Changes between Initial Version and Version 1 of GENIBibliography


Ignore:
Timestamp:
08/15/12 17:31:59 (12 years ago)
Author:
Mark Berman
Comment:

Initial version

Legend:

Unmodified
Added
Removed
Modified
  • GENIBibliography

    v1 v1  
     1= GENI Bibliography Page =
     2
     3This page contains GENI-relevant papers. It is intended to include papers addressing:
     4
     5 * Design, architecture, development, or deployment of GENI
     6 * Design, architecture, development, or deployment of aggregates or capabilities and their relationships with GENI
     7 * Federation of GENI and other testbeds
     8 * Research, experiments, services, and applications using GENI
     9
     10We welcome your contributions to this bibliography. Please send references to [mailto:mberman@bbn.com Mark Berman] and [mailto:nriga@bbn.com Niky Riga]. Preferred formats are:
     11
     12 * URL for abstract on IEEE Explore, ACM Digital Library, or similar (e.g., http://dl.acm.org/citation.cfm?id=1568620)
     13 * Digital Object Identifier (DOI) (e.g., doi:10.1145/1568613.1568620)
     14 * BibTeX
     15 * Other formats
     16
     17{{{
     18#!html
     19
     20<!-- HTML to be inserted into wiki page. -->
     21<!-- This page is auto-generated. Please do not edit by hand. -->
     22
     23<H1>GENI Bibliography</H1>
     24
     25
     26<a class="EntryGoto" id="Aikat, Jay and Hasan, Shaddi and Jeffay, Kevin and Smith, F. Donelson"></a>
     27<b class="myheading" style="position: relative; left: 10%;">Aikat, Jay and Hasan, Shaddi and Jeffay, Kevin and Smith, F. Donelson</b>
     28
     29<div class="BibEntry">
     30
     31<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     32<tr class="TagRow">
     33<!--
     34        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     35        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     36-->
     37</tr>
     38
     39
     40<tr>
     41     <td>Author</td>
     42     <td>Aikat, Jay and Hasan, Shaddi and Jeffay, Kevin and Smith, F. Donelson</td>
     43</tr>
     44
     45<tr>
     46     <td>Title</td>
     47     <td>Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation</td>
     48</tr>
     49
     50<tr>
     51     <td>Booktitle</td>
     52     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     53</tr>
     54
     55<tr>
     56     <td>Location</td>
     57     <td>Los Angeles</td>
     58</tr>
     59
     60<tr>
     61     <td>Year</td>
     62     <td>2012</td>
     63</tr>
     64
     65<tr>
     66     <td>Abstract</td>
     67     <td>Empirical evaluations to study network performance, whether in a laboratory setting or on GENI testbeds, rely heavily on measurement-based modeling of round trip times (RTTs) to emulate realistic end-to-end delays of local and metropolitan area networks. For generating realistic traffic, we studied several models to emulate RTTs. In this paper, we performed experiments on real testbeds using synthetic TCP traffic generated from measurement data from a large university campus. As a result of our study, we present the Discrete- Approximation model for RTT (DA-RTT) emulation. Using three different metrics for performance evaluation, which include queue length at routers, connection response times, and connection durations, we demonstrate that the simple DA-RTT model closely represents the per-connection RTTs in the original traffic. While these experiments were performed in our laboratory, and not using GENI infrastructure, we present this as a possible model for adoption on GENI testbeds to emulate Round Trip Time Distributions for GENI experiments.</td>
     68</tr>
     69
     70
     71
     72
     73
     74
     75</table></div><br><br>
     76
     77
     78
     79
     80<a class="EntryGoto" id="Albrecht, J. and Huang, D. Y."></a>
     81<b class="myheading" style="position: relative; left: 10%;">Albrecht, J. and Huang, D. Y.</b>
     82
     83<div class="BibEntry">
     84
     85<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     86<tr class="TagRow">
     87<!--
     88        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     89        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     90-->
     91</tr>
     92
     93
     94<tr>
     95     <td>Author</td>
     96     <td>Albrecht, J. and Huang, D. Y.</td>
     97</tr>
     98
     99<tr>
     100     <td>Title</td>
     101     <td>Managing distributed applications using Gush</td>
     102</tr>
     103
     104<tr>
     105     <td>Journal</td>
     106     <td>Proceedings of the ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, Testbed Practices Session (TridentCom)</td>
     107</tr>
     108
     109<tr>
     110     <td>Year</td>
     111     <td>2010</td>
     112</tr>
     113
     114
     115
     116<tr>
     117     <td>DOI</td>
     118     <td>10.1007/978-3-642-17851-1&#x005F;31</td>
     119</tr>
     120
     121
     122
     123<tr>
     124     <td>URL</td>
     125     <td><a href="http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;31">http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;31</a></td>
     126</tr>
     127
     128
     129</table></div><br><br>
     130
     131
     132
     133
     134<a class="EntryGoto" id="Albrecht, Jeannie R."></a>
     135<b class="myheading" style="position: relative; left: 10%;">Albrecht, Jeannie R.</b>
     136
     137<div class="BibEntry">
     138
     139<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     140<tr class="TagRow">
     141<!--
     142        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     143        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     144-->
     145</tr>
     146
     147
     148<tr>
     149     <td>Author</td>
     150     <td>Albrecht, Jeannie R.</td>
     151</tr>
     152
     153<tr>
     154     <td>Title</td>
     155     <td>Bringing big systems to small schools: distributed systems for undergraduates</td>
     156</tr>
     157
     158<tr>
     159     <td>Journal</td>
     160     <td>SIGCSE Bull.</td>
     161</tr>
     162
     163<tr>
     164     <td>Publisher</td>
     165     <td>ACM</td>
     166</tr>
     167
     168<tr>
     169     <td>Address</td>
     170     <td>New York, NY, USA</td>
     171</tr>
     172
     173<tr>
     174     <td>Year</td>
     175     <td>2009</td>
     176</tr>
     177
     178<tr>
     179     <td>Abstract</td>
     180     <td>Distributed applications have become a core component of the Internet's infrastructure. However, many undergraduate curriculums, especially at small colleges, do not offer courses that focus on the design and implementation of distributed systems. The courses that are offered address the theoretical aspects of system design, but often fail to provide students with the opportunity to develop and evaluate distributed applications in real-world environments. As a result, undergraduate students are not as prepared as they should be for graduate study or careers in industry. This paper describes an undergraduate course in Distributed Systems that not only studies the key design principles of distributed systems, but also has a unique emphasis on giving students hands-on access to distributed systems through the use of shared computing testbeds, such as PlanetLab and GENI, and open-source technologies, such as Xen and Hadoop. Using these platforms, students can perform large-scale, distributed experimentation even at small colleges.</td>
     181</tr>
     182
     183
     184
     185<tr>
     186     <td>DOI</td>
     187     <td>10.1145/1539024.1508903</td>
     188</tr>
     189
     190
     191
     192<tr>
     193     <td>URL</td>
     194     <td><a href="http://dx.doi.org/10.1145/1539024.1508903">http://dx.doi.org/10.1145/1539024.1508903</a></td>
     195</tr>
     196
     197
     198</table></div><br><br>
     199
     200
     201
     202
     203<a class="EntryGoto" id="Albrecht, Jeannie and Tuttle, Christopher and Braud, Ryan and Dao, Darren and Topilski, Nikolay and Snoeren, Alex C. and Vahdat, Amin"></a>
     204<b class="myheading" style="position: relative; left: 10%;">Albrecht, Jeannie and Tuttle, Christopher and Braud, Ryan and Dao, Darren and Topilski, Nikolay and Snoeren, Alex C. and Vahdat, Amin</b>
     205
     206<div class="BibEntry">
     207
     208<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     209<tr class="TagRow">
     210<!--
     211        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     212        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     213-->
     214</tr>
     215
     216
     217<tr>
     218     <td>Author</td>
     219     <td>Albrecht, Jeannie and Tuttle, Christopher and Braud, Ryan and Dao, Darren and Topilski, Nikolay and Snoeren, Alex C. and Vahdat, Amin</td>
     220</tr>
     221
     222<tr>
     223     <td>Title</td>
     224     <td>Distributed application configuration, management, and visualization with plush</td>
     225</tr>
     226
     227<tr>
     228     <td>Journal</td>
     229     <td>ACM Trans. Internet Technol.</td>
     230</tr>
     231
     232<tr>
     233     <td>Publisher</td>
     234     <td>ACM</td>
     235</tr>
     236
     237<tr>
     238     <td>Address</td>
     239     <td>New York, NY, USA</td>
     240</tr>
     241
     242<tr>
     243     <td>Year</td>
     244     <td>2011</td>
     245</tr>
     246
     247<tr>
     248     <td>Abstract</td>
     249     <td>Support for distributed application management in large-scale networked environments remains in its early stages. Although a number of solutions exist for subtasks of application deployment, monitoring, and maintenance in distributed environments, few tools provide a unified framework for application management. Many of the existing tools address the management needs of a single type of application or service that runs in a specific environment, and these tools are not adaptable enough to be used for other applications or platforms. To this end, we present the design and implementation of Plush, a fully configurable application management infrastructure designed to meet the general requirements of several different classes of distributed applications. Plush allows developers to specifically define the flow of control needed by their computations using application building blocks. Through an extensible resource management interface, Plush supports execution in a variety of environments, including both live deployment platforms and emulated clusters. Plush also uses relaxed synchronization primitives for improving fault tolerance and liveness in failure-prone environments. To gain an understanding of how Plush manages different classes of distributed applications, we take a closer look at specific applications and evaluate how Plush provides support for each.</td>
     250</tr>
     251
     252
     253
     254<tr>
     255     <td>DOI</td>
     256     <td>10.1145/2049656.2049658</td>
     257</tr>
     258
     259
     260
     261<tr>
     262     <td>URL</td>
     263     <td><a href="http://dx.doi.org/10.1145/2049656.2049658">http://dx.doi.org/10.1145/2049656.2049658</a></td>
     264</tr>
     265
     266
     267</table></div><br><br>
     268
     269
     270
     271
     272<a class="EntryGoto" id="Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Renci, Chris H. and Chase, Unc-Ch J. and Marupadi, Varun and Yumerefendi, Aydan and Irwin, David"></a>
     273<b class="myheading" style="position: relative; left: 10%;">Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Renci, Chris H. and Chase, Unc-Ch J. and Marupadi, Varun and Yumerefendi, Aydan and Irwin, David</b>
     274
     275<div class="BibEntry">
     276
     277<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     278<tr class="TagRow">
     279<!--
     280        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     281        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     282-->
     283</tr>
     284
     285
     286<tr>
     287     <td>Author</td>
     288     <td>Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Renci, Chris H. and Chase, Unc-Ch J. and Marupadi, Varun and Yumerefendi, Aydan and Irwin, David</td>
     289</tr>
     290
     291<tr>
     292     <td>Title</td>
     293     <td>Networked cloud orchestration: A GENI perspective</td>
     294</tr>
     295
     296<tr>
     297     <td>Booktitle</td>
     298     <td>2010 IEEE Globecom Workshops</td>
     299</tr>
     300
     301<tr>
     302     <td>Location</td>
     303     <td>Miami, FL, USA</td>
     304</tr>
     305
     306<tr>
     307     <td>Publisher</td>
     308     <td>IEEE</td>
     309</tr>
     310
     311<tr>
     312     <td>Year</td>
     313     <td>2010</td>
     314</tr>
     315
     316<tr>
     317     <td>Abstract</td>
     318     <td>This paper describes the experience of developing a system for creation of distributed linked configurations of heterogeneous resources (slices) in GENI. Our work leverages a number of unique architectural solutions (distributed architecture, declarative resource specifications, unique approach to slice instantiation) which is applicable to a wider set of problems related to autonomic co-scheduling and provisioning of heterogeneous networked resources. We discuss the architecture, the resource description mechanisms and some of the algorithms used to enable our system. We conclude with an analysis of a real experiment at allocating resources from multiple providers across a very wide geographic area (spanning Massachusetts, Illinois and North Carolina) to create a single private Layer 2 network connecting virtual machines on the campus of Duke University to a sensor testbed at University of Massachusetts, Amherst.</td>
     319</tr>
     320
     321
     322
     323<tr>
     324     <td>DOI</td>
     325     <td>10.1109/GLOCOMW.2010.5700385</td>
     326</tr>
     327
     328
     329
     330<tr>
     331     <td>URL</td>
     332     <td><a href="http://dx.doi.org/10.1109/GLOCOMW.2010.5700385">http://dx.doi.org/10.1109/GLOCOMW.2010.5700385</a></td>
     333</tr>
     334
     335
     336</table></div><br><br>
     337
     338
     339
     340
     341<a class="EntryGoto" id="Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Ruth, Paul and Yumerefendi, Aydan and Chase, Jeff"></a>
     342<b class="myheading" style="position: relative; left: 10%;">Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Ruth, Paul and Yumerefendi, Aydan and Chase, Jeff</b>
     343
     344<div class="BibEntry">
     345
     346<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     347<tr class="TagRow">
     348<!--
     349        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     350        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     351-->
     352</tr>
     353
     354
     355<tr>
     356     <td>Author</td>
     357     <td>Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Ruth, Paul and Yumerefendi, Aydan and Chase, Jeff</td>
     358</tr>
     359
     360<tr>
     361     <td>Title</td>
     362     <td>ExoGENI: A Multi-Domain Infrastructure-as-a-Service Testbed</td>
     363</tr>
     364
     365<tr>
     366     <td>Booktitle</td>
     367     <td>8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2012)</td>
     368</tr>
     369
     370<tr>
     371     <td>Year</td>
     372     <td>2012</td>
     373</tr>
     374
     375<tr>
     376     <td>Abstract</td>
     377     <td>NSF's GENI program seeks to enable experiments that run within virtual network topologies built-to-order from testbed infrastructure offered by multiple providers (domains). GENI is often viewed as a network testbed integration effort, but behind it is an ambitious vision for multi-domain infrastructure-as-a-service (IaaS). This paper presents ExoGENI, a new GENI testbed that links GENI to two advances in virtual infrastructure services outside of GENI: open cloud computing (OpenStack) and dynamic circuit fabrics. ExoGENI orchestrates a federation of independent cloud sites and circuit providers through their native IaaS interfaces, and links them to other GENI tools and resources. The ExoGENI deployment consists of cloud site ``racks'' on host campuses within the US, linked with national research networks and other circuit networks through programmable exchange points. The ExoGENI sites and control software are enabled for software-defined networking using OpenFlow. ExoGENI offers a powerful unified hosting platform for deeply networked, multi-domain, multi-site cloud applications. We intend that ExoGENI will seed a larger, evolving platform linking other third-party cloud sites, transport networks, and other infrastructure services, and that it will enable real-world deployment of innovative distributed services and new visions of a Future Internet.</td>
     378</tr>
     379
     380
     381
     382
     383
     384
     385</table></div><br><br>
     386
     387
     388
     389
     390<a class="EntryGoto" id="Bhanage, G. and Daya, R. and Seskar, I. and Raychaudhuri, D."></a>
     391<b class="myheading" style="position: relative; left: 10%;">Bhanage, G. and Daya, R. and Seskar, I. and Raychaudhuri, D.</b>
     392
     393<div class="BibEntry">
     394
     395<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     396<tr class="TagRow">
     397<!--
     398        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     399        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     400-->
     401</tr>
     402
     403
     404<tr>
     405     <td>Author</td>
     406     <td>Bhanage, G. and Daya, R. and Seskar, I. and Raychaudhuri, D.</td>
     407</tr>
     408
     409<tr>
     410     <td>Title</td>
     411     <td>VNTS: A Virtual Network Traffic Shaper for Air Time Fairness in 802.16e Systems</td>
     412</tr>
     413
     414<tr>
     415     <td>Booktitle</td>
     416     <td>Communications (ICC), 2010 IEEE International Conference on</td>
     417</tr>
     418
     419<tr>
     420     <td>Publisher</td>
     421     <td>IEEE</td>
     422</tr>
     423
     424<tr>
     425     <td>Year</td>
     426     <td>2010</td>
     427</tr>
     428
     429<tr>
     430     <td>Abstract</td>
     431     <td>The 802.16e standard for broadband wireless access mandates the presence of QoS classes, but does not specify guidelines for the scheduler implementation or mechanisms to ensure air time fairness. Our study demonstrates the feasibility of controlling downlink airtime fairness for slices while running above a proprietary WiMAX basestation (BS) scheduler. We design and implement a virtualized infrastructure that allows users to obtain at least an allocated percentage of BS resources in the presence of saturation and link degradation. Using Kernel virtual machines for creating slices and Click modular router for implementing the virtual network traffic shaping engine we show that it is possible to adaptively control slice usage for downlink traffic on a WiMAX Basestation. The fairness index and coupling coefficient show an improvement of up to 42&#x0025;, and 73&#x0025; with preliminary indoor walking mobility experiments. Outdoor vehicular measurements show an improvement of up to 27&#x0025;, and 70\\\\ with the fairness index and coupling coefficient respectively</td>
     432</tr>
     433
     434
     435
     436<tr>
     437     <td>DOI</td>
     438     <td>10.1109/ICC.2010.5502484</td>
     439</tr>
     440
     441
     442
     443<tr>
     444     <td>URL</td>
     445     <td><a href="http://dx.doi.org/10.1109/ICC.2010.5502484">http://dx.doi.org/10.1109/ICC.2010.5502484</a></td>
     446</tr>
     447
     448
     449</table></div><br><br>
     450
     451
     452
     453
     454<a class="EntryGoto" id="Bhanage, G. and Seskar, I. and Zhang, Y. and Raychaudhuri, D. and Jain, S."></a>
     455<b class="myheading" style="position: relative; left: 10%;">Bhanage, G. and Seskar, I. and Zhang, Y. and Raychaudhuri, D. and Jain, S.</b>
     456
     457<div class="BibEntry">
     458
     459<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     460<tr class="TagRow">
     461<!--
     462        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     463        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     464-->
     465</tr>
     466
     467
     468<tr>
     469     <td>Author</td>
     470     <td>Bhanage, G. and Seskar, I. and Zhang, Y. and Raychaudhuri, D. and Jain, S.</td>
     471</tr>
     472
     473<tr>
     474     <td>Title</td>
     475     <td>Experimental evaluation of openvz from a testbed deployment perspective</td>
     476</tr>
     477
     478<tr>
     479     <td>Journal</td>
     480     <td>Proceedings of the ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)</td>
     481</tr>
     482
     483<tr>
     484     <td>Year</td>
     485     <td>2010</td>
     486</tr>
     487
     488
     489
     490<tr>
     491     <td>DOI</td>
     492     <td>10.1007/978-3-642-17851-1&#x005F;7</td>
     493</tr>
     494
     495
     496
     497<tr>
     498     <td>URL</td>
     499     <td><a href="http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;7">http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;7</a></td>
     500</tr>
     501
     502
     503</table></div><br><br>
     504
     505
     506
     507
     508<a class="EntryGoto" id="Bhanage, G. and Vete, D. and Seskar, I. and Raychaudhuri, D."></a>
     509<b class="myheading" style="position: relative; left: 10%;">Bhanage, G. and Vete, D. and Seskar, I. and Raychaudhuri, D.</b>
     510
     511<div class="BibEntry">
     512
     513<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     514<tr class="TagRow">
     515<!--
     516        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     517        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     518-->
     519</tr>
     520
     521
     522<tr>
     523     <td>Author</td>
     524     <td>Bhanage, G. and Vete, D. and Seskar, I. and Raychaudhuri, D.</td>
     525</tr>
     526
     527<tr>
     528     <td>Title</td>
     529     <td>SplitAP: Leveraging Wireless Network Virtualization for Flexible Sharing of WLANs</td>
     530</tr>
     531
     532<tr>
     533     <td>Booktitle</td>
     534     <td>Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE</td>
     535</tr>
     536
     537<tr>
     538     <td>Publisher</td>
     539     <td>IEEE</td>
     540</tr>
     541
     542<tr>
     543     <td>Year</td>
     544     <td>2010</td>
     545</tr>
     546
     547<tr>
     548     <td>Abstract</td>
     549     <td>Providing air-time guarantees across a group of clients forms a fundamental building block in sharing an access point (AP) across different virtual network providers. Though this problem has a relatively simple solution for downlink group scheduling through traffic engineering at the AP, solving this problem for uplink (UL) traffic presents a challenge for fair sharing of wireless hotspots. Among other issues, the mechanism for uplink traffic control has to scale across a large user base, and provide flexible operation irrespective of the client channel conditions and network loads. In this study, we propose the SplitAP architecture that address the problem of sharing uplink airtime across groups of users by extending the idea of network virtualization. Our architecture allows us to deploy different algorithms for enforcing UL airtime fairness across client groups. In this study, we will highlight the design features of the SplitAP architecture, and present results from evaluation on a prototype deployed with: (1) LPFC and (2) LPFC+, two algorithms for controlling UL group fairness. Performance comparisons on the ORBIT testbed show that the proposed algorithms are capable of providing group air-time fairness across wireless clients irrespective of the network volume, and traffic type. The algorithms show up to 40&#x0025; improvement with a modified Jain fairness index.</td>
     550</tr>
     551
     552
     553
     554<tr>
     555     <td>DOI</td>
     556     <td>10.1109/GLOCOM.2010.5684328</td>
     557</tr>
     558
     559
     560
     561<tr>
     562     <td>URL</td>
     563     <td><a href="http://dx.doi.org/10.1109/GLOCOM.2010.5684328">http://dx.doi.org/10.1109/GLOCOM.2010.5684328</a></td>
     564</tr>
     565
     566
     567</table></div><br><br>
     568
     569
     570
     571
     572<a class="EntryGoto" id="Bhanage, Gautam and Seskar, Ivan and Mahindra, Rajesh and Raychaudhuri, Dipankar"></a>
     573<b class="myheading" style="position: relative; left: 10%;">Bhanage, Gautam and Seskar, Ivan and Mahindra, Rajesh and Raychaudhuri, Dipankar</b>
     574
     575<div class="BibEntry">
     576
     577<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     578<tr class="TagRow">
     579<!--
     580        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     581        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     582-->
     583</tr>
     584
     585
     586<tr>
     587     <td>Author</td>
     588     <td>Bhanage, Gautam and Seskar, Ivan and Mahindra, Rajesh and Raychaudhuri, Dipankar</td>
     589</tr>
     590
     591<tr>
     592     <td>Title</td>
     593     <td>Virtual basestation: architecture for an open shared WiMAX framework</td>
     594</tr>
     595
     596<tr>
     597     <td>Booktitle</td>
     598     <td>Proceedings of the second ACM SIGCOMM workshop on Virtualized infrastructure systems and architectures</td>
     599</tr>
     600
     601<tr>
     602     <td>Location</td>
     603     <td>New Delhi, India</td>
     604</tr>
     605
     606<tr>
     607     <td>Publisher</td>
     608     <td>ACM</td>
     609</tr>
     610
     611<tr>
     612     <td>Address</td>
     613     <td>New York, NY, USA</td>
     614</tr>
     615
     616<tr>
     617     <td>Year</td>
     618     <td>2010</td>
     619</tr>
     620
     621<tr>
     622     <td>Abstract</td>
     623     <td>This paper presents the architecture and performance evaluation of a virtualized wide-area &#x34;&#x0308;G&#x20;&#x0308;cellular wireless network. Specifically, it addresses the challenges of virtualization of resources in a cellular base station to enable shared use by multiple independent slice users (experimenters or mobile virtual network operators), each with possibly distinct flow types and network layer protocols. The proposed virtual basestation architecture is based on an external substrate which uses a layer-2 switched datapath, and an arbitrated control path to the WiMAX basestation. The framework implements virtualization of base station's radio resources to achieve isolation between multiple virtual networks. An algorithm for weighted fair sharing among multiple slices based on an airtime fairness metric has been implemented for the first release. Preliminary experimental results from the virtual basestation prototype are given, demonstrating mobile network performance, isolation across slices with different flow types, and custom flow scheduling capabilities.</td>
     624</tr>
     625
     626
     627
     628<tr>
     629     <td>DOI</td>
     630     <td>10.1145/1851399.1851401</td>
     631</tr>
     632
     633
     634
     635<tr>
     636     <td>URL</td>
     637     <td><a href="http://dx.doi.org/10.1145/1851399.1851401">http://dx.doi.org/10.1145/1851399.1851401</a></td>
     638</tr>
     639
     640
     641</table></div><br><br>
     642
     643
     644
     645
     646<a class="EntryGoto" id="Bhanage, Gautam and Seskar, Ivan and Raychaudhuri, Dipankar"></a>
     647<b class="myheading" style="position: relative; left: 10%;">Bhanage, Gautam and Seskar, Ivan and Raychaudhuri, Dipankar</b>
     648
     649<div class="BibEntry">
     650
     651<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     652<tr class="TagRow">
     653<!--
     654        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     655        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     656-->
     657</tr>
     658
     659
     660<tr>
     661     <td>Author</td>
     662     <td>Bhanage, Gautam and Seskar, Ivan and Raychaudhuri, Dipankar</td>
     663</tr>
     664
     665<tr>
     666     <td>Title</td>
     667     <td>A virtualization architecture for mobile WiMAX networks</td>
     668</tr>
     669
     670<tr>
     671     <td>Journal</td>
     672     <td>SIGMOBILE Mob. Comput. Commun. Rev.</td>
     673</tr>
     674
     675<tr>
     676     <td>Publisher</td>
     677     <td>ACM</td>
     678</tr>
     679
     680<tr>
     681     <td>Address</td>
     682     <td>New York, NY, USA</td>
     683</tr>
     684
     685<tr>
     686     <td>Year</td>
     687     <td>2012</td>
     688</tr>
     689
     690<tr>
     691     <td>Abstract</td>
     692     <td>Systems virtualization offers convenient means for sharing networking infrastructure while improving its utilization. This study addresses the challenges of virtualizing a commercial off-the-shelf 4G mobileWiMAX basestation. We highlight additions and modifications needed in theWiMAX network architecture for supporting multiple simultaneous virtual basestations on a single physical basestation. The most prominent features provided by the proposed virtual basestation framework include the capability to perform all frame switching at layer-2, and control mechanisms to provide isolation across slices needed to ensure experiment repeatability. By prototyping on a commercial WiMAX radio, this paper shows the usage of the virtual basestation system for housing mobile virtual network operators and testbeds alike. A use case is shown where the virtual basestation design is used to evaluate mobile handoff schemes. Another usage case is shown for optimizing a video delivery on the edge. The video delivery use case is used to show performance improvements of up to 5dB in the PSNR. Evaluation of prototype shows a significant improvement in the slice isolation, with aggregate throughput improvements of up to 192&#x0025; achievable through fair resource allocation.</td>
     693</tr>
     694
     695
     696
     697<tr>
     698     <td>DOI</td>
     699     <td>10.1145/2169077.2169082</td>
     700</tr>
     701
     702
     703
     704<tr>
     705     <td>URL</td>
     706     <td><a href="http://dx.doi.org/10.1145/2169077.2169082">http://dx.doi.org/10.1145/2169077.2169082</a></td>
     707</tr>
     708
     709
     710</table></div><br><br>
     711
     712
     713
     714
     715<a class="EntryGoto" id="Blanton, Ethan and Chatterjee, Sarbajit and Gangam, Sriharsha and Kala, Sumit and Sharma, Deepti and Fahmy, Sonia and Sharma, Puneet"></a>
     716<b class="myheading" style="position: relative; left: 10%;">Blanton, Ethan and Chatterjee, Sarbajit and Gangam, Sriharsha and Kala, Sumit and Sharma, Deepti and Fahmy, Sonia and Sharma, Puneet</b>
     717
     718<div class="BibEntry">
     719
     720<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     721<tr class="TagRow">
     722<!--
     723        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     724        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     725-->
     726</tr>
     727
     728
     729<tr>
     730     <td>Author</td>
     731     <td>Blanton, Ethan and Chatterjee, Sarbajit and Gangam, Sriharsha and Kala, Sumit and Sharma, Deepti and Fahmy, Sonia and Sharma, Puneet</td>
     732</tr>
     733
     734<tr>
     735     <td>Title</td>
     736     <td>Design and evaluation of the S<sup>3</sup> monitor network measurement service on GENI</td>
     737</tr>
     738
     739<tr>
     740     <td>Booktitle</td>
     741     <td>2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)</td>
     742</tr>
     743
     744<tr>
     745     <td>Location</td>
     746     <td>Bangalore, India</td>
     747</tr>
     748
     749<tr>
     750     <td>Publisher</td>
     751     <td>IEEE</td>
     752</tr>
     753
     754<tr>
     755     <td>Year</td>
     756     <td>2012</td>
     757</tr>
     758
     759<tr>
     760     <td>Abstract</td>
     761     <td>Network monitoring capabilities are critical for both network operators and networked applications. In the context of an experimental test facility, network measurement is important for researchers experimenting with new network architectures and applications, as well as operators of the test facility itself. The Global Environment for Network Innovations (GENI) is a sophisticated test facility comprised of multiple ” control frameworks.” In this paper, we describe the design and implementation of S</td>
     762</tr>
     763
     764
     765
     766<tr>
     767     <td>DOI</td>
     768     <td>10.1109/COMSNETS.2012.6151327</td>
     769</tr>
     770
     771
     772
     773<tr>
     774     <td>URL</td>
     775     <td><a href="http://dx.doi.org/10.1109/COMSNETS.2012.6151327">http://dx.doi.org/10.1109/COMSNETS.2012.6151327</a></td>
     776</tr>
     777
     778
     779</table></div><br><br>
     780
     781
     782
     783
     784<a class="EntryGoto" id="Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A."></a>
     785<b class="myheading" style="position: relative; left: 10%;">Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A.</b>
     786
     787<div class="BibEntry">
     788
     789<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     790<tr class="TagRow">
     791<!--
     792        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     793        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     794-->
     795</tr>
     796
     797
     798<tr>
     799     <td>Author</td>
     800     <td>Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A.</td>
     801</tr>
     802
     803<tr>
     804     <td>Title</td>
     805     <td>Enabling performance intelligence for application adaptation in the Future Internet</td>
     806</tr>
     807
     808<tr>
     809     <td>Journal</td>
     810     <td>Communications and Networks, Journal of</td>
     811</tr>
     812
     813<tr>
     814     <td>Year</td>
     815     <td>2011</td>
     816</tr>
     817
     818
     819
     820<tr>
     821     <td>DOI</td>
     822     <td>10.1109/JCN.2011.6157475</td>
     823</tr>
     824
     825
     826
     827<tr>
     828     <td>URL</td>
     829     <td><a href="http://dx.doi.org/10.1109/JCN.2011.6157475">http://dx.doi.org/10.1109/JCN.2011.6157475</a></td>
     830</tr>
     831
     832
     833</table></div><br><br>
     834
     835
     836
     837
     838<a class="EntryGoto" id="Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio"></a>
     839<b class="myheading" style="position: relative; left: 10%;">Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio</b>
     840
     841<div class="BibEntry">
     842
     843<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     844<tr class="TagRow">
     845<!--
     846        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     847        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     848-->
     849</tr>
     850
     851
     852<tr>
     853     <td>Author</td>
     854     <td>Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio</td>
     855</tr>
     856
     857<tr>
     858     <td>Title</td>
     859     <td>Experiences from Virtual Desktop CloudExperiments in GENI</td>
     860</tr>
     861
     862<tr>
     863     <td>Booktitle</td>
     864     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     865</tr>
     866
     867<tr>
     868     <td>Location</td>
     869     <td>Los Angeles</td>
     870</tr>
     871
     872<tr>
     873     <td>Year</td>
     874     <td>2012</td>
     875</tr>
     876
     877<tr>
     878     <td>Abstract</td>
     879     <td>Popular applications such as email, photo/video galleries, and file storage are increasingly being supported by cloud platforms in residential, academia and industry communities. The next frontier for these user communities will be to transition 'traditional desktops' that have dedicated hardware and software configurations into 'virtual desktop clouds' that are accessible via thin-clients. In this paper, we describe experiences from our research and development of virtual desktop cloud experiments in GENI. Our experimentation goal is to investigate and develop optimal resource allocation frameworks and performance bench- marking tools that can enable provisioning (i.e., resource sizing) and placement (i.e., resource mapping) of thin-client based virtual desktops at Internet-scale. We first motivate why virtual desktop cloud experiments cannot be done only at a table-top level, and why infrastructures such as GENI are essential. Next, we detail the methodology of our completed ” provisioning” experiments, and our work-in-progress ” placement” experiments in GENI that leverage multiple kinds of GENI resources such as aggregates, measurement services and experimenter workflow tools, as well as commercial software. Lastly, we present our vision on how our experiment slice setup and application development experiences, as well as outcomes can be leveraged in classroom labs, and 'living labs' that use GENI resources to foster training and wide- adoption of Future Internet applications.</td>
     880</tr>
     881
     882
     883
     884
     885
     886
     887</table></div><br><br>
     888
     889
     890
     891
     892<a class="EntryGoto" id="Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James"></a>
     893<b class="myheading" style="position: relative; left: 10%;">Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James</b>
     894
     895<div class="BibEntry">
     896
     897<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     898<tr class="TagRow">
     899<!--
     900        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     901        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     902-->
     903</tr>
     904
     905
     906<tr>
     907     <td>Author</td>
     908     <td>Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James</td>
     909</tr>
     910
     911<tr>
     912     <td>Title</td>
     913     <td>WiMAX: Bandwidth Contention Resolution Vulnerability to Denial of Service Attacks</td>
     914</tr>
     915
     916<tr>
     917     <td>Booktitle</td>
     918     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     919</tr>
     920
     921<tr>
     922     <td>Location</td>
     923     <td>Los Angeles</td>
     924</tr>
     925
     926<tr>
     927     <td>Year</td>
     928     <td>2012</td>
     929</tr>
     930
     931<tr>
     932     <td>Abstract</td>
     933     <td>Wireless communications is part of everyday life and 4G technology, including WiMAX, offers higher data rates and wider coverage than predecessor 3G technologies. Many security vulnerabilities have been discovered in 3G protocols and these vulnerabilities may still exist in next generation 4G protocols. This paper examines how system parameters for the WiMAX Bandwidth Contention Resolution process can affect network vulnerability to DoS attacks. It will present software simulations that explore system parameter settings and will cover the current phase of hardware simulations.</td>
     934</tr>
     935
     936
     937
     938
     939
     940
     941</table></div><br><br>
     942
     943
     944
     945
     946<a class="EntryGoto" id="Chen, Kang and Shen, Haiying and Zhang, Haibo"></a>
     947<b class="myheading" style="position: relative; left: 10%;">Chen, Kang and Shen, Haiying and Zhang, Haibo</b>
     948
     949<div class="BibEntry">
     950
     951<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     952<tr class="TagRow">
     953<!--
     954        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     955        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     956-->
     957</tr>
     958
     959
     960<tr>
     961     <td>Author</td>
     962     <td>Chen, Kang and Shen, Haiying and Zhang, Haibo</td>
     963</tr>
     964
     965<tr>
     966     <td>Title</td>
     967     <td>Leveraging Social Networks for P2P Content-Based File Sharing in Mobile Ad Hoc Networks</td>
     968</tr>
     969
     970<tr>
     971     <td>Booktitle</td>
     972     <td>2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems</td>
     973</tr>
     974
     975<tr>
     976     <td>Location</td>
     977     <td>Valencia, Spain</td>
     978</tr>
     979
     980<tr>
     981     <td>Publisher</td>
     982     <td>IEEE</td>
     983</tr>
     984
     985<tr>
     986     <td>Year</td>
     987     <td>2011</td>
     988</tr>
     989
     990<tr>
     991     <td>Abstract</td>
     992     <td>Current P2P file sharing methods in mobile ad hoc networks (MANETs) can be classified into three groups: flooding-based, advertisement-based and social contact-based. The first two groups of methods can easily generate high overhead and low scalability, and the third group fails to consider the social interests (content) of mobile nodes, which otherwise can improve file searching efficiency. In this paper, we propose a P2P content-based file sharing system for MANETs. The system uses an interest extraction algorithm to derive a node's interests from its files for complex queries. For efficient file searching, it groups common-interest nodes that frequently meet with each other as communities. Further, it takes advantage of node mobility by designating stable nodes, which has frequent contact with community members, as community coordinators for intra-community searching, and highly-mobile nodes as community ambassadors for inter-community searching. An interest-oriented file searching scheme further enhances the file searching success rate. We first deployed our system on the real-world GENI Orbit testbed with a real trace and then conducted experiment on the ns2 simulator with both real trace and simulated disconnected and connected MANET scenario. The test results show that our system significantly lowers transmission cost and improves file searching success rate compared to current methods.</td>
     993</tr>
     994
     995
     996
     997<tr>
     998     <td>DOI</td>
     999     <td>10.1109/MASS.2011.24</td>
     1000</tr>
     1001
     1002
     1003
     1004<tr>
     1005     <td>URL</td>
     1006     <td><a href="http://dx.doi.org/10.1109/MASS.2011.24">http://dx.doi.org/10.1109/MASS.2011.24</a></td>
     1007</tr>
     1008
     1009
     1010</table></div><br><br>
     1011
     1012
     1013
     1014
     1015<a class="EntryGoto" id="Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze"></a>
     1016<b class="myheading" style="position: relative; left: 10%;">Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze</b>
     1017
     1018<div class="BibEntry">
     1019
     1020<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1021<tr class="TagRow">
     1022<!--
     1023        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1024        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1025-->
     1026</tr>
     1027
     1028
     1029<tr>
     1030     <td>Author</td>
     1031     <td>Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze</td>
     1032</tr>
     1033
     1034<tr>
     1035     <td>Title</td>
     1036     <td>Experimentation of a MANET Routing Algorithm on the GENI ORBIT Testbed</td>
     1037</tr>
     1038
     1039<tr>
     1040     <td>Booktitle</td>
     1041     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     1042</tr>
     1043
     1044<tr>
     1045     <td>Location</td>
     1046     <td>Los Angeles</td>
     1047</tr>
     1048
     1049<tr>
     1050     <td>Year</td>
     1051     <td>2012</td>
     1052</tr>
     1053
     1054<tr>
     1055     <td>Abstract</td>
     1056     <td>This paper proposes a systematic procedure for experimentation of Mobile ad hoc networks (MANETs) on the ORBIT testbed. MANETs have attracted significant re- search interests in recent years. Most of routing or file sharing algorithms in MANETs were only evaluated by theoretical analysis or simulations because of the requirement of large scale networks. However, due to the distinctive properties of MANETs, such as mobility and decentralized structure, it has been non-trivial to deploy a real testbed for the verification. The Global Environment for Network Innovations (GENI) project sponsored by the National Science Foundation (NSF) provides an exploratory environment for academic real-world experiments, such as the ORBIT testbed. A stable and repeatable procedure for experimentation on real testbeds is necessary and important to assure the validity of results. In this paper, a MANET routing algorithm, namely LORD, was tested on the ORBIT testbed, using the proposed procedure. Specifically, we first configure the wireless interface on each node to enable the communication between each pair of nodes. Then a set of methods are adopted to construct the MANETs scenario for test. The network status is monitored throughout the entire duration of experiments. Finally, the experiment results of LORD on the GENI ORBIT testbed are demonstrated.</td>
     1057</tr>
     1058
     1059
     1060
     1061
     1062
     1063
     1064</table></div><br><br>
     1065
     1066
     1067
     1068
     1069<a class="EntryGoto" id="Cherukuri, Ramkumar and Liu, Xuan and Bavier, Andy and Sterbenz, James P. G. and Medhi, Deep"></a>
     1070<b class="myheading" style="position: relative; left: 10%;">Cherukuri, Ramkumar and Liu, Xuan and Bavier, Andy and Sterbenz, James P. G. and Medhi, Deep</b>
     1071
     1072<div class="BibEntry">
     1073
     1074<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1075<tr class="TagRow">
     1076<!--
     1077        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1078        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1079-->
     1080</tr>
     1081
     1082
     1083<tr>
     1084     <td>Author</td>
     1085     <td>Cherukuri, Ramkumar and Liu, Xuan and Bavier, Andy and Sterbenz, James P. G. and Medhi, Deep</td>
     1086</tr>
     1087
     1088<tr>
     1089     <td>Title</td>
     1090     <td>Network virtualization in GpENI: Framework, implementation &#x0026;amp; integration experience</td>
     1091</tr>
     1092
     1093<tr>
     1094     <td>Booktitle</td>
     1095     <td>12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops</td>
     1096</tr>
     1097
     1098<tr>
     1099     <td>Location</td>
     1100     <td>Dublin, Ireland</td>
     1101</tr>
     1102
     1103<tr>
     1104     <td>Publisher</td>
     1105     <td>IEEE</td>
     1106</tr>
     1107
     1108<tr>
     1109     <td>Year</td>
     1110     <td>2011</td>
     1111</tr>
     1112
     1113<tr>
     1114     <td>Abstract</td>
     1115     <td>Great Plains Environment for Network Innovation (GpENI) is an international testbed for future Internet research. A key component of GpENI is programmable network virtualization (GpENI-VINI). The scope of this paper is to present the framework, implementation and integration experience with network virtualization in GpENI. In particular, this is described through our experience of implementing and integrating the XORP (eXtensible Open Router Platform) routing platform into GpENI-VINI. Preliminary results on measurements and validation are presented.</td>
     1116</tr>
     1117
     1118
     1119
     1120<tr>
     1121     <td>DOI</td>
     1122     <td>10.1109/INM.2011.5990568</td>
     1123</tr>
     1124
     1125
     1126
     1127<tr>
     1128     <td>URL</td>
     1129     <td><a href="http://dx.doi.org/10.1109/INM.2011.5990568">http://dx.doi.org/10.1109/INM.2011.5990568</a></td>
     1130</tr>
     1131
     1132
     1133</table></div><br><br>
     1134
     1135
     1136
     1137
     1138<a class="EntryGoto" id="Deng, Juan and Brooks, Richard R. and Martin, James"></a>
     1139<b class="myheading" style="position: relative; left: 10%;">Deng, Juan and Brooks, Richard R. and Martin, James</b>
     1140
     1141<div class="BibEntry">
     1142
     1143<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1144<tr class="TagRow">
     1145<!--
     1146        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1147        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1148-->
     1149</tr>
     1150
     1151
     1152<tr>
     1153     <td>Author</td>
     1154     <td>Deng, Juan and Brooks, Richard R. and Martin, James</td>
     1155</tr>
     1156
     1157<tr>
     1158     <td>Title</td>
     1159     <td>Assessing the Effect of WiMAX System Parameter Settings on MAC-level Local DoS Vulnerability</td>
     1160</tr>
     1161
     1162<tr>
     1163     <td>Journal</td>
     1164     <td>International Journal of Performability Engineering</td>
     1165</tr>
     1166
     1167<tr>
     1168     <td>Year</td>
     1169     <td>2012</td>
     1170</tr>
     1171
     1172<tr>
     1173     <td>Abstract</td>
     1174     <td>The research community has established that WiMAX networks suffer from Denial of Service (DoS) vulnerabilities. In this paper, we analyze how WiMAX system parameter settings increase or decrease DoS vulnerabilities of WiMAX networks. The behavior of the WiMAX MAC level protocol is sensitive to the settings of core system parameters. Unlike traditional network-based DoS attacks, attacks resulting from parameter misconfiguration are difficult for network operators to detect. We focus on bandwidth contention resolution aspects of the WiMAX MAC protocol. Simulations are performed using the ns-2 simulator. Analysis of Variance (ANOVA) techniques on the resulting simulation data identify which bandwidth contention resolution parameter combinations are crucial for configuring WiMAX to be less vulnerable to DoS attacks.</td>
     1175</tr>
     1176
     1177
     1178
     1179
     1180
     1181
     1182</table></div><br><br>
     1183
     1184
     1185
     1186
     1187<a class="EntryGoto" id="Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Strum, Matt and Wong, Gary and Carpenter, Charles and Fei, Zongming and Griffioen, James and Nasir, Hussamuddin and Reed, Jeremy and Wu, Xiongqi"></a>
     1188<b class="myheading" style="position: relative; left: 10%;">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Strum, Matt and Wong, Gary and Carpenter, Charles and Fei, Zongming and Griffioen, James and Nasir, Hussamuddin and Reed, Jeremy and Wu, Xiongqi</b>
     1189
     1190<div class="BibEntry">
     1191
     1192<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1193<tr class="TagRow">
     1194<!--
     1195        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1196        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1197-->
     1198</tr>
     1199
     1200
     1201<tr>
     1202     <td>Author</td>
     1203     <td>Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Strum, Matt and Wong, Gary and Carpenter, Charles and Fei, Zongming and Griffioen, James and Nasir, Hussamuddin and Reed, Jeremy and Wu, Xiongqi</td>
     1204</tr>
     1205
     1206<tr>
     1207     <td>Title</td>
     1208     <td>Getting started with GENI: a user tutorial</td>
     1209</tr>
     1210
     1211<tr>
     1212     <td>Journal</td>
     1213     <td>SIGCOMM Comput. Commun. Rev.</td>
     1214</tr>
     1215
     1216<tr>
     1217     <td>Publisher</td>
     1218     <td>ACM</td>
     1219</tr>
     1220
     1221<tr>
     1222     <td>Address</td>
     1223     <td>New York, NY, USA</td>
     1224</tr>
     1225
     1226<tr>
     1227     <td>Year</td>
     1228     <td>2012</td>
     1229</tr>
     1230
     1231<tr>
     1232     <td>Abstract</td>
     1233     <td>GENI, the Global Environment for Network Innovations, is a National Science Foundation project to create a &#x76;&#x0308;irtual laboratory at the frontiers of network science and engineering for exploring future internets at scale.&#x20;&#x0308;It provides researchers, educators, and students with resources that they can use to build their own networks that span the country and - through federation - the world. GENI enables experimenters to try out bold new network architectures and designs for networked systems, and to deploy and evaluate these systems on a diverse set of resources over a large footprint. This tutorial is a starting point for running experiments on GENI. It provides an overview of GENI and covers the process of creating a network and running a simple experiment using two tools: the Flack GUI and the INSTOOLS instrumentation service.</td>
     1234</tr>
     1235
     1236
     1237
     1238<tr>
     1239     <td>DOI</td>
     1240     <td>10.1145/2096149.2096161</td>
     1241</tr>
     1242
     1243
     1244
     1245<tr>
     1246     <td>URL</td>
     1247     <td><a href="http://dx.doi.org/10.1145/2096149.2096161">http://dx.doi.org/10.1145/2096149.2096161</a></td>
     1248</tr>
     1249
     1250
     1251</table></div><br><br>
     1252
     1253
     1254
     1255
     1256<a class="EntryGoto" id="Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Wong, Gary and Chikkulapelly, Srikanth and Seok, Woojin"></a>
     1257<b class="myheading" style="position: relative; left: 10%;">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Wong, Gary and Chikkulapelly, Srikanth and Seok, Woojin</b>
     1258
     1259<div class="BibEntry">
     1260
     1261<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1262<tr class="TagRow">
     1263<!--
     1264        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1265        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1266-->
     1267</tr>
     1268
     1269
     1270<tr>
     1271     <td>Author</td>
     1272     <td>Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Wong, Gary and Chikkulapelly, Srikanth and Seok, Woojin</td>
     1273</tr>
     1274
     1275<tr>
     1276     <td>Title</td>
     1277     <td>Designing a Federated Testbed as a Distributed System</td>
     1278</tr>
     1279
     1280<tr>
     1281     <td>Journal</td>
     1282     <td>8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2012)</td>
     1283</tr>
     1284
     1285<tr>
     1286     <td>Year</td>
     1287     <td>2012</td>
     1288</tr>
     1289
     1290<tr>
     1291     <td>Abstract</td>
     1292     <td>Traditionally, testbeds for networking and systems research have been stand-alone facilities: each is owned and operated by a single administrative entity, and is intended to be used independently of other testbeds. However, this isolated facility model is at odds with researchers' ever-increasing needs for experiments at larger scale and with a broader diversity of network technologies. The research community will be much better served by a federated model. In this model, each federated testbed maintains its own autonomy and unique strengths, but all federates work together to make their resources available under a common framework. Our challenge, then, is to design a federated testbed framework that balances competing needs: We must establish trust, but at the same time maintain the autonomy of each federated facility. While providing a unified interface to a broad set of resources, we need to expose the diversity that makes them valuable. Finally, our federation should work smoothly in a coordinated fashion, but avoid central points of failure and inter-facility dependencies. We argue that treating testbed design as a federated distributed systems problem is an effective approach to achieving this balance. The technique is illustrated through the example of ProtoGENI, a system we have designed, built, and operated according to the federated model.</td>
     1293</tr>
     1294
     1295
     1296
     1297
     1298
     1299
     1300</table></div><br><br>
     1301
     1302
     1303
     1304
     1305<a class="EntryGoto" id="Elliott, Chip and Falk, Aaron"></a>
     1306<b class="myheading" style="position: relative; left: 10%;">Elliott, Chip and Falk, Aaron</b>
     1307
     1308<div class="BibEntry">
     1309
     1310<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1311<tr class="TagRow">
     1312<!--
     1313        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1314        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1315-->
     1316</tr>
     1317
     1318
     1319<tr>
     1320     <td>Author</td>
     1321     <td>Elliott, Chip and Falk, Aaron</td>
     1322</tr>
     1323
     1324<tr>
     1325     <td>Title</td>
     1326     <td>An update on the GENI project</td>
     1327</tr>
     1328
     1329<tr>
     1330     <td>Journal</td>
     1331     <td>SIGCOMM Comput. Commun. Rev.</td>
     1332</tr>
     1333
     1334<tr>
     1335     <td>Publisher</td>
     1336     <td>ACM</td>
     1337</tr>
     1338
     1339<tr>
     1340     <td>Address</td>
     1341     <td>New York, NY, USA</td>
     1342</tr>
     1343
     1344<tr>
     1345     <td>Year</td>
     1346     <td>2009</td>
     1347</tr>
     1348
     1349<tr>
     1350     <td>Abstract</td>
     1351     <td>Environment for Network Innovations. Early prototypes of GENI are starting to come online as an end-to-end system and network researchers are invited to participate by engaging in the design process or using GENI to conduct experiments.</td>
     1352</tr>
     1353
     1354
     1355
     1356<tr>
     1357     <td>DOI</td>
     1358     <td>10.1145/1568613.1568620</td>
     1359</tr>
     1360
     1361
     1362
     1363<tr>
     1364     <td>URL</td>
     1365     <td><a href="http://dx.doi.org/10.1145/1568613.1568620">http://dx.doi.org/10.1145/1568613.1568620</a></td>
     1366</tr>
     1367
     1368
     1369</table></div><br><br>
     1370
     1371
     1372
     1373
     1374<a class="EntryGoto" id="Erazo, Miguel A. and Liu, Jason"></a>
     1375<b class="myheading" style="position: relative; left: 10%;">Erazo, Miguel A. and Liu, Jason</b>
     1376
     1377<div class="BibEntry">
     1378
     1379<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1380<tr class="TagRow">
     1381<!--
     1382        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1383        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1384-->
     1385</tr>
     1386
     1387
     1388<tr>
     1389     <td>Author</td>
     1390     <td>Erazo, Miguel A. and Liu, Jason</td>
     1391</tr>
     1392
     1393<tr>
     1394     <td>Title</td>
     1395     <td>On enabling real-time large-scale network simulation in GENI: the PrimoGENI approach</td>
     1396</tr>
     1397
     1398<tr>
     1399     <td>Booktitle</td>
     1400     <td>Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques</td>
     1401</tr>
     1402
     1403<tr>
     1404     <td>Location</td>
     1405     <td>Torremolinos, Malaga, Spain</td>
     1406</tr>
     1407
     1408<tr>
     1409     <td>Publisher</td>
     1410     <td>ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)</td>
     1411</tr>
     1412
     1413<tr>
     1414     <td>Address</td>
     1415     <td>ICST, Brussels, Belgium, Belgium</td>
     1416</tr>
     1417
     1418<tr>
     1419     <td>Year</td>
     1420     <td>2010</td>
     1421</tr>
     1422
     1423<tr>
     1424     <td>Abstract</td>
     1425     <td>The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform, a &#x76;&#x0308;irtual laboratory&#x20;&#x0308;for the design, implementation and evaluation of future Internets. In this paper, we present an overview of PrimoGENI, a GENI project with the goal of extending the GENI suite of interoperable infrastructure to allow network experiments at scale, involving physical, simulated and emulated network entities.</td>
     1426</tr>
     1427
     1428
     1429
     1430<tr>
     1431     <td>DOI</td>
     1432     <td>10.4108/ICST.SIMUTOOLS2010.8636</td>
     1433</tr>
     1434
     1435
     1436
     1437<tr>
     1438     <td>URL</td>
     1439     <td><a href="http://dx.doi.org/10.4108/ICST.SIMUTOOLS2010.8636">http://dx.doi.org/10.4108/ICST.SIMUTOOLS2010.8636</a></td>
     1440</tr>
     1441
     1442
     1443</table></div><br><br>
     1444
     1445
     1446
     1447
     1448<a class="EntryGoto" id="Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram"></a>
     1449<b class="myheading" style="position: relative; left: 10%;">Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram</b>
     1450
     1451<div class="BibEntry">
     1452
     1453<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1454<tr class="TagRow">
     1455<!--
     1456        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1457        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1458-->
     1459</tr>
     1460
     1461
     1462<tr>
     1463     <td>Author</td>
     1464     <td>Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram</td>
     1465</tr>
     1466
     1467<tr>
     1468     <td>Title</td>
     1469     <td>Decoupling policy from configuration in campus and enterprise networks</td>
     1470</tr>
     1471
     1472<tr>
     1473     <td>Booktitle</td>
     1474     <td>2010 17th IEEE Workshop on Local &#x0026; Metropolitan Area Networks (LANMAN)</td>
     1475</tr>
     1476
     1477<tr>
     1478     <td>Location</td>
     1479     <td>Long Branch, NJ, USA</td>
     1480</tr>
     1481
     1482<tr>
     1483     <td>Publisher</td>
     1484     <td>IEEE</td>
     1485</tr>
     1486
     1487<tr>
     1488     <td>Year</td>
     1489     <td>2010</td>
     1490</tr>
     1491
     1492<tr>
     1493     <td>Abstract</td>
     1494     <td>This paper surveys our ongoing work on the use of software-defined networking to simplify two acute policy problems in campus and enterprise network operations: access control and information flow control. We describe how the current coupling of high-level policy with low-level configuration makes these problems challenging today. We describe the specific policy problems faced by campus and enterprise network operators; illustrate our approach, which leverages recent trends in separating the network's ” control plane” from the data plane; and show how this approach can be applied to simplify these two enterprise network management tasks. We also describe our ongoing deployment efforts to build a campus network testbed where trial designs can be deployed and evaluated. We close with a summary of current and future research challenges for solving challenges within enterprise networks within the context of this new paradigm.</td>
     1495</tr>
     1496
     1497
     1498
     1499<tr>
     1500     <td>DOI</td>
     1501     <td>10.1109/LANMAN.2010.5507162</td>
     1502</tr>
     1503
     1504
     1505
     1506<tr>
     1507     <td>URL</td>
     1508     <td><a href="http://dx.doi.org/10.1109/LANMAN.2010.5507162">http://dx.doi.org/10.1109/LANMAN.2010.5507162</a></td>
     1509</tr>
     1510
     1511
     1512</table></div><br><br>
     1513
     1514
     1515
     1516
     1517<a class="EntryGoto" id="Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning"></a>
     1518<b class="myheading" style="position: relative; left: 10%;">Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning</b>
     1519
     1520<div class="BibEntry">
     1521
     1522<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1523<tr class="TagRow">
     1524<!--
     1525        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1526        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1527-->
     1528</tr>
     1529
     1530
     1531<tr>
     1532     <td>Author</td>
     1533     <td>Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning</td>
     1534</tr>
     1535
     1536<tr>
     1537     <td>Title</td>
     1538     <td>An enabling platform for autonomic management of the future internet</td>
     1539</tr>
     1540
     1541<tr>
     1542     <td>Journal</td>
     1543     <td>IEEE Network</td>
     1544</tr>
     1545
     1546<tr>
     1547     <td>Year</td>
     1548     <td>2011</td>
     1549</tr>
     1550
     1551<tr>
     1552     <td>Abstract</td>
     1553     <td>This article shows an autonomic management solution based on the recently defined programmable node architecture NetServ. The article starts with a general description of the classical network management requirements and their adaptation to the expected network evolution. After a description of the major issues characterizing the management of the expected Future Internet, the main autonomic management paradigms, and some recently introduced autonomic service platforms, we show and demonstrate the effectiveness of the NetServ architecture. Born as a means to deploy and execute networked services at runtime over programmable routers, NetServ has proved to be a suitable environment for hosting an autonomic management architecture.</td>
     1554</tr>
     1555
     1556
     1557
     1558<tr>
     1559     <td>DOI</td>
     1560     <td>10.1109/MNET.2011.6085639</td>
     1561</tr>
     1562
     1563
     1564
     1565<tr>
     1566     <td>URL</td>
     1567     <td><a href="http://dx.doi.org/10.1109/MNET.2011.6085639">http://dx.doi.org/10.1109/MNET.2011.6085639</a></td>
     1568</tr>
     1569
     1570
     1571</table></div><br><br>
     1572
     1573
     1574
     1575
     1576<a class="EntryGoto" id="Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia"></a>
     1577<b class="myheading" style="position: relative; left: 10%;">Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</b>
     1578
     1579<div class="BibEntry">
     1580
     1581<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1582<tr class="TagRow">
     1583<!--
     1584        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1585        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1586-->
     1587</tr>
     1588
     1589
     1590<tr>
     1591     <td>Author</td>
     1592     <td>Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</td>
     1593</tr>
     1594
     1595<tr>
     1596     <td>Title</td>
     1597     <td>Exercises for Graduate Students using GENI</td>
     1598</tr>
     1599
     1600<tr>
     1601     <td>Booktitle</td>
     1602     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     1603</tr>
     1604
     1605<tr>
     1606     <td>Location</td>
     1607     <td>Los Angeles</td>
     1608</tr>
     1609
     1610<tr>
     1611     <td>Year</td>
     1612     <td>2012</td>
     1613</tr>
     1614
     1615<tr>
     1616     <td>Abstract</td>
     1617     <td>GENI brings together a wide variety of heterogeneous networking infrastructure and technologies under a common platform. We propose programming exercises for graduate students to introduce GENI and enable students to conduct high fidelity networking experiments. In this paper, we focus on an exercise to study congestion control and reliability using the ProtoGENI aggregate. A planned second exercise aims to leverage GENI OpenFlow aggregates to study firewalls and QoS mechanisms. We believe that these lab exercises will expose students to key networking concepts and recent research directions, e.g., in the data center context.</td>
     1618</tr>
     1619
     1620
     1621
     1622
     1623
     1624
     1625</table></div><br><br>
     1626
     1627
     1628
     1629
     1630<a class="EntryGoto" id="Gangam, Sriharsha and Fahmy, Sonia"></a>
     1631<b class="myheading" style="position: relative; left: 10%;">Gangam, Sriharsha and Fahmy, Sonia</b>
     1632
     1633<div class="BibEntry">
     1634
     1635<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1636<tr class="TagRow">
     1637<!--
     1638        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1639        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1640-->
     1641</tr>
     1642
     1643
     1644<tr>
     1645     <td>Author</td>
     1646     <td>Gangam, Sriharsha and Fahmy, Sonia</td>
     1647</tr>
     1648
     1649<tr>
     1650     <td>Title</td>
     1651     <td>Mitigating interference in a network measurement service</td>
     1652</tr>
     1653
     1654<tr>
     1655     <td>Booktitle</td>
     1656     <td>2011 IEEE Nineteenth IEEE International Workshop on Quality of Service</td>
     1657</tr>
     1658
     1659<tr>
     1660     <td>Location</td>
     1661     <td>San Jose, CA, USA</td>
     1662</tr>
     1663
     1664<tr>
     1665     <td>Publisher</td>
     1666     <td>IEEE</td>
     1667</tr>
     1668
     1669<tr>
     1670     <td>Year</td>
     1671     <td>2011</td>
     1672</tr>
     1673
     1674<tr>
     1675     <td>Abstract</td>
     1676     <td>Shared measurement services offer key advantages over conventional ad-hoc techniques for network monitoring. A measurement service may receive measurement requests concurrently from different applications and network administrators. These measurement requests are often served by injecting active network measurement traffic between two hosts. Two active measurements are said to interfere when the probe packets of one measurement tool are viewed as network traffic by the other. This may lead to faulty measurement readings. In this paper, we model the measurement interference problem, and show how to schedule measurement tasks to reduce interference and hence increase measurement accuracy. We propose twelve computationally tractable algorithms that decrease the total completion time (makespan) of measurement tasks, while avoiding interference. Our evaluation shows that the algorithm we refer to as Largest Area First, Busiest Node First - Earliest Interval Schedule (LAFBNF-EIS) has a mean makespan of about 5&#x0025; more than the theoretical lower bound over our set of measurement workloads.</td>
     1677</tr>
     1678
     1679
     1680
     1681<tr>
     1682     <td>DOI</td>
     1683     <td>10.1109/IWQOS.2011.5931347</td>
     1684</tr>
     1685
     1686
     1687
     1688<tr>
     1689     <td>URL</td>
     1690     <td><a href="http://dx.doi.org/10.1109/IWQOS.2011.5931347">http://dx.doi.org/10.1109/IWQOS.2011.5931347</a></td>
     1691</tr>
     1692
     1693
     1694</table></div><br><br>
     1695
     1696
     1697
     1698
     1699<a class="EntryGoto" id="Gao, Jingcheng and Xiao, Yang"></a>
     1700<b class="myheading" style="position: relative; left: 10%;">Gao, Jingcheng and Xiao, Yang</b>
     1701
     1702<div class="BibEntry">
     1703
     1704<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1705<tr class="TagRow">
     1706<!--
     1707        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1708        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1709-->
     1710</tr>
     1711
     1712
     1713<tr>
     1714     <td>Author</td>
     1715     <td>Gao, Jingcheng and Xiao, Yang</td>
     1716</tr>
     1717
     1718<tr>
     1719     <td>Title</td>
     1720     <td>ProtoGENI DoS/DDoS Security Tests and Experiments</td>
     1721</tr>
     1722
     1723<tr>
     1724     <td>Booktitle</td>
     1725     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     1726</tr>
     1727
     1728<tr>
     1729     <td>Location</td>
     1730     <td>Los Angeles</td>
     1731</tr>
     1732
     1733<tr>
     1734     <td>Year</td>
     1735     <td>2012</td>
     1736</tr>
     1737
     1738<tr>
     1739     <td>Abstract</td>
     1740     <td>his paper will explain some tests and experiments to investigate selected security issues through ProtoGENI mainly during Spiral 3 time period and the beginning of Spiral 4. In this paper, we conduct multiple sets of DoS/ DDoS attacks in the current ProtoGENI testbed. These attacks show that it is very possible that ProtoGENI nodes may render vulnerabilities to such attacks.</td>
     1741</tr>
     1742
     1743
     1744
     1745
     1746
     1747
     1748</table></div><br><br>
     1749
     1750
     1751
     1752
     1753<a class="EntryGoto" id="Gember, Aaron and Dragga, Chris and Akella, Aditya"></a>
     1754<b class="myheading" style="position: relative; left: 10%;">Gember, Aaron and Dragga, Chris and Akella, Aditya</b>
     1755
     1756<div class="BibEntry">
     1757
     1758<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1759<tr class="TagRow">
     1760<!--
     1761        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1762        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1763-->
     1764</tr>
     1765
     1766
     1767<tr>
     1768     <td>Author</td>
     1769     <td>Gember, Aaron and Dragga, Chris and Akella, Aditya</td>
     1770</tr>
     1771
     1772<tr>
     1773     <td>Title</td>
     1774     <td>ECOS: Practical Mobile Application Offloading for Enterprises</td>
     1775</tr>
     1776
     1777<tr>
     1778     <td>Booktitle</td>
     1779     <td>2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE '12)</td>
     1780</tr>
     1781
     1782<tr>
     1783     <td>Year</td>
     1784     <td>2012</td>
     1785</tr>
     1786
     1787<tr>
     1788     <td>Abstract</td>
     1789     <td>Offloading has emerged as a promising idea to allow handheld devices to access intensive applications without performance or energy costs. This could be particularly useful for enterprises seeking to run line-of-business applications on handhelds. However, we must address two practical roadblocks in order to make offloading amenable for enterprises: (i) ensuring data privacy and the use of trusted offloading resources, and (ii) accommodating offload at scale with diverse handheld objectives and compute resource capabilities. We present the design and implementation of an Enterprise-Centric Offloading System (ECOS) which augments prior offloading proposals to address these issues. ECOS uses a logically central controller to opportunistically leverage diverse compute resources, while tightly controlling where specific applications offload depending on privacy, performance, and energy constraints of users and applications. A wide range of experiments using a real prototype establish the effectiveness of our approach.</td>
     1790</tr>
     1791
     1792
     1793
     1794
     1795
     1796<tr>
     1797     <td>URL</td>
     1798     <td><a href="http://www.usenix.org/conference/hot-ice12/ecos-practical-mobile-application-of&#x0025;EF&#x0025;AC&#x0025;82oading-enterprises">http://www.usenix.org/conference/hot-ice12/ecos-practical-mobile-application-of&#x0025;EF&#x0025;AC&#x0025;82oading-enterprises</a></td>
     1799</tr>
     1800
     1801
     1802</table></div><br><br>
     1803
     1804
     1805
     1806
     1807<a class="EntryGoto" id="Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C."></a>
     1808<b class="myheading" style="position: relative; left: 10%;">Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</b>
     1809
     1810<div class="BibEntry">
     1811
     1812<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1813<tr class="TagRow">
     1814<!--
     1815        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1816        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1817-->
     1818</tr>
     1819
     1820
     1821<tr>
     1822     <td>Author</td>
     1823     <td>Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</td>
     1824</tr>
     1825
     1826<tr>
     1827     <td>Title</td>
     1828     <td>The design of an instrumentation system for federated and virtualized network testbeds</td>
     1829</tr>
     1830
     1831<tr>
     1832     <td>Booktitle</td>
     1833     <td>Network Operations and Management Symposium (NOMS), 2012 IEEE</td>
     1834</tr>
     1835
     1836<tr>
     1837     <td>Publisher</td>
     1838     <td>IEEE</td>
     1839</tr>
     1840
     1841<tr>
     1842     <td>Year</td>
     1843     <td>2012</td>
     1844</tr>
     1845
     1846<tr>
     1847     <td>Abstract</td>
     1848     <td>Much of the GENI effort in developing network testbeds has been focused on building the control frameworks needed to allocate and initialize the network resources that make up an experiment. We argue that building the instrumentation and measurement system to monitor and capture the behavior of the network is just as important and challenging as setting up the network itself, especially in a virtualized and federated environment where getting information from experimental nodes is too complicated and too much to handle for a typical user. In this paper, we describe the design of an instrumentation and measurement infrastructure that allows users to monitor their experiments. The challenge that virtualization and federation of GENI testbeds bring to instrumentation and monitoring is how to hide the details of instrumentation setup from users so that users do not need to be experts in system administration or network management of virtualized and federated systems, but are still able to ” see” what is going on with their experiments. Our instrumentation tool sets up experiment-specific monitoring infrastructure that is tailored to capture, record, and display only information associated with that experiment. Our tools are currently available in GENI, and we present a simple example of how to use them to instrument an experiment.</td>
     1849</tr>
     1850
     1851
     1852
     1853<tr>
     1854     <td>DOI</td>
     1855     <td>10.1109/NOMS.2012.6212061</td>
     1856</tr>
     1857
     1858
     1859
     1860<tr>
     1861     <td>URL</td>
     1862     <td><a href="http://dx.doi.org/10.1109/NOMS.2012.6212061">http://dx.doi.org/10.1109/NOMS.2012.6212061</a></td>
     1863</tr>
     1864
     1865
     1866</table></div><br><br>
     1867
     1868
     1869
     1870
     1871<a class="EntryGoto" id="Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles"></a>
     1872<b class="myheading" style="position: relative; left: 10%;">Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</b>
     1873
     1874<div class="BibEntry">
     1875
     1876<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1877<tr class="TagRow">
     1878<!--
     1879        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1880        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1881-->
     1882</tr>
     1883
     1884
     1885<tr>
     1886     <td>Author</td>
     1887     <td>Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td>
     1888</tr>
     1889
     1890<tr>
     1891     <td>Title</td>
     1892     <td>Teaching with the Emerging GENI Network</td>
     1893</tr>
     1894
     1895<tr>
     1896     <td>Booktitle</td>
     1897     <td>Proceedings of the 2012 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS)</td>
     1898</tr>
     1899
     1900<tr>
     1901     <td>Location</td>
     1902     <td>Las Vegas</td>
     1903</tr>
     1904
     1905<tr>
     1906     <td>Year</td>
     1907     <td>2012</td>
     1908</tr>
     1909
     1910
     1911
     1912
     1913
     1914
     1915</table></div><br><br>
     1916
     1917
     1918
     1919
     1920<a class="EntryGoto" id="Herron, Jon-Paul"></a>
     1921<b class="myheading" style="position: relative; left: 10%;">Herron, Jon-Paul</b>
     1922
     1923<div class="BibEntry">
     1924
     1925<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1926<tr class="TagRow">
     1927<!--
     1928        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1929        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1930-->
     1931</tr>
     1932
     1933
     1934<tr>
     1935     <td>Author</td>
     1936     <td>Herron, Jon-Paul</td>
     1937</tr>
     1938
     1939<tr>
     1940     <td>Title</td>
     1941     <td>GENI Meta-Operations Center</td>
     1942</tr>
     1943
     1944<tr>
     1945     <td>Booktitle</td>
     1946     <td>2008 IEEE Fourth International Conference on eScience</td>
     1947</tr>
     1948
     1949<tr>
     1950     <td>Location</td>
     1951     <td>Indianapolis, IN, USA</td>
     1952</tr>
     1953
     1954<tr>
     1955     <td>Publisher</td>
     1956     <td>IEEE</td>
     1957</tr>
     1958
     1959<tr>
     1960     <td>Year</td>
     1961     <td>2008</td>
     1962</tr>
     1963
     1964<tr>
     1965     <td>Abstract</td>
     1966     <td>NSF's GENI program represents an opportunity to build the kind of programmable, virtualized testbed scientists exploring the future of networking will need to support their research. As with any other scientific instrument, it will be crucial that the GENI infrastructure offer repeatable, consistent results to the researchers using it.The GENI Meta-Operations Center, operated by the Global Research NOC at Indiana University, will develop the software, protocols, and processes needed to ensure the repeatability, consistency, and efficiency of GENI.</td>
     1967</tr>
     1968
     1969
     1970
     1971<tr>
     1972     <td>DOI</td>
     1973     <td>10.1109/eScience.2008.103</td>
     1974</tr>
     1975
     1976
     1977
     1978<tr>
     1979     <td>URL</td>
     1980     <td><a href="http://dx.doi.org/10.1109/eScience.2008.103">http://dx.doi.org/10.1109/eScience.2008.103</a></td>
     1981</tr>
     1982
     1983
     1984</table></div><br><br>
     1985
     1986
     1987
     1988
     1989<a class="EntryGoto" id="Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng"></a>
     1990<b class="myheading" style="position: relative; left: 10%;">Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng</b>
     1991
     1992<div class="BibEntry">
     1993
     1994<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     1995<tr class="TagRow">
     1996<!--
     1997        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     1998        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     1999-->
     2000</tr>
     2001
     2002
     2003<tr>
     2004     <td>Author</td>
     2005     <td>Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng</td>
     2006</tr>
     2007
     2008<tr>
     2009     <td>Title</td>
     2010     <td>LENS: resource specification for wireless sensor network experimentation infrastructures</td>
     2011</tr>
     2012
     2013<tr>
     2014     <td>Booktitle</td>
     2015     <td>Proceedings of the 6th ACM international workshop on Wireless network testbeds, experimental evaluation and characterization</td>
     2016</tr>
     2017
     2018<tr>
     2019     <td>Location</td>
     2020     <td>Las Vegas, Nevada, USA</td>
     2021</tr>
     2022
     2023<tr>
     2024     <td>Publisher</td>
     2025     <td>ACM</td>
     2026</tr>
     2027
     2028<tr>
     2029     <td>Address</td>
     2030     <td>New York, NY, USA</td>
     2031</tr>
     2032
     2033<tr>
     2034     <td>Year</td>
     2035     <td>2011</td>
     2036</tr>
     2037
     2038<tr>
     2039     <td>Abstract</td>
     2040     <td>As a first step towards predictable, repeatable WSN experimentation, we propose the resource specification language LENS (a.k.a. Language for Embedded Networked Sensing) for WSN experimentation infrastructures. Using the Resource Description Framework (RDF) and the Web Ontology Language (OWL), LENS defines a semantic ontology for WSN resources; LENS enables explicit control and measurement of uncertainty factors, and it enables reasoning about the relationships between WSN resources. Focusing on basic concepts of WSNs, LENS supports resource specification in a wide range of WSN experimentation infrastructures, and it is extensible to support potentially unforeseen technologies. LENS is also compatible with specification languages for other network resources such as optical networks. As a part of the NSF GENI initiative, we have implemented LENS in the KanseiGenie control framework, and LENS has been actively used to support experimentation in the federated WSN infrastructure involving Kansei and NetEye. Enabling reasoning about uncertainty factors in experimentation, LENS is expected to serve as a basis for developing methodologies and tools for predictable, repeatable WSN experimentation.</td>
     2041</tr>
     2042
     2043
     2044
     2045<tr>
     2046     <td>DOI</td>
     2047     <td>10.1145/2030718.2030727</td>
     2048</tr>
     2049
     2050
     2051
     2052<tr>
     2053     <td>URL</td>
     2054     <td><a href="http://dx.doi.org/10.1145/2030718.2030727">http://dx.doi.org/10.1145/2030718.2030727</a></td>
     2055</tr>
     2056
     2057
     2058</table></div><br><br>
     2059
     2060
     2061
     2062
     2063<a class="EntryGoto" id="Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki"></a>
     2064<b class="myheading" style="position: relative; left: 10%;">Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki</b>
     2065
     2066<div class="BibEntry">
     2067
     2068<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     2069<tr class="TagRow">
     2070<!--
     2071        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     2072        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     2073-->
     2074</tr>
     2075
     2076
     2077<tr>
     2078     <td>Author</td>
     2079     <td>Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki</td>
     2080</tr>
     2081
     2082<tr>
     2083     <td>Title</td>
     2084     <td>Future Internet: Challenges in Virtualization and Federation</td>
     2085</tr>
     2086
     2087<tr>
     2088     <td>Booktitle</td>
     2089     <td>2009 Fifth Advanced International Conference on Telecommunications</td>
     2090</tr>
     2091
     2092<tr>
     2093     <td>Location</td>
     2094     <td>Venice/Mestre, Italy</td>
     2095</tr>
     2096
     2097<tr>
     2098     <td>Publisher</td>
     2099     <td>IEEE</td>
     2100</tr>
     2101
     2102<tr>
     2103     <td>Year</td>
     2104     <td>2009</td>
     2105</tr>
     2106
     2107<tr>
     2108     <td>Abstract</td>
     2109     <td>Future Internet is a clean-slate research activity in the quest of new networking technologies to overcome the limits of the current Internet. In its experimental research, virtualization and federation are emerging as essential features, especially in the construction and operation of the testbeds. Moreover, they are believed to sustain as the fundamental features of the Future Internet itself. Visions and experiences on virtualization and federation are given by leading experts from US, EU, and Asia.</td>
     2110</tr>
     2111
     2112
     2113
     2114<tr>
     2115     <td>DOI</td>
     2116     <td>10.1109/AICT.2009.8</td>
     2117</tr>
     2118
     2119
     2120
     2121<tr>
     2122     <td>URL</td>
     2123     <td><a href="http://dx.doi.org/10.1109/AICT.2009.8">http://dx.doi.org/10.1109/AICT.2009.8</a></td>
     2124</tr>
     2125
     2126
     2127</table></div><br><br>
     2128
     2129
     2130
     2131
     2132<a class="EntryGoto" id="Kim, Hyunjun and Lee, Sungwon"></a>
     2133<b class="myheading" style="position: relative; left: 10%;">Kim, Hyunjun and Lee, Sungwon</b>
     2134
     2135<div class="BibEntry">
     2136
     2137<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     2138<tr class="TagRow">
     2139<!--
     2140        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     2141        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     2142-->
     2143</tr>
     2144
     2145
     2146<tr>
     2147     <td>Author</td>
     2148     <td>Kim, Hyunjun and Lee, Sungwon</td>
     2149</tr>
     2150
     2151<tr>
     2152     <td>Title</td>
     2153     <td>FiRST Cloud Aggregate Manager development over FiRST: Future Internet testbed</td>
     2154</tr>
     2155
     2156<tr>
     2157     <td>Booktitle</td>
     2158     <td>The International Conference on Information Network 2012</td>
     2159</tr>
     2160
     2161<tr>
     2162     <td>Location</td>
     2163     <td>Bali, Indonesia</td>
     2164</tr>
     2165
     2166<tr>
     2167     <td>Publisher</td>
     2168     <td>IEEE</td>
     2169</tr>
     2170
     2171<tr>
     2172     <td>Year</td>
     2173     <td>2012</td>
     2174</tr>
     2175
     2176<tr>
     2177     <td>Abstract</td>
     2178     <td>FiRST (Future Internet Research for Sustainable Test-bed) is the future internet platform development project being performed in Korea. The goal of the project is to create the virtualized and dynamic service creation environments over future internet networks; it is an experimental project to realize future innovative service ideas over real network environments. Among this, cloud computing is the key enabler to control and allocate virtualized network resources (such as CPU, storage, and virtualized network configuration) for the requested services. However, researches on interworking between future internet and cloud computing is in initial phase. In this paper, we propose the FiRST Cloud Aggregate Manager (AM) based on GENI (Global Environment for Network Innovation) AM Application Programming Interface (API) for the federation between future internet test-bed and open source OpenStack cloud computing platform. After that, we propose the zero-client service for mobile cloud management. In order to control the zero-client service, we develop Cloud Mobility Client/Server. And, we validate and verified our FiRST Cloud AM and zero-client service by developing experimental test-bed. Through this test-bed, we confirm that the proposed FiRST Cloud AM and zero-client service efficiently interworks with future internet control plane framework by using GENI Control Framework (GCF) tools.</td>
     2179</tr>
     2180
     2181
     2182
     2183<tr>
     2184     <td>DOI</td>
     2185     <td>10.1109/ICOIN.2012.6164436</td>
     2186</tr>
     2187
     2188
     2189
     2190<tr>
     2191     <td>URL</td>
     2192     <td><a href="http://dx.doi.org/10.1109/ICOIN.2012.6164436">http://dx.doi.org/10.1109/ICOIN.2012.6164436</a></td>
     2193</tr>
     2194
     2195
     2196</table></div><br><br>
     2197
     2198
     2199
     2200
     2201<a class="EntryGoto" id="Kline, Donald and Quan, John"></a>
     2202<b class="myheading" style="position: relative; left: 10%;">Kline, Donald and Quan, John</b>
     2203
     2204<div class="BibEntry">
     2205
     2206<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     2207<tr class="TagRow">
     2208<!--
     2209        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     2210        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     2211-->
     2212</tr>
     2213
     2214
     2215<tr>
     2216     <td>Author</td>
     2217     <td>Kline, Donald and Quan, John</td>
     2218</tr>
     2219
     2220<tr>
     2221     <td>Title</td>
     2222     <td>Attribute description service for large-scale networks</td>
     2223</tr>
     2224
     2225<tr>
     2226     <td>Booktitle</td>
     2227     <td>Proceedings of the 2nd international conference on Human centered design</td>
     2228</tr>
     2229
     2230<tr>
     2231     <td>Location</td>
     2232     <td>Orlando, FL, USA</td>
     2233</tr>
     2234
     2235<tr>
     2236     <td>Publisher</td>
     2237     <td>Springer-Verlag</td>
     2238</tr>
     2239
     2240<tr>
     2241     <td>Address</td>
     2242     <td>Berlin, Heidelberg</td>
     2243</tr>
     2244
     2245<tr>
     2246     <td>Year</td>
     2247     <td>2011</td>
     2248</tr>
     2249
     2250<tr>
     2251     <td>Abstract</td>
     2252     <td>An analysis of requesting resources from large-scale networks reveals a fundamental challenge. As the network grows, more and more resources become available, and so finding resources that fit experimental test criteria becomes difficult and time consuming. For example, the National Science Foundation sponsors GENI--an experimental network with a goal to gain enough resources to model the Internet at scale. Currently, GENI contains relatively few contributed resources donated from businesses and academia, and so matching resources to tests is rather simple. However, experimenters plan to conduct network experiments that are very complex and difficult to accurately model by using the vast numbers of resources expected in GENI. When GENI reaches its final state, finding the right resources that fit experimental test criteria out of many thousands of donated resources may be as difficult as conducting the experiment itself. This dilemma underscores the importance of establishing an attribute description service that promotes a standardized language for all interactions between the end users and the large-scale network.</td>
     2253</tr>
     2254
     2255
     2256
     2257<tr>
     2258     <td>DOI</td>
     2259     <td>10.1007/978-3-642-21753-1&#x005F;58</td>
     2260</tr>
     2261
     2262
     2263
     2264<tr>
     2265     <td>URL</td>
     2266     <td><a href="http://portal.acm.org/citation.cfm?id=2021672.2021735">http://portal.acm.org/citation.cfm?id=2021672.2021735</a></td>
     2267</tr>
     2268
     2269
     2270</table></div><br><br>
     2271
     2272
     2273
     2274
     2275<a class="EntryGoto" id="Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael"></a>
     2276<b class="myheading" style="position: relative; left: 10%;">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
     2277
     2278<div class="BibEntry">
     2279
     2280<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     2281<tr class="TagRow">
     2282<!--
     2283        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     2284        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     2285-->
     2286</tr>
     2287
     2288
     2289<tr>
     2290     <td>Author</td>
     2291     <td>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</td>
     2292</tr>
     2293
     2294<tr>
     2295     <td>Title</td>
     2296     <td>Performance of GENI Cloud Testbeds for Real Time Scientific Application</td>
     2297</tr>
     2298
     2299<tr>
     2300     <td>Booktitle</td>
     2301     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     2302</tr>
     2303
     2304<tr>
     2305     <td>Location</td>
     2306     <td>Los Angeles</td>
     2307</tr>
     2308
     2309<tr>
     2310     <td>Year</td>
     2311     <td>2012</td>
     2312</tr>
     2313
     2314<tr>
     2315     <td>Abstract</td>
     2316     <td>Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform.</td>
     2317</tr>
     2318
     2319
     2320
     2321
     2322
     2323
     2324</table></div><br><br>
     2325
     2326
     2327
     2328
     2329<a class="EntryGoto" id="Lee, Jae W."></a>
     2330<b class="myheading" style="position: relative; left: 10%;">Lee, Jae W.</b>
     2331
     2332<div class="BibEntry">
     2333
     2334<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     2335<tr class="TagRow">
     2336<!--
     2337        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     2338        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     2339-->
     2340</tr>
     2341
     2342
     2343<tr>
     2344     <td>Author</td>
     2345     <td>Lee, Jae W.</td>
     2346</tr>
     2347
     2348<tr>
     2349     <td>Title</td>
     2350     <td>Towards a Common System Architecture for Dynamically Deploying Network Services in Routers and End Hosts</td>
     2351</tr>
     2352
     2353<tr>
     2354     <td>Year</td>
     2355     <td>2012</td>
     2356</tr>
     2357
     2358<tr>
     2359     <td>Abstract</td>
     2360     <td>The architectural simplicity of the core Internet is a double-edged sword. On the one hand, its agnostic nature paved the way for endless innovations of end-to-end applications. On the other hand, the inherent limitation of this simplicity makes it difficult to add new functions to the network core itself. This is exacerbated by the conservative tendency of commercial entities to &#x6c;&#x0308;eave well-enough alone&#x2c;&#x0308; leading to the current situation often referred to as the ossification of the Internet. For decades, there has been practically no new functionality that has been added to the core Internet on a large scale. This thesis explores the possibility of enabling in-network services towards the goal of overcoming the ossification of the Internet. Our ultimate goal is to provide a common run-time environment supported by all Internet nodes and a wide-area deployment mechanism, so that network services can be freely installed, removed, and migrated among Internet nodes of all kinds–from a backbone router to a set-top box at home. In that vision of a future Internet, there is little difference between servers and routers for the purpose of running network services. Services can run anywhere on the Internet. Application service providers will have the freedom to choose the best place to run their code. This thesis presents NetServ, our first step to realize the vision of network services running anywhere on the Internet. NetServ is a node architecture for dynamically deploying in-network services on edge routers. Network functions and applications are implemented as software modules which can be deployed at any NetServ-enabled node on the Internet, subject to policy restrictions. The NetServ framework provides a common execution environment for service modules and the ability to dynamically install and remove the services without restarting the nodes. There are many challenges in designing such a system. The main contribution of this thesis lies in meeting those challenges. First, we recognize that the primary impetus for adopting new technologies is economics. To address the challenge of providing economic incentives for enabling in-network services, we demonstrate how NetServ can facilitate an economic alliance between content providers and ISPs. Using NetServ, content providers and the ISPs operating at the network edge (aka eyeball ISPs) can enter into a mutually beneficial economic relationship. ISPs make their NetServ-enabled edge routers available for hosting content providers' applications and contents. Content providers can operate closer to end users by deploying code modules on NetServ-enabled edge routers. We make our case by presenting NetServ applications which represent four concrete use cases. Second, our node architecture must support both traditional server applications and in-network packet processing applications since content providers' applications running on ISPs' routers will combine the traits of both. To address this challenge, NetServ framework can host a packet processing module that sits in the data path, a server module that uses the TCP/IP stack in the traditional way, or a combined module that does both. NetServ provides a unified runtime environment between routers and servers, taking us a step closer to the vision of the unified runtime available on all Internet nodes. Third, we must provide a fast and streamlined deployment mechanism. Content providers should be able to deploy their applications at any NetServ-enabled edge router on the Inter- net, given that they have proper authorizations. Moreover, in some application scenarios, content providers may not know the exact locations of the target routers. Content providers need a way to send a message to install or remove an application module towards a network destination, and have the NetServ-enabled routers located in the path catch and act on the message. To address this challenge, we adopted on-path signaling as the deployment mechanism for NetServ. A NetServ signaling message is sent in an IP packet towards a destination. The packet gets forwarded by IP routers as usual, but when it transits a NetServ-enabled router, the message gets intercepted and passed to the NetServ control layer. Fourth, a NetServ-enabled router must support the concurrent executions of multiple without restarting the nodes. There are many challenges in designing such a system. The main contribution of this thesis lies in meeting those challenges. First, we recognize that the primary impetus for adopting new technologies is economics. To address the challenge of providing economic incentives for enabling in-network services, we demonstrate how NetServ can facilitate an economic alliance between content providers and ISPs. Using NetServ, content providers and the ISPs operating at the network edge (aka eyeball ISPs) can enter into a mutually beneficial economic relationship. ISPs make their NetServ-enabled edge routers available for hosting content providers' applications and contents. Content providers can operate closer to end users by deploying code modules on NetServ-enabled edge routers. We make our case by presenting NetServ applications which represent four concrete use cases. Second, our node architecture must support both traditional server applications and in-network packet processing applications since content providers' applications running on ISPs' routers will combine the traits of both. To address this challenge, NetServ framework can host a packet processing module that sits in the data path, a server module that uses the TCP/IP stack in the traditional way, or a combined module that does both. NetServ provides a unified runtime environment between routers and servers, taking us a step closer to the vision of the unified runtime available on all Internet nodes. Third, we must provide a fast and streamlined deployment mechanism. Content providers should be able to deploy their applications at any NetServ-enabled edge router on the Internet, given that they have proper authorizations. Moreover, in some application scenarios, content providers may not know the exact locations of the target routers. Content providers need a way to send a message to install or remove an application module towards a network destination, and have the NetServ-enabled routers located in the path catch and act on the message. To address this challenge, we adopted on-path signaling as the deployment mechanism for NetServ. A NetServ signaling message is sent in an IP packet towards a destination. The packet gets forwarded by IP routers as usual, but when it transits a NetServ-enabled router, the message gets intercepted and passed to the NetServ control layer. Fourth, a NetServ-enabled router must support the concurrent executions of multiple content providers' applications. Each content provider's execution environment must be isolated from one another, and the resource usage of each must be controlled. To address the challenge of providing a robust multi-user execution environment, we chose to run NetServ modules in user space. This is in stark contrast to most programmable routers, which run service modules in kernel space for fast packet processing. Furthermore, NetServ modules are written in Java and run in Java Virtual Machines (JVMs). Our choice of user space execution and JVM allows us to leverage the decades of technology advances in operating systems, virtualization, and Java. Lastly, in order to host the services of a large number of content providers, NetServ must be able to scale beyond the single-box architecture. We address this challenge with the multi-box lateral expansion of NetServ using the OpenFlow forwarding engine. In this extended architecture, multiple NetServ nodes are attached to an OpenFlow switch, which provides a physically separate forwarding plane. The scalability of user services is no longer limited to a single NetServ box. Additionally, this thesis presents our prior work on improving service discovery in local and global networks. The service discovery work makes indirect contribution because the limitations of local and overlay networks encountered during those studies eventually led us to investigate in-network services, which resulted in NetServ. Specifically, we investigate the issues involved in bootstrapping large-scale structured overlay networks, present a tool to merge service announcements from multiple local networks, and propose an enhancement to structured overlay networks using link-local multicast.</td>
     2361</tr>
     2362
     2363
     2364
     2365
     2366
     2367<tr>
     2368     <td>URL</td>
     2369     <td><a href="http://academiccommons.columbia.edu/download/fedora&#x005F;content/download/ac:147210/CONTENT/Lee&#x005F;columbia&#x005F;0054D&#x005F;10773.pdf">http://academiccommons.columbia.edu/download/fedora&#x005F;content/download/ac:147210/CONTENT/Lee&#x005F;columbia&#x005F;0054D&#x005F;10773.pdf</a></td>
     2370</tr>
     2371
     2372
     2373</table></div><br><br>
     2374
     2375
     2376
     2377
     2378<a class="EntryGoto" id="Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang"></a>
     2379<b class="myheading" style="position: relative; left: 10%;">Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang</b>
     2380
     2381<div class="BibEntry">
     2382
     2383<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     2384<tr class="TagRow">
     2385<!--
     2386        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     2387        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     2388-->
     2389</tr>
     2390
     2391
     2392<tr>
     2393     <td>Author</td>
     2394     <td>Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang</td>
     2395</tr>
     2396
     2397<tr>
     2398     <td>Title</td>
     2399     <td>NetServ: Active Networking 2.0</td>
     2400</tr>
     2401
     2402<tr>
     2403     <td>Booktitle</td>
     2404     <td>2011 IEEE International Conference on Communications Workshops (ICC)</td>
     2405</tr>
     2406
     2407<tr>
     2408     <td>Location</td>
     2409     <td>Kyoto, Japan</td>
     2410</tr>
     2411
     2412<tr>
     2413     <td>Publisher</td>
     2414     <td>IEEE</td>
     2415</tr>
     2416
     2417<tr>
     2418     <td>Year</td>
     2419     <td>2011</td>
     2420</tr>
     2421
     2422<tr>
     2423     <td>Abstract</td>
     2424     <td>We present NetServ, a node architecture for deploying in-network services in the next generation Internet. NetServ-enabled network nodes provide a common execution environment, where network services implemented as modules can be dynamically installed and removed. We demonstrate three such modules. MicroCDN is a dynamic content distribution network (CDN) service which implements a content caching strategy specific to a content provider. The NAT Keep-alive module offloads the processing of keep-alive messages from SIP servers. The Media Relay module allows any NetServ node to act as a media relay, eliminating the need to manage standalone relay servers. NetServ aims to revive the Active Networking vision. It was too far ahead of its time a decade ago, but we believe its time has finally arrived.</td>
     2425</tr>
     2426
     2427
     2428
     2429<tr>
     2430     <td>DOI</td>
     2431     <td>10.1109/iccw.2011.5963554</td>
     2432</tr>
     2433
     2434
     2435
     2436<tr>
     2437     <td>URL</td>
     2438     <td><a href="http://dx.doi.org/10.1109/iccw.2011.5963554">http://dx.doi.org/10.1109/iccw.2011.5963554</a></td>
     2439</tr>
     2440
     2441
     2442</table></div><br><br>
     2443
     2444
     2445
     2446
     2447<a class="EntryGoto" id="Li, Dawei and Hong, Xiaoyan"></a>
     2448<b class="myheading" style="position: relative; left: 10%;">Li, Dawei and Hong, Xiaoyan</b>
     2449
     2450<div class="BibEntry">
     2451
     2452<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     2453<tr class="TagRow">
     2454<!--
     2455        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     2456        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     2457-->
     2458</tr>
     2459
     2460
     2461<tr>
     2462     <td>Author</td>
     2463     <td>Li, Dawei and Hong, Xiaoyan</td>
     2464</tr>
     2465
     2466<tr>
     2467     <td>Title</td>
     2468     <td>Practical exploitation on system vulnerability of ProtoGENI</td>
     2469</tr>
     2470
     2471<tr>
     2472     <td>Booktitle</td>
     2473     <td>Proceedings of the 49th Annual Southeast Regional Conference</td>
     2474</tr>
     2475
     2476<tr>
     2477     <td>Location</td>
     2478     <td>Kennesaw, Georgia</td>
     2479</tr>
     2480
     2481<tr>
     2482     <td>Publisher</td>
     2483     <td>ACM</td>
     2484</tr>
     2485
     2486<tr>
     2487     <td>Address</td>
     2488     <td>New York, NY, USA</td>
     2489</tr>
     2490
     2491<tr>
     2492     <td>Year</td>
     2493     <td>2011</td>
     2494</tr>
     2495
     2496<tr>
     2497     <td>Abstract</td>
     2498     <td>Global Environment for Network Innovations (GENI) is a unique virtual laboratory for at-scale networking experimentation exploring future Internets. The successful development of GENI has to consider security problems from the design and prototyping stages. However, in many cases, system vulnerability cannot be found unless through real experimentation bearing purposeful and meaningful designs. In this paper, we introduce some of our efforts in exploring the security vulnerabilities in ProtoGENI, a prototype implementation and deployment of GENI. Our results show potential breach on security of GENI in terms of availability. We make suggestions on potential defense strategies in order to improve the ProtoGENI security and its development.</td>
     2499</tr>
     2500
     2501
     2502
     2503<tr>
     2504     <td>DOI</td>
     2505     <td>10.1145/2016039.2016073</td>
     2506</tr>
     2507
     2508
     2509
     2510<tr>
     2511     <td>URL</td>
     2512     <td><a href="http://dx.doi.org/10.1145/2016039.2016073">http://dx.doi.org/10.1145/2016039.2016073</a></td>
     2513</tr>
     2514
     2515
     2516</table></div><br><br>
     2517
     2518
     2519
     2520
     2521<a class="EntryGoto" id="Li, Dawei and Hong, Xiaoyan and Bowman, Jason"></a>
     2522<b class="myheading" style="position: relative; left: 10%;">Li, Dawei and Hong, Xiaoyan and Bowman, Jason</b>
     2523
     2524<div class="BibEntry">
     2525
     2526<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     2527<tr class="TagRow">
     2528<!--
     2529        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     2530        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     2531-->
     2532</tr>
     2533
     2534
     2535<tr>
     2536     <td>Author</td>
     2537     <td>Li, Dawei and Hong, Xiaoyan and Bowman, Jason</td>
     2538</tr>
     2539
     2540<tr>
     2541     <td>Title</td>
     2542     <td>Evaluation of Security Vulnerabilities by Using ProtoGENI as a Launchpad</td>
     2543</tr>
     2544
     2545<tr>
     2546     <td>Booktitle</td>
     2547     <td>IEEE Global Communications Conference (GLOBECOM 2011)</td>
     2548</tr>
     2549
     2550<tr>
     2551     <td>Year</td>
     2552     <td>2011</td>
     2553</tr>
     2554
     2555<tr>
     2556     <td>Abstract</td>
     2557     <td>In this paper we analyze the security architecture of ProtoGENI. ProtoGENI is a prototype control framework implementation of GENI (Global Environment for Network Innovations). We perform a variety of experiments in an effort to identify potential vulnerabilities presented in the current implementation. We classify our attacks into three types: data plane to data plane, data plane to control plane, and data plane to Internet. Our results indicate the potential for a breach of confidentiality and availability internally within ProtoGENI, as well as risks to external Internet. We make suggestions outlining possible defense strategies to improve ProtoGENI security and aid in future development</td>
     2558</tr>
     2559
     2560
     2561
     2562
     2563
     2564<tr>
     2565     <td>URL</td>
     2566     <td><a href="ftp://202.38.75.7/pub/&#x0025;D0&#x0025;C2&#x0025;CE&#x0025;C4&#x0025;BC&#x0025;FE&#x0025;BC&#x0025;D0&#x0025;20(2)/DATA/PID1102190.PDF">ftp://202.38.75.7/pub/&#x0025;D0&#x0025;C2&#x0025;CE&#x0025;C4&#x0025;BC&#x0025;FE&#x0025;BC&#x0025;D0&#x0025;20(2)/DATA/PID1102190.PDF</a></td>
     2567</tr>
     2568
     2569
     2570</table></div><br><br>
     2571
     2572
     2573
     2574
     2575<a class="EntryGoto" id="Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason"></a>
     2576<b class="myheading" style="position: relative; left: 10%;">Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason</b>
     2577
     2578<div class="BibEntry">
     2579
     2580<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     2581<tr class="TagRow">
     2582<!--
     2583        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     2584        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     2585-->
     2586</tr>
     2587
     2588
     2589<tr>
     2590     <td>Author</td>
     2591     <td>Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason</td>
     2592</tr>
     2593
     2594<tr>
     2595     <td>Title</td>
     2596     <td>Simulation studies of OpenFlow-based in-network caching strategies</td>
     2597</tr>
     2598
     2599<tr>
     2600     <td>Booktitle</td>
     2601     <td>Proceedings of the 15th Communications and Networking Simulation Symposium</td>
     2602</tr>
     2603
     2604<tr>
     2605     <td>Location</td>
     2606     <td>Orlando, Florida</td>
     2607</tr>
     2608
     2609<tr>
     2610     <td>Publisher</td>
     2611     <td>Society for Computer Simulation International</td>
     2612</tr>
     2613
     2614<tr>
     2615     <td>Address</td>
     2616     <td>San Diego, CA, USA</td>
     2617</tr>
     2618
     2619<tr>
     2620     <td>Year</td>
     2621     <td>2012</td>
     2622</tr>
     2623
     2624<tr>
     2625     <td>Abstract</td>
     2626     <td>We propose an in-network caching architecture using Open-Flow to coordinate caching decisions in the network. Our scheme, called CacheFlow, extends the cache-and-forward concept by moving contents closer to the clients hop-by-hop using TCP for sending requests and retrieving contents. As such, CacheFlow can be incrementally implemented and deployed in the real network. In this paper, we present a simulation study of several caching policies, including a random cache policy, a statically optimal cache placement policy and a new disk placement strategy that places popular contents at the &#x63;&#x0308;enter&#x20;&#x0308;of the network. Experimental results show that simple in-network caching policies can be realized using today's technology to improve network performance.</td>
     2627</tr>
     2628
     2629
     2630
     2631
     2632
     2633<tr>
     2634     <td>URL</td>
     2635     <td><a href="http://portal.acm.org/citation.cfm?id=2331762.2331774">http://portal.acm.org/citation.cfm?id=2331762.2331774</a></td>
     2636</tr>
     2637
     2638
     2639</table></div><br><br>
     2640
     2641
     2642
     2643
     2644<a class="EntryGoto" id="Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross"></a>
     2645<b class="myheading" style="position: relative; left: 10%;">Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</b>
     2646
     2647<div class="BibEntry">
     2648
     2649<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     2650<tr class="TagRow">
     2651<!--
     2652        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     2653        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     2654-->
     2655</tr>
     2656
     2657
     2658<tr>
     2659     <td>Author</td>
     2660     <td>Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</td>
     2661</tr>
     2662
     2663<tr>
     2664     <td>Title</td>
     2665     <td>Work-in-Progress: Empirical Verification of A Subset Sum Hypothesis in GENI Cloud</td>
     2666</tr>
     2667
     2668<tr>
     2669     <td>Booktitle</td>
     2670     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     2671</tr>
     2672
     2673<tr>
     2674     <td>Location</td>
     2675     <td>Los Angeles</td>
     2676</tr>
     2677
     2678<tr>
     2679     <td>Year</td>
     2680     <td>2012</td>
     2681</tr>
     2682
     2683
     2684
     2685
     2686
     2687
     2688</table></div><br><br>
     2689
     2690
     2691
     2692
     2693<a class="EntryGoto" id="Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi"></a>
     2694<b class="myheading" style="position: relative; left: 10%;">Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</b>
     2695
     2696<div class="BibEntry">
     2697
     2698<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     2699<tr class="TagRow">
     2700<!--
     2701        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     2702        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     2703-->
     2704</tr>
     2705
     2706
     2707<tr>
     2708     <td>Author</td>
     2709     <td>Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</td>
     2710</tr>
     2711
     2712<tr>
     2713     <td>Title</td>
     2714     <td>Assessment of Router Vulnerabilities on PlanetLab Infrastructure for Secure Cloud Computing</td>
     2715</tr>
     2716
     2717<tr>
     2718     <td>Booktitle</td>
     2719     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     2720</tr>
     2721
     2722<tr>
     2723     <td>Location</td>
     2724     <td>Los Angeles</td>
     2725</tr>
     2726
     2727<tr>
     2728     <td>Year</td>
     2729     <td>2012</td>
     2730</tr>
     2731
     2732<tr>
     2733     <td>Abstract</td>
     2734     <td>In recent times, the cloud computing based delivery model has been proven to reduce enterprise IT costs and complexities. In contrast to traditional enterprise IT solutions, the cloud computing model moves the application software and data to remote servers in large datacenters, which raises many security challenges. One of the critical challenges is the inability to characterize the impact of the vulnerabilities of routers on the cloud security and performance guarantees. In this paper, we analyze the degree of security provided by routers to data sharing applications deployed in cloud environments that span administrative and network domains. Our analysis is based on examining the security level of network applications on routers which lie between nodes on Planetlab infrastructure. We assume that some of the PlanetLab nodes will share the same wide area network path as the cloud servers. Our preliminary results confirm that the majority of the routers are plagued by insecure network protocols, leading to vulnerable routers. These results confirm our hypothesis that the security of the network infrastructure needs to be upgraded to assure the protection of information exchanged on the wide area network path.</td>
     2735</tr>
     2736
     2737
     2738
     2739
     2740
     2741
     2742</table></div><br><br>
     2743
     2744
     2745
     2746
     2747<a class="EntryGoto" id="Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H."></a>
     2748<b class="myheading" style="position: relative; left: 10%;">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</b>
     2749
     2750<div class="BibEntry">
     2751
     2752<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     2753<tr class="TagRow">
     2754<!--
     2755        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     2756        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     2757-->
     2758</tr>
     2759
     2760
     2761<tr>
     2762     <td>Author</td>
     2763     <td>Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td>
     2764</tr>
     2765
     2766<tr>
     2767     <td>Title</td>
     2768     <td>Extending the NetServ autonomic management capabilities using OpenFlow</td>
     2769</tr>
     2770
     2771<tr>
     2772     <td>Booktitle</td>
     2773     <td>2012 IEEE Network Operations and Management Symposium</td>
     2774</tr>
     2775
     2776<tr>
     2777     <td>Location</td>
     2778     <td>Maui, HI</td>
     2779</tr>
     2780
     2781<tr>
     2782     <td>Publisher</td>
     2783     <td>IEEE</td>
     2784</tr>
     2785
     2786<tr>
     2787     <td>Year</td>
     2788     <td>2012</td>
     2789</tr>
     2790
     2791<tr>
     2792     <td>Abstract</td>
     2793     <td>Autonomic management capabilities of the Future Internet can be provided through a recently proposed service architecture called NetServ. It consists of the interconnection of programmable nodes which enable dynamic deployment and execution of network and application services. This paper shows how this architecture can be further improved by introducing the OpenFlow architecture and implementing the OpenFlow controller as a NetServ service, thus improving both the NetServ management performance and its flexibility. These achievements are demonstrated experimentally on the GENI environment, showing the platform self-protecting capabilities in case of a SIP DoS attack.</td>
     2794</tr>
     2795
     2796
     2797
     2798<tr>
     2799     <td>DOI</td>
     2800     <td>10.1109/NOMS.2012.6211961</td>
     2801</tr>
     2802
     2803
     2804
     2805<tr>
     2806     <td>URL</td>
     2807     <td><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td>
     2808</tr>
     2809
     2810
     2811</table></div><br><br>
     2812
     2813
     2814
     2815
     2816<a class="EntryGoto" id="Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y."></a>
     2817<b class="myheading" style="position: relative; left: 10%;">Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y.</b>
     2818
     2819<div class="BibEntry">
     2820
     2821<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     2822<tr class="TagRow">
     2823<!--
     2824        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     2825        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     2826-->
     2827</tr>
     2828
     2829
     2830<tr>
     2831     <td>Author</td>
     2832     <td>Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y.</td>
     2833</tr>
     2834
     2835<tr>
     2836     <td>Title</td>
     2837     <td>Space Versus Time Separation for Wireless Virtualization on an Indoor Grid</td>
     2838</tr>
     2839
     2840<tr>
     2841     <td>Booktitle</td>
     2842     <td>Next Generation Internet Networks, 2008. NGI 2008</td>
     2843</tr>
     2844
     2845<tr>
     2846     <td>Publisher</td>
     2847     <td>IEEE</td>
     2848</tr>
     2849
     2850<tr>
     2851     <td>Year</td>
     2852     <td>2008</td>
     2853</tr>
     2854
     2855<tr>
     2856     <td>Abstract</td>
     2857     <td>The decreasing cost of wireless hardware and ever increasing number of wireless testbeds has led to a shift in the protocol evaluation paradigm from simulations towards emulation. In addition, with a large number of users demanding experimental resources and lack of space and time for deploying more hardware, fair resource sharing among independent co-existing experiments is important. We study the proposed approaches to wireless virtualization with a focus on schemes conserving wireless channels rather than nodes. Our detailed comparison reveals that while experiments sharing a channel by space separation achieve better efficiency than those relying on time separation of a channel, the isolation between experiments in both cases is comparable. We propose and implement a policy manager to alleviate the isolation problem and suggest scenarios in which either of the schemes would provide a suitable virtualization solution.</td>
     2858</tr>
     2859
     2860
     2861
     2862<tr>
     2863     <td>DOI</td>
     2864     <td>10.1109/NGI.2008.36</td>
     2865</tr>
     2866
     2867
     2868
     2869<tr>
     2870     <td>URL</td>
     2871     <td><a href="http://dx.doi.org/10.1109/NGI.2008.36">http://dx.doi.org/10.1109/NGI.2008.36</a></td>
     2872</tr>
     2873
     2874
     2875</table></div><br><br>
     2876
     2877
     2878
     2879
     2880<a class="EntryGoto" id="Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D."></a>
     2881<b class="myheading" style="position: relative; left: 10%;">Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D.</b>
     2882
     2883<div class="BibEntry">
     2884
     2885<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     2886<tr class="TagRow">
     2887<!--
     2888        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     2889        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     2890-->
     2891</tr>
     2892
     2893
     2894<tr>
     2895     <td>Author</td>
     2896     <td>Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D.</td>
     2897</tr>
     2898
     2899<tr>
     2900     <td>Title</td>
     2901     <td>Integration of heterogeneous networking testbeds</td>
     2902</tr>
     2903
     2904<tr>
     2905     <td>Booktitle</td>
     2906     <td>Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks &#x0026; communities</td>
     2907</tr>
     2908
     2909<tr>
     2910     <td>Location</td>
     2911     <td>Innsbruck, Austria</td>
     2912</tr>
     2913
     2914<tr>
     2915     <td>Publisher</td>
     2916     <td>ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)</td>
     2917</tr>
     2918
     2919<tr>
     2920     <td>Address</td>
     2921     <td>ICST, Brussels, Belgium, Belgium</td>
     2922</tr>
     2923
     2924<tr>
     2925     <td>Year</td>
     2926     <td>2008</td>
     2927</tr>
     2928
     2929<tr>
     2930     <td>Abstract</td>
     2931     <td>As networking research expands into new frontiers, the research community has felt a need for a heterogeneous networking research infrastructure to experiment with the interaction and integration of different types of networks, and to test the performance of various networking protocols in realistic environments. This requirement has led to the Global Environment for Network Innovations (GENI) initiative to create a global infrastructure for conducting networking experiments across diverse substrates such as wired (local and wide-area), wireless, sensor and cellular networks. In this paper, we discuss and present two models for building such an experimental infrastructure. The first model enables a wired testbed to link with wireless edge nodes during an experiment, whereas the second model enables a wireless testbed to link to wired testbeds. Proof-of-concept experiments are also presented reinforcing the usefulness of the models in terms of facilitating experiments over the integrated heterogeneous infrastructure.</td>
     2932</tr>
     2933
     2934
     2935
     2936
     2937
     2938<tr>
     2939     <td>URL</td>
     2940     <td><a href="http://portal.acm.org/citation.cfm?id=1390609">http://portal.acm.org/citation.cfm?id=1390609</a></td>
     2941</tr>
     2942
     2943
     2944</table></div><br><br>
     2945
     2946
     2947
     2948
     2949<a class="EntryGoto" id="Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming"></a>
     2950<b class="myheading" style="position: relative; left: 10%;">Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</b>
     2951
     2952<div class="BibEntry">
     2953
     2954<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     2955<tr class="TagRow">
     2956<!--
     2957        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     2958        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     2959-->
     2960</tr>
     2961
     2962
     2963<tr>
     2964     <td>Author</td>
     2965     <td>Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</td>
     2966</tr>
     2967
     2968<tr>
     2969     <td>Title</td>
     2970     <td>Socially Aware Single System Images</td>
     2971</tr>
     2972
     2973<tr>
     2974     <td>Booktitle</td>
     2975     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     2976</tr>
     2977
     2978<tr>
     2979     <td>Location</td>
     2980     <td>Los Angeles</td>
     2981</tr>
     2982
     2983<tr>
     2984     <td>Year</td>
     2985     <td>2012</td>
     2986</tr>
     2987
     2988<tr>
     2989     <td>Abstract</td>
     2990     <td>Cloud computing enables users to get access to huge amounts of computing resources as desired. There are many popular commercial cloud service providers which provide resources to users at a price. These providers can not be trusted as far as privacy of data is concerned. On the other hand, people do trust their close friends, relatives and other social contacts, albeit, to varying degrees. This paper reports the work-in-progress on S3I(Socially Aware Single System Images) which allows users to form computing clusters using resources owned by their social contacts. It tries to utilize the trust found between people in real life and translate it to provide trustworthy resource sharing between them.</td>
     2991</tr>
     2992
     2993
     2994
     2995
     2996
     2997
     2998</table></div><br><br>
     2999
     3000
     3001
     3002
     3003<a class="EntryGoto" id="Maziku, Hellen and Shetty, Sachin and Rogers, Tamara"></a>
     3004<b class="myheading" style="position: relative; left: 10%;">Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</b>
     3005
     3006<div class="BibEntry">
     3007
     3008<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3009<tr class="TagRow">
     3010<!--
     3011        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3012        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3013-->
     3014</tr>
     3015
     3016
     3017<tr>
     3018     <td>Author</td>
     3019     <td>Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</td>
     3020</tr>
     3021
     3022<tr>
     3023     <td>Title</td>
     3024     <td>Measurement-based IP Geolocation of Routers on Planetlab Infrastructure</td>
     3025</tr>
     3026
     3027<tr>
     3028     <td>Booktitle</td>
     3029     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     3030</tr>
     3031
     3032<tr>
     3033     <td>Location</td>
     3034     <td>Los Angeles</td>
     3035</tr>
     3036
     3037<tr>
     3038     <td>Year</td>
     3039     <td>2012</td>
     3040</tr>
     3041
     3042<tr>
     3043     <td>Abstract</td>
     3044     <td>Location aware applications can benefit from a more accurate yet robust IP geolocation framework. Various approaches to IP geolocation have been well documented. The most recent approach casts IP geolocation as a machine learn- ing classification problem. This approach makes it possible to incorporate both delay and non delay based information. The accuracy of IP geolocation can be improved by incorporating additional types of geolocation information rather relying on network delay alone. To enhance the classification accuracy of the existing classification framework, we expand it to include 6 features (3 of which are novel). We use PlanetLab as a testbed to generate our measurement set. We select 67 PlanetLab nodes within the United States with known geographic location as our landmarks. We test the accuracy of our framework on 23,843 routers given ping measurements from the 67 landmarks. With only three features (average delay, average hops and population density) tested, our new classifier gives a reduced average error distance of 157.81 miles and a median error distance of 0 miles, compared to the present classifier that gives an average error distance of 253.34 miles. This is very promising as we move on to the next phase of incorporating data for the remaining 5 features. To the best of our knowledge, this is the first proposed framework that aims to improve the accuracy of the present classifier based IP geolocation.</td>
     3045</tr>
     3046
     3047
     3048
     3049
     3050
     3051
     3052</table></div><br><br>
     3053
     3054
     3055
     3056
     3057<a class="EntryGoto" id="Mitroff, Sarah"></a>
     3058<b class="myheading" style="position: relative; left: 10%;">Mitroff, Sarah</b>
     3059
     3060<div class="BibEntry">
     3061
     3062<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3063<tr class="TagRow">
     3064<!--
     3065        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3066        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3067-->
     3068</tr>
     3069
     3070
     3071<tr>
     3072     <td>Author</td>
     3073     <td>Mitroff, Sarah</td>
     3074</tr>
     3075
     3076<tr>
     3077     <td>Title</td>
     3078     <td>Lawrence Landweber Helped Build Today's Internet, Now He's Advising Its Future</td>
     3079</tr>
     3080
     3081<tr>
     3082     <td>Journal</td>
     3083     <td>Wired</td>
     3084</tr>
     3085
     3086<tr>
     3087     <td>Year</td>
     3088     <td>2012</td>
     3089</tr>
     3090
     3091
     3092
     3093
     3094
     3095<tr>
     3096     <td>URL</td>
     3097     <td><a href="http://www.wired.com/business/2012/08/lawrence-landweber/">http://www.wired.com/business/2012/08/lawrence-landweber/</a></td>
     3098</tr>
     3099
     3100
     3101</table></div><br><br>
     3102
     3103
     3104
     3105
     3106<a class="EntryGoto" id="Muhammad, Monzur and Cappos, Justin"></a>
     3107<b class="myheading" style="position: relative; left: 10%;">Muhammad, Monzur and Cappos, Justin</b>
     3108
     3109<div class="BibEntry">
     3110
     3111<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3112<tr class="TagRow">
     3113<!--
     3114        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3115        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3116-->
     3117</tr>
     3118
     3119
     3120<tr>
     3121     <td>Author</td>
     3122     <td>Muhammad, Monzur and Cappos, Justin</td>
     3123</tr>
     3124
     3125<tr>
     3126     <td>Title</td>
     3127     <td>Towards a Representive Testbed: Harnessing Volunteers for Networks Research</td>
     3128</tr>
     3129
     3130<tr>
     3131     <td>Booktitle</td>
     3132     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     3133</tr>
     3134
     3135<tr>
     3136     <td>Location</td>
     3137     <td>Los Angeles</td>
     3138</tr>
     3139
     3140<tr>
     3141     <td>Year</td>
     3142     <td>2012</td>
     3143</tr>
     3144
     3145<tr>
     3146     <td>Abstract</td>
     3147     <td>A steady rise in home systems has been seen over the past few years. As more systems are designed and deployed, an appropriate testbed is required to test these systems. Sev- eral systems exist, such as PlanetLab, that currently provide a networking testbed allowing researchers and developers to test and measure various applications. However in the long run such testbeds will be unable to keep up and meet all the demands of many of the large scale modern day peer-to-peer systems. We outline the various challenges and essentials of a networking testbed and we provide an alternate network- ing testbed that is driven by resources that are voluntarily contributed. We talk about the various advantages and dis- advantages of the Seattle system, an open source peer-to- peer computing testbed that has the potential to meet these demands. The testbed is composed of sandboxed resources that are donated by volunteers. Seattle has been deployed for about three years and supports many researchers who are interested in a networking testbed. The testbed consists of over 4100 nodes and is constantly growing. Seattle looks to grow and meet the demands of networking testbeds as they are made.</td>
     3148</tr>
     3149
     3150
     3151
     3152
     3153
     3154
     3155</table></div><br><br>
     3156
     3157
     3158
     3159
     3160<a class="EntryGoto" id="Ozcelik, Ilker and Brooks, Richard R."></a>
     3161<b class="myheading" style="position: relative; left: 10%;">Ozcelik, Ilker and Brooks, Richard R.</b>
     3162
     3163<div class="BibEntry">
     3164
     3165<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3166<tr class="TagRow">
     3167<!--
     3168        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3169        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3170-->
     3171</tr>
     3172
     3173
     3174<tr>
     3175     <td>Author</td>
     3176     <td>Ozcelik, Ilker and Brooks, Richard R.</td>
     3177</tr>
     3178
     3179<tr>
     3180     <td>Title</td>
     3181     <td>Security experimentation using operational systems</td>
     3182</tr>
     3183
     3184<tr>
     3185     <td>Booktitle</td>
     3186     <td>Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research</td>
     3187</tr>
     3188
     3189<tr>
     3190     <td>Location</td>
     3191     <td>Oak Ridge, Tennessee</td>
     3192</tr>
     3193
     3194<tr>
     3195     <td>Publisher</td>
     3196     <td>ACM</td>
     3197</tr>
     3198
     3199<tr>
     3200     <td>Address</td>
     3201     <td>New York, NY, USA</td>
     3202</tr>
     3203
     3204<tr>
     3205     <td>Year</td>
     3206     <td>2011</td>
     3207</tr>
     3208
     3209<tr>
     3210     <td>Abstract</td>
     3211     <td>Computers and Internet have evolved into necessary tools for our professional, personal and social lives. As a result of this growing dependence, there is a concern that these systems remain protected and available. This concern increases exponentially when considering systems such as smart power grids. Therefore, research should be conducted to develop effective ways of detecting system anomalies. To have realistic results, the studies should be tested on real systems. However, it is not possible to test these experiments on the live network. With the recent collaboration of Universities and research labs, a new experiment test bed has been established. As a result, experiments can now be implemented on real networks. In our study, we design an experiment to analyze Distributed Denial of Service Attacks (DDoS Attack) on a real network with real Internet traffic. The approach that we use in our study can easily be generalized to apply to smart power grids.</td>
     3212</tr>
     3213
     3214
     3215
     3216<tr>
     3217     <td>DOI</td>
     3218     <td>10.1145/2179298.2179388</td>
     3219</tr>
     3220
     3221
     3222
     3223<tr>
     3224     <td>URL</td>
     3225     <td><a href="http://dx.doi.org/10.1145/2179298.2179388">http://dx.doi.org/10.1145/2179298.2179388</a></td>
     3226</tr>
     3227
     3228
     3229</table></div><br><br>
     3230
     3231
     3232<div class="BibEntry">
     3233
     3234<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3235<tr class="TagRow">
     3236<!--
     3237        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3238        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3239-->
     3240</tr>
     3241
     3242
     3243<tr>
     3244     <td>Author</td>
     3245     <td>Ozcelik, Ilker and Brooks, Richard R.</td>
     3246</tr>
     3247
     3248<tr>
     3249     <td>Title</td>
     3250     <td>Performance Analysis of DDoS Detection Methods on Real Network</td>
     3251</tr>
     3252
     3253<tr>
     3254     <td>Booktitle</td>
     3255     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     3256</tr>
     3257
     3258<tr>
     3259     <td>Location</td>
     3260     <td>Los Angeles</td>
     3261</tr>
     3262
     3263<tr>
     3264     <td>Year</td>
     3265     <td>2012</td>
     3266</tr>
     3267
     3268<tr>
     3269     <td>Abstract</td>
     3270     <td>Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic.</td>
     3271</tr>
     3272
     3273
     3274
     3275
     3276
     3277
     3278</table></div><br><br>
     3279
     3280
     3281
     3282
     3283<a class="EntryGoto" id="Paul, Subharthi and Pan, Jianli and Jain, Raj"></a>
     3284<b class="myheading" style="position: relative; left: 10%;">Paul, Subharthi and Pan, Jianli and Jain, Raj</b>
     3285
     3286<div class="BibEntry">
     3287
     3288<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3289<tr class="TagRow">
     3290<!--
     3291        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3292        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3293-->
     3294</tr>
     3295
     3296
     3297<tr>
     3298     <td>Author</td>
     3299     <td>Paul, Subharthi and Pan, Jianli and Jain, Raj</td>
     3300</tr>
     3301
     3302<tr>
     3303     <td>Title</td>
     3304     <td>Architectures for the future networks and the next generation Internet: A survey</td>
     3305</tr>
     3306
     3307<tr>
     3308     <td>Journal</td>
     3309     <td>Computer Communications</td>
     3310</tr>
     3311
     3312<tr>
     3313     <td>Publisher</td>
     3314     <td>Elsevier Science Publishers B. V.</td>
     3315</tr>
     3316
     3317<tr>
     3318     <td>Address</td>
     3319     <td>Amsterdam, The Netherlands, The Netherlands</td>
     3320</tr>
     3321
     3322<tr>
     3323     <td>Year</td>
     3324     <td>2011</td>
     3325</tr>
     3326
     3327<tr>
     3328     <td>Abstract</td>
     3329     <td>Networking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet. We present a comprehensive survey of such research projects and activities. The topics covered include various testbeds for experimentations for new architectures, new security mechanisms, content delivery mechanisms, management and control frameworks, service architectures, and routing mechanisms. Delay/disruption tolerant networks which allow communications even when complete end-to-end path is not available are also discussed.</td>
     3330</tr>
     3331
     3332
     3333
     3334<tr>
     3335     <td>DOI</td>
     3336     <td>10.1016/j.comcom.2010.08.001</td>
     3337</tr>
     3338
     3339
     3340
     3341<tr>
     3342     <td>URL</td>
     3343     <td><a href="http://dx.doi.org/10.1016/j.comcom.2010.08.001">http://dx.doi.org/10.1016/j.comcom.2010.08.001</a></td>
     3344</tr>
     3345
     3346
     3347</table></div><br><br>
     3348
     3349
     3350
     3351
     3352<a class="EntryGoto" id="Qin, Z. and Xiong, X. and Chuah, M."></a>
     3353<b class="myheading" style="position: relative; left: 10%;">Qin, Z. and Xiong, X. and Chuah, M.</b>
     3354
     3355<div class="BibEntry">
     3356
     3357<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3358<tr class="TagRow">
     3359<!--
     3360        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3361        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3362-->
     3363</tr>
     3364
     3365
     3366<tr>
     3367     <td>Author</td>
     3368     <td>Qin, Z. and Xiong, X. and Chuah, M.</td>
     3369</tr>
     3370
     3371<tr>
     3372     <td>Title</td>
     3373     <td>Lehigh Explorer: Android Application Utilizing Content Centric Features</td>
     3374</tr>
     3375
     3376<tr>
     3377     <td>Booktitle</td>
     3378     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     3379</tr>
     3380
     3381<tr>
     3382     <td>Location</td>
     3383     <td>Los Angeles</td>
     3384</tr>
     3385
     3386<tr>
     3387     <td>Year</td>
     3388     <td>2012</td>
     3389</tr>
     3390
     3391<tr>
     3392     <td>Abstract</td>
     3393     <td>Companies, government organizations or institutions from anywhere in the world publish different types of information e.g. news, health alerts, disaster warnings at any time. Rather than consuming all published data, users only desire access to information of interest to themselves irrespective of where the data is located and who publish them. Existing publish/subscribe systems built based on IP-based network can be inefficient and are not flexible enough to meet emerging requirements e.g. deal with mobile users, dynamic contents, searching over encrypted data. Recently content-centric networks have been proposed to provide flexibility to users to access such information. We have designed secure content centric mobile networks that allow users to publish and retrieve contents securely. As with any new architecture, one important issue is to have useful applications that can utilize features provided in the new architecture. In this paper, we describe an Android application we recently developed that allows visitors to explore Lehigh campus based on their expressed interests. Our application utilizes keyword based interest messages to retrieve matching data items of interests to a user. We are giving a demo of Lehigh Explorer at GEC13.</td>
     3394</tr>
     3395
     3396
     3397
     3398
     3399
     3400
     3401</table></div><br><br>
     3402
     3403
     3404
     3405
     3406<a class="EntryGoto" id="Quan, John and Nance, Kara and Hay, Brian"></a>
     3407<b class="myheading" style="position: relative; left: 10%;">Quan, John and Nance, Kara and Hay, Brian</b>
     3408
     3409<div class="BibEntry">
     3410
     3411<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3412<tr class="TagRow">
     3413<!--
     3414        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3415        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3416-->
     3417</tr>
     3418
     3419
     3420<tr>
     3421     <td>Author</td>
     3422     <td>Quan, John and Nance, Kara and Hay, Brian</td>
     3423</tr>
     3424
     3425<tr>
     3426     <td>Title</td>
     3427     <td>A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments</td>
     3428</tr>
     3429
     3430<tr>
     3431     <td>Journal</td>
     3432     <td>IT Professional</td>
     3433</tr>
     3434
     3435<tr>
     3436     <td>Year</td>
     3437     <td>2011</td>
     3438</tr>
     3439
     3440<tr>
     3441     <td>Abstract</td>
     3442     <td>Applying a mutualistic security service model to large-scale virtualized environments that rely on contributed hardware lets researchers improve security in exchange for resources. The authors discuss this model in the context of the Global Environment for Network Innovation (GENI) project.</td>
     3443</tr>
     3444
     3445
     3446
     3447<tr>
     3448     <td>DOI</td>
     3449     <td>10.1109/MITP.2011.36</td>
     3450</tr>
     3451
     3452
     3453
     3454<tr>
     3455     <td>URL</td>
     3456     <td><a href="http://dx.doi.org/10.1109/MITP.2011.36">http://dx.doi.org/10.1109/MITP.2011.36</a></td>
     3457</tr>
     3458
     3459
     3460</table></div><br><br>
     3461
     3462
     3463
     3464
     3465<a class="EntryGoto" id="Rohrer, Justin P. and &#x43;&#x0327;etinkaya, Egemen K. and Sterbenz, James P. G."></a>
     3466<b class="myheading" style="position: relative; left: 10%;">Rohrer, Justin P. and &#x43;&#x0327;etinkaya, Egemen K. and Sterbenz, James P. G.</b>
     3467
     3468<div class="BibEntry">
     3469
     3470<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3471<tr class="TagRow">
     3472<!--
     3473        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3474        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3475-->
     3476</tr>
     3477
     3478
     3479<tr>
     3480     <td>Author</td>
     3481     <td>Rohrer, Justin P. and &#x43;&#x0327;etinkaya, Egemen K. and Sterbenz, James P. G.</td>
     3482</tr>
     3483
     3484<tr>
     3485     <td>Title</td>
     3486     <td>Progress and challenges in large-scale future internet experimentation using the GpENI programmable testbed</td>
     3487</tr>
     3488
     3489<tr>
     3490     <td>Booktitle</td>
     3491     <td>Proceedings of the 6th International Conference on Future Internet Technologies</td>
     3492</tr>
     3493
     3494<tr>
     3495     <td>Location</td>
     3496     <td>Seoul, Republic of Korea</td>
     3497</tr>
     3498
     3499<tr>
     3500     <td>Publisher</td>
     3501     <td>ACM</td>
     3502</tr>
     3503
     3504<tr>
     3505     <td>Address</td>
     3506     <td>New York, NY, USA</td>
     3507</tr>
     3508
     3509<tr>
     3510     <td>Year</td>
     3511     <td>2011</td>
     3512</tr>
     3513
     3514<tr>
     3515     <td>Abstract</td>
     3516     <td>GpENI is evolving to provide a promising environment in which to do experimental research in the resilience and survivability of future networks, by allowing programmable control over topology and mechanism, while providing the scale and global reach needed to conduct network experiments far beyond the capabilities of a conventional testbed. Addressing this need at scale introduces a number of challenges both in deployment and in collecting results that can be directly compared to simulation results for cross-verification purposes. In this short paper we present the scope, design goals, challenges, and current status of the GpENI programmable testbed, as well as an overview and examples of the types of experiments we are beginning to run.</td>
     3517</tr>
     3518
     3519
     3520
     3521<tr>
     3522     <td>DOI</td>
     3523     <td>10.1145/2002396.2002409</td>
     3524</tr>
     3525
     3526
     3527
     3528<tr>
     3529     <td>URL</td>
     3530     <td><a href="http://dx.doi.org/10.1145/2002396.2002409">http://dx.doi.org/10.1145/2002396.2002409</a></td>
     3531</tr>
     3532
     3533
     3534</table></div><br><br>
     3535
     3536
     3537
     3538
     3539<a class="EntryGoto" id="Rosen, Aaron and Wang, Kuang-Ching"></a>
     3540<b class="myheading" style="position: relative; left: 10%;">Rosen, Aaron and Wang, Kuang-Ching</b>
     3541
     3542<div class="BibEntry">
     3543
     3544<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3545<tr class="TagRow">
     3546<!--
     3547        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3548        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3549-->
     3550</tr>
     3551
     3552
     3553<tr>
     3554     <td>Author</td>
     3555     <td>Rosen, Aaron and Wang, Kuang-Ching</td>
     3556</tr>
     3557
     3558<tr>
     3559     <td>Title</td>
     3560     <td>Steroid OpenFlow Service: Seamless Network Service Delivery in Software Defined Networks</td>
     3561</tr>
     3562
     3563<tr>
     3564     <td>Booktitle</td>
     3565     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     3566</tr>
     3567
     3568<tr>
     3569     <td>Location</td>
     3570     <td>Los Angeles</td>
     3571</tr>
     3572
     3573<tr>
     3574     <td>Year</td>
     3575     <td>2012</td>
     3576</tr>
     3577
     3578<tr>
     3579     <td>Abstract</td>
     3580     <td>In a software defined network (SDN), packet forwarding is controlled by software controllers. In an OpenFlow SDN, a controller can control the forwarding, rewriting, and dropping of packets based on their header attributes. The ability to handle packets in customizable ways in software has significant implications for both network users and operators. Via software, users can convey application specific expectations while operators can deliver application specific services to enhance user experiences. In this paper, we present the Steroid OpenFlow Services (SOS) paradigm for network services delivery. The paradigm enables operators to deliver network services without any setup requirements on user machines. SOS utilizes OpenFlow to redirect application specific traffic to application specific service agents; SOS also rewrites packet headers for a service to remain seamless to users. This paper presents an example SOS service for optimizing large volume TCP download across a large delay-bandwidth-product wide area network. SOS service agents on both ends of the connection seamlessly terminate a user TCP connection, launch a set of parallel TCP connections, and leverage multiple paths when available to maximize throughput. With the NSF GENI future Internet testbed, a prototype implementation achieved up to 320 times throughput enhancement seamless to the end users.</td>
     3581</tr>
     3582
     3583
     3584
     3585
     3586
     3587
     3588</table></div><br><br>
     3589
     3590
     3591
     3592
     3593<a class="EntryGoto" id="Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar"></a>
     3594<b class="myheading" style="position: relative; left: 10%;">Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar</b>
     3595
     3596<div class="BibEntry">
     3597
     3598<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3599<tr class="TagRow">
     3600<!--
     3601        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3602        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3603-->
     3604</tr>
     3605
     3606
     3607<tr>
     3608     <td>Author</td>
     3609     <td>Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar</td>
     3610</tr>
     3611
     3612<tr>
     3613     <td>Title</td>
     3614     <td>MobilityFirst future internet architecture project</td>
     3615</tr>
     3616
     3617<tr>
     3618     <td>Booktitle</td>
     3619     <td>Proceedings of the 7th Asian Internet Engineering Conference</td>
     3620</tr>
     3621
     3622<tr>
     3623     <td>Location</td>
     3624     <td>Bangkok, Thailand</td>
     3625</tr>
     3626
     3627<tr>
     3628     <td>Publisher</td>
     3629     <td>ACM</td>
     3630</tr>
     3631
     3632<tr>
     3633     <td>Address</td>
     3634     <td>New York, NY, USA</td>
     3635</tr>
     3636
     3637<tr>
     3638     <td>Year</td>
     3639     <td>2011</td>
     3640</tr>
     3641
     3642<tr>
     3643     <td>Abstract</td>
     3644     <td>This short paper presents an overview of the MobilityFirst network architecture, which is a clean-slate project being conducted as part of the NSF Future Internet Architecture (FIA) program. The proposed architecture is intended to directly address the challenges of wireless access and mobility at scale, while also providing new multicast, anycast, multi-path and context-aware services needed for emerging mobile Internet application scenarios. Key protocol components of the proposed architecture are: (a) separation of naming from addressing; (b) public key based self-certifying names (called globally unique identifiers or GUIDs) for network-attached objects; (c) global name resolution service (GNRS) for dynamic name-to-address binding; (d) delay-tolerant and storage-aware routing (GSTAR) capable of dealing with wireless link quality fluctuations and disconnections; (e) hop-by-hop transport of large protocol data units; and (f) location or context-aware services. The basic operations of a MobilityFirst router are outlined. This is followed by a discussion of ongoing proof-of-concept prototyping and experimental evaluation efforts for the MobilityFirst protocol stack. In conclusion, a brief description of an ongoing multi-site experimental deployment of the MobilityFirst protocol stack on the GENI testbed is provided.</td>
     3645</tr>
     3646
     3647
     3648
     3649<tr>
     3650     <td>DOI</td>
     3651     <td>10.1145/2089016.2089017</td>
     3652</tr>
     3653
     3654
     3655
     3656<tr>
     3657     <td>URL</td>
     3658     <td><a href="http://dx.doi.org/10.1145/2089016.2089017">http://dx.doi.org/10.1145/2089016.2089017</a></td>
     3659</tr>
     3660
     3661
     3662</table></div><br><br>
     3663
     3664
     3665
     3666
     3667<a class="EntryGoto" id="Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant"></a>
     3668<b class="myheading" style="position: relative; left: 10%;">Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant</b>
     3669
     3670<div class="BibEntry">
     3671
     3672<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3673<tr class="TagRow">
     3674<!--
     3675        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3676        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3677-->
     3678</tr>
     3679
     3680
     3681<tr>
     3682     <td>Author</td>
     3683     <td>Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant</td>
     3684</tr>
     3685
     3686<tr>
     3687     <td>Title</td>
     3688     <td>Cloudy Computing: Leveraging Weather Forecasts in Energy Harvesting Sensor Systems</td>
     3689</tr>
     3690
     3691<tr>
     3692     <td>Booktitle</td>
     3693     <td>2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)</td>
     3694</tr>
     3695
     3696<tr>
     3697     <td>Location</td>
     3698     <td>Boston, MA, USA</td>
     3699</tr>
     3700
     3701<tr>
     3702     <td>Publisher</td>
     3703     <td>IEEE</td>
     3704</tr>
     3705
     3706<tr>
     3707     <td>Year</td>
     3708     <td>2010</td>
     3709</tr>
     3710
     3711<tr>
     3712     <td>Abstract</td>
     3713     <td>To sustain perpetual operation, systems that harvest environmental energy must carefully regulate their usage to satisfy their demand. Regulating energy usage is challenging if a system's demands are not elastic and its hardware components are not energy-proportional, since it cannot precisely scale its usage to match its supply. Instead, the system must choose when to satisfy its energy demands based on its current energy reserves and predictions of its future energy supply. In this paper, we explore the use of weather forecasts to improve a system's ability to satisfy demand by improving its predictions. We analyze weather forecast, observational, and energy harvesting data to formulate a model that translates a weather forecast to a wind or solar energy harvesting prediction, and quantify its accuracy. We evaluate our model for both energy sources in the context of two different energy harvesting sensor systems with inelastic demands: a sensor testbed that leases sensors to external users and a lexicographically fair sensor network that maintains steady node sensing rates. We show that using weather forecasts in both wind- and solar-powered sensor systems increases each system's ability to satisfy its demands compared with existing prediction strategies.</td>
     3714</tr>
     3715
     3716
     3717
     3718<tr>
     3719     <td>DOI</td>
     3720     <td>10.1109/SECON.2010.5508260</td>
     3721</tr>
     3722
     3723
     3724
     3725<tr>
     3726     <td>URL</td>
     3727     <td><a href="http://dx.doi.org/10.1109/SECON.2010.5508260">http://dx.doi.org/10.1109/SECON.2010.5508260</a></td>
     3728</tr>
     3729
     3730
     3731</table></div><br><br>
     3732
     3733
     3734
     3735
     3736<a class="EntryGoto" id="Shen, Haiying and Liu, Guoxin"></a>
     3737<b class="myheading" style="position: relative; left: 10%;">Shen, Haiying and Liu, Guoxin</b>
     3738
     3739<div class="BibEntry">
     3740
     3741<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3742<tr class="TagRow">
     3743<!--
     3744        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3745        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3746-->
     3747</tr>
     3748
     3749
     3750<tr>
     3751     <td>Author</td>
     3752     <td>Shen, Haiying and Liu, Guoxin</td>
     3753</tr>
     3754
     3755<tr>
     3756     <td>Title</td>
     3757     <td>Harmony: Integrated Resource and Reputation Management for Large-Scale Distributed Systems</td>
     3758</tr>
     3759
     3760<tr>
     3761     <td>Booktitle</td>
     3762     <td>2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)</td>
     3763</tr>
     3764
     3765<tr>
     3766     <td>Location</td>
     3767     <td>Lahaina, HI, USA</td>
     3768</tr>
     3769
     3770<tr>
     3771     <td>Publisher</td>
     3772     <td>IEEE</td>
     3773</tr>
     3774
     3775<tr>
     3776     <td>Year</td>
     3777     <td>2011</td>
     3778</tr>
     3779
     3780<tr>
     3781     <td>Abstract</td>
     3782     <td>Advancements in technology over the past decade are leading to a promising future for large-scale distributed systems, where globally-scattered distributed resources are collectively pooled and used in a cooperative manner to achieve unprecedented petascale supercomputing capabilities. The issues of resource management (resMgt) and reputation management (repMgt) need to be addressed in order to ensure the successful deployment of large-scale distributed systems. However, these two issues have typically been addressed separately, despite the significant interdependencies between them: resMgt needs repMgt to provide a cooperative environment for resource sharing, and in turn facilitates repMgt to evaluate multi-faceted node reputations for providing different resources. Current repMgt methods provide a single reputation value for each node in providing all types of resources. However, a node willing to provide one resource may not be willing to provide another resource. In addition, current repMgt methods often guide node selection policy to select the highest-reputed nodes, which may overload these nodes. Also, few works exploited node reputation in resource selection in order to fully and fairly utilize resources in the system and to meet users' diverse QoS demands. We propose a system called Harmony that integrates resMgt and repMgt in a harmonious manner. Harmony incorporates two key innovations: integrated multi-faceted resource/reputation management and multi-QoS-oriented resource selection. The trace data we collected from an online trading platform confirms the importance of multi-faceted reputation and potential problems with highest-reputed node selection. Trace-driven experiments performed on PlanetLab show that Harmony outperforms existing resMgt and repMgt in terms of the success rate, service delay, and efficiency.</td>
     3783</tr>
     3784
     3785
     3786
     3787<tr>
     3788     <td>DOI</td>
     3789     <td>10.1109/ICCCN.2011.6005739</td>
     3790</tr>
     3791
     3792
     3793
     3794<tr>
     3795     <td>URL</td>
     3796     <td><a href="http://dx.doi.org/10.1109/ICCCN.2011.6005739">http://dx.doi.org/10.1109/ICCCN.2011.6005739</a></td>
     3797</tr>
     3798
     3799
     3800</table></div><br><br>
     3801
     3802
     3803
     3804
     3805<a class="EntryGoto" id="Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young"></a>
     3806<b class="myheading" style="position: relative; left: 10%;">Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young</b>
     3807
     3808<div class="BibEntry">
     3809
     3810<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3811<tr class="TagRow">
     3812<!--
     3813        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3814        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3815-->
     3816</tr>
     3817
     3818
     3819<tr>
     3820     <td>Author</td>
     3821     <td>Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young</td>
     3822</tr>
     3823
     3824<tr>
     3825     <td>Title</td>
     3826     <td>Understanding the Performance of TCP and UDP-based Data Transfer Protocols using EMULAB</td>
     3827</tr>
     3828
     3829<tr>
     3830     <td>Booktitle</td>
     3831     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     3832</tr>
     3833
     3834<tr>
     3835     <td>Location</td>
     3836     <td>Los Angeles</td>
     3837</tr>
     3838
     3839<tr>
     3840     <td>Year</td>
     3841     <td>2012</td>
     3842</tr>
     3843
     3844<tr>
     3845     <td>Abstract</td>
     3846     <td>In this paper, we present a hands-on course project that explores the performance of data transfer protocols using a GENI resource. TCP is one of the key topics in networking courses, and understanding its behavior as well as limitations, from real experiments, offers an invaluable and deep learning experience. A protocol's performance is directly impacted by network parameters such as network bandwidth, delay and loss. However, it is difficult to control and even vary those parameters, if it is not evaluated with simulations. GENI facilities conveniently provide a virtual laboratory that enables us to control the network settings with real network systems. Through this educational project, students had an opportunity to control important network parameters, and measure and compare TCP's performance with a UDP-based data transfer protocol, UDT, using EMULAB. Students were enthusiastic to witness the protocols' performances, and the limitations of TCP under a high bandwidth delay product network in the presence of packet loss, and to recognize the importance of protocol design and system issues for the future Internet.</td>
     3847</tr>
     3848
     3849
     3850
     3851
     3852
     3853
     3854</table></div><br><br>
     3855
     3856
     3857
     3858
     3859<a class="EntryGoto" id="Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay"></a>
     3860<b class="myheading" style="position: relative; left: 10%;">Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay</b>
     3861
     3862<div class="BibEntry">
     3863
     3864<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3865<tr class="TagRow">
     3866<!--
     3867        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3868        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3869-->
     3870</tr>
     3871
     3872
     3873<tr>
     3874     <td>Author</td>
     3875     <td>Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay</td>
     3876</tr>
     3877
     3878<tr>
     3879     <td>Title</td>
     3880     <td>Closer to the Cloud - A Case for Emulating Cloud Dynamics by Controlling the Environment</td>
     3881</tr>
     3882
     3883<tr>
     3884     <td>Booktitle</td>
     3885     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     3886</tr>
     3887
     3888<tr>
     3889     <td>Location</td>
     3890     <td>Los Angeles</td>
     3891</tr>
     3892
     3893<tr>
     3894     <td>Year</td>
     3895     <td>2012</td>
     3896</tr>
     3897
     3898
     3899
     3900
     3901
     3902
     3903</table></div><br><br>
     3904
     3905
     3906
     3907
     3908<a class="EntryGoto" id="Soroush, Hamed and Banerjee, Nilanjan and Corner, Mark and Levine, Brian and Lynn, Brian"></a>
     3909<b class="myheading" style="position: relative; left: 10%;">Soroush, Hamed and Banerjee, Nilanjan and Corner, Mark and Levine, Brian and Lynn, Brian</b>
     3910
     3911<div class="BibEntry">
     3912
     3913<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3914<tr class="TagRow">
     3915<!--
     3916        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3917        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3918-->
     3919</tr>
     3920
     3921
     3922<tr>
     3923     <td>Author</td>
     3924     <td>Soroush, Hamed and Banerjee, Nilanjan and Corner, Mark and Levine, Brian and Lynn, Brian</td>
     3925</tr>
     3926
     3927<tr>
     3928     <td>Title</td>
     3929     <td>A retrospective look at the UMass DOME mobile testbed</td>
     3930</tr>
     3931
     3932<tr>
     3933     <td>Journal</td>
     3934     <td>SIGMOBILE Mob. Comput. Commun. Rev.</td>
     3935</tr>
     3936
     3937<tr>
     3938     <td>Publisher</td>
     3939     <td>ACM</td>
     3940</tr>
     3941
     3942<tr>
     3943     <td>Address</td>
     3944     <td>New York, NY, USA</td>
     3945</tr>
     3946
     3947<tr>
     3948     <td>Year</td>
     3949     <td>2012</td>
     3950</tr>
     3951
     3952<tr>
     3953     <td>Abstract</td>
     3954     <td>In this paper we describe the evolution of DOME, a diverse outdoor testbed for mobile experimentation. In addition, while highlighting the challenges faced in construction of DOME, we describe a concrete set of scientific results derived from this experience in a retrospective study. First, we argue that a broad range of mobility experiments could be performed in a testbed which provides the properties of temporal, technological, and spatial diversity. We demonstrate these properties in our testbed through analysis of data collected from DOME over a period of four years. Second, we crystallize a set of design principles that others should use when constructing testbeds of their own, including those related to deploying and managing a diverse testbed, distributing experiments remotely, and fostering collaborations among testbed stakeholders. Finally, using traces collected by DOME, we provide insights into several important problems in mobile systems research.</td>
     3955</tr>
     3956
     3957
     3958
     3959<tr>
     3960     <td>DOI</td>
     3961     <td>10.1145/2169077.2169079</td>
     3962</tr>
     3963
     3964
     3965
     3966<tr>
     3967     <td>URL</td>
     3968     <td><a href="http://dx.doi.org/10.1145/2169077.2169079">http://dx.doi.org/10.1145/2169077.2169079</a></td>
     3969</tr>
     3970
     3971
     3972</table></div><br><br>
     3973
     3974
     3975
     3976
     3977<a class="EntryGoto" id="Sridharan, Mukundan and Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex"></a>
     3978<b class="myheading" style="position: relative; left: 10%;">Sridharan, Mukundan and Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex</b>
     3979
     3980<div class="BibEntry">
     3981
     3982<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     3983<tr class="TagRow">
     3984<!--
     3985        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     3986        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     3987-->
     3988</tr>
     3989
     3990
     3991<tr>
     3992     <td>Author</td>
     3993     <td>Sridharan, Mukundan and Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex</td>
     3994</tr>
     3995
     3996<tr>
     3997     <td>Title</td>
     3998     <td>Defragmentation of Resources in Virtual Desktop Clouds for Cost-Aware Utility-Optimal Allocation</td>
     3999</tr>
     4000
     4001<tr>
     4002     <td>Booktitle</td>
     4003     <td>2011 Fourth IEEE International Conference on Utility and Cloud Computing</td>
     4004</tr>
     4005
     4006<tr>
     4007     <td>Location</td>
     4008     <td>Melbourne, Australia</td>
     4009</tr>
     4010
     4011<tr>
     4012     <td>Publisher</td>
     4013     <td>IEEE</td>
     4014</tr>
     4015
     4016<tr>
     4017     <td>Year</td>
     4018     <td>2011</td>
     4019</tr>
     4020
     4021<tr>
     4022     <td>Abstract</td>
     4023     <td>Cloud Service Providers (CSPs) make virtual desktop cloud (VDC) resource provisioning decisions within desktop pools based on user groups and their application profiles. Such provisioning is aimed to satisfy acceptable user quality of experience (QoE) levels and is coupled with subsequent placement of VDs across distributed data centers. The placement decisions are influenced by session latency, load balancing and operation cost constraints. In this paper, we identify the resource fragmentation problem that occurs when placement is done opportunistically to minimize provisioning time and deliver satisfactory user QoE. To solve this problem, which inherently is an NP-Hard problem, we propose a defragmentation scheme that has fast convergence time and has three levels of complexity: (i) &#x75;&#x0308;tility fair provisioning&#x20;&#x0308;(UFP) to optimize resource provisioning within a data center - to achieve relative fairness between desktop pools, (ii) &#x73;&#x0308;tatic migration-free utility optimal placement and provisioning&#x20;&#x0308;(MUPP) to optimize resource provisioning between multiple data centers - to improve performance, and (iii) &#x64;&#x0308;ynamic global utility optimal placement and provisioning&#x20;&#x0308;(GUPP) to optimize resource provisioning using cost-aware and utility-maximal VD re-allocations and migrations - to increase scalability. We evaluate our defragmentation scheme against 'least latency', 'least load', and 'least cost' schemes using a novel &#x56;&#x0308;DC-Sim&#x20;&#x0308;simulator that we have developed in this study. Our simulations leverage profiles of user groups and their applications within desktop pools, obtained from a real VDC test bed. Our simulation results demonstrate that defragmentation is an important optimization step that can enable CSPs to achieve fairness, substantially improve user QoE and increase VDC scalability.</td>
     4024</tr>
     4025
     4026
     4027
     4028<tr>
     4029     <td>DOI</td>
     4030     <td>10.1109/UCC.2011.41</td>
     4031</tr>
     4032
     4033
     4034
     4035<tr>
     4036     <td>URL</td>
     4037     <td><a href="http://dx.doi.org/10.1109/UCC.2011.41">http://dx.doi.org/10.1109/UCC.2011.41</a></td>
     4038</tr>
     4039
     4040
     4041</table></div><br><br>
     4042
     4043
     4044
     4045
     4046<a class="EntryGoto" id="Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish"></a>
     4047<b class="myheading" style="position: relative; left: 10%;">Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish</b>
     4048
     4049<div class="BibEntry">
     4050
     4051<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     4052<tr class="TagRow">
     4053<!--
     4054        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     4055        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     4056-->
     4057</tr>
     4058
     4059
     4060<tr>
     4061     <td>Author</td>
     4062     <td>Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish</td>
     4063</tr>
     4064
     4065<tr>
     4066     <td>Title</td>
     4067     <td>From Kansei to KanseiGenie: Architecture of Federated, Programmable Wireless Sensor Fabrics</td>
     4068</tr>
     4069
     4070<tr>
     4071     <td>Journal</td>
     4072     <td>Proceedings of the ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)</td>
     4073</tr>
     4074
     4075<tr>
     4076     <td>Year</td>
     4077     <td>2010</td>
     4078</tr>
     4079
     4080<tr>
     4081     <td>Abstract</td>
     4082     <td>This paper deals with challenges in federating wireless sensing fabrics. Federations of this sort are currently being developed in next generation global end-to-end experimentation infrastructures, such as GENI, to support rapid prototyping and hi-fidelity validation of protocols and applications. On one hand, federation should support access to diverse (and potentially provider-specific) wireless sensor resources and, on the other, it should enable users to uniformly task these resources. Instead of more simple basing federation upon a standard description of resources, we propose an architecture where the ontology of resource description can vary across providers, and a mapping of user needs to resources is performed to achieve uniform tasking. We illustrate one realization of this architecture, in terms of our refactoring the Kansei testbed to become the KanseiGenie federated fabric manager, which has full support for programmability, sliceability, and federated experimentation over heterogeneous sensing fabrics.</td>
     4083</tr>
     4084
     4085
     4086
     4087
     4088
     4089
     4090</table></div><br><br>
     4091
     4092
     4093
     4094
     4095<a class="EntryGoto" id="Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching"></a>
     4096<b class="myheading" style="position: relative; left: 10%;">Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching</b>
     4097
     4098<div class="BibEntry">
     4099
     4100<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     4101<tr class="TagRow">
     4102<!--
     4103        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     4104        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     4105-->
     4106</tr>
     4107
     4108
     4109<tr>
     4110     <td>Author</td>
     4111     <td>Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching</td>
     4112</tr>
     4113
     4114<tr>
     4115     <td>Title</td>
     4116     <td>OneCloud: Controlling the Network in an OpenFlow Cloud</td>
     4117</tr>
     4118
     4119<tr>
     4120     <td>Booktitle</td>
     4121     <td>First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     4122</tr>
     4123
     4124<tr>
     4125     <td>Location</td>
     4126     <td>Los Angeles</td>
     4127</tr>
     4128
     4129<tr>
     4130     <td>Year</td>
     4131     <td>2012</td>
     4132</tr>
     4133
     4134<tr>
     4135     <td>Abstract</td>
     4136     <td>Cloud computing is an emerging paradigm for on-demand access to computing resources over the network. Beyond early Software as a Service (SaaS) offerings, there is an increasing interest in the Infrastructure as a Service (IaaS) model where users request specific storage, networking, and computing resources to meet their application needs. To provision the network in a cloud, IaaS providers, such as the Amazon Web Services, allow users to choose their IP addresses, which can be associated with a dynamic set of virtual hosts (Elastic IP) with VPN, dynamic DNS, and dynamic firewall services. In this paper, we analyze a range of cloud network provisioning needs and the means to realize them in an OpenFlow network. We present an OpenFlow enabled framework for cloud network provisioning, based on the Open- Nebula cloud provisioning engine. Specifically, we demonstrate an Elastic IP service compatible with the Amazon Elastic Compute Cloud (EC2) API. This demonstration is available on the Clemson OneCloud IaaS offering. Ongoing efforts focus on the enablement of additional cloud network services for campus networks and wide area experimental networks like the National Science Foundation's GENI network.</td>
     4137</tr>
     4138
     4139
     4140
     4141
     4142
     4143
     4144</table></div><br><br>
     4145
     4146
     4147
     4148
     4149<a class="EntryGoto" id="Sterbenz, James P. G. and &#x43;&#x0327;etinkaya, Egemen K. and Hameed, Mahmood A. and Jabbar, Abdul and Qian, Shi and Rohrer, Justin P."></a>
     4150<b class="myheading" style="position: relative; left: 10%;">Sterbenz, James P. G. and &#x43;&#x0327;etinkaya, Egemen K. and Hameed, Mahmood A. and Jabbar, Abdul and Qian, Shi and Rohrer, Justin P.</b>
     4151
     4152<div class="BibEntry">
     4153
     4154<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     4155<tr class="TagRow">
     4156<!--
     4157        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     4158        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     4159-->
     4160</tr>
     4161
     4162
     4163<tr>
     4164     <td>Author</td>
     4165     <td>Sterbenz, James P. G. and &#x43;&#x0327;etinkaya, Egemen K. and Hameed, Mahmood A. and Jabbar, Abdul and Qian, Shi and Rohrer, Justin P.</td>
     4166</tr>
     4167
     4168<tr>
     4169     <td>Title</td>
     4170     <td>Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation</td>
     4171</tr>
     4172
     4173<tr>
     4174     <td>Journal</td>
     4175     <td>Telecommunication Systems</td>
     4176</tr>
     4177
     4178<tr>
     4179     <td>Publisher</td>
     4180     <td>Springer Netherlands</td>
     4181</tr>
     4182
     4183<tr>
     4184     <td>Year</td>
     4185     <td>2011</td>
     4186</tr>
     4187
     4188<tr>
     4189     <td>Abstract</td>
     4190     <td>As the Internet becomes increasingly important to all aspects of society, the consequences of disruption become increasingly severe. Thus it is critical to increase the resilience and survivability of future networks. We define resilience as the ability of the network to provide desired service even when challenged by attacks, large-scale disasters, and other failures. This paper describes a comprehensive methodology to evaluate network resilience using a combination of topology generation, analytical, simulation, and experimental emulation techniques with the goal of improving the resilience and survivability of the Future Internet.</td>
     4191</tr>
     4192
     4193
     4194
     4195<tr>
     4196     <td>DOI</td>
     4197     <td>10.1007/s11235-011-9573-6</td>
     4198</tr>
     4199
     4200
     4201
     4202<tr>
     4203     <td>URL</td>
     4204     <td><a href="http://dx.doi.org/10.1007/s11235-011-9573-6">http://dx.doi.org/10.1007/s11235-011-9573-6</a></td>
     4205</tr>
     4206
     4207
     4208</table></div><br><br>
     4209
     4210
     4211
     4212
     4213<a class="EntryGoto" id="Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark"></a>
     4214<b class="myheading" style="position: relative; left: 10%;">Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark</b>
     4215
     4216<div class="BibEntry">
     4217
     4218<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     4219<tr class="TagRow">
     4220<!--
     4221        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     4222        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     4223-->
     4224</tr>
     4225
     4226
     4227<tr>
     4228     <td>Author</td>
     4229     <td>Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark</td>
     4230</tr>
     4231
     4232<tr>
     4233     <td>Title</td>
     4234     <td>A Passive Measurement System for Network Testbeds</td>
     4235</tr>
     4236
     4237<tr>
     4238     <td>Booktitle</td>
     4239     <td>8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2012)</td>
     4240</tr>
     4241
     4242<tr>
     4243     <td>Year</td>
     4244     <td>2012</td>
     4245</tr>
     4246
     4247<tr>
     4248     <td>Abstract</td>
     4249     <td>The ability to capture and process packet-level data is of intrinsic importance in network testbeds that offer broad experimental capabilities to researchers. In this paper we describe the design and implementation of a passive measurement system for network testbeds called GIMS. The system enables users to specify and centrally manage packet capture on a set of dedicated measurement nodes deployed on links in a distributed testbed. The first component of GIMS is a scalable experiment management system that coordinates multi-tenant access to measurement nodes through a web-based user interface. The second component of GIMS is a node management system that enables \\\\em (i) local processing on packets (\\\\em e.g., flow aggregation and sampling), \\\\em (ii) meta-data to be added to captured packets (\\\\em e.g., timestamps), \\\\em (iii) packet anonymization per local security policy, and \\\\em (iv) flexible data storage including transfer to remote archives. We demonstrate the capabilities of GIMS through a set of micro-benchmarks that specifically highlight the performance of the node management system deployed on a commodity workstation. Our implementations are openly available to the community and our development efforts are on-going.</td>
     4250</tr>
     4251
     4252
     4253
     4254
     4255
     4256
     4257</table></div><br><br>
     4258
     4259
     4260
     4261
     4262<a class="EntryGoto" id="Tiako, Pierre F."></a>
     4263<b class="myheading" style="position: relative; left: 10%;">Tiako, Pierre F.</b>
     4264
     4265<div class="BibEntry">
     4266
     4267<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     4268<tr class="TagRow">
     4269<!--
     4270        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     4271        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     4272-->
     4273</tr>
     4274
     4275
     4276<tr>
     4277     <td>Author</td>
     4278     <td>Tiako, Pierre F.</td>
     4279</tr>
     4280
     4281<tr>
     4282     <td>Title</td>
     4283     <td>Perspectives of delegation in team-based distributed software development over the GENI infrastructure (NIER track)</td>
     4284</tr>
     4285
     4286<tr>
     4287     <td>Booktitle</td>
     4288     <td>Proceedings of the 33rd International Conference on Software Engineering</td>
     4289</tr>
     4290
     4291<tr>
     4292     <td>Location</td>
     4293     <td>Waikiki, Honolulu, HI, USA</td>
     4294</tr>
     4295
     4296<tr>
     4297     <td>Publisher</td>
     4298     <td>ACM</td>
     4299</tr>
     4300
     4301<tr>
     4302     <td>Address</td>
     4303     <td>New York, NY, USA</td>
     4304</tr>
     4305
     4306<tr>
     4307     <td>Year</td>
     4308     <td>2011</td>
     4309</tr>
     4310
     4311<tr>
     4312     <td>Abstract</td>
     4313     <td>Team-based distributed software development (TBDSD) is one of the single biggest challenges facing software companies. The need to manage development efforts and resources in different locations increase the complexity and cost of modern day software development. Current software development environments do not provide suitable support to delegate task among teams with appropriate directives. TBDSD is also limited to the current internet capabilities. One of the resulting problems is the difficulty to delegate and control tasks assigned among remote teams. This paper proposes (1) a new framework for delegation in TBDSD, and (2) perspectives for deploying Process-centered Software Engineering Environments (PSEE) over the Global Environment for Network Innovations (GENI) infrastructure. GENI, the 'future Internet' that is taking shape in prototypes across the US, will allow, in the context of our study, to securely access and share software artifacts, resources, and tools as never before seen over the current Internet.</td>
     4314</tr>
     4315
     4316
     4317
     4318<tr>
     4319     <td>DOI</td>
     4320     <td>10.1145/1985793.1985905</td>
     4321</tr>
     4322
     4323
     4324
     4325<tr>
     4326     <td>URL</td>
     4327     <td><a href="http://dx.doi.org/10.1145/1985793.1985905">http://dx.doi.org/10.1145/1985793.1985905</a></td>
     4328</tr>
     4329
     4330
     4331</table></div><br><br>
     4332
     4333
     4334
     4335
     4336<a class="EntryGoto" id="Turner, Jonathan S."></a>
     4337<b class="myheading" style="position: relative; left: 10%;">Turner, Jonathan S.</b>
     4338
     4339<div class="BibEntry">
     4340
     4341<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     4342<tr class="TagRow">
     4343<!--
     4344        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     4345        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     4346-->
     4347</tr>
     4348
     4349
     4350<tr>
     4351     <td>Author</td>
     4352     <td>Turner, Jonathan S.</td>
     4353</tr>
     4354
     4355<tr>
     4356     <td>Title</td>
     4357     <td>A proposed architecture for the GENI backbone platform</td>
     4358</tr>
     4359
     4360<tr>
     4361     <td>Booktitle</td>
     4362     <td>Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems</td>
     4363</tr>
     4364
     4365<tr>
     4366     <td>Location</td>
     4367     <td>San Jose, California, USA</td>
     4368</tr>
     4369
     4370<tr>
     4371     <td>Publisher</td>
     4372     <td>ACM</td>
     4373</tr>
     4374
     4375<tr>
     4376     <td>Address</td>
     4377     <td>New York, NY, USA</td>
     4378</tr>
     4379
     4380<tr>
     4381     <td>Year</td>
     4382     <td>2006</td>
     4383</tr>
     4384
     4385<tr>
     4386     <td>Abstract</td>
     4387     <td>The GENI Project (Global Environment for Network Innovation) is a major NSF-sponsored initiative that seeks to create a national research facility to enable experimental deployment of innovative new network architectures on a sufficient scale to enable realistic evaluation. One key component of the GENI system will be the GENI Backbone Platform (GBP) that provides the resources needed to allow multiple experimental networks to co-exist within the shared GENI infrastructure. This paper reviews the objectives for the GBP, the key issues that affect its design and develops a reference architecture that provides a concrete example for how the objectives can be met, using commercially available subsystems.</td>
     4388</tr>
     4389
     4390
     4391
     4392<tr>
     4393     <td>DOI</td>
     4394     <td>10.1145/1185347.1185349</td>
     4395</tr>
     4396
     4397
     4398
     4399<tr>
     4400     <td>URL</td>
     4401     <td><a href="http://dx.doi.org/10.1145/1185347.1185349">http://dx.doi.org/10.1145/1185347.1185349</a></td>
     4402</tr>
     4403
     4404
     4405</table></div><br><br>
     4406
     4407
     4408
     4409
     4410<a class="EntryGoto" id="Turner, Jonathan S. and Crowley, Patrick and DeHart, John and Freestone, Amy and Heller, Brandon and Kuhns, Fred and Kumar, Sailesh and Lockwood, John and Lu, Jing and Wilson, Michael and Wiseman, Charles and Zar, David"></a>
     4411<b class="myheading" style="position: relative; left: 10%;">Turner, Jonathan S. and Crowley, Patrick and DeHart, John and Freestone, Amy and Heller, Brandon and Kuhns, Fred and Kumar, Sailesh and Lockwood, John and Lu, Jing and Wilson, Michael and Wiseman, Charles and Zar, David</b>
     4412
     4413<div class="BibEntry">
     4414
     4415<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     4416<tr class="TagRow">
     4417<!--
     4418        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     4419        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     4420-->
     4421</tr>
     4422
     4423
     4424<tr>
     4425     <td>Author</td>
     4426     <td>Turner, Jonathan S. and Crowley, Patrick and DeHart, John and Freestone, Amy and Heller, Brandon and Kuhns, Fred and Kumar, Sailesh and Lockwood, John and Lu, Jing and Wilson, Michael and Wiseman, Charles and Zar, David</td>
     4427</tr>
     4428
     4429<tr>
     4430     <td>Title</td>
     4431     <td>Supercharging planetlab: a high performance, multi-application, overlay network platform</td>
     4432</tr>
     4433
     4434<tr>
     4435     <td>Journal</td>
     4436     <td>SIGCOMM Comput. Commun. Rev.</td>
     4437</tr>
     4438
     4439<tr>
     4440     <td>Publisher</td>
     4441     <td>ACM</td>
     4442</tr>
     4443
     4444<tr>
     4445     <td>Address</td>
     4446     <td>New York, NY, USA</td>
     4447</tr>
     4448
     4449<tr>
     4450     <td>Year</td>
     4451     <td>2007</td>
     4452</tr>
     4453
     4454<tr>
     4455     <td>Abstract</td>
     4456     <td>In recent years, overlay networks have become an important vehicle for delivering Internet applications. Overlay network nodes are typically implemented using general purpose servers or clusters. We investigate the performance benefits of more integrated architectures, combining general-purpose servers with high performance Network Processor (NP) subsystems. We focus on PlanetLab as our experimental context and report on the design and evaluation of an experimental PlanetLab platform capable of much higher levels of performance than typical system configurations. To make it easier for users to port applications, the system supports a fast path/slow path application structure that facilitates the mapping of the most performance-critical parts of an application onto an NP subsystem, while allowing the more complex control and exception-handling to be implemented within the programmer-friendly environment provided by conventional servers. We report on implementations of two sample applications, an IPv4 router, and a forwarding application for the Internet Indirection Infrastructure. We demonstrate an 80x improvement in packet processing rates and comparable reductions in latency.</td>
     4457</tr>
     4458
     4459
     4460
     4461<tr>
     4462     <td>DOI</td>
     4463     <td>10.1145/1282427.1282391</td>
     4464</tr>
     4465
     4466
     4467
     4468<tr>
     4469     <td>URL</td>
     4470     <td><a href="http://dx.doi.org/10.1145/1282427.1282391">http://dx.doi.org/10.1145/1282427.1282391</a></td>
     4471</tr>
     4472
     4473
     4474</table></div><br><br>
     4475
     4476
     4477
     4478
     4479<a class="EntryGoto" id="Valancius, Vytautas and Feamster, Nick"></a>
     4480<b class="myheading" style="position: relative; left: 10%;">Valancius, Vytautas and Feamster, Nick</b>
     4481
     4482<div class="BibEntry">
     4483
     4484<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     4485<tr class="TagRow">
     4486<!--
     4487        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     4488        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     4489-->
     4490</tr>
     4491
     4492
     4493<tr>
     4494     <td>Author</td>
     4495     <td>Valancius, Vytautas and Feamster, Nick</td>
     4496</tr>
     4497
     4498<tr>
     4499     <td>Title</td>
     4500     <td>Multiplexing BGP sessions with BGP-Mux</td>
     4501</tr>
     4502
     4503<tr>
     4504     <td>Booktitle</td>
     4505     <td>Proceedings of the 2007 ACM CoNEXT conference</td>
     4506</tr>
     4507
     4508<tr>
     4509     <td>Location</td>
     4510     <td>New York, New York</td>
     4511</tr>
     4512
     4513<tr>
     4514     <td>Publisher</td>
     4515     <td>ACM</td>
     4516</tr>
     4517
     4518<tr>
     4519     <td>Address</td>
     4520     <td>New York, NY, USA</td>
     4521</tr>
     4522
     4523<tr>
     4524     <td>Year</td>
     4525     <td>2007</td>
     4526</tr>
     4527
     4528<tr>
     4529     <td>Abstract</td>
     4530     <td>This paper describes a BGP-session multiplexer called BGP-Mux, which provides stable, on-demand access to global BGP route feeds. This gateway allows arbitrary and even transient client BGP connections to be provisioned and torn down on demand without affecting globally visible BGP sessions. BGP-Mux provides two capabilities: (1) the ability for a client network to receive multiple unfiltered routes per destination from a set of upstream ASes; and (2) the ability to provision BGP sessions without introducing global instability. Several applications could benefit from these features:</td>
     4531</tr>
     4532
     4533
     4534
     4535<tr>
     4536     <td>DOI</td>
     4537     <td>10.1145/1364654.1364707</td>
     4538</tr>
     4539
     4540
     4541
     4542<tr>
     4543     <td>URL</td>
     4544     <td><a href="http://dx.doi.org/10.1145/1364654.1364707">http://dx.doi.org/10.1145/1364654.1364707</a></td>
     4545</tr>
     4546
     4547
     4548</table></div><br><br>
     4549
     4550
     4551
     4552
     4553<a class="EntryGoto" id="Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao, Akihiro"></a>
     4554<b class="myheading" style="position: relative; left: 10%;">Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao, Akihiro</b>
     4555
     4556<div class="BibEntry">
     4557
     4558<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     4559<tr class="TagRow">
     4560<!--
     4561        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     4562        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     4563-->
     4564</tr>
     4565
     4566
     4567<tr>
     4568     <td>Author</td>
     4569     <td>Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao, Akihiro</td>
     4570</tr>
     4571
     4572<tr>
     4573     <td>Title</td>
     4574     <td>Wide-area route control for distributed services</td>
     4575</tr>
     4576
     4577<tr>
     4578     <td>Booktitle</td>
     4579     <td>Proceedings of the 2010 USENIX conference on USENIX annual technical conference</td>
     4580</tr>
     4581
     4582<tr>
     4583     <td>Location</td>
     4584     <td>Boston, MA</td>
     4585</tr>
     4586
     4587<tr>
     4588     <td>Publisher</td>
     4589     <td>USENIX Association</td>
     4590</tr>
     4591
     4592<tr>
     4593     <td>Address</td>
     4594     <td>Berkeley, CA, USA</td>
     4595</tr>
     4596
     4597<tr>
     4598     <td>Year</td>
     4599     <td>2010</td>
     4600</tr>
     4601
     4602<tr>
     4603     <td>Abstract</td>
     4604     <td>Many distributed services would benefit from control over the flow of traffic to and from their users, to offer better performance and higher reliability at a reasonable cost. Unfortunately, although today's cloud-computing platforms offer elastic computing and bandwidth resources, they do not give services control over wide-area routing. We propose replacing the data center's border router with a Transit Portal (TP) that gives each service the illusion of direct connectivity to upstream ISPs, without requiring each service to deploy hardware, acquire IP address space, or negotiate contracts with ISPs. Our TP prototype supports many layer-two connectivity mechanisms, amortizes memory and message overhead over multiple services, and protects the rest of the Internet from misconfigured and malicious applications. Our implementation extends and synthesizes open-source software components such as the Linux kernel and the Quagga routing daemon. We also implement a management plane based on the GENI control framework and couple this with our four-site TP deployment and Amazon EC2 facilities. Experiments with an anycast DNS application demonstrate the benefits the TP offers to distributed services.</td>
     4605</tr>
     4606
     4607
     4608
     4609
     4610
     4611<tr>
     4612     <td>URL</td>
     4613     <td><a href="http://portal.acm.org/citation.cfm?id=1855842">http://portal.acm.org/citation.cfm?id=1855842</a></td>
     4614</tr>
     4615
     4616
     4617</table></div><br><br>
     4618
     4619
     4620
     4621
     4622<a class="EntryGoto" id="Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick"></a>
     4623<b class="myheading" style="position: relative; left: 10%;">Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick</b>
     4624
     4625<div class="BibEntry">
     4626
     4627<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     4628<tr class="TagRow">
     4629<!--
     4630        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     4631        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     4632-->
     4633</tr>
     4634
     4635
     4636<tr>
     4637     <td>Author</td>
     4638     <td>Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick</td>
     4639</tr>
     4640
     4641<tr>
     4642     <td>Title</td>
     4643     <td>Transit portal: BGP connectivity as a service</td>
     4644</tr>
     4645
     4646<tr>
     4647     <td>Journal</td>
     4648     <td>SIGCOMM Comput. Commun. Rev.</td>
     4649</tr>
     4650
     4651<tr>
     4652     <td>Publisher</td>
     4653     <td>ACM</td>
     4654</tr>
     4655
     4656<tr>
     4657     <td>Address</td>
     4658     <td>New York, NY, USA</td>
     4659</tr>
     4660
     4661<tr>
     4662     <td>Year</td>
     4663     <td>2010</td>
     4664</tr>
     4665
     4666<tr>
     4667     <td>Abstract</td>
     4668     <td>We demonstrate Transit Portal, a system that provides on-demand BGP Internet connectivity to multiple ISPs. Transit Portal provides connectivity to any virtual network or distributed service that needs to control its inbound and outbound route control. Examples of such services include virtual networks and distributed services in cloud computing environments (e.g., Amazon's EC2) that need to control inbound and outbound traffic.</td>
     4669</tr>
     4670
     4671
     4672
     4673<tr>
     4674     <td>DOI</td>
     4675     <td>10.1145/1851182.1851265</td>
     4676</tr>
     4677
     4678
     4679
     4680<tr>
     4681     <td>URL</td>
     4682     <td><a href="http://dl.acm.org/citation.cfm?id=1851265">http://dl.acm.org/citation.cfm?id=1851265</a></td>
     4683</tr>
     4684
     4685
     4686</table></div><br><br>
     4687
     4688
     4689
     4690
     4691<a class="EntryGoto" id="Van Vorst, N. and Erazo, M. and Liu, J."></a>
     4692<b class="myheading" style="position: relative; left: 10%;">Van Vorst, N. and Erazo, M. and Liu, J.</b>
     4693
     4694<div class="BibEntry">
     4695
     4696<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     4697<tr class="TagRow">
     4698<!--
     4699        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     4700        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     4701-->
     4702</tr>
     4703
     4704
     4705<tr>
     4706     <td>Author</td>
     4707     <td>Van Vorst, N. and Erazo, M. and Liu, J.</td>
     4708</tr>
     4709
     4710<tr>
     4711     <td>Title</td>
     4712     <td>PrimoGENI for hybrid network simulation and emulation experiments in GENI</td>
     4713</tr>
     4714
     4715<tr>
     4716     <td>Journal</td>
     4717     <td>Journal of Simulation</td>
     4718</tr>
     4719
     4720<tr>
     4721     <td>Year</td>
     4722     <td>2012</td>
     4723</tr>
     4724
     4725<tr>
     4726     <td>Abstract</td>
     4727     <td>The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform—a 'virtual laboratory' for the design, implementation, and evaluation of future networks. The PrimoGENI project enables real-time network simulation by extending an existing network simulator to become part of the GENI federation to support large-scale experiments involving physical, simulated, and emulated network entities. In this paper, we describe a novel design of PrimoGENI, which aims at supporting realistic, scalable, and flexible network experiments with real-time simulation and emulation capabilities. We present a flexible emulation infrastructure that allows both remote client machines, local cluster nodes running virtual machines, and external networks to seamlessly interoperate with the simulated network running within a designated 'slice' of resources. We present the results of our preliminary validation and performance studies to demonstrate the capabilities as well as limitations of our approach.</td>
     4728</tr>
     4729
     4730
     4731
     4732<tr>
     4733     <td>DOI</td>
     4734     <td>10.1057/jos.2012.5</td>
     4735</tr>
     4736
     4737
     4738
     4739<tr>
     4740     <td>URL</td>
     4741     <td><a href="http://dx.doi.org/10.1057/jos.2012.5">http://dx.doi.org/10.1057/jos.2012.5</a></td>
     4742</tr>
     4743
     4744
     4745</table></div><br><br>
     4746
     4747
     4748
     4749
     4750<a class="EntryGoto" id="Van Vorst, N. and Li, Ting and Liu, J."></a>
     4751<b class="myheading" style="position: relative; left: 10%;">Van Vorst, N. and Li, Ting and Liu, J.</b>
     4752
     4753<div class="BibEntry">
     4754
     4755<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     4756<tr class="TagRow">
     4757<!--
     4758        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     4759        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     4760-->
     4761</tr>
     4762
     4763
     4764<tr>
     4765     <td>Author</td>
     4766     <td>Van Vorst, N. and Li, Ting and Liu, J.</td>
     4767</tr>
     4768
     4769<tr>
     4770     <td>Title</td>
     4771     <td>How Low Can You Go? Spherical Routing for Scalable Network Simulations</td>
     4772</tr>
     4773
     4774<tr>
     4775     <td>Booktitle</td>
     4776     <td>Modeling, Analysis &#x0026; Simulation of Computer and Telecommunication Systems (MASCOTS), 2011 IEEE 19th International Symposium on</td>
     4777</tr>
     4778
     4779<tr>
     4780     <td>Publisher</td>
     4781     <td>IEEE</td>
     4782</tr>
     4783
     4784<tr>
     4785     <td>Year</td>
     4786     <td>2011</td>
     4787</tr>
     4788
     4789<tr>
     4790     <td>Abstract</td>
     4791     <td>Memory consumption is a critical problem for large-scale network simulations. Particularly, the large memory footprint needed for maintaining routing tables can severely obturate scalability. We present an approach of composing large-scale network models using sharable model fragments to achieve significant reduction in the amount of memory required for storing forwarding tables in simulation. Our approach, called spherical routing, conducts static routing within spheres according to user-defined policies. Our routing scheme pre-calculates the forwarding table for each routing sphere, and allows spheres with identical sub-structures to share forwarding tables. Through extensive experiments we demonstrate that our approach can achieve several orders of magnitude in memory reduction for large-scale network models.</td>
     4792</tr>
     4793
     4794
     4795
     4796<tr>
     4797     <td>DOI</td>
     4798     <td>10.1109/MASCOTS.2011.35</td>
     4799</tr>
     4800
     4801
     4802
     4803<tr>
     4804     <td>URL</td>
     4805     <td><a href="http://dx.doi.org/10.1109/MASCOTS.2011.35">http://dx.doi.org/10.1109/MASCOTS.2011.35</a></td>
     4806</tr>
     4807
     4808
     4809</table></div><br><br>
     4810
     4811
     4812
     4813
     4814<a class="EntryGoto" id="Van Vorst, Nathanael and Erazo, Miguel and Liu, Jason"></a>
     4815<b class="myheading" style="position: relative; left: 10%;">Van Vorst, Nathanael and Erazo, Miguel and Liu, Jason</b>
     4816
     4817<div class="BibEntry">
     4818
     4819<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     4820<tr class="TagRow">
     4821<!--
     4822        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     4823        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     4824-->
     4825</tr>
     4826
     4827
     4828<tr>
     4829     <td>Author</td>
     4830     <td>Van Vorst, Nathanael and Erazo, Miguel and Liu, Jason</td>
     4831</tr>
     4832
     4833<tr>
     4834     <td>Title</td>
     4835     <td>PrimoGENI: Integrating Real-Time Network Simulation and Emulation in GENI</td>
     4836</tr>
     4837
     4838<tr>
     4839     <td>Booktitle</td>
     4840     <td>2011 IEEE Workshop on Principles of Advanced and Distributed Simulation</td>
     4841</tr>
     4842
     4843<tr>
     4844     <td>Location</td>
     4845     <td>Nice, France</td>
     4846</tr>
     4847
     4848<tr>
     4849     <td>Publisher</td>
     4850     <td>IEEE</td>
     4851</tr>
     4852
     4853<tr>
     4854     <td>Year</td>
     4855     <td>2011</td>
     4856</tr>
     4857
     4858<tr>
     4859     <td>Abstract</td>
     4860     <td>The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform -- a &#x76;&#x0308;irtual laboratory'' for the design, implementation and evaluation of future networks. The PrimoGENI project enables real-time network simulation by extending an existing network simulator to become part of the GENI federation to support large-scale experiments involving physical, simulated and emulated network entities. In this paper, we describe a novel design of PrimoGENI, which aims at supporting realistic, scalable, and flexible network experiments with real-time simulation and emulation capabilities. We present a flexible emulation infrastructure that allows both remote client machines and local cluster nodes running virtual machines to seamlessly interoperate with the simulated network running within a designated &#x73;&#x0308;lice'' of resources. We show the results of our preliminary validation and performance studies to demonstrate the capabilities and limitations of our approach.</td>
     4861</tr>
     4862
     4863
     4864
     4865<tr>
     4866     <td>DOI</td>
     4867     <td>10.1109/PADS.2011.5936747</td>
     4868</tr>
     4869
     4870
     4871
     4872<tr>
     4873     <td>URL</td>
     4874     <td><a href="http://dx.doi.org/10.1109/PADS.2011.5936747">http://dx.doi.org/10.1109/PADS.2011.5936747</a></td>
     4875</tr>
     4876
     4877
     4878</table></div><br><br>
     4879
     4880
     4881
     4882
     4883<a class="EntryGoto" id="Van Vorst, Nathanael and Liu, Jason"></a>
     4884<b class="myheading" style="position: relative; left: 10%;">Van Vorst, Nathanael and Liu, Jason</b>
     4885
     4886<div class="BibEntry">
     4887
     4888<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     4889<tr class="TagRow">
     4890<!--
     4891        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     4892        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     4893-->
     4894</tr>
     4895
     4896
     4897<tr>
     4898     <td>Author</td>
     4899     <td>Van Vorst, Nathanael and Liu, Jason</td>
     4900</tr>
     4901
     4902<tr>
     4903     <td>Title</td>
     4904     <td>Realizing Large-Scale Interactive Network Simulation via Model Splitting</td>
     4905</tr>
     4906
     4907<tr>
     4908     <td>Booktitle</td>
     4909     <td>Proceedings of the 26th Workshop on Principles of Advanced and Distributed Simulation (PADS'12)</td>
     4910</tr>
     4911
     4912<tr>
     4913     <td>Year</td>
     4914     <td>2012</td>
     4915</tr>
     4916
     4917
     4918
     4919
     4920
     4921<tr>
     4922     <td>URL</td>
     4923     <td><a href="http://www.researchgate.net/publication/229476062&#x005F;Realizing&#x005F;Large-Scale&#x005F;Interactive&#x005F;Network&#x005F;Simulation&#x005F;via&#x005F;Model&#x005F;Splitting/file/d912f500eb6b911215.pdf">http://www.researchgate.net/publication/229476062&#x005F;Realizing&#x005F;Large-Scale&#x005F;Interactive&#x005F;Network&#x005F;Simulation&#x005F;via&#x005F;Model&#x005F;Splitting/file/d912f500eb6b911215.pdf</a></td>
     4924</tr>
     4925
     4926
     4927</table></div><br><br>
     4928
     4929
     4930
     4931
     4932<a class="EntryGoto" id="Wong, G. and Ricci, R. and Duerig, J. and Stoller, L. and Chikkulapelly, S. and Seok, Woojin"></a>
     4933<b class="myheading" style="position: relative; left: 10%;">Wong, G. and Ricci, R. and Duerig, J. and Stoller, L. and Chikkulapelly, S. and Seok, Woojin</b>
     4934
     4935<div class="BibEntry">
     4936
     4937<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     4938<tr class="TagRow">
     4939<!--
     4940        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     4941        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     4942-->
     4943</tr>
     4944
     4945
     4946<tr>
     4947     <td>Author</td>
     4948     <td>Wong, G. and Ricci, R. and Duerig, J. and Stoller, L. and Chikkulapelly, S. and Seok, Woojin</td>
     4949</tr>
     4950
     4951<tr>
     4952     <td>Title</td>
     4953     <td>Partitioning Trust in Network Testbeds</td>
     4954</tr>
     4955
     4956<tr>
     4957     <td>Booktitle</td>
     4958     <td>System Science (HICSS), 2012 45th Hawaii International Conference on</td>
     4959</tr>
     4960
     4961<tr>
     4962     <td>Publisher</td>
     4963     <td>IEEE</td>
     4964</tr>
     4965
     4966<tr>
     4967     <td>Year</td>
     4968     <td>2012</td>
     4969</tr>
     4970
     4971<tr>
     4972     <td>Abstract</td>
     4973     <td>Traditionally, test beds for networking and systems research have been designed as monolithic facilities: they contain a single root of trust. The resources in the facility are assumed to be administered by a single entity or a set of mutually-trusting entities. All user management, including vouching for users' identities and taking responsibility for their actions, is done using a flat trust structure or a simple hierarchy with the facility itself as the root. This design is not a good match for test beds that are composed of multiple autonomous facilities, or in which different parts of the test bed operate under different trust models. In this paper, we argue that partitioned trust is increasingly important in large scale and security-sensitive test beds. We present a design that accomplishes this partitioning by using multiple trust roots. The trust domains created by these roots may decide, independently, how much trust to place in each other, and can apply policies based on the domain or principal that originates a request. The domains could represent separately administered facilities (as in a federated test bed), or they could represent sections within a single facility that run with different trust models (for example, with differing levels of security.) We have implemented this design in ProtoGENI, a control framework for federated test beds, we include details of this implementation and share experiences from using it in an active deployment with hundreds of users.</td>
     4974</tr>
     4975
     4976
     4977
     4978<tr>
     4979     <td>DOI</td>
     4980     <td>10.1109/HICSS.2012.466</td>
     4981</tr>
     4982
     4983
     4984
     4985<tr>
     4986     <td>URL</td>
     4987     <td><a href="http://dx.doi.org/10.1109/HICSS.2012.466">http://dx.doi.org/10.1109/HICSS.2012.466</a></td>
     4988</tr>
     4989
     4990
     4991</table></div><br><br>
     4992
     4993
     4994
     4995
     4996<a class="EntryGoto" id="Yuen, Marco"></a>
     4997<b class="myheading" style="position: relative; left: 10%;">Yuen, Marco</b>
     4998
     4999<div class="BibEntry">
     5000
     5001<table class="EntryTable" style="position: relative; left: 10%; width: 90%; border:thin solid black; border-spacing:10px; tr:nth-child(odd) {background-color: #8888;};">
     5002<tr class="TagRow">
     5003<!--
     5004        <td class="NameColumn"><div class="EntryTableInfo">Tag</div></td>
     5005        <td class="ContentColumn"><div class="EntryTableInfo">Content</div></td>
     5006-->
     5007</tr>
     5008
     5009
     5010<tr>
     5011     <td>Author</td>
     5012     <td>Yuen, Marco</td>
     5013</tr>
     5014
     5015<tr>
     5016     <td>Title</td>
     5017     <td>GENI in the Cloud</td>
     5018</tr>
     5019
     5020<tr>
     5021     <td>Year</td>
     5022     <td>2010</td>
     5023</tr>
     5024
     5025<tr>
     5026     <td>Abstract</td>
     5027     <td>Computer networking researchers often have access to a few di
     5028erent network testbeds (Section 1.2) for their experiments. However, those testbeds are limited in resources; contentions for resources are prominent in those testbeds especially when conference deadline is looming. Moreover, services running on those testbeds are subject to seasonal and daily trac spikes from users all round the world. Hence, demand for resources at the testbeds are high. Some researchers can use other testbeds in conjunction with the ones they are using. Even though each of the testbeds may have di
     5029erent infrastructures, and characteristics, in the end, what the researchers receive in return is a set of computing resources, either virtual machines or physical machines. Essentially, those testbeds are providing a similar service, but researchers have to manage the credentials for accessing the testbeds manually, and they have to manually request resources from di
     5030erent testbeds in order to setup experiments that span across di
     5031erent testbeds. This thesis presents GENICloud, a project that enables the federation of testbeds with clouds. Computing and storage resources can be provisioned to researchers and services running on existing testbeds dynamically from an Eucalyptus cloud. As a part of the GENICloud project, the user proxy (Section 3.4) provides a less arduous method for testbeds administrators to federate with other testbeds; the same serviceiv also manages researchers credentials, so they do not have to acquire resources from each testbed individually. The user proxy provides a single interface for researchers to interact with di
     5032erent testbeds and clouds and manage their experiments. Furthermore, GENICloud demonstrates that there are, in fact, quite a few architectural similarities between di
     5033erent testbeds and even clouds</td>
     5034</tr>
     5035
     5036
     5037
     5038
     5039
     5040<tr>
     5041     <td>URL</td>
     5042     <td><a href="http://s3.amazonaws.com/marcoy&#x005F;thesis/Thesis.pdf">http://s3.amazonaws.com/marcoy&#x005F;thesis/Thesis.pdf</a></td>
     5043</tr>
     5044
     5045
     5046</table></div><br><br>
     5047
     5048
     5049
     5050
     5051<br>
     5052
     5053<!-- End HTML to be inserted into wiki page. -->
     5054
     5055
     5056}}}