
    95029740<li> Yamada, Kazuhisa </li> 
    95039741<li> Yamanaka, N. </li> 
     9742<li> Yan, Bo </li> 
    95049743<li> Yang, Chu-Sing </li> 
    95059744<li> Yang, Fan </li> 
     
    95159754<li> Yu, Lu </li> 
    95169755<li> Yu, Ze </li> 
     9756<li> Yuan, Weizhe </li> 
    95179757<li> Yuen, Marco </li> 
    95189758<li> Yumerefendi, Aydan (Yumerefendi, A.) </li> 
     
    95259765<li> Zhang, Miao </li> 
    95269766<li> Zhang, Qiao </li> 
    9527 <li> Zhang, Yanyong (Zhang, Y. Y., Zhang, Yihua) </li> 
     9767<li> Zhang, Yanyong (Zhang, Y. Y., Zhang, Yihua, Zhang, Yuanxun) </li> 
    95289768<li> Zhang, Zhenyu </li> 
    95299769<li> Zhang, Zhi-Li </li> 
     
    95409780<!-- End HTML to be inserted into wiki page. --> 
    95419781 
    9542  
    95439782}}}