Changes between Version 11 and Version 12 of GENIBibliography


Ignore:
Timestamp:
03/28/14 14:18:14 (10 years ago)
Author:
Mark Berman
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIBibliography

    v11 v12  
    3939<H1>GENI Bibliography</H1>
    4040
     41<ol>
     42
    4143
    4244<a class="EntryGoto" id="Aikat, Jay and Hasan, Shaddi and Jeffay, Kevin and Smith, F. Donelson"></a>
     
    4749<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4850
     51<li>
     52
    4953
    5054<tr>
     
    8387
    8488
    85 </table></div><br><br>
    86 
    87 
    88 <div class="BibEntry">
    89 
    90 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    91 
    92 
    93 <tr>
    94      <td valign="top">Author</td>
    95      <td valign="top">Aikat, Jay and Hasan, Shaddi and Jeffay, Kevin and Smith, F. Donelson</td>
    96 </tr>
    97 
    98 <tr>
    99      <td valign="top">Title</td>
    100      <td valign="top">Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation</td>
    101 </tr>
    102 
    103 <tr>
    104      <td valign="top">Booktitle</td>
    105      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    106 </tr>
    107 
    108 <tr>
    109      <td valign="top">Location</td>
    110      <td valign="top">Los Angeles</td>
    111 </tr>
    112 
    113 <tr>
    114      <td valign="top">Year</td>
    115      <td valign="top">2012</td>
    116 </tr>
    117 
    118 <tr>
    119      <td valign="top">Abstract</td>
    120      <td valign="top">Empirical evaluations to study network performance, whether in a laboratory setting or on GENI testbeds, rely heavily on measurement-based modeling of round trip times (RTTs) to emulate realistic end-to-end delays of local and metropolitan area networks. For generating realistic traffic, we studied several models to emulate RTTs. In this paper, we performed experiments on real testbeds using synthetic TCP traffic generated from measurement data from a large university campus. As a result of our study, we present the Discrete- Approximation model for RTT (DA-RTT) emulation. Using three different metrics for performance evaluation, which include queue length at routers, connection response times, and connection durations, we demonstrate that the simple DA-RTT model closely represents the per-connection RTTs in the original traffic. While these experiments were performed in our laboratory, and not using GENI infrastructure, we present this as a possible model for adoption on GENI testbeds to emulate Round Trip Time Distributions for GENI experiments.</td>
    121 </tr>
    122 
    123 
    124 
    125 
    126 
     89</li>
    12790
    12891</table></div><br><br>
     
    138101<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    139102
     103<li>
     104
    140105
    141106<tr>
     
    179144
    180145
     146</li>
     147
    181148</table></div><br><br>
    182149
     
    191158<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    192159
     160<li>
     161
    193162
    194163<tr>
     
    242211
    243212
     213</li>
     214
    244215</table></div><br><br>
    245216
     
    254225<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    255226
     227<li>
     228
    256229
    257230<tr>
     
    305278
    306279
     280</li>
     281
    307282</table></div><br><br>
    308283
     
    317292<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    318293
     294<li>
     295
    319296
    320297<tr>
     
    368345
    369346
    370 </table></div><br><br>
    371 
    372 
    373 <div class="BibEntry">
    374 
    375 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    376 
    377 
    378 <tr>
    379      <td valign="top">Author</td>
    380      <td valign="top">Angu, Pragatheeswaran and Ramamurthy, Byrav</td>
    381 </tr>
    382 
    383 <tr>
    384      <td valign="top">Title</td>
    385      <td valign="top">Experiences with dynamic circuit creation in a regional network testbed</td>
    386 </tr>
    387 
    388 <tr>
    389      <td valign="top">Booktitle</td>
    390      <td valign="top">2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)</td>
    391 </tr>
    392 
    393 <tr>
    394      <td valign="top">Location</td>
    395      <td valign="top">Shanghai, China</td>
    396 </tr>
    397 
    398 <tr>
    399      <td valign="top">Publisher</td>
    400      <td valign="top">IEEE</td>
    401 </tr>
    402 
    403 <tr>
    404      <td valign="top">Year</td>
    405      <td valign="top">2011</td>
    406 </tr>
    407 
    408 <tr>
    409      <td valign="top">Abstract</td>
    410      <td valign="top">In this paper we share our experiences of enabling dynamic circuit creation in the GpENI network. GpENI is a network research testbed in the mid-west USA involving several educational institutions. University of Nebraska-Lincoln is involved in provisioning dynamic circuits across the GpENI network among its participating universities. We discuss several options investigated for deploying dynamic circuits over the GpENI network as well as our demonstration experiments at the GENI engineering conferences. UNL has also collaborated with ProtoGENI project of University of Utah and Mid-Atlantic Crossroads (MAX) facility of Washington DC to create inter-domain dynamic circuits.</td>
    411 </tr>
    412 
    413 
    414 
    415 <tr>
    416      <td valign="top">DOI</td>
    417      <td valign="top">10.1109/infcomw.2011.5928801</td>
    418 </tr>
    419 
    420 
    421 
    422 <tr>
    423      <td valign="top">URL</td>
    424      <td valign="top"><a href="http://dx.doi.org/10.1109/infcomw.2011.5928801">http://dx.doi.org/10.1109/infcomw.2011.5928801</a></td>
    425 </tr>
    426 
     347</li>
    427348
    428349</table></div><br><br>
     
    438359<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    439360
     361<li>
     362
    440363
    441364<tr>
     
    488411</tr>
    489412
     413
     414</li>
    490415
    491416</table></div><br><br>
     
    501426<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    502427
     428<li>
     429
    503430
    504431<tr>
     
    531458
    532459
     460
     461</li>
    533462
    534463</table></div><br><br>
     
    544473<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    545474
     475<li>
     476
    546477
    547478<tr>
     
    600531
    601532
    602 </table></div><br><br>
    603 
    604 
    605 <div class="BibEntry">
    606 
    607 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    608 
    609 
    610 <tr>
    611      <td valign="top">Author</td>
    612      <td valign="top">Bavier, Andy and Coady, Yvonne and Mack, Tony and Matthews, Chris and Mambretti, Joe and McGeer, Rick and Mueller, Paul and Snoeren, Alex and Yuen, Marco</td>
    613 </tr>
    614 
    615 <tr>
    616      <td valign="top">Title</td>
    617      <td valign="top">GENICloud and transcloud</td>
    618 </tr>
    619 
    620 <tr>
    621      <td valign="top">Booktitle</td>
    622      <td valign="top">Proceedings of the 2012 workshop on Cloud services, federation, and the 8th open cirrus summit</td>
    623 </tr>
    624 
    625 <tr>
    626      <td valign="top">Location</td>
    627      <td valign="top">San Jose, California, USA</td>
     533</li>
     534
     535</table></div><br><br>
     536
     537
     538
     539
     540<a class="EntryGoto" id="Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan"></a>
     541<b class="myheading" style="position: relative; left: 5%;">Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan</b>
     542
     543<div class="BibEntry">
     544
     545<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     546
     547<li>
     548
     549
     550<tr>
     551     <td valign="top">Author</td>
     552     <td valign="top">Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan</td>
     553</tr>
     554
     555<tr>
     556     <td valign="top">Title</td>
     557     <td valign="top">GENI: A federated testbed for innovative network experiments</td>
     558</tr>
     559
     560<tr>
     561     <td valign="top">Journal</td>
     562     <td valign="top">Computer Networks</td>
     563</tr>
     564
     565<tr>
     566     <td valign="top">Year</td>
     567     <td valign="top">2014</td>
     568</tr>
     569
     570<tr>
     571     <td valign="top">Abstract</td>
     572     <td valign="top">GENI, the Global Environment for Networking Innovation, is a distributed virtual laboratory for transformative, at-scale experiments in network science, services, and security. Designed in response to concerns over Internet ossification, GENI is enabling a wide variety of experiments in a range of areas, including clean-slate networking, protocol design and evaluation, distributed service offerings, social network integration, content management, and in-network service deployment. Recently, GENI has been leading an effort to explore the potential of its underlying technologies, SDN and GENI racks, in support of university campus network management and applications. With the concurrent deployment of these technologies on regional and national R&#x0026;E backbones, this will result in a revolutionary new national-scale distributed architecture, bringing to the entire network the shared, deeply programmable environment that the cloud has brought to the datacenter. This deeply programmable environment will support the GENI research mission and as well as enabling research in a wide variety of application areas.</td>
     573</tr>
     574
     575
     576
     577<tr>
     578     <td valign="top">DOI</td>
     579     <td valign="top">10.1016/j.bjp.2013.12.037</td>
     580</tr>
     581
     582
     583
     584<tr>
     585     <td valign="top">URL</td>
     586     <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.12.037">http://dx.doi.org/10.1016/j.bjp.2013.12.037</a></td>
     587</tr>
     588
     589
     590</li>
     591
     592</table></div><br><br>
     593
     594
     595
     596
     597<a class="EntryGoto" id="Berryman, Alex and Calyam, Prasad and Cecil, Joe and Adams, George B. and Comer, Douglas"></a>
     598<b class="myheading" style="position: relative; left: 5%;">Berryman, Alex and Calyam, Prasad and Cecil, Joe and Adams, George B. and Comer, Douglas</b>
     599
     600<div class="BibEntry">
     601
     602<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     603
     604<li>
     605
     606
     607<tr>
     608     <td valign="top">Author</td>
     609     <td valign="top">Berryman, Alex and Calyam, Prasad and Cecil, Joe and Adams, George B. and Comer, Douglas</td>
     610</tr>
     611
     612<tr>
     613     <td valign="top">Title</td>
     614     <td valign="top">Advanced Manufacturing Use Cases and Early Results in GENI Infrastructure</td>
     615</tr>
     616
     617<tr>
     618     <td valign="top">Booktitle</td>
     619     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     620</tr>
     621
     622<tr>
     623     <td valign="top">Location</td>
     624     <td valign="top">Salt Lake City, UT</td>
     625</tr>
     626
     627<tr>
     628     <td valign="top">Publisher</td>
     629     <td valign="top">IEEE</td>
     630</tr>
     631
     632<tr>
     633     <td valign="top">Year</td>
     634     <td valign="top">2013</td>
     635</tr>
     636
     637
     638
     639<tr>
     640     <td valign="top">DOI</td>
     641     <td valign="top">10.1109/GREE.2013.13</td>
     642</tr>
     643
     644
     645
     646<tr>
     647     <td valign="top">URL</td>
     648     <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.13">http://dx.doi.org/10.1109/GREE.2013.13</a></td>
     649</tr>
     650
     651
     652</li>
     653
     654</table></div><br><br>
     655
     656
     657
     658
     659<a class="EntryGoto" id="Bhanage, G. and Daya, R. and Seskar, I. and Raychaudhuri, D."></a>
     660<b class="myheading" style="position: relative; left: 5%;">Bhanage, G. and Daya, R. and Seskar, I. and Raychaudhuri, D.</b>
     661
     662<div class="BibEntry">
     663
     664<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     665
     666<li>
     667
     668
     669<tr>
     670     <td valign="top">Author</td>
     671     <td valign="top">Bhanage, G. and Daya, R. and Seskar, I. and Raychaudhuri, D.</td>
     672</tr>
     673
     674<tr>
     675     <td valign="top">Title</td>
     676     <td valign="top">VNTS: A Virtual Network Traffic Shaper for Air Time Fairness in 802.16e Systems</td>
     677</tr>
     678
     679<tr>
     680     <td valign="top">Booktitle</td>
     681     <td valign="top">Communications (ICC), 2010 IEEE International Conference on</td>
     682</tr>
     683
     684<tr>
     685     <td valign="top">Publisher</td>
     686     <td valign="top">IEEE</td>
     687</tr>
     688
     689<tr>
     690     <td valign="top">Year</td>
     691     <td valign="top">2010</td>
     692</tr>
     693
     694<tr>
     695     <td valign="top">Abstract</td>
     696     <td valign="top">The 802.16e standard for broadband wireless access mandates the presence of QoS classes, but does not specify guidelines for the scheduler implementation or mechanisms to ensure air time fairness. Our study demonstrates the feasibility of controlling downlink airtime fairness for slices while running above a proprietary WiMAX basestation (BS) scheduler. We design and implement a virtualized infrastructure that allows users to obtain at least an allocated percentage of BS resources in the presence of saturation and link degradation. Using Kernel virtual machines for creating slices and Click modular router for implementing the virtual network traffic shaping engine we show that it is possible to adaptively control slice usage for downlink traffic on a WiMAX Basestation. The fairness index and coupling coefficient show an improvement of up to 42&#x0025;, and 73&#x0025; with preliminary indoor walking mobility experiments. Outdoor vehicular measurements show an improvement of up to 27&#x0025;, and 70\\\\ with the fairness index and coupling coefficient respectively</td>
     697</tr>
     698
     699
     700
     701<tr>
     702     <td valign="top">DOI</td>
     703     <td valign="top">10.1109/ICC.2010.5502484</td>
     704</tr>
     705
     706
     707
     708<tr>
     709     <td valign="top">URL</td>
     710     <td valign="top"><a href="http://dx.doi.org/10.1109/ICC.2010.5502484">http://dx.doi.org/10.1109/ICC.2010.5502484</a></td>
     711</tr>
     712
     713
     714</li>
     715
     716</table></div><br><br>
     717
     718
     719
     720
     721<a class="EntryGoto" id="Bhanage, G. and Seskar, I. and Zhang, Y. and Raychaudhuri, D. and Jain, S."></a>
     722<b class="myheading" style="position: relative; left: 5%;">Bhanage, G. and Seskar, I. and Zhang, Y. and Raychaudhuri, D. and Jain, S.</b>
     723
     724<div class="BibEntry">
     725
     726<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     727
     728<li>
     729
     730
     731<tr>
     732     <td valign="top">Author</td>
     733     <td valign="top">Bhanage, G. and Seskar, I. and Zhang, Y. and Raychaudhuri, D. and Jain, S.</td>
     734</tr>
     735
     736<tr>
     737     <td valign="top">Title</td>
     738     <td valign="top">Experimental evaluation of openvz from a testbed deployment perspective</td>
     739</tr>
     740
     741<tr>
     742     <td valign="top">Journal</td>
     743     <td valign="top">Proceedings of the ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)</td>
     744</tr>
     745
     746<tr>
     747     <td valign="top">Year</td>
     748     <td valign="top">2010</td>
     749</tr>
     750
     751
     752
     753<tr>
     754     <td valign="top">DOI</td>
     755     <td valign="top">10.1007/978-3-642-17851-1&#x005F;7</td>
     756</tr>
     757
     758
     759
     760<tr>
     761     <td valign="top">URL</td>
     762     <td valign="top"><a href="http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;7">http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;7</a></td>
     763</tr>
     764
     765
     766</li>
     767
     768</table></div><br><br>
     769
     770
     771
     772
     773<a class="EntryGoto" id="Bhanage, G. and Vete, D. and Seskar, I. and Raychaudhuri, D."></a>
     774<b class="myheading" style="position: relative; left: 5%;">Bhanage, G. and Vete, D. and Seskar, I. and Raychaudhuri, D.</b>
     775
     776<div class="BibEntry">
     777
     778<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     779
     780<li>
     781
     782
     783<tr>
     784     <td valign="top">Author</td>
     785     <td valign="top">Bhanage, G. and Vete, D. and Seskar, I. and Raychaudhuri, D.</td>
     786</tr>
     787
     788<tr>
     789     <td valign="top">Title</td>
     790     <td valign="top">SplitAP: Leveraging Wireless Network Virtualization for Flexible Sharing of WLANs</td>
     791</tr>
     792
     793<tr>
     794     <td valign="top">Booktitle</td>
     795     <td valign="top">Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE</td>
     796</tr>
     797
     798<tr>
     799     <td valign="top">Publisher</td>
     800     <td valign="top">IEEE</td>
     801</tr>
     802
     803<tr>
     804     <td valign="top">Year</td>
     805     <td valign="top">2010</td>
     806</tr>
     807
     808<tr>
     809     <td valign="top">Abstract</td>
     810     <td valign="top">Providing air-time guarantees across a group of clients forms a fundamental building block in sharing an access point (AP) across different virtual network providers. Though this problem has a relatively simple solution for downlink group scheduling through traffic engineering at the AP, solving this problem for uplink (UL) traffic presents a challenge for fair sharing of wireless hotspots. Among other issues, the mechanism for uplink traffic control has to scale across a large user base, and provide flexible operation irrespective of the client channel conditions and network loads. In this study, we propose the SplitAP architecture that address the problem of sharing uplink airtime across groups of users by extending the idea of network virtualization. Our architecture allows us to deploy different algorithms for enforcing UL airtime fairness across client groups. In this study, we will highlight the design features of the SplitAP architecture, and present results from evaluation on a prototype deployed with: (1) LPFC and (2) LPFC+, two algorithms for controlling UL group fairness. Performance comparisons on the ORBIT testbed show that the proposed algorithms are capable of providing group air-time fairness across wireless clients irrespective of the network volume, and traffic type. The algorithms show up to 40&#x0025; improvement with a modified Jain fairness index.</td>
     811</tr>
     812
     813
     814
     815<tr>
     816     <td valign="top">DOI</td>
     817     <td valign="top">10.1109/GLOCOM.2010.5684328</td>
     818</tr>
     819
     820
     821
     822<tr>
     823     <td valign="top">URL</td>
     824     <td valign="top"><a href="http://dx.doi.org/10.1109/GLOCOM.2010.5684328">http://dx.doi.org/10.1109/GLOCOM.2010.5684328</a></td>
     825</tr>
     826
     827
     828</li>
     829
     830</table></div><br><br>
     831
     832
     833
     834
     835<a class="EntryGoto" id="Bhanage, Gautam and Seskar, Ivan and Mahindra, Rajesh and Raychaudhuri, Dipankar"></a>
     836<b class="myheading" style="position: relative; left: 5%;">Bhanage, Gautam and Seskar, Ivan and Mahindra, Rajesh and Raychaudhuri, Dipankar</b>
     837
     838<div class="BibEntry">
     839
     840<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     841
     842<li>
     843
     844
     845<tr>
     846     <td valign="top">Author</td>
     847     <td valign="top">Bhanage, Gautam and Seskar, Ivan and Mahindra, Rajesh and Raychaudhuri, Dipankar</td>
     848</tr>
     849
     850<tr>
     851     <td valign="top">Title</td>
     852     <td valign="top">Virtual basestation: architecture for an open shared WiMAX framework</td>
     853</tr>
     854
     855<tr>
     856     <td valign="top">Booktitle</td>
     857     <td valign="top">Proceedings of the second ACM SIGCOMM workshop on Virtualized infrastructure systems and architectures</td>
     858</tr>
     859
     860<tr>
     861     <td valign="top">Location</td>
     862     <td valign="top">New Delhi, India</td>
    628863</tr>
    629864
     
    640875<tr>
    641876     <td valign="top">Year</td>
     877     <td valign="top">2010</td>
     878</tr>
     879
     880<tr>
     881     <td valign="top">Abstract</td>
     882     <td valign="top">This paper presents the architecture and performance evaluation of a virtualized wide-area &#x34;&#x0308;G&#x20;&#x0308;cellular wireless network. Specifically, it addresses the challenges of virtualization of resources in a cellular base station to enable shared use by multiple independent slice users (experimenters or mobile virtual network operators), each with possibly distinct flow types and network layer protocols. The proposed virtual basestation architecture is based on an external substrate which uses a layer-2 switched datapath, and an arbitrated control path to the WiMAX basestation. The framework implements virtualization of base station's radio resources to achieve isolation between multiple virtual networks. An algorithm for weighted fair sharing among multiple slices based on an airtime fairness metric has been implemented for the first release. Preliminary experimental results from the virtual basestation prototype are given, demonstrating mobile network performance, isolation across slices with different flow types, and custom flow scheduling capabilities.</td>
     883</tr>
     884
     885
     886
     887<tr>
     888     <td valign="top">DOI</td>
     889     <td valign="top">10.1145/1851399.1851401</td>
     890</tr>
     891
     892
     893
     894<tr>
     895     <td valign="top">URL</td>
     896     <td valign="top"><a href="http://dx.doi.org/10.1145/1851399.1851401">http://dx.doi.org/10.1145/1851399.1851401</a></td>
     897</tr>
     898
     899
     900</li>
     901
     902</table></div><br><br>
     903
     904
     905
     906
     907<a class="EntryGoto" id="Bhanage, Gautam and Seskar, Ivan and Raychaudhuri, Dipankar"></a>
     908<b class="myheading" style="position: relative; left: 5%;">Bhanage, Gautam and Seskar, Ivan and Raychaudhuri, Dipankar</b>
     909
     910<div class="BibEntry">
     911
     912<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     913
     914<li>
     915
     916
     917<tr>
     918     <td valign="top">Author</td>
     919     <td valign="top">Bhanage, Gautam and Seskar, Ivan and Raychaudhuri, Dipankar</td>
     920</tr>
     921
     922<tr>
     923     <td valign="top">Title</td>
     924     <td valign="top">A virtualization architecture for mobile WiMAX networks</td>
     925</tr>
     926
     927<tr>
     928     <td valign="top">Journal</td>
     929     <td valign="top">SIGMOBILE Mob. Comput. Commun. Rev.</td>
     930</tr>
     931
     932<tr>
     933     <td valign="top">Publisher</td>
     934     <td valign="top">ACM</td>
     935</tr>
     936
     937<tr>
     938     <td valign="top">Address</td>
     939     <td valign="top">New York, NY, USA</td>
     940</tr>
     941
     942<tr>
     943     <td valign="top">Year</td>
    642944     <td valign="top">2012</td>
    643945</tr>
     
    645947<tr>
    646948     <td valign="top">Abstract</td>
    647      <td valign="top">In this paper, we argue that federation of cloud systems requires a standard API for users to create, manage, and destroy virtual objects, and a standard naming scheme for virtual objects. We introduce an existing API for this purpose, the Slice-Based Federation Architecture, and demonstrate that it can be implemented on a number of existing cloud management systems. We introduce a simple naming scheme for virtual objects, and discuss its implementation.</td>
    648 </tr>
    649 
    650 
    651 
    652 <tr>
    653      <td valign="top">DOI</td>
    654      <td valign="top">10.1145/2378975.2378980</td>
    655 </tr>
    656 
    657 
    658 
    659 <tr>
    660      <td valign="top">URL</td>
    661      <td valign="top"><a href="http://dx.doi.org/10.1145/2378975.2378980">http://dx.doi.org/10.1145/2378975.2378980</a></td>
    662 </tr>
    663 
    664 
    665 </table></div><br><br>
    666 
    667 
    668 
    669 
    670 <a class="EntryGoto" id="Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan"></a>
    671 <b class="myheading" style="position: relative; left: 5%;">Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan</b>
    672 
    673 <div class="BibEntry">
    674 
    675 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    676 
    677 
    678 <tr>
    679      <td valign="top">Author</td>
    680      <td valign="top">Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan</td>
    681 </tr>
    682 
    683 <tr>
    684      <td valign="top">Title</td>
    685      <td valign="top">GENI: A federated testbed for innovative network experiments</td>
     949     <td valign="top">Systems virtualization offers convenient means for sharing networking infrastructure while improving its utilization. This study addresses the challenges of virtualizing a commercial off-the-shelf 4G mobileWiMAX basestation. We highlight additions and modifications needed in theWiMAX network architecture for supporting multiple simultaneous virtual basestations on a single physical basestation. The most prominent features provided by the proposed virtual basestation framework include the capability to perform all frame switching at layer-2, and control mechanisms to provide isolation across slices needed to ensure experiment repeatability. By prototyping on a commercial WiMAX radio, this paper shows the usage of the virtual basestation system for housing mobile virtual network operators and testbeds alike. A use case is shown where the virtual basestation design is used to evaluate mobile handoff schemes. Another usage case is shown for optimizing a video delivery on the edge. The video delivery use case is used to show performance improvements of up to 5dB in the PSNR. Evaluation of prototype shows a significant improvement in the slice isolation, with aggregate throughput improvements of up to 192&#x0025; achievable through fair resource allocation.</td>
     950</tr>
     951
     952
     953
     954<tr>
     955     <td valign="top">DOI</td>
     956     <td valign="top">10.1145/2169077.2169082</td>
     957</tr>
     958
     959
     960
     961<tr>
     962     <td valign="top">URL</td>
     963     <td valign="top"><a href="http://dx.doi.org/10.1145/2169077.2169082">http://dx.doi.org/10.1145/2169077.2169082</a></td>
     964</tr>
     965
     966
     967</li>
     968
     969</table></div><br><br>
     970
     971
     972
     973
     974<a class="EntryGoto" id="Blanton, Ethan and Chatterjee, Sarbajit and Gangam, Sriharsha and Kala, Sumit and Sharma, Deepti and Fahmy, Sonia and Sharma, Puneet"></a>
     975<b class="myheading" style="position: relative; left: 5%;">Blanton, Ethan and Chatterjee, Sarbajit and Gangam, Sriharsha and Kala, Sumit and Sharma, Deepti and Fahmy, Sonia and Sharma, Puneet</b>
     976
     977<div class="BibEntry">
     978
     979<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     980
     981<li>
     982
     983
     984<tr>
     985     <td valign="top">Author</td>
     986     <td valign="top">Blanton, Ethan and Chatterjee, Sarbajit and Gangam, Sriharsha and Kala, Sumit and Sharma, Deepti and Fahmy, Sonia and Sharma, Puneet</td>
     987</tr>
     988
     989<tr>
     990     <td valign="top">Title</td>
     991     <td valign="top">Design and evaluation of the S<sup>3</sup> monitor network measurement service on GENI</td>
     992</tr>
     993
     994<tr>
     995     <td valign="top">Booktitle</td>
     996     <td valign="top">2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)</td>
     997</tr>
     998
     999<tr>
     1000     <td valign="top">Location</td>
     1001     <td valign="top">Bangalore, India</td>
     1002</tr>
     1003
     1004<tr>
     1005     <td valign="top">Publisher</td>
     1006     <td valign="top">IEEE</td>
     1007</tr>
     1008
     1009<tr>
     1010     <td valign="top">Year</td>
     1011     <td valign="top">2012</td>
     1012</tr>
     1013
     1014<tr>
     1015     <td valign="top">Abstract</td>
     1016     <td valign="top">Network monitoring capabilities are critical for both network operators and networked applications. In the context of an experimental test facility, network measurement is important for researchers experimenting with new network architectures and applications, as well as operators of the test facility itself. The Global Environment for Network Innovations (GENI) is a sophisticated test facility comprised of multiple ” control frameworks.” In this paper, we describe the design and implementation of S</td>
     1017</tr>
     1018
     1019
     1020
     1021<tr>
     1022     <td valign="top">DOI</td>
     1023     <td valign="top">10.1109/COMSNETS.2012.6151327</td>
     1024</tr>
     1025
     1026
     1027
     1028<tr>
     1029     <td valign="top">URL</td>
     1030     <td valign="top"><a href="http://dx.doi.org/10.1109/COMSNETS.2012.6151327">http://dx.doi.org/10.1109/COMSNETS.2012.6151327</a></td>
     1031</tr>
     1032
     1033
     1034</li>
     1035
     1036</table></div><br><br>
     1037
     1038
     1039
     1040
     1041<a class="EntryGoto" id="Calyam, P. and Rajagopalan, S. and Selvadhurai, A. and Mohan, S. and Venkataraman, A. and Berryman, A. and Ramnath, R."></a>
     1042<b class="myheading" style="position: relative; left: 5%;">Calyam, P. and Rajagopalan, S. and Selvadhurai, A. and Mohan, S. and Venkataraman, A. and Berryman, A. and Ramnath, R.</b>
     1043
     1044<div class="BibEntry">
     1045
     1046<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1047
     1048<li>
     1049
     1050
     1051<tr>
     1052     <td valign="top">Author</td>
     1053     <td valign="top">Calyam, P. and Rajagopalan, S. and Selvadhurai, A. and Mohan, S. and Venkataraman, A. and Berryman, A. and Ramnath, R.</td>
     1054</tr>
     1055
     1056<tr>
     1057     <td valign="top">Title</td>
     1058     <td valign="top">Leveraging OpenFlow for resource placement of virtual desktop cloud applications</td>
     1059</tr>
     1060
     1061<tr>
     1062     <td valign="top">Booktitle</td>
     1063     <td valign="top">Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on</td>
     1064</tr>
     1065
     1066<tr>
     1067     <td valign="top">Year</td>
     1068     <td valign="top">2013</td>
     1069</tr>
     1070
     1071
     1072
     1073
     1074
     1075
     1076</li>
     1077
     1078</table></div><br><br>
     1079
     1080
     1081
     1082
     1083<a class="EntryGoto" id="Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A."></a>
     1084<b class="myheading" style="position: relative; left: 5%;">Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A.</b>
     1085
     1086<div class="BibEntry">
     1087
     1088<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1089
     1090<li>
     1091
     1092
     1093<tr>
     1094     <td valign="top">Author</td>
     1095     <td valign="top">Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A.</td>
     1096</tr>
     1097
     1098<tr>
     1099     <td valign="top">Title</td>
     1100     <td valign="top">Enabling performance intelligence for application adaptation in the Future Internet</td>
     1101</tr>
     1102
     1103<tr>
     1104     <td valign="top">Journal</td>
     1105     <td valign="top">Communications and Networks, Journal of</td>
     1106</tr>
     1107
     1108<tr>
     1109     <td valign="top">Year</td>
     1110     <td valign="top">2011</td>
     1111</tr>
     1112
     1113
     1114
     1115<tr>
     1116     <td valign="top">DOI</td>
     1117     <td valign="top">10.1109/JCN.2011.6157475</td>
     1118</tr>
     1119
     1120
     1121
     1122<tr>
     1123     <td valign="top">URL</td>
     1124     <td valign="top"><a href="http://dx.doi.org/10.1109/JCN.2011.6157475">http://dx.doi.org/10.1109/JCN.2011.6157475</a></td>
     1125</tr>
     1126
     1127
     1128</li>
     1129
     1130</table></div><br><br>
     1131
     1132
     1133
     1134
     1135<a class="EntryGoto" id="Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio"></a>
     1136<b class="myheading" style="position: relative; left: 5%;">Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio</b>
     1137
     1138<div class="BibEntry">
     1139
     1140<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1141
     1142<li>
     1143
     1144
     1145<tr>
     1146     <td valign="top">Author</td>
     1147     <td valign="top">Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio</td>
     1148</tr>
     1149
     1150<tr>
     1151     <td valign="top">Title</td>
     1152     <td valign="top">Experiences from Virtual Desktop CloudExperiments in GENI</td>
     1153</tr>
     1154
     1155<tr>
     1156     <td valign="top">Booktitle</td>
     1157     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     1158</tr>
     1159
     1160<tr>
     1161     <td valign="top">Location</td>
     1162     <td valign="top">Los Angeles</td>
     1163</tr>
     1164
     1165<tr>
     1166     <td valign="top">Year</td>
     1167     <td valign="top">2012</td>
     1168</tr>
     1169
     1170<tr>
     1171     <td valign="top">Abstract</td>
     1172     <td valign="top">Popular applications such as email, photo/video galleries, and file storage are increasingly being supported by cloud platforms in residential, academia and industry communities. The next frontier for these user communities will be to transition 'traditional desktops' that have dedicated hardware and software configurations into 'virtual desktop clouds' that are accessible via thin-clients. In this paper, we describe experiences from our research and development of virtual desktop cloud experiments in GENI. Our experimentation goal is to investigate and develop optimal resource allocation frameworks and performance bench- marking tools that can enable provisioning (i.e., resource sizing) and placement (i.e., resource mapping) of thin-client based virtual desktops at Internet-scale. We first motivate why virtual desktop cloud experiments cannot be done only at a table-top level, and why infrastructures such as GENI are essential. Next, we detail the methodology of our completed ” provisioning” experiments, and our work-in-progress ” placement” experiments in GENI that leverage multiple kinds of GENI resources such as aggregates, measurement services and experimenter workflow tools, as well as commercial software. Lastly, we present our vision on how our experiment slice setup and application development experiences, as well as outcomes can be leveraged in classroom labs, and 'living labs' that use GENI resources to foster training and wide- adoption of Future Internet applications.</td>
     1173</tr>
     1174
     1175
     1176
     1177
     1178
     1179
     1180</li>
     1181
     1182</table></div><br><br>
     1183
     1184
     1185
     1186
     1187<a class="EntryGoto" id="Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James"></a>
     1188<b class="myheading" style="position: relative; left: 5%;">Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James</b>
     1189
     1190<div class="BibEntry">
     1191
     1192<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1193
     1194<li>
     1195
     1196
     1197<tr>
     1198     <td valign="top">Author</td>
     1199     <td valign="top">Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James</td>
     1200</tr>
     1201
     1202<tr>
     1203     <td valign="top">Title</td>
     1204     <td valign="top">WiMAX: Bandwidth Contention Resolution Vulnerability to Denial of Service Attacks</td>
     1205</tr>
     1206
     1207<tr>
     1208     <td valign="top">Booktitle</td>
     1209     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     1210</tr>
     1211
     1212<tr>
     1213     <td valign="top">Location</td>
     1214     <td valign="top">Los Angeles</td>
     1215</tr>
     1216
     1217<tr>
     1218     <td valign="top">Year</td>
     1219     <td valign="top">2012</td>
     1220</tr>
     1221
     1222<tr>
     1223     <td valign="top">Abstract</td>
     1224     <td valign="top">Wireless communications is part of everyday life and 4G technology, including WiMAX, offers higher data rates and wider coverage than predecessor 3G technologies. Many security vulnerabilities have been discovered in 3G protocols and these vulnerabilities may still exist in next generation 4G protocols. This paper examines how system parameters for the WiMAX Bandwidth Contention Resolution process can affect network vulnerability to DoS attacks. It will present software simulations that explore system parameter settings and will cover the current phase of hardware simulations.</td>
     1225</tr>
     1226
     1227
     1228
     1229
     1230
     1231
     1232</li>
     1233
     1234</table></div><br><br>
     1235
     1236
     1237
     1238
     1239<a class="EntryGoto" id="Chakrabortty, Aranya and Xin, Yufeng"></a>
     1240<b class="myheading" style="position: relative; left: 5%;">Chakrabortty, Aranya and Xin, Yufeng</b>
     1241
     1242<div class="BibEntry">
     1243
     1244<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1245
     1246<li>
     1247
     1248
     1249<tr>
     1250     <td valign="top">Author</td>
     1251     <td valign="top">Chakrabortty, Aranya and Xin, Yufeng</td>
     1252</tr>
     1253
     1254<tr>
     1255     <td valign="top">Title</td>
     1256     <td valign="top">Hardware-in-the-Loop Simulations and Verifications of Smart Power Systems Over an Exo-GENI Testbed</td>
     1257</tr>
     1258
     1259<tr>
     1260     <td valign="top">Booktitle</td>
     1261     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     1262</tr>
     1263
     1264<tr>
     1265     <td valign="top">Location</td>
     1266     <td valign="top">Salt Lake City, UT</td>
     1267</tr>
     1268
     1269<tr>
     1270     <td valign="top">Publisher</td>
     1271     <td valign="top">IEEE</td>
     1272</tr>
     1273
     1274<tr>
     1275     <td valign="top">Year</td>
     1276     <td valign="top">2013</td>
     1277</tr>
     1278
     1279
     1280
     1281<tr>
     1282     <td valign="top">DOI</td>
     1283     <td valign="top">10.1109/GREE.2013.12</td>
     1284</tr>
     1285
     1286
     1287
     1288<tr>
     1289     <td valign="top">URL</td>
     1290     <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.12">http://dx.doi.org/10.1109/GREE.2013.12</a></td>
     1291</tr>
     1292
     1293
     1294</li>
     1295
     1296</table></div><br><br>
     1297
     1298
     1299
     1300
     1301<a class="EntryGoto" id="Chen, Kang and Shen, Haiying and Zhang, Haibo"></a>
     1302<b class="myheading" style="position: relative; left: 5%;">Chen, Kang and Shen, Haiying and Zhang, Haibo</b>
     1303
     1304<div class="BibEntry">
     1305
     1306<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1307
     1308<li>
     1309
     1310
     1311<tr>
     1312     <td valign="top">Author</td>
     1313     <td valign="top">Chen, Kang and Shen, Haiying and Zhang, Haibo</td>
     1314</tr>
     1315
     1316<tr>
     1317     <td valign="top">Title</td>
     1318     <td valign="top">Leveraging Social Networks for P2P Content-Based File Sharing in Mobile Ad Hoc Networks</td>
     1319</tr>
     1320
     1321<tr>
     1322     <td valign="top">Booktitle</td>
     1323     <td valign="top">2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems</td>
     1324</tr>
     1325
     1326<tr>
     1327     <td valign="top">Location</td>
     1328     <td valign="top">Valencia, Spain</td>
     1329</tr>
     1330
     1331<tr>
     1332     <td valign="top">Publisher</td>
     1333     <td valign="top">IEEE</td>
     1334</tr>
     1335
     1336<tr>
     1337     <td valign="top">Year</td>
     1338     <td valign="top">2011</td>
     1339</tr>
     1340
     1341<tr>
     1342     <td valign="top">Abstract</td>
     1343     <td valign="top">Current P2P file sharing methods in mobile ad hoc networks (MANETs) can be classified into three groups: flooding-based, advertisement-based and social contact-based. The first two groups of methods can easily generate high overhead and low scalability, and the third group fails to consider the social interests (content) of mobile nodes, which otherwise can improve file searching efficiency. In this paper, we propose a P2P content-based file sharing system for MANETs. The system uses an interest extraction algorithm to derive a node's interests from its files for complex queries. For efficient file searching, it groups common-interest nodes that frequently meet with each other as communities. Further, it takes advantage of node mobility by designating stable nodes, which has frequent contact with community members, as community coordinators for intra-community searching, and highly-mobile nodes as community ambassadors for inter-community searching. An interest-oriented file searching scheme further enhances the file searching success rate. We first deployed our system on the real-world GENI Orbit testbed with a real trace and then conducted experiment on the ns2 simulator with both real trace and simulated disconnected and connected MANET scenario. The test results show that our system significantly lowers transmission cost and improves file searching success rate compared to current methods.</td>
     1344</tr>
     1345
     1346
     1347
     1348<tr>
     1349     <td valign="top">DOI</td>
     1350     <td valign="top">10.1109/MASS.2011.24</td>
     1351</tr>
     1352
     1353
     1354
     1355<tr>
     1356     <td valign="top">URL</td>
     1357     <td valign="top"><a href="http://dx.doi.org/10.1109/MASS.2011.24">http://dx.doi.org/10.1109/MASS.2011.24</a></td>
     1358</tr>
     1359
     1360
     1361</li>
     1362
     1363</table></div><br><br>
     1364
     1365
     1366
     1367
     1368<a class="EntryGoto" id="Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze"></a>
     1369<b class="myheading" style="position: relative; left: 5%;">Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze</b>
     1370
     1371<div class="BibEntry">
     1372
     1373<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1374
     1375<li>
     1376
     1377
     1378<tr>
     1379     <td valign="top">Author</td>
     1380     <td valign="top">Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze</td>
     1381</tr>
     1382
     1383<tr>
     1384     <td valign="top">Title</td>
     1385     <td valign="top">Experimentation of a MANET Routing Algorithm on the GENI ORBIT Testbed</td>
     1386</tr>
     1387
     1388<tr>
     1389     <td valign="top">Booktitle</td>
     1390     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     1391</tr>
     1392
     1393<tr>
     1394     <td valign="top">Location</td>
     1395     <td valign="top">Los Angeles</td>
     1396</tr>
     1397
     1398<tr>
     1399     <td valign="top">Year</td>
     1400     <td valign="top">2012</td>
     1401</tr>
     1402
     1403<tr>
     1404     <td valign="top">Abstract</td>
     1405     <td valign="top">This paper proposes a systematic procedure for experimentation of Mobile ad hoc networks (MANETs) on the ORBIT testbed. MANETs have attracted significant re- search interests in recent years. Most of routing or file sharing algorithms in MANETs were only evaluated by theoretical analysis or simulations because of the requirement of large scale networks. However, due to the distinctive properties of MANETs, such as mobility and decentralized structure, it has been non-trivial to deploy a real testbed for the verification. The Global Environment for Network Innovations (GENI) project sponsored by the National Science Foundation (NSF) provides an exploratory environment for academic real-world experiments, such as the ORBIT testbed. A stable and repeatable procedure for experimentation on real testbeds is necessary and important to assure the validity of results. In this paper, a MANET routing algorithm, namely LORD, was tested on the ORBIT testbed, using the proposed procedure. Specifically, we first configure the wireless interface on each node to enable the communication between each pair of nodes. Then a set of methods are adopted to construct the MANETs scenario for test. The network status is monitored throughout the entire duration of experiments. Finally, the experiment results of LORD on the GENI ORBIT testbed are demonstrated.</td>
     1406</tr>
     1407
     1408
     1409
     1410
     1411
     1412
     1413</li>
     1414
     1415</table></div><br><br>
     1416
     1417
     1418
     1419
     1420<a class="EntryGoto" id="Cherukuri, Ramkumar and Liu, Xuan and Bavier, Andy and Sterbenz, James P. G. and Medhi, Deep"></a>
     1421<b class="myheading" style="position: relative; left: 5%;">Cherukuri, Ramkumar and Liu, Xuan and Bavier, Andy and Sterbenz, James P. G. and Medhi, Deep</b>
     1422
     1423<div class="BibEntry">
     1424
     1425<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1426
     1427<li>
     1428
     1429
     1430<tr>
     1431     <td valign="top">Author</td>
     1432     <td valign="top">Cherukuri, Ramkumar and Liu, Xuan and Bavier, Andy and Sterbenz, James P. G. and Medhi, Deep</td>
     1433</tr>
     1434
     1435<tr>
     1436     <td valign="top">Title</td>
     1437     <td valign="top">Network virtualization in GpENI: Framework, implementation &#x0026;amp; integration experience</td>
     1438</tr>
     1439
     1440<tr>
     1441     <td valign="top">Booktitle</td>
     1442     <td valign="top">12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops</td>
     1443</tr>
     1444
     1445<tr>
     1446     <td valign="top">Location</td>
     1447     <td valign="top">Dublin, Ireland</td>
     1448</tr>
     1449
     1450<tr>
     1451     <td valign="top">Publisher</td>
     1452     <td valign="top">IEEE</td>
     1453</tr>
     1454
     1455<tr>
     1456     <td valign="top">Year</td>
     1457     <td valign="top">2011</td>
     1458</tr>
     1459
     1460<tr>
     1461     <td valign="top">Abstract</td>
     1462     <td valign="top">Great Plains Environment for Network Innovation (GpENI) is an international testbed for future Internet research. A key component of GpENI is programmable network virtualization (GpENI-VINI). The scope of this paper is to present the framework, implementation and integration experience with network virtualization in GpENI. In particular, this is described through our experience of implementing and integrating the XORP (eXtensible Open Router Platform) routing platform into GpENI-VINI. Preliminary results on measurements and validation are presented.</td>
     1463</tr>
     1464
     1465
     1466
     1467<tr>
     1468     <td valign="top">DOI</td>
     1469     <td valign="top">10.1109/INM.2011.5990568</td>
     1470</tr>
     1471
     1472
     1473
     1474<tr>
     1475     <td valign="top">URL</td>
     1476     <td valign="top"><a href="http://dx.doi.org/10.1109/INM.2011.5990568">http://dx.doi.org/10.1109/INM.2011.5990568</a></td>
     1477</tr>
     1478
     1479
     1480</li>
     1481
     1482</table></div><br><br>
     1483
     1484
     1485
     1486
     1487<a class="EntryGoto" id="Chowdhury and Boutaba, Raouf"></a>
     1488<b class="myheading" style="position: relative; left: 5%;">Chowdhury and Boutaba, Raouf</b>
     1489
     1490<div class="BibEntry">
     1491
     1492<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1493
     1494<li>
     1495
     1496
     1497<tr>
     1498     <td valign="top">Author</td>
     1499     <td valign="top">Chowdhury and Boutaba, Raouf</td>
     1500</tr>
     1501
     1502<tr>
     1503     <td valign="top">Title</td>
     1504     <td valign="top">A survey of network virtualization</td>
    6861505</tr>
    6871506
     
    6931512<tr>
    6941513     <td valign="top">Year</td>
    695      <td valign="top">2014</td>
    696 </tr>
    697 
    698 <tr>
    699      <td valign="top">Abstract</td>
    700      <td valign="top">GENI, the Global Environment for Networking Innovation, is a distributed virtual laboratory for transformative, at-scale experiments in network science, services, and security. Designed in response to concerns over Internet ossification, GENI is enabling a wide variety of experiments in a range of areas, including clean-slate networking, protocol design and evaluation, distributed service offerings, social network integration, content management, and in-network service deployment. Recently, GENI has been leading an effort to explore the potential of its underlying technologies, SDN and GENI racks, in support of university campus network management and applications. With the concurrent deployment of these technologies on regional and national R&#x0026;E backbones, this will result in a revolutionary new national-scale distributed architecture, bringing to the entire network the shared, deeply programmable environment that the cloud has brought to the datacenter. This deeply programmable environment will support the GENI research mission and as well as enabling research in a wide variety of application areas.</td>
    701 </tr>
    702 
    703 
    704 
    705 <tr>
    706      <td valign="top">DOI</td>
    707      <td valign="top">10.1016/j.bjp.2013.12.037</td>
    708 </tr>
    709 
    710 
    711 
    712 <tr>
    713      <td valign="top">URL</td>
    714      <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.12.037">http://dx.doi.org/10.1016/j.bjp.2013.12.037</a></td>
    715 </tr>
    716 
    717 
    718 </table></div><br><br>
    719 
    720 
    721 
    722 
    723 <a class="EntryGoto" id="Berryman, Alex and Calyam, Prasad and Cecil, Joe and Adams, George B. and Comer, Douglas"></a>
    724 <b class="myheading" style="position: relative; left: 5%;">Berryman, Alex and Calyam, Prasad and Cecil, Joe and Adams, George B. and Comer, Douglas</b>
    725 
    726 <div class="BibEntry">
    727 
    728 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    729 
    730 
    731 <tr>
    732      <td valign="top">Author</td>
    733      <td valign="top">Berryman, Alex and Calyam, Prasad and Cecil, Joe and Adams, George B. and Comer, Douglas</td>
    734 </tr>
    735 
    736 <tr>
    737      <td valign="top">Title</td>
    738      <td valign="top">Advanced Manufacturing Use Cases and Early Results in GENI Infrastructure</td>
     1514     <td valign="top">2010</td>
     1515</tr>
     1516
     1517
     1518
     1519<tr>
     1520     <td valign="top">DOI</td>
     1521     <td valign="top">http://dx.doi.org/10.1016/j.comnet.2009.10.017</td>
     1522</tr>
     1523
     1524
     1525
     1526<tr>
     1527     <td valign="top">URL</td>
     1528     <td valign="top"><a href="http://www.sciencedirect.com/science/article/pii/S1389128609003387">http://www.sciencedirect.com/science/article/pii/S1389128609003387</a></td>
     1529</tr>
     1530
     1531
     1532</li>
     1533
     1534</table></div><br><br>
     1535
     1536
     1537
     1538
     1539<a class="EntryGoto" id="Das, S. and Yiakoumis, Y. and Parulkar, G. and McKeown, N. and Singh, P. and Getachew, D. and Desai, P. D."></a>
     1540<b class="myheading" style="position: relative; left: 5%;">Das, S. and Yiakoumis, Y. and Parulkar, G. and McKeown, N. and Singh, P. and Getachew, D. and Desai, P. D.</b>
     1541
     1542<div class="BibEntry">
     1543
     1544<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1545
     1546<li>
     1547
     1548
     1549<tr>
     1550     <td valign="top">Author</td>
     1551     <td valign="top">Das, S. and Yiakoumis, Y. and Parulkar, G. and McKeown, N. and Singh, P. and Getachew, D. and Desai, P. D.</td>
     1552</tr>
     1553
     1554<tr>
     1555     <td valign="top">Title</td>
     1556     <td valign="top">Application-aware aggregation and traffic engineering in a converged packet-circuit network</td>
     1557</tr>
     1558
     1559<tr>
     1560     <td valign="top">Booktitle</td>
     1561     <td valign="top">Optical Fiber Communication Conference and Exposition (OFC/NFOEC), 2011 and the National Fiber Optic Engineers Conference</td>
     1562</tr>
     1563
     1564<tr>
     1565     <td valign="top">Publisher</td>
     1566     <td valign="top">IEEE</td>
     1567</tr>
     1568
     1569<tr>
     1570     <td valign="top">Year</td>
     1571     <td valign="top">2011</td>
     1572</tr>
     1573
     1574
     1575
     1576
     1577
     1578<tr>
     1579     <td valign="top">URL</td>
     1580     <td valign="top"><a href="http://ieeexplore.ieee.org/xpls/abs&#x005F;all.jsp?arnumber=5875210">http://ieeexplore.ieee.org/xpls/abs&#x005F;all.jsp?arnumber=5875210</a></td>
     1581</tr>
     1582
     1583
     1584</li>
     1585
     1586</table></div><br><br>
     1587
     1588
     1589
     1590
     1591<a class="EntryGoto" id="Deng, Juan and Brooks, Richard R. and Martin, James"></a>
     1592<b class="myheading" style="position: relative; left: 5%;">Deng, Juan and Brooks, Richard R. and Martin, James</b>
     1593
     1594<div class="BibEntry">
     1595
     1596<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1597
     1598<li>
     1599
     1600
     1601<tr>
     1602     <td valign="top">Author</td>
     1603     <td valign="top">Deng, Juan and Brooks, Richard R. and Martin, James</td>
     1604</tr>
     1605
     1606<tr>
     1607     <td valign="top">Title</td>
     1608     <td valign="top">Assessing the Effect of WiMAX System Parameter Settings on MAC-level Local DoS Vulnerability</td>
     1609</tr>
     1610
     1611<tr>
     1612     <td valign="top">Journal</td>
     1613     <td valign="top">International Journal of Performability Engineering</td>
     1614</tr>
     1615
     1616<tr>
     1617     <td valign="top">Year</td>
     1618     <td valign="top">2012</td>
     1619</tr>
     1620
     1621<tr>
     1622     <td valign="top">Abstract</td>
     1623     <td valign="top">The research community has established that WiMAX networks suffer from Denial of Service (DoS) vulnerabilities. In this paper, we analyze how WiMAX system parameter settings increase or decrease DoS vulnerabilities of WiMAX networks. The behavior of the WiMAX MAC level protocol is sensitive to the settings of core system parameters. Unlike traditional network-based DoS attacks, attacks resulting from parameter misconfiguration are difficult for network operators to detect. We focus on bandwidth contention resolution aspects of the WiMAX MAC protocol. Simulations are performed using the ns-2 simulator. Analysis of Variance (ANOVA) techniques on the resulting simulation data identify which bandwidth contention resolution parameter combinations are crucial for configuring WiMAX to be less vulnerable to DoS attacks.</td>
     1624</tr>
     1625
     1626
     1627
     1628
     1629
     1630
     1631</li>
     1632
     1633</table></div><br><br>
     1634
     1635
     1636
     1637
     1638<a class="EntryGoto" id="Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Strum, Matt and Wong, Gary and Carpenter, Charles and Fei, Zongming and Griffioen, James and Nasir, Hussamuddin and Reed, Jeremy and Wu, Xiongqi"></a>
     1639<b class="myheading" style="position: relative; left: 5%;">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Strum, Matt and Wong, Gary and Carpenter, Charles and Fei, Zongming and Griffioen, James and Nasir, Hussamuddin and Reed, Jeremy and Wu, Xiongqi</b>
     1640
     1641<div class="BibEntry">
     1642
     1643<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1644
     1645<li>
     1646
     1647
     1648<tr>
     1649     <td valign="top">Author</td>
     1650     <td valign="top">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Strum, Matt and Wong, Gary and Carpenter, Charles and Fei, Zongming and Griffioen, James and Nasir, Hussamuddin and Reed, Jeremy and Wu, Xiongqi</td>
     1651</tr>
     1652
     1653<tr>
     1654     <td valign="top">Title</td>
     1655     <td valign="top">Getting started with GENI: a user tutorial</td>
     1656</tr>
     1657
     1658<tr>
     1659     <td valign="top">Journal</td>
     1660     <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
     1661</tr>
     1662
     1663<tr>
     1664     <td valign="top">Publisher</td>
     1665     <td valign="top">ACM</td>
     1666</tr>
     1667
     1668<tr>
     1669     <td valign="top">Address</td>
     1670     <td valign="top">New York, NY, USA</td>
     1671</tr>
     1672
     1673<tr>
     1674     <td valign="top">Year</td>
     1675     <td valign="top">2012</td>
     1676</tr>
     1677
     1678<tr>
     1679     <td valign="top">Abstract</td>
     1680     <td valign="top">GENI, the Global Environment for Network Innovations, is a National Science Foundation project to create a &#x76;&#x0308;irtual laboratory at the frontiers of network science and engineering for exploring future internets at scale.&#x20;&#x0308;It provides researchers, educators, and students with resources that they can use to build their own networks that span the country and - through federation - the world. GENI enables experimenters to try out bold new network architectures and designs for networked systems, and to deploy and evaluate these systems on a diverse set of resources over a large footprint. This tutorial is a starting point for running experiments on GENI. It provides an overview of GENI and covers the process of creating a network and running a simple experiment using two tools: the Flack GUI and the INSTOOLS instrumentation service.</td>
     1681</tr>
     1682
     1683
     1684
     1685<tr>
     1686     <td valign="top">DOI</td>
     1687     <td valign="top">10.1145/2096149.2096161</td>
     1688</tr>
     1689
     1690
     1691
     1692<tr>
     1693     <td valign="top">URL</td>
     1694     <td valign="top"><a href="http://dx.doi.org/10.1145/2096149.2096161">http://dx.doi.org/10.1145/2096149.2096161</a></td>
     1695</tr>
     1696
     1697
     1698</li>
     1699
     1700</table></div><br><br>
     1701
     1702
     1703
     1704
     1705<a class="EntryGoto" id="Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Wong, Gary and Chikkulapelly, Srikanth and Seok, Woojin"></a>
     1706<b class="myheading" style="position: relative; left: 5%;">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Wong, Gary and Chikkulapelly, Srikanth and Seok, Woojin</b>
     1707
     1708<div class="BibEntry">
     1709
     1710<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1711
     1712<li>
     1713
     1714
     1715<tr>
     1716     <td valign="top">Author</td>
     1717     <td valign="top">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Wong, Gary and Chikkulapelly, Srikanth and Seok, Woojin</td>
     1718</tr>
     1719
     1720<tr>
     1721     <td valign="top">Title</td>
     1722     <td valign="top">Designing a Federated Testbed as a Distributed System</td>
     1723</tr>
     1724
     1725<tr>
     1726     <td valign="top">Journal</td>
     1727     <td valign="top">8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2012)</td>
     1728</tr>
     1729
     1730<tr>
     1731     <td valign="top">Year</td>
     1732     <td valign="top">2012</td>
     1733</tr>
     1734
     1735<tr>
     1736     <td valign="top">Abstract</td>
     1737     <td valign="top">Traditionally, testbeds for networking and systems research have been stand-alone facilities: each is owned and operated by a single administrative entity, and is intended to be used independently of other testbeds. However, this isolated facility model is at odds with researchers' ever-increasing needs for experiments at larger scale and with a broader diversity of network technologies. The research community will be much better served by a federated model. In this model, each federated testbed maintains its own autonomy and unique strengths, but all federates work together to make their resources available under a common framework. Our challenge, then, is to design a federated testbed framework that balances competing needs: We must establish trust, but at the same time maintain the autonomy of each federated facility. While providing a unified interface to a broad set of resources, we need to expose the diversity that makes them valuable. Finally, our federation should work smoothly in a coordinated fashion, but avoid central points of failure and inter-facility dependencies. We argue that treating testbed design as a federated distributed systems problem is an effective approach to achieving this balance. The technique is illustrated through the example of ProtoGENI, a system we have designed, built, and operated according to the federated model.</td>
     1738</tr>
     1739
     1740
     1741
     1742
     1743
     1744
     1745</li>
     1746
     1747</table></div><br><br>
     1748
     1749
     1750
     1751
     1752<a class="EntryGoto" id="Elliott, Chip and Falk, Aaron"></a>
     1753<b class="myheading" style="position: relative; left: 5%;">Elliott, Chip and Falk, Aaron</b>
     1754
     1755<div class="BibEntry">
     1756
     1757<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1758
     1759<li>
     1760
     1761
     1762<tr>
     1763     <td valign="top">Author</td>
     1764     <td valign="top">Elliott, Chip and Falk, Aaron</td>
     1765</tr>
     1766
     1767<tr>
     1768     <td valign="top">Title</td>
     1769     <td valign="top">An update on the GENI project</td>
     1770</tr>
     1771
     1772<tr>
     1773     <td valign="top">Journal</td>
     1774     <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
     1775</tr>
     1776
     1777<tr>
     1778     <td valign="top">Publisher</td>
     1779     <td valign="top">ACM</td>
     1780</tr>
     1781
     1782<tr>
     1783     <td valign="top">Address</td>
     1784     <td valign="top">New York, NY, USA</td>
     1785</tr>
     1786
     1787<tr>
     1788     <td valign="top">Year</td>
     1789     <td valign="top">2009</td>
     1790</tr>
     1791
     1792<tr>
     1793     <td valign="top">Abstract</td>
     1794     <td valign="top">Environment for Network Innovations. Early prototypes of GENI are starting to come online as an end-to-end system and network researchers are invited to participate by engaging in the design process or using GENI to conduct experiments.</td>
     1795</tr>
     1796
     1797
     1798
     1799<tr>
     1800     <td valign="top">DOI</td>
     1801     <td valign="top">10.1145/1568613.1568620</td>
     1802</tr>
     1803
     1804
     1805
     1806<tr>
     1807     <td valign="top">URL</td>
     1808     <td valign="top"><a href="http://dx.doi.org/10.1145/1568613.1568620">http://dx.doi.org/10.1145/1568613.1568620</a></td>
     1809</tr>
     1810
     1811
     1812</li>
     1813
     1814</table></div><br><br>
     1815
     1816
     1817
     1818
     1819<a class="EntryGoto" id="Erazo, Miguel A. and Liu, Jason"></a>
     1820<b class="myheading" style="position: relative; left: 5%;">Erazo, Miguel A. and Liu, Jason</b>
     1821
     1822<div class="BibEntry">
     1823
     1824<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1825
     1826<li>
     1827
     1828
     1829<tr>
     1830     <td valign="top">Author</td>
     1831     <td valign="top">Erazo, Miguel A. and Liu, Jason</td>
     1832</tr>
     1833
     1834<tr>
     1835     <td valign="top">Title</td>
     1836     <td valign="top">On enabling real-time large-scale network simulation in GENI: the PrimoGENI approach</td>
     1837</tr>
     1838
     1839<tr>
     1840     <td valign="top">Booktitle</td>
     1841     <td valign="top">Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques</td>
     1842</tr>
     1843
     1844<tr>
     1845     <td valign="top">Location</td>
     1846     <td valign="top">Torremolinos, Malaga, Spain</td>
     1847</tr>
     1848
     1849<tr>
     1850     <td valign="top">Publisher</td>
     1851     <td valign="top">ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)</td>
     1852</tr>
     1853
     1854<tr>
     1855     <td valign="top">Address</td>
     1856     <td valign="top">ICST, Brussels, Belgium, Belgium</td>
     1857</tr>
     1858
     1859<tr>
     1860     <td valign="top">Year</td>
     1861     <td valign="top">2010</td>
     1862</tr>
     1863
     1864<tr>
     1865     <td valign="top">Abstract</td>
     1866     <td valign="top">The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform, a &#x76;&#x0308;irtual laboratory&#x20;&#x0308;for the design, implementation and evaluation of future Internets. In this paper, we present an overview of PrimoGENI, a GENI project with the goal of extending the GENI suite of interoperable infrastructure to allow network experiments at scale, involving physical, simulated and emulated network entities.</td>
     1867</tr>
     1868
     1869
     1870
     1871<tr>
     1872     <td valign="top">DOI</td>
     1873     <td valign="top">10.4108/ICST.SIMUTOOLS2010.8636</td>
     1874</tr>
     1875
     1876
     1877
     1878<tr>
     1879     <td valign="top">URL</td>
     1880     <td valign="top"><a href="http://dx.doi.org/10.4108/ICST.SIMUTOOLS2010.8636">http://dx.doi.org/10.4108/ICST.SIMUTOOLS2010.8636</a></td>
     1881</tr>
     1882
     1883
     1884</li>
     1885
     1886</table></div><br><br>
     1887
     1888
     1889
     1890
     1891<a class="EntryGoto" id="Esposito, Flavio and Wang, Yuefeng and Matta, Ibrahim and Day, John"></a>
     1892<b class="myheading" style="position: relative; left: 5%;">Esposito, Flavio and Wang, Yuefeng and Matta, Ibrahim and Day, John</b>
     1893
     1894<div class="BibEntry">
     1895
     1896<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1897
     1898<li>
     1899
     1900
     1901<tr>
     1902     <td valign="top">Author</td>
     1903     <td valign="top">Esposito, Flavio and Wang, Yuefeng and Matta, Ibrahim and Day, John</td>
     1904</tr>
     1905
     1906<tr>
     1907     <td valign="top">Title</td>
     1908     <td valign="top">Dynamic Layer Instantiation as a Service</td>
     1909</tr>
     1910
     1911<tr>
     1912     <td valign="top">Location</td>
     1913     <td valign="top">Lombard, IL</td>
     1914</tr>
     1915
     1916<tr>
     1917     <td valign="top">Publisher</td>
     1918     <td valign="top">USENIX Association</td>
     1919</tr>
     1920
     1921<tr>
     1922     <td valign="top">Address</td>
     1923     <td valign="top">Berkeley, CA, USA</td>
     1924</tr>
     1925
     1926<tr>
     1927     <td valign="top">Year</td>
     1928     <td valign="top">2013</td>
     1929</tr>
     1930
     1931
     1932
     1933
     1934
     1935<tr>
     1936     <td valign="top">URL</td>
     1937     <td valign="top"><a href="https://www.usenix.org/system/files/nsdip13-paper11.pdf">https://www.usenix.org/system/files/nsdip13-paper11.pdf</a></td>
     1938</tr>
     1939
     1940
     1941</li>
     1942
     1943</table></div><br><br>
     1944
     1945
     1946
     1947
     1948<a class="EntryGoto" id="Feamster, Nick and Gao, Lixin and Rexford, Jennifer"></a>
     1949<b class="myheading" style="position: relative; left: 5%;">Feamster, Nick and Gao, Lixin and Rexford, Jennifer</b>
     1950
     1951<div class="BibEntry">
     1952
     1953<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1954
     1955<li>
     1956
     1957
     1958<tr>
     1959     <td valign="top">Author</td>
     1960     <td valign="top">Feamster, Nick and Gao, Lixin and Rexford, Jennifer</td>
     1961</tr>
     1962
     1963<tr>
     1964     <td valign="top">Title</td>
     1965     <td valign="top">How to lease the internet in your spare time</td>
     1966</tr>
     1967
     1968<tr>
     1969     <td valign="top">Journal</td>
     1970     <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
     1971</tr>
     1972
     1973<tr>
     1974     <td valign="top">Publisher</td>
     1975     <td valign="top">ACM</td>
     1976</tr>
     1977
     1978<tr>
     1979     <td valign="top">Address</td>
     1980     <td valign="top">New York, NY, USA</td>
     1981</tr>
     1982
     1983<tr>
     1984     <td valign="top">Year</td>
     1985     <td valign="top">2007</td>
     1986</tr>
     1987
     1988
     1989
     1990<tr>
     1991     <td valign="top">DOI</td>
     1992     <td valign="top">10.1145/1198255.1198265</td>
     1993</tr>
     1994
     1995
     1996
     1997<tr>
     1998     <td valign="top">URL</td>
     1999     <td valign="top"><a href="http://doi.acm.org/10.1145/1198255.1198265">http://doi.acm.org/10.1145/1198255.1198265</a></td>
     2000</tr>
     2001
     2002
     2003</li>
     2004
     2005</table></div><br><br>
     2006
     2007
     2008
     2009
     2010<a class="EntryGoto" id="Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram"></a>
     2011<b class="myheading" style="position: relative; left: 5%;">Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram</b>
     2012
     2013<div class="BibEntry">
     2014
     2015<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2016
     2017<li>
     2018
     2019
     2020<tr>
     2021     <td valign="top">Author</td>
     2022     <td valign="top">Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram</td>
     2023</tr>
     2024
     2025<tr>
     2026     <td valign="top">Title</td>
     2027     <td valign="top">Decoupling policy from configuration in campus and enterprise networks</td>
     2028</tr>
     2029
     2030<tr>
     2031     <td valign="top">Booktitle</td>
     2032     <td valign="top">2010 17th IEEE Workshop on Local &#x0026; Metropolitan Area Networks (LANMAN)</td>
     2033</tr>
     2034
     2035<tr>
     2036     <td valign="top">Location</td>
     2037     <td valign="top">Long Branch, NJ, USA</td>
     2038</tr>
     2039
     2040<tr>
     2041     <td valign="top">Publisher</td>
     2042     <td valign="top">IEEE</td>
     2043</tr>
     2044
     2045<tr>
     2046     <td valign="top">Year</td>
     2047     <td valign="top">2010</td>
     2048</tr>
     2049
     2050<tr>
     2051     <td valign="top">Abstract</td>
     2052     <td valign="top">This paper surveys our ongoing work on the use of software-defined networking to simplify two acute policy problems in campus and enterprise network operations: access control and information flow control. We describe how the current coupling of high-level policy with low-level configuration makes these problems challenging today. We describe the specific policy problems faced by campus and enterprise network operators; illustrate our approach, which leverages recent trends in separating the network's ” control plane” from the data plane; and show how this approach can be applied to simplify these two enterprise network management tasks. We also describe our ongoing deployment efforts to build a campus network testbed where trial designs can be deployed and evaluated. We close with a summary of current and future research challenges for solving challenges within enterprise networks within the context of this new paradigm.</td>
     2053</tr>
     2054
     2055
     2056
     2057<tr>
     2058     <td valign="top">DOI</td>
     2059     <td valign="top">10.1109/LANMAN.2010.5507162</td>
     2060</tr>
     2061
     2062
     2063
     2064<tr>
     2065     <td valign="top">URL</td>
     2066     <td valign="top"><a href="http://dx.doi.org/10.1109/LANMAN.2010.5507162">http://dx.doi.org/10.1109/LANMAN.2010.5507162</a></td>
     2067</tr>
     2068
     2069
     2070</li>
     2071
     2072</table></div><br><br>
     2073
     2074
     2075
     2076
     2077<a class="EntryGoto" id="Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning"></a>
     2078<b class="myheading" style="position: relative; left: 5%;">Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning</b>
     2079
     2080<div class="BibEntry">
     2081
     2082<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2083
     2084<li>
     2085
     2086
     2087<tr>
     2088     <td valign="top">Author</td>
     2089     <td valign="top">Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning</td>
     2090</tr>
     2091
     2092<tr>
     2093     <td valign="top">Title</td>
     2094     <td valign="top">An enabling platform for autonomic management of the future internet</td>
     2095</tr>
     2096
     2097<tr>
     2098     <td valign="top">Journal</td>
     2099     <td valign="top">IEEE Network</td>
     2100</tr>
     2101
     2102<tr>
     2103     <td valign="top">Year</td>
     2104     <td valign="top">2011</td>
     2105</tr>
     2106
     2107<tr>
     2108     <td valign="top">Abstract</td>
     2109     <td valign="top">This article shows an autonomic management solution based on the recently defined programmable node architecture NetServ. The article starts with a general description of the classical network management requirements and their adaptation to the expected network evolution. After a description of the major issues characterizing the management of the expected Future Internet, the main autonomic management paradigms, and some recently introduced autonomic service platforms, we show and demonstrate the effectiveness of the NetServ architecture. Born as a means to deploy and execute networked services at runtime over programmable routers, NetServ has proved to be a suitable environment for hosting an autonomic management architecture.</td>
     2110</tr>
     2111
     2112
     2113
     2114<tr>
     2115     <td valign="top">DOI</td>
     2116     <td valign="top">10.1109/MNET.2011.6085639</td>
     2117</tr>
     2118
     2119
     2120
     2121<tr>
     2122     <td valign="top">URL</td>
     2123     <td valign="top"><a href="http://dx.doi.org/10.1109/MNET.2011.6085639">http://dx.doi.org/10.1109/MNET.2011.6085639</a></td>
     2124</tr>
     2125
     2126
     2127</li>
     2128
     2129</table></div><br><br>
     2130
     2131
     2132
     2133
     2134<a class="EntryGoto" id="Fund, Fraida and Wang, Cong and Korakis, Thanasis and Zink, Michael and Panwar, Shivendra"></a>
     2135<b class="myheading" style="position: relative; left: 5%;">Fund, Fraida and Wang, Cong and Korakis, Thanasis and Zink, Michael and Panwar, Shivendra</b>
     2136
     2137<div class="BibEntry">
     2138
     2139<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2140
     2141<li>
     2142
     2143
     2144<tr>
     2145     <td valign="top">Author</td>
     2146     <td valign="top">Fund, Fraida and Wang, Cong and Korakis, Thanasis and Zink, Michael and Panwar, Shivendra</td>
     2147</tr>
     2148
     2149<tr>
     2150     <td valign="top">Title</td>
     2151     <td valign="top">GENI WiMAX Performance: Evaluation and Comparison of Two Campus Testbeds</td>
    7392152</tr>
    7402153
     
    7632176<tr>
    7642177     <td valign="top">DOI</td>
    765      <td valign="top">10.1109/GREE.2013.13</td>
    766 </tr>
    767 
    768 
    769 
    770 <tr>
    771      <td valign="top">URL</td>
    772      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.13">http://dx.doi.org/10.1109/GREE.2013.13</a></td>
    773 </tr>
    774 
    775 
    776 </table></div><br><br>
    777 
    778 
    779 
    780 
    781 <a class="EntryGoto" id="Bhanage, G. and Daya, R. and Seskar, I. and Raychaudhuri, D."></a>
    782 <b class="myheading" style="position: relative; left: 5%;">Bhanage, G. and Daya, R. and Seskar, I. and Raychaudhuri, D.</b>
    783 
    784 <div class="BibEntry">
    785 
    786 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    787 
    788 
    789 <tr>
    790      <td valign="top">Author</td>
    791      <td valign="top">Bhanage, G. and Daya, R. and Seskar, I. and Raychaudhuri, D.</td>
    792 </tr>
    793 
    794 <tr>
    795      <td valign="top">Title</td>
    796      <td valign="top">VNTS: A Virtual Network Traffic Shaper for Air Time Fairness in 802.16e Systems</td>
    797 </tr>
    798 
    799 <tr>
    800      <td valign="top">Booktitle</td>
    801      <td valign="top">Communications (ICC), 2010 IEEE International Conference on</td>
     2178     <td valign="top">10.1109/GREE.2013.23</td>
     2179</tr>
     2180
     2181
     2182
     2183<tr>
     2184     <td valign="top">URL</td>
     2185     <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.23">http://dx.doi.org/10.1109/GREE.2013.23</a></td>
     2186</tr>
     2187
     2188
     2189</li>
     2190
     2191</table></div><br><br>
     2192
     2193
     2194
     2195
     2196<a class="EntryGoto" id="Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia"></a>
     2197<b class="myheading" style="position: relative; left: 5%;">Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</b>
     2198
     2199<div class="BibEntry">
     2200
     2201<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2202
     2203<li>
     2204
     2205
     2206<tr>
     2207     <td valign="top">Author</td>
     2208     <td valign="top">Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</td>
     2209</tr>
     2210
     2211<tr>
     2212     <td valign="top">Title</td>
     2213     <td valign="top">Exercises for Graduate Students using GENI</td>
     2214</tr>
     2215
     2216<tr>
     2217     <td valign="top">Booktitle</td>
     2218     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     2219</tr>
     2220
     2221<tr>
     2222     <td valign="top">Location</td>
     2223     <td valign="top">Los Angeles</td>
     2224</tr>
     2225
     2226<tr>
     2227     <td valign="top">Year</td>
     2228     <td valign="top">2012</td>
     2229</tr>
     2230
     2231<tr>
     2232     <td valign="top">Abstract</td>
     2233     <td valign="top">GENI brings together a wide variety of heterogeneous networking infrastructure and technologies under a common platform. We propose programming exercises for graduate students to introduce GENI and enable students to conduct high fidelity networking experiments. In this paper, we focus on an exercise to study congestion control and reliability using the ProtoGENI aggregate. A planned second exercise aims to leverage GENI OpenFlow aggregates to study firewalls and QoS mechanisms. We believe that these lab exercises will expose students to key networking concepts and recent research directions, e.g., in the data center context.</td>
     2234</tr>
     2235
     2236
     2237
     2238
     2239
     2240
     2241</li>
     2242
     2243</table></div><br><br>
     2244
     2245
     2246
     2247
     2248<a class="EntryGoto" id="Gangam, Sriharsha and Fahmy, Sonia"></a>
     2249<b class="myheading" style="position: relative; left: 5%;">Gangam, Sriharsha and Fahmy, Sonia</b>
     2250
     2251<div class="BibEntry">
     2252
     2253<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2254
     2255<li>
     2256
     2257
     2258<tr>
     2259     <td valign="top">Author</td>
     2260     <td valign="top">Gangam, Sriharsha and Fahmy, Sonia</td>
     2261</tr>
     2262
     2263<tr>
     2264     <td valign="top">Title</td>
     2265     <td valign="top">Mitigating interference in a network measurement service</td>
     2266</tr>
     2267
     2268<tr>
     2269     <td valign="top">Booktitle</td>
     2270     <td valign="top">2011 IEEE Nineteenth IEEE International Workshop on Quality of Service</td>
     2271</tr>
     2272
     2273<tr>
     2274     <td valign="top">Location</td>
     2275     <td valign="top">San Jose, CA, USA</td>
    8022276</tr>
    8032277
     
    8092283<tr>
    8102284     <td valign="top">Year</td>
     2285     <td valign="top">2011</td>
     2286</tr>
     2287
     2288<tr>
     2289     <td valign="top">Abstract</td>
     2290     <td valign="top">Shared measurement services offer key advantages over conventional ad-hoc techniques for network monitoring. A measurement service may receive measurement requests concurrently from different applications and network administrators. These measurement requests are often served by injecting active network measurement traffic between two hosts. Two active measurements are said to interfere when the probe packets of one measurement tool are viewed as network traffic by the other. This may lead to faulty measurement readings. In this paper, we model the measurement interference problem, and show how to schedule measurement tasks to reduce interference and hence increase measurement accuracy. We propose twelve computationally tractable algorithms that decrease the total completion time (makespan) of measurement tasks, while avoiding interference. Our evaluation shows that the algorithm we refer to as Largest Area First, Busiest Node First - Earliest Interval Schedule (LAFBNF-EIS) has a mean makespan of about 5&#x0025; more than the theoretical lower bound over our set of measurement workloads.</td>
     2291</tr>
     2292
     2293
     2294
     2295<tr>
     2296     <td valign="top">DOI</td>
     2297     <td valign="top">10.1109/IWQOS.2011.5931347</td>
     2298</tr>
     2299
     2300
     2301
     2302<tr>
     2303     <td valign="top">URL</td>
     2304     <td valign="top"><a href="http://dx.doi.org/10.1109/IWQOS.2011.5931347">http://dx.doi.org/10.1109/IWQOS.2011.5931347</a></td>
     2305</tr>
     2306
     2307
     2308</li>
     2309
     2310</table></div><br><br>
     2311
     2312
     2313
     2314
     2315<a class="EntryGoto" id="Gao, Jingcheng and Xiao, Yang"></a>
     2316<b class="myheading" style="position: relative; left: 5%;">Gao, Jingcheng and Xiao, Yang</b>
     2317
     2318<div class="BibEntry">
     2319
     2320<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2321
     2322<li>
     2323
     2324
     2325<tr>
     2326     <td valign="top">Author</td>
     2327     <td valign="top">Gao, Jingcheng and Xiao, Yang</td>
     2328</tr>
     2329
     2330<tr>
     2331     <td valign="top">Title</td>
     2332     <td valign="top">ProtoGENI DoS/DDoS Security Tests and Experiments</td>
     2333</tr>
     2334
     2335<tr>
     2336     <td valign="top">Booktitle</td>
     2337     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     2338</tr>
     2339
     2340<tr>
     2341     <td valign="top">Location</td>
     2342     <td valign="top">Los Angeles</td>
     2343</tr>
     2344
     2345<tr>
     2346     <td valign="top">Year</td>
     2347     <td valign="top">2012</td>
     2348</tr>
     2349
     2350<tr>
     2351     <td valign="top">Abstract</td>
     2352     <td valign="top">his paper will explain some tests and experiments to investigate selected security issues through ProtoGENI mainly during Spiral 3 time period and the beginning of Spiral 4. In this paper, we conduct multiple sets of DoS/ DDoS attacks in the current ProtoGENI testbed. These attacks show that it is very possible that ProtoGENI nodes may render vulnerabilities to such attacks.</td>
     2353</tr>
     2354
     2355
     2356
     2357
     2358
     2359
     2360</li>
     2361
     2362</table></div><br><br>
     2363
     2364
     2365
     2366
     2367<a class="EntryGoto" id="Gember, Aaron and Dragga, Chris and Akella, Aditya"></a>
     2368<b class="myheading" style="position: relative; left: 5%;">Gember, Aaron and Dragga, Chris and Akella, Aditya</b>
     2369
     2370<div class="BibEntry">
     2371
     2372<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2373
     2374<li>
     2375
     2376
     2377<tr>
     2378     <td valign="top">Author</td>
     2379     <td valign="top">Gember, Aaron and Dragga, Chris and Akella, Aditya</td>
     2380</tr>
     2381
     2382<tr>
     2383     <td valign="top">Title</td>
     2384     <td valign="top">ECOS: Practical Mobile Application Offloading for Enterprises</td>
     2385</tr>
     2386
     2387<tr>
     2388     <td valign="top">Booktitle</td>
     2389     <td valign="top">2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE '12)</td>
     2390</tr>
     2391
     2392<tr>
     2393     <td valign="top">Year</td>
     2394     <td valign="top">2012</td>
     2395</tr>
     2396
     2397<tr>
     2398     <td valign="top">Abstract</td>
     2399     <td valign="top">Offloading has emerged as a promising idea to allow handheld devices to access intensive applications without performance or energy costs. This could be particularly useful for enterprises seeking to run line-of-business applications on handhelds. However, we must address two practical roadblocks in order to make offloading amenable for enterprises: (i) ensuring data privacy and the use of trusted offloading resources, and (ii) accommodating offload at scale with diverse handheld objectives and compute resource capabilities. We present the design and implementation of an Enterprise-Centric Offloading System (ECOS) which augments prior offloading proposals to address these issues. ECOS uses a logically central controller to opportunistically leverage diverse compute resources, while tightly controlling where specific applications offload depending on privacy, performance, and energy constraints of users and applications. A wide range of experiments using a real prototype establish the effectiveness of our approach.</td>
     2400</tr>
     2401
     2402
     2403
     2404
     2405
     2406<tr>
     2407     <td valign="top">URL</td>
     2408     <td valign="top"><a href="http://www.usenix.org/conference/hot-ice12/ecos-practical-mobile-application-of&#x0025;EF&#x0025;AC&#x0025;82oading-enterprises">http://www.usenix.org/conference/hot-ice12/ecos-practical-mobile-application-of&#x0025;EF&#x0025;AC&#x0025;82oading-enterprises</a></td>
     2409</tr>
     2410
     2411
     2412</li>
     2413
     2414</table></div><br><br>
     2415
     2416
     2417
     2418
     2419<a class="EntryGoto" id="Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David"></a>
     2420<b class="myheading" style="position: relative; left: 5%;">Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David</b>
     2421
     2422<div class="BibEntry">
     2423
     2424<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2425
     2426<li>
     2427
     2428
     2429<tr>
     2430     <td valign="top">Author</td>
     2431     <td valign="top">Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David</td>
     2432</tr>
     2433
     2434<tr>
     2435     <td valign="top">Title</td>
     2436     <td valign="top">Supporting network evolution and incremental deployment with XIA</td>
     2437</tr>
     2438
     2439<tr>
     2440     <td valign="top">Booktitle</td>
     2441     <td valign="top">Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication</td>
     2442</tr>
     2443
     2444<tr>
     2445     <td valign="top">Location</td>
     2446     <td valign="top">Helsinki, Finland</td>
     2447</tr>
     2448
     2449<tr>
     2450     <td valign="top">Publisher</td>
     2451     <td valign="top">ACM</td>
     2452</tr>
     2453
     2454<tr>
     2455     <td valign="top">Address</td>
     2456     <td valign="top">New York, NY, USA</td>
     2457</tr>
     2458
     2459<tr>
     2460     <td valign="top">Year</td>
     2461     <td valign="top">2012</td>
     2462</tr>
     2463
     2464<tr>
     2465     <td valign="top">Abstract</td>
     2466     <td valign="top">eXpressive Internet Architecture (XIA) [1] is an architecture that natively supports multiple communication types and allows networks to evolve their abstractions and functionality to accommodate new styles of communication over time. XIA embeds an elegant mechanism for handling unforeseen communication types for legacy routers. In this demonstration, we show that XIA overcomes three key barriers in network evolution (outlined below) by (1) allowing end-hosts and applications to start using new communication types (e.g., service and content) before the network supports them, (2) ensuring that upgrading a subset of routers to support new functionalities immediately benefits applications, and (3) using the same mechanisms we employ for 1 and 2 to incrementally deploy XIA in IP networks.</td>
     2467</tr>
     2468
     2469
     2470
     2471<tr>
     2472     <td valign="top">DOI</td>
     2473     <td valign="top">10.1145/2342356.2342410</td>
     2474</tr>
     2475
     2476
     2477
     2478<tr>
     2479     <td valign="top">URL</td>
     2480     <td valign="top"><a href="http://dx.doi.org/10.1145/2342356.2342410">http://dx.doi.org/10.1145/2342356.2342410</a></td>
     2481</tr>
     2482
     2483
     2484</li>
     2485
     2486</table></div><br><br>
     2487
     2488
     2489
     2490
     2491<a class="EntryGoto" id="Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C."></a>
     2492<b class="myheading" style="position: relative; left: 5%;">Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</b>
     2493
     2494<div class="BibEntry">
     2495
     2496<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2497
     2498<li>
     2499
     2500
     2501<tr>
     2502     <td valign="top">Author</td>
     2503     <td valign="top">Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</td>
     2504</tr>
     2505
     2506<tr>
     2507     <td valign="top">Title</td>
     2508     <td valign="top">The design of an instrumentation system for federated and virtualized network testbeds</td>
     2509</tr>
     2510
     2511<tr>
     2512     <td valign="top">Booktitle</td>
     2513     <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td>
     2514</tr>
     2515
     2516<tr>
     2517     <td valign="top">Publisher</td>
     2518     <td valign="top">IEEE</td>
     2519</tr>
     2520
     2521<tr>
     2522     <td valign="top">Year</td>
     2523     <td valign="top">2012</td>
     2524</tr>
     2525
     2526<tr>
     2527     <td valign="top">Abstract</td>
     2528     <td valign="top">Much of the GENI effort in developing network testbeds has been focused on building the control frameworks needed to allocate and initialize the network resources that make up an experiment. We argue that building the instrumentation and measurement system to monitor and capture the behavior of the network is just as important and challenging as setting up the network itself, especially in a virtualized and federated environment where getting information from experimental nodes is too complicated and too much to handle for a typical user. In this paper, we describe the design of an instrumentation and measurement infrastructure that allows users to monitor their experiments. The challenge that virtualization and federation of GENI testbeds bring to instrumentation and monitoring is how to hide the details of instrumentation setup from users so that users do not need to be experts in system administration or network management of virtualized and federated systems, but are still able to ” see” what is going on with their experiments. Our instrumentation tool sets up experiment-specific monitoring infrastructure that is tailored to capture, record, and display only information associated with that experiment. Our tools are currently available in GENI, and we present a simple example of how to use them to instrument an experiment.</td>
     2529</tr>
     2530
     2531
     2532
     2533<tr>
     2534     <td valign="top">DOI</td>
     2535     <td valign="top">10.1109/NOMS.2012.6212061</td>
     2536</tr>
     2537
     2538
     2539
     2540<tr>
     2541     <td valign="top">URL</td>
     2542     <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6212061">http://dx.doi.org/10.1109/NOMS.2012.6212061</a></td>
     2543</tr>
     2544
     2545
     2546</li>
     2547
     2548</table></div><br><br>
     2549
     2550
     2551
     2552
     2553<a class="EntryGoto" id="Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles"></a>
     2554<b class="myheading" style="position: relative; left: 5%;">Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</b>
     2555
     2556<div class="BibEntry">
     2557
     2558<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2559
     2560<li>
     2561
     2562
     2563<tr>
     2564     <td valign="top">Author</td>
     2565     <td valign="top">Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td>
     2566</tr>
     2567
     2568<tr>
     2569     <td valign="top">Title</td>
     2570     <td valign="top">GENI-enabled Programming Experiments for Networking Classes</td>
     2571</tr>
     2572
     2573<tr>
     2574     <td valign="top">Booktitle</td>
     2575     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     2576</tr>
     2577
     2578<tr>
     2579     <td valign="top">Location</td>
     2580     <td valign="top">Salt Lake City, UT</td>
     2581</tr>
     2582
     2583<tr>
     2584     <td valign="top">Publisher</td>
     2585     <td valign="top">IEEE</td>
     2586</tr>
     2587
     2588<tr>
     2589     <td valign="top">Year</td>
     2590     <td valign="top">2013</td>
     2591</tr>
     2592
     2593
     2594
     2595<tr>
     2596     <td valign="top">DOI</td>
     2597     <td valign="top">10.1109/GREE.2013.30</td>
     2598</tr>
     2599
     2600
     2601
     2602<tr>
     2603     <td valign="top">URL</td>
     2604     <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.30">http://dx.doi.org/10.1109/GREE.2013.30</a></td>
     2605</tr>
     2606
     2607
     2608</li>
     2609
     2610</table></div><br><br>
     2611
     2612
     2613
     2614
     2615<a class="EntryGoto" id="Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles"></a>
     2616<b class="myheading" style="position: relative; left: 5%;">Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</b>
     2617
     2618<div class="BibEntry">
     2619
     2620<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2621
     2622<li>
     2623
     2624
     2625<tr>
     2626     <td valign="top">Author</td>
     2627     <td valign="top">Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td>
     2628</tr>
     2629
     2630<tr>
     2631     <td valign="top">Title</td>
     2632     <td valign="top">Teaching with the Emerging GENI Network</td>
     2633</tr>
     2634
     2635<tr>
     2636     <td valign="top">Booktitle</td>
     2637     <td valign="top">Proceedings of the 2012 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS)</td>
     2638</tr>
     2639
     2640<tr>
     2641     <td valign="top">Location</td>
     2642     <td valign="top">Las Vegas</td>
     2643</tr>
     2644
     2645<tr>
     2646     <td valign="top">Year</td>
     2647     <td valign="top">2012</td>
     2648</tr>
     2649
     2650
     2651
     2652
     2653
     2654
     2655</li>
     2656
     2657</table></div><br><br>
     2658
     2659
     2660
     2661
     2662<a class="EntryGoto" id="Guan, Xinjie and Choi, Baek-Young and Song, Sejun"></a>
     2663<b class="myheading" style="position: relative; left: 5%;">Guan, Xinjie and Choi, Baek-Young and Song, Sejun</b>
     2664
     2665<div class="BibEntry">
     2666
     2667<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2668
     2669<li>
     2670
     2671
     2672<tr>
     2673     <td valign="top">Author</td>
     2674     <td valign="top">Guan, Xinjie and Choi, Baek-Young and Song, Sejun</td>
     2675</tr>
     2676
     2677<tr>
     2678     <td valign="top">Title</td>
     2679     <td valign="top">Reliability and Scalability Issues in Software Defined Network Frameworks</td>
     2680</tr>
     2681
     2682<tr>
     2683     <td valign="top">Booktitle</td>
     2684     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     2685</tr>
     2686
     2687<tr>
     2688     <td valign="top">Location</td>
     2689     <td valign="top">Salt Lake City, UT</td>
     2690</tr>
     2691
     2692<tr>
     2693     <td valign="top">Publisher</td>
     2694     <td valign="top">IEEE</td>
     2695</tr>
     2696
     2697<tr>
     2698     <td valign="top">Year</td>
     2699     <td valign="top">2013</td>
     2700</tr>
     2701
     2702
     2703
     2704<tr>
     2705     <td valign="top">DOI</td>
     2706     <td valign="top">10.1109/GREE.2013.28</td>
     2707</tr>
     2708
     2709
     2710
     2711<tr>
     2712     <td valign="top">URL</td>
     2713     <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.28">http://dx.doi.org/10.1109/GREE.2013.28</a></td>
     2714</tr>
     2715
     2716
     2717</li>
     2718
     2719</table></div><br><br>
     2720
     2721
     2722
     2723
     2724<a class="EntryGoto" id="Herron, Jon-Paul"></a>
     2725<b class="myheading" style="position: relative; left: 5%;">Herron, Jon-Paul</b>
     2726
     2727<div class="BibEntry">
     2728
     2729<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2730
     2731<li>
     2732
     2733
     2734<tr>
     2735     <td valign="top">Author</td>
     2736     <td valign="top">Herron, Jon-Paul</td>
     2737</tr>
     2738
     2739<tr>
     2740     <td valign="top">Title</td>
     2741     <td valign="top">GENI Meta-Operations Center</td>
     2742</tr>
     2743
     2744<tr>
     2745     <td valign="top">Booktitle</td>
     2746     <td valign="top">2008 IEEE Fourth International Conference on eScience</td>
     2747</tr>
     2748
     2749<tr>
     2750     <td valign="top">Location</td>
     2751     <td valign="top">Indianapolis, IN, USA</td>
     2752</tr>
     2753
     2754<tr>
     2755     <td valign="top">Publisher</td>
     2756     <td valign="top">IEEE</td>
     2757</tr>
     2758
     2759<tr>
     2760     <td valign="top">Year</td>
     2761     <td valign="top">2008</td>
     2762</tr>
     2763
     2764<tr>
     2765     <td valign="top">Abstract</td>
     2766     <td valign="top">NSF's GENI program represents an opportunity to build the kind of programmable, virtualized testbed scientists exploring the future of networking will need to support their research. As with any other scientific instrument, it will be crucial that the GENI infrastructure offer repeatable, consistent results to the researchers using it.The GENI Meta-Operations Center, operated by the Global Research NOC at Indiana University, will develop the software, protocols, and processes needed to ensure the repeatability, consistency, and efficiency of GENI.</td>
     2767</tr>
     2768
     2769
     2770
     2771<tr>
     2772     <td valign="top">DOI</td>
     2773     <td valign="top">10.1109/eScience.2008.103</td>
     2774</tr>
     2775
     2776
     2777
     2778<tr>
     2779     <td valign="top">URL</td>
     2780     <td valign="top"><a href="http://dx.doi.org/10.1109/eScience.2008.103">http://dx.doi.org/10.1109/eScience.2008.103</a></td>
     2781</tr>
     2782
     2783
     2784</li>
     2785
     2786</table></div><br><br>
     2787
     2788
     2789
     2790
     2791<a class="EntryGoto" id="Huang, Shufeng and Griffioen, James and Calvert, Kenneth L."></a>
     2792<b class="myheading" style="position: relative; left: 5%;">Huang, Shufeng and Griffioen, James and Calvert, Kenneth L.</b>
     2793
     2794<div class="BibEntry">
     2795
     2796<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2797
     2798<li>
     2799
     2800
     2801<tr>
     2802     <td valign="top">Author</td>
     2803     <td valign="top">Huang, Shufeng and Griffioen, James and Calvert, Kenneth L.</td>
     2804</tr>
     2805
     2806<tr>
     2807     <td valign="top">Title</td>
     2808     <td valign="top">Fast-tracking GENI Experiments using HyperNets</td>
     2809</tr>
     2810
     2811<tr>
     2812     <td valign="top">Booktitle</td>
     2813     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     2814</tr>
     2815
     2816<tr>
     2817     <td valign="top">Location</td>
     2818     <td valign="top">Salt Lake City, UT</td>
     2819</tr>
     2820
     2821<tr>
     2822     <td valign="top">Publisher</td>
     2823     <td valign="top">IEEE</td>
     2824</tr>
     2825
     2826<tr>
     2827     <td valign="top">Year</td>
     2828     <td valign="top">2013</td>
     2829</tr>
     2830
     2831
     2832
     2833<tr>
     2834     <td valign="top">DOI</td>
     2835     <td valign="top">10.1109/GREE.2013.10</td>
     2836</tr>
     2837
     2838
     2839
     2840<tr>
     2841     <td valign="top">URL</td>
     2842     <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.10">http://dx.doi.org/10.1109/GREE.2013.10</a></td>
     2843</tr>
     2844
     2845
     2846</li>
     2847
     2848</table></div><br><br>
     2849
     2850
     2851
     2852
     2853<a class="EntryGoto" id="Jin, Ruofan and Wang, Bing"></a>
     2854<b class="myheading" style="position: relative; left: 5%;">Jin, Ruofan and Wang, Bing</b>
     2855
     2856<div class="BibEntry">
     2857
     2858<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2859
     2860<li>
     2861
     2862
     2863<tr>
     2864     <td valign="top">Author</td>
     2865     <td valign="top">Jin, Ruofan and Wang, Bing</td>
     2866</tr>
     2867
     2868<tr>
     2869     <td valign="top">Title</td>
     2870     <td valign="top">Malware Detection for Mobile Devices Using Software-Defined Networking</td>
     2871</tr>
     2872
     2873<tr>
     2874     <td valign="top">Booktitle</td>
     2875     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     2876</tr>
     2877
     2878<tr>
     2879     <td valign="top">Location</td>
     2880     <td valign="top">Salt Lake City, UT</td>
     2881</tr>
     2882
     2883<tr>
     2884     <td valign="top">Publisher</td>
     2885     <td valign="top">IEEE</td>
     2886</tr>
     2887
     2888<tr>
     2889     <td valign="top">Year</td>
     2890     <td valign="top">2013</td>
     2891</tr>
     2892
     2893
     2894
     2895<tr>
     2896     <td valign="top">DOI</td>
     2897     <td valign="top">10.1109/GREE.2013.24</td>
     2898</tr>
     2899
     2900
     2901
     2902<tr>
     2903     <td valign="top">URL</td>
     2904     <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.24">http://dx.doi.org/10.1109/GREE.2013.24</a></td>
     2905</tr>
     2906
     2907
     2908</li>
     2909
     2910</table></div><br><br>
     2911
     2912
     2913
     2914
     2915<a class="EntryGoto" id="Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng"></a>
     2916<b class="myheading" style="position: relative; left: 5%;">Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng</b>
     2917
     2918<div class="BibEntry">
     2919
     2920<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2921
     2922<li>
     2923
     2924
     2925<tr>
     2926     <td valign="top">Author</td>
     2927     <td valign="top">Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng</td>
     2928</tr>
     2929
     2930<tr>
     2931     <td valign="top">Title</td>
     2932     <td valign="top">LENS: resource specification for wireless sensor network experimentation infrastructures</td>
     2933</tr>
     2934
     2935<tr>
     2936     <td valign="top">Booktitle</td>
     2937     <td valign="top">Proceedings of the 6th ACM international workshop on Wireless network testbeds, experimental evaluation and characterization</td>
     2938</tr>
     2939
     2940<tr>
     2941     <td valign="top">Location</td>
     2942     <td valign="top">Las Vegas, Nevada, USA</td>
     2943</tr>
     2944
     2945<tr>
     2946     <td valign="top">Publisher</td>
     2947     <td valign="top">ACM</td>
     2948</tr>
     2949
     2950<tr>
     2951     <td valign="top">Address</td>
     2952     <td valign="top">New York, NY, USA</td>
     2953</tr>
     2954
     2955<tr>
     2956     <td valign="top">Year</td>
     2957     <td valign="top">2011</td>
     2958</tr>
     2959
     2960<tr>
     2961     <td valign="top">Abstract</td>
     2962     <td valign="top">As a first step towards predictable, repeatable WSN experimentation, we propose the resource specification language LENS (a.k.a. Language for Embedded Networked Sensing) for WSN experimentation infrastructures. Using the Resource Description Framework (RDF) and the Web Ontology Language (OWL), LENS defines a semantic ontology for WSN resources; LENS enables explicit control and measurement of uncertainty factors, and it enables reasoning about the relationships between WSN resources. Focusing on basic concepts of WSNs, LENS supports resource specification in a wide range of WSN experimentation infrastructures, and it is extensible to support potentially unforeseen technologies. LENS is also compatible with specification languages for other network resources such as optical networks. As a part of the NSF GENI initiative, we have implemented LENS in the KanseiGenie control framework, and LENS has been actively used to support experimentation in the federated WSN infrastructure involving Kansei and NetEye. Enabling reasoning about uncertainty factors in experimentation, LENS is expected to serve as a basis for developing methodologies and tools for predictable, repeatable WSN experimentation.</td>
     2963</tr>
     2964
     2965
     2966
     2967<tr>
     2968     <td valign="top">DOI</td>
     2969     <td valign="top">10.1145/2030718.2030727</td>
     2970</tr>
     2971
     2972
     2973
     2974<tr>
     2975     <td valign="top">URL</td>
     2976     <td valign="top"><a href="http://dx.doi.org/10.1145/2030718.2030727">http://dx.doi.org/10.1145/2030718.2030727</a></td>
     2977</tr>
     2978
     2979
     2980</li>
     2981
     2982</table></div><br><br>
     2983
     2984
     2985
     2986
     2987<a class="EntryGoto" id="Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten"></a>
     2988<b class="myheading" style="position: relative; left: 5%;">Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten</b>
     2989
     2990<div class="BibEntry">
     2991
     2992<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2993
     2994<li>
     2995
     2996
     2997<tr>
     2998     <td valign="top">Author</td>
     2999     <td valign="top">Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten</td>
     3000</tr>
     3001
     3002<tr>
     3003     <td valign="top">Title</td>
     3004     <td valign="top">VeriFlow: verifying network-wide invariants in real time</td>
     3005</tr>
     3006
     3007<tr>
     3008     <td valign="top">Booktitle</td>
     3009     <td valign="top">Proceedings of the first workshop on Hot topics in software defined networks</td>
     3010</tr>
     3011
     3012<tr>
     3013     <td valign="top">Location</td>
     3014     <td valign="top">Helsinki, Finland</td>
     3015</tr>
     3016
     3017<tr>
     3018     <td valign="top">Publisher</td>
     3019     <td valign="top">ACM</td>
     3020</tr>
     3021
     3022<tr>
     3023     <td valign="top">Address</td>
     3024     <td valign="top">New York, NY, USA</td>
     3025</tr>
     3026
     3027<tr>
     3028     <td valign="top">Year</td>
     3029     <td valign="top">2012</td>
     3030</tr>
     3031
     3032
     3033
     3034<tr>
     3035     <td valign="top">DOI</td>
     3036     <td valign="top">10.1145/2342441.2342452</td>
     3037</tr>
     3038
     3039
     3040
     3041<tr>
     3042     <td valign="top">URL</td>
     3043     <td valign="top"><a href="http://doi.acm.org/10.1145/2342441.2342452">http://doi.acm.org/10.1145/2342441.2342452</a></td>
     3044</tr>
     3045
     3046
     3047</li>
     3048
     3049</table></div><br><br>
     3050
     3051
     3052
     3053
     3054<a class="EntryGoto" id="Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki"></a>
     3055<b class="myheading" style="position: relative; left: 5%;">Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki</b>
     3056
     3057<div class="BibEntry">
     3058
     3059<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3060
     3061<li>
     3062
     3063
     3064<tr>
     3065     <td valign="top">Author</td>
     3066     <td valign="top">Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki</td>
     3067</tr>
     3068
     3069<tr>
     3070     <td valign="top">Title</td>
     3071     <td valign="top">Future Internet: Challenges in Virtualization and Federation</td>
     3072</tr>
     3073
     3074<tr>
     3075     <td valign="top">Booktitle</td>
     3076     <td valign="top">2009 Fifth Advanced International Conference on Telecommunications</td>
     3077</tr>
     3078
     3079<tr>
     3080     <td valign="top">Location</td>
     3081     <td valign="top">Venice/Mestre, Italy</td>
     3082</tr>
     3083
     3084<tr>
     3085     <td valign="top">Publisher</td>
     3086     <td valign="top">IEEE</td>
     3087</tr>
     3088
     3089<tr>
     3090     <td valign="top">Year</td>
     3091     <td valign="top">2009</td>
     3092</tr>
     3093
     3094<tr>
     3095     <td valign="top">Abstract</td>
     3096     <td valign="top">Future Internet is a clean-slate research activity in the quest of new networking technologies to overcome the limits of the current Internet. In its experimental research, virtualization and federation are emerging as essential features, especially in the construction and operation of the testbeds. Moreover, they are believed to sustain as the fundamental features of the Future Internet itself. Visions and experiences on virtualization and federation are given by leading experts from US, EU, and Asia.</td>
     3097</tr>
     3098
     3099
     3100
     3101<tr>
     3102     <td valign="top">DOI</td>
     3103     <td valign="top">10.1109/AICT.2009.8</td>
     3104</tr>
     3105
     3106
     3107
     3108<tr>
     3109     <td valign="top">URL</td>
     3110     <td valign="top"><a href="http://dx.doi.org/10.1109/AICT.2009.8">http://dx.doi.org/10.1109/AICT.2009.8</a></td>
     3111</tr>
     3112
     3113
     3114</li>
     3115
     3116</table></div><br><br>
     3117
     3118
     3119
     3120
     3121<a class="EntryGoto" id="Kim, Hyunjun and Lee, Sungwon"></a>
     3122<b class="myheading" style="position: relative; left: 5%;">Kim, Hyunjun and Lee, Sungwon</b>
     3123
     3124<div class="BibEntry">
     3125
     3126<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3127
     3128<li>
     3129
     3130
     3131<tr>
     3132     <td valign="top">Author</td>
     3133     <td valign="top">Kim, Hyunjun and Lee, Sungwon</td>
     3134</tr>
     3135
     3136<tr>
     3137     <td valign="top">Title</td>
     3138     <td valign="top">FiRST Cloud Aggregate Manager development over FiRST: Future Internet testbed</td>
     3139</tr>
     3140
     3141<tr>
     3142     <td valign="top">Booktitle</td>
     3143     <td valign="top">The International Conference on Information Network 2012</td>
     3144</tr>
     3145
     3146<tr>
     3147     <td valign="top">Location</td>
     3148     <td valign="top">Bali, Indonesia</td>
     3149</tr>
     3150
     3151<tr>
     3152     <td valign="top">Publisher</td>
     3153     <td valign="top">IEEE</td>
     3154</tr>
     3155
     3156<tr>
     3157     <td valign="top">Year</td>
     3158     <td valign="top">2012</td>
     3159</tr>
     3160
     3161<tr>
     3162     <td valign="top">Abstract</td>
     3163     <td valign="top">FiRST (Future Internet Research for Sustainable Test-bed) is the future internet platform development project being performed in Korea. The goal of the project is to create the virtualized and dynamic service creation environments over future internet networks; it is an experimental project to realize future innovative service ideas over real network environments. Among this, cloud computing is the key enabler to control and allocate virtualized network resources (such as CPU, storage, and virtualized network configuration) for the requested services. However, researches on interworking between future internet and cloud computing is in initial phase. In this paper, we propose the FiRST Cloud Aggregate Manager (AM) based on GENI (Global Environment for Network Innovation) AM Application Programming Interface (API) for the federation between future internet test-bed and open source OpenStack cloud computing platform. After that, we propose the zero-client service for mobile cloud management. In order to control the zero-client service, we develop Cloud Mobility Client/Server. And, we validate and verified our FiRST Cloud AM and zero-client service by developing experimental test-bed. Through this test-bed, we confirm that the proposed FiRST Cloud AM and zero-client service efficiently interworks with future internet control plane framework by using GENI Control Framework (GCF) tools.</td>
     3164</tr>
     3165
     3166
     3167
     3168<tr>
     3169     <td valign="top">DOI</td>
     3170     <td valign="top">10.1109/ICOIN.2012.6164436</td>
     3171</tr>
     3172
     3173
     3174
     3175<tr>
     3176     <td valign="top">URL</td>
     3177     <td valign="top"><a href="http://dx.doi.org/10.1109/ICOIN.2012.6164436">http://dx.doi.org/10.1109/ICOIN.2012.6164436</a></td>
     3178</tr>
     3179
     3180
     3181</li>
     3182
     3183</table></div><br><br>
     3184
     3185
     3186
     3187
     3188<a class="EntryGoto" id="Kline, Donald and Quan, John"></a>
     3189<b class="myheading" style="position: relative; left: 5%;">Kline, Donald and Quan, John</b>
     3190
     3191<div class="BibEntry">
     3192
     3193<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3194
     3195<li>
     3196
     3197
     3198<tr>
     3199     <td valign="top">Author</td>
     3200     <td valign="top">Kline, Donald and Quan, John</td>
     3201</tr>
     3202
     3203<tr>
     3204     <td valign="top">Title</td>
     3205     <td valign="top">Attribute description service for large-scale networks</td>
     3206</tr>
     3207
     3208<tr>
     3209     <td valign="top">Booktitle</td>
     3210     <td valign="top">Proceedings of the 2nd international conference on Human centered design</td>
     3211</tr>
     3212
     3213<tr>
     3214     <td valign="top">Location</td>
     3215     <td valign="top">Orlando, FL, USA</td>
     3216</tr>
     3217
     3218<tr>
     3219     <td valign="top">Publisher</td>
     3220     <td valign="top">Springer-Verlag</td>
     3221</tr>
     3222
     3223<tr>
     3224     <td valign="top">Address</td>
     3225     <td valign="top">Berlin, Heidelberg</td>
     3226</tr>
     3227
     3228<tr>
     3229     <td valign="top">Year</td>
     3230     <td valign="top">2011</td>
     3231</tr>
     3232
     3233<tr>
     3234     <td valign="top">Abstract</td>
     3235     <td valign="top">An analysis of requesting resources from large-scale networks reveals a fundamental challenge. As the network grows, more and more resources become available, and so finding resources that fit experimental test criteria becomes difficult and time consuming. For example, the National Science Foundation sponsors GENI--an experimental network with a goal to gain enough resources to model the Internet at scale. Currently, GENI contains relatively few contributed resources donated from businesses and academia, and so matching resources to tests is rather simple. However, experimenters plan to conduct network experiments that are very complex and difficult to accurately model by using the vast numbers of resources expected in GENI. When GENI reaches its final state, finding the right resources that fit experimental test criteria out of many thousands of donated resources may be as difficult as conducting the experiment itself. This dilemma underscores the importance of establishing an attribute description service that promotes a standardized language for all interactions between the end users and the large-scale network.</td>
     3236</tr>
     3237
     3238
     3239
     3240<tr>
     3241     <td valign="top">DOI</td>
     3242     <td valign="top">10.1007/978-3-642-21753-1&#x005F;58</td>
     3243</tr>
     3244
     3245
     3246
     3247<tr>
     3248     <td valign="top">URL</td>
     3249     <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=2021672.2021735">http://portal.acm.org/citation.cfm?id=2021672.2021735</a></td>
     3250</tr>
     3251
     3252
     3253</li>
     3254
     3255</table></div><br><br>
     3256
     3257
     3258
     3259
     3260<a class="EntryGoto" id="Krishnappa, D. K. and Irwin, D. and Lyons, E. and Zink, M."></a>
     3261<b class="myheading" style="position: relative; left: 5%;">Krishnappa, D. K. and Irwin, D. and Lyons, E. and Zink, M.</b>
     3262
     3263<div class="BibEntry">
     3264
     3265<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3266
     3267<li>
     3268
     3269
     3270<tr>
     3271     <td valign="top">Author</td>
     3272     <td valign="top">Krishnappa, D. K. and Irwin, D. and Lyons, E. and Zink, M.</td>
     3273</tr>
     3274
     3275<tr>
     3276     <td valign="top">Title</td>
     3277     <td valign="top">CloudCast: Cloud Computing for Short-Term Weather Forecasts</td>
     3278</tr>
     3279
     3280<tr>
     3281     <td valign="top">Journal</td>
     3282     <td valign="top">Computing in Science &#x0026; Engineering</td>
     3283</tr>
     3284
     3285<tr>
     3286     <td valign="top">Publisher</td>
     3287     <td valign="top">IEEE</td>
     3288</tr>
     3289
     3290<tr>
     3291     <td valign="top">Year</td>
     3292     <td valign="top">2013</td>
     3293</tr>
     3294
     3295<tr>
     3296     <td valign="top">Abstract</td>
     3297     <td valign="top">CloudCast provides personalized short-term weather forecasts to clients based on their current location using cloud services, generating accurate forecasts tens of minutes in the future for small areas. Results show that it takes less than two minutes from the start of data sampling to deliver a 15-minute forecast to a client.</td>
     3298</tr>
     3299
     3300
     3301
     3302<tr>
     3303     <td valign="top">DOI</td>
     3304     <td valign="top">10.1109/mcse.2013.43</td>
     3305</tr>
     3306
     3307
     3308
     3309<tr>
     3310     <td valign="top">URL</td>
     3311     <td valign="top"><a href="http://dx.doi.org/10.1109/mcse.2013.43">http://dx.doi.org/10.1109/mcse.2013.43</a></td>
     3312</tr>
     3313
     3314
     3315</li>
     3316
     3317</table></div><br><br>
     3318
     3319
     3320
     3321
     3322<a class="EntryGoto" id="Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael"></a>
     3323<b class="myheading" style="position: relative; left: 5%;">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
     3324
     3325<div class="BibEntry">
     3326
     3327<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3328
     3329<li>
     3330
     3331
     3332<tr>
     3333     <td valign="top">Author</td>
     3334     <td valign="top">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</td>
     3335</tr>
     3336
     3337<tr>
     3338     <td valign="top">Title</td>
     3339     <td valign="top">Performance of GENI Cloud Testbeds for Real Time Scientific Application</td>
     3340</tr>
     3341
     3342<tr>
     3343     <td valign="top">Booktitle</td>
     3344     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     3345</tr>
     3346
     3347<tr>
     3348     <td valign="top">Location</td>
     3349     <td valign="top">Los Angeles</td>
     3350</tr>
     3351
     3352<tr>
     3353     <td valign="top">Year</td>
     3354     <td valign="top">2012</td>
     3355</tr>
     3356
     3357<tr>
     3358     <td valign="top">Abstract</td>
     3359     <td valign="top">Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform.</td>
     3360</tr>
     3361
     3362
     3363
     3364
     3365
     3366
     3367</li>
     3368
     3369</table></div><br><br>
     3370
     3371
     3372
     3373
     3374<a class="EntryGoto" id="Lee, Jae W."></a>
     3375<b class="myheading" style="position: relative; left: 5%;">Lee, Jae W.</b>
     3376
     3377<div class="BibEntry">
     3378
     3379<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3380
     3381<li>
     3382
     3383
     3384<tr>
     3385     <td valign="top">Author</td>
     3386     <td valign="top">Lee, Jae W.</td>
     3387</tr>
     3388
     3389<tr>
     3390     <td valign="top">Title</td>
     3391     <td valign="top">Towards a Common System Architecture for Dynamically Deploying Network Services in Routers and End Hosts</td>
     3392</tr>
     3393
     3394<tr>
     3395     <td valign="top">Year</td>
     3396     <td valign="top">2012</td>
     3397</tr>
     3398
     3399<tr>
     3400     <td valign="top">Abstract</td>
     3401     <td valign="top">The architectural simplicity of the core Internet is a double-edged sword. On the one hand, its agnostic nature paved the way for endless innovations of end-to-end applications. On the other hand, the inherent limitation of this simplicity makes it difficult to add new functions to the network core itself. This is exacerbated by the conservative tendency of commercial entities to &#x6c;&#x0308;eave well-enough alone&#x2c;&#x0308; leading to the current situation often referred to as the ossification of the Internet. For decades, there has been practically no new functionality that has been added to the core Internet on a large scale. This thesis explores the possibility of enabling in-network services towards the goal of overcoming the ossification of the Internet. Our ultimate goal is to provide a common run-time environment supported by all Internet nodes and a wide-area deployment mechanism, so that network services can be freely installed, removed, and migrated among Internet nodes of all kinds–from a backbone router to a set-top box at home. In that vision of a future Internet, there is little difference between servers and routers for the purpose of running network services. Services can run anywhere on the Internet. Application service providers will have the freedom to choose the best place to run their code. This thesis presents NetServ, our first step to realize the vision of network services running anywhere on the Internet. NetServ is a node architecture for dynamically deploying in-network services on edge routers. Network functions and applications are implemented as software modules which can be deployed at any NetServ-enabled node on the Internet, subject to policy restrictions. The NetServ framework provides a common execution environment for service modules and the ability to dynamically install and remove the services without restarting the nodes. There are many challenges in designing such a system. The main contribution of this thesis lies in meeting those challenges. First, we recognize that the primary impetus for adopting new technologies is economics. To address the challenge of providing economic incentives for enabling in-network services, we demonstrate how NetServ can facilitate an economic alliance between content providers and ISPs. Using NetServ, content providers and the ISPs operating at the network edge (aka eyeball ISPs) can enter into a mutually beneficial economic relationship. ISPs make their NetServ-enabled edge routers available for hosting content providers' applications and contents. Content providers can operate closer to end users by deploying code modules on NetServ-enabled edge routers. We make our case by presenting NetServ applications which represent four concrete use cases. Second, our node architecture must support both traditional server applications and in-network packet processing applications since content providers' applications running on ISPs' routers will combine the traits of both. To address this challenge, NetServ framework can host a packet processing module that sits in the data path, a server module that uses the TCP/IP stack in the traditional way, or a combined module that does both. NetServ provides a unified runtime environment between routers and servers, taking us a step closer to the vision of the unified runtime available on all Internet nodes. Third, we must provide a fast and streamlined deployment mechanism. Content providers should be able to deploy their applications at any NetServ-enabled edge router on the Inter- net, given that they have proper authorizations. Moreover, in some application scenarios, content providers may not know the exact locations of the target routers. Content providers need a way to send a message to install or remove an application module towards a network destination, and have the NetServ-enabled routers located in the path catch and act on the message. To address this challenge, we adopted on-path signaling as the deployment mechanism for NetServ. A NetServ signaling message is sent in an IP packet towards a destination. The packet gets forwarded by IP routers as usual, but when it transits a NetServ-enabled router, the message gets intercepted and passed to the NetServ control layer. Fourth, a NetServ-enabled router must support the concurrent executions of multiple without restarting the nodes. There are many challenges in designing such a system. The main contribution of this thesis lies in meeting those challenges. First, we recognize that the primary impetus for adopting new technologies is economics. To address the challenge of providing economic incentives for enabling in-network services, we demonstrate how NetServ can facilitate an economic alliance between content providers and ISPs. Using NetServ, content providers and the ISPs operating at the network edge (aka eyeball ISPs) can enter into a mutually beneficial economic relationship. ISPs make their NetServ-enabled edge routers available for hosting content providers' applications and contents. Content providers can operate closer to end users by deploying code modules on NetServ-enabled edge routers. We make our case by presenting NetServ applications which represent four concrete use cases. Second, our node architecture must support both traditional server applications and in-network packet processing applications since content providers' applications running on ISPs' routers will combine the traits of both. To address this challenge, NetServ framework can host a packet processing module that sits in the data path, a server module that uses the TCP/IP stack in the traditional way, or a combined module that does both. NetServ provides a unified runtime environment between routers and servers, taking us a step closer to the vision of the unified runtime available on all Internet nodes. Third, we must provide a fast and streamlined deployment mechanism. Content providers should be able to deploy their applications at any NetServ-enabled edge router on the Internet, given that they have proper authorizations. Moreover, in some application scenarios, content providers may not know the exact locations of the target routers. Content providers need a way to send a message to install or remove an application module towards a network destination, and have the NetServ-enabled routers located in the path catch and act on the message. To address this challenge, we adopted on-path signaling as the deployment mechanism for NetServ. A NetServ signaling message is sent in an IP packet towards a destination. The packet gets forwarded by IP routers as usual, but when it transits a NetServ-enabled router, the message gets intercepted and passed to the NetServ control layer. Fourth, a NetServ-enabled router must support the concurrent executions of multiple content providers' applications. Each content provider's execution environment must be isolated from one another, and the resource usage of each must be controlled. To address the challenge of providing a robust multi-user execution environment, we chose to run NetServ modules in user space. This is in stark contrast to most programmable routers, which run service modules in kernel space for fast packet processing. Furthermore, NetServ modules are written in Java and run in Java Virtual Machines (JVMs). Our choice of user space execution and JVM allows us to leverage the decades of technology advances in operating systems, virtualization, and Java. Lastly, in order to host the services of a large number of content providers, NetServ must be able to scale beyond the single-box architecture. We address this challenge with the multi-box lateral expansion of NetServ using the OpenFlow forwarding engine. In this extended architecture, multiple NetServ nodes are attached to an OpenFlow switch, which provides a physically separate forwarding plane. The scalability of user services is no longer limited to a single NetServ box. Additionally, this thesis presents our prior work on improving service discovery in local and global networks. The service discovery work makes indirect contribution because the limitations of local and overlay networks encountered during those studies eventually led us to investigate in-network services, which resulted in NetServ. Specifically, we investigate the issues involved in bootstrapping large-scale structured overlay networks, present a tool to merge service announcements from multiple local networks, and propose an enhancement to structured overlay networks using link-local multicast.</td>
     3402</tr>
     3403
     3404
     3405
     3406
     3407
     3408<tr>
     3409     <td valign="top">URL</td>
     3410     <td valign="top"><a href="http://academiccommons.columbia.edu/download/fedora&#x005F;content/download/ac:147210/CONTENT/Lee&#x005F;columbia&#x005F;0054D&#x005F;10773.pdf">http://academiccommons.columbia.edu/download/fedora&#x005F;content/download/ac:147210/CONTENT/Lee&#x005F;columbia&#x005F;0054D&#x005F;10773.pdf</a></td>
     3411</tr>
     3412
     3413
     3414</li>
     3415
     3416</table></div><br><br>
     3417
     3418
     3419
     3420
     3421<a class="EntryGoto" id="Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang"></a>
     3422<b class="myheading" style="position: relative; left: 5%;">Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang</b>
     3423
     3424<div class="BibEntry">
     3425
     3426<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3427
     3428<li>
     3429
     3430
     3431<tr>
     3432     <td valign="top">Author</td>
     3433     <td valign="top">Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang</td>
     3434</tr>
     3435
     3436<tr>
     3437     <td valign="top">Title</td>
     3438     <td valign="top">NetServ: Active Networking 2.0</td>
     3439</tr>
     3440
     3441<tr>
     3442     <td valign="top">Booktitle</td>
     3443     <td valign="top">2011 IEEE International Conference on Communications Workshops (ICC)</td>
     3444</tr>
     3445
     3446<tr>
     3447     <td valign="top">Location</td>
     3448     <td valign="top">Kyoto, Japan</td>
     3449</tr>
     3450
     3451<tr>
     3452     <td valign="top">Publisher</td>
     3453     <td valign="top">IEEE</td>
     3454</tr>
     3455
     3456<tr>
     3457     <td valign="top">Year</td>
     3458     <td valign="top">2011</td>
     3459</tr>
     3460
     3461<tr>
     3462     <td valign="top">Abstract</td>
     3463     <td valign="top">We present NetServ, a node architecture for deploying in-network services in the next generation Internet. NetServ-enabled network nodes provide a common execution environment, where network services implemented as modules can be dynamically installed and removed. We demonstrate three such modules. MicroCDN is a dynamic content distribution network (CDN) service which implements a content caching strategy specific to a content provider. The NAT Keep-alive module offloads the processing of keep-alive messages from SIP servers. The Media Relay module allows any NetServ node to act as a media relay, eliminating the need to manage standalone relay servers. NetServ aims to revive the Active Networking vision. It was too far ahead of its time a decade ago, but we believe its time has finally arrived.</td>
     3464</tr>
     3465
     3466
     3467
     3468<tr>
     3469     <td valign="top">DOI</td>
     3470     <td valign="top">10.1109/iccw.2011.5963554</td>
     3471</tr>
     3472
     3473
     3474
     3475<tr>
     3476     <td valign="top">URL</td>
     3477     <td valign="top"><a href="http://dx.doi.org/10.1109/iccw.2011.5963554">http://dx.doi.org/10.1109/iccw.2011.5963554</a></td>
     3478</tr>
     3479
     3480
     3481</li>
     3482
     3483</table></div><br><br>
     3484
     3485
     3486
     3487
     3488<a class="EntryGoto" id="Lee, Ki S. and Wang, Han and Weatherspoon, Hakim"></a>
     3489<b class="myheading" style="position: relative; left: 5%;">Lee, Ki S. and Wang, Han and Weatherspoon, Hakim</b>
     3490
     3491<div class="BibEntry">
     3492
     3493<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3494
     3495<li>
     3496
     3497
     3498<tr>
     3499     <td valign="top">Author</td>
     3500     <td valign="top">Lee, Ki S. and Wang, Han and Weatherspoon, Hakim</td>
     3501</tr>
     3502
     3503<tr>
     3504     <td valign="top">Title</td>
     3505     <td valign="top">SoNIC: precise realtime software access and control of wired networks</td>
     3506</tr>
     3507
     3508<tr>
     3509     <td valign="top">Booktitle</td>
     3510     <td valign="top">Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation</td>
     3511</tr>
     3512
     3513<tr>
     3514     <td valign="top">Location</td>
     3515     <td valign="top">Lombard, IL</td>
     3516</tr>
     3517
     3518<tr>
     3519     <td valign="top">Publisher</td>
     3520     <td valign="top">USENIX Association</td>
     3521</tr>
     3522
     3523<tr>
     3524     <td valign="top">Address</td>
     3525     <td valign="top">Berkeley, CA, USA</td>
     3526</tr>
     3527
     3528<tr>
     3529     <td valign="top">Year</td>
     3530     <td valign="top">2013</td>
     3531</tr>
     3532
     3533
     3534
     3535
     3536
     3537<tr>
     3538     <td valign="top">URL</td>
     3539     <td valign="top"><a href="http://dl.acm.org/citation.cfm?id=2482626.2482648">http://dl.acm.org/citation.cfm?id=2482626.2482648</a></td>
     3540</tr>
     3541
     3542
     3543</li>
     3544
     3545</table></div><br><br>
     3546
     3547
     3548
     3549
     3550<a class="EntryGoto" id="Li, Dawei and Hong, Xiaoyan"></a>
     3551<b class="myheading" style="position: relative; left: 5%;">Li, Dawei and Hong, Xiaoyan</b>
     3552
     3553<div class="BibEntry">
     3554
     3555<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3556
     3557<li>
     3558
     3559
     3560<tr>
     3561     <td valign="top">Author</td>
     3562     <td valign="top">Li, Dawei and Hong, Xiaoyan</td>
     3563</tr>
     3564
     3565<tr>
     3566     <td valign="top">Title</td>
     3567     <td valign="top">Practical exploitation on system vulnerability of ProtoGENI</td>
     3568</tr>
     3569
     3570<tr>
     3571     <td valign="top">Booktitle</td>
     3572     <td valign="top">Proceedings of the 49th Annual Southeast Regional Conference</td>
     3573</tr>
     3574
     3575<tr>
     3576     <td valign="top">Location</td>
     3577     <td valign="top">Kennesaw, Georgia</td>
     3578</tr>
     3579
     3580<tr>
     3581     <td valign="top">Publisher</td>
     3582     <td valign="top">ACM</td>
     3583</tr>
     3584
     3585<tr>
     3586     <td valign="top">Address</td>
     3587     <td valign="top">New York, NY, USA</td>
     3588</tr>
     3589
     3590<tr>
     3591     <td valign="top">Year</td>
     3592     <td valign="top">2011</td>
     3593</tr>
     3594
     3595<tr>
     3596     <td valign="top">Abstract</td>
     3597     <td valign="top">Global Environment for Network Innovations (GENI) is a unique virtual laboratory for at-scale networking experimentation exploring future Internets. The successful development of GENI has to consider security problems from the design and prototyping stages. However, in many cases, system vulnerability cannot be found unless through real experimentation bearing purposeful and meaningful designs. In this paper, we introduce some of our efforts in exploring the security vulnerabilities in ProtoGENI, a prototype implementation and deployment of GENI. Our results show potential breach on security of GENI in terms of availability. We make suggestions on potential defense strategies in order to improve the ProtoGENI security and its development.</td>
     3598</tr>
     3599
     3600
     3601
     3602<tr>
     3603     <td valign="top">DOI</td>
     3604     <td valign="top">10.1145/2016039.2016073</td>
     3605</tr>
     3606
     3607
     3608
     3609<tr>
     3610     <td valign="top">URL</td>
     3611     <td valign="top"><a href="http://dx.doi.org/10.1145/2016039.2016073">http://dx.doi.org/10.1145/2016039.2016073</a></td>
     3612</tr>
     3613
     3614
     3615</li>
     3616
     3617</table></div><br><br>
     3618
     3619
     3620
     3621
     3622<a class="EntryGoto" id="Li, Dawei and Hong, Xiaoyan and Bowman, Jason"></a>
     3623<b class="myheading" style="position: relative; left: 5%;">Li, Dawei and Hong, Xiaoyan and Bowman, Jason</b>
     3624
     3625<div class="BibEntry">
     3626
     3627<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3628
     3629<li>
     3630
     3631
     3632<tr>
     3633     <td valign="top">Author</td>
     3634     <td valign="top">Li, Dawei and Hong, Xiaoyan and Bowman, Jason</td>
     3635</tr>
     3636
     3637<tr>
     3638     <td valign="top">Title</td>
     3639     <td valign="top">Evaluation of Security Vulnerabilities by Using ProtoGENI as a Launchpad</td>
     3640</tr>
     3641
     3642<tr>
     3643     <td valign="top">Booktitle</td>
     3644     <td valign="top">IEEE Global Communications Conference (GLOBECOM 2011)</td>
     3645</tr>
     3646
     3647<tr>
     3648     <td valign="top">Year</td>
     3649     <td valign="top">2011</td>
     3650</tr>
     3651
     3652<tr>
     3653     <td valign="top">Abstract</td>
     3654     <td valign="top">In this paper we analyze the security architecture of ProtoGENI. ProtoGENI is a prototype control framework implementation of GENI (Global Environment for Network Innovations). We perform a variety of experiments in an effort to identify potential vulnerabilities presented in the current implementation. We classify our attacks into three types: data plane to data plane, data plane to control plane, and data plane to Internet. Our results indicate the potential for a breach of confidentiality and availability internally within ProtoGENI, as well as risks to external Internet. We make suggestions outlining possible defense strategies to improve ProtoGENI security and aid in future development</td>
     3655</tr>
     3656
     3657
     3658
     3659
     3660
     3661<tr>
     3662     <td valign="top">URL</td>
     3663     <td valign="top"><a href="ftp://202.38.75.7/pub/&#x0025;D0&#x0025;C2&#x0025;CE&#x0025;C4&#x0025;BC&#x0025;FE&#x0025;BC&#x0025;D0&#x0025;20(2)/DATA/PID1102190.PDF">ftp://202.38.75.7/pub/&#x0025;D0&#x0025;C2&#x0025;CE&#x0025;C4&#x0025;BC&#x0025;FE&#x0025;BC&#x0025;D0&#x0025;20(2)/DATA/PID1102190.PDF</a></td>
     3664</tr>
     3665
     3666
     3667</li>
     3668
     3669</table></div><br><br>
     3670
     3671
     3672
     3673
     3674<a class="EntryGoto" id="Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason"></a>
     3675<b class="myheading" style="position: relative; left: 5%;">Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason</b>
     3676
     3677<div class="BibEntry">
     3678
     3679<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3680
     3681<li>
     3682
     3683
     3684<tr>
     3685     <td valign="top">Author</td>
     3686     <td valign="top">Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason</td>
     3687</tr>
     3688
     3689<tr>
     3690     <td valign="top">Title</td>
     3691     <td valign="top">Simulation studies of OpenFlow-based in-network caching strategies</td>
     3692</tr>
     3693
     3694<tr>
     3695     <td valign="top">Booktitle</td>
     3696     <td valign="top">Proceedings of the 15th Communications and Networking Simulation Symposium</td>
     3697</tr>
     3698
     3699<tr>
     3700     <td valign="top">Location</td>
     3701     <td valign="top">Orlando, Florida</td>
     3702</tr>
     3703
     3704<tr>
     3705     <td valign="top">Publisher</td>
     3706     <td valign="top">Society for Computer Simulation International</td>
     3707</tr>
     3708
     3709<tr>
     3710     <td valign="top">Address</td>
     3711     <td valign="top">San Diego, CA, USA</td>
     3712</tr>
     3713
     3714<tr>
     3715     <td valign="top">Year</td>
     3716     <td valign="top">2012</td>
     3717</tr>
     3718
     3719<tr>
     3720     <td valign="top">Abstract</td>
     3721     <td valign="top">We propose an in-network caching architecture using Open-Flow to coordinate caching decisions in the network. Our scheme, called CacheFlow, extends the cache-and-forward concept by moving contents closer to the clients hop-by-hop using TCP for sending requests and retrieving contents. As such, CacheFlow can be incrementally implemented and deployed in the real network. In this paper, we present a simulation study of several caching policies, including a random cache policy, a statically optimal cache placement policy and a new disk placement strategy that places popular contents at the &#x63;&#x0308;enter&#x20;&#x0308;of the network. Experimental results show that simple in-network caching policies can be realized using today's technology to improve network performance.</td>
     3722</tr>
     3723
     3724
     3725
     3726
     3727
     3728<tr>
     3729     <td valign="top">URL</td>
     3730     <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=2331762.2331774">http://portal.acm.org/citation.cfm?id=2331762.2331774</a></td>
     3731</tr>
     3732
     3733
     3734</li>
     3735
     3736</table></div><br><br>
     3737
     3738
     3739
     3740
     3741<a class="EntryGoto" id="Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross"></a>
     3742<b class="myheading" style="position: relative; left: 5%;">Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</b>
     3743
     3744<div class="BibEntry">
     3745
     3746<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3747
     3748<li>
     3749
     3750
     3751<tr>
     3752     <td valign="top">Author</td>
     3753     <td valign="top">Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</td>
     3754</tr>
     3755
     3756<tr>
     3757     <td valign="top">Title</td>
     3758     <td valign="top">Work-in-Progress: Empirical Verification of A Subset Sum Hypothesis in GENI Cloud</td>
     3759</tr>
     3760
     3761<tr>
     3762     <td valign="top">Booktitle</td>
     3763     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     3764</tr>
     3765
     3766<tr>
     3767     <td valign="top">Location</td>
     3768     <td valign="top">Los Angeles</td>
     3769</tr>
     3770
     3771<tr>
     3772     <td valign="top">Year</td>
     3773     <td valign="top">2012</td>
     3774</tr>
     3775
     3776
     3777
     3778
     3779
     3780
     3781</li>
     3782
     3783</table></div><br><br>
     3784
     3785
     3786
     3787
     3788<a class="EntryGoto" id="Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi"></a>
     3789<b class="myheading" style="position: relative; left: 5%;">Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</b>
     3790
     3791<div class="BibEntry">
     3792
     3793<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3794
     3795<li>
     3796
     3797
     3798<tr>
     3799     <td valign="top">Author</td>
     3800     <td valign="top">Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</td>
     3801</tr>
     3802
     3803<tr>
     3804     <td valign="top">Title</td>
     3805     <td valign="top">Assessment of Router Vulnerabilities on PlanetLab Infrastructure for Secure Cloud Computing</td>
     3806</tr>
     3807
     3808<tr>
     3809     <td valign="top">Booktitle</td>
     3810     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     3811</tr>
     3812
     3813<tr>
     3814     <td valign="top">Location</td>
     3815     <td valign="top">Los Angeles</td>
     3816</tr>
     3817
     3818<tr>
     3819     <td valign="top">Year</td>
     3820     <td valign="top">2012</td>
     3821</tr>
     3822
     3823<tr>
     3824     <td valign="top">Abstract</td>
     3825     <td valign="top">In recent times, the cloud computing based delivery model has been proven to reduce enterprise IT costs and complexities. In contrast to traditional enterprise IT solutions, the cloud computing model moves the application software and data to remote servers in large datacenters, which raises many security challenges. One of the critical challenges is the inability to characterize the impact of the vulnerabilities of routers on the cloud security and performance guarantees. In this paper, we analyze the degree of security provided by routers to data sharing applications deployed in cloud environments that span administrative and network domains. Our analysis is based on examining the security level of network applications on routers which lie between nodes on Planetlab infrastructure. We assume that some of the PlanetLab nodes will share the same wide area network path as the cloud servers. Our preliminary results confirm that the majority of the routers are plagued by insecure network protocols, leading to vulnerable routers. These results confirm our hypothesis that the security of the network infrastructure needs to be upgraded to assure the protection of information exchanged on the wide area network path.</td>
     3826</tr>
     3827
     3828
     3829
     3830
     3831
     3832
     3833</li>
     3834
     3835</table></div><br><br>
     3836
     3837
     3838
     3839
     3840<a class="EntryGoto" id="Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H."></a>
     3841<b class="myheading" style="position: relative; left: 5%;">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</b>
     3842
     3843<div class="BibEntry">
     3844
     3845<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3846
     3847<li>
     3848
     3849
     3850<tr>
     3851     <td valign="top">Author</td>
     3852     <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td>
     3853</tr>
     3854
     3855<tr>
     3856     <td valign="top">Title</td>
     3857     <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td>
     3858</tr>
     3859
     3860<tr>
     3861     <td valign="top">Booktitle</td>
     3862     <td valign="top">2012 IEEE Network Operations and Management Symposium</td>
     3863</tr>
     3864
     3865<tr>
     3866     <td valign="top">Location</td>
     3867     <td valign="top">Maui, HI</td>
     3868</tr>
     3869
     3870<tr>
     3871     <td valign="top">Publisher</td>
     3872     <td valign="top">IEEE</td>
     3873</tr>
     3874
     3875<tr>
     3876     <td valign="top">Year</td>
     3877     <td valign="top">2012</td>
     3878</tr>
     3879
     3880<tr>
     3881     <td valign="top">Abstract</td>
     3882     <td valign="top">Autonomic management capabilities of the Future Internet can be provided through a recently proposed service architecture called NetServ. It consists of the interconnection of programmable nodes which enable dynamic deployment and execution of network and application services. This paper shows how this architecture can be further improved by introducing the OpenFlow architecture and implementing the OpenFlow controller as a NetServ service, thus improving both the NetServ management performance and its flexibility. These achievements are demonstrated experimentally on the GENI environment, showing the platform self-protecting capabilities in case of a SIP DoS attack.</td>
     3883</tr>
     3884
     3885
     3886
     3887<tr>
     3888     <td valign="top">DOI</td>
     3889     <td valign="top">10.1109/NOMS.2012.6211961</td>
     3890</tr>
     3891
     3892
     3893
     3894<tr>
     3895     <td valign="top">URL</td>
     3896     <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td>
     3897</tr>
     3898
     3899
     3900</li>
     3901
     3902</table></div><br><br>
     3903
     3904
     3905
     3906
     3907<a class="EntryGoto" id="Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y."></a>
     3908<b class="myheading" style="position: relative; left: 5%;">Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y.</b>
     3909
     3910<div class="BibEntry">
     3911
     3912<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3913
     3914<li>
     3915
     3916
     3917<tr>
     3918     <td valign="top">Author</td>
     3919     <td valign="top">Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y.</td>
     3920</tr>
     3921
     3922<tr>
     3923     <td valign="top">Title</td>
     3924     <td valign="top">Space Versus Time Separation for Wireless Virtualization on an Indoor Grid</td>
     3925</tr>
     3926
     3927<tr>
     3928     <td valign="top">Booktitle</td>
     3929     <td valign="top">Next Generation Internet Networks, 2008. NGI 2008</td>
     3930</tr>
     3931
     3932<tr>
     3933     <td valign="top">Publisher</td>
     3934     <td valign="top">IEEE</td>
     3935</tr>
     3936
     3937<tr>
     3938     <td valign="top">Year</td>
     3939     <td valign="top">2008</td>
     3940</tr>
     3941
     3942<tr>
     3943     <td valign="top">Abstract</td>
     3944     <td valign="top">The decreasing cost of wireless hardware and ever increasing number of wireless testbeds has led to a shift in the protocol evaluation paradigm from simulations towards emulation. In addition, with a large number of users demanding experimental resources and lack of space and time for deploying more hardware, fair resource sharing among independent co-existing experiments is important. We study the proposed approaches to wireless virtualization with a focus on schemes conserving wireless channels rather than nodes. Our detailed comparison reveals that while experiments sharing a channel by space separation achieve better efficiency than those relying on time separation of a channel, the isolation between experiments in both cases is comparable. We propose and implement a policy manager to alleviate the isolation problem and suggest scenarios in which either of the schemes would provide a suitable virtualization solution.</td>
     3945</tr>
     3946
     3947
     3948
     3949<tr>
     3950     <td valign="top">DOI</td>
     3951     <td valign="top">10.1109/NGI.2008.36</td>
     3952</tr>
     3953
     3954
     3955
     3956<tr>
     3957     <td valign="top">URL</td>
     3958     <td valign="top"><a href="http://dx.doi.org/10.1109/NGI.2008.36">http://dx.doi.org/10.1109/NGI.2008.36</a></td>
     3959</tr>
     3960
     3961
     3962</li>
     3963
     3964</table></div><br><br>
     3965
     3966
     3967
     3968
     3969<a class="EntryGoto" id="Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D."></a>
     3970<b class="myheading" style="position: relative; left: 5%;">Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D.</b>
     3971
     3972<div class="BibEntry">
     3973
     3974<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3975
     3976<li>
     3977
     3978
     3979<tr>
     3980     <td valign="top">Author</td>
     3981     <td valign="top">Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D.</td>
     3982</tr>
     3983
     3984<tr>
     3985     <td valign="top">Title</td>
     3986     <td valign="top">Integration of heterogeneous networking testbeds</td>
     3987</tr>
     3988
     3989<tr>
     3990     <td valign="top">Booktitle</td>
     3991     <td valign="top">Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks &#x0026; communities</td>
     3992</tr>
     3993
     3994<tr>
     3995     <td valign="top">Location</td>
     3996     <td valign="top">Innsbruck, Austria</td>
     3997</tr>
     3998
     3999<tr>
     4000     <td valign="top">Publisher</td>
     4001     <td valign="top">ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)</td>
     4002</tr>
     4003
     4004<tr>
     4005     <td valign="top">Address</td>
     4006     <td valign="top">ICST, Brussels, Belgium, Belgium</td>
     4007</tr>
     4008
     4009<tr>
     4010     <td valign="top">Year</td>
     4011     <td valign="top">2008</td>
     4012</tr>
     4013
     4014<tr>
     4015     <td valign="top">Abstract</td>
     4016     <td valign="top">As networking research expands into new frontiers, the research community has felt a need for a heterogeneous networking research infrastructure to experiment with the interaction and integration of different types of networks, and to test the performance of various networking protocols in realistic environments. This requirement has led to the Global Environment for Network Innovations (GENI) initiative to create a global infrastructure for conducting networking experiments across diverse substrates such as wired (local and wide-area), wireless, sensor and cellular networks. In this paper, we discuss and present two models for building such an experimental infrastructure. The first model enables a wired testbed to link with wireless edge nodes during an experiment, whereas the second model enables a wireless testbed to link to wired testbeds. Proof-of-concept experiments are also presented reinforcing the usefulness of the models in terms of facilitating experiments over the integrated heterogeneous infrastructure.</td>
     4017</tr>
     4018
     4019
     4020
     4021
     4022
     4023<tr>
     4024     <td valign="top">URL</td>
     4025     <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=1390609">http://portal.acm.org/citation.cfm?id=1390609</a></td>
     4026</tr>
     4027
     4028
     4029</li>
     4030
     4031</table></div><br><br>
     4032
     4033
     4034
     4035
     4036<a class="EntryGoto" id="Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I."></a>
     4037<b class="myheading" style="position: relative; left: 5%;">Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I.</b>
     4038
     4039<div class="BibEntry">
     4040
     4041<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4042
     4043<li>
     4044
     4045
     4046<tr>
     4047     <td valign="top">Author</td>
     4048     <td valign="top">Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I.</td>
     4049</tr>
     4050
     4051<tr>
     4052     <td valign="top">Title</td>
     4053     <td valign="top">Enabling Wide Area Single System Image Experimentation on the GENI Platform</td>
     4054</tr>
     4055
     4056<tr>
     4057     <td valign="top">Booktitle</td>
     4058     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     4059</tr>
     4060
     4061<tr>
     4062     <td valign="top">Location</td>
     4063     <td valign="top">Salt Lake City, UT</td>
     4064</tr>
     4065
     4066<tr>
     4067     <td valign="top">Publisher</td>
     4068     <td valign="top">IEEE</td>
     4069</tr>
     4070
     4071<tr>
     4072     <td valign="top">Year</td>
     4073     <td valign="top">2013</td>
     4074</tr>
     4075
     4076
     4077
     4078<tr>
     4079     <td valign="top">DOI</td>
     4080     <td valign="top">10.1109/GREE.2013.27</td>
     4081</tr>
     4082
     4083
     4084
     4085<tr>
     4086     <td valign="top">URL</td>
     4087     <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.27">http://dx.doi.org/10.1109/GREE.2013.27</a></td>
     4088</tr>
     4089
     4090
     4091</li>
     4092
     4093</table></div><br><br>
     4094
     4095
     4096
     4097
     4098<a class="EntryGoto" id="Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming"></a>
     4099<b class="myheading" style="position: relative; left: 5%;">Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</b>
     4100
     4101<div class="BibEntry">
     4102
     4103<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4104
     4105<li>
     4106
     4107
     4108<tr>
     4109     <td valign="top">Author</td>
     4110     <td valign="top">Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</td>
     4111</tr>
     4112
     4113<tr>
     4114     <td valign="top">Title</td>
     4115     <td valign="top">Socially Aware Single System Images</td>
     4116</tr>
     4117
     4118<tr>
     4119     <td valign="top">Booktitle</td>
     4120     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     4121</tr>
     4122
     4123<tr>
     4124     <td valign="top">Location</td>
     4125     <td valign="top">Los Angeles</td>
     4126</tr>
     4127
     4128<tr>
     4129     <td valign="top">Year</td>
     4130     <td valign="top">2012</td>
     4131</tr>
     4132
     4133<tr>
     4134     <td valign="top">Abstract</td>
     4135     <td valign="top">Cloud computing enables users to get access to huge amounts of computing resources as desired. There are many popular commercial cloud service providers which provide resources to users at a price. These providers can not be trusted as far as privacy of data is concerned. On the other hand, people do trust their close friends, relatives and other social contacts, albeit, to varying degrees. This paper reports the work-in-progress on S3I(Socially Aware Single System Images) which allows users to form computing clusters using resources owned by their social contacts. It tries to utilize the trust found between people in real life and translate it to provide trustworthy resource sharing between them.</td>
     4136</tr>
     4137
     4138
     4139
     4140
     4141
     4142
     4143</li>
     4144
     4145</table></div><br><br>
     4146
     4147
     4148
     4149
     4150<a class="EntryGoto" id="Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil"></a>
     4151<b class="myheading" style="position: relative; left: 5%;">Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil</b>
     4152
     4153<div class="BibEntry">
     4154
     4155<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4156
     4157<li>
     4158
     4159
     4160<tr>
     4161     <td valign="top">Author</td>
     4162     <td valign="top">Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil</td>
     4163</tr>
     4164
     4165<tr>
     4166     <td valign="top">Title</td>
     4167     <td valign="top">WiMAX in the Classroom: Designing a Cellular Networking Hands-on Lab</td>
     4168</tr>
     4169
     4170<tr>
     4171     <td valign="top">Booktitle</td>
     4172     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     4173</tr>
     4174
     4175<tr>
     4176     <td valign="top">Location</td>
     4177     <td valign="top">Salt Lake City, UT</td>
     4178</tr>
     4179
     4180<tr>
     4181     <td valign="top">Publisher</td>
     4182     <td valign="top">IEEE</td>
     4183</tr>
     4184
     4185<tr>
     4186     <td valign="top">Year</td>
     4187     <td valign="top">2013</td>
     4188</tr>
     4189
     4190
     4191
     4192<tr>
     4193     <td valign="top">DOI</td>
     4194     <td valign="top">10.1109/GREE.2013.29</td>
     4195</tr>
     4196
     4197
     4198
     4199<tr>
     4200     <td valign="top">URL</td>
     4201     <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.29">http://dx.doi.org/10.1109/GREE.2013.29</a></td>
     4202</tr>
     4203
     4204
     4205</li>
     4206
     4207</table></div><br><br>
     4208
     4209
     4210
     4211
     4212<a class="EntryGoto" id="Maziku, Hellen and Shetty, Sachin and Rogers, Tamara"></a>
     4213<b class="myheading" style="position: relative; left: 5%;">Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</b>
     4214
     4215<div class="BibEntry">
     4216
     4217<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4218
     4219<li>
     4220
     4221
     4222<tr>
     4223     <td valign="top">Author</td>
     4224     <td valign="top">Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</td>
     4225</tr>
     4226
     4227<tr>
     4228     <td valign="top">Title</td>
     4229     <td valign="top">Measurement-based IP Geolocation of Routers on Planetlab Infrastructure</td>
     4230</tr>
     4231
     4232<tr>
     4233     <td valign="top">Booktitle</td>
     4234     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     4235</tr>
     4236
     4237<tr>
     4238     <td valign="top">Location</td>
     4239     <td valign="top">Los Angeles</td>
     4240</tr>
     4241
     4242<tr>
     4243     <td valign="top">Year</td>
     4244     <td valign="top">2012</td>
     4245</tr>
     4246
     4247<tr>
     4248     <td valign="top">Abstract</td>
     4249     <td valign="top">Location aware applications can benefit from a more accurate yet robust IP geolocation framework. Various approaches to IP geolocation have been well documented. The most recent approach casts IP geolocation as a machine learn- ing classification problem. This approach makes it possible to incorporate both delay and non delay based information. The accuracy of IP geolocation can be improved by incorporating additional types of geolocation information rather relying on network delay alone. To enhance the classification accuracy of the existing classification framework, we expand it to include 6 features (3 of which are novel). We use PlanetLab as a testbed to generate our measurement set. We select 67 PlanetLab nodes within the United States with known geographic location as our landmarks. We test the accuracy of our framework on 23,843 routers given ping measurements from the 67 landmarks. With only three features (average delay, average hops and population density) tested, our new classifier gives a reduced average error distance of 157.81 miles and a median error distance of 0 miles, compared to the present classifier that gives an average error distance of 253.34 miles. This is very promising as we move on to the next phase of incorporating data for the remaining 5 features. To the best of our knowledge, this is the first proposed framework that aims to improve the accuracy of the present classifier based IP geolocation.</td>
     4250</tr>
     4251
     4252
     4253
     4254
     4255
     4256
     4257</li>
     4258
     4259</table></div><br><br>
     4260
     4261
     4262
     4263
     4264<a class="EntryGoto" id="McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan"></a>
     4265<b class="myheading" style="position: relative; left: 5%;">McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan</b>
     4266
     4267<div class="BibEntry">
     4268
     4269<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4270
     4271<li>
     4272
     4273
     4274<tr>
     4275     <td valign="top">Author</td>
     4276     <td valign="top">McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan</td>
     4277</tr>
     4278
     4279<tr>
     4280     <td valign="top">Title</td>
     4281     <td valign="top">OpenFlow: enabling innovation in campus networks</td>
     4282</tr>
     4283
     4284<tr>
     4285     <td valign="top">Journal</td>
     4286     <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
     4287</tr>
     4288
     4289<tr>
     4290     <td valign="top">Publisher</td>
     4291     <td valign="top">ACM</td>
     4292</tr>
     4293
     4294<tr>
     4295     <td valign="top">Address</td>
     4296     <td valign="top">New York, NY, USA</td>
     4297</tr>
     4298
     4299<tr>
     4300     <td valign="top">Year</td>
     4301     <td valign="top">2008</td>
     4302</tr>
     4303
     4304
     4305
     4306<tr>
     4307     <td valign="top">DOI</td>
     4308     <td valign="top">10.1145/1355734.1355746</td>
     4309</tr>
     4310
     4311
     4312
     4313<tr>
     4314     <td valign="top">URL</td>
     4315     <td valign="top"><a href="http://doi.acm.org/10.1145/1355734.1355746">http://doi.acm.org/10.1145/1355734.1355746</a></td>
     4316</tr>
     4317
     4318
     4319</li>
     4320
     4321</table></div><br><br>
     4322
     4323
     4324
     4325
     4326<a class="EntryGoto" id="Mitroff, Sarah"></a>
     4327<b class="myheading" style="position: relative; left: 5%;">Mitroff, Sarah</b>
     4328
     4329<div class="BibEntry">
     4330
     4331<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4332
     4333<li>
     4334
     4335
     4336<tr>
     4337     <td valign="top">Author</td>
     4338     <td valign="top">Mitroff, Sarah</td>
     4339</tr>
     4340
     4341<tr>
     4342     <td valign="top">Title</td>
     4343     <td valign="top">Lawrence Landweber Helped Build Today's Internet, Now He's Advising Its Future</td>
     4344</tr>
     4345
     4346<tr>
     4347     <td valign="top">Journal</td>
     4348     <td valign="top">Wired</td>
     4349</tr>
     4350
     4351<tr>
     4352     <td valign="top">Year</td>
     4353     <td valign="top">2012</td>
     4354</tr>
     4355
     4356
     4357
     4358
     4359
     4360<tr>
     4361     <td valign="top">URL</td>
     4362     <td valign="top"><a href="http://www.wired.com/business/2012/08/lawrence-landweber/">http://www.wired.com/business/2012/08/lawrence-landweber/</a></td>
     4363</tr>
     4364
     4365
     4366</li>
     4367
     4368</table></div><br><br>
     4369
     4370
     4371
     4372
     4373<a class="EntryGoto" id="Muhammad, Monzur and Cappos, Justin"></a>
     4374<b class="myheading" style="position: relative; left: 5%;">Muhammad, Monzur and Cappos, Justin</b>
     4375
     4376<div class="BibEntry">
     4377
     4378<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4379
     4380<li>
     4381
     4382
     4383<tr>
     4384     <td valign="top">Author</td>
     4385     <td valign="top">Muhammad, Monzur and Cappos, Justin</td>
     4386</tr>
     4387
     4388<tr>
     4389     <td valign="top">Title</td>
     4390     <td valign="top">Towards a Representive Testbed: Harnessing Volunteers for Networks Research</td>
     4391</tr>
     4392
     4393<tr>
     4394     <td valign="top">Booktitle</td>
     4395     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     4396</tr>
     4397
     4398<tr>
     4399     <td valign="top">Location</td>
     4400     <td valign="top">Los Angeles</td>
     4401</tr>
     4402
     4403<tr>
     4404     <td valign="top">Year</td>
     4405     <td valign="top">2012</td>
     4406</tr>
     4407
     4408<tr>
     4409     <td valign="top">Abstract</td>
     4410     <td valign="top">A steady rise in home systems has been seen over the past few years. As more systems are designed and deployed, an appropriate testbed is required to test these systems. Sev- eral systems exist, such as PlanetLab, that currently provide a networking testbed allowing researchers and developers to test and measure various applications. However in the long run such testbeds will be unable to keep up and meet all the demands of many of the large scale modern day peer-to-peer systems. We outline the various challenges and essentials of a networking testbed and we provide an alternate network- ing testbed that is driven by resources that are voluntarily contributed. We talk about the various advantages and dis- advantages of the Seattle system, an open source peer-to- peer computing testbed that has the potential to meet these demands. The testbed is composed of sandboxed resources that are donated by volunteers. Seattle has been deployed for about three years and supports many researchers who are interested in a networking testbed. The testbed consists of over 4100 nodes and is constantly growing. Seattle looks to grow and meet the demands of networking testbeds as they are made.</td>
     4411</tr>
     4412
     4413
     4414
     4415
     4416
     4417
     4418</li>
     4419
     4420</table></div><br><br>
     4421
     4422
     4423
     4424
     4425<a class="EntryGoto" id="Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram"></a>
     4426<b class="myheading" style="position: relative; left: 5%;">Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram</b>
     4427
     4428<div class="BibEntry">
     4429
     4430<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4431
     4432<li>
     4433
     4434
     4435<tr>
     4436     <td valign="top">Author</td>
     4437     <td valign="top">Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram</td>
     4438</tr>
     4439
     4440<tr>
     4441     <td valign="top">Title</td>
     4442     <td valign="top">OpenFlow Configuration (OFConfig) Protocol: Implementation for the OF Management Plane</td>
     4443</tr>
     4444
     4445<tr>
     4446     <td valign="top">Booktitle</td>
     4447     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     4448</tr>
     4449
     4450<tr>
     4451     <td valign="top">Location</td>
     4452     <td valign="top">Salt Lake City, UT</td>
     4453</tr>
     4454
     4455<tr>
     4456     <td valign="top">Publisher</td>
     4457     <td valign="top">IEEE</td>
     4458</tr>
     4459
     4460<tr>
     4461     <td valign="top">Year</td>
     4462     <td valign="top">2013</td>
     4463</tr>
     4464
     4465
     4466
     4467<tr>
     4468     <td valign="top">DOI</td>
     4469     <td valign="top">10.1109/GREE.2013.21</td>
     4470</tr>
     4471
     4472
     4473
     4474<tr>
     4475     <td valign="top">URL</td>
     4476     <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.21">http://dx.doi.org/10.1109/GREE.2013.21</a></td>
     4477</tr>
     4478
     4479
     4480</li>
     4481
     4482</table></div><br><br>
     4483
     4484
     4485
     4486
     4487<a class="EntryGoto" id="O'Neill, Derek and Aikat, Jay and Jeffay, Kevin"></a>
     4488<b class="myheading" style="position: relative; left: 5%;">O'Neill, Derek and Aikat, Jay and Jeffay, Kevin</b>
     4489
     4490<div class="BibEntry">
     4491
     4492<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4493
     4494<li>
     4495
     4496
     4497<tr>
     4498     <td valign="top">Author</td>
     4499     <td valign="top">O'Neill, Derek and Aikat, Jay and Jeffay, Kevin</td>
     4500</tr>
     4501
     4502<tr>
     4503     <td valign="top">Title</td>
     4504     <td valign="top">Experiment Replication using ProtoGENI nodes</td>
     4505</tr>
     4506
     4507<tr>
     4508     <td valign="top">Booktitle</td>
     4509     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     4510</tr>
     4511
     4512<tr>
     4513     <td valign="top">Location</td>
     4514     <td valign="top">Salt Lake City, UT</td>
     4515</tr>
     4516
     4517<tr>
     4518     <td valign="top">Publisher</td>
     4519     <td valign="top">IEEE</td>
     4520</tr>
     4521
     4522<tr>
     4523     <td valign="top">Year</td>
     4524     <td valign="top">2013</td>
     4525</tr>
     4526
     4527
     4528
     4529<tr>
     4530     <td valign="top">DOI</td>
     4531     <td valign="top">10.1109/GREE.2013.11</td>
     4532</tr>
     4533
     4534
     4535
     4536<tr>
     4537     <td valign="top">URL</td>
     4538     <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.11">http://dx.doi.org/10.1109/GREE.2013.11</a></td>
     4539</tr>
     4540
     4541
     4542</li>
     4543
     4544</table></div><br><br>
     4545
     4546
     4547
     4548
     4549<a class="EntryGoto" id="Ozcelik, Ilker and Brooks, Richard R."></a>
     4550<b class="myheading" style="position: relative; left: 5%;">Ozcelik, Ilker and Brooks, Richard R.</b>
     4551
     4552<div class="BibEntry">
     4553
     4554<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4555
     4556<li>
     4557
     4558
     4559<tr>
     4560     <td valign="top">Author</td>
     4561     <td valign="top">Ozcelik, Ilker and Brooks, Richard R.</td>
     4562</tr>
     4563
     4564<tr>
     4565     <td valign="top">Title</td>
     4566     <td valign="top">Security experimentation using operational systems</td>
     4567</tr>
     4568
     4569<tr>
     4570     <td valign="top">Booktitle</td>
     4571     <td valign="top">Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research</td>
     4572</tr>
     4573
     4574<tr>
     4575     <td valign="top">Location</td>
     4576     <td valign="top">Oak Ridge, Tennessee</td>
     4577</tr>
     4578
     4579<tr>
     4580     <td valign="top">Publisher</td>
     4581     <td valign="top">ACM</td>
     4582</tr>
     4583
     4584<tr>
     4585     <td valign="top">Address</td>
     4586     <td valign="top">New York, NY, USA</td>
     4587</tr>
     4588
     4589<tr>
     4590     <td valign="top">Year</td>
     4591     <td valign="top">2011</td>
     4592</tr>
     4593
     4594<tr>
     4595     <td valign="top">Abstract</td>
     4596     <td valign="top">Computers and Internet have evolved into necessary tools for our professional, personal and social lives. As a result of this growing dependence, there is a concern that these systems remain protected and available. This concern increases exponentially when considering systems such as smart power grids. Therefore, research should be conducted to develop effective ways of detecting system anomalies. To have realistic results, the studies should be tested on real systems. However, it is not possible to test these experiments on the live network. With the recent collaboration of Universities and research labs, a new experiment test bed has been established. As a result, experiments can now be implemented on real networks. In our study, we design an experiment to analyze Distributed Denial of Service Attacks (DDoS Attack) on a real network with real Internet traffic. The approach that we use in our study can easily be generalized to apply to smart power grids.</td>
     4597</tr>
     4598
     4599
     4600
     4601<tr>
     4602     <td valign="top">DOI</td>
     4603     <td valign="top">10.1145/2179298.2179388</td>
     4604</tr>
     4605
     4606
     4607
     4608<tr>
     4609     <td valign="top">URL</td>
     4610     <td valign="top"><a href="http://dx.doi.org/10.1145/2179298.2179388">http://dx.doi.org/10.1145/2179298.2179388</a></td>
     4611</tr>
     4612
     4613
     4614</li>
     4615
     4616</table></div><br><br>
     4617
     4618
     4619<div class="BibEntry">
     4620
     4621<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4622
     4623<li>
     4624
     4625
     4626<tr>
     4627     <td valign="top">Author</td>
     4628     <td valign="top">Ozcelik, Ilker and Brooks, Richard R.</td>
     4629</tr>
     4630
     4631<tr>
     4632     <td valign="top">Title</td>
     4633     <td valign="top">Performance Analysis of DDoS Detection Methods on Real Network</td>
     4634</tr>
     4635
     4636<tr>
     4637     <td valign="top">Booktitle</td>
     4638     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     4639</tr>
     4640
     4641<tr>
     4642     <td valign="top">Location</td>
     4643     <td valign="top">Los Angeles</td>
     4644</tr>
     4645
     4646<tr>
     4647     <td valign="top">Year</td>
     4648     <td valign="top">2012</td>
     4649</tr>
     4650
     4651<tr>
     4652     <td valign="top">Abstract</td>
     4653     <td valign="top">Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic.</td>
     4654</tr>
     4655
     4656
     4657
     4658
     4659
     4660
     4661</li>
     4662
     4663</table></div><br><br>
     4664
     4665
     4666
     4667
     4668<a class="EntryGoto" id="Ozcelik, Ilker and Fu, Yu and Brooks, Richard R."></a>
     4669<b class="myheading" style="position: relative; left: 5%;">Ozcelik, Ilker and Fu, Yu and Brooks, Richard R.</b>
     4670
     4671<div class="BibEntry">
     4672
     4673<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4674
     4675<li>
     4676
     4677
     4678<tr>
     4679     <td valign="top">Author</td>
     4680     <td valign="top">Ozcelik, Ilker and Fu, Yu and Brooks, Richard R.</td>
     4681</tr>
     4682
     4683<tr>
     4684     <td valign="top">Title</td>
     4685     <td valign="top">DoS Detection is Easier Now</td>
     4686</tr>
     4687
     4688<tr>
     4689     <td valign="top">Booktitle</td>
     4690     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     4691</tr>
     4692
     4693<tr>
     4694     <td valign="top">Location</td>
     4695     <td valign="top">Salt Lake City, UT</td>
     4696</tr>
     4697
     4698<tr>
     4699     <td valign="top">Publisher</td>
     4700     <td valign="top">IEEE</td>
     4701</tr>
     4702
     4703<tr>
     4704     <td valign="top">Year</td>
     4705     <td valign="top">2013</td>
     4706</tr>
     4707
     4708
     4709
     4710<tr>
     4711     <td valign="top">DOI</td>
     4712     <td valign="top">10.1109/GREE.2013.18</td>
     4713</tr>
     4714
     4715
     4716
     4717<tr>
     4718     <td valign="top">URL</td>
     4719     <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.18">http://dx.doi.org/10.1109/GREE.2013.18</a></td>
     4720</tr>
     4721
     4722
     4723</li>
     4724
     4725</table></div><br><br>
     4726
     4727
     4728
     4729
     4730<a class="EntryGoto" id="Paul, Subharthi and Pan, Jianli and Jain, Raj"></a>
     4731<b class="myheading" style="position: relative; left: 5%;">Paul, Subharthi and Pan, Jianli and Jain, Raj</b>
     4732
     4733<div class="BibEntry">
     4734
     4735<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4736
     4737<li>
     4738
     4739
     4740<tr>
     4741     <td valign="top">Author</td>
     4742     <td valign="top">Paul, Subharthi and Pan, Jianli and Jain, Raj</td>
     4743</tr>
     4744
     4745<tr>
     4746     <td valign="top">Title</td>
     4747     <td valign="top">Architectures for the future networks and the next generation Internet: A survey</td>
     4748</tr>
     4749
     4750<tr>
     4751     <td valign="top">Journal</td>
     4752     <td valign="top">Computer Communications</td>
     4753</tr>
     4754
     4755<tr>
     4756     <td valign="top">Publisher</td>
     4757     <td valign="top">Elsevier Science Publishers B. V.</td>
     4758</tr>
     4759
     4760<tr>
     4761     <td valign="top">Address</td>
     4762     <td valign="top">Amsterdam, The Netherlands, The Netherlands</td>
     4763</tr>
     4764
     4765<tr>
     4766     <td valign="top">Year</td>
     4767     <td valign="top">2011</td>
     4768</tr>
     4769
     4770<tr>
     4771     <td valign="top">Abstract</td>
     4772     <td valign="top">Networking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet. We present a comprehensive survey of such research projects and activities. The topics covered include various testbeds for experimentations for new architectures, new security mechanisms, content delivery mechanisms, management and control frameworks, service architectures, and routing mechanisms. Delay/disruption tolerant networks which allow communications even when complete end-to-end path is not available are also discussed.</td>
     4773</tr>
     4774
     4775
     4776
     4777<tr>
     4778     <td valign="top">DOI</td>
     4779     <td valign="top">10.1016/j.comcom.2010.08.001</td>
     4780</tr>
     4781
     4782
     4783
     4784<tr>
     4785     <td valign="top">URL</td>
     4786     <td valign="top"><a href="http://dx.doi.org/10.1016/j.comcom.2010.08.001">http://dx.doi.org/10.1016/j.comcom.2010.08.001</a></td>
     4787</tr>
     4788
     4789
     4790</li>
     4791
     4792</table></div><br><br>
     4793
     4794
     4795
     4796
     4797<a class="EntryGoto" id="Qin, Z. and Xiong, X. and Chuah, M."></a>
     4798<b class="myheading" style="position: relative; left: 5%;">Qin, Z. and Xiong, X. and Chuah, M.</b>
     4799
     4800<div class="BibEntry">
     4801
     4802<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4803
     4804<li>
     4805
     4806
     4807<tr>
     4808     <td valign="top">Author</td>
     4809     <td valign="top">Qin, Z. and Xiong, X. and Chuah, M.</td>
     4810</tr>
     4811
     4812<tr>
     4813     <td valign="top">Title</td>
     4814     <td valign="top">Lehigh Explorer: Android Application Utilizing Content Centric Features</td>
     4815</tr>
     4816
     4817<tr>
     4818     <td valign="top">Booktitle</td>
     4819     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     4820</tr>
     4821
     4822<tr>
     4823     <td valign="top">Location</td>
     4824     <td valign="top">Los Angeles</td>
     4825</tr>
     4826
     4827<tr>
     4828     <td valign="top">Year</td>
     4829     <td valign="top">2012</td>
     4830</tr>
     4831
     4832<tr>
     4833     <td valign="top">Abstract</td>
     4834     <td valign="top">Companies, government organizations or institutions from anywhere in the world publish different types of information e.g. news, health alerts, disaster warnings at any time. Rather than consuming all published data, users only desire access to information of interest to themselves irrespective of where the data is located and who publish them. Existing publish/subscribe systems built based on IP-based network can be inefficient and are not flexible enough to meet emerging requirements e.g. deal with mobile users, dynamic contents, searching over encrypted data. Recently content-centric networks have been proposed to provide flexibility to users to access such information. We have designed secure content centric mobile networks that allow users to publish and retrieve contents securely. As with any new architecture, one important issue is to have useful applications that can utilize features provided in the new architecture. In this paper, we describe an Android application we recently developed that allows visitors to explore Lehigh campus based on their expressed interests. Our application utilizes keyword based interest messages to retrieve matching data items of interests to a user. We are giving a demo of Lehigh Explorer at GEC13.</td>
     4835</tr>
     4836
     4837
     4838
     4839
     4840
     4841
     4842</li>
     4843
     4844</table></div><br><br>
     4845
     4846
     4847
     4848
     4849<a class="EntryGoto" id="Quan, John and Nance, Kara and Hay, Brian"></a>
     4850<b class="myheading" style="position: relative; left: 5%;">Quan, John and Nance, Kara and Hay, Brian</b>
     4851
     4852<div class="BibEntry">
     4853
     4854<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4855
     4856<li>
     4857
     4858
     4859<tr>
     4860     <td valign="top">Author</td>
     4861     <td valign="top">Quan, John and Nance, Kara and Hay, Brian</td>
     4862</tr>
     4863
     4864<tr>
     4865     <td valign="top">Title</td>
     4866     <td valign="top">A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments</td>
     4867</tr>
     4868
     4869<tr>
     4870     <td valign="top">Journal</td>
     4871     <td valign="top">IT Professional</td>
     4872</tr>
     4873
     4874<tr>
     4875     <td valign="top">Year</td>
     4876     <td valign="top">2011</td>
     4877</tr>
     4878
     4879<tr>
     4880     <td valign="top">Abstract</td>
     4881     <td valign="top">Applying a mutualistic security service model to large-scale virtualized environments that rely on contributed hardware lets researchers improve security in exchange for resources. The authors discuss this model in the context of the Global Environment for Network Innovation (GENI) project.</td>
     4882</tr>
     4883
     4884
     4885
     4886<tr>
     4887     <td valign="top">DOI</td>
     4888     <td valign="top">10.1109/MITP.2011.36</td>
     4889</tr>
     4890
     4891
     4892
     4893<tr>
     4894     <td valign="top">URL</td>
     4895     <td valign="top"><a href="http://dx.doi.org/10.1109/MITP.2011.36">http://dx.doi.org/10.1109/MITP.2011.36</a></td>
     4896</tr>
     4897
     4898
     4899</li>
     4900
     4901</table></div><br><br>
     4902
     4903
     4904
     4905
     4906<a class="EntryGoto" id="Raychaudhuri, Dipankar and Nagaraja, Kiran and Venkataramani, Arun"></a>
     4907<b class="myheading" style="position: relative; left: 5%;">Raychaudhuri, Dipankar and Nagaraja, Kiran and Venkataramani, Arun</b>
     4908
     4909<div class="BibEntry">
     4910
     4911<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4912
     4913<li>
     4914
     4915
     4916<tr>
     4917     <td valign="top">Author</td>
     4918     <td valign="top">Raychaudhuri, Dipankar and Nagaraja, Kiran and Venkataramani, Arun</td>
     4919</tr>
     4920
     4921<tr>
     4922     <td valign="top">Title</td>
     4923     <td valign="top">MobilityFirst: a robust and trustworthy mobility-centric architecture for the future internet</td>
     4924</tr>
     4925
     4926<tr>
     4927     <td valign="top">Journal</td>
     4928     <td valign="top">SIGMOBILE Mob. Comput. Commun. Rev.</td>
     4929</tr>
     4930
     4931<tr>
     4932     <td valign="top">Publisher</td>
     4933     <td valign="top">ACM</td>
     4934</tr>
     4935
     4936<tr>
     4937     <td valign="top">Address</td>
     4938     <td valign="top">New York, NY, USA</td>
     4939</tr>
     4940
     4941<tr>
     4942     <td valign="top">Year</td>
     4943     <td valign="top">2012</td>
     4944</tr>
     4945
     4946<tr>
     4947     <td valign="top">Abstract</td>
     4948     <td valign="top">This paper presents an overview of the MobilityFirst network architecture, currently under development as part of the US National Science Foundation's Future Internet Architecture (FIA) program. The proposed architecture is intended to directly address the challenges of wireless access and mobility at scale, while also providing new services needed for emerging mobile Internet application scenarios. After briefly outlining the original design goals of the project, we provide a discussion of the main architectural concepts behind the network design, identifying key features such as separation of names from addresses, public-key based globally unique identifiers (GUIDs) for named objects, global name resolution service (GNRS) for dynamic binding of names to addresses, storage-aware routing and late binding, content- and context-aware services, optional in-network compute layer, and so on. This is followed by a brief description of the MobilityFirst protocol stack as a whole, along with an explanation of how the protocol works at end-user devices and inside network routers. Example of specific advanced services supported by the protocol stack, including multi-homing, mobility with disconnection, and content retrieval/caching are given for illustration. Further design details of two key protocol components, the GNRS name resolution service and the GSTAR routing protocol, are also described along with sample results from evaluation. In conclusion, a brief description of an ongoing multi-site experimental proof-of-concept deployment of the MobilityFirst protocol stack on the GENI testbed is provided.</td>
     4949</tr>
     4950
     4951
     4952
     4953<tr>
     4954     <td valign="top">DOI</td>
     4955     <td valign="top">10.1145/2412096.2412098</td>
     4956</tr>
     4957
     4958
     4959
     4960<tr>
     4961     <td valign="top">URL</td>
     4962     <td valign="top"><a href="http://dx.doi.org/10.1145/2412096.2412098">http://dx.doi.org/10.1145/2412096.2412098</a></td>
     4963</tr>
     4964
     4965
     4966</li>
     4967
     4968</table></div><br><br>
     4969
     4970
     4971
     4972
     4973<a class="EntryGoto" id="Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon"></a>
     4974<b class="myheading" style="position: relative; left: 5%;">Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon</b>
     4975
     4976<div class="BibEntry">
     4977
     4978<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4979
     4980<li>
     4981
     4982
     4983<tr>
     4984     <td valign="top">Author</td>
     4985     <td valign="top">Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon</td>
     4986</tr>
     4987
     4988<tr>
     4989     <td valign="top">Title</td>
     4990     <td valign="top">An Architecture For International Federation of Network Testbeds</td>
     4991</tr>
     4992
     4993<tr>
     4994     <td valign="top">Journal</td>
     4995     <td valign="top">IEICE Transactions on Communications</td>
     4996</tr>
     4997
     4998<tr>
     4999     <td valign="top">Year</td>
     5000     <td valign="top">2013</td>
     5001</tr>
     5002
     5003<tr>
     5004     <td valign="top">Abstract</td>
     5005     <td valign="top">Testbeds play a key role in the advancement of network science and the exploration of new network architectures. Because the scale and scope of any individual testbed is necessarily limited, federation is a useful technique for constructing testbeds that serve a wide range of experimenter needs. In a federated testbed, individual facilities maintain local autonomy while cooperating to provide a unified set of abstractions and interfaces to users. Forming an international federation is particularly challenging, because issues of trust, user access policy, and local laws and regulations are of greater concern that they are for federations within a single country. In this paper, we describe an architecture, based on the US National Science Foundation's GENI project, that is capable of supporting the needs of an international federation.</td>
     5006</tr>
     5007
     5008
     5009
     5010<tr>
     5011     <td valign="top">DOI</td>
     5012     <td valign="top">10.1587/transcom.E96.B.2</td>
     5013</tr>
     5014
     5015
     5016
     5017<tr>
     5018     <td valign="top">URL</td>
     5019     <td valign="top"><a href="http://dx.doi.org/10.1587/transcom.E96.B.2">http://dx.doi.org/10.1587/transcom.E96.B.2</a></td>
     5020</tr>
     5021
     5022
     5023</li>
     5024
     5025</table></div><br><br>
     5026
     5027
     5028
     5029
     5030<a class="EntryGoto" id="Rohrer, Justin P. and &#x43;&#x0327;etinkaya, Egemen K. and Sterbenz, James P. G."></a>
     5031<b class="myheading" style="position: relative; left: 5%;">Rohrer, Justin P. and &#x43;&#x0327;etinkaya, Egemen K. and Sterbenz, James P. G.</b>
     5032
     5033<div class="BibEntry">
     5034
     5035<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5036
     5037<li>
     5038
     5039
     5040<tr>
     5041     <td valign="top">Author</td>
     5042     <td valign="top">Rohrer, Justin P. and &#x43;&#x0327;etinkaya, Egemen K. and Sterbenz, James P. G.</td>
     5043</tr>
     5044
     5045<tr>
     5046     <td valign="top">Title</td>
     5047     <td valign="top">Progress and challenges in large-scale future internet experimentation using the GpENI programmable testbed</td>
     5048</tr>
     5049
     5050<tr>
     5051     <td valign="top">Booktitle</td>
     5052     <td valign="top">Proceedings of the 6th International Conference on Future Internet Technologies</td>
     5053</tr>
     5054
     5055<tr>
     5056     <td valign="top">Location</td>
     5057     <td valign="top">Seoul, Republic of Korea</td>
     5058</tr>
     5059
     5060<tr>
     5061     <td valign="top">Publisher</td>
     5062     <td valign="top">ACM</td>
     5063</tr>
     5064
     5065<tr>
     5066     <td valign="top">Address</td>
     5067     <td valign="top">New York, NY, USA</td>
     5068</tr>
     5069
     5070<tr>
     5071     <td valign="top">Year</td>
     5072     <td valign="top">2011</td>
     5073</tr>
     5074
     5075<tr>
     5076     <td valign="top">Abstract</td>
     5077     <td valign="top">GpENI is evolving to provide a promising environment in which to do experimental research in the resilience and survivability of future networks, by allowing programmable control over topology and mechanism, while providing the scale and global reach needed to conduct network experiments far beyond the capabilities of a conventional testbed. Addressing this need at scale introduces a number of challenges both in deployment and in collecting results that can be directly compared to simulation results for cross-verification purposes. In this short paper we present the scope, design goals, challenges, and current status of the GpENI programmable testbed, as well as an overview and examples of the types of experiments we are beginning to run.</td>
     5078</tr>
     5079
     5080
     5081
     5082<tr>
     5083     <td valign="top">DOI</td>
     5084     <td valign="top">10.1145/2002396.2002409</td>
     5085</tr>
     5086
     5087
     5088
     5089<tr>
     5090     <td valign="top">URL</td>
     5091     <td valign="top"><a href="http://dx.doi.org/10.1145/2002396.2002409">http://dx.doi.org/10.1145/2002396.2002409</a></td>
     5092</tr>
     5093
     5094
     5095</li>
     5096
     5097</table></div><br><br>
     5098
     5099
     5100
     5101
     5102<a class="EntryGoto" id="Rosen, Aaron and Wang, Kuang-Ching"></a>
     5103<b class="myheading" style="position: relative; left: 5%;">Rosen, Aaron and Wang, Kuang-Ching</b>
     5104
     5105<div class="BibEntry">
     5106
     5107<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5108
     5109<li>
     5110
     5111
     5112<tr>
     5113     <td valign="top">Author</td>
     5114     <td valign="top">Rosen, Aaron and Wang, Kuang-Ching</td>
     5115</tr>
     5116
     5117<tr>
     5118     <td valign="top">Title</td>
     5119     <td valign="top">Steroid OpenFlow Service: Seamless Network Service Delivery in Software Defined Networks</td>
     5120</tr>
     5121
     5122<tr>
     5123     <td valign="top">Booktitle</td>
     5124     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     5125</tr>
     5126
     5127<tr>
     5128     <td valign="top">Location</td>
     5129     <td valign="top">Los Angeles</td>
     5130</tr>
     5131
     5132<tr>
     5133     <td valign="top">Year</td>
     5134     <td valign="top">2012</td>
     5135</tr>
     5136
     5137<tr>
     5138     <td valign="top">Abstract</td>
     5139     <td valign="top">In a software defined network (SDN), packet forwarding is controlled by software controllers. In an OpenFlow SDN, a controller can control the forwarding, rewriting, and dropping of packets based on their header attributes. The ability to handle packets in customizable ways in software has significant implications for both network users and operators. Via software, users can convey application specific expectations while operators can deliver application specific services to enhance user experiences. In this paper, we present the Steroid OpenFlow Services (SOS) paradigm for network services delivery. The paradigm enables operators to deliver network services without any setup requirements on user machines. SOS utilizes OpenFlow to redirect application specific traffic to application specific service agents; SOS also rewrites packet headers for a service to remain seamless to users. This paper presents an example SOS service for optimizing large volume TCP download across a large delay-bandwidth-product wide area network. SOS service agents on both ends of the connection seamlessly terminate a user TCP connection, launch a set of parallel TCP connections, and leverage multiple paths when available to maximize throughput. With the NSF GENI future Internet testbed, a prototype implementation achieved up to 320 times throughput enhancement seamless to the end users.</td>
     5140</tr>
     5141
     5142
     5143
     5144
     5145
     5146
     5147</li>
     5148
     5149</table></div><br><br>
     5150
     5151
     5152
     5153
     5154<a class="EntryGoto" id="Scoglio, Caterina M. and Sydney, Ali and Youssef, Mina and Schumm, Phillip and Kooij, Robert E."></a>
     5155<b class="myheading" style="position: relative; left: 5%;">Scoglio, Caterina M. and Sydney, Ali and Youssef, Mina and Schumm, Phillip and Kooij, Robert E.</b>
     5156
     5157<div class="BibEntry">
     5158
     5159<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5160
     5161<li>
     5162
     5163
     5164<tr>
     5165     <td valign="top">Author</td>
     5166     <td valign="top">Scoglio, Caterina M. and Sydney, Ali and Youssef, Mina and Schumm, Phillip and Kooij, Robert E.</td>
     5167</tr>
     5168
     5169<tr>
     5170     <td valign="top">Title</td>
     5171     <td valign="top">Elasticity and Viral Conductance: Unveiling Robustness in Complex Networks through Topological Characteristics</td>
     5172</tr>
     5173
     5174<tr>
     5175     <td valign="top">Journal</td>
     5176     <td valign="top">CoRR</td>
     5177</tr>
     5178
     5179<tr>
     5180     <td valign="top">Year</td>
     5181     <td valign="top">2008</td>
     5182</tr>
     5183
     5184
     5185
     5186
     5187
     5188
     5189</li>
     5190
     5191</table></div><br><br>
     5192
     5193
     5194
     5195
     5196<a class="EntryGoto" id="Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar"></a>
     5197<b class="myheading" style="position: relative; left: 5%;">Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar</b>
     5198
     5199<div class="BibEntry">
     5200
     5201<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5202
     5203<li>
     5204
     5205
     5206<tr>
     5207     <td valign="top">Author</td>
     5208     <td valign="top">Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar</td>
     5209</tr>
     5210
     5211<tr>
     5212     <td valign="top">Title</td>
     5213     <td valign="top">MobilityFirst future internet architecture project</td>
     5214</tr>
     5215
     5216<tr>
     5217     <td valign="top">Booktitle</td>
     5218     <td valign="top">Proceedings of the 7th Asian Internet Engineering Conference</td>
     5219</tr>
     5220
     5221<tr>
     5222     <td valign="top">Location</td>
     5223     <td valign="top">Bangkok, Thailand</td>
     5224</tr>
     5225
     5226<tr>
     5227     <td valign="top">Publisher</td>
     5228     <td valign="top">ACM</td>
     5229</tr>
     5230
     5231<tr>
     5232     <td valign="top">Address</td>
     5233     <td valign="top">New York, NY, USA</td>
     5234</tr>
     5235
     5236<tr>
     5237     <td valign="top">Year</td>
     5238     <td valign="top">2011</td>
     5239</tr>
     5240
     5241<tr>
     5242     <td valign="top">Abstract</td>
     5243     <td valign="top">This short paper presents an overview of the MobilityFirst network architecture, which is a clean-slate project being conducted as part of the NSF Future Internet Architecture (FIA) program. The proposed architecture is intended to directly address the challenges of wireless access and mobility at scale, while also providing new multicast, anycast, multi-path and context-aware services needed for emerging mobile Internet application scenarios. Key protocol components of the proposed architecture are: (a) separation of naming from addressing; (b) public key based self-certifying names (called globally unique identifiers or GUIDs) for network-attached objects; (c) global name resolution service (GNRS) for dynamic name-to-address binding; (d) delay-tolerant and storage-aware routing (GSTAR) capable of dealing with wireless link quality fluctuations and disconnections; (e) hop-by-hop transport of large protocol data units; and (f) location or context-aware services. The basic operations of a MobilityFirst router are outlined. This is followed by a discussion of ongoing proof-of-concept prototyping and experimental evaluation efforts for the MobilityFirst protocol stack. In conclusion, a brief description of an ongoing multi-site experimental deployment of the MobilityFirst protocol stack on the GENI testbed is provided.</td>
     5244</tr>
     5245
     5246
     5247
     5248<tr>
     5249     <td valign="top">DOI</td>
     5250     <td valign="top">10.1145/2089016.2089017</td>
     5251</tr>
     5252
     5253
     5254
     5255<tr>
     5256     <td valign="top">URL</td>
     5257     <td valign="top"><a href="http://dx.doi.org/10.1145/2089016.2089017">http://dx.doi.org/10.1145/2089016.2089017</a></td>
     5258</tr>
     5259
     5260
     5261</li>
     5262
     5263</table></div><br><br>
     5264
     5265
     5266
     5267
     5268<a class="EntryGoto" id="Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant"></a>
     5269<b class="myheading" style="position: relative; left: 5%;">Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant</b>
     5270
     5271<div class="BibEntry">
     5272
     5273<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5274
     5275<li>
     5276
     5277
     5278<tr>
     5279     <td valign="top">Author</td>
     5280     <td valign="top">Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant</td>
     5281</tr>
     5282
     5283<tr>
     5284     <td valign="top">Title</td>
     5285     <td valign="top">Cloudy Computing: Leveraging Weather Forecasts in Energy Harvesting Sensor Systems</td>
     5286</tr>
     5287
     5288<tr>
     5289     <td valign="top">Booktitle</td>
     5290     <td valign="top">2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)</td>
     5291</tr>
     5292
     5293<tr>
     5294     <td valign="top">Location</td>
     5295     <td valign="top">Boston, MA, USA</td>
     5296</tr>
     5297
     5298<tr>
     5299     <td valign="top">Publisher</td>
     5300     <td valign="top">IEEE</td>
     5301</tr>
     5302
     5303<tr>
     5304     <td valign="top">Year</td>
    8115305     <td valign="top">2010</td>
    8125306</tr>
     
    8145308<tr>
    8155309     <td valign="top">Abstract</td>
    816      <td valign="top">The 802.16e standard for broadband wireless access mandates the presence of QoS classes, but does not specify guidelines for the scheduler implementation or mechanisms to ensure air time fairness. Our study demonstrates the feasibility of controlling downlink airtime fairness for slices while running above a proprietary WiMAX basestation (BS) scheduler. We design and implement a virtualized infrastructure that allows users to obtain at least an allocated percentage of BS resources in the presence of saturation and link degradation. Using Kernel virtual machines for creating slices and Click modular router for implementing the virtual network traffic shaping engine we show that it is possible to adaptively control slice usage for downlink traffic on a WiMAX Basestation. The fairness index and coupling coefficient show an improvement of up to 42&#x0025;, and 73&#x0025; with preliminary indoor walking mobility experiments. Outdoor vehicular measurements show an improvement of up to 27&#x0025;, and 70\\\\ with the fairness index and coupling coefficient respectively</td>
    817 </tr>
    818 
    819 
    820 
    821 <tr>
    822      <td valign="top">DOI</td>
    823      <td valign="top">10.1109/ICC.2010.5502484</td>
    824 </tr>
    825 
    826 
    827 
    828 <tr>
    829      <td valign="top">URL</td>
    830      <td valign="top"><a href="http://dx.doi.org/10.1109/ICC.2010.5502484">http://dx.doi.org/10.1109/ICC.2010.5502484</a></td>
    831 </tr>
    832 
    833 
    834 </table></div><br><br>
    835 
    836 
    837 
    838 
    839 <a class="EntryGoto" id="Bhanage, G. and Seskar, I. and Zhang, Y. and Raychaudhuri, D. and Jain, S."></a>
    840 <b class="myheading" style="position: relative; left: 5%;">Bhanage, G. and Seskar, I. and Zhang, Y. and Raychaudhuri, D. and Jain, S.</b>
    841 
    842 <div class="BibEntry">
    843 
    844 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    845 
    846 
    847 <tr>
    848      <td valign="top">Author</td>
    849      <td valign="top">Bhanage, G. and Seskar, I. and Zhang, Y. and Raychaudhuri, D. and Jain, S.</td>
    850 </tr>
    851 
    852 <tr>
    853      <td valign="top">Title</td>
    854      <td valign="top">Experimental evaluation of openvz from a testbed deployment perspective</td>
     5310     <td valign="top">To sustain perpetual operation, systems that harvest environmental energy must carefully regulate their usage to satisfy their demand. Regulating energy usage is challenging if a system's demands are not elastic and its hardware components are not energy-proportional, since it cannot precisely scale its usage to match its supply. Instead, the system must choose when to satisfy its energy demands based on its current energy reserves and predictions of its future energy supply. In this paper, we explore the use of weather forecasts to improve a system's ability to satisfy demand by improving its predictions. We analyze weather forecast, observational, and energy harvesting data to formulate a model that translates a weather forecast to a wind or solar energy harvesting prediction, and quantify its accuracy. We evaluate our model for both energy sources in the context of two different energy harvesting sensor systems with inelastic demands: a sensor testbed that leases sensors to external users and a lexicographically fair sensor network that maintains steady node sensing rates. We show that using weather forecasts in both wind- and solar-powered sensor systems increases each system's ability to satisfy its demands compared with existing prediction strategies.</td>
     5311</tr>
     5312
     5313
     5314
     5315<tr>
     5316     <td valign="top">DOI</td>
     5317     <td valign="top">10.1109/SECON.2010.5508260</td>
     5318</tr>
     5319
     5320
     5321
     5322<tr>
     5323     <td valign="top">URL</td>
     5324     <td valign="top"><a href="http://dx.doi.org/10.1109/SECON.2010.5508260">http://dx.doi.org/10.1109/SECON.2010.5508260</a></td>
     5325</tr>
     5326
     5327
     5328</li>
     5329
     5330</table></div><br><br>
     5331
     5332
     5333
     5334
     5335<a class="EntryGoto" id="Shen, Haiying and Liu, Guoxin"></a>
     5336<b class="myheading" style="position: relative; left: 5%;">Shen, Haiying and Liu, Guoxin</b>
     5337
     5338<div class="BibEntry">
     5339
     5340<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5341
     5342<li>
     5343
     5344
     5345<tr>
     5346     <td valign="top">Author</td>
     5347     <td valign="top">Shen, Haiying and Liu, Guoxin</td>
     5348</tr>
     5349
     5350<tr>
     5351     <td valign="top">Title</td>
     5352     <td valign="top">Harmony: Integrated Resource and Reputation Management for Large-Scale Distributed Systems</td>
     5353</tr>
     5354
     5355<tr>
     5356     <td valign="top">Booktitle</td>
     5357     <td valign="top">2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)</td>
     5358</tr>
     5359
     5360<tr>
     5361     <td valign="top">Location</td>
     5362     <td valign="top">Lahaina, HI, USA</td>
     5363</tr>
     5364
     5365<tr>
     5366     <td valign="top">Publisher</td>
     5367     <td valign="top">IEEE</td>
     5368</tr>
     5369
     5370<tr>
     5371     <td valign="top">Year</td>
     5372     <td valign="top">2011</td>
     5373</tr>
     5374
     5375<tr>
     5376     <td valign="top">Abstract</td>
     5377     <td valign="top">Advancements in technology over the past decade are leading to a promising future for large-scale distributed systems, where globally-scattered distributed resources are collectively pooled and used in a cooperative manner to achieve unprecedented petascale supercomputing capabilities. The issues of resource management (resMgt) and reputation management (repMgt) need to be addressed in order to ensure the successful deployment of large-scale distributed systems. However, these two issues have typically been addressed separately, despite the significant interdependencies between them: resMgt needs repMgt to provide a cooperative environment for resource sharing, and in turn facilitates repMgt to evaluate multi-faceted node reputations for providing different resources. Current repMgt methods provide a single reputation value for each node in providing all types of resources. However, a node willing to provide one resource may not be willing to provide another resource. In addition, current repMgt methods often guide node selection policy to select the highest-reputed nodes, which may overload these nodes. Also, few works exploited node reputation in resource selection in order to fully and fairly utilize resources in the system and to meet users' diverse QoS demands. We propose a system called Harmony that integrates resMgt and repMgt in a harmonious manner. Harmony incorporates two key innovations: integrated multi-faceted resource/reputation management and multi-QoS-oriented resource selection. The trace data we collected from an online trading platform confirms the importance of multi-faceted reputation and potential problems with highest-reputed node selection. Trace-driven experiments performed on PlanetLab show that Harmony outperforms existing resMgt and repMgt in terms of the success rate, service delay, and efficiency.</td>
     5378</tr>
     5379
     5380
     5381
     5382<tr>
     5383     <td valign="top">DOI</td>
     5384     <td valign="top">10.1109/ICCCN.2011.6005739</td>
     5385</tr>
     5386
     5387
     5388
     5389<tr>
     5390     <td valign="top">URL</td>
     5391     <td valign="top"><a href="http://dx.doi.org/10.1109/ICCCN.2011.6005739">http://dx.doi.org/10.1109/ICCCN.2011.6005739</a></td>
     5392</tr>
     5393
     5394
     5395</li>
     5396
     5397</table></div><br><br>
     5398
     5399
     5400
     5401
     5402<a class="EntryGoto" id="Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young"></a>
     5403<b class="myheading" style="position: relative; left: 5%;">Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young</b>
     5404
     5405<div class="BibEntry">
     5406
     5407<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5408
     5409<li>
     5410
     5411
     5412<tr>
     5413     <td valign="top">Author</td>
     5414     <td valign="top">Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young</td>
     5415</tr>
     5416
     5417<tr>
     5418     <td valign="top">Title</td>
     5419     <td valign="top">Understanding the Performance of TCP and UDP-based Data Transfer Protocols using EMULAB</td>
     5420</tr>
     5421
     5422<tr>
     5423     <td valign="top">Booktitle</td>
     5424     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     5425</tr>
     5426
     5427<tr>
     5428     <td valign="top">Location</td>
     5429     <td valign="top">Los Angeles</td>
     5430</tr>
     5431
     5432<tr>
     5433     <td valign="top">Year</td>
     5434     <td valign="top">2012</td>
     5435</tr>
     5436
     5437<tr>
     5438     <td valign="top">Abstract</td>
     5439     <td valign="top">In this paper, we present a hands-on course project that explores the performance of data transfer protocols using a GENI resource. TCP is one of the key topics in networking courses, and understanding its behavior as well as limitations, from real experiments, offers an invaluable and deep learning experience. A protocol's performance is directly impacted by network parameters such as network bandwidth, delay and loss. However, it is difficult to control and even vary those parameters, if it is not evaluated with simulations. GENI facilities conveniently provide a virtual laboratory that enables us to control the network settings with real network systems. Through this educational project, students had an opportunity to control important network parameters, and measure and compare TCP's performance with a UDP-based data transfer protocol, UDT, using EMULAB. Students were enthusiastic to witness the protocols' performances, and the limitations of TCP under a high bandwidth delay product network in the presence of packet loss, and to recognize the importance of protocol design and system issues for the future Internet.</td>
     5440</tr>
     5441
     5442
     5443
     5444
     5445
     5446
     5447</li>
     5448
     5449</table></div><br><br>
     5450
     5451
     5452
     5453
     5454<a class="EntryGoto" id="Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay"></a>
     5455<b class="myheading" style="position: relative; left: 5%;">Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay</b>
     5456
     5457<div class="BibEntry">
     5458
     5459<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5460
     5461<li>
     5462
     5463
     5464<tr>
     5465     <td valign="top">Author</td>
     5466     <td valign="top">Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay</td>
     5467</tr>
     5468
     5469<tr>
     5470     <td valign="top">Title</td>
     5471     <td valign="top">Closer to the Cloud - A Case for Emulating Cloud Dynamics by Controlling the Environment</td>
     5472</tr>
     5473
     5474<tr>
     5475     <td valign="top">Booktitle</td>
     5476     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     5477</tr>
     5478
     5479<tr>
     5480     <td valign="top">Location</td>
     5481     <td valign="top">Los Angeles</td>
     5482</tr>
     5483
     5484<tr>
     5485     <td valign="top">Year</td>
     5486     <td valign="top">2012</td>
     5487</tr>
     5488
     5489
     5490
     5491
     5492
     5493
     5494</li>
     5495
     5496</table></div><br><br>
     5497
     5498
     5499
     5500
     5501<a class="EntryGoto" id="Soroush, Hamed and Banerjee, Nilanjan and Corner, Mark and Levine, Brian and Lynn, Brian"></a>
     5502<b class="myheading" style="position: relative; left: 5%;">Soroush, Hamed and Banerjee, Nilanjan and Corner, Mark and Levine, Brian and Lynn, Brian</b>
     5503
     5504<div class="BibEntry">
     5505
     5506<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5507
     5508<li>
     5509
     5510
     5511<tr>
     5512     <td valign="top">Author</td>
     5513     <td valign="top">Soroush, Hamed and Banerjee, Nilanjan and Corner, Mark and Levine, Brian and Lynn, Brian</td>
     5514</tr>
     5515
     5516<tr>
     5517     <td valign="top">Title</td>
     5518     <td valign="top">A retrospective look at the UMass DOME mobile testbed</td>
     5519</tr>
     5520
     5521<tr>
     5522     <td valign="top">Journal</td>
     5523     <td valign="top">SIGMOBILE Mob. Comput. Commun. Rev.</td>
     5524</tr>
     5525
     5526<tr>
     5527     <td valign="top">Publisher</td>
     5528     <td valign="top">ACM</td>
     5529</tr>
     5530
     5531<tr>
     5532     <td valign="top">Address</td>
     5533     <td valign="top">New York, NY, USA</td>
     5534</tr>
     5535
     5536<tr>
     5537     <td valign="top">Year</td>
     5538     <td valign="top">2012</td>
     5539</tr>
     5540
     5541<tr>
     5542     <td valign="top">Abstract</td>
     5543     <td valign="top">In this paper we describe the evolution of DOME, a diverse outdoor testbed for mobile experimentation. In addition, while highlighting the challenges faced in construction of DOME, we describe a concrete set of scientific results derived from this experience in a retrospective study. First, we argue that a broad range of mobility experiments could be performed in a testbed which provides the properties of temporal, technological, and spatial diversity. We demonstrate these properties in our testbed through analysis of data collected from DOME over a period of four years. Second, we crystallize a set of design principles that others should use when constructing testbeds of their own, including those related to deploying and managing a diverse testbed, distributing experiments remotely, and fostering collaborations among testbed stakeholders. Finally, using traces collected by DOME, we provide insights into several important problems in mobile systems research.</td>
     5544</tr>
     5545
     5546
     5547
     5548<tr>
     5549     <td valign="top">DOI</td>
     5550     <td valign="top">10.1145/2169077.2169079</td>
     5551</tr>
     5552
     5553
     5554
     5555<tr>
     5556     <td valign="top">URL</td>
     5557     <td valign="top"><a href="http://dx.doi.org/10.1145/2169077.2169079">http://dx.doi.org/10.1145/2169077.2169079</a></td>
     5558</tr>
     5559
     5560
     5561</li>
     5562
     5563</table></div><br><br>
     5564
     5565
     5566
     5567
     5568<a class="EntryGoto" id="Sridharan, Mukundan and Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex"></a>
     5569<b class="myheading" style="position: relative; left: 5%;">Sridharan, Mukundan and Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex</b>
     5570
     5571<div class="BibEntry">
     5572
     5573<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5574
     5575<li>
     5576
     5577
     5578<tr>
     5579     <td valign="top">Author</td>
     5580     <td valign="top">Sridharan, Mukundan and Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex</td>
     5581</tr>
     5582
     5583<tr>
     5584     <td valign="top">Title</td>
     5585     <td valign="top">Defragmentation of Resources in Virtual Desktop Clouds for Cost-Aware Utility-Optimal Allocation</td>
     5586</tr>
     5587
     5588<tr>
     5589     <td valign="top">Booktitle</td>
     5590     <td valign="top">2011 Fourth IEEE International Conference on Utility and Cloud Computing</td>
     5591</tr>
     5592
     5593<tr>
     5594     <td valign="top">Location</td>
     5595     <td valign="top">Melbourne, Australia</td>
     5596</tr>
     5597
     5598<tr>
     5599     <td valign="top">Publisher</td>
     5600     <td valign="top">IEEE</td>
     5601</tr>
     5602
     5603<tr>
     5604     <td valign="top">Year</td>
     5605     <td valign="top">2011</td>
     5606</tr>
     5607
     5608<tr>
     5609     <td valign="top">Abstract</td>
     5610     <td valign="top">Cloud Service Providers (CSPs) make virtual desktop cloud (VDC) resource provisioning decisions within desktop pools based on user groups and their application profiles. Such provisioning is aimed to satisfy acceptable user quality of experience (QoE) levels and is coupled with subsequent placement of VDs across distributed data centers. The placement decisions are influenced by session latency, load balancing and operation cost constraints. In this paper, we identify the resource fragmentation problem that occurs when placement is done opportunistically to minimize provisioning time and deliver satisfactory user QoE. To solve this problem, which inherently is an NP-Hard problem, we propose a defragmentation scheme that has fast convergence time and has three levels of complexity: (i) &#x75;&#x0308;tility fair provisioning&#x20;&#x0308;(UFP) to optimize resource provisioning within a data center - to achieve relative fairness between desktop pools, (ii) &#x73;&#x0308;tatic migration-free utility optimal placement and provisioning&#x20;&#x0308;(MUPP) to optimize resource provisioning between multiple data centers - to improve performance, and (iii) &#x64;&#x0308;ynamic global utility optimal placement and provisioning&#x20;&#x0308;(GUPP) to optimize resource provisioning using cost-aware and utility-maximal VD re-allocations and migrations - to increase scalability. We evaluate our defragmentation scheme against 'least latency', 'least load', and 'least cost' schemes using a novel &#x56;&#x0308;DC-Sim&#x20;&#x0308;simulator that we have developed in this study. Our simulations leverage profiles of user groups and their applications within desktop pools, obtained from a real VDC test bed. Our simulation results demonstrate that defragmentation is an important optimization step that can enable CSPs to achieve fairness, substantially improve user QoE and increase VDC scalability.</td>
     5611</tr>
     5612
     5613
     5614
     5615<tr>
     5616     <td valign="top">DOI</td>
     5617     <td valign="top">10.1109/UCC.2011.41</td>
     5618</tr>
     5619
     5620
     5621
     5622<tr>
     5623     <td valign="top">URL</td>
     5624     <td valign="top"><a href="http://dx.doi.org/10.1109/UCC.2011.41">http://dx.doi.org/10.1109/UCC.2011.41</a></td>
     5625</tr>
     5626
     5627
     5628</li>
     5629
     5630</table></div><br><br>
     5631
     5632
     5633
     5634
     5635<a class="EntryGoto" id="Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish"></a>
     5636<b class="myheading" style="position: relative; left: 5%;">Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish</b>
     5637
     5638<div class="BibEntry">
     5639
     5640<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5641
     5642<li>
     5643
     5644
     5645<tr>
     5646     <td valign="top">Author</td>
     5647     <td valign="top">Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish</td>
     5648</tr>
     5649
     5650<tr>
     5651     <td valign="top">Title</td>
     5652     <td valign="top">From Kansei to KanseiGenie: Architecture of Federated, Programmable Wireless Sensor Fabrics</td>
    8555653</tr>
    8565654
     
    8655663</tr>
    8665664
    867 
    868 
    869 <tr>
    870      <td valign="top">DOI</td>
    871      <td valign="top">10.1007/978-3-642-17851-1&#x005F;7</td>
    872 </tr>
    873 
    874 
    875 
    876 <tr>
    877      <td valign="top">URL</td>
    878      <td valign="top"><a href="http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;7">http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;7</a></td>
    879 </tr>
    880 
    881 
    882 </table></div><br><br>
    883 
    884 
    885 
    886 
    887 <a class="EntryGoto" id="Bhanage, G. and Vete, D. and Seskar, I. and Raychaudhuri, D."></a>
    888 <b class="myheading" style="position: relative; left: 5%;">Bhanage, G. and Vete, D. and Seskar, I. and Raychaudhuri, D.</b>
    889 
    890 <div class="BibEntry">
    891 
    892 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    893 
    894 
    895 <tr>
    896      <td valign="top">Author</td>
    897      <td valign="top">Bhanage, G. and Vete, D. and Seskar, I. and Raychaudhuri, D.</td>
    898 </tr>
    899 
    900 <tr>
    901      <td valign="top">Title</td>
    902      <td valign="top">SplitAP: Leveraging Wireless Network Virtualization for Flexible Sharing of WLANs</td>
    903 </tr>
    904 
    905 <tr>
    906      <td valign="top">Booktitle</td>
    907      <td valign="top">Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE</td>
    908 </tr>
    909 
    910 <tr>
    911      <td valign="top">Publisher</td>
    912      <td valign="top">IEEE</td>
    913 </tr>
    914 
    915 <tr>
    916      <td valign="top">Year</td>
    917      <td valign="top">2010</td>
    918 </tr>
    919 
    920 <tr>
    921      <td valign="top">Abstract</td>
    922      <td valign="top">Providing air-time guarantees across a group of clients forms a fundamental building block in sharing an access point (AP) across different virtual network providers. Though this problem has a relatively simple solution for downlink group scheduling through traffic engineering at the AP, solving this problem for uplink (UL) traffic presents a challenge for fair sharing of wireless hotspots. Among other issues, the mechanism for uplink traffic control has to scale across a large user base, and provide flexible operation irrespective of the client channel conditions and network loads. In this study, we propose the SplitAP architecture that address the problem of sharing uplink airtime across groups of users by extending the idea of network virtualization. Our architecture allows us to deploy different algorithms for enforcing UL airtime fairness across client groups. In this study, we will highlight the design features of the SplitAP architecture, and present results from evaluation on a prototype deployed with: (1) LPFC and (2) LPFC+, two algorithms for controlling UL group fairness. Performance comparisons on the ORBIT testbed show that the proposed algorithms are capable of providing group air-time fairness across wireless clients irrespective of the network volume, and traffic type. The algorithms show up to 40&#x0025; improvement with a modified Jain fairness index.</td>
    923 </tr>
    924 
    925 
    926 
    927 <tr>
    928      <td valign="top">DOI</td>
    929      <td valign="top">10.1109/GLOCOM.2010.5684328</td>
    930 </tr>
    931 
    932 
    933 
    934 <tr>
    935      <td valign="top">URL</td>
    936      <td valign="top"><a href="http://dx.doi.org/10.1109/GLOCOM.2010.5684328">http://dx.doi.org/10.1109/GLOCOM.2010.5684328</a></td>
    937 </tr>
    938 
    939 
    940 </table></div><br><br>
    941 
    942 
    943 
    944 
    945 <a class="EntryGoto" id="Bhanage, Gautam and Seskar, Ivan and Mahindra, Rajesh and Raychaudhuri, Dipankar"></a>
    946 <b class="myheading" style="position: relative; left: 5%;">Bhanage, Gautam and Seskar, Ivan and Mahindra, Rajesh and Raychaudhuri, Dipankar</b>
    947 
    948 <div class="BibEntry">
    949 
    950 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    951 
    952 
    953 <tr>
    954      <td valign="top">Author</td>
    955      <td valign="top">Bhanage, Gautam and Seskar, Ivan and Mahindra, Rajesh and Raychaudhuri, Dipankar</td>
    956 </tr>
    957 
    958 <tr>
    959      <td valign="top">Title</td>
    960      <td valign="top">Virtual basestation: architecture for an open shared WiMAX framework</td>
    961 </tr>
    962 
    963 <tr>
    964      <td valign="top">Booktitle</td>
    965      <td valign="top">Proceedings of the second ACM SIGCOMM workshop on Virtualized infrastructure systems and architectures</td>
    966 </tr>
    967 
    968 <tr>
    969      <td valign="top">Location</td>
    970      <td valign="top">New Delhi, India</td>
     5665<tr>
     5666     <td valign="top">Abstract</td>
     5667     <td valign="top">This paper deals with challenges in federating wireless sensing fabrics. Federations of this sort are currently being developed in next generation global end-to-end experimentation infrastructures, such as GENI, to support rapid prototyping and hi-fidelity validation of protocols and applications. On one hand, federation should support access to diverse (and potentially provider-specific) wireless sensor resources and, on the other, it should enable users to uniformly task these resources. Instead of more simple basing federation upon a standard description of resources, we propose an architecture where the ontology of resource description can vary across providers, and a mapping of user needs to resources is performed to achieve uniform tasking. We illustrate one realization of this architecture, in terms of our refactoring the Kansei testbed to become the KanseiGenie federated fabric manager, which has full support for programmability, sliceability, and federated experimentation over heterogeneous sensing fabrics.</td>
     5668</tr>
     5669
     5670
     5671
     5672
     5673
     5674
     5675</li>
     5676
     5677</table></div><br><br>
     5678
     5679
     5680
     5681
     5682<a class="EntryGoto" id="Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching"></a>
     5683<b class="myheading" style="position: relative; left: 5%;">Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching</b>
     5684
     5685<div class="BibEntry">
     5686
     5687<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5688
     5689<li>
     5690
     5691
     5692<tr>
     5693     <td valign="top">Author</td>
     5694     <td valign="top">Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching</td>
     5695</tr>
     5696
     5697<tr>
     5698     <td valign="top">Title</td>
     5699     <td valign="top">OneCloud: Controlling the Network in an OpenFlow Cloud</td>
     5700</tr>
     5701
     5702<tr>
     5703     <td valign="top">Booktitle</td>
     5704     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     5705</tr>
     5706
     5707<tr>
     5708     <td valign="top">Location</td>
     5709     <td valign="top">Los Angeles</td>
     5710</tr>
     5711
     5712<tr>
     5713     <td valign="top">Year</td>
     5714     <td valign="top">2012</td>
     5715</tr>
     5716
     5717<tr>
     5718     <td valign="top">Abstract</td>
     5719     <td valign="top">Cloud computing is an emerging paradigm for on-demand access to computing resources over the network. Beyond early Software as a Service (SaaS) offerings, there is an increasing interest in the Infrastructure as a Service (IaaS) model where users request specific storage, networking, and computing resources to meet their application needs. To provision the network in a cloud, IaaS providers, such as the Amazon Web Services, allow users to choose their IP addresses, which can be associated with a dynamic set of virtual hosts (Elastic IP) with VPN, dynamic DNS, and dynamic firewall services. In this paper, we analyze a range of cloud network provisioning needs and the means to realize them in an OpenFlow network. We present an OpenFlow enabled framework for cloud network provisioning, based on the Open- Nebula cloud provisioning engine. Specifically, we demonstrate an Elastic IP service compatible with the Amazon Elastic Compute Cloud (EC2) API. This demonstration is available on the Clemson OneCloud IaaS offering. Ongoing efforts focus on the enablement of additional cloud network services for campus networks and wide area experimental networks like the National Science Foundation's GENI network.</td>
     5720</tr>
     5721
     5722
     5723
     5724
     5725
     5726
     5727</li>
     5728
     5729</table></div><br><br>
     5730
     5731
     5732
     5733
     5734<a class="EntryGoto" id="Stabler, Greg and Rosen, Aaron and Goasguen, Sebastien and Wang, Kuang-Ching"></a>
     5735<b class="myheading" style="position: relative; left: 5%;">Stabler, Greg and Rosen, Aaron and Goasguen, Sebastien and Wang, Kuang-Ching</b>
     5736
     5737<div class="BibEntry">
     5738
     5739<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5740
     5741<li>
     5742
     5743
     5744<tr>
     5745     <td valign="top">Author</td>
     5746     <td valign="top">Stabler, Greg and Rosen, Aaron and Goasguen, Sebastien and Wang, Kuang-Ching</td>
     5747</tr>
     5748
     5749<tr>
     5750     <td valign="top">Title</td>
     5751     <td valign="top">Elastic IP and security groups implementation using OpenFlow</td>
     5752</tr>
     5753
     5754<tr>
     5755     <td valign="top">Booktitle</td>
     5756     <td valign="top">Proceedings of the 6th international workshop on Virtualization Technologies in Distributed Computing Date</td>
     5757</tr>
     5758
     5759<tr>
     5760     <td valign="top">Location</td>
     5761     <td valign="top">Delft, The Netherlands</td>
    9715762</tr>
    9725763
     
    9835774<tr>
    9845775     <td valign="top">Year</td>
    985      <td valign="top">2010</td>
    986 </tr>
    987 
    988 <tr>
    989      <td valign="top">Abstract</td>
    990      <td valign="top">This paper presents the architecture and performance evaluation of a virtualized wide-area &#x34;&#x0308;G&#x20;&#x0308;cellular wireless network. Specifically, it addresses the challenges of virtualization of resources in a cellular base station to enable shared use by multiple independent slice users (experimenters or mobile virtual network operators), each with possibly distinct flow types and network layer protocols. The proposed virtual basestation architecture is based on an external substrate which uses a layer-2 switched datapath, and an arbitrated control path to the WiMAX basestation. The framework implements virtualization of base station's radio resources to achieve isolation between multiple virtual networks. An algorithm for weighted fair sharing among multiple slices based on an airtime fairness metric has been implemented for the first release. Preliminary experimental results from the virtual basestation prototype are given, demonstrating mobile network performance, isolation across slices with different flow types, and custom flow scheduling capabilities.</td>
    991 </tr>
    992 
    993 
    994 
    995 <tr>
    996      <td valign="top">DOI</td>
    997      <td valign="top">10.1145/1851399.1851401</td>
    998 </tr>
    999 
    1000 
    1001 
    1002 <tr>
    1003      <td valign="top">URL</td>
    1004      <td valign="top"><a href="http://dx.doi.org/10.1145/1851399.1851401">http://dx.doi.org/10.1145/1851399.1851401</a></td>
    1005 </tr>
    1006 
    1007 
    1008 </table></div><br><br>
    1009 
    1010 
    1011 
    1012 
    1013 <a class="EntryGoto" id="Bhanage, Gautam and Seskar, Ivan and Raychaudhuri, Dipankar"></a>
    1014 <b class="myheading" style="position: relative; left: 5%;">Bhanage, Gautam and Seskar, Ivan and Raychaudhuri, Dipankar</b>
    1015 
    1016 <div class="BibEntry">
    1017 
    1018 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1019 
    1020 
    1021 <tr>
    1022      <td valign="top">Author</td>
    1023      <td valign="top">Bhanage, Gautam and Seskar, Ivan and Raychaudhuri, Dipankar</td>
    1024 </tr>
    1025 
    1026 <tr>
    1027      <td valign="top">Title</td>
    1028      <td valign="top">A virtualization architecture for mobile WiMAX networks</td>
     5776     <td valign="top">2012</td>
     5777</tr>
     5778
     5779
     5780
     5781<tr>
     5782     <td valign="top">DOI</td>
     5783     <td valign="top">10.1145/2287056.2287069</td>
     5784</tr>
     5785
     5786
     5787
     5788<tr>
     5789     <td valign="top">URL</td>
     5790     <td valign="top"><a href="http://doi.acm.org/10.1145/2287056.2287069">http://doi.acm.org/10.1145/2287056.2287069</a></td>
     5791</tr>
     5792
     5793
     5794</li>
     5795
     5796</table></div><br><br>
     5797
     5798
     5799
     5800
     5801<a class="EntryGoto" id="Sterbenz, J. P. G. and Egemen and Hameed, M. A. and Jabbar, A. and Rohrer, J. P."></a>
     5802<b class="myheading" style="position: relative; left: 5%;">Sterbenz, J. P. G. and Egemen and Hameed, M. A. and Jabbar, A. and Rohrer, J. P.</b>
     5803
     5804<div class="BibEntry">
     5805
     5806<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5807
     5808<li>
     5809
     5810
     5811<tr>
     5812     <td valign="top">Author</td>
     5813     <td valign="top">Sterbenz, J. P. G. and Egemen and Hameed, M. A. and Jabbar, A. and Rohrer, J. P.</td>
     5814</tr>
     5815
     5816<tr>
     5817     <td valign="top">Title</td>
     5818     <td valign="top">Modelling and analysis of network resilience</td>
     5819</tr>
     5820
     5821<tr>
     5822     <td valign="top">Booktitle</td>
     5823     <td valign="top">2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)</td>
     5824</tr>
     5825
     5826<tr>
     5827     <td valign="top">Location</td>
     5828     <td valign="top">Bangalore</td>
     5829</tr>
     5830
     5831<tr>
     5832     <td valign="top">Publisher</td>
     5833     <td valign="top">IEEE</td>
     5834</tr>
     5835
     5836<tr>
     5837     <td valign="top">Year</td>
     5838     <td valign="top">2011</td>
     5839</tr>
     5840
     5841<tr>
     5842     <td valign="top">Abstract</td>
     5843     <td valign="top">As the Internet becomes increasingly important to all aspects of society, the consequences of disruption become increasingly severe. Thus it is critical to increase the resilience and survivability of the future network. We define resilience as the ability of the network to provide desired service even when challenged by attacks, large-scale disasters, and other failures. This paper describes a comprehensive methodology to evaluate network resilience using a combination of analytical and simulation techniques with the goal of improving the resilience and survivability of the Future Internet.</td>
     5844</tr>
     5845
     5846
     5847
     5848<tr>
     5849     <td valign="top">DOI</td>
     5850     <td valign="top">10.1109/COMSNETS.2011.5716502</td>
     5851</tr>
     5852
     5853
     5854
     5855<tr>
     5856     <td valign="top">URL</td>
     5857     <td valign="top"><a href="http://dx.doi.org/10.1109/COMSNETS.2011.5716502">http://dx.doi.org/10.1109/COMSNETS.2011.5716502</a></td>
     5858</tr>
     5859
     5860
     5861</li>
     5862
     5863</table></div><br><br>
     5864
     5865
     5866
     5867
     5868<a class="EntryGoto" id="Sterbenz, James P. G. and &#x43;&#x0327;etinkaya, Egemen K. and Hameed, Mahmood A. and Jabbar, Abdul and Qian, Shi and Rohrer, Justin P."></a>
     5869<b class="myheading" style="position: relative; left: 5%;">Sterbenz, James P. G. and &#x43;&#x0327;etinkaya, Egemen K. and Hameed, Mahmood A. and Jabbar, Abdul and Qian, Shi and Rohrer, Justin P.</b>
     5870
     5871<div class="BibEntry">
     5872
     5873<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5874
     5875<li>
     5876
     5877
     5878<tr>
     5879     <td valign="top">Author</td>
     5880     <td valign="top">Sterbenz, James P. G. and &#x43;&#x0327;etinkaya, Egemen K. and Hameed, Mahmood A. and Jabbar, Abdul and Qian, Shi and Rohrer, Justin P.</td>
     5881</tr>
     5882
     5883<tr>
     5884     <td valign="top">Title</td>
     5885     <td valign="top">Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation</td>
    10295886</tr>
    10305887
    10315888<tr>
    10325889     <td valign="top">Journal</td>
    1033      <td valign="top">SIGMOBILE Mob. Comput. Commun. Rev.</td>
     5890     <td valign="top">Telecommunication Systems</td>
     5891</tr>
     5892
     5893<tr>
     5894     <td valign="top">Publisher</td>
     5895     <td valign="top">Springer Netherlands</td>
     5896</tr>
     5897
     5898<tr>
     5899     <td valign="top">Year</td>
     5900     <td valign="top">2011</td>
     5901</tr>
     5902
     5903<tr>
     5904     <td valign="top">Abstract</td>
     5905     <td valign="top">As the Internet becomes increasingly important to all aspects of society, the consequences of disruption become increasingly severe. Thus it is critical to increase the resilience and survivability of future networks. We define resilience as the ability of the network to provide desired service even when challenged by attacks, large-scale disasters, and other failures. This paper describes a comprehensive methodology to evaluate network resilience using a combination of topology generation, analytical, simulation, and experimental emulation techniques with the goal of improving the resilience and survivability of the Future Internet.</td>
     5906</tr>
     5907
     5908
     5909
     5910<tr>
     5911     <td valign="top">DOI</td>
     5912     <td valign="top">10.1007/s11235-011-9573-6</td>
     5913</tr>
     5914
     5915
     5916
     5917<tr>
     5918     <td valign="top">URL</td>
     5919     <td valign="top"><a href="http://dx.doi.org/10.1007/s11235-011-9573-6">http://dx.doi.org/10.1007/s11235-011-9573-6</a></td>
     5920</tr>
     5921
     5922
     5923</li>
     5924
     5925</table></div><br><br>
     5926
     5927
     5928
     5929
     5930<a class="EntryGoto" id="Sydney, A. and Nutaro, J. and Scoglio, C. and Gruenbacher, D. and Schulz, N."></a>
     5931<b class="myheading" style="position: relative; left: 5%;">Sydney, A. and Nutaro, J. and Scoglio, C. and Gruenbacher, D. and Schulz, N.</b>
     5932
     5933<div class="BibEntry">
     5934
     5935<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5936
     5937<li>
     5938
     5939
     5940<tr>
     5941     <td valign="top">Author</td>
     5942     <td valign="top">Sydney, A. and Nutaro, J. and Scoglio, C. and Gruenbacher, D. and Schulz, N.</td>
     5943</tr>
     5944
     5945<tr>
     5946     <td valign="top">Title</td>
     5947     <td valign="top">Simulative Comparison of Multiprotocol Label Switching and OpenFlow Network Technologies for Transmission Operations</td>
     5948</tr>
     5949
     5950<tr>
     5951     <td valign="top">Journal</td>
     5952     <td valign="top">Smart Grid, IEEE Transactions on</td>
     5953</tr>
     5954
     5955<tr>
     5956     <td valign="top">Year</td>
     5957     <td valign="top">2013</td>
     5958</tr>
     5959
     5960
     5961
     5962<tr>
     5963     <td valign="top">DOI</td>
     5964     <td valign="top">10.1109/TSG.2012.2227516</td>
     5965</tr>
     5966
     5967
     5968
     5969<tr>
     5970     <td valign="top">URL</td>
     5971     <td valign="top"><a href="http://dx.doi.org/10.1109/TSG.2012.2227516">http://dx.doi.org/10.1109/TSG.2012.2227516</a></td>
     5972</tr>
     5973
     5974
     5975</li>
     5976
     5977</table></div><br><br>
     5978
     5979
     5980
     5981
     5982<a class="EntryGoto" id="Sydney, Ali"></a>
     5983<b class="myheading" style="position: relative; left: 5%;">Sydney, Ali</b>
     5984
     5985<div class="BibEntry">
     5986
     5987<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5988
     5989<li>
     5990
     5991
     5992<tr>
     5993     <td valign="top">Author</td>
     5994     <td valign="top">Sydney, Ali</td>
     5995</tr>
     5996
     5997<tr>
     5998     <td valign="top">Title</td>
     5999     <td valign="top">The evaluation of software defined networking for communication and control of cyber physical systems</td>
     6000</tr>
     6001
     6002<tr>
     6003     <td valign="top">Year</td>
     6004     <td valign="top">2013</td>
     6005</tr>
     6006
     6007
     6008
     6009
     6010
     6011<tr>
     6012     <td valign="top">URL</td>
     6013     <td valign="top"><a href="http://hdl.handle.net/2097/15577">http://hdl.handle.net/2097/15577</a></td>
     6014</tr>
     6015
     6016
     6017</li>
     6018
     6019</table></div><br><br>
     6020
     6021
     6022
     6023
     6024<a class="EntryGoto" id="Teerapittayanon, Surat and Fouli, Kerim and M&#x65;&#x0301;dard, Muriel and Montpetit, Marie-Jos&#x65;&#x0301; and Shi, Xiaomeng and Seskar, Ivan and Gosain, Abhimanyu"></a>
     6025<b class="myheading" style="position: relative; left: 5%;">Teerapittayanon, Surat and Fouli, Kerim and M&#x65;&#x0301;dard, Muriel and Montpetit, Marie-Jos&#x65;&#x0301; and Shi, Xiaomeng and Seskar, Ivan and Gosain, Abhimanyu</b>
     6026
     6027<div class="BibEntry">
     6028
     6029<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     6030
     6031<li>
     6032
     6033
     6034<tr>
     6035     <td valign="top">Author</td>
     6036     <td valign="top">Teerapittayanon, Surat and Fouli, Kerim and M&#x65;&#x0301;dard, Muriel and Montpetit, Marie-Jos&#x65;&#x0301; and Shi, Xiaomeng and Seskar, Ivan and Gosain, Abhimanyu</td>
     6037</tr>
     6038
     6039<tr>
     6040     <td valign="top">Title</td>
     6041     <td valign="top">Network Coding as a WiMAX Link Reliability Mechanism</td>
     6042</tr>
     6043
     6044<tr>
     6045     <td valign="top">Booktitle</td>
     6046     <td valign="top">Multiple Access Communications</td>
     6047</tr>
     6048
     6049<tr>
     6050     <td valign="top">Publisher</td>
     6051     <td valign="top">Springer Berlin Heidelberg</td>
     6052</tr>
     6053
     6054<tr>
     6055     <td valign="top">Year</td>
     6056     <td valign="top">2012</td>
     6057</tr>
     6058
     6059<tr>
     6060     <td valign="top">Abstract</td>
     6061     <td valign="top">We design and implement a network-coding-enabled relia- bility architecture for next generation wireless networks. Our network coding (NC) architecture uses a flexible thread-based design, with each encoder-decoder instance applying systematic intra-session random lin- ear network coding as a packet erasure code at the IP layer. Using GENI WiMAX platforms, a series of point-to-point transmission experiments were conducted to compare the performance of the NC architecture to that of the Automatic Repeated reQuest (ARQ) and Hybrid ARQ (HARQ) mechanisms. In our scenarios, the proposed architecture is able to decrease packet loss from around 11-32&#x0025; to nearly 0&#x0025;; compared to HARQ and joint HARQ/ARQ mechanisms, the NC architecture offers up to 5.9 times gain in throughput and 5.5 times reduction in end-to- end file transfer delay. By establishing NC as a potential substitute for HARQ/ARQ, our experiments offer important insights into cross-layer designs of next generation wireless networks.</td>
     6062</tr>
     6063
     6064
     6065
     6066<tr>
     6067     <td valign="top">DOI</td>
     6068     <td valign="top">10.1007/978-3-642-34976-8&#x005F;1</td>
     6069</tr>
     6070
     6071
     6072
     6073<tr>
     6074     <td valign="top">URL</td>
     6075     <td valign="top"><a href="http://dx.doi.org/10.1007/978-3-642-34976-8&#x005F;1">http://dx.doi.org/10.1007/978-3-642-34976-8&#x005F;1</a></td>
     6076</tr>
     6077
     6078
     6079</li>
     6080
     6081</table></div><br><br>
     6082
     6083
     6084
     6085
     6086<a class="EntryGoto" id="Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark"></a>
     6087<b class="myheading" style="position: relative; left: 5%;">Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark</b>
     6088
     6089<div class="BibEntry">
     6090
     6091<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     6092
     6093<li>
     6094
     6095
     6096<tr>
     6097     <td valign="top">Author</td>
     6098     <td valign="top">Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark</td>
     6099</tr>
     6100
     6101<tr>
     6102     <td valign="top">Title</td>
     6103     <td valign="top">A Passive Measurement System for Network Testbeds</td>
     6104</tr>
     6105
     6106<tr>
     6107     <td valign="top">Booktitle</td>
     6108     <td valign="top">8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2012)</td>
     6109</tr>
     6110
     6111<tr>
     6112     <td valign="top">Year</td>
     6113     <td valign="top">2012</td>
     6114</tr>
     6115
     6116<tr>
     6117     <td valign="top">Abstract</td>
     6118     <td valign="top">The ability to capture and process packet-level data is of intrinsic importance in network testbeds that offer broad experimental capabilities to researchers. In this paper we describe the design and implementation of a passive measurement system for network testbeds called GIMS. The system enables users to specify and centrally manage packet capture on a set of dedicated measurement nodes deployed on links in a distributed testbed. The first component of GIMS is a scalable experiment management system that coordinates multi-tenant access to measurement nodes through a web-based user interface. The second component of GIMS is a node management system that enables \\\\em (i) local processing on packets (\\\\em e.g., flow aggregation and sampling), \\\\em (ii) meta-data to be added to captured packets (\\\\em e.g., timestamps), \\\\em (iii) packet anonymization per local security policy, and \\\\em (iv) flexible data storage including transfer to remote archives. We demonstrate the capabilities of GIMS through a set of micro-benchmarks that specifically highlight the performance of the node management system deployed on a commodity workstation. Our implementations are openly available to the community and our development efforts are on-going.</td>
     6119</tr>
     6120
     6121
     6122
     6123
     6124
     6125
     6126</li>
     6127
     6128</table></div><br><br>
     6129
     6130
     6131
     6132
     6133<a class="EntryGoto" id="Tiako, Pierre F."></a>
     6134<b class="myheading" style="position: relative; left: 5%;">Tiako, Pierre F.</b>
     6135
     6136<div class="BibEntry">
     6137
     6138<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     6139
     6140<li>
     6141
     6142
     6143<tr>
     6144     <td valign="top">Author</td>
     6145     <td valign="top">Tiako, Pierre F.</td>
     6146</tr>
     6147
     6148<tr>
     6149     <td valign="top">Title</td>
     6150     <td valign="top">Perspectives of delegation in team-based distributed software development over the GENI infrastructure (NIER track)</td>
     6151</tr>
     6152
     6153<tr>
     6154     <td valign="top">Booktitle</td>
     6155     <td valign="top">Proceedings of the 33rd International Conference on Software Engineering</td>
     6156</tr>
     6157
     6158<tr>
     6159     <td valign="top">Location</td>
     6160     <td valign="top">Waikiki, Honolulu, HI, USA</td>
    10346161</tr>
    10356162
     
    10466173<tr>
    10476174     <td valign="top">Year</td>
     6175     <td valign="top">2011</td>
     6176</tr>
     6177
     6178<tr>
     6179     <td valign="top">Abstract</td>
     6180     <td valign="top">Team-based distributed software development (TBDSD) is one of the single biggest challenges facing software companies. The need to manage development efforts and resources in different locations increase the complexity and cost of modern day software development. Current software development environments do not provide suitable support to delegate task among teams with appropriate directives. TBDSD is also limited to the current internet capabilities. One of the resulting problems is the difficulty to delegate and control tasks assigned among remote teams. This paper proposes (1) a new framework for delegation in TBDSD, and (2) perspectives for deploying Process-centered Software Engineering Environments (PSEE) over the Global Environment for Network Innovations (GENI) infrastructure. GENI, the 'future Internet' that is taking shape in prototypes across the US, will allow, in the context of our study, to securely access and share software artifacts, resources, and tools as never before seen over the current Internet.</td>
     6181</tr>
     6182
     6183
     6184
     6185<tr>
     6186     <td valign="top">DOI</td>
     6187     <td valign="top">10.1145/1985793.1985905</td>
     6188</tr>
     6189
     6190
     6191
     6192<tr>
     6193     <td valign="top">URL</td>
     6194     <td valign="top"><a href="http://dx.doi.org/10.1145/1985793.1985905">http://dx.doi.org/10.1145/1985793.1985905</a></td>
     6195</tr>
     6196
     6197
     6198</li>
     6199
     6200</table></div><br><br>
     6201
     6202
     6203
     6204
     6205<a class="EntryGoto" id="Tredger, Stephen and Zhuang, Yanyan and Matthews, Chris and Short-Gershman, Jesse and Coady, Rick"></a>
     6206<b class="myheading" style="position: relative; left: 5%;">Tredger, Stephen and Zhuang, Yanyan and Matthews, Chris and Short-Gershman, Jesse and Coady, Rick</b>
     6207
     6208<div class="BibEntry">
     6209
     6210<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     6211
     6212<li>
     6213
     6214
     6215<tr>
     6216     <td valign="top">Author</td>
     6217     <td valign="top">Tredger, Stephen and Zhuang, Yanyan and Matthews, Chris and Short-Gershman, Jesse and Coady, Rick</td>
     6218</tr>
     6219
     6220<tr>
     6221     <td valign="top">Title</td>
     6222     <td valign="top">Building Green Systems with Green Students: An Educational Experiment with GENI Infrastructure</td>
     6223</tr>
     6224
     6225<tr>
     6226     <td valign="top">Booktitle</td>
     6227     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     6228</tr>
     6229
     6230<tr>
     6231     <td valign="top">Location</td>
     6232     <td valign="top">Salt Lake City, UT</td>
     6233</tr>
     6234
     6235<tr>
     6236     <td valign="top">Publisher</td>
     6237     <td valign="top">IEEE</td>
     6238</tr>
     6239
     6240<tr>
     6241     <td valign="top">Year</td>
     6242     <td valign="top">2013</td>
     6243</tr>
     6244
     6245
     6246
     6247<tr>
     6248     <td valign="top">DOI</td>
     6249     <td valign="top">10.1109/GREE.2013.15</td>
     6250</tr>
     6251
     6252
     6253
     6254<tr>
     6255     <td valign="top">URL</td>
     6256     <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.15">http://dx.doi.org/10.1109/GREE.2013.15</a></td>
     6257</tr>
     6258
     6259
     6260</li>
     6261
     6262</table></div><br><br>
     6263
     6264
     6265
     6266
     6267<a class="EntryGoto" id="Tuncer, Hasan and Nozaki, Yoshihiro and Shenoy, Nirmala"></a>
     6268<b class="myheading" style="position: relative; left: 5%;">Tuncer, Hasan and Nozaki, Yoshihiro and Shenoy, Nirmala</b>
     6269
     6270<div class="BibEntry">
     6271
     6272<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     6273
     6274<li>
     6275
     6276
     6277<tr>
     6278     <td valign="top">Author</td>
     6279     <td valign="top">Tuncer, Hasan and Nozaki, Yoshihiro and Shenoy, Nirmala</td>
     6280</tr>
     6281
     6282<tr>
     6283     <td valign="top">Title</td>
     6284     <td valign="top">Virtual Mobility Domains - A Mobility Architecture for the Future Internet</td>
     6285</tr>
     6286
     6287<tr>
     6288     <td valign="top">Booktitle</td>
     6289     <td valign="top">IEEE International Conference on Commnunications (IEE ICC 2012) Symposium on Next-Generation Networking</td>
     6290</tr>
     6291
     6292<tr>
     6293     <td valign="top">Year</td>
    10486294     <td valign="top">2012</td>
    10496295</tr>
     
    10516297<tr>
    10526298     <td valign="top">Abstract</td>
    1053      <td valign="top">Systems virtualization offers convenient means for sharing networking infrastructure while improving its utilization. This study addresses the challenges of virtualizing a commercial off-the-shelf 4G mobileWiMAX basestation. We highlight additions and modifications needed in theWiMAX network architecture for supporting multiple simultaneous virtual basestations on a single physical basestation. The most prominent features provided by the proposed virtual basestation framework include the capability to perform all frame switching at layer-2, and control mechanisms to provide isolation across slices needed to ensure experiment repeatability. By prototyping on a commercial WiMAX radio, this paper shows the usage of the virtual basestation system for housing mobile virtual network operators and testbeds alike. A use case is shown where the virtual basestation design is used to evaluate mobile handoff schemes. Another usage case is shown for optimizing a video delivery on the edge. The video delivery use case is used to show performance improvements of up to 5dB in the PSNR. Evaluation of prototype shows a significant improvement in the slice isolation, with aggregate throughput improvements of up to 192&#x0025; achievable through fair resource allocation.</td>
    1054 </tr>
    1055 
    1056 
    1057 
    1058 <tr>
    1059      <td valign="top">DOI</td>
    1060      <td valign="top">10.1145/2169077.2169082</td>
    1061 </tr>
    1062 
    1063 
    1064 
    1065 <tr>
    1066      <td valign="top">URL</td>
    1067      <td valign="top"><a href="http://dx.doi.org/10.1145/2169077.2169082">http://dx.doi.org/10.1145/2169077.2169082</a></td>
    1068 </tr>
    1069 
    1070 
    1071 </table></div><br><br>
    1072 
    1073 
    1074 
    1075 
    1076 <a class="EntryGoto" id="Blanton, Ethan and Chatterjee, Sarbajit and Gangam, Sriharsha and Kala, Sumit and Sharma, Deepti and Fahmy, Sonia and Sharma, Puneet"></a>
    1077 <b class="myheading" style="position: relative; left: 5%;">Blanton, Ethan and Chatterjee, Sarbajit and Gangam, Sriharsha and Kala, Sumit and Sharma, Deepti and Fahmy, Sonia and Sharma, Puneet</b>
    1078 
    1079 <div class="BibEntry">
    1080 
    1081 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1082 
    1083 
    1084 <tr>
    1085      <td valign="top">Author</td>
    1086      <td valign="top">Blanton, Ethan and Chatterjee, Sarbajit and Gangam, Sriharsha and Kala, Sumit and Sharma, Deepti and Fahmy, Sonia and Sharma, Puneet</td>
    1087 </tr>
    1088 
    1089 <tr>
    1090      <td valign="top">Title</td>
    1091      <td valign="top">Design and evaluation of the S<sup>3</sup> monitor network measurement service on GENI</td>
    1092 </tr>
    1093 
    1094 <tr>
    1095      <td valign="top">Booktitle</td>
    1096      <td valign="top">2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)</td>
    1097 </tr>
    1098 
    1099 <tr>
    1100      <td valign="top">Location</td>
    1101      <td valign="top">Bangalore, India</td>
    1102 </tr>
    1103 
    1104 <tr>
    1105      <td valign="top">Publisher</td>
    1106      <td valign="top">IEEE</td>
    1107 </tr>
    1108 
    1109 <tr>
    1110      <td valign="top">Year</td>
    1111      <td valign="top">2012</td>
    1112 </tr>
    1113 
    1114 <tr>
    1115      <td valign="top">Abstract</td>
    1116      <td valign="top">Network monitoring capabilities are critical for both network operators and networked applications. In the context of an experimental test facility, network measurement is important for researchers experimenting with new network architectures and applications, as well as operators of the test facility itself. The Global Environment for Network Innovations (GENI) is a sophisticated test facility comprised of multiple ” control frameworks.” In this paper, we describe the design and implementation of S</td>
    1117 </tr>
    1118 
    1119 
    1120 
    1121 <tr>
    1122      <td valign="top">DOI</td>
    1123      <td valign="top">10.1109/COMSNETS.2012.6151327</td>
    1124 </tr>
    1125 
    1126 
    1127 
    1128 <tr>
    1129      <td valign="top">URL</td>
    1130      <td valign="top"><a href="http://dx.doi.org/10.1109/COMSNETS.2012.6151327">http://dx.doi.org/10.1109/COMSNETS.2012.6151327</a></td>
    1131 </tr>
    1132 
    1133 
    1134 </table></div><br><br>
    1135 
    1136 
    1137 
    1138 
    1139 <a class="EntryGoto" id="Calyam, P. and Rajagopalan, S. and Selvadhurai, A. and Mohan, S. and Venkataraman, A. and Berryman, A. and Ramnath, R."></a>
    1140 <b class="myheading" style="position: relative; left: 5%;">Calyam, P. and Rajagopalan, S. and Selvadhurai, A. and Mohan, S. and Venkataraman, A. and Berryman, A. and Ramnath, R.</b>
    1141 
    1142 <div class="BibEntry">
    1143 
    1144 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1145 
    1146 
    1147 <tr>
    1148      <td valign="top">Author</td>
    1149      <td valign="top">Calyam, P. and Rajagopalan, S. and Selvadhurai, A. and Mohan, S. and Venkataraman, A. and Berryman, A. and Ramnath, R.</td>
    1150 </tr>
    1151 
    1152 <tr>
    1153      <td valign="top">Title</td>
    1154      <td valign="top">Leveraging OpenFlow for resource placement of virtual desktop cloud applications</td>
    1155 </tr>
    1156 
    1157 <tr>
    1158      <td valign="top">Booktitle</td>
    1159      <td valign="top">Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on</td>
    1160 </tr>
    1161 
    1162 <tr>
    1163      <td valign="top">Year</td>
    1164      <td valign="top">2013</td>
    1165 </tr>
    1166 
    1167 
    1168 
    1169 
    1170 
    1171 
    1172 </table></div><br><br>
    1173 
    1174 
    1175 
    1176 
    1177 <a class="EntryGoto" id="Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A."></a>
    1178 <b class="myheading" style="position: relative; left: 5%;">Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A.</b>
    1179 
    1180 <div class="BibEntry">
    1181 
    1182 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1183 
    1184 
    1185 <tr>
    1186      <td valign="top">Author</td>
    1187      <td valign="top">Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A.</td>
    1188 </tr>
    1189 
    1190 <tr>
    1191      <td valign="top">Title</td>
    1192      <td valign="top">Enabling performance intelligence for application adaptation in the Future Internet</td>
    1193 </tr>
    1194 
    1195 <tr>
    1196      <td valign="top">Journal</td>
    1197      <td valign="top">Communications and Networks, Journal of</td>
    1198 </tr>
    1199 
    1200 <tr>
    1201      <td valign="top">Year</td>
    1202      <td valign="top">2011</td>
    1203 </tr>
    1204 
    1205 
    1206 
    1207 <tr>
    1208      <td valign="top">DOI</td>
    1209      <td valign="top">10.1109/JCN.2011.6157475</td>
    1210 </tr>
    1211 
    1212 
    1213 
    1214 <tr>
    1215      <td valign="top">URL</td>
    1216      <td valign="top"><a href="http://dx.doi.org/10.1109/JCN.2011.6157475">http://dx.doi.org/10.1109/JCN.2011.6157475</a></td>
    1217 </tr>
    1218 
    1219 
    1220 </table></div><br><br>
    1221 
    1222 
    1223 
    1224 
    1225 <a class="EntryGoto" id="Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio"></a>
    1226 <b class="myheading" style="position: relative; left: 5%;">Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio</b>
    1227 
    1228 <div class="BibEntry">
    1229 
    1230 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1231 
    1232 
    1233 <tr>
    1234      <td valign="top">Author</td>
    1235      <td valign="top">Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio</td>
    1236 </tr>
    1237 
    1238 <tr>
    1239      <td valign="top">Title</td>
    1240      <td valign="top">Experiences from Virtual Desktop CloudExperiments in GENI</td>
    1241 </tr>
    1242 
    1243 <tr>
    1244      <td valign="top">Booktitle</td>
    1245      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    1246 </tr>
    1247 
    1248 <tr>
    1249      <td valign="top">Location</td>
    1250      <td valign="top">Los Angeles</td>
    1251 </tr>
    1252 
    1253 <tr>
    1254      <td valign="top">Year</td>
    1255      <td valign="top">2012</td>
    1256 </tr>
    1257 
    1258 <tr>
    1259      <td valign="top">Abstract</td>
    1260      <td valign="top">Popular applications such as email, photo/video galleries, and file storage are increasingly being supported by cloud platforms in residential, academia and industry communities. The next frontier for these user communities will be to transition 'traditional desktops' that have dedicated hardware and software configurations into 'virtual desktop clouds' that are accessible via thin-clients. In this paper, we describe experiences from our research and development of virtual desktop cloud experiments in GENI. Our experimentation goal is to investigate and develop optimal resource allocation frameworks and performance bench- marking tools that can enable provisioning (i.e., resource sizing) and placement (i.e., resource mapping) of thin-client based virtual desktops at Internet-scale. We first motivate why virtual desktop cloud experiments cannot be done only at a table-top level, and why infrastructures such as GENI are essential. Next, we detail the methodology of our completed ” provisioning” experiments, and our work-in-progress ” placement” experiments in GENI that leverage multiple kinds of GENI resources such as aggregates, measurement services and experimenter workflow tools, as well as commercial software. Lastly, we present our vision on how our experiment slice setup and application development experiences, as well as outcomes can be leveraged in classroom labs, and 'living labs' that use GENI resources to foster training and wide- adoption of Future Internet applications.</td>
    1261 </tr>
    1262 
    1263 
    1264 
    1265 
    1266 
    1267 
    1268 </table></div><br><br>
    1269 
    1270 
    1271 <div class="BibEntry">
    1272 
    1273 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1274 
    1275 
    1276 <tr>
    1277      <td valign="top">Author</td>
    1278      <td valign="top">Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio</td>
    1279 </tr>
    1280 
    1281 <tr>
    1282      <td valign="top">Title</td>
    1283      <td valign="top">Experiences from Virtual Desktop CloudExperiments in GENI</td>
    1284 </tr>
    1285 
    1286 <tr>
    1287      <td valign="top">Booktitle</td>
    1288      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    1289 </tr>
    1290 
    1291 <tr>
    1292      <td valign="top">Location</td>
    1293      <td valign="top">Los Angeles</td>
    1294 </tr>
    1295 
    1296 <tr>
    1297      <td valign="top">Year</td>
    1298      <td valign="top">2012</td>
    1299 </tr>
    1300 
    1301 <tr>
    1302      <td valign="top">Abstract</td>
    1303      <td valign="top">Popular applications such as email, photo/video galleries, and file storage are increasingly being supported by cloud platforms in residential, academia and industry communities. The next frontier for these user communities will be to transition 'traditional desktops' that have dedicated hardware and software configurations into 'virtual desktop clouds' that are accessible via thin-clients. In this paper, we describe experiences from our research and development of virtual desktop cloud experiments in GENI. Our experimentation goal is to investigate and develop optimal resource allocation frameworks and performance bench- marking tools that can enable provisioning (i.e., resource sizing) and placement (i.e., resource mapping) of thin-client based virtual desktops at Internet-scale. We first motivate why virtual desktop cloud experiments cannot be done only at a table-top level, and why infrastructures such as GENI are essential. Next, we detail the methodology of our completed ” provisioning” experiments, and our work-in-progress ” placement” experiments in GENI that leverage multiple kinds of GENI resources such as aggregates, measurement services and experimenter workflow tools, as well as commercial software. Lastly, we present our vision on how our experiment slice setup and application development experiences, as well as outcomes can be leveraged in classroom labs, and 'living labs' that use GENI resources to foster training and wide- adoption of Future Internet applications.</td>
    1304 </tr>
    1305 
    1306 
    1307 
    1308 
    1309 
    1310 
    1311 </table></div><br><br>
    1312 
    1313 
    1314 
    1315 
    1316 <a class="EntryGoto" id="Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James"></a>
    1317 <b class="myheading" style="position: relative; left: 5%;">Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James</b>
    1318 
    1319 <div class="BibEntry">
    1320 
    1321 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1322 
    1323 
    1324 <tr>
    1325      <td valign="top">Author</td>
    1326      <td valign="top">Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James</td>
    1327 </tr>
    1328 
    1329 <tr>
    1330      <td valign="top">Title</td>
    1331      <td valign="top">WiMAX: Bandwidth Contention Resolution Vulnerability to Denial of Service Attacks</td>
    1332 </tr>
    1333 
    1334 <tr>
    1335      <td valign="top">Booktitle</td>
    1336      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    1337 </tr>
    1338 
    1339 <tr>
    1340      <td valign="top">Location</td>
    1341      <td valign="top">Los Angeles</td>
    1342 </tr>
    1343 
    1344 <tr>
    1345      <td valign="top">Year</td>
    1346      <td valign="top">2012</td>
    1347 </tr>
    1348 
    1349 <tr>
    1350      <td valign="top">Abstract</td>
    1351      <td valign="top">Wireless communications is part of everyday life and 4G technology, including WiMAX, offers higher data rates and wider coverage than predecessor 3G technologies. Many security vulnerabilities have been discovered in 3G protocols and these vulnerabilities may still exist in next generation 4G protocols. This paper examines how system parameters for the WiMAX Bandwidth Contention Resolution process can affect network vulnerability to DoS attacks. It will present software simulations that explore system parameter settings and will cover the current phase of hardware simulations.</td>
    1352 </tr>
    1353 
    1354 
    1355 
    1356 
    1357 
    1358 
    1359 </table></div><br><br>
    1360 
    1361 
    1362 <div class="BibEntry">
    1363 
    1364 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1365 
    1366 
    1367 <tr>
    1368      <td valign="top">Author</td>
    1369      <td valign="top">Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James</td>
    1370 </tr>
    1371 
    1372 <tr>
    1373      <td valign="top">Title</td>
    1374      <td valign="top">WiMAX: Bandwidth Contention Resolution Vulnerability to Denial of Service Attacks</td>
    1375 </tr>
    1376 
    1377 <tr>
    1378      <td valign="top">Booktitle</td>
    1379      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    1380 </tr>
    1381 
    1382 <tr>
    1383      <td valign="top">Location</td>
    1384      <td valign="top">Los Angeles</td>
    1385 </tr>
    1386 
    1387 <tr>
    1388      <td valign="top">Year</td>
    1389      <td valign="top">2012</td>
    1390 </tr>
    1391 
    1392 <tr>
    1393      <td valign="top">Abstract</td>
    1394      <td valign="top">Wireless communications is part of everyday life and 4G technology, including WiMAX, offers higher data rates and wider coverage than predecessor 3G technologies. Many security vulnerabilities have been discovered in 3G protocols and these vulnerabilities may still exist in next generation 4G protocols. This paper examines how system parameters for the WiMAX Bandwidth Contention Resolution process can affect network vulnerability to DoS attacks. It will present software simulations that explore system parameter settings and will cover the current phase of hardware simulations.</td>
    1395 </tr>
    1396 
    1397 
    1398 
    1399 
    1400 
    1401 
    1402 </table></div><br><br>
    1403 
    1404 
    1405 
    1406 
    1407 <a class="EntryGoto" id="Chakrabortty, Aranya and Xin, Yufeng"></a>
    1408 <b class="myheading" style="position: relative; left: 5%;">Chakrabortty, Aranya and Xin, Yufeng</b>
    1409 
    1410 <div class="BibEntry">
    1411 
    1412 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1413 
    1414 
    1415 <tr>
    1416      <td valign="top">Author</td>
    1417      <td valign="top">Chakrabortty, Aranya and Xin, Yufeng</td>
    1418 </tr>
    1419 
    1420 <tr>
    1421      <td valign="top">Title</td>
    1422      <td valign="top">Hardware-in-the-Loop Simulations and Verifications of Smart Power Systems Over an Exo-GENI Testbed</td>
    1423 </tr>
    1424 
    1425 <tr>
    1426      <td valign="top">Booktitle</td>
    1427      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    1428 </tr>
    1429 
    1430 <tr>
    1431      <td valign="top">Location</td>
    1432      <td valign="top">Salt Lake City, UT</td>
    1433 </tr>
    1434 
    1435 <tr>
    1436      <td valign="top">Publisher</td>
    1437      <td valign="top">IEEE</td>
    1438 </tr>
    1439 
    1440 <tr>
    1441      <td valign="top">Year</td>
    1442      <td valign="top">2013</td>
    1443 </tr>
    1444 
    1445 
    1446 
    1447 <tr>
    1448      <td valign="top">DOI</td>
    1449      <td valign="top">10.1109/GREE.2013.12</td>
    1450 </tr>
    1451 
    1452 
    1453 
    1454 <tr>
    1455      <td valign="top">URL</td>
    1456      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.12">http://dx.doi.org/10.1109/GREE.2013.12</a></td>
    1457 </tr>
    1458 
    1459 
    1460 </table></div><br><br>
    1461 
    1462 
    1463 
    1464 
    1465 <a class="EntryGoto" id="Chen, Kang and Shen, Haiying and Zhang, Haibo"></a>
    1466 <b class="myheading" style="position: relative; left: 5%;">Chen, Kang and Shen, Haiying and Zhang, Haibo</b>
    1467 
    1468 <div class="BibEntry">
    1469 
    1470 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1471 
    1472 
    1473 <tr>
    1474      <td valign="top">Author</td>
    1475      <td valign="top">Chen, Kang and Shen, Haiying and Zhang, Haibo</td>
    1476 </tr>
    1477 
    1478 <tr>
    1479      <td valign="top">Title</td>
    1480      <td valign="top">Leveraging Social Networks for P2P Content-Based File Sharing in Mobile Ad Hoc Networks</td>
    1481 </tr>
    1482 
    1483 <tr>
    1484      <td valign="top">Booktitle</td>
    1485      <td valign="top">2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems</td>
    1486 </tr>
    1487 
    1488 <tr>
    1489      <td valign="top">Location</td>
    1490      <td valign="top">Valencia, Spain</td>
    1491 </tr>
    1492 
    1493 <tr>
    1494      <td valign="top">Publisher</td>
    1495      <td valign="top">IEEE</td>
    1496 </tr>
    1497 
    1498 <tr>
    1499      <td valign="top">Year</td>
    1500      <td valign="top">2011</td>
    1501 </tr>
    1502 
    1503 <tr>
    1504      <td valign="top">Abstract</td>
    1505      <td valign="top">Current P2P file sharing methods in mobile ad hoc networks (MANETs) can be classified into three groups: flooding-based, advertisement-based and social contact-based. The first two groups of methods can easily generate high overhead and low scalability, and the third group fails to consider the social interests (content) of mobile nodes, which otherwise can improve file searching efficiency. In this paper, we propose a P2P content-based file sharing system for MANETs. The system uses an interest extraction algorithm to derive a node's interests from its files for complex queries. For efficient file searching, it groups common-interest nodes that frequently meet with each other as communities. Further, it takes advantage of node mobility by designating stable nodes, which has frequent contact with community members, as community coordinators for intra-community searching, and highly-mobile nodes as community ambassadors for inter-community searching. An interest-oriented file searching scheme further enhances the file searching success rate. We first deployed our system on the real-world GENI Orbit testbed with a real trace and then conducted experiment on the ns2 simulator with both real trace and simulated disconnected and connected MANET scenario. The test results show that our system significantly lowers transmission cost and improves file searching success rate compared to current methods.</td>
    1506 </tr>
    1507 
    1508 
    1509 
    1510 <tr>
    1511      <td valign="top">DOI</td>
    1512      <td valign="top">10.1109/MASS.2011.24</td>
    1513 </tr>
    1514 
    1515 
    1516 
    1517 <tr>
    1518      <td valign="top">URL</td>
    1519      <td valign="top"><a href="http://dx.doi.org/10.1109/MASS.2011.24">http://dx.doi.org/10.1109/MASS.2011.24</a></td>
    1520 </tr>
    1521 
    1522 
    1523 </table></div><br><br>
    1524 
    1525 
    1526 
    1527 
    1528 <a class="EntryGoto" id="Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze"></a>
    1529 <b class="myheading" style="position: relative; left: 5%;">Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze</b>
    1530 
    1531 <div class="BibEntry">
    1532 
    1533 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1534 
    1535 
    1536 <tr>
    1537      <td valign="top">Author</td>
    1538      <td valign="top">Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze</td>
    1539 </tr>
    1540 
    1541 <tr>
    1542      <td valign="top">Title</td>
    1543      <td valign="top">Experimentation of a MANET Routing Algorithm on the GENI ORBIT Testbed</td>
    1544 </tr>
    1545 
    1546 <tr>
    1547      <td valign="top">Booktitle</td>
    1548      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    1549 </tr>
    1550 
    1551 <tr>
    1552      <td valign="top">Location</td>
    1553      <td valign="top">Los Angeles</td>
    1554 </tr>
    1555 
    1556 <tr>
    1557      <td valign="top">Year</td>
    1558      <td valign="top">2012</td>
    1559 </tr>
    1560 
    1561 <tr>
    1562      <td valign="top">Abstract</td>
    1563      <td valign="top">This paper proposes a systematic procedure for experimentation of Mobile ad hoc networks (MANETs) on the ORBIT testbed. MANETs have attracted significant re- search interests in recent years. Most of routing or file sharing algorithms in MANETs were only evaluated by theoretical analysis or simulations because of the requirement of large scale networks. However, due to the distinctive properties of MANETs, such as mobility and decentralized structure, it has been non-trivial to deploy a real testbed for the verification. The Global Environment for Network Innovations (GENI) project sponsored by the National Science Foundation (NSF) provides an exploratory environment for academic real-world experiments, such as the ORBIT testbed. A stable and repeatable procedure for experimentation on real testbeds is necessary and important to assure the validity of results. In this paper, a MANET routing algorithm, namely LORD, was tested on the ORBIT testbed, using the proposed procedure. Specifically, we first configure the wireless interface on each node to enable the communication between each pair of nodes. Then a set of methods are adopted to construct the MANETs scenario for test. The network status is monitored throughout the entire duration of experiments. Finally, the experiment results of LORD on the GENI ORBIT testbed are demonstrated.</td>
    1564 </tr>
    1565 
    1566 
    1567 
    1568 
    1569 
    1570 
    1571 </table></div><br><br>
    1572 
    1573 
    1574 <div class="BibEntry">
    1575 
    1576 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1577 
    1578 
    1579 <tr>
    1580      <td valign="top">Author</td>
    1581      <td valign="top">Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze</td>
    1582 </tr>
    1583 
    1584 <tr>
    1585      <td valign="top">Title</td>
    1586      <td valign="top">Experimentation of a MANET Routing Algorithm on the GENI ORBIT Testbed</td>
    1587 </tr>
    1588 
    1589 <tr>
    1590      <td valign="top">Booktitle</td>
    1591      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    1592 </tr>
    1593 
    1594 <tr>
    1595      <td valign="top">Location</td>
    1596      <td valign="top">Los Angeles</td>
    1597 </tr>
    1598 
    1599 <tr>
    1600      <td valign="top">Year</td>
    1601      <td valign="top">2012</td>
    1602 </tr>
    1603 
    1604 <tr>
    1605      <td valign="top">Abstract</td>
    1606      <td valign="top">This paper proposes a systematic procedure for experimentation of Mobile ad hoc networks (MANETs) on the ORBIT testbed. MANETs have attracted significant re- search interests in recent years. Most of routing or file sharing algorithms in MANETs were only evaluated by theoretical analysis or simulations because of the requirement of large scale networks. However, due to the distinctive properties of MANETs, such as mobility and decentralized structure, it has been non-trivial to deploy a real testbed for the verification. The Global Environment for Network Innovations (GENI) project sponsored by the National Science Foundation (NSF) provides an exploratory environment for academic real-world experiments, such as the ORBIT testbed. A stable and repeatable procedure for experimentation on real testbeds is necessary and important to assure the validity of results. In this paper, a MANET routing algorithm, namely LORD, was tested on the ORBIT testbed, using the proposed procedure. Specifically, we first configure the wireless interface on each node to enable the communication between each pair of nodes. Then a set of methods are adopted to construct the MANETs scenario for test. The network status is monitored throughout the entire duration of experiments. Finally, the experiment results of LORD on the GENI ORBIT testbed are demonstrated.</td>
    1607 </tr>
    1608 
    1609 
    1610 
    1611 
    1612 
    1613 
    1614 </table></div><br><br>
    1615 
    1616 
    1617 
    1618 
    1619 <a class="EntryGoto" id="Cherukuri, Ramkumar and Liu, Xuan and Bavier, Andy and Sterbenz, James P. G. and Medhi, Deep"></a>
    1620 <b class="myheading" style="position: relative; left: 5%;">Cherukuri, Ramkumar and Liu, Xuan and Bavier, Andy and Sterbenz, James P. G. and Medhi, Deep</b>
    1621 
    1622 <div class="BibEntry">
    1623 
    1624 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1625 
    1626 
    1627 <tr>
    1628      <td valign="top">Author</td>
    1629      <td valign="top">Cherukuri, Ramkumar and Liu, Xuan and Bavier, Andy and Sterbenz, James P. G. and Medhi, Deep</td>
    1630 </tr>
    1631 
    1632 <tr>
    1633      <td valign="top">Title</td>
    1634      <td valign="top">Network virtualization in GpENI: Framework, implementation &#x0026;amp; integration experience</td>
    1635 </tr>
    1636 
    1637 <tr>
    1638      <td valign="top">Booktitle</td>
    1639      <td valign="top">12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops</td>
    1640 </tr>
    1641 
    1642 <tr>
    1643      <td valign="top">Location</td>
    1644      <td valign="top">Dublin, Ireland</td>
    1645 </tr>
    1646 
    1647 <tr>
    1648      <td valign="top">Publisher</td>
    1649      <td valign="top">IEEE</td>
    1650 </tr>
    1651 
    1652 <tr>
    1653      <td valign="top">Year</td>
    1654      <td valign="top">2011</td>
    1655 </tr>
    1656 
    1657 <tr>
    1658      <td valign="top">Abstract</td>
    1659      <td valign="top">Great Plains Environment for Network Innovation (GpENI) is an international testbed for future Internet research. A key component of GpENI is programmable network virtualization (GpENI-VINI). The scope of this paper is to present the framework, implementation and integration experience with network virtualization in GpENI. In particular, this is described through our experience of implementing and integrating the XORP (eXtensible Open Router Platform) routing platform into GpENI-VINI. Preliminary results on measurements and validation are presented.</td>
    1660 </tr>
    1661 
    1662 
    1663 
    1664 <tr>
    1665      <td valign="top">DOI</td>
    1666      <td valign="top">10.1109/INM.2011.5990568</td>
    1667 </tr>
    1668 
    1669 
    1670 
    1671 <tr>
    1672      <td valign="top">URL</td>
    1673      <td valign="top"><a href="http://dx.doi.org/10.1109/INM.2011.5990568">http://dx.doi.org/10.1109/INM.2011.5990568</a></td>
    1674 </tr>
    1675 
    1676 
    1677 </table></div><br><br>
    1678 
    1679 
    1680 
    1681 
    1682 <a class="EntryGoto" id="Chowdhury and Boutaba, Raouf"></a>
    1683 <b class="myheading" style="position: relative; left: 5%;">Chowdhury and Boutaba, Raouf</b>
    1684 
    1685 <div class="BibEntry">
    1686 
    1687 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1688 
    1689 
    1690 <tr>
    1691      <td valign="top">Author</td>
    1692      <td valign="top">Chowdhury and Boutaba, Raouf</td>
    1693 </tr>
    1694 
    1695 <tr>
    1696      <td valign="top">Title</td>
    1697      <td valign="top">A survey of network virtualization</td>
    1698 </tr>
    1699 
    1700 <tr>
    1701      <td valign="top">Journal</td>
    1702      <td valign="top">Computer Networks</td>
    1703 </tr>
    1704 
    1705 <tr>
    1706      <td valign="top">Year</td>
    1707      <td valign="top">2010</td>
    1708 </tr>
    1709 
    1710 
    1711 
    1712 <tr>
    1713      <td valign="top">DOI</td>
    1714      <td valign="top">http://dx.doi.org/10.1016/j.comnet.2009.10.017</td>
    1715 </tr>
    1716 
    1717 
    1718 
    1719 <tr>
    1720      <td valign="top">URL</td>
    1721      <td valign="top"><a href="http://www.sciencedirect.com/science/article/pii/S1389128609003387">http://www.sciencedirect.com/science/article/pii/S1389128609003387</a></td>
    1722 </tr>
    1723 
    1724 
    1725 </table></div><br><br>
    1726 
    1727 
    1728 
    1729 
    1730 <a class="EntryGoto" id="Das, S. and Yiakoumis, Y. and Parulkar, G. and McKeown, N. and Singh, P. and Getachew, D. and Desai, P. D."></a>
    1731 <b class="myheading" style="position: relative; left: 5%;">Das, S. and Yiakoumis, Y. and Parulkar, G. and McKeown, N. and Singh, P. and Getachew, D. and Desai, P. D.</b>
    1732 
    1733 <div class="BibEntry">
    1734 
    1735 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1736 
    1737 
    1738 <tr>
    1739      <td valign="top">Author</td>
    1740      <td valign="top">Das, S. and Yiakoumis, Y. and Parulkar, G. and McKeown, N. and Singh, P. and Getachew, D. and Desai, P. D.</td>
    1741 </tr>
    1742 
    1743 <tr>
    1744      <td valign="top">Title</td>
    1745      <td valign="top">Application-aware aggregation and traffic engineering in a converged packet-circuit network</td>
    1746 </tr>
    1747 
    1748 <tr>
    1749      <td valign="top">Booktitle</td>
    1750      <td valign="top">Optical Fiber Communication Conference and Exposition (OFC/NFOEC), 2011 and the National Fiber Optic Engineers Conference</td>
    1751 </tr>
    1752 
    1753 <tr>
    1754      <td valign="top">Publisher</td>
    1755      <td valign="top">IEEE</td>
    1756 </tr>
    1757 
    1758 <tr>
    1759      <td valign="top">Year</td>
    1760      <td valign="top">2011</td>
    1761 </tr>
    1762 
    1763 
    1764 
    1765 
    1766 
    1767 <tr>
    1768      <td valign="top">URL</td>
    1769      <td valign="top"><a href="http://ieeexplore.ieee.org/xpls/abs&#x005F;all.jsp?arnumber=5875210">http://ieeexplore.ieee.org/xpls/abs&#x005F;all.jsp?arnumber=5875210</a></td>
    1770 </tr>
    1771 
    1772 
    1773 </table></div><br><br>
    1774 
    1775 
    1776 
    1777 
    1778 <a class="EntryGoto" id="Deng, Juan and Brooks, Richard R. and Martin, James"></a>
    1779 <b class="myheading" style="position: relative; left: 5%;">Deng, Juan and Brooks, Richard R. and Martin, James</b>
    1780 
    1781 <div class="BibEntry">
    1782 
    1783 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1784 
    1785 
    1786 <tr>
    1787      <td valign="top">Author</td>
    1788      <td valign="top">Deng, Juan and Brooks, Richard R. and Martin, James</td>
    1789 </tr>
    1790 
    1791 <tr>
    1792      <td valign="top">Title</td>
    1793      <td valign="top">Assessing the Effect of WiMAX System Parameter Settings on MAC-level Local DoS Vulnerability</td>
    1794 </tr>
    1795 
    1796 <tr>
    1797      <td valign="top">Journal</td>
    1798      <td valign="top">International Journal of Performability Engineering</td>
    1799 </tr>
    1800 
    1801 <tr>
    1802      <td valign="top">Year</td>
    1803      <td valign="top">2012</td>
    1804 </tr>
    1805 
    1806 <tr>
    1807      <td valign="top">Abstract</td>
    1808      <td valign="top">The research community has established that WiMAX networks suffer from Denial of Service (DoS) vulnerabilities. In this paper, we analyze how WiMAX system parameter settings increase or decrease DoS vulnerabilities of WiMAX networks. The behavior of the WiMAX MAC level protocol is sensitive to the settings of core system parameters. Unlike traditional network-based DoS attacks, attacks resulting from parameter misconfiguration are difficult for network operators to detect. We focus on bandwidth contention resolution aspects of the WiMAX MAC protocol. Simulations are performed using the ns-2 simulator. Analysis of Variance (ANOVA) techniques on the resulting simulation data identify which bandwidth contention resolution parameter combinations are crucial for configuring WiMAX to be less vulnerable to DoS attacks.</td>
    1809 </tr>
    1810 
    1811 
    1812 
    1813 
    1814 
    1815 
    1816 </table></div><br><br>
    1817 
    1818 
    1819 
    1820 
    1821 <a class="EntryGoto" id="Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Strum, Matt and Wong, Gary and Carpenter, Charles and Fei, Zongming and Griffioen, James and Nasir, Hussamuddin and Reed, Jeremy and Wu, Xiongqi"></a>
    1822 <b class="myheading" style="position: relative; left: 5%;">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Strum, Matt and Wong, Gary and Carpenter, Charles and Fei, Zongming and Griffioen, James and Nasir, Hussamuddin and Reed, Jeremy and Wu, Xiongqi</b>
    1823 
    1824 <div class="BibEntry">
    1825 
    1826 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1827 
    1828 
    1829 <tr>
    1830      <td valign="top">Author</td>
    1831      <td valign="top">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Strum, Matt and Wong, Gary and Carpenter, Charles and Fei, Zongming and Griffioen, James and Nasir, Hussamuddin and Reed, Jeremy and Wu, Xiongqi</td>
    1832 </tr>
    1833 
    1834 <tr>
    1835      <td valign="top">Title</td>
    1836      <td valign="top">Getting started with GENI: a user tutorial</td>
     6299     <td valign="top">This paper presents a novel mobility architecture called Virtual Mobility Domains that is designed to work with the Floating Cloud Tiered Internetworking model. Virtual Mobility Domains supports both inter Autonomous System (macro) and intra Autonomous System (micro) mobility by leveraging a tiered addressing, a network cloud concept, and a unique packet forwarding scheme introduced by the Floating Cloud Tiered Internetworking model. The proposed mobility architecture is distinct from others by not using IP addressing and classic routing protocols, and deploying user-centric overlapping mobility domains. The comparative simulation study of Virtual Mobility Domains against Mobile IPv6, Hierarchical Mobile IPv6, and Proxy Mobile IPv6 using OPNET shows that Virtual Mobility Domains brings lower latency, lesser signaling overhead, and fewer packets loss during handoffs, specially during inter Autonomous System roaming. The results highlight the potential for a seamless mobility management.</td>
     6300</tr>
     6301
     6302
     6303
     6304<tr>
     6305     <td valign="top">DOI</td>
     6306     <td valign="top">10.1109/ICC.2012.6363872</td>
     6307</tr>
     6308
     6309
     6310
     6311<tr>
     6312     <td valign="top">URL</td>
     6313     <td valign="top"><a href="ftp://lesc.det.unifi.it/pub/LenLar/proceedings/2012/ICC2012/symposia/papers/virtual&#x005F;mobility&#x005F;domains&#x005F;-&#x005F;a&#x005F;mobility&#x005F;architecture&#x005F;for&#x005F;the&#x005F;\\_.pdf">ftp://lesc.det.unifi.it/pub/LenLar/proceedings/2012/ICC2012/symposia/papers/virtual&#x005F;mobility&#x005F;domains&#x005F;-&#x005F;a&#x005F;mobility&#x005F;architecture&#x005F;for&#x005F;the&#x005F;\\_.pdf</a></td>
     6314</tr>
     6315
     6316
     6317</li>
     6318
     6319</table></div><br><br>
     6320
     6321
     6322
     6323
     6324<a class="EntryGoto" id="Turner, Jonathan S."></a>
     6325<b class="myheading" style="position: relative; left: 5%;">Turner, Jonathan S.</b>
     6326
     6327<div class="BibEntry">
     6328
     6329<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     6330
     6331<li>
     6332
     6333
     6334<tr>
     6335     <td valign="top">Author</td>
     6336     <td valign="top">Turner, Jonathan S.</td>
     6337</tr>
     6338
     6339<tr>
     6340     <td valign="top">Title</td>
     6341     <td valign="top">A proposed architecture for the GENI backbone platform</td>
     6342</tr>
     6343
     6344<tr>
     6345     <td valign="top">Booktitle</td>
     6346     <td valign="top">Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems</td>
     6347</tr>
     6348
     6349<tr>
     6350     <td valign="top">Location</td>
     6351     <td valign="top">San Jose, California, USA</td>
     6352</tr>
     6353
     6354<tr>
     6355     <td valign="top">Publisher</td>
     6356     <td valign="top">ACM</td>
     6357</tr>
     6358
     6359<tr>
     6360     <td valign="top">Address</td>
     6361     <td valign="top">New York, NY, USA</td>
     6362</tr>
     6363
     6364<tr>
     6365     <td valign="top">Year</td>
     6366     <td valign="top">2006</td>
     6367</tr>
     6368
     6369<tr>
     6370     <td valign="top">Abstract</td>
     6371     <td valign="top">The GENI Project (Global Environment for Network Innovation) is a major NSF-sponsored initiative that seeks to create a national research facility to enable experimental deployment of innovative new network architectures on a sufficient scale to enable realistic evaluation. One key component of the GENI system will be the GENI Backbone Platform (GBP) that provides the resources needed to allow multiple experimental networks to co-exist within the shared GENI infrastructure. This paper reviews the objectives for the GBP, the key issues that affect its design and develops a reference architecture that provides a concrete example for how the objectives can be met, using commercially available subsystems.</td>
     6372</tr>
     6373
     6374
     6375
     6376<tr>
     6377     <td valign="top">DOI</td>
     6378     <td valign="top">10.1145/1185347.1185349</td>
     6379</tr>
     6380
     6381
     6382
     6383<tr>
     6384     <td valign="top">URL</td>
     6385     <td valign="top"><a href="http://dx.doi.org/10.1145/1185347.1185349">http://dx.doi.org/10.1145/1185347.1185349</a></td>
     6386</tr>
     6387
     6388
     6389</li>
     6390
     6391</table></div><br><br>
     6392
     6393
     6394
     6395
     6396<a class="EntryGoto" id="Turner, Jonathan S. and Crowley, Patrick and DeHart, John and Freestone, Amy and Heller, Brandon and Kuhns, Fred and Kumar, Sailesh and Lockwood, John and Lu, Jing and Wilson, Michael and Wiseman, Charles and Zar, David"></a>
     6397<b class="myheading" style="position: relative; left: 5%;">Turner, Jonathan S. and Crowley, Patrick and DeHart, John and Freestone, Amy and Heller, Brandon and Kuhns, Fred and Kumar, Sailesh and Lockwood, John and Lu, Jing and Wilson, Michael and Wiseman, Charles and Zar, David</b>
     6398
     6399<div class="BibEntry">
     6400
     6401<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     6402
     6403<li>
     6404
     6405
     6406<tr>
     6407     <td valign="top">Author</td>
     6408     <td valign="top">Turner, Jonathan S. and Crowley, Patrick and DeHart, John and Freestone, Amy and Heller, Brandon and Kuhns, Fred and Kumar, Sailesh and Lockwood, John and Lu, Jing and Wilson, Michael and Wiseman, Charles and Zar, David</td>
     6409</tr>
     6410
     6411<tr>
     6412     <td valign="top">Title</td>
     6413     <td valign="top">Supercharging planetlab: a high performance, multi-application, overlay network platform</td>
    18376414</tr>
    18386415
     
    18546431<tr>
    18556432     <td valign="top">Year</td>
    1856      <td valign="top">2012</td>
    1857 </tr>
    1858 
    1859 <tr>
    1860      <td valign="top">Abstract</td>
    1861      <td valign="top">GENI, the Global Environment for Network Innovations, is a National Science Foundation project to create a &#x76;&#x0308;irtual laboratory at the frontiers of network science and engineering for exploring future internets at scale.&#x20;&#x0308;It provides researchers, educators, and students with resources that they can use to build their own networks that span the country and - through federation - the world. GENI enables experimenters to try out bold new network architectures and designs for networked systems, and to deploy and evaluate these systems on a diverse set of resources over a large footprint. This tutorial is a starting point for running experiments on GENI. It provides an overview of GENI and covers the process of creating a network and running a simple experiment using two tools: the Flack GUI and the INSTOOLS instrumentation service.</td>
    1862 </tr>
    1863 
    1864 
    1865 
    1866 <tr>
    1867      <td valign="top">DOI</td>
    1868      <td valign="top">10.1145/2096149.2096161</td>
    1869 </tr>
    1870 
    1871 
    1872 
    1873 <tr>
    1874      <td valign="top">URL</td>
    1875      <td valign="top"><a href="http://dx.doi.org/10.1145/2096149.2096161">http://dx.doi.org/10.1145/2096149.2096161</a></td>
    1876 </tr>
    1877 
    1878 
    1879 </table></div><br><br>
    1880 
    1881 
    1882 
    1883 
    1884 <a class="EntryGoto" id="Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Wong, Gary and Chikkulapelly, Srikanth and Seok, Woojin"></a>
    1885 <b class="myheading" style="position: relative; left: 5%;">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Wong, Gary and Chikkulapelly, Srikanth and Seok, Woojin</b>
    1886 
    1887 <div class="BibEntry">
    1888 
    1889 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1890 
    1891 
    1892 <tr>
    1893      <td valign="top">Author</td>
    1894      <td valign="top">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Wong, Gary and Chikkulapelly, Srikanth and Seok, Woojin</td>
    1895 </tr>
    1896 
    1897 <tr>
    1898      <td valign="top">Title</td>
    1899      <td valign="top">Designing a Federated Testbed as a Distributed System</td>
    1900 </tr>
    1901 
    1902 <tr>
    1903      <td valign="top">Journal</td>
    1904      <td valign="top">8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2012)</td>
    1905 </tr>
    1906 
    1907 <tr>
    1908      <td valign="top">Year</td>
    1909      <td valign="top">2012</td>
    1910 </tr>
    1911 
    1912 <tr>
    1913      <td valign="top">Abstract</td>
    1914      <td valign="top">Traditionally, testbeds for networking and systems research have been stand-alone facilities: each is owned and operated by a single administrative entity, and is intended to be used independently of other testbeds. However, this isolated facility model is at odds with researchers' ever-increasing needs for experiments at larger scale and with a broader diversity of network technologies. The research community will be much better served by a federated model. In this model, each federated testbed maintains its own autonomy and unique strengths, but all federates work together to make their resources available under a common framework. Our challenge, then, is to design a federated testbed framework that balances competing needs: We must establish trust, but at the same time maintain the autonomy of each federated facility. While providing a unified interface to a broad set of resources, we need to expose the diversity that makes them valuable. Finally, our federation should work smoothly in a coordinated fashion, but avoid central points of failure and inter-facility dependencies. We argue that treating testbed design as a federated distributed systems problem is an effective approach to achieving this balance. The technique is illustrated through the example of ProtoGENI, a system we have designed, built, and operated according to the federated model.</td>
    1915 </tr>
    1916 
    1917 
    1918 
    1919 
    1920 
    1921 
    1922 </table></div><br><br>
    1923 
    1924 
    1925 
    1926 
    1927 <a class="EntryGoto" id="Elliott, Chip and Falk, Aaron"></a>
    1928 <b class="myheading" style="position: relative; left: 5%;">Elliott, Chip and Falk, Aaron</b>
    1929 
    1930 <div class="BibEntry">
    1931 
    1932 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1933 
    1934 
    1935 <tr>
    1936      <td valign="top">Author</td>
    1937      <td valign="top">Elliott, Chip and Falk, Aaron</td>
    1938 </tr>
    1939 
    1940 <tr>
    1941      <td valign="top">Title</td>
    1942      <td valign="top">An update on the GENI project</td>
     6433     <td valign="top">2007</td>
     6434</tr>
     6435
     6436<tr>
     6437     <td valign="top">Abstract</td>
     6438     <td valign="top">In recent years, overlay networks have become an important vehicle for delivering Internet applications. Overlay network nodes are typically implemented using general purpose servers or clusters. We investigate the performance benefits of more integrated architectures, combining general-purpose servers with high performance Network Processor (NP) subsystems. We focus on PlanetLab as our experimental context and report on the design and evaluation of an experimental PlanetLab platform capable of much higher levels of performance than typical system configurations. To make it easier for users to port applications, the system supports a fast path/slow path application structure that facilitates the mapping of the most performance-critical parts of an application onto an NP subsystem, while allowing the more complex control and exception-handling to be implemented within the programmer-friendly environment provided by conventional servers. We report on implementations of two sample applications, an IPv4 router, and a forwarding application for the Internet Indirection Infrastructure. We demonstrate an 80x improvement in packet processing rates and comparable reductions in latency.</td>
     6439</tr>
     6440
     6441
     6442
     6443<tr>
     6444     <td valign="top">DOI</td>
     6445     <td valign="top">10.1145/1282427.1282391</td>
     6446</tr>
     6447
     6448
     6449
     6450<tr>
     6451     <td valign="top">URL</td>
     6452     <td valign="top"><a href="http://dx.doi.org/10.1145/1282427.1282391">http://dx.doi.org/10.1145/1282427.1282391</a></td>
     6453</tr>
     6454
     6455
     6456</li>
     6457
     6458</table></div><br><br>
     6459
     6460
     6461
     6462
     6463<a class="EntryGoto" id="Valancius, Vytautas and Feamster, Nick"></a>
     6464<b class="myheading" style="position: relative; left: 5%;">Valancius, Vytautas and Feamster, Nick</b>
     6465
     6466<div class="BibEntry">
     6467
     6468<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     6469
     6470<li>
     6471
     6472
     6473<tr>
     6474     <td valign="top">Author</td>
     6475     <td valign="top">Valancius, Vytautas and Feamster, Nick</td>
     6476</tr>
     6477
     6478<tr>
     6479     <td valign="top">Title</td>
     6480     <td valign="top">Multiplexing BGP sessions with BGP-Mux</td>
     6481</tr>
     6482
     6483<tr>
     6484     <td valign="top">Booktitle</td>
     6485     <td valign="top">Proceedings of the 2007 ACM CoNEXT conference</td>
     6486</tr>
     6487
     6488<tr>
     6489     <td valign="top">Location</td>
     6490     <td valign="top">New York, New York</td>
     6491</tr>
     6492
     6493<tr>
     6494     <td valign="top">Publisher</td>
     6495     <td valign="top">ACM</td>
     6496</tr>
     6497
     6498<tr>
     6499     <td valign="top">Address</td>
     6500     <td valign="top">New York, NY, USA</td>
     6501</tr>
     6502
     6503<tr>
     6504     <td valign="top">Year</td>
     6505     <td valign="top">2007</td>
     6506</tr>
     6507
     6508<tr>
     6509     <td valign="top">Abstract</td>
     6510     <td valign="top">This paper describes a BGP-session multiplexer called BGP-Mux, which provides stable, on-demand access to global BGP route feeds. This gateway allows arbitrary and even transient client BGP connections to be provisioned and torn down on demand without affecting globally visible BGP sessions. BGP-Mux provides two capabilities: (1) the ability for a client network to receive multiple unfiltered routes per destination from a set of upstream ASes; and (2) the ability to provision BGP sessions without introducing global instability. Several applications could benefit from these features:</td>
     6511</tr>
     6512
     6513
     6514
     6515<tr>
     6516     <td valign="top">DOI</td>
     6517     <td valign="top">10.1145/1364654.1364707</td>
     6518</tr>
     6519
     6520
     6521
     6522<tr>
     6523     <td valign="top">URL</td>
     6524     <td valign="top"><a href="http://dx.doi.org/10.1145/1364654.1364707">http://dx.doi.org/10.1145/1364654.1364707</a></td>
     6525</tr>
     6526
     6527
     6528</li>
     6529
     6530</table></div><br><br>
     6531
     6532
     6533
     6534
     6535<a class="EntryGoto" id="Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao, Akihiro"></a>
     6536<b class="myheading" style="position: relative; left: 5%;">Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao, Akihiro</b>
     6537
     6538<div class="BibEntry">
     6539
     6540<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     6541
     6542<li>
     6543
     6544
     6545<tr>
     6546     <td valign="top">Author</td>
     6547     <td valign="top">Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao, Akihiro</td>
     6548</tr>
     6549
     6550<tr>
     6551     <td valign="top">Title</td>
     6552     <td valign="top">Wide-area route control for distributed services</td>
     6553</tr>
     6554
     6555<tr>
     6556     <td valign="top">Booktitle</td>
     6557     <td valign="top">Proceedings of the 2010 USENIX conference on USENIX annual technical conference</td>
     6558</tr>
     6559
     6560<tr>
     6561     <td valign="top">Location</td>
     6562     <td valign="top">Boston, MA</td>
     6563</tr>
     6564
     6565<tr>
     6566     <td valign="top">Publisher</td>
     6567     <td valign="top">USENIX Association</td>
     6568</tr>
     6569
     6570<tr>
     6571     <td valign="top">Address</td>
     6572     <td valign="top">Berkeley, CA, USA</td>
     6573</tr>
     6574
     6575<tr>
     6576     <td valign="top">Year</td>
     6577     <td valign="top">2010</td>
     6578</tr>
     6579
     6580<tr>
     6581     <td valign="top">Abstract</td>
     6582     <td valign="top">Many distributed services would benefit from control over the flow of traffic to and from their users, to offer better performance and higher reliability at a reasonable cost. Unfortunately, although today's cloud-computing platforms offer elastic computing and bandwidth resources, they do not give services control over wide-area routing. We propose replacing the data center's border router with a Transit Portal (TP) that gives each service the illusion of direct connectivity to upstream ISPs, without requiring each service to deploy hardware, acquire IP address space, or negotiate contracts with ISPs. Our TP prototype supports many layer-two connectivity mechanisms, amortizes memory and message overhead over multiple services, and protects the rest of the Internet from misconfigured and malicious applications. Our implementation extends and synthesizes open-source software components such as the Linux kernel and the Quagga routing daemon. We also implement a management plane based on the GENI control framework and couple this with our four-site TP deployment and Amazon EC2 facilities. Experiments with an anycast DNS application demonstrate the benefits the TP offers to distributed services.</td>
     6583</tr>
     6584
     6585
     6586
     6587
     6588
     6589<tr>
     6590     <td valign="top">URL</td>
     6591     <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=1855842">http://portal.acm.org/citation.cfm?id=1855842</a></td>
     6592</tr>
     6593
     6594
     6595</li>
     6596
     6597</table></div><br><br>
     6598
     6599
     6600
     6601
     6602<a class="EntryGoto" id="Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick"></a>
     6603<b class="myheading" style="position: relative; left: 5%;">Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick</b>
     6604
     6605<div class="BibEntry">
     6606
     6607<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     6608
     6609<li>
     6610
     6611
     6612<tr>
     6613     <td valign="top">Author</td>
     6614     <td valign="top">Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick</td>
     6615</tr>
     6616
     6617<tr>
     6618     <td valign="top">Title</td>
     6619     <td valign="top">Transit portal: BGP connectivity as a service</td>
    19436620</tr>
    19446621
     
    19606637<tr>
    19616638     <td valign="top">Year</td>
    1962      <td valign="top">2009</td>
    1963 </tr>
    1964 
    1965 <tr>
    1966      <td valign="top">Abstract</td>
    1967      <td valign="top">Environment for Network Innovations. Early prototypes of GENI are starting to come online as an end-to-end system and network researchers are invited to participate by engaging in the design process or using GENI to conduct experiments.</td>
    1968 </tr>
    1969 
    1970 
    1971 
    1972 <tr>
    1973      <td valign="top">DOI</td>
    1974      <td valign="top">10.1145/1568613.1568620</td>
    1975 </tr>
    1976 
    1977 
    1978 
    1979 <tr>
    1980      <td valign="top">URL</td>
    1981      <td valign="top"><a href="http://dx.doi.org/10.1145/1568613.1568620">http://dx.doi.org/10.1145/1568613.1568620</a></td>
    1982 </tr>
    1983 
    1984 
    1985 </table></div><br><br>
    1986 
    1987 
    1988 
    1989 
    1990 <a class="EntryGoto" id="Erazo, Miguel A. and Liu, Jason"></a>
    1991 <b class="myheading" style="position: relative; left: 5%;">Erazo, Miguel A. and Liu, Jason</b>
    1992 
    1993 <div class="BibEntry">
    1994 
    1995 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1996 
    1997 
    1998 <tr>
    1999      <td valign="top">Author</td>
    2000      <td valign="top">Erazo, Miguel A. and Liu, Jason</td>
    2001 </tr>
    2002 
    2003 <tr>
    2004      <td valign="top">Title</td>
    2005      <td valign="top">On enabling real-time large-scale network simulation in GENI: the PrimoGENI approach</td>
    2006 </tr>
    2007 
    2008 <tr>
    2009      <td valign="top">Booktitle</td>
    2010      <td valign="top">Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques</td>
    2011 </tr>
    2012 
    2013 <tr>
    2014      <td valign="top">Location</td>
    2015      <td valign="top">Torremolinos, Malaga, Spain</td>
    2016 </tr>
    2017 
    2018 <tr>
    2019      <td valign="top">Publisher</td>
    2020      <td valign="top">ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)</td>
    2021 </tr>
    2022 
    2023 <tr>
    2024      <td valign="top">Address</td>
    2025      <td valign="top">ICST, Brussels, Belgium, Belgium</td>
    2026 </tr>
    2027 
    2028 <tr>
    2029      <td valign="top">Year</td>
    20306639     <td valign="top">2010</td>
    20316640</tr>
     
    20336642<tr>
    20346643     <td valign="top">Abstract</td>
    2035      <td valign="top">The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform, a &#x76;&#x0308;irtual laboratory&#x20;&#x0308;for the design, implementation and evaluation of future Internets. In this paper, we present an overview of PrimoGENI, a GENI project with the goal of extending the GENI suite of interoperable infrastructure to allow network experiments at scale, involving physical, simulated and emulated network entities.</td>
    2036 </tr>
    2037 
    2038 
    2039 
    2040 <tr>
    2041      <td valign="top">DOI</td>
    2042      <td valign="top">10.4108/ICST.SIMUTOOLS2010.8636</td>
    2043 </tr>
    2044 
    2045 
    2046 
    2047 <tr>
    2048      <td valign="top">URL</td>
    2049      <td valign="top"><a href="http://dx.doi.org/10.4108/ICST.SIMUTOOLS2010.8636">http://dx.doi.org/10.4108/ICST.SIMUTOOLS2010.8636</a></td>
    2050 </tr>
    2051 
    2052 
    2053 </table></div><br><br>
    2054 
    2055 
    2056 
    2057 
    2058 <a class="EntryGoto" id="Esposito, Flavio and Wang, Yuefeng and Matta, Ibrahim and Day, John"></a>
    2059 <b class="myheading" style="position: relative; left: 5%;">Esposito, Flavio and Wang, Yuefeng and Matta, Ibrahim and Day, John</b>
    2060 
    2061 <div class="BibEntry">
    2062 
    2063 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2064 
    2065 
    2066 <tr>
    2067      <td valign="top">Author</td>
    2068      <td valign="top">Esposito, Flavio and Wang, Yuefeng and Matta, Ibrahim and Day, John</td>
    2069 </tr>
    2070 
    2071 <tr>
    2072      <td valign="top">Title</td>
    2073      <td valign="top">Dynamic Layer Instantiation as a Service</td>
    2074 </tr>
    2075 
    2076 <tr>
    2077      <td valign="top">Location</td>
    2078      <td valign="top">Lombard, IL</td>
    2079 </tr>
    2080 
    2081 <tr>
    2082      <td valign="top">Publisher</td>
    2083      <td valign="top">USENIX Association</td>
    2084 </tr>
    2085 
    2086 <tr>
    2087      <td valign="top">Address</td>
    2088      <td valign="top">Berkeley, CA, USA</td>
    2089 </tr>
    2090 
    2091 <tr>
    2092      <td valign="top">Year</td>
    2093      <td valign="top">2013</td>
    2094 </tr>
    2095 
    2096 
    2097 
    2098 
    2099 
    2100 <tr>
    2101      <td valign="top">URL</td>
    2102      <td valign="top"><a href="https://www.usenix.org/system/files/nsdip13-paper11.pdf">https://www.usenix.org/system/files/nsdip13-paper11.pdf</a></td>
    2103 </tr>
    2104 
    2105 
    2106 </table></div><br><br>
    2107 
    2108 
    2109 
    2110 
    2111 <a class="EntryGoto" id="Feamster, Nick and Gao, Lixin and Rexford, Jennifer"></a>
    2112 <b class="myheading" style="position: relative; left: 5%;">Feamster, Nick and Gao, Lixin and Rexford, Jennifer</b>
    2113 
    2114 <div class="BibEntry">
    2115 
    2116 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2117 
    2118 
    2119 <tr>
    2120      <td valign="top">Author</td>
    2121      <td valign="top">Feamster, Nick and Gao, Lixin and Rexford, Jennifer</td>
    2122 </tr>
    2123 
    2124 <tr>
    2125      <td valign="top">Title</td>
    2126      <td valign="top">How to lease the internet in your spare time</td>
    2127 </tr>
    2128 
    2129 <tr>
    2130      <td valign="top">Journal</td>
    2131      <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
    2132 </tr>
    2133 
    2134 <tr>
    2135      <td valign="top">Publisher</td>
    2136      <td valign="top">ACM</td>
    2137 </tr>
    2138 
    2139 <tr>
    2140      <td valign="top">Address</td>
    2141      <td valign="top">New York, NY, USA</td>
    2142 </tr>
    2143 
    2144 <tr>
    2145      <td valign="top">Year</td>
    2146      <td valign="top">2007</td>
    2147 </tr>
    2148 
    2149 
    2150 
    2151 <tr>
    2152      <td valign="top">DOI</td>
    2153      <td valign="top">10.1145/1198255.1198265</td>
    2154 </tr>
    2155 
    2156 
    2157 
    2158 <tr>
    2159      <td valign="top">URL</td>
    2160      <td valign="top"><a href="http://doi.acm.org/10.1145/1198255.1198265">http://doi.acm.org/10.1145/1198255.1198265</a></td>
    2161 </tr>
    2162 
    2163 
    2164 </table></div><br><br>
    2165 
    2166 
    2167 
    2168 
    2169 <a class="EntryGoto" id="Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram"></a>
    2170 <b class="myheading" style="position: relative; left: 5%;">Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram</b>
    2171 
    2172 <div class="BibEntry">
    2173 
    2174 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2175 
    2176 
    2177 <tr>
    2178      <td valign="top">Author</td>
    2179      <td valign="top">Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram</td>
    2180 </tr>
    2181 
    2182 <tr>
    2183      <td valign="top">Title</td>
    2184      <td valign="top">Decoupling policy from configuration in campus and enterprise networks</td>
    2185 </tr>
    2186 
    2187 <tr>
    2188      <td valign="top">Booktitle</td>
    2189      <td valign="top">2010 17th IEEE Workshop on Local &#x0026; Metropolitan Area Networks (LANMAN)</td>
    2190 </tr>
    2191 
    2192 <tr>
    2193      <td valign="top">Location</td>
    2194      <td valign="top">Long Branch, NJ, USA</td>
    2195 </tr>
    2196 
    2197 <tr>
    2198      <td valign="top">Publisher</td>
    2199      <td valign="top">IEEE</td>
    2200 </tr>
    2201 
    2202 <tr>
    2203      <td valign="top">Year</td>
    2204      <td valign="top">2010</td>
    2205 </tr>
    2206 
    2207 <tr>
    2208      <td valign="top">Abstract</td>
    2209      <td valign="top">This paper surveys our ongoing work on the use of software-defined networking to simplify two acute policy problems in campus and enterprise network operations: access control and information flow control. We describe how the current coupling of high-level policy with low-level configuration makes these problems challenging today. We describe the specific policy problems faced by campus and enterprise network operators; illustrate our approach, which leverages recent trends in separating the network's ” control plane” from the data plane; and show how this approach can be applied to simplify these two enterprise network management tasks. We also describe our ongoing deployment efforts to build a campus network testbed where trial designs can be deployed and evaluated. We close with a summary of current and future research challenges for solving challenges within enterprise networks within the context of this new paradigm.</td>
    2210 </tr>
    2211 
    2212 
    2213 
    2214 <tr>
    2215      <td valign="top">DOI</td>
    2216      <td valign="top">10.1109/LANMAN.2010.5507162</td>
    2217 </tr>
    2218 
    2219 
    2220 
    2221 <tr>
    2222      <td valign="top">URL</td>
    2223      <td valign="top"><a href="http://dx.doi.org/10.1109/LANMAN.2010.5507162">http://dx.doi.org/10.1109/LANMAN.2010.5507162</a></td>
    2224 </tr>
    2225 
    2226 
    2227 </table></div><br><br>
    2228 
    2229 
    2230 
    2231 
    2232 <a class="EntryGoto" id="Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning"></a>
    2233 <b class="myheading" style="position: relative; left: 5%;">Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning</b>
    2234 
    2235 <div class="BibEntry">
    2236 
    2237 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2238 
    2239 
    2240 <tr>
    2241      <td valign="top">Author</td>
    2242      <td valign="top">Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning</td>
    2243 </tr>
    2244 
    2245 <tr>
    2246      <td valign="top">Title</td>
    2247      <td valign="top">An enabling platform for autonomic management of the future internet</td>
    2248 </tr>
    2249 
    2250 <tr>
    2251      <td valign="top">Journal</td>
    2252      <td valign="top">IEEE Network</td>
    2253 </tr>
    2254 
    2255 <tr>
    2256      <td valign="top">Year</td>
    2257      <td valign="top">2011</td>
    2258 </tr>
    2259 
    2260 <tr>
    2261      <td valign="top">Abstract</td>
    2262      <td valign="top">This article shows an autonomic management solution based on the recently defined programmable node architecture NetServ. The article starts with a general description of the classical network management requirements and their adaptation to the expected network evolution. After a description of the major issues characterizing the management of the expected Future Internet, the main autonomic management paradigms, and some recently introduced autonomic service platforms, we show and demonstrate the effectiveness of the NetServ architecture. Born as a means to deploy and execute networked services at runtime over programmable routers, NetServ has proved to be a suitable environment for hosting an autonomic management architecture.</td>
    2263 </tr>
    2264 
    2265 
    2266 
    2267 <tr>
    2268      <td valign="top">DOI</td>
    2269      <td valign="top">10.1109/MNET.2011.6085639</td>
    2270 </tr>
    2271 
    2272 
    2273 
    2274 <tr>
    2275      <td valign="top">URL</td>
    2276      <td valign="top"><a href="http://dx.doi.org/10.1109/MNET.2011.6085639">http://dx.doi.org/10.1109/MNET.2011.6085639</a></td>
    2277 </tr>
    2278 
    2279 
    2280 </table></div><br><br>
    2281 
    2282 
    2283 
    2284 
    2285 <a class="EntryGoto" id="Fund, Fraida and Wang, Cong and Korakis, Thanasis and Zink, Michael and Panwar, Shivendra"></a>
    2286 <b class="myheading" style="position: relative; left: 5%;">Fund, Fraida and Wang, Cong and Korakis, Thanasis and Zink, Michael and Panwar, Shivendra</b>
    2287 
    2288 <div class="BibEntry">
    2289 
    2290 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2291 
    2292 
    2293 <tr>
    2294      <td valign="top">Author</td>
    2295      <td valign="top">Fund, Fraida and Wang, Cong and Korakis, Thanasis and Zink, Michael and Panwar, Shivendra</td>
    2296 </tr>
    2297 
    2298 <tr>
    2299      <td valign="top">Title</td>
    2300      <td valign="top">GENI WiMAX Performance: Evaluation and Comparison of Two Campus Testbeds</td>
    2301 </tr>
    2302 
    2303 <tr>
    2304      <td valign="top">Booktitle</td>
    2305      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    2306 </tr>
    2307 
    2308 <tr>
    2309      <td valign="top">Location</td>
    2310      <td valign="top">Salt Lake City, UT</td>
    2311 </tr>
    2312 
    2313 <tr>
    2314      <td valign="top">Publisher</td>
    2315      <td valign="top">IEEE</td>
    2316 </tr>
    2317 
    2318 <tr>
    2319      <td valign="top">Year</td>
    2320      <td valign="top">2013</td>
    2321 </tr>
    2322 
    2323 
    2324 
    2325 <tr>
    2326      <td valign="top">DOI</td>
    2327      <td valign="top">10.1109/GREE.2013.23</td>
    2328 </tr>
    2329 
    2330 
    2331 
    2332 <tr>
    2333      <td valign="top">URL</td>
    2334      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.23">http://dx.doi.org/10.1109/GREE.2013.23</a></td>
    2335 </tr>
    2336 
    2337 
    2338 </table></div><br><br>
    2339 
    2340 
    2341 
    2342 
    2343 <a class="EntryGoto" id="Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia"></a>
    2344 <b class="myheading" style="position: relative; left: 5%;">Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</b>
    2345 
    2346 <div class="BibEntry">
    2347 
    2348 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2349 
    2350 
    2351 <tr>
    2352      <td valign="top">Author</td>
    2353      <td valign="top">Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</td>
    2354 </tr>
    2355 
    2356 <tr>
    2357      <td valign="top">Title</td>
    2358      <td valign="top">Exercises for Graduate Students using GENI</td>
    2359 </tr>
    2360 
    2361 <tr>
    2362      <td valign="top">Booktitle</td>
    2363      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    2364 </tr>
    2365 
    2366 <tr>
    2367      <td valign="top">Location</td>
    2368      <td valign="top">Los Angeles</td>
    2369 </tr>
    2370 
    2371 <tr>
    2372      <td valign="top">Year</td>
    2373      <td valign="top">2012</td>
    2374 </tr>
    2375 
    2376 <tr>
    2377      <td valign="top">Abstract</td>
    2378      <td valign="top">GENI brings together a wide variety of heterogeneous networking infrastructure and technologies under a common platform. We propose programming exercises for graduate students to introduce GENI and enable students to conduct high fidelity networking experiments. In this paper, we focus on an exercise to study congestion control and reliability using the ProtoGENI aggregate. A planned second exercise aims to leverage GENI OpenFlow aggregates to study firewalls and QoS mechanisms. We believe that these lab exercises will expose students to key networking concepts and recent research directions, e.g., in the data center context.</td>
    2379 </tr>
    2380 
    2381 
    2382 
    2383 
    2384 
    2385 
    2386 </table></div><br><br>
    2387 
    2388 
    2389 <div class="BibEntry">
    2390 
    2391 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2392 
    2393 
    2394 <tr>
    2395      <td valign="top">Author</td>
    2396      <td valign="top">Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</td>
    2397 </tr>
    2398 
    2399 <tr>
    2400      <td valign="top">Title</td>
    2401      <td valign="top">Exercises for Graduate Students using GENI</td>
    2402 </tr>
    2403 
    2404 <tr>
    2405      <td valign="top">Booktitle</td>
    2406      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    2407 </tr>
    2408 
    2409 <tr>
    2410      <td valign="top">Location</td>
    2411      <td valign="top">Los Angeles</td>
    2412 </tr>
    2413 
    2414 <tr>
    2415      <td valign="top">Year</td>
    2416      <td valign="top">2012</td>
    2417 </tr>
    2418 
    2419 <tr>
    2420      <td valign="top">Abstract</td>
    2421      <td valign="top">GENI brings together a wide variety of heterogeneous networking infrastructure and technologies under a common platform. We propose programming exercises for graduate students to introduce GENI and enable students to conduct high fidelity networking experiments. In this paper, we focus on an exercise to study congestion control and reliability using the ProtoGENI aggregate. A planned second exercise aims to leverage GENI OpenFlow aggregates to study firewalls and QoS mechanisms. We believe that these lab exercises will expose students to key networking concepts and recent research directions, e.g., in the data center context.</td>
    2422 </tr>
    2423 
    2424 
    2425 
    2426 
    2427 
    2428 
    2429 </table></div><br><br>
    2430 
    2431 
    2432 
    2433 
    2434 <a class="EntryGoto" id="Gangam, Sriharsha and Fahmy, Sonia"></a>
    2435 <b class="myheading" style="position: relative; left: 5%;">Gangam, Sriharsha and Fahmy, Sonia</b>
    2436 
    2437 <div class="BibEntry">
    2438 
    2439 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2440 
    2441 
    2442 <tr>
    2443      <td valign="top">Author</td>
    2444      <td valign="top">Gangam, Sriharsha and Fahmy, Sonia</td>
    2445 </tr>
    2446 
    2447 <tr>
    2448      <td valign="top">Title</td>
    2449      <td valign="top">Mitigating interference in a network measurement service</td>
    2450 </tr>
    2451 
    2452 <tr>
    2453      <td valign="top">Booktitle</td>
    2454      <td valign="top">2011 IEEE Nineteenth IEEE International Workshop on Quality of Service</td>
    2455 </tr>
    2456 
    2457 <tr>
    2458      <td valign="top">Location</td>
    2459      <td valign="top">San Jose, CA, USA</td>
    2460 </tr>
    2461 
    2462 <tr>
    2463      <td valign="top">Publisher</td>
    2464      <td valign="top">IEEE</td>
    2465 </tr>
    2466 
    2467 <tr>
    2468      <td valign="top">Year</td>
    2469      <td valign="top">2011</td>
    2470 </tr>
    2471 
    2472 <tr>
    2473      <td valign="top">Abstract</td>
    2474      <td valign="top">Shared measurement services offer key advantages over conventional ad-hoc techniques for network monitoring. A measurement service may receive measurement requests concurrently from different applications and network administrators. These measurement requests are often served by injecting active network measurement traffic between two hosts. Two active measurements are said to interfere when the probe packets of one measurement tool are viewed as network traffic by the other. This may lead to faulty measurement readings. In this paper, we model the measurement interference problem, and show how to schedule measurement tasks to reduce interference and hence increase measurement accuracy. We propose twelve computationally tractable algorithms that decrease the total completion time (makespan) of measurement tasks, while avoiding interference. Our evaluation shows that the algorithm we refer to as Largest Area First, Busiest Node First - Earliest Interval Schedule (LAFBNF-EIS) has a mean makespan of about 5&#x0025; more than the theoretical lower bound over our set of measurement workloads.</td>
    2475 </tr>
    2476 
    2477 
    2478 
    2479 <tr>
    2480      <td valign="top">DOI</td>
    2481      <td valign="top">10.1109/IWQOS.2011.5931347</td>
    2482 </tr>
    2483 
    2484 
    2485 
    2486 <tr>
    2487      <td valign="top">URL</td>
    2488      <td valign="top"><a href="http://dx.doi.org/10.1109/IWQOS.2011.5931347">http://dx.doi.org/10.1109/IWQOS.2011.5931347</a></td>
    2489 </tr>
    2490 
    2491 
    2492 </table></div><br><br>
    2493 
    2494 
    2495 
    2496 
    2497 <a class="EntryGoto" id="Gao, Jingcheng and Xiao, Yang"></a>
    2498 <b class="myheading" style="position: relative; left: 5%;">Gao, Jingcheng and Xiao, Yang</b>
    2499 
    2500 <div class="BibEntry">
    2501 
    2502 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2503 
    2504 
    2505 <tr>
    2506      <td valign="top">Author</td>
    2507      <td valign="top">Gao, Jingcheng and Xiao, Yang</td>
    2508 </tr>
    2509 
    2510 <tr>
    2511      <td valign="top">Title</td>
    2512      <td valign="top">ProtoGENI DoS/DDoS Security Tests and Experiments</td>
    2513 </tr>
    2514 
    2515 <tr>
    2516      <td valign="top">Booktitle</td>
    2517      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    2518 </tr>
    2519 
    2520 <tr>
    2521      <td valign="top">Location</td>
    2522      <td valign="top">Los Angeles</td>
    2523 </tr>
    2524 
    2525 <tr>
    2526      <td valign="top">Year</td>
    2527      <td valign="top">2012</td>
    2528 </tr>
    2529 
    2530 <tr>
    2531      <td valign="top">Abstract</td>
    2532      <td valign="top">his paper will explain some tests and experiments to investigate selected security issues through ProtoGENI mainly during Spiral 3 time period and the beginning of Spiral 4. In this paper, we conduct multiple sets of DoS/ DDoS attacks in the current ProtoGENI testbed. These attacks show that it is very possible that ProtoGENI nodes may render vulnerabilities to such attacks.</td>
    2533 </tr>
    2534 
    2535 
    2536 
    2537 
    2538 
    2539 
    2540 </table></div><br><br>
    2541 
    2542 
    2543 <div class="BibEntry">
    2544 
    2545 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2546 
    2547 
    2548 <tr>
    2549      <td valign="top">Author</td>
    2550      <td valign="top">Gao, Jingcheng and Xiao, Yang</td>
    2551 </tr>
    2552 
    2553 <tr>
    2554      <td valign="top">Title</td>
    2555      <td valign="top">ProtoGENI DoS/DDoS Security Tests and Experiments</td>
    2556 </tr>
    2557 
    2558 <tr>
    2559      <td valign="top">Booktitle</td>
    2560      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    2561 </tr>
    2562 
    2563 <tr>
    2564      <td valign="top">Location</td>
    2565      <td valign="top">Los Angeles</td>
    2566 </tr>
    2567 
    2568 <tr>
    2569      <td valign="top">Year</td>
    2570      <td valign="top">2012</td>
    2571 </tr>
    2572 
    2573 <tr>
    2574      <td valign="top">Abstract</td>
    2575      <td valign="top">his paper will explain some tests and experiments to investigate selected security issues through ProtoGENI mainly during Spiral 3 time period and the beginning of Spiral 4. In this paper, we conduct multiple sets of DoS/ DDoS attacks in the current ProtoGENI testbed. These attacks show that it is very possible that ProtoGENI nodes may render vulnerabilities to such attacks.</td>
    2576 </tr>
    2577 
    2578 
    2579 
    2580 
    2581 
    2582 
    2583 </table></div><br><br>
    2584 
    2585 
    2586 
    2587 
    2588 <a class="EntryGoto" id="Gember, Aaron and Dragga, Chris and Akella, Aditya"></a>
    2589 <b class="myheading" style="position: relative; left: 5%;">Gember, Aaron and Dragga, Chris and Akella, Aditya</b>
    2590 
    2591 <div class="BibEntry">
    2592 
    2593 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2594 
    2595 
    2596 <tr>
    2597      <td valign="top">Author</td>
    2598      <td valign="top">Gember, Aaron and Dragga, Chris and Akella, Aditya</td>
    2599 </tr>
    2600 
    2601 <tr>
    2602      <td valign="top">Title</td>
    2603      <td valign="top">ECOS: Practical Mobile Application Offloading for Enterprises</td>
    2604 </tr>
    2605 
    2606 <tr>
    2607      <td valign="top">Booktitle</td>
    2608      <td valign="top">2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE '12)</td>
    2609 </tr>
    2610 
    2611 <tr>
    2612      <td valign="top">Year</td>
    2613      <td valign="top">2012</td>
    2614 </tr>
    2615 
    2616 <tr>
    2617      <td valign="top">Abstract</td>
    2618      <td valign="top">Offloading has emerged as a promising idea to allow handheld devices to access intensive applications without performance or energy costs. This could be particularly useful for enterprises seeking to run line-of-business applications on handhelds. However, we must address two practical roadblocks in order to make offloading amenable for enterprises: (i) ensuring data privacy and the use of trusted offloading resources, and (ii) accommodating offload at scale with diverse handheld objectives and compute resource capabilities. We present the design and implementation of an Enterprise-Centric Offloading System (ECOS) which augments prior offloading proposals to address these issues. ECOS uses a logically central controller to opportunistically leverage diverse compute resources, while tightly controlling where specific applications offload depending on privacy, performance, and energy constraints of users and applications. A wide range of experiments using a real prototype establish the effectiveness of our approach.</td>
    2619 </tr>
    2620 
    2621 
    2622 
    2623 
    2624 
    2625 <tr>
    2626      <td valign="top">URL</td>
    2627      <td valign="top"><a href="http://www.usenix.org/conference/hot-ice12/ecos-practical-mobile-application-of&#x0025;EF&#x0025;AC&#x0025;82oading-enterprises">http://www.usenix.org/conference/hot-ice12/ecos-practical-mobile-application-of&#x0025;EF&#x0025;AC&#x0025;82oading-enterprises</a></td>
    2628 </tr>
    2629 
    2630 
    2631 </table></div><br><br>
    2632 
    2633 
    2634 
    2635 
    2636 <a class="EntryGoto" id="Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David"></a>
    2637 <b class="myheading" style="position: relative; left: 5%;">Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David</b>
    2638 
    2639 <div class="BibEntry">
    2640 
    2641 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2642 
    2643 
    2644 <tr>
    2645      <td valign="top">Author</td>
    2646      <td valign="top">Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David</td>
    2647 </tr>
    2648 
    2649 <tr>
    2650      <td valign="top">Title</td>
    2651      <td valign="top">Supporting network evolution and incremental deployment with XIA</td>
    2652 </tr>
    2653 
    2654 <tr>
    2655      <td valign="top">Booktitle</td>
    2656      <td valign="top">Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication</td>
    2657 </tr>
    2658 
    2659 <tr>
    2660      <td valign="top">Location</td>
    2661      <td valign="top">Helsinki, Finland</td>
    2662 </tr>
    2663 
    2664 <tr>
    2665      <td valign="top">Publisher</td>
    2666      <td valign="top">ACM</td>
    2667 </tr>
    2668 
    2669 <tr>
    2670      <td valign="top">Address</td>
    2671      <td valign="top">New York, NY, USA</td>
    2672 </tr>
    2673 
    2674 <tr>
    2675      <td valign="top">Year</td>
    2676      <td valign="top">2012</td>
    2677 </tr>
    2678 
    2679 <tr>
    2680      <td valign="top">Abstract</td>
    2681      <td valign="top">eXpressive Internet Architecture (XIA) [1] is an architecture that natively supports multiple communication types and allows networks to evolve their abstractions and functionality to accommodate new styles of communication over time. XIA embeds an elegant mechanism for handling unforeseen communication types for legacy routers. In this demonstration, we show that XIA overcomes three key barriers in network evolution (outlined below) by (1) allowing end-hosts and applications to start using new communication types (e.g., service and content) before the network supports them, (2) ensuring that upgrading a subset of routers to support new functionalities immediately benefits applications, and (3) using the same mechanisms we employ for 1 and 2 to incrementally deploy XIA in IP networks.</td>
    2682 </tr>
    2683 
    2684 
    2685 
    2686 <tr>
    2687      <td valign="top">DOI</td>
    2688      <td valign="top">10.1145/2342356.2342410</td>
    2689 </tr>
    2690 
    2691 
    2692 
    2693 <tr>
    2694      <td valign="top">URL</td>
    2695      <td valign="top"><a href="http://dx.doi.org/10.1145/2342356.2342410">http://dx.doi.org/10.1145/2342356.2342410</a></td>
    2696 </tr>
    2697 
    2698 
    2699 </table></div><br><br>
    2700 
    2701 
    2702 <div class="BibEntry">
    2703 
    2704 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2705 
    2706 
    2707 <tr>
    2708      <td valign="top">Author</td>
    2709      <td valign="top">Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David</td>
    2710 </tr>
    2711 
    2712 <tr>
    2713      <td valign="top">Title</td>
    2714      <td valign="top">Supporting network evolution and incremental deployment with XIA</td>
    2715 </tr>
    2716 
    2717 <tr>
    2718      <td valign="top">Booktitle</td>
    2719      <td valign="top">Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication</td>
    2720 </tr>
    2721 
    2722 <tr>
    2723      <td valign="top">Location</td>
    2724      <td valign="top">Helsinki, Finland</td>
    2725 </tr>
    2726 
    2727 <tr>
    2728      <td valign="top">Publisher</td>
    2729      <td valign="top">ACM</td>
    2730 </tr>
    2731 
    2732 <tr>
    2733      <td valign="top">Address</td>
    2734      <td valign="top">New York, NY, USA</td>
    2735 </tr>
    2736 
    2737 <tr>
    2738      <td valign="top">Year</td>
    2739      <td valign="top">2012</td>
    2740 </tr>
    2741 
    2742 <tr>
    2743      <td valign="top">Abstract</td>
    2744      <td valign="top">eXpressive Internet Architecture (XIA) [1] is an architecture that natively supports multiple communication types and allows networks to evolve their abstractions and functionality to accommodate new styles of communication over time. XIA embeds an elegant mechanism for handling unforeseen communication types for legacy routers. In this demonstration, we show that XIA overcomes three key barriers in network evolution (outlined below) by (1) allowing end-hosts and applications to start using new communication types (e.g., service and content) before the network supports them, (2) ensuring that upgrading a subset of routers to support new functionalities immediately benefits applications, and (3) using the same mechanisms we employ for 1 and 2 to incrementally deploy XIA in IP networks.</td>
    2745 </tr>
    2746 
    2747 
    2748 
    2749 <tr>
    2750      <td valign="top">DOI</td>
    2751      <td valign="top">10.1145/2342356.2342410</td>
    2752 </tr>
    2753 
    2754 
    2755 
    2756 <tr>
    2757      <td valign="top">URL</td>
    2758      <td valign="top"><a href="http://dx.doi.org/10.1145/2342356.2342410">http://dx.doi.org/10.1145/2342356.2342410</a></td>
    2759 </tr>
    2760 
    2761 
    2762 </table></div><br><br>
    2763 
    2764 
    2765 
    2766 
    2767 <a class="EntryGoto" id="Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C."></a>
    2768 <b class="myheading" style="position: relative; left: 5%;">Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</b>
    2769 
    2770 <div class="BibEntry">
    2771 
    2772 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2773 
    2774 
    2775 <tr>
    2776      <td valign="top">Author</td>
    2777      <td valign="top">Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</td>
    2778 </tr>
    2779 
    2780 <tr>
    2781      <td valign="top">Title</td>
    2782      <td valign="top">The design of an instrumentation system for federated and virtualized network testbeds</td>
    2783 </tr>
    2784 
    2785 <tr>
    2786      <td valign="top">Booktitle</td>
    2787      <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td>
    2788 </tr>
    2789 
    2790 <tr>
    2791      <td valign="top">Publisher</td>
    2792      <td valign="top">IEEE</td>
    2793 </tr>
    2794 
    2795 <tr>
    2796      <td valign="top">Year</td>
    2797      <td valign="top">2012</td>
    2798 </tr>
    2799 
    2800 <tr>
    2801      <td valign="top">Abstract</td>
    2802      <td valign="top">Much of the GENI effort in developing network testbeds has been focused on building the control frameworks needed to allocate and initialize the network resources that make up an experiment. We argue that building the instrumentation and measurement system to monitor and capture the behavior of the network is just as important and challenging as setting up the network itself, especially in a virtualized and federated environment where getting information from experimental nodes is too complicated and too much to handle for a typical user. In this paper, we describe the design of an instrumentation and measurement infrastructure that allows users to monitor their experiments. The challenge that virtualization and federation of GENI testbeds bring to instrumentation and monitoring is how to hide the details of instrumentation setup from users so that users do not need to be experts in system administration or network management of virtualized and federated systems, but are still able to ” see” what is going on with their experiments. Our instrumentation tool sets up experiment-specific monitoring infrastructure that is tailored to capture, record, and display only information associated with that experiment. Our tools are currently available in GENI, and we present a simple example of how to use them to instrument an experiment.</td>
    2803 </tr>
    2804 
    2805 
    2806 
    2807 <tr>
    2808      <td valign="top">DOI</td>
    2809      <td valign="top">10.1109/NOMS.2012.6212061</td>
    2810 </tr>
    2811 
    2812 
    2813 
    2814 <tr>
    2815      <td valign="top">URL</td>
    2816      <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6212061">http://dx.doi.org/10.1109/NOMS.2012.6212061</a></td>
    2817 </tr>
    2818 
    2819 
    2820 </table></div><br><br>
    2821 
    2822 
    2823 
    2824 
    2825 <a class="EntryGoto" id="Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles"></a>
    2826 <b class="myheading" style="position: relative; left: 5%;">Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</b>
    2827 
    2828 <div class="BibEntry">
    2829 
    2830 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2831 
    2832 
    2833 <tr>
    2834      <td valign="top">Author</td>
    2835      <td valign="top">Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td>
    2836 </tr>
    2837 
    2838 <tr>
    2839      <td valign="top">Title</td>
    2840      <td valign="top">GENI-enabled Programming Experiments for Networking Classes</td>
    2841 </tr>
    2842 
    2843 <tr>
    2844      <td valign="top">Booktitle</td>
    2845      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    2846 </tr>
    2847 
    2848 <tr>
    2849      <td valign="top">Location</td>
    2850      <td valign="top">Salt Lake City, UT</td>
    2851 </tr>
    2852 
    2853 <tr>
    2854      <td valign="top">Publisher</td>
    2855      <td valign="top">IEEE</td>
    2856 </tr>
    2857 
    2858 <tr>
    2859      <td valign="top">Year</td>
    2860      <td valign="top">2013</td>
    2861 </tr>
    2862 
    2863 
    2864 
    2865 <tr>
    2866      <td valign="top">DOI</td>
    2867      <td valign="top">10.1109/GREE.2013.30</td>
    2868 </tr>
    2869 
    2870 
    2871 
    2872 <tr>
    2873      <td valign="top">URL</td>
    2874      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.30">http://dx.doi.org/10.1109/GREE.2013.30</a></td>
    2875 </tr>
    2876 
    2877 
    2878 </table></div><br><br>
    2879 
    2880 
    2881 
    2882 
    2883 <a class="EntryGoto" id="Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles"></a>
    2884 <b class="myheading" style="position: relative; left: 5%;">Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</b>
    2885 
    2886 <div class="BibEntry">
    2887 
    2888 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2889 
    2890 
    2891 <tr>
    2892      <td valign="top">Author</td>
    2893      <td valign="top">Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td>
    2894 </tr>
    2895 
    2896 <tr>
    2897      <td valign="top">Title</td>
    2898      <td valign="top">Teaching with the Emerging GENI Network</td>
    2899 </tr>
    2900 
    2901 <tr>
    2902      <td valign="top">Booktitle</td>
    2903      <td valign="top">Proceedings of the 2012 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS)</td>
    2904 </tr>
    2905 
    2906 <tr>
    2907      <td valign="top">Location</td>
    2908      <td valign="top">Las Vegas</td>
    2909 </tr>
    2910 
    2911 <tr>
    2912      <td valign="top">Year</td>
    2913      <td valign="top">2012</td>
    2914 </tr>
    2915 
    2916 
    2917 
    2918 
    2919 
    2920 
    2921 </table></div><br><br>
    2922 
    2923 
    2924 
    2925 
    2926 <a class="EntryGoto" id="Guan, Xinjie and Choi, Baek-Young and Song, Sejun"></a>
    2927 <b class="myheading" style="position: relative; left: 5%;">Guan, Xinjie and Choi, Baek-Young and Song, Sejun</b>
    2928 
    2929 <div class="BibEntry">
    2930 
    2931 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2932 
    2933 
    2934 <tr>
    2935      <td valign="top">Author</td>
    2936      <td valign="top">Guan, Xinjie and Choi, Baek-Young and Song, Sejun</td>
    2937 </tr>
    2938 
    2939 <tr>
    2940      <td valign="top">Title</td>
    2941      <td valign="top">Reliability and Scalability Issues in Software Defined Network Frameworks</td>
    2942 </tr>
    2943 
    2944 <tr>
    2945      <td valign="top">Booktitle</td>
    2946      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    2947 </tr>
    2948 
    2949 <tr>
    2950      <td valign="top">Location</td>
    2951      <td valign="top">Salt Lake City, UT</td>
    2952 </tr>
    2953 
    2954 <tr>
    2955      <td valign="top">Publisher</td>
    2956      <td valign="top">IEEE</td>
    2957 </tr>
    2958 
    2959 <tr>
    2960      <td valign="top">Year</td>
    2961      <td valign="top">2013</td>
    2962 </tr>
    2963 
    2964 
    2965 
    2966 <tr>
    2967      <td valign="top">DOI</td>
    2968      <td valign="top">10.1109/GREE.2013.28</td>
    2969 </tr>
    2970 
    2971 
    2972 
    2973 <tr>
    2974      <td valign="top">URL</td>
    2975      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.28">http://dx.doi.org/10.1109/GREE.2013.28</a></td>
    2976 </tr>
    2977 
    2978 
    2979 </table></div><br><br>
    2980 
    2981 
    2982 
    2983 
    2984 <a class="EntryGoto" id="Herron, Jon-Paul"></a>
    2985 <b class="myheading" style="position: relative; left: 5%;">Herron, Jon-Paul</b>
    2986 
    2987 <div class="BibEntry">
    2988 
    2989 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2990 
    2991 
    2992 <tr>
    2993      <td valign="top">Author</td>
    2994      <td valign="top">Herron, Jon-Paul</td>
    2995 </tr>
    2996 
    2997 <tr>
    2998      <td valign="top">Title</td>
    2999      <td valign="top">GENI Meta-Operations Center</td>
    3000 </tr>
    3001 
    3002 <tr>
    3003      <td valign="top">Booktitle</td>
    3004      <td valign="top">2008 IEEE Fourth International Conference on eScience</td>
    3005 </tr>
    3006 
    3007 <tr>
    3008      <td valign="top">Location</td>
    3009      <td valign="top">Indianapolis, IN, USA</td>
    3010 </tr>
    3011 
    3012 <tr>
    3013      <td valign="top">Publisher</td>
    3014      <td valign="top">IEEE</td>
    3015 </tr>
    3016 
    3017 <tr>
    3018      <td valign="top">Year</td>
    3019      <td valign="top">2008</td>
    3020 </tr>
    3021 
    3022 <tr>
    3023      <td valign="top">Abstract</td>
    3024      <td valign="top">NSF's GENI program represents an opportunity to build the kind of programmable, virtualized testbed scientists exploring the future of networking will need to support their research. As with any other scientific instrument, it will be crucial that the GENI infrastructure offer repeatable, consistent results to the researchers using it.The GENI Meta-Operations Center, operated by the Global Research NOC at Indiana University, will develop the software, protocols, and processes needed to ensure the repeatability, consistency, and efficiency of GENI.</td>
    3025 </tr>
    3026 
    3027 
    3028 
    3029 <tr>
    3030      <td valign="top">DOI</td>
    3031      <td valign="top">10.1109/eScience.2008.103</td>
    3032 </tr>
    3033 
    3034 
    3035 
    3036 <tr>
    3037      <td valign="top">URL</td>
    3038      <td valign="top"><a href="http://dx.doi.org/10.1109/eScience.2008.103">http://dx.doi.org/10.1109/eScience.2008.103</a></td>
    3039 </tr>
    3040 
    3041 
    3042 </table></div><br><br>
    3043 
    3044 
    3045 
    3046 
    3047 <a class="EntryGoto" id="Huang, Shufeng and Griffioen, James and Calvert, Kenneth L."></a>
    3048 <b class="myheading" style="position: relative; left: 5%;">Huang, Shufeng and Griffioen, James and Calvert, Kenneth L.</b>
    3049 
    3050 <div class="BibEntry">
    3051 
    3052 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3053 
    3054 
    3055 <tr>
    3056      <td valign="top">Author</td>
    3057      <td valign="top">Huang, Shufeng and Griffioen, James and Calvert, Kenneth L.</td>
    3058 </tr>
    3059 
    3060 <tr>
    3061      <td valign="top">Title</td>
    3062      <td valign="top">Fast-tracking GENI Experiments using HyperNets</td>
    3063 </tr>
    3064 
    3065 <tr>
    3066      <td valign="top">Booktitle</td>
    3067      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    3068 </tr>
    3069 
    3070 <tr>
    3071      <td valign="top">Location</td>
    3072      <td valign="top">Salt Lake City, UT</td>
    3073 </tr>
    3074 
    3075 <tr>
    3076      <td valign="top">Publisher</td>
    3077      <td valign="top">IEEE</td>
    3078 </tr>
    3079 
    3080 <tr>
    3081      <td valign="top">Year</td>
    3082      <td valign="top">2013</td>
    3083 </tr>
    3084 
    3085 
    3086 
    3087 <tr>
    3088      <td valign="top">DOI</td>
    3089      <td valign="top">10.1109/GREE.2013.10</td>
    3090 </tr>
    3091 
    3092 
    3093 
    3094 <tr>
    3095      <td valign="top">URL</td>
    3096      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.10">http://dx.doi.org/10.1109/GREE.2013.10</a></td>
    3097 </tr>
    3098 
    3099 
    3100 </table></div><br><br>
    3101 
    3102 
    3103 
    3104 
    3105 <a class="EntryGoto" id="Jin, Ruofan and Wang, Bing"></a>
    3106 <b class="myheading" style="position: relative; left: 5%;">Jin, Ruofan and Wang, Bing</b>
    3107 
    3108 <div class="BibEntry">
    3109 
    3110 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3111 
    3112 
    3113 <tr>
    3114      <td valign="top">Author</td>
    3115      <td valign="top">Jin, Ruofan and Wang, Bing</td>
    3116 </tr>
    3117 
    3118 <tr>
    3119      <td valign="top">Title</td>
    3120      <td valign="top">Malware Detection for Mobile Devices Using Software-Defined Networking</td>
    3121 </tr>
    3122 
    3123 <tr>
    3124      <td valign="top">Booktitle</td>
    3125      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    3126 </tr>
    3127 
    3128 <tr>
    3129      <td valign="top">Location</td>
    3130      <td valign="top">Salt Lake City, UT</td>
    3131 </tr>
    3132 
    3133 <tr>
    3134      <td valign="top">Publisher</td>
    3135      <td valign="top">IEEE</td>
    3136 </tr>
    3137 
    3138 <tr>
    3139      <td valign="top">Year</td>
    3140      <td valign="top">2013</td>
    3141 </tr>
    3142 
    3143 
    3144 
    3145 <tr>
    3146      <td valign="top">DOI</td>
    3147      <td valign="top">10.1109/GREE.2013.24</td>
    3148 </tr>
    3149 
    3150 
    3151 
    3152 <tr>
    3153      <td valign="top">URL</td>
    3154      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.24">http://dx.doi.org/10.1109/GREE.2013.24</a></td>
    3155 </tr>
    3156 
    3157 
    3158 </table></div><br><br>
    3159 
    3160 
    3161 
    3162 
    3163 <a class="EntryGoto" id="Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng"></a>
    3164 <b class="myheading" style="position: relative; left: 5%;">Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng</b>
    3165 
    3166 <div class="BibEntry">
    3167 
    3168 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3169 
    3170 
    3171 <tr>
    3172      <td valign="top">Author</td>
    3173      <td valign="top">Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng</td>
    3174 </tr>
    3175 
    3176 <tr>
    3177      <td valign="top">Title</td>
    3178      <td valign="top">LENS: resource specification for wireless sensor network experimentation infrastructures</td>
    3179 </tr>
    3180 
    3181 <tr>
    3182      <td valign="top">Booktitle</td>
    3183      <td valign="top">Proceedings of the 6th ACM international workshop on Wireless network testbeds, experimental evaluation and characterization</td>
    3184 </tr>
    3185 
    3186 <tr>
    3187      <td valign="top">Location</td>
    3188      <td valign="top">Las Vegas, Nevada, USA</td>
    3189 </tr>
    3190 
    3191 <tr>
    3192      <td valign="top">Publisher</td>
    3193      <td valign="top">ACM</td>
    3194 </tr>
    3195 
    3196 <tr>
    3197      <td valign="top">Address</td>
    3198      <td valign="top">New York, NY, USA</td>
    3199 </tr>
    3200 
    3201 <tr>
    3202      <td valign="top">Year</td>
    3203      <td valign="top">2011</td>
    3204 </tr>
    3205 
    3206 <tr>
    3207      <td valign="top">Abstract</td>
    3208      <td valign="top">As a first step towards predictable, repeatable WSN experimentation, we propose the resource specification language LENS (a.k.a. Language for Embedded Networked Sensing) for WSN experimentation infrastructures. Using the Resource Description Framework (RDF) and the Web Ontology Language (OWL), LENS defines a semantic ontology for WSN resources; LENS enables explicit control and measurement of uncertainty factors, and it enables reasoning about the relationships between WSN resources. Focusing on basic concepts of WSNs, LENS supports resource specification in a wide range of WSN experimentation infrastructures, and it is extensible to support potentially unforeseen technologies. LENS is also compatible with specification languages for other network resources such as optical networks. As a part of the NSF GENI initiative, we have implemented LENS in the KanseiGenie control framework, and LENS has been actively used to support experimentation in the federated WSN infrastructure involving Kansei and NetEye. Enabling reasoning about uncertainty factors in experimentation, LENS is expected to serve as a basis for developing methodologies and tools for predictable, repeatable WSN experimentation.</td>
    3209 </tr>
    3210 
    3211 
    3212 
    3213 <tr>
    3214      <td valign="top">DOI</td>
    3215      <td valign="top">10.1145/2030718.2030727</td>
    3216 </tr>
    3217 
    3218 
    3219 
    3220 <tr>
    3221      <td valign="top">URL</td>
    3222      <td valign="top"><a href="http://dx.doi.org/10.1145/2030718.2030727">http://dx.doi.org/10.1145/2030718.2030727</a></td>
    3223 </tr>
    3224 
    3225 
    3226 </table></div><br><br>
    3227 
    3228 
    3229 
    3230 
    3231 <a class="EntryGoto" id="Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten"></a>
    3232 <b class="myheading" style="position: relative; left: 5%;">Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten</b>
    3233 
    3234 <div class="BibEntry">
    3235 
    3236 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3237 
    3238 
    3239 <tr>
    3240      <td valign="top">Author</td>
    3241      <td valign="top">Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten</td>
    3242 </tr>
    3243 
    3244 <tr>
    3245      <td valign="top">Title</td>
    3246      <td valign="top">VeriFlow: verifying network-wide invariants in real time</td>
    3247 </tr>
    3248 
    3249 <tr>
    3250      <td valign="top">Booktitle</td>
    3251      <td valign="top">Proceedings of the first workshop on Hot topics in software defined networks</td>
    3252 </tr>
    3253 
    3254 <tr>
    3255      <td valign="top">Location</td>
    3256      <td valign="top">Helsinki, Finland</td>
    3257 </tr>
    3258 
    3259 <tr>
    3260      <td valign="top">Publisher</td>
    3261      <td valign="top">ACM</td>
    3262 </tr>
    3263 
    3264 <tr>
    3265      <td valign="top">Address</td>
    3266      <td valign="top">New York, NY, USA</td>
    3267 </tr>
    3268 
    3269 <tr>
    3270      <td valign="top">Year</td>
    3271      <td valign="top">2012</td>
    3272 </tr>
    3273 
    3274 
    3275 
    3276 <tr>
    3277      <td valign="top">DOI</td>
    3278      <td valign="top">10.1145/2342441.2342452</td>
    3279 </tr>
    3280 
    3281 
    3282 
    3283 <tr>
    3284      <td valign="top">URL</td>
    3285      <td valign="top"><a href="http://doi.acm.org/10.1145/2342441.2342452">http://doi.acm.org/10.1145/2342441.2342452</a></td>
    3286 </tr>
    3287 
    3288 
    3289 </table></div><br><br>
    3290 
    3291 
    3292 
    3293 
    3294 <a class="EntryGoto" id="Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki"></a>
    3295 <b class="myheading" style="position: relative; left: 5%;">Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki</b>
    3296 
    3297 <div class="BibEntry">
    3298 
    3299 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3300 
    3301 
    3302 <tr>
    3303      <td valign="top">Author</td>
    3304      <td valign="top">Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki</td>
    3305 </tr>
    3306 
    3307 <tr>
    3308      <td valign="top">Title</td>
    3309      <td valign="top">Future Internet: Challenges in Virtualization and Federation</td>
    3310 </tr>
    3311 
    3312 <tr>
    3313      <td valign="top">Booktitle</td>
    3314      <td valign="top">2009 Fifth Advanced International Conference on Telecommunications</td>
    3315 </tr>
    3316 
    3317 <tr>
    3318      <td valign="top">Location</td>
    3319      <td valign="top">Venice/Mestre, Italy</td>
    3320 </tr>
    3321 
    3322 <tr>
    3323      <td valign="top">Publisher</td>
    3324      <td valign="top">IEEE</td>
    3325 </tr>
    3326 
    3327 <tr>
    3328      <td valign="top">Year</td>
    3329      <td valign="top">2009</td>
    3330 </tr>
    3331 
    3332 <tr>
    3333      <td valign="top">Abstract</td>
    3334      <td valign="top">Future Internet is a clean-slate research activity in the quest of new networking technologies to overcome the limits of the current Internet. In its experimental research, virtualization and federation are emerging as essential features, especially in the construction and operation of the testbeds. Moreover, they are believed to sustain as the fundamental features of the Future Internet itself. Visions and experiences on virtualization and federation are given by leading experts from US, EU, and Asia.</td>
    3335 </tr>
    3336 
    3337 
    3338 
    3339 <tr>
    3340      <td valign="top">DOI</td>
    3341      <td valign="top">10.1109/AICT.2009.8</td>
    3342 </tr>
    3343 
    3344 
    3345 
    3346 <tr>
    3347      <td valign="top">URL</td>
    3348      <td valign="top"><a href="http://dx.doi.org/10.1109/AICT.2009.8">http://dx.doi.org/10.1109/AICT.2009.8</a></td>
    3349 </tr>
    3350 
    3351 
    3352 </table></div><br><br>
    3353 
    3354 
    3355 
    3356 
    3357 <a class="EntryGoto" id="Kim, Hyunjun and Lee, Sungwon"></a>
    3358 <b class="myheading" style="position: relative; left: 5%;">Kim, Hyunjun and Lee, Sungwon</b>
    3359 
    3360 <div class="BibEntry">
    3361 
    3362 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3363 
    3364 
    3365 <tr>
    3366      <td valign="top">Author</td>
    3367      <td valign="top">Kim, Hyunjun and Lee, Sungwon</td>
    3368 </tr>
    3369 
    3370 <tr>
    3371      <td valign="top">Title</td>
    3372      <td valign="top">FiRST Cloud Aggregate Manager development over FiRST: Future Internet testbed</td>
    3373 </tr>
    3374 
    3375 <tr>
    3376      <td valign="top">Booktitle</td>
    3377      <td valign="top">The International Conference on Information Network 2012</td>
    3378 </tr>
    3379 
    3380 <tr>
    3381      <td valign="top">Location</td>
    3382      <td valign="top">Bali, Indonesia</td>
    3383 </tr>
    3384 
    3385 <tr>
    3386      <td valign="top">Publisher</td>
    3387      <td valign="top">IEEE</td>
    3388 </tr>
    3389 
    3390 <tr>
    3391      <td valign="top">Year</td>
    3392      <td valign="top">2012</td>
    3393 </tr>
    3394 
    3395 <tr>
    3396      <td valign="top">Abstract</td>
    3397      <td valign="top">FiRST (Future Internet Research for Sustainable Test-bed) is the future internet platform development project being performed in Korea. The goal of the project is to create the virtualized and dynamic service creation environments over future internet networks; it is an experimental project to realize future innovative service ideas over real network environments. Among this, cloud computing is the key enabler to control and allocate virtualized network resources (such as CPU, storage, and virtualized network configuration) for the requested services. However, researches on interworking between future internet and cloud computing is in initial phase. In this paper, we propose the FiRST Cloud Aggregate Manager (AM) based on GENI (Global Environment for Network Innovation) AM Application Programming Interface (API) for the federation between future internet test-bed and open source OpenStack cloud computing platform. After that, we propose the zero-client service for mobile cloud management. In order to control the zero-client service, we develop Cloud Mobility Client/Server. And, we validate and verified our FiRST Cloud AM and zero-client service by developing experimental test-bed. Through this test-bed, we confirm that the proposed FiRST Cloud AM and zero-client service efficiently interworks with future internet control plane framework by using GENI Control Framework (GCF) tools.</td>
    3398 </tr>
    3399 
    3400 
    3401 
    3402 <tr>
    3403      <td valign="top">DOI</td>
    3404      <td valign="top">10.1109/ICOIN.2012.6164436</td>
    3405 </tr>
    3406 
    3407 
    3408 
    3409 <tr>
    3410      <td valign="top">URL</td>
    3411      <td valign="top"><a href="http://dx.doi.org/10.1109/ICOIN.2012.6164436">http://dx.doi.org/10.1109/ICOIN.2012.6164436</a></td>
    3412 </tr>
    3413 
    3414 
    3415 </table></div><br><br>
    3416 
    3417 
    3418 
    3419 
    3420 <a class="EntryGoto" id="Kline, Donald and Quan, John"></a>
    3421 <b class="myheading" style="position: relative; left: 5%;">Kline, Donald and Quan, John</b>
    3422 
    3423 <div class="BibEntry">
    3424 
    3425 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3426 
    3427 
    3428 <tr>
    3429      <td valign="top">Author</td>
    3430      <td valign="top">Kline, Donald and Quan, John</td>
    3431 </tr>
    3432 
    3433 <tr>
    3434      <td valign="top">Title</td>
    3435      <td valign="top">Attribute description service for large-scale networks</td>
    3436 </tr>
    3437 
    3438 <tr>
    3439      <td valign="top">Booktitle</td>
    3440      <td valign="top">Proceedings of the 2nd international conference on Human centered design</td>
    3441 </tr>
    3442 
    3443 <tr>
    3444      <td valign="top">Location</td>
    3445      <td valign="top">Orlando, FL, USA</td>
    3446 </tr>
    3447 
    3448 <tr>
    3449      <td valign="top">Publisher</td>
    3450      <td valign="top">Springer-Verlag</td>
    3451 </tr>
    3452 
    3453 <tr>
    3454      <td valign="top">Address</td>
    3455      <td valign="top">Berlin, Heidelberg</td>
    3456 </tr>
    3457 
    3458 <tr>
    3459      <td valign="top">Year</td>
    3460      <td valign="top">2011</td>
    3461 </tr>
    3462 
    3463 <tr>
    3464      <td valign="top">Abstract</td>
    3465      <td valign="top">An analysis of requesting resources from large-scale networks reveals a fundamental challenge. As the network grows, more and more resources become available, and so finding resources that fit experimental test criteria becomes difficult and time consuming. For example, the National Science Foundation sponsors GENI--an experimental network with a goal to gain enough resources to model the Internet at scale. Currently, GENI contains relatively few contributed resources donated from businesses and academia, and so matching resources to tests is rather simple. However, experimenters plan to conduct network experiments that are very complex and difficult to accurately model by using the vast numbers of resources expected in GENI. When GENI reaches its final state, finding the right resources that fit experimental test criteria out of many thousands of donated resources may be as difficult as conducting the experiment itself. This dilemma underscores the importance of establishing an attribute description service that promotes a standardized language for all interactions between the end users and the large-scale network.</td>
    3466 </tr>
    3467 
    3468 
    3469 
    3470 <tr>
    3471      <td valign="top">DOI</td>
    3472      <td valign="top">10.1007/978-3-642-21753-1&#x005F;58</td>
    3473 </tr>
    3474 
    3475 
    3476 
    3477 <tr>
    3478      <td valign="top">URL</td>
    3479      <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=2021672.2021735">http://portal.acm.org/citation.cfm?id=2021672.2021735</a></td>
    3480 </tr>
    3481 
    3482 
    3483 </table></div><br><br>
    3484 
    3485 
    3486 
    3487 
    3488 <a class="EntryGoto" id="Krishnappa, D. K. and Irwin, D. and Lyons, E. and Zink, M."></a>
    3489 <b class="myheading" style="position: relative; left: 5%;">Krishnappa, D. K. and Irwin, D. and Lyons, E. and Zink, M.</b>
    3490 
    3491 <div class="BibEntry">
    3492 
    3493 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3494 
    3495 
    3496 <tr>
    3497      <td valign="top">Author</td>
    3498      <td valign="top">Krishnappa, D. K. and Irwin, D. and Lyons, E. and Zink, M.</td>
    3499 </tr>
    3500 
    3501 <tr>
    3502      <td valign="top">Title</td>
    3503      <td valign="top">CloudCast: Cloud Computing for Short-Term Weather Forecasts</td>
    3504 </tr>
    3505 
    3506 <tr>
    3507      <td valign="top">Journal</td>
    3508      <td valign="top">Computing in Science &#x0026; Engineering</td>
    3509 </tr>
    3510 
    3511 <tr>
    3512      <td valign="top">Publisher</td>
    3513      <td valign="top">IEEE</td>
    3514 </tr>
    3515 
    3516 <tr>
    3517      <td valign="top">Year</td>
    3518      <td valign="top">2013</td>
    3519 </tr>
    3520 
    3521 <tr>
    3522      <td valign="top">Abstract</td>
    3523      <td valign="top">CloudCast provides personalized short-term weather forecasts to clients based on their current location using cloud services, generating accurate forecasts tens of minutes in the future for small areas. Results show that it takes less than two minutes from the start of data sampling to deliver a 15-minute forecast to a client.</td>
    3524 </tr>
    3525 
    3526 
    3527 
    3528 <tr>
    3529      <td valign="top">DOI</td>
    3530      <td valign="top">10.1109/mcse.2013.43</td>
    3531 </tr>
    3532 
    3533 
    3534 
    3535 <tr>
    3536      <td valign="top">URL</td>
    3537      <td valign="top"><a href="http://dx.doi.org/10.1109/mcse.2013.43">http://dx.doi.org/10.1109/mcse.2013.43</a></td>
    3538 </tr>
    3539 
    3540 
    3541 </table></div><br><br>
    3542 
    3543 
    3544 
    3545 
    3546 <a class="EntryGoto" id="Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael"></a>
    3547 <b class="myheading" style="position: relative; left: 5%;">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
    3548 
    3549 <div class="BibEntry">
    3550 
    3551 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3552 
    3553 
    3554 <tr>
    3555      <td valign="top">Author</td>
    3556      <td valign="top">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</td>
    3557 </tr>
    3558 
    3559 <tr>
    3560      <td valign="top">Title</td>
    3561      <td valign="top">Performance of GENI Cloud Testbeds for Real Time Scientific Application</td>
    3562 </tr>
    3563 
    3564 <tr>
    3565      <td valign="top">Booktitle</td>
    3566      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    3567 </tr>
    3568 
    3569 <tr>
    3570      <td valign="top">Location</td>
    3571      <td valign="top">Los Angeles</td>
    3572 </tr>
    3573 
    3574 <tr>
    3575      <td valign="top">Year</td>
    3576      <td valign="top">2012</td>
    3577 </tr>
    3578 
    3579 <tr>
    3580      <td valign="top">Abstract</td>
    3581      <td valign="top">Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform.</td>
    3582 </tr>
    3583 
    3584 
    3585 
    3586 
    3587 
    3588 
    3589 </table></div><br><br>
    3590 
    3591 
    3592 <div class="BibEntry">
    3593 
    3594 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3595 
    3596 
    3597 <tr>
    3598      <td valign="top">Author</td>
    3599      <td valign="top">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</td>
    3600 </tr>
    3601 
    3602 <tr>
    3603      <td valign="top">Title</td>
    3604      <td valign="top">Performance of GENI Cloud Testbeds for Real Time Scientific Application</td>
    3605 </tr>
    3606 
    3607 <tr>
    3608      <td valign="top">Booktitle</td>
    3609      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    3610 </tr>
    3611 
    3612 <tr>
    3613      <td valign="top">Location</td>
    3614      <td valign="top">Los Angeles</td>
    3615 </tr>
    3616 
    3617 <tr>
    3618      <td valign="top">Year</td>
    3619      <td valign="top">2012</td>
    3620 </tr>
    3621 
    3622 <tr>
    3623      <td valign="top">Abstract</td>
    3624      <td valign="top">Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform.</td>
    3625 </tr>
    3626 
    3627 
    3628 
    3629 
    3630 
    3631 
    3632 </table></div><br><br>
    3633 
    3634 
    3635 
    3636 
    3637 <a class="EntryGoto" id="Lee, Jae W."></a>
    3638 <b class="myheading" style="position: relative; left: 5%;">Lee, Jae W.</b>
    3639 
    3640 <div class="BibEntry">
    3641 
    3642 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3643 
    3644 
    3645 <tr>
    3646      <td valign="top">Author</td>
    3647      <td valign="top">Lee, Jae W.</td>
    3648 </tr>
    3649 
    3650 <tr>
    3651      <td valign="top">Title</td>
    3652      <td valign="top">Towards a Common System Architecture for Dynamically Deploying Network Services in Routers and End Hosts</td>
    3653 </tr>
    3654 
    3655 <tr>
    3656      <td valign="top">Year</td>
    3657      <td valign="top">2012</td>
    3658 </tr>
    3659 
    3660 <tr>
    3661      <td valign="top">Abstract</td>
    3662      <td valign="top">The architectural simplicity of the core Internet is a double-edged sword. On the one hand, its agnostic nature paved the way for endless innovations of end-to-end applications. On the other hand, the inherent limitation of this simplicity makes it difficult to add new functions to the network core itself. This is exacerbated by the conservative tendency of commercial entities to &#x6c;&#x0308;eave well-enough alone&#x2c;&#x0308; leading to the current situation often referred to as the ossification of the Internet. For decades, there has been practically no new functionality that has been added to the core Internet on a large scale. This thesis explores the possibility of enabling in-network services towards the goal of overcoming the ossification of the Internet. Our ultimate goal is to provide a common run-time environment supported by all Internet nodes and a wide-area deployment mechanism, so that network services can be freely installed, removed, and migrated among Internet nodes of all kinds–from a backbone router to a set-top box at home. In that vision of a future Internet, there is little difference between servers and routers for the purpose of running network services. Services can run anywhere on the Internet. Application service providers will have the freedom to choose the best place to run their code. This thesis presents NetServ, our first step to realize the vision of network services running anywhere on the Internet. NetServ is a node architecture for dynamically deploying in-network services on edge routers. Network functions and applications are implemented as software modules which can be deployed at any NetServ-enabled node on the Internet, subject to policy restrictions. The NetServ framework provides a common execution environment for service modules and the ability to dynamically install and remove the services without restarting the nodes. There are many challenges in designing such a system. The main contribution of this thesis lies in meeting those challenges. First, we recognize that the primary impetus for adopting new technologies is economics. To address the challenge of providing economic incentives for enabling in-network services, we demonstrate how NetServ can facilitate an economic alliance between content providers and ISPs. Using NetServ, content providers and the ISPs operating at the network edge (aka eyeball ISPs) can enter into a mutually beneficial economic relationship. ISPs make their NetServ-enabled edge routers available for hosting content providers' applications and contents. Content providers can operate closer to end users by deploying code modules on NetServ-enabled edge routers. We make our case by presenting NetServ applications which represent four concrete use cases. Second, our node architecture must support both traditional server applications and in-network packet processing applications since content providers' applications running on ISPs' routers will combine the traits of both. To address this challenge, NetServ framework can host a packet processing module that sits in the data path, a server module that uses the TCP/IP stack in the traditional way, or a combined module that does both. NetServ provides a unified runtime environment between routers and servers, taking us a step closer to the vision of the unified runtime available on all Internet nodes. Third, we must provide a fast and streamlined deployment mechanism. Content providers should be able to deploy their applications at any NetServ-enabled edge router on the Inter- net, given that they have proper authorizations. Moreover, in some application scenarios, content providers may not know the exact locations of the target routers. Content providers need a way to send a message to install or remove an application module towards a network destination, and have the NetServ-enabled routers located in the path catch and act on the message. To address this challenge, we adopted on-path signaling as the deployment mechanism for NetServ. A NetServ signaling message is sent in an IP packet towards a destination. The packet gets forwarded by IP routers as usual, but when it transits a NetServ-enabled router, the message gets intercepted and passed to the NetServ control layer. Fourth, a NetServ-enabled router must support the concurrent executions of multiple without restarting the nodes. There are many challenges in designing such a system. The main contribution of this thesis lies in meeting those challenges. First, we recognize that the primary impetus for adopting new technologies is economics. To address the challenge of providing economic incentives for enabling in-network services, we demonstrate how NetServ can facilitate an economic alliance between content providers and ISPs. Using NetServ, content providers and the ISPs operating at the network edge (aka eyeball ISPs) can enter into a mutually beneficial economic relationship. ISPs make their NetServ-enabled edge routers available for hosting content providers' applications and contents. Content providers can operate closer to end users by deploying code modules on NetServ-enabled edge routers. We make our case by presenting NetServ applications which represent four concrete use cases. Second, our node architecture must support both traditional server applications and in-network packet processing applications since content providers' applications running on ISPs' routers will combine the traits of both. To address this challenge, NetServ framework can host a packet processing module that sits in the data path, a server module that uses the TCP/IP stack in the traditional way, or a combined module that does both. NetServ provides a unified runtime environment between routers and servers, taking us a step closer to the vision of the unified runtime available on all Internet nodes. Third, we must provide a fast and streamlined deployment mechanism. Content providers should be able to deploy their applications at any NetServ-enabled edge router on the Internet, given that they have proper authorizations. Moreover, in some application scenarios, content providers may not know the exact locations of the target routers. Content providers need a way to send a message to install or remove an application module towards a network destination, and have the NetServ-enabled routers located in the path catch and act on the message. To address this challenge, we adopted on-path signaling as the deployment mechanism for NetServ. A NetServ signaling message is sent in an IP packet towards a destination. The packet gets forwarded by IP routers as usual, but when it transits a NetServ-enabled router, the message gets intercepted and passed to the NetServ control layer. Fourth, a NetServ-enabled router must support the concurrent executions of multiple content providers' applications. Each content provider's execution environment must be isolated from one another, and the resource usage of each must be controlled. To address the challenge of providing a robust multi-user execution environment, we chose to run NetServ modules in user space. This is in stark contrast to most programmable routers, which run service modules in kernel space for fast packet processing. Furthermore, NetServ modules are written in Java and run in Java Virtual Machines (JVMs). Our choice of user space execution and JVM allows us to leverage the decades of technology advances in operating systems, virtualization, and Java. Lastly, in order to host the services of a large number of content providers, NetServ must be able to scale beyond the single-box architecture. We address this challenge with the multi-box lateral expansion of NetServ using the OpenFlow forwarding engine. In this extended architecture, multiple NetServ nodes are attached to an OpenFlow switch, which provides a physically separate forwarding plane. The scalability of user services is no longer limited to a single NetServ box. Additionally, this thesis presents our prior work on improving service discovery in local and global networks. The service discovery work makes indirect contribution because the limitations of local and overlay networks encountered during those studies eventually led us to investigate in-network services, which resulted in NetServ. Specifically, we investigate the issues involved in bootstrapping large-scale structured overlay networks, present a tool to merge service announcements from multiple local networks, and propose an enhancement to structured overlay networks using link-local multicast.</td>
    3663 </tr>
    3664 
    3665 
    3666 
    3667 
    3668 
    3669 <tr>
    3670      <td valign="top">URL</td>
    3671      <td valign="top"><a href="http://academiccommons.columbia.edu/download/fedora&#x005F;content/download/ac:147210/CONTENT/Lee&#x005F;columbia&#x005F;0054D&#x005F;10773.pdf">http://academiccommons.columbia.edu/download/fedora&#x005F;content/download/ac:147210/CONTENT/Lee&#x005F;columbia&#x005F;0054D&#x005F;10773.pdf</a></td>
    3672 </tr>
    3673 
    3674 
    3675 </table></div><br><br>
    3676 
    3677 
    3678 
    3679 
    3680 <a class="EntryGoto" id="Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang"></a>
    3681 <b class="myheading" style="position: relative; left: 5%;">Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang</b>
    3682 
    3683 <div class="BibEntry">
    3684 
    3685 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3686 
    3687 
    3688 <tr>
    3689      <td valign="top">Author</td>
    3690      <td valign="top">Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang</td>
    3691 </tr>
    3692 
    3693 <tr>
    3694      <td valign="top">Title</td>
    3695      <td valign="top">NetServ: Active Networking 2.0</td>
    3696 </tr>
    3697 
    3698 <tr>
    3699      <td valign="top">Booktitle</td>
    3700      <td valign="top">2011 IEEE International Conference on Communications Workshops (ICC)</td>
    3701 </tr>
    3702 
    3703 <tr>
    3704      <td valign="top">Location</td>
    3705      <td valign="top">Kyoto, Japan</td>
    3706 </tr>
    3707 
    3708 <tr>
    3709      <td valign="top">Publisher</td>
    3710      <td valign="top">IEEE</td>
    3711 </tr>
    3712 
    3713 <tr>
    3714      <td valign="top">Year</td>
    3715      <td valign="top">2011</td>
    3716 </tr>
    3717 
    3718 <tr>
    3719      <td valign="top">Abstract</td>
    3720      <td valign="top">We present NetServ, a node architecture for deploying in-network services in the next generation Internet. NetServ-enabled network nodes provide a common execution environment, where network services implemented as modules can be dynamically installed and removed. We demonstrate three such modules. MicroCDN is a dynamic content distribution network (CDN) service which implements a content caching strategy specific to a content provider. The NAT Keep-alive module offloads the processing of keep-alive messages from SIP servers. The Media Relay module allows any NetServ node to act as a media relay, eliminating the need to manage standalone relay servers. NetServ aims to revive the Active Networking vision. It was too far ahead of its time a decade ago, but we believe its time has finally arrived.</td>
    3721 </tr>
    3722 
    3723 
    3724 
    3725 <tr>
    3726      <td valign="top">DOI</td>
    3727      <td valign="top">10.1109/iccw.2011.5963554</td>
    3728 </tr>
    3729 
    3730 
    3731 
    3732 <tr>
    3733      <td valign="top">URL</td>
    3734      <td valign="top"><a href="http://dx.doi.org/10.1109/iccw.2011.5963554">http://dx.doi.org/10.1109/iccw.2011.5963554</a></td>
    3735 </tr>
    3736 
    3737 
    3738 </table></div><br><br>
    3739 
    3740 
    3741 
    3742 
    3743 <a class="EntryGoto" id="Lee, Ki S. and Wang, Han and Weatherspoon, Hakim"></a>
    3744 <b class="myheading" style="position: relative; left: 5%;">Lee, Ki S. and Wang, Han and Weatherspoon, Hakim</b>
    3745 
    3746 <div class="BibEntry">
    3747 
    3748 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3749 
    3750 
    3751 <tr>
    3752      <td valign="top">Author</td>
    3753      <td valign="top">Lee, Ki S. and Wang, Han and Weatherspoon, Hakim</td>
    3754 </tr>
    3755 
    3756 <tr>
    3757      <td valign="top">Title</td>
    3758      <td valign="top">SoNIC: precise realtime software access and control of wired networks</td>
    3759 </tr>
    3760 
    3761 <tr>
    3762      <td valign="top">Booktitle</td>
    3763      <td valign="top">Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation</td>
    3764 </tr>
    3765 
    3766 <tr>
    3767      <td valign="top">Location</td>
    3768      <td valign="top">Lombard, IL</td>
    3769 </tr>
    3770 
    3771 <tr>
    3772      <td valign="top">Publisher</td>
    3773      <td valign="top">USENIX Association</td>
    3774 </tr>
    3775 
    3776 <tr>
    3777      <td valign="top">Address</td>
    3778      <td valign="top">Berkeley, CA, USA</td>
    3779 </tr>
    3780 
    3781 <tr>
    3782      <td valign="top">Year</td>
    3783      <td valign="top">2013</td>
    3784 </tr>
    3785 
    3786 
    3787 
    3788 
    3789 
    3790 <tr>
    3791      <td valign="top">URL</td>
    3792      <td valign="top"><a href="http://dl.acm.org/citation.cfm?id=2482626.2482648">http://dl.acm.org/citation.cfm?id=2482626.2482648</a></td>
    3793 </tr>
    3794 
    3795 
    3796 </table></div><br><br>
    3797 
    3798 
    3799 
    3800 
    3801 <a class="EntryGoto" id="Li, Dawei and Hong, Xiaoyan"></a>
    3802 <b class="myheading" style="position: relative; left: 5%;">Li, Dawei and Hong, Xiaoyan</b>
    3803 
    3804 <div class="BibEntry">
    3805 
    3806 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3807 
    3808 
    3809 <tr>
    3810      <td valign="top">Author</td>
    3811      <td valign="top">Li, Dawei and Hong, Xiaoyan</td>
    3812 </tr>
    3813 
    3814 <tr>
    3815      <td valign="top">Title</td>
    3816      <td valign="top">Practical exploitation on system vulnerability of ProtoGENI</td>
    3817 </tr>
    3818 
    3819 <tr>
    3820      <td valign="top">Booktitle</td>
    3821      <td valign="top">Proceedings of the 49th Annual Southeast Regional Conference</td>
    3822 </tr>
    3823 
    3824 <tr>
    3825      <td valign="top">Location</td>
    3826      <td valign="top">Kennesaw, Georgia</td>
    3827 </tr>
    3828 
    3829 <tr>
    3830      <td valign="top">Publisher</td>
    3831      <td valign="top">ACM</td>
    3832 </tr>
    3833 
    3834 <tr>
    3835      <td valign="top">Address</td>
    3836      <td valign="top">New York, NY, USA</td>
    3837 </tr>
    3838 
    3839 <tr>
    3840      <td valign="top">Year</td>
    3841      <td valign="top">2011</td>
    3842 </tr>
    3843 
    3844 <tr>
    3845      <td valign="top">Abstract</td>
    3846      <td valign="top">Global Environment for Network Innovations (GENI) is a unique virtual laboratory for at-scale networking experimentation exploring future Internets. The successful development of GENI has to consider security problems from the design and prototyping stages. However, in many cases, system vulnerability cannot be found unless through real experimentation bearing purposeful and meaningful designs. In this paper, we introduce some of our efforts in exploring the security vulnerabilities in ProtoGENI, a prototype implementation and deployment of GENI. Our results show potential breach on security of GENI in terms of availability. We make suggestions on potential defense strategies in order to improve the ProtoGENI security and its development.</td>
    3847 </tr>
    3848 
    3849 
    3850 
    3851 <tr>
    3852      <td valign="top">DOI</td>
    3853      <td valign="top">10.1145/2016039.2016073</td>
    3854 </tr>
    3855 
    3856 
    3857 
    3858 <tr>
    3859      <td valign="top">URL</td>
    3860      <td valign="top"><a href="http://dx.doi.org/10.1145/2016039.2016073">http://dx.doi.org/10.1145/2016039.2016073</a></td>
    3861 </tr>
    3862 
    3863 
    3864 </table></div><br><br>
    3865 
    3866 
    3867 
    3868 
    3869 <a class="EntryGoto" id="Li, Dawei and Hong, Xiaoyan and Bowman, Jason"></a>
    3870 <b class="myheading" style="position: relative; left: 5%;">Li, Dawei and Hong, Xiaoyan and Bowman, Jason</b>
    3871 
    3872 <div class="BibEntry">
    3873 
    3874 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3875 
    3876 
    3877 <tr>
    3878      <td valign="top">Author</td>
    3879      <td valign="top">Li, Dawei and Hong, Xiaoyan and Bowman, Jason</td>
    3880 </tr>
    3881 
    3882 <tr>
    3883      <td valign="top">Title</td>
    3884      <td valign="top">Evaluation of Security Vulnerabilities by Using ProtoGENI as a Launchpad</td>
    3885 </tr>
    3886 
    3887 <tr>
    3888      <td valign="top">Booktitle</td>
    3889      <td valign="top">IEEE Global Communications Conference (GLOBECOM 2011)</td>
    3890 </tr>
    3891 
    3892 <tr>
    3893      <td valign="top">Year</td>
    3894      <td valign="top">2011</td>
    3895 </tr>
    3896 
    3897 <tr>
    3898      <td valign="top">Abstract</td>
    3899      <td valign="top">In this paper we analyze the security architecture of ProtoGENI. ProtoGENI is a prototype control framework implementation of GENI (Global Environment for Network Innovations). We perform a variety of experiments in an effort to identify potential vulnerabilities presented in the current implementation. We classify our attacks into three types: data plane to data plane, data plane to control plane, and data plane to Internet. Our results indicate the potential for a breach of confidentiality and availability internally within ProtoGENI, as well as risks to external Internet. We make suggestions outlining possible defense strategies to improve ProtoGENI security and aid in future development</td>
    3900 </tr>
    3901 
    3902 
    3903 
    3904 
    3905 
    3906 <tr>
    3907      <td valign="top">URL</td>
    3908      <td valign="top"><a href="ftp://202.38.75.7/pub/&#x0025;D0&#x0025;C2&#x0025;CE&#x0025;C4&#x0025;BC&#x0025;FE&#x0025;BC&#x0025;D0&#x0025;20(2)/DATA/PID1102190.PDF">ftp://202.38.75.7/pub/&#x0025;D0&#x0025;C2&#x0025;CE&#x0025;C4&#x0025;BC&#x0025;FE&#x0025;BC&#x0025;D0&#x0025;20(2)/DATA/PID1102190.PDF</a></td>
    3909 </tr>
    3910 
    3911 
    3912 </table></div><br><br>
    3913 
    3914 
    3915 
    3916 
    3917 <a class="EntryGoto" id="Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason"></a>
    3918 <b class="myheading" style="position: relative; left: 5%;">Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason</b>
    3919 
    3920 <div class="BibEntry">
    3921 
    3922 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3923 
    3924 
    3925 <tr>
    3926      <td valign="top">Author</td>
    3927      <td valign="top">Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason</td>
    3928 </tr>
    3929 
    3930 <tr>
    3931      <td valign="top">Title</td>
    3932      <td valign="top">Simulation studies of OpenFlow-based in-network caching strategies</td>
    3933 </tr>
    3934 
    3935 <tr>
    3936      <td valign="top">Booktitle</td>
    3937      <td valign="top">Proceedings of the 15th Communications and Networking Simulation Symposium</td>
    3938 </tr>
    3939 
    3940 <tr>
    3941      <td valign="top">Location</td>
    3942      <td valign="top">Orlando, Florida</td>
    3943 </tr>
    3944 
    3945 <tr>
    3946      <td valign="top">Publisher</td>
    3947      <td valign="top">Society for Computer Simulation International</td>
    3948 </tr>
    3949 
    3950 <tr>
    3951      <td valign="top">Address</td>
    3952      <td valign="top">San Diego, CA, USA</td>
    3953 </tr>
    3954 
    3955 <tr>
    3956      <td valign="top">Year</td>
    3957      <td valign="top">2012</td>
    3958 </tr>
    3959 
    3960 <tr>
    3961      <td valign="top">Abstract</td>
    3962      <td valign="top">We propose an in-network caching architecture using Open-Flow to coordinate caching decisions in the network. Our scheme, called CacheFlow, extends the cache-and-forward concept by moving contents closer to the clients hop-by-hop using TCP for sending requests and retrieving contents. As such, CacheFlow can be incrementally implemented and deployed in the real network. In this paper, we present a simulation study of several caching policies, including a random cache policy, a statically optimal cache placement policy and a new disk placement strategy that places popular contents at the &#x63;&#x0308;enter&#x20;&#x0308;of the network. Experimental results show that simple in-network caching policies can be realized using today's technology to improve network performance.</td>
    3963 </tr>
    3964 
    3965 
    3966 
    3967 
    3968 
    3969 <tr>
    3970      <td valign="top">URL</td>
    3971      <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=2331762.2331774">http://portal.acm.org/citation.cfm?id=2331762.2331774</a></td>
    3972 </tr>
    3973 
    3974 
    3975 </table></div><br><br>
    3976 
    3977 
    3978 
    3979 
    3980 <a class="EntryGoto" id="Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross"></a>
    3981 <b class="myheading" style="position: relative; left: 5%;">Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</b>
    3982 
    3983 <div class="BibEntry">
    3984 
    3985 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3986 
    3987 
    3988 <tr>
    3989      <td valign="top">Author</td>
    3990      <td valign="top">Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</td>
    3991 </tr>
    3992 
    3993 <tr>
    3994      <td valign="top">Title</td>
    3995      <td valign="top">Work-in-Progress: Empirical Verification of A Subset Sum Hypothesis in GENI Cloud</td>
    3996 </tr>
    3997 
    3998 <tr>
    3999      <td valign="top">Booktitle</td>
    4000      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    4001 </tr>
    4002 
    4003 <tr>
    4004      <td valign="top">Location</td>
    4005      <td valign="top">Los Angeles</td>
    4006 </tr>
    4007 
    4008 <tr>
    4009      <td valign="top">Year</td>
    4010      <td valign="top">2012</td>
    4011 </tr>
    4012 
    4013 
    4014 
    4015 
    4016 
    4017 
    4018 </table></div><br><br>
    4019 
    4020 
    4021 <div class="BibEntry">
    4022 
    4023 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4024 
    4025 
    4026 <tr>
    4027      <td valign="top">Author</td>
    4028      <td valign="top">Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</td>
    4029 </tr>
    4030 
    4031 <tr>
    4032      <td valign="top">Title</td>
    4033      <td valign="top">Work-in-Progress: Empirical Verification of A Subset Sum Hypothesis in GENI Cloud</td>
    4034 </tr>
    4035 
    4036 <tr>
    4037      <td valign="top">Booktitle</td>
    4038      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    4039 </tr>
    4040 
    4041 <tr>
    4042      <td valign="top">Location</td>
    4043      <td valign="top">Los Angeles</td>
    4044 </tr>
    4045 
    4046 <tr>
    4047      <td valign="top">Year</td>
    4048      <td valign="top">2012</td>
    4049 </tr>
    4050 
    4051 
    4052 
    4053 
    4054 
    4055 
    4056 </table></div><br><br>
    4057 
    4058 
    4059 
    4060 
    4061 <a class="EntryGoto" id="Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi"></a>
    4062 <b class="myheading" style="position: relative; left: 5%;">Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</b>
    4063 
    4064 <div class="BibEntry">
    4065 
    4066 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4067 
    4068 
    4069 <tr>
    4070      <td valign="top">Author</td>
    4071      <td valign="top">Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</td>
    4072 </tr>
    4073 
    4074 <tr>
    4075      <td valign="top">Title</td>
    4076      <td valign="top">Assessment of Router Vulnerabilities on PlanetLab Infrastructure for Secure Cloud Computing</td>
    4077 </tr>
    4078 
    4079 <tr>
    4080      <td valign="top">Booktitle</td>
    4081      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    4082 </tr>
    4083 
    4084 <tr>
    4085      <td valign="top">Location</td>
    4086      <td valign="top">Los Angeles</td>
    4087 </tr>
    4088 
    4089 <tr>
    4090      <td valign="top">Year</td>
    4091      <td valign="top">2012</td>
    4092 </tr>
    4093 
    4094 <tr>
    4095      <td valign="top">Abstract</td>
    4096      <td valign="top">In recent times, the cloud computing based delivery model has been proven to reduce enterprise IT costs and complexities. In contrast to traditional enterprise IT solutions, the cloud computing model moves the application software and data to remote servers in large datacenters, which raises many security challenges. One of the critical challenges is the inability to characterize the impact of the vulnerabilities of routers on the cloud security and performance guarantees. In this paper, we analyze the degree of security provided by routers to data sharing applications deployed in cloud environments that span administrative and network domains. Our analysis is based on examining the security level of network applications on routers which lie between nodes on Planetlab infrastructure. We assume that some of the PlanetLab nodes will share the same wide area network path as the cloud servers. Our preliminary results confirm that the majority of the routers are plagued by insecure network protocols, leading to vulnerable routers. These results confirm our hypothesis that the security of the network infrastructure needs to be upgraded to assure the protection of information exchanged on the wide area network path.</td>
    4097 </tr>
    4098 
    4099 
    4100 
    4101 
    4102 
    4103 
    4104 </table></div><br><br>
    4105 
    4106 
    4107 <div class="BibEntry">
    4108 
    4109 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4110 
    4111 
    4112 <tr>
    4113      <td valign="top">Author</td>
    4114      <td valign="top">Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</td>
    4115 </tr>
    4116 
    4117 <tr>
    4118      <td valign="top">Title</td>
    4119      <td valign="top">Assessment of Router Vulnerabilities on PlanetLab Infrastructure for Secure Cloud Computing</td>
    4120 </tr>
    4121 
    4122 <tr>
    4123      <td valign="top">Booktitle</td>
    4124      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    4125 </tr>
    4126 
    4127 <tr>
    4128      <td valign="top">Location</td>
    4129      <td valign="top">Los Angeles</td>
    4130 </tr>
    4131 
    4132 <tr>
    4133      <td valign="top">Year</td>
    4134      <td valign="top">2012</td>
    4135 </tr>
    4136 
    4137 <tr>
    4138      <td valign="top">Abstract</td>
    4139      <td valign="top">In recent times, the cloud computing based delivery model has been proven to reduce enterprise IT costs and complexities. In contrast to traditional enterprise IT solutions, the cloud computing model moves the application software and data to remote servers in large datacenters, which raises many security challenges. One of the critical challenges is the inability to characterize the impact of the vulnerabilities of routers on the cloud security and performance guarantees. In this paper, we analyze the degree of security provided by routers to data sharing applications deployed in cloud environments that span administrative and network domains. Our analysis is based on examining the security level of network applications on routers which lie between nodes on Planetlab infrastructure. We assume that some of the PlanetLab nodes will share the same wide area network path as the cloud servers. Our preliminary results confirm that the majority of the routers are plagued by insecure network protocols, leading to vulnerable routers. These results confirm our hypothesis that the security of the network infrastructure needs to be upgraded to assure the protection of information exchanged on the wide area network path.</td>
    4140 </tr>
    4141 
    4142 
    4143 
    4144 
    4145 
    4146 
    4147 </table></div><br><br>
    4148 
    4149 
    4150 
    4151 
    4152 <a class="EntryGoto" id="Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H."></a>
    4153 <b class="myheading" style="position: relative; left: 5%;">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</b>
    4154 
    4155 <div class="BibEntry">
    4156 
    4157 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4158 
    4159 
    4160 <tr>
    4161      <td valign="top">Author</td>
    4162      <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td>
    4163 </tr>
    4164 
    4165 <tr>
    4166      <td valign="top">Title</td>
    4167      <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td>
    4168 </tr>
    4169 
    4170 <tr>
    4171      <td valign="top">Booktitle</td>
    4172      <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td>
    4173 </tr>
    4174 
    4175 <tr>
    4176      <td valign="top">Year</td>
    4177      <td valign="top">2012</td>
    4178 </tr>
    4179 
    4180 
    4181 
    4182 <tr>
    4183      <td valign="top">DOI</td>
    4184      <td valign="top">10.1109/NOMS.2012.6211961</td>
    4185 </tr>
    4186 
    4187 
    4188 
    4189 <tr>
    4190      <td valign="top">URL</td>
    4191      <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td>
    4192 </tr>
    4193 
    4194 
    4195 </table></div><br><br>
    4196 
    4197 
    4198 <div class="BibEntry">
    4199 
    4200 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4201 
    4202 
    4203 <tr>
    4204      <td valign="top">Author</td>
    4205      <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td>
    4206 </tr>
    4207 
    4208 <tr>
    4209      <td valign="top">Title</td>
    4210      <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td>
    4211 </tr>
    4212 
    4213 <tr>
    4214      <td valign="top">Booktitle</td>
    4215      <td valign="top">2012 IEEE Network Operations and Management Symposium</td>
    4216 </tr>
    4217 
    4218 <tr>
    4219      <td valign="top">Location</td>
    4220      <td valign="top">Maui, HI</td>
    4221 </tr>
    4222 
    4223 <tr>
    4224      <td valign="top">Publisher</td>
    4225      <td valign="top">IEEE</td>
    4226 </tr>
    4227 
    4228 <tr>
    4229      <td valign="top">Year</td>
    4230      <td valign="top">2012</td>
    4231 </tr>
    4232 
    4233 <tr>
    4234      <td valign="top">Abstract</td>
    4235      <td valign="top">Autonomic management capabilities of the Future Internet can be provided through a recently proposed service architecture called NetServ. It consists of the interconnection of programmable nodes which enable dynamic deployment and execution of network and application services. This paper shows how this architecture can be further improved by introducing the OpenFlow architecture and implementing the OpenFlow controller as a NetServ service, thus improving both the NetServ management performance and its flexibility. These achievements are demonstrated experimentally on the GENI environment, showing the platform self-protecting capabilities in case of a SIP DoS attack.</td>
    4236 </tr>
    4237 
    4238 
    4239 
    4240 <tr>
    4241      <td valign="top">DOI</td>
    4242      <td valign="top">10.1109/NOMS.2012.6211961</td>
    4243 </tr>
    4244 
    4245 
    4246 
    4247 <tr>
    4248      <td valign="top">URL</td>
    4249      <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td>
    4250 </tr>
    4251 
    4252 
    4253 </table></div><br><br>
    4254 
    4255 
    4256 
    4257 
    4258 <a class="EntryGoto" id="Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y."></a>
    4259 <b class="myheading" style="position: relative; left: 5%;">Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y.</b>
    4260 
    4261 <div class="BibEntry">
    4262 
    4263 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4264 
    4265 
    4266 <tr>
    4267      <td valign="top">Author</td>
    4268      <td valign="top">Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y.</td>
    4269 </tr>
    4270 
    4271 <tr>
    4272      <td valign="top">Title</td>
    4273      <td valign="top">Space Versus Time Separation for Wireless Virtualization on an Indoor Grid</td>
    4274 </tr>
    4275 
    4276 <tr>
    4277      <td valign="top">Booktitle</td>
    4278      <td valign="top">Next Generation Internet Networks, 2008. NGI 2008</td>
    4279 </tr>
    4280 
    4281 <tr>
    4282      <td valign="top">Publisher</td>
    4283      <td valign="top">IEEE</td>
    4284 </tr>
    4285 
    4286 <tr>
    4287      <td valign="top">Year</td>
    4288      <td valign="top">2008</td>
    4289 </tr>
    4290 
    4291 <tr>
    4292      <td valign="top">Abstract</td>
    4293      <td valign="top">The decreasing cost of wireless hardware and ever increasing number of wireless testbeds has led to a shift in the protocol evaluation paradigm from simulations towards emulation. In addition, with a large number of users demanding experimental resources and lack of space and time for deploying more hardware, fair resource sharing among independent co-existing experiments is important. We study the proposed approaches to wireless virtualization with a focus on schemes conserving wireless channels rather than nodes. Our detailed comparison reveals that while experiments sharing a channel by space separation achieve better efficiency than those relying on time separation of a channel, the isolation between experiments in both cases is comparable. We propose and implement a policy manager to alleviate the isolation problem and suggest scenarios in which either of the schemes would provide a suitable virtualization solution.</td>
    4294 </tr>
    4295 
    4296 
    4297 
    4298 <tr>
    4299      <td valign="top">DOI</td>
    4300      <td valign="top">10.1109/NGI.2008.36</td>
    4301 </tr>
    4302 
    4303 
    4304 
    4305 <tr>
    4306      <td valign="top">URL</td>
    4307      <td valign="top"><a href="http://dx.doi.org/10.1109/NGI.2008.36">http://dx.doi.org/10.1109/NGI.2008.36</a></td>
    4308 </tr>
    4309 
    4310 
    4311 </table></div><br><br>
    4312 
    4313 
    4314 
    4315 
    4316 <a class="EntryGoto" id="Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D."></a>
    4317 <b class="myheading" style="position: relative; left: 5%;">Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D.</b>
    4318 
    4319 <div class="BibEntry">
    4320 
    4321 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4322 
    4323 
    4324 <tr>
    4325      <td valign="top">Author</td>
    4326      <td valign="top">Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D.</td>
    4327 </tr>
    4328 
    4329 <tr>
    4330      <td valign="top">Title</td>
    4331      <td valign="top">Integration of heterogeneous networking testbeds</td>
    4332 </tr>
    4333 
    4334 <tr>
    4335      <td valign="top">Booktitle</td>
    4336      <td valign="top">Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks &#x0026; communities</td>
    4337 </tr>
    4338 
    4339 <tr>
    4340      <td valign="top">Location</td>
    4341      <td valign="top">Innsbruck, Austria</td>
    4342 </tr>
    4343 
    4344 <tr>
    4345      <td valign="top">Publisher</td>
    4346      <td valign="top">ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)</td>
    4347 </tr>
    4348 
    4349 <tr>
    4350      <td valign="top">Address</td>
    4351      <td valign="top">ICST, Brussels, Belgium, Belgium</td>
    4352 </tr>
    4353 
    4354 <tr>
    4355      <td valign="top">Year</td>
    4356      <td valign="top">2008</td>
    4357 </tr>
    4358 
    4359 <tr>
    4360      <td valign="top">Abstract</td>
    4361      <td valign="top">As networking research expands into new frontiers, the research community has felt a need for a heterogeneous networking research infrastructure to experiment with the interaction and integration of different types of networks, and to test the performance of various networking protocols in realistic environments. This requirement has led to the Global Environment for Network Innovations (GENI) initiative to create a global infrastructure for conducting networking experiments across diverse substrates such as wired (local and wide-area), wireless, sensor and cellular networks. In this paper, we discuss and present two models for building such an experimental infrastructure. The first model enables a wired testbed to link with wireless edge nodes during an experiment, whereas the second model enables a wireless testbed to link to wired testbeds. Proof-of-concept experiments are also presented reinforcing the usefulness of the models in terms of facilitating experiments over the integrated heterogeneous infrastructure.</td>
    4362 </tr>
    4363 
    4364 
    4365 
    4366 
    4367 
    4368 <tr>
    4369      <td valign="top">URL</td>
    4370      <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=1390609">http://portal.acm.org/citation.cfm?id=1390609</a></td>
    4371 </tr>
    4372 
    4373 
    4374 </table></div><br><br>
    4375 
    4376 
    4377 
    4378 
    4379 <a class="EntryGoto" id="Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I."></a>
    4380 <b class="myheading" style="position: relative; left: 5%;">Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I.</b>
    4381 
    4382 <div class="BibEntry">
    4383 
    4384 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4385 
    4386 
    4387 <tr>
    4388      <td valign="top">Author</td>
    4389      <td valign="top">Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I.</td>
    4390 </tr>
    4391 
    4392 <tr>
    4393      <td valign="top">Title</td>
    4394      <td valign="top">Enabling Wide Area Single System Image Experimentation on the GENI Platform</td>
    4395 </tr>
    4396 
    4397 <tr>
    4398      <td valign="top">Booktitle</td>
    4399      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    4400 </tr>
    4401 
    4402 <tr>
    4403      <td valign="top">Location</td>
    4404      <td valign="top">Salt Lake City, UT</td>
    4405 </tr>
    4406 
    4407 <tr>
    4408      <td valign="top">Publisher</td>
    4409      <td valign="top">IEEE</td>
    4410 </tr>
    4411 
    4412 <tr>
    4413      <td valign="top">Year</td>
    4414      <td valign="top">2013</td>
    4415 </tr>
    4416 
    4417 
    4418 
    4419 <tr>
    4420      <td valign="top">DOI</td>
    4421      <td valign="top">10.1109/GREE.2013.27</td>
    4422 </tr>
    4423 
    4424 
    4425 
    4426 <tr>
    4427      <td valign="top">URL</td>
    4428      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.27">http://dx.doi.org/10.1109/GREE.2013.27</a></td>
    4429 </tr>
    4430 
    4431 
    4432 </table></div><br><br>
    4433 
    4434 
    4435 
    4436 
    4437 <a class="EntryGoto" id="Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming"></a>
    4438 <b class="myheading" style="position: relative; left: 5%;">Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</b>
    4439 
    4440 <div class="BibEntry">
    4441 
    4442 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4443 
    4444 
    4445 <tr>
    4446      <td valign="top">Author</td>
    4447      <td valign="top">Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</td>
    4448 </tr>
    4449 
    4450 <tr>
    4451      <td valign="top">Title</td>
    4452      <td valign="top">Socially Aware Single System Images</td>
    4453 </tr>
    4454 
    4455 <tr>
    4456      <td valign="top">Booktitle</td>
    4457      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    4458 </tr>
    4459 
    4460 <tr>
    4461      <td valign="top">Location</td>
    4462      <td valign="top">Los Angeles</td>
    4463 </tr>
    4464 
    4465 <tr>
    4466      <td valign="top">Year</td>
    4467      <td valign="top">2012</td>
    4468 </tr>
    4469 
    4470 <tr>
    4471      <td valign="top">Abstract</td>
    4472      <td valign="top">Cloud computing enables users to get access to huge amounts of computing resources as desired. There are many popular commercial cloud service providers which provide resources to users at a price. These providers can not be trusted as far as privacy of data is concerned. On the other hand, people do trust their close friends, relatives and other social contacts, albeit, to varying degrees. This paper reports the work-in-progress on S3I(Socially Aware Single System Images) which allows users to form computing clusters using resources owned by their social contacts. It tries to utilize the trust found between people in real life and translate it to provide trustworthy resource sharing between them.</td>
    4473 </tr>
    4474 
    4475 
    4476 
    4477 
    4478 
    4479 
    4480 </table></div><br><br>
    4481 
    4482 
    4483 <div class="BibEntry">
    4484 
    4485 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4486 
    4487 
    4488 <tr>
    4489      <td valign="top">Author</td>
    4490      <td valign="top">Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</td>
    4491 </tr>
    4492 
    4493 <tr>
    4494      <td valign="top">Title</td>
    4495      <td valign="top">Socially Aware Single System Images</td>
    4496 </tr>
    4497 
    4498 <tr>
    4499      <td valign="top">Booktitle</td>
    4500      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    4501 </tr>
    4502 
    4503 <tr>
    4504      <td valign="top">Location</td>
    4505      <td valign="top">Los Angeles</td>
    4506 </tr>
    4507 
    4508 <tr>
    4509      <td valign="top">Year</td>
    4510      <td valign="top">2012</td>
    4511 </tr>
    4512 
    4513 <tr>
    4514      <td valign="top">Abstract</td>
    4515      <td valign="top">Cloud computing enables users to get access to huge amounts of computing resources as desired. There are many popular commercial cloud service providers which provide resources to users at a price. These providers can not be trusted as far as privacy of data is concerned. On the other hand, people do trust their close friends, relatives and other social contacts, albeit, to varying degrees. This paper reports the work-in-progress on S3I(Socially Aware Single System Images) which allows users to form computing clusters using resources owned by their social contacts. It tries to utilize the trust found between people in real life and translate it to provide trustworthy resource sharing between them.</td>
    4516 </tr>
    4517 
    4518 
    4519 
    4520 
    4521 
    4522 
    4523 </table></div><br><br>
    4524 
    4525 
    4526 
    4527 
    4528 <a class="EntryGoto" id="Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil"></a>
    4529 <b class="myheading" style="position: relative; left: 5%;">Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil</b>
    4530 
    4531 <div class="BibEntry">
    4532 
    4533 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4534 
    4535 
    4536 <tr>
    4537      <td valign="top">Author</td>
    4538      <td valign="top">Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil</td>
    4539 </tr>
    4540 
    4541 <tr>
    4542      <td valign="top">Title</td>
    4543      <td valign="top">WiMAX in the Classroom: Designing a Cellular Networking Hands-on Lab</td>
    4544 </tr>
    4545 
    4546 <tr>
    4547      <td valign="top">Booktitle</td>
    4548      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    4549 </tr>
    4550 
    4551 <tr>
    4552      <td valign="top">Location</td>
    4553      <td valign="top">Salt Lake City, UT</td>
    4554 </tr>
    4555 
    4556 <tr>
    4557      <td valign="top">Publisher</td>
    4558      <td valign="top">IEEE</td>
    4559 </tr>
    4560 
    4561 <tr>
    4562      <td valign="top">Year</td>
    4563      <td valign="top">2013</td>
    4564 </tr>
    4565 
    4566 
    4567 
    4568 <tr>
    4569      <td valign="top">DOI</td>
    4570      <td valign="top">10.1109/GREE.2013.29</td>
    4571 </tr>
    4572 
    4573 
    4574 
    4575 <tr>
    4576      <td valign="top">URL</td>
    4577      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.29">http://dx.doi.org/10.1109/GREE.2013.29</a></td>
    4578 </tr>
    4579 
    4580 
    4581 </table></div><br><br>
    4582 
    4583 
    4584 
    4585 
    4586 <a class="EntryGoto" id="Maziku, Hellen and Shetty, Sachin and Rogers, Tamara"></a>
    4587 <b class="myheading" style="position: relative; left: 5%;">Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</b>
    4588 
    4589 <div class="BibEntry">
    4590 
    4591 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4592 
    4593 
    4594 <tr>
    4595      <td valign="top">Author</td>
    4596      <td valign="top">Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</td>
    4597 </tr>
    4598 
    4599 <tr>
    4600      <td valign="top">Title</td>
    4601      <td valign="top">Measurement-based IP Geolocation of Routers on Planetlab Infrastructure</td>
    4602 </tr>
    4603 
    4604 <tr>
    4605      <td valign="top">Booktitle</td>
    4606      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    4607 </tr>
    4608 
    4609 <tr>
    4610      <td valign="top">Location</td>
    4611      <td valign="top">Los Angeles</td>
    4612 </tr>
    4613 
    4614 <tr>
    4615      <td valign="top">Year</td>
    4616      <td valign="top">2012</td>
    4617 </tr>
    4618 
    4619 <tr>
    4620      <td valign="top">Abstract</td>
    4621      <td valign="top">Location aware applications can benefit from a more accurate yet robust IP geolocation framework. Various approaches to IP geolocation have been well documented. The most recent approach casts IP geolocation as a machine learn- ing classification problem. This approach makes it possible to incorporate both delay and non delay based information. The accuracy of IP geolocation can be improved by incorporating additional types of geolocation information rather relying on network delay alone. To enhance the classification accuracy of the existing classification framework, we expand it to include 6 features (3 of which are novel). We use PlanetLab as a testbed to generate our measurement set. We select 67 PlanetLab nodes within the United States with known geographic location as our landmarks. We test the accuracy of our framework on 23,843 routers given ping measurements from the 67 landmarks. With only three features (average delay, average hops and population density) tested, our new classifier gives a reduced average error distance of 157.81 miles and a median error distance of 0 miles, compared to the present classifier that gives an average error distance of 253.34 miles. This is very promising as we move on to the next phase of incorporating data for the remaining 5 features. To the best of our knowledge, this is the first proposed framework that aims to improve the accuracy of the present classifier based IP geolocation.</td>
    4622 </tr>
    4623 
    4624 
    4625 
    4626 
    4627 
    4628 
    4629 </table></div><br><br>
    4630 
    4631 
    4632 <div class="BibEntry">
    4633 
    4634 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4635 
    4636 
    4637 <tr>
    4638      <td valign="top">Author</td>
    4639      <td valign="top">Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</td>
    4640 </tr>
    4641 
    4642 <tr>
    4643      <td valign="top">Title</td>
    4644      <td valign="top">Measurement-based IP Geolocation of Routers on Planetlab Infrastructure</td>
    4645 </tr>
    4646 
    4647 <tr>
    4648      <td valign="top">Booktitle</td>
    4649      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    4650 </tr>
    4651 
    4652 <tr>
    4653      <td valign="top">Location</td>
    4654      <td valign="top">Los Angeles</td>
    4655 </tr>
    4656 
    4657 <tr>
    4658      <td valign="top">Year</td>
    4659      <td valign="top">2012</td>
    4660 </tr>
    4661 
    4662 <tr>
    4663      <td valign="top">Abstract</td>
    4664      <td valign="top">Location aware applications can benefit from a more accurate yet robust IP geolocation framework. Various approaches to IP geolocation have been well documented. The most recent approach casts IP geolocation as a machine learn- ing classification problem. This approach makes it possible to incorporate both delay and non delay based information. The accuracy of IP geolocation can be improved by incorporating additional types of geolocation information rather relying on network delay alone. To enhance the classification accuracy of the existing classification framework, we expand it to include 6 features (3 of which are novel). We use PlanetLab as a testbed to generate our measurement set. We select 67 PlanetLab nodes within the United States with known geographic location as our landmarks. We test the accuracy of our framework on 23,843 routers given ping measurements from the 67 landmarks. With only three features (average delay, average hops and population density) tested, our new classifier gives a reduced average error distance of 157.81 miles and a median error distance of 0 miles, compared to the present classifier that gives an average error distance of 253.34 miles. This is very promising as we move on to the next phase of incorporating data for the remaining 5 features. To the best of our knowledge, this is the first proposed framework that aims to improve the accuracy of the present classifier based IP geolocation.</td>
    4665 </tr>
    4666 
    4667 
    4668 
    4669 
    4670 
    4671 
    4672 </table></div><br><br>
    4673 
    4674 
    4675 
    4676 
    4677 <a class="EntryGoto" id="McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan"></a>
    4678 <b class="myheading" style="position: relative; left: 5%;">McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan</b>
    4679 
    4680 <div class="BibEntry">
    4681 
    4682 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4683 
    4684 
    4685 <tr>
    4686      <td valign="top">Author</td>
    4687      <td valign="top">McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan</td>
    4688 </tr>
    4689 
    4690 <tr>
    4691      <td valign="top">Title</td>
    4692      <td valign="top">OpenFlow: enabling innovation in campus networks</td>
    4693 </tr>
    4694 
    4695 <tr>
    4696      <td valign="top">Journal</td>
    4697      <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
    4698 </tr>
    4699 
    4700 <tr>
    4701      <td valign="top">Publisher</td>
    4702      <td valign="top">ACM</td>
    4703 </tr>
    4704 
    4705 <tr>
    4706      <td valign="top">Address</td>
    4707      <td valign="top">New York, NY, USA</td>
    4708 </tr>
    4709 
    4710 <tr>
    4711      <td valign="top">Year</td>
    4712      <td valign="top">2008</td>
    4713 </tr>
    4714 
    4715 
    4716 
    4717 <tr>
    4718      <td valign="top">DOI</td>
    4719      <td valign="top">10.1145/1355734.1355746</td>
    4720 </tr>
    4721 
    4722 
    4723 
    4724 <tr>
    4725      <td valign="top">URL</td>
    4726      <td valign="top"><a href="http://doi.acm.org/10.1145/1355734.1355746">http://doi.acm.org/10.1145/1355734.1355746</a></td>
    4727 </tr>
    4728 
    4729 
    4730 </table></div><br><br>
    4731 
    4732 
    4733 
    4734 
    4735 <a class="EntryGoto" id="Mitroff, Sarah"></a>
    4736 <b class="myheading" style="position: relative; left: 5%;">Mitroff, Sarah</b>
    4737 
    4738 <div class="BibEntry">
    4739 
    4740 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4741 
    4742 
    4743 <tr>
    4744      <td valign="top">Author</td>
    4745      <td valign="top">Mitroff, Sarah</td>
    4746 </tr>
    4747 
    4748 <tr>
    4749      <td valign="top">Title</td>
    4750      <td valign="top">Lawrence Landweber Helped Build Today's Internet, Now He's Advising Its Future</td>
    4751 </tr>
    4752 
    4753 <tr>
    4754      <td valign="top">Journal</td>
    4755      <td valign="top">Wired</td>
    4756 </tr>
    4757 
    4758 <tr>
    4759      <td valign="top">Year</td>
    4760      <td valign="top">2012</td>
    4761 </tr>
    4762 
    4763 
    4764 
    4765 
    4766 
    4767 <tr>
    4768      <td valign="top">URL</td>
    4769      <td valign="top"><a href="http://www.wired.com/business/2012/08/lawrence-landweber/">http://www.wired.com/business/2012/08/lawrence-landweber/</a></td>
    4770 </tr>
    4771 
    4772 
    4773 </table></div><br><br>
    4774 
    4775 
    4776 
    4777 
    4778 <a class="EntryGoto" id="Muhammad, Monzur and Cappos, Justin"></a>
    4779 <b class="myheading" style="position: relative; left: 5%;">Muhammad, Monzur and Cappos, Justin</b>
    4780 
    4781 <div class="BibEntry">
    4782 
    4783 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4784 
    4785 
    4786 <tr>
    4787      <td valign="top">Author</td>
    4788      <td valign="top">Muhammad, Monzur and Cappos, Justin</td>
    4789 </tr>
    4790 
    4791 <tr>
    4792      <td valign="top">Title</td>
    4793      <td valign="top">Towards a Representive Testbed: Harnessing Volunteers for Networks Research</td>
    4794 </tr>
    4795 
    4796 <tr>
    4797      <td valign="top">Booktitle</td>
    4798      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    4799 </tr>
    4800 
    4801 <tr>
    4802      <td valign="top">Location</td>
    4803      <td valign="top">Los Angeles</td>
    4804 </tr>
    4805 
    4806 <tr>
    4807      <td valign="top">Year</td>
    4808      <td valign="top">2012</td>
    4809 </tr>
    4810 
    4811 <tr>
    4812      <td valign="top">Abstract</td>
    4813      <td valign="top">A steady rise in home systems has been seen over the past few years. As more systems are designed and deployed, an appropriate testbed is required to test these systems. Sev- eral systems exist, such as PlanetLab, that currently provide a networking testbed allowing researchers and developers to test and measure various applications. However in the long run such testbeds will be unable to keep up and meet all the demands of many of the large scale modern day peer-to-peer systems. We outline the various challenges and essentials of a networking testbed and we provide an alternate network- ing testbed that is driven by resources that are voluntarily contributed. We talk about the various advantages and dis- advantages of the Seattle system, an open source peer-to- peer computing testbed that has the potential to meet these demands. The testbed is composed of sandboxed resources that are donated by volunteers. Seattle has been deployed for about three years and supports many researchers who are interested in a networking testbed. The testbed consists of over 4100 nodes and is constantly growing. Seattle looks to grow and meet the demands of networking testbeds as they are made.</td>
    4814 </tr>
    4815 
    4816 
    4817 
    4818 
    4819 
    4820 
    4821 </table></div><br><br>
    4822 
    4823 
    4824 <div class="BibEntry">
    4825 
    4826 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4827 
    4828 
    4829 <tr>
    4830      <td valign="top">Author</td>
    4831      <td valign="top">Muhammad, Monzur and Cappos, Justin</td>
    4832 </tr>
    4833 
    4834 <tr>
    4835      <td valign="top">Title</td>
    4836      <td valign="top">Towards a Representive Testbed: Harnessing Volunteers for Networks Research</td>
    4837 </tr>
    4838 
    4839 <tr>
    4840      <td valign="top">Booktitle</td>
    4841      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    4842 </tr>
    4843 
    4844 <tr>
    4845      <td valign="top">Location</td>
    4846      <td valign="top">Los Angeles</td>
    4847 </tr>
    4848 
    4849 <tr>
    4850      <td valign="top">Year</td>
    4851      <td valign="top">2012</td>
    4852 </tr>
    4853 
    4854 <tr>
    4855      <td valign="top">Abstract</td>
    4856      <td valign="top">A steady rise in home systems has been seen over the past few years. As more systems are designed and deployed, an appropriate testbed is required to test these systems. Sev- eral systems exist, such as PlanetLab, that currently provide a networking testbed allowing researchers and developers to test and measure various applications. However in the long run such testbeds will be unable to keep up and meet all the demands of many of the large scale modern day peer-to-peer systems. We outline the various challenges and essentials of a networking testbed and we provide an alternate network- ing testbed that is driven by resources that are voluntarily contributed. We talk about the various advantages and dis- advantages of the Seattle system, an open source peer-to- peer computing testbed that has the potential to meet these demands. The testbed is composed of sandboxed resources that are donated by volunteers. Seattle has been deployed for about three years and supports many researchers who are interested in a networking testbed. The testbed consists of over 4100 nodes and is constantly growing. Seattle looks to grow and meet the demands of networking testbeds as they are made.</td>
    4857 </tr>
    4858 
    4859 
    4860 
    4861 
    4862 
    4863 
    4864 </table></div><br><br>
    4865 
    4866 
    4867 
    4868 
    4869 <a class="EntryGoto" id="Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram"></a>
    4870 <b class="myheading" style="position: relative; left: 5%;">Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram</b>
    4871 
    4872 <div class="BibEntry">
    4873 
    4874 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4875 
    4876 
    4877 <tr>
    4878      <td valign="top">Author</td>
    4879      <td valign="top">Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram</td>
    4880 </tr>
    4881 
    4882 <tr>
    4883      <td valign="top">Title</td>
    4884      <td valign="top">OpenFlow Configuration (OFConfig) Protocol: Implementation for the OF Management Plane</td>
    4885 </tr>
    4886 
    4887 <tr>
    4888      <td valign="top">Booktitle</td>
    4889      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    4890 </tr>
    4891 
    4892 <tr>
    4893      <td valign="top">Location</td>
    4894      <td valign="top">Salt Lake City, UT</td>
    4895 </tr>
    4896 
    4897 <tr>
    4898      <td valign="top">Publisher</td>
    4899      <td valign="top">IEEE</td>
    4900 </tr>
    4901 
    4902 <tr>
    4903      <td valign="top">Year</td>
    4904      <td valign="top">2013</td>
    4905 </tr>
    4906 
    4907 
    4908 
    4909 <tr>
    4910      <td valign="top">DOI</td>
    4911      <td valign="top">10.1109/GREE.2013.21</td>
    4912 </tr>
    4913 
    4914 
    4915 
    4916 <tr>
    4917      <td valign="top">URL</td>
    4918      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.21">http://dx.doi.org/10.1109/GREE.2013.21</a></td>
    4919 </tr>
    4920 
    4921 
    4922 </table></div><br><br>
    4923 
    4924 
    4925 
    4926 
    4927 <a class="EntryGoto" id="O'Neill, Derek and Aikat, Jay and Jeffay, Kevin"></a>
    4928 <b class="myheading" style="position: relative; left: 5%;">O'Neill, Derek and Aikat, Jay and Jeffay, Kevin</b>
    4929 
    4930 <div class="BibEntry">
    4931 
    4932 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4933 
    4934 
    4935 <tr>
    4936      <td valign="top">Author</td>
    4937      <td valign="top">O'Neill, Derek and Aikat, Jay and Jeffay, Kevin</td>
    4938 </tr>
    4939 
    4940 <tr>
    4941      <td valign="top">Title</td>
    4942      <td valign="top">Experiment Replication using ProtoGENI nodes</td>
    4943 </tr>
    4944 
    4945 <tr>
    4946      <td valign="top">Booktitle</td>
    4947      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    4948 </tr>
    4949 
    4950 <tr>
    4951      <td valign="top">Location</td>
    4952      <td valign="top">Salt Lake City, UT</td>
    4953 </tr>
    4954 
    4955 <tr>
    4956      <td valign="top">Publisher</td>
    4957      <td valign="top">IEEE</td>
    4958 </tr>
    4959 
    4960 <tr>
    4961      <td valign="top">Year</td>
    4962      <td valign="top">2013</td>
    4963 </tr>
    4964 
    4965 
    4966 
    4967 <tr>
    4968      <td valign="top">DOI</td>
    4969      <td valign="top">10.1109/GREE.2013.11</td>
    4970 </tr>
    4971 
    4972 
    4973 
    4974 <tr>
    4975      <td valign="top">URL</td>
    4976      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.11">http://dx.doi.org/10.1109/GREE.2013.11</a></td>
    4977 </tr>
    4978 
    4979 
    4980 </table></div><br><br>
    4981 
    4982 
    4983 
    4984 
    4985 <a class="EntryGoto" id="Ozcelik, Ilker and Brooks, Richard R."></a>
    4986 <b class="myheading" style="position: relative; left: 5%;">Ozcelik, Ilker and Brooks, Richard R.</b>
    4987 
    4988 <div class="BibEntry">
    4989 
    4990 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4991 
    4992 
    4993 <tr>
    4994      <td valign="top">Author</td>
    4995      <td valign="top">Ozcelik, Ilker and Brooks, Richard R.</td>
    4996 </tr>
    4997 
    4998 <tr>
    4999      <td valign="top">Title</td>
    5000      <td valign="top">Security experimentation using operational systems</td>
    5001 </tr>
    5002 
    5003 <tr>
    5004      <td valign="top">Booktitle</td>
    5005      <td valign="top">Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research</td>
    5006 </tr>
    5007 
    5008 <tr>
    5009      <td valign="top">Location</td>
    5010      <td valign="top">Oak Ridge, Tennessee</td>
    5011 </tr>
    5012 
    5013 <tr>
    5014      <td valign="top">Publisher</td>
    5015      <td valign="top">ACM</td>
    5016 </tr>
    5017 
    5018 <tr>
    5019      <td valign="top">Address</td>
    5020      <td valign="top">New York, NY, USA</td>
    5021 </tr>
    5022 
    5023 <tr>
    5024      <td valign="top">Year</td>
    5025      <td valign="top">2011</td>
    5026 </tr>
    5027 
    5028 <tr>
    5029      <td valign="top">Abstract</td>
    5030      <td valign="top">Computers and Internet have evolved into necessary tools for our professional, personal and social lives. As a result of this growing dependence, there is a concern that these systems remain protected and available. This concern increases exponentially when considering systems such as smart power grids. Therefore, research should be conducted to develop effective ways of detecting system anomalies. To have realistic results, the studies should be tested on real systems. However, it is not possible to test these experiments on the live network. With the recent collaboration of Universities and research labs, a new experiment test bed has been established. As a result, experiments can now be implemented on real networks. In our study, we design an experiment to analyze Distributed Denial of Service Attacks (DDoS Attack) on a real network with real Internet traffic. The approach that we use in our study can easily be generalized to apply to smart power grids.</td>
    5031 </tr>
    5032 
    5033 
    5034 
    5035 <tr>
    5036      <td valign="top">DOI</td>
    5037      <td valign="top">10.1145/2179298.2179388</td>
    5038 </tr>
    5039 
    5040 
    5041 
    5042 <tr>
    5043      <td valign="top">URL</td>
    5044      <td valign="top"><a href="http://dx.doi.org/10.1145/2179298.2179388">http://dx.doi.org/10.1145/2179298.2179388</a></td>
    5045 </tr>
    5046 
    5047 
    5048 </table></div><br><br>
    5049 
    5050 
    5051 <div class="BibEntry">
    5052 
    5053 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5054 
    5055 
    5056 <tr>
    5057      <td valign="top">Author</td>
    5058      <td valign="top">Ozcelik, Ilker and Brooks, Richard R.</td>
    5059 </tr>
    5060 
    5061 <tr>
    5062      <td valign="top">Title</td>
    5063      <td valign="top">Performance Analysis of DDoS Detection Methods on Real Network</td>
    5064 </tr>
    5065 
    5066 <tr>
    5067      <td valign="top">Booktitle</td>
    5068      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    5069 </tr>
    5070 
    5071 <tr>
    5072      <td valign="top">Location</td>
    5073      <td valign="top">Los Angeles</td>
    5074 </tr>
    5075 
    5076 <tr>
    5077      <td valign="top">Year</td>
    5078      <td valign="top">2012</td>
    5079 </tr>
    5080 
    5081 <tr>
    5082      <td valign="top">Abstract</td>
    5083      <td valign="top">Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic.</td>
    5084 </tr>
    5085 
    5086 
    5087 
    5088 
    5089 
    5090 
    5091 </table></div><br><br>
    5092 
    5093 
    5094 <div class="BibEntry">
    5095 
    5096 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5097 
    5098 
    5099 <tr>
    5100      <td valign="top">Author</td>
    5101      <td valign="top">Ozcelik, Ilker and Brooks, Richard R.</td>
    5102 </tr>
    5103 
    5104 <tr>
    5105      <td valign="top">Title</td>
    5106      <td valign="top">Performance Analysis of DDoS Detection Methods on Real Network</td>
    5107 </tr>
    5108 
    5109 <tr>
    5110      <td valign="top">Booktitle</td>
    5111      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    5112 </tr>
    5113 
    5114 <tr>
    5115      <td valign="top">Location</td>
    5116      <td valign="top">Los Angeles</td>
    5117 </tr>
    5118 
    5119 <tr>
    5120      <td valign="top">Year</td>
    5121      <td valign="top">2012</td>
    5122 </tr>
    5123 
    5124 <tr>
    5125      <td valign="top">Abstract</td>
    5126      <td valign="top">Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic.</td>
    5127 </tr>
    5128 
    5129 
    5130 
    5131 
    5132 
    5133 
    5134 </table></div><br><br>
    5135 
    5136 
    5137 
    5138 
    5139 <a class="EntryGoto" id="Ozcelik, Ilker and Fu, Yu and Brooks, Richard R."></a>
    5140 <b class="myheading" style="position: relative; left: 5%;">Ozcelik, Ilker and Fu, Yu and Brooks, Richard R.</b>
    5141 
    5142 <div class="BibEntry">
    5143 
    5144 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5145 
    5146 
    5147 <tr>
    5148      <td valign="top">Author</td>
    5149      <td valign="top">Ozcelik, Ilker and Fu, Yu and Brooks, Richard R.</td>
    5150 </tr>
    5151 
    5152 <tr>
    5153      <td valign="top">Title</td>
    5154      <td valign="top">DoS Detection is Easier Now</td>
    5155 </tr>
    5156 
    5157 <tr>
    5158      <td valign="top">Booktitle</td>
    5159      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    5160 </tr>
    5161 
    5162 <tr>
    5163      <td valign="top">Location</td>
    5164      <td valign="top">Salt Lake City, UT</td>
    5165 </tr>
    5166 
    5167 <tr>
    5168      <td valign="top">Publisher</td>
    5169      <td valign="top">IEEE</td>
    5170 </tr>
    5171 
    5172 <tr>
    5173      <td valign="top">Year</td>
    5174      <td valign="top">2013</td>
    5175 </tr>
    5176 
    5177 
    5178 
    5179 <tr>
    5180      <td valign="top">DOI</td>
    5181      <td valign="top">10.1109/GREE.2013.18</td>
    5182 </tr>
    5183 
    5184 
    5185 
    5186 <tr>
    5187      <td valign="top">URL</td>
    5188      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.18">http://dx.doi.org/10.1109/GREE.2013.18</a></td>
    5189 </tr>
    5190 
    5191 
    5192 </table></div><br><br>
    5193 
    5194 
    5195 
    5196 
    5197 <a class="EntryGoto" id="Paul, Subharthi and Pan, Jianli and Jain, Raj"></a>
    5198 <b class="myheading" style="position: relative; left: 5%;">Paul, Subharthi and Pan, Jianli and Jain, Raj</b>
    5199 
    5200 <div class="BibEntry">
    5201 
    5202 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5203 
    5204 
    5205 <tr>
    5206      <td valign="top">Author</td>
    5207      <td valign="top">Paul, Subharthi and Pan, Jianli and Jain, Raj</td>
    5208 </tr>
    5209 
    5210 <tr>
    5211      <td valign="top">Title</td>
    5212      <td valign="top">Architectures for the future networks and the next generation Internet: A survey</td>
    5213 </tr>
    5214 
    5215 <tr>
    5216      <td valign="top">Journal</td>
    5217      <td valign="top">Computer Communications</td>
    5218 </tr>
    5219 
    5220 <tr>
    5221      <td valign="top">Publisher</td>
    5222      <td valign="top">Elsevier Science Publishers B. V.</td>
    5223 </tr>
    5224 
    5225 <tr>
    5226      <td valign="top">Address</td>
    5227      <td valign="top">Amsterdam, The Netherlands, The Netherlands</td>
    5228 </tr>
    5229 
    5230 <tr>
    5231      <td valign="top">Year</td>
    5232      <td valign="top">2011</td>
    5233 </tr>
    5234 
    5235 <tr>
    5236      <td valign="top">Abstract</td>
    5237      <td valign="top">Networking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet. We present a comprehensive survey of such research projects and activities. The topics covered include various testbeds for experimentations for new architectures, new security mechanisms, content delivery mechanisms, management and control frameworks, service architectures, and routing mechanisms. Delay/disruption tolerant networks which allow communications even when complete end-to-end path is not available are also discussed.</td>
    5238 </tr>
    5239 
    5240 
    5241 
    5242 <tr>
    5243      <td valign="top">DOI</td>
    5244      <td valign="top">10.1016/j.comcom.2010.08.001</td>
    5245 </tr>
    5246 
    5247 
    5248 
    5249 <tr>
    5250      <td valign="top">URL</td>
    5251      <td valign="top"><a href="http://dx.doi.org/10.1016/j.comcom.2010.08.001">http://dx.doi.org/10.1016/j.comcom.2010.08.001</a></td>
    5252 </tr>
    5253 
    5254 
    5255 </table></div><br><br>
    5256 
    5257 
    5258 
    5259 
    5260 <a class="EntryGoto" id="Qin, Z. and Xiong, X. and Chuah, M."></a>
    5261 <b class="myheading" style="position: relative; left: 5%;">Qin, Z. and Xiong, X. and Chuah, M.</b>
    5262 
    5263 <div class="BibEntry">
    5264 
    5265 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5266 
    5267 
    5268 <tr>
    5269      <td valign="top">Author</td>
    5270      <td valign="top">Qin, Z. and Xiong, X. and Chuah, M.</td>
    5271 </tr>
    5272 
    5273 <tr>
    5274      <td valign="top">Title</td>
    5275      <td valign="top">Lehigh Explorer: Android Application Utilizing Content Centric Features</td>
    5276 </tr>
    5277 
    5278 <tr>
    5279      <td valign="top">Booktitle</td>
    5280      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    5281 </tr>
    5282 
    5283 <tr>
    5284      <td valign="top">Location</td>
    5285      <td valign="top">Los Angeles</td>
    5286 </tr>
    5287 
    5288 <tr>
    5289      <td valign="top">Year</td>
    5290      <td valign="top">2012</td>
    5291 </tr>
    5292 
    5293 <tr>
    5294      <td valign="top">Abstract</td>
    5295      <td valign="top">Companies, government organizations or institutions from anywhere in the world publish different types of information e.g. news, health alerts, disaster warnings at any time. Rather than consuming all published data, users only desire access to information of interest to themselves irrespective of where the data is located and who publish them. Existing publish/subscribe systems built based on IP-based network can be inefficient and are not flexible enough to meet emerging requirements e.g. deal with mobile users, dynamic contents, searching over encrypted data. Recently content-centric networks have been proposed to provide flexibility to users to access such information. We have designed secure content centric mobile networks that allow users to publish and retrieve contents securely. As with any new architecture, one important issue is to have useful applications that can utilize features provided in the new architecture. In this paper, we describe an Android application we recently developed that allows visitors to explore Lehigh campus based on their expressed interests. Our application utilizes keyword based interest messages to retrieve matching data items of interests to a user. We are giving a demo of Lehigh Explorer at GEC13.</td>
    5296 </tr>
    5297 
    5298 
    5299 
    5300 
    5301 
    5302 
    5303 </table></div><br><br>
    5304 
    5305 
    5306 <div class="BibEntry">
    5307 
    5308 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5309 
    5310 
    5311 <tr>
    5312      <td valign="top">Author</td>
    5313      <td valign="top">Qin, Z. and Xiong, X. and Chuah, M.</td>
    5314 </tr>
    5315 
    5316 <tr>
    5317      <td valign="top">Title</td>
    5318      <td valign="top">Lehigh Explorer: Android Application Utilizing Content Centric Features</td>
    5319 </tr>
    5320 
    5321 <tr>
    5322      <td valign="top">Booktitle</td>
    5323      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    5324 </tr>
    5325 
    5326 <tr>
    5327      <td valign="top">Location</td>
    5328      <td valign="top">Los Angeles</td>
    5329 </tr>
    5330 
    5331 <tr>
    5332      <td valign="top">Year</td>
    5333      <td valign="top">2012</td>
    5334 </tr>
    5335 
    5336 <tr>
    5337      <td valign="top">Abstract</td>
    5338      <td valign="top">Companies, government organizations or institutions from anywhere in the world publish different types of information e.g. news, health alerts, disaster warnings at any time. Rather than consuming all published data, users only desire access to information of interest to themselves irrespective of where the data is located and who publish them. Existing publish/subscribe systems built based on IP-based network can be inefficient and are not flexible enough to meet emerging requirements e.g. deal with mobile users, dynamic contents, searching over encrypted data. Recently content-centric networks have been proposed to provide flexibility to users to access such information. We have designed secure content centric mobile networks that allow users to publish and retrieve contents securely. As with any new architecture, one important issue is to have useful applications that can utilize features provided in the new architecture. In this paper, we describe an Android application we recently developed that allows visitors to explore Lehigh campus based on their expressed interests. Our application utilizes keyword based interest messages to retrieve matching data items of interests to a user. We are giving a demo of Lehigh Explorer at GEC13.</td>
    5339 </tr>
    5340 
    5341 
    5342 
    5343 
    5344 
    5345 
    5346 </table></div><br><br>
    5347 
    5348 
    5349 
    5350 
    5351 <a class="EntryGoto" id="Quan, John and Nance, Kara and Hay, Brian"></a>
    5352 <b class="myheading" style="position: relative; left: 5%;">Quan, John and Nance, Kara and Hay, Brian</b>
    5353 
    5354 <div class="BibEntry">
    5355 
    5356 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5357 
    5358 
    5359 <tr>
    5360      <td valign="top">Author</td>
    5361      <td valign="top">Quan, John and Nance, Kara and Hay, Brian</td>
    5362 </tr>
    5363 
    5364 <tr>
    5365      <td valign="top">Title</td>
    5366      <td valign="top">A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments</td>
    5367 </tr>
    5368 
    5369 <tr>
    5370      <td valign="top">Journal</td>
    5371      <td valign="top">IT Professional</td>
    5372 </tr>
    5373 
    5374 <tr>
    5375      <td valign="top">Year</td>
    5376      <td valign="top">2011</td>
    5377 </tr>
    5378 
    5379 <tr>
    5380      <td valign="top">Abstract</td>
    5381      <td valign="top">Applying a mutualistic security service model to large-scale virtualized environments that rely on contributed hardware lets researchers improve security in exchange for resources. The authors discuss this model in the context of the Global Environment for Network Innovation (GENI) project.</td>
    5382 </tr>
    5383 
    5384 
    5385 
    5386 <tr>
    5387      <td valign="top">DOI</td>
    5388      <td valign="top">10.1109/MITP.2011.36</td>
    5389 </tr>
    5390 
    5391 
    5392 
    5393 <tr>
    5394      <td valign="top">URL</td>
    5395      <td valign="top"><a href="http://dx.doi.org/10.1109/MITP.2011.36">http://dx.doi.org/10.1109/MITP.2011.36</a></td>
    5396 </tr>
    5397 
    5398 
    5399 </table></div><br><br>
    5400 
    5401 
    5402 
    5403 
    5404 <a class="EntryGoto" id="Raychaudhuri, Dipankar and Nagaraja, Kiran and Venkataramani, Arun"></a>
    5405 <b class="myheading" style="position: relative; left: 5%;">Raychaudhuri, Dipankar and Nagaraja, Kiran and Venkataramani, Arun</b>
    5406 
    5407 <div class="BibEntry">
    5408 
    5409 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5410 
    5411 
    5412 <tr>
    5413      <td valign="top">Author</td>
    5414      <td valign="top">Raychaudhuri, Dipankar and Nagaraja, Kiran and Venkataramani, Arun</td>
    5415 </tr>
    5416 
    5417 <tr>
    5418      <td valign="top">Title</td>
    5419      <td valign="top">MobilityFirst: a robust and trustworthy mobility-centric architecture for the future internet</td>
    5420 </tr>
    5421 
    5422 <tr>
    5423      <td valign="top">Journal</td>
    5424      <td valign="top">SIGMOBILE Mob. Comput. Commun. Rev.</td>
    5425 </tr>
    5426 
    5427 <tr>
    5428      <td valign="top">Publisher</td>
    5429      <td valign="top">ACM</td>
    5430 </tr>
    5431 
    5432 <tr>
    5433      <td valign="top">Address</td>
    5434      <td valign="top">New York, NY, USA</td>
    5435 </tr>
    5436 
    5437 <tr>
    5438      <td valign="top">Year</td>
    5439      <td valign="top">2012</td>
    5440 </tr>
    5441 
    5442 <tr>
    5443      <td valign="top">Abstract</td>
    5444      <td valign="top">This paper presents an overview of the MobilityFirst network architecture, currently under development as part of the US National Science Foundation's Future Internet Architecture (FIA) program. The proposed architecture is intended to directly address the challenges of wireless access and mobility at scale, while also providing new services needed for emerging mobile Internet application scenarios. After briefly outlining the original design goals of the project, we provide a discussion of the main architectural concepts behind the network design, identifying key features such as separation of names from addresses, public-key based globally unique identifiers (GUIDs) for named objects, global name resolution service (GNRS) for dynamic binding of names to addresses, storage-aware routing and late binding, content- and context-aware services, optional in-network compute layer, and so on. This is followed by a brief description of the MobilityFirst protocol stack as a whole, along with an explanation of how the protocol works at end-user devices and inside network routers. Example of specific advanced services supported by the protocol stack, including multi-homing, mobility with disconnection, and content retrieval/caching are given for illustration. Further design details of two key protocol components, the GNRS name resolution service and the GSTAR routing protocol, are also described along with sample results from evaluation. In conclusion, a brief description of an ongoing multi-site experimental proof-of-concept deployment of the MobilityFirst protocol stack on the GENI testbed is provided.</td>
    5445 </tr>
    5446 
    5447 
    5448 
    5449 <tr>
    5450      <td valign="top">DOI</td>
    5451      <td valign="top">10.1145/2412096.2412098</td>
    5452 </tr>
    5453 
    5454 
    5455 
    5456 <tr>
    5457      <td valign="top">URL</td>
    5458      <td valign="top"><a href="http://dx.doi.org/10.1145/2412096.2412098">http://dx.doi.org/10.1145/2412096.2412098</a></td>
    5459 </tr>
    5460 
    5461 
    5462 </table></div><br><br>
    5463 
    5464 
    5465 
    5466 
    5467 <a class="EntryGoto" id="Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon"></a>
    5468 <b class="myheading" style="position: relative; left: 5%;">Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon</b>
    5469 
    5470 <div class="BibEntry">
    5471 
    5472 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5473 
    5474 
    5475 <tr>
    5476      <td valign="top">Author</td>
    5477      <td valign="top">Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon</td>
    5478 </tr>
    5479 
    5480 <tr>
    5481      <td valign="top">Title</td>
    5482      <td valign="top">An Architecture For International Federation of Network Testbeds</td>
    5483 </tr>
    5484 
    5485 <tr>
    5486      <td valign="top">Journal</td>
    5487      <td valign="top">IEICE Transactions on Communications</td>
    5488 </tr>
    5489 
    5490 <tr>
    5491      <td valign="top">Year</td>
    5492      <td valign="top">2013</td>
    5493 </tr>
    5494 
    5495 <tr>
    5496      <td valign="top">Abstract</td>
    5497      <td valign="top">Testbeds play a key role in the advancement of network science and the exploration of new network architectures. Because the scale and scope of any individual testbed is necessarily limited, federation is a useful technique for constructing testbeds that serve a wide range of experimenter needs. In a federated testbed, individual facilities maintain local autonomy while cooperating to provide a unified set of abstractions and interfaces to users. Forming an international federation is particularly challenging, because issues of trust, user access policy, and local laws and regulations are of greater concern that they are for federations within a single country. In this paper, we describe an architecture, based on the US National Science Foundation's GENI project, that is capable of supporting the needs of an international federation.</td>
    5498 </tr>
    5499 
    5500 
    5501 
    5502 <tr>
    5503      <td valign="top">DOI</td>
    5504      <td valign="top">10.1587/transcom.E96.B.2</td>
    5505 </tr>
    5506 
    5507 
    5508 
    5509 <tr>
    5510      <td valign="top">URL</td>
    5511      <td valign="top"><a href="http://dx.doi.org/10.1587/transcom.E96.B.2">http://dx.doi.org/10.1587/transcom.E96.B.2</a></td>
    5512 </tr>
    5513 
    5514 
    5515 </table></div><br><br>
    5516 
    5517 
    5518 <div class="BibEntry">
    5519 
    5520 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5521 
    5522 
    5523 <tr>
    5524      <td valign="top">Author</td>
    5525      <td valign="top">Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon</td>
    5526 </tr>
    5527 
    5528 <tr>
    5529      <td valign="top">Title</td>
    5530      <td valign="top">An Architecture For International Federation of Network Testbeds</td>
    5531 </tr>
    5532 
    5533 <tr>
    5534      <td valign="top">Journal</td>
    5535      <td valign="top">IEICE Transactions on Communications</td>
    5536 </tr>
    5537 
    5538 <tr>
    5539      <td valign="top">Year</td>
    5540      <td valign="top">2013</td>
    5541 </tr>
    5542 
    5543 <tr>
    5544      <td valign="top">Abstract</td>
    5545      <td valign="top">Testbeds play a key role in the advancement of network science and the exploration of new network architectures. Because the scale and scope of any individual testbed is necessarily limited, federation is a useful technique for constructing testbeds that serve a wide range of experimenter needs. In a federated testbed, individual facilities maintain local autonomy while cooperating to provide a unified set of abstractions and interfaces to users. Forming an international federation is particularly challenging, because issues of trust, user access policy, and local laws and regulations are of greater concern that they are for federations within a single country. In this paper, we describe an architecture, based on the US National Science Foundation's GENI project, that is capable of supporting the needs of an international federation.</td>
    5546 </tr>
    5547 
    5548 
    5549 
    5550 <tr>
    5551      <td valign="top">DOI</td>
    5552      <td valign="top">10.1587/transcom.E96.B.2</td>
    5553 </tr>
    5554 
    5555 
    5556 
    5557 <tr>
    5558      <td valign="top">URL</td>
    5559      <td valign="top"><a href="http://dx.doi.org/10.1587/transcom.E96.B.2">http://dx.doi.org/10.1587/transcom.E96.B.2</a></td>
    5560 </tr>
    5561 
    5562 
    5563 </table></div><br><br>
    5564 
    5565 
    5566 
    5567 
    5568 <a class="EntryGoto" id="Rohrer, Justin P. and &#x43;&#x0327;etinkaya, Egemen K. and Sterbenz, James P. G."></a>
    5569 <b class="myheading" style="position: relative; left: 5%;">Rohrer, Justin P. and &#x43;&#x0327;etinkaya, Egemen K. and Sterbenz, James P. G.</b>
    5570 
    5571 <div class="BibEntry">
    5572 
    5573 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5574 
    5575 
    5576 <tr>
    5577      <td valign="top">Author</td>
    5578      <td valign="top">Rohrer, Justin P. and &#x43;&#x0327;etinkaya, Egemen K. and Sterbenz, James P. G.</td>
    5579 </tr>
    5580 
    5581 <tr>
    5582      <td valign="top">Title</td>
    5583      <td valign="top">Progress and challenges in large-scale future internet experimentation using the GpENI programmable testbed</td>
    5584 </tr>
    5585 
    5586 <tr>
    5587      <td valign="top">Booktitle</td>
    5588      <td valign="top">Proceedings of the 6th International Conference on Future Internet Technologies</td>
    5589 </tr>
    5590 
    5591 <tr>
    5592      <td valign="top">Location</td>
    5593      <td valign="top">Seoul, Republic of Korea</td>
    5594 </tr>
    5595 
    5596 <tr>
    5597      <td valign="top">Publisher</td>
    5598      <td valign="top">ACM</td>
    5599 </tr>
    5600 
    5601 <tr>
    5602      <td valign="top">Address</td>
    5603      <td valign="top">New York, NY, USA</td>
    5604 </tr>
    5605 
    5606 <tr>
    5607      <td valign="top">Year</td>
    5608      <td valign="top">2011</td>
    5609 </tr>
    5610 
    5611 <tr>
    5612      <td valign="top">Abstract</td>
    5613      <td valign="top">GpENI is evolving to provide a promising environment in which to do experimental research in the resilience and survivability of future networks, by allowing programmable control over topology and mechanism, while providing the scale and global reach needed to conduct network experiments far beyond the capabilities of a conventional testbed. Addressing this need at scale introduces a number of challenges both in deployment and in collecting results that can be directly compared to simulation results for cross-verification purposes. In this short paper we present the scope, design goals, challenges, and current status of the GpENI programmable testbed, as well as an overview and examples of the types of experiments we are beginning to run.</td>
    5614 </tr>
    5615 
    5616 
    5617 
    5618 <tr>
    5619      <td valign="top">DOI</td>
    5620      <td valign="top">10.1145/2002396.2002409</td>
    5621 </tr>
    5622 
    5623 
    5624 
    5625 <tr>
    5626      <td valign="top">URL</td>
    5627      <td valign="top"><a href="http://dx.doi.org/10.1145/2002396.2002409">http://dx.doi.org/10.1145/2002396.2002409</a></td>
    5628 </tr>
    5629 
    5630 
    5631 </table></div><br><br>
    5632 
    5633 
    5634 
    5635 
    5636 <a class="EntryGoto" id="Rosen, Aaron and Wang, Kuang-Ching"></a>
    5637 <b class="myheading" style="position: relative; left: 5%;">Rosen, Aaron and Wang, Kuang-Ching</b>
    5638 
    5639 <div class="BibEntry">
    5640 
    5641 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5642 
    5643 
    5644 <tr>
    5645      <td valign="top">Author</td>
    5646      <td valign="top">Rosen, Aaron and Wang, Kuang-Ching</td>
    5647 </tr>
    5648 
    5649 <tr>
    5650      <td valign="top">Title</td>
    5651      <td valign="top">Steroid OpenFlow Service: Seamless Network Service Delivery in Software Defined Networks</td>
    5652 </tr>
    5653 
    5654 <tr>
    5655      <td valign="top">Booktitle</td>
    5656      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    5657 </tr>
    5658 
    5659 <tr>
    5660      <td valign="top">Location</td>
    5661      <td valign="top">Los Angeles</td>
    5662 </tr>
    5663 
    5664 <tr>
    5665      <td valign="top">Year</td>
    5666      <td valign="top">2012</td>
    5667 </tr>
    5668 
    5669 <tr>
    5670      <td valign="top">Abstract</td>
    5671      <td valign="top">In a software defined network (SDN), packet forwarding is controlled by software controllers. In an OpenFlow SDN, a controller can control the forwarding, rewriting, and dropping of packets based on their header attributes. The ability to handle packets in customizable ways in software has significant implications for both network users and operators. Via software, users can convey application specific expectations while operators can deliver application specific services to enhance user experiences. In this paper, we present the Steroid OpenFlow Services (SOS) paradigm for network services delivery. The paradigm enables operators to deliver network services without any setup requirements on user machines. SOS utilizes OpenFlow to redirect application specific traffic to application specific service agents; SOS also rewrites packet headers for a service to remain seamless to users. This paper presents an example SOS service for optimizing large volume TCP download across a large delay-bandwidth-product wide area network. SOS service agents on both ends of the connection seamlessly terminate a user TCP connection, launch a set of parallel TCP connections, and leverage multiple paths when available to maximize throughput. With the NSF GENI future Internet testbed, a prototype implementation achieved up to 320 times throughput enhancement seamless to the end users.</td>
    5672 </tr>
    5673 
    5674 
    5675 
    5676 
    5677 
    5678 
    5679 </table></div><br><br>
    5680 
    5681 
    5682 <div class="BibEntry">
    5683 
    5684 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5685 
    5686 
    5687 <tr>
    5688      <td valign="top">Author</td>
    5689      <td valign="top">Rosen, Aaron and Wang, Kuang-Ching</td>
    5690 </tr>
    5691 
    5692 <tr>
    5693      <td valign="top">Title</td>
    5694      <td valign="top">Steroid OpenFlow Service: Seamless Network Service Delivery in Software Defined Networks</td>
    5695 </tr>
    5696 
    5697 <tr>
    5698      <td valign="top">Booktitle</td>
    5699      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    5700 </tr>
    5701 
    5702 <tr>
    5703      <td valign="top">Location</td>
    5704      <td valign="top">Los Angeles</td>
    5705 </tr>
    5706 
    5707 <tr>
    5708      <td valign="top">Year</td>
    5709      <td valign="top">2012</td>
    5710 </tr>
    5711 
    5712 <tr>
    5713      <td valign="top">Abstract</td>
    5714      <td valign="top">In a software defined network (SDN), packet forwarding is controlled by software controllers. In an OpenFlow SDN, a controller can control the forwarding, rewriting, and dropping of packets based on their header attributes. The ability to handle packets in customizable ways in software has significant implications for both network users and operators. Via software, users can convey application specific expectations while operators can deliver application specific services to enhance user experiences. In this paper, we present the Steroid OpenFlow Services (SOS) paradigm for network services delivery. The paradigm enables operators to deliver network services without any setup requirements on user machines. SOS utilizes OpenFlow to redirect application specific traffic to application specific service agents; SOS also rewrites packet headers for a service to remain seamless to users. This paper presents an example SOS service for optimizing large volume TCP download across a large delay-bandwidth-product wide area network. SOS service agents on both ends of the connection seamlessly terminate a user TCP connection, launch a set of parallel TCP connections, and leverage multiple paths when available to maximize throughput. With the NSF GENI future Internet testbed, a prototype implementation achieved up to 320 times throughput enhancement seamless to the end users.</td>
    5715 </tr>
    5716 
    5717 
    5718 
    5719 
    5720 
    5721 
    5722 </table></div><br><br>
    5723 
    5724 
    5725 
    5726 
    5727 <a class="EntryGoto" id="Scoglio, Caterina M. and Sydney, Ali and Youssef, Mina and Schumm, Phillip and Kooij, Robert E."></a>
    5728 <b class="myheading" style="position: relative; left: 5%;">Scoglio, Caterina M. and Sydney, Ali and Youssef, Mina and Schumm, Phillip and Kooij, Robert E.</b>
    5729 
    5730 <div class="BibEntry">
    5731 
    5732 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5733 
    5734 
    5735 <tr>
    5736      <td valign="top">Author</td>
    5737      <td valign="top">Scoglio, Caterina M. and Sydney, Ali and Youssef, Mina and Schumm, Phillip and Kooij, Robert E.</td>
    5738 </tr>
    5739 
    5740 <tr>
    5741      <td valign="top">Title</td>
    5742      <td valign="top">Elasticity and Viral Conductance: Unveiling Robustness in Complex Networks through Topological Characteristics</td>
    5743 </tr>
    5744 
    5745 <tr>
    5746      <td valign="top">Journal</td>
    5747      <td valign="top">CoRR</td>
    5748 </tr>
    5749 
    5750 <tr>
    5751      <td valign="top">Year</td>
    5752      <td valign="top">2008</td>
    5753 </tr>
    5754 
    5755 
    5756 
    5757 
    5758 
    5759 
    5760 </table></div><br><br>
    5761 
    5762 
    5763 
    5764 
    5765 <a class="EntryGoto" id="Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar"></a>
    5766 <b class="myheading" style="position: relative; left: 5%;">Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar</b>
    5767 
    5768 <div class="BibEntry">
    5769 
    5770 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5771 
    5772 
    5773 <tr>
    5774      <td valign="top">Author</td>
    5775      <td valign="top">Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar</td>
    5776 </tr>
    5777 
    5778 <tr>
    5779      <td valign="top">Title</td>
    5780      <td valign="top">MobilityFirst future internet architecture project</td>
    5781 </tr>
    5782 
    5783 <tr>
    5784      <td valign="top">Booktitle</td>
    5785      <td valign="top">Proceedings of the 7th Asian Internet Engineering Conference</td>
    5786 </tr>
    5787 
    5788 <tr>
    5789      <td valign="top">Location</td>
    5790      <td valign="top">Bangkok, Thailand</td>
    5791 </tr>
    5792 
    5793 <tr>
    5794      <td valign="top">Publisher</td>
    5795      <td valign="top">ACM</td>
    5796 </tr>
    5797 
    5798 <tr>
    5799      <td valign="top">Address</td>
    5800      <td valign="top">New York, NY, USA</td>
    5801 </tr>
    5802 
    5803 <tr>
    5804      <td valign="top">Year</td>
    5805      <td valign="top">2011</td>
    5806 </tr>
    5807 
    5808 <tr>
    5809      <td valign="top">Abstract</td>
    5810      <td valign="top">This short paper presents an overview of the MobilityFirst network architecture, which is a clean-slate project being conducted as part of the NSF Future Internet Architecture (FIA) program. The proposed architecture is intended to directly address the challenges of wireless access and mobility at scale, while also providing new multicast, anycast, multi-path and context-aware services needed for emerging mobile Internet application scenarios. Key protocol components of the proposed architecture are: (a) separation of naming from addressing; (b) public key based self-certifying names (called globally unique identifiers or GUIDs) for network-attached objects; (c) global name resolution service (GNRS) for dynamic name-to-address binding; (d) delay-tolerant and storage-aware routing (GSTAR) capable of dealing with wireless link quality fluctuations and disconnections; (e) hop-by-hop transport of large protocol data units; and (f) location or context-aware services. The basic operations of a MobilityFirst router are outlined. This is followed by a discussion of ongoing proof-of-concept prototyping and experimental evaluation efforts for the MobilityFirst protocol stack. In conclusion, a brief description of an ongoing multi-site experimental deployment of the MobilityFirst protocol stack on the GENI testbed is provided.</td>
    5811 </tr>
    5812 
    5813 
    5814 
    5815 <tr>
    5816      <td valign="top">DOI</td>
    5817      <td valign="top">10.1145/2089016.2089017</td>
    5818 </tr>
    5819 
    5820 
    5821 
    5822 <tr>
    5823      <td valign="top">URL</td>
    5824      <td valign="top"><a href="http://dx.doi.org/10.1145/2089016.2089017">http://dx.doi.org/10.1145/2089016.2089017</a></td>
    5825 </tr>
    5826 
    5827 
    5828 </table></div><br><br>
    5829 
    5830 
    5831 
    5832 
    5833 <a class="EntryGoto" id="Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant"></a>
    5834 <b class="myheading" style="position: relative; left: 5%;">Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant</b>
    5835 
    5836 <div class="BibEntry">
    5837 
    5838 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5839 
    5840 
    5841 <tr>
    5842      <td valign="top">Author</td>
    5843      <td valign="top">Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant</td>
    5844 </tr>
    5845 
    5846 <tr>
    5847      <td valign="top">Title</td>
    5848      <td valign="top">Cloudy Computing: Leveraging Weather Forecasts in Energy Harvesting Sensor Systems</td>
    5849 </tr>
    5850 
    5851 <tr>
    5852      <td valign="top">Booktitle</td>
    5853      <td valign="top">2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)</td>
    5854 </tr>
    5855 
    5856 <tr>
    5857      <td valign="top">Location</td>
    5858      <td valign="top">Boston, MA, USA</td>
    5859 </tr>
    5860 
    5861 <tr>
    5862      <td valign="top">Publisher</td>
    5863      <td valign="top">IEEE</td>
    5864 </tr>
    5865 
    5866 <tr>
    5867      <td valign="top">Year</td>
    5868      <td valign="top">2010</td>
    5869 </tr>
    5870 
    5871 <tr>
    5872      <td valign="top">Abstract</td>
    5873      <td valign="top">To sustain perpetual operation, systems that harvest environmental energy must carefully regulate their usage to satisfy their demand. Regulating energy usage is challenging if a system's demands are not elastic and its hardware components are not energy-proportional, since it cannot precisely scale its usage to match its supply. Instead, the system must choose when to satisfy its energy demands based on its current energy reserves and predictions of its future energy supply. In this paper, we explore the use of weather forecasts to improve a system's ability to satisfy demand by improving its predictions. We analyze weather forecast, observational, and energy harvesting data to formulate a model that translates a weather forecast to a wind or solar energy harvesting prediction, and quantify its accuracy. We evaluate our model for both energy sources in the context of two different energy harvesting sensor systems with inelastic demands: a sensor testbed that leases sensors to external users and a lexicographically fair sensor network that maintains steady node sensing rates. We show that using weather forecasts in both wind- and solar-powered sensor systems increases each system's ability to satisfy its demands compared with existing prediction strategies.</td>
    5874 </tr>
    5875 
    5876 
    5877 
    5878 <tr>
    5879      <td valign="top">DOI</td>
    5880      <td valign="top">10.1109/SECON.2010.5508260</td>
    5881 </tr>
    5882 
    5883 
    5884 
    5885 <tr>
    5886      <td valign="top">URL</td>
    5887      <td valign="top"><a href="http://dx.doi.org/10.1109/SECON.2010.5508260">http://dx.doi.org/10.1109/SECON.2010.5508260</a></td>
    5888 </tr>
    5889 
    5890 
    5891 </table></div><br><br>
    5892 
    5893 
    5894 
    5895 
    5896 <a class="EntryGoto" id="Shen, Haiying and Liu, Guoxin"></a>
    5897 <b class="myheading" style="position: relative; left: 5%;">Shen, Haiying and Liu, Guoxin</b>
    5898 
    5899 <div class="BibEntry">
    5900 
    5901 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5902 
    5903 
    5904 <tr>
    5905      <td valign="top">Author</td>
    5906      <td valign="top">Shen, Haiying and Liu, Guoxin</td>
    5907 </tr>
    5908 
    5909 <tr>
    5910      <td valign="top">Title</td>
    5911      <td valign="top">Harmony: Integrated Resource and Reputation Management for Large-Scale Distributed Systems</td>
    5912 </tr>
    5913 
    5914 <tr>
    5915      <td valign="top">Booktitle</td>
    5916      <td valign="top">2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)</td>
    5917 </tr>
    5918 
    5919 <tr>
    5920      <td valign="top">Location</td>
    5921      <td valign="top">Lahaina, HI, USA</td>
    5922 </tr>
    5923 
    5924 <tr>
    5925      <td valign="top">Publisher</td>
    5926      <td valign="top">IEEE</td>
    5927 </tr>
    5928 
    5929 <tr>
    5930      <td valign="top">Year</td>
    5931      <td valign="top">2011</td>
    5932 </tr>
    5933 
    5934 <tr>
    5935      <td valign="top">Abstract</td>
    5936      <td valign="top">Advancements in technology over the past decade are leading to a promising future for large-scale distributed systems, where globally-scattered distributed resources are collectively pooled and used in a cooperative manner to achieve unprecedented petascale supercomputing capabilities. The issues of resource management (resMgt) and reputation management (repMgt) need to be addressed in order to ensure the successful deployment of large-scale distributed systems. However, these two issues have typically been addressed separately, despite the significant interdependencies between them: resMgt needs repMgt to provide a cooperative environment for resource sharing, and in turn facilitates repMgt to evaluate multi-faceted node reputations for providing different resources. Current repMgt methods provide a single reputation value for each node in providing all types of resources. However, a node willing to provide one resource may not be willing to provide another resource. In addition, current repMgt methods often guide node selection policy to select the highest-reputed nodes, which may overload these nodes. Also, few works exploited node reputation in resource selection in order to fully and fairly utilize resources in the system and to meet users' diverse QoS demands. We propose a system called Harmony that integrates resMgt and repMgt in a harmonious manner. Harmony incorporates two key innovations: integrated multi-faceted resource/reputation management and multi-QoS-oriented resource selection. The trace data we collected from an online trading platform confirms the importance of multi-faceted reputation and potential problems with highest-reputed node selection. Trace-driven experiments performed on PlanetLab show that Harmony outperforms existing resMgt and repMgt in terms of the success rate, service delay, and efficiency.</td>
    5937 </tr>
    5938 
    5939 
    5940 
    5941 <tr>
    5942      <td valign="top">DOI</td>
    5943      <td valign="top">10.1109/ICCCN.2011.6005739</td>
    5944 </tr>
    5945 
    5946 
    5947 
    5948 <tr>
    5949      <td valign="top">URL</td>
    5950      <td valign="top"><a href="http://dx.doi.org/10.1109/ICCCN.2011.6005739">http://dx.doi.org/10.1109/ICCCN.2011.6005739</a></td>
    5951 </tr>
    5952 
    5953 
    5954 </table></div><br><br>
    5955 
    5956 
    5957 
    5958 
    5959 <a class="EntryGoto" id="Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young"></a>
    5960 <b class="myheading" style="position: relative; left: 5%;">Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young</b>
    5961 
    5962 <div class="BibEntry">
    5963 
    5964 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5965 
    5966 
    5967 <tr>
    5968      <td valign="top">Author</td>
    5969      <td valign="top">Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young</td>
    5970 </tr>
    5971 
    5972 <tr>
    5973      <td valign="top">Title</td>
    5974      <td valign="top">Understanding the Performance of TCP and UDP-based Data Transfer Protocols using EMULAB</td>
    5975 </tr>
    5976 
    5977 <tr>
    5978      <td valign="top">Booktitle</td>
    5979      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    5980 </tr>
    5981 
    5982 <tr>
    5983      <td valign="top">Location</td>
    5984      <td valign="top">Los Angeles</td>
    5985 </tr>
    5986 
    5987 <tr>
    5988      <td valign="top">Year</td>
    5989      <td valign="top">2012</td>
    5990 </tr>
    5991 
    5992 <tr>
    5993      <td valign="top">Abstract</td>
    5994      <td valign="top">In this paper, we present a hands-on course project that explores the performance of data transfer protocols using a GENI resource. TCP is one of the key topics in networking courses, and understanding its behavior as well as limitations, from real experiments, offers an invaluable and deep learning experience. A protocol's performance is directly impacted by network parameters such as network bandwidth, delay and loss. However, it is difficult to control and even vary those parameters, if it is not evaluated with simulations. GENI facilities conveniently provide a virtual laboratory that enables us to control the network settings with real network systems. Through this educational project, students had an opportunity to control important network parameters, and measure and compare TCP's performance with a UDP-based data transfer protocol, UDT, using EMULAB. Students were enthusiastic to witness the protocols' performances, and the limitations of TCP under a high bandwidth delay product network in the presence of packet loss, and to recognize the importance of protocol design and system issues for the future Internet.</td>
    5995 </tr>
    5996 
    5997 
    5998 
    5999 
    6000 
    6001 
    6002 </table></div><br><br>
    6003 
    6004 
    6005 <div class="BibEntry">
    6006 
    6007 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6008 
    6009 
    6010 <tr>
    6011      <td valign="top">Author</td>
    6012      <td valign="top">Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young</td>
    6013 </tr>
    6014 
    6015 <tr>
    6016      <td valign="top">Title</td>
    6017      <td valign="top">Understanding the Performance of TCP and UDP-based Data Transfer Protocols using EMULAB</td>
    6018 </tr>
    6019 
    6020 <tr>
    6021      <td valign="top">Booktitle</td>
    6022      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    6023 </tr>
    6024 
    6025 <tr>
    6026      <td valign="top">Location</td>
    6027      <td valign="top">Los Angeles</td>
    6028 </tr>
    6029 
    6030 <tr>
    6031      <td valign="top">Year</td>
    6032      <td valign="top">2012</td>
    6033 </tr>
    6034 
    6035 <tr>
    6036      <td valign="top">Abstract</td>
    6037      <td valign="top">In this paper, we present a hands-on course project that explores the performance of data transfer protocols using a GENI resource. TCP is one of the key topics in networking courses, and understanding its behavior as well as limitations, from real experiments, offers an invaluable and deep learning experience. A protocol's performance is directly impacted by network parameters such as network bandwidth, delay and loss. However, it is difficult to control and even vary those parameters, if it is not evaluated with simulations. GENI facilities conveniently provide a virtual laboratory that enables us to control the network settings with real network systems. Through this educational project, students had an opportunity to control important network parameters, and measure and compare TCP's performance with a UDP-based data transfer protocol, UDT, using EMULAB. Students were enthusiastic to witness the protocols' performances, and the limitations of TCP under a high bandwidth delay product network in the presence of packet loss, and to recognize the importance of protocol design and system issues for the future Internet.</td>
    6038 </tr>
    6039 
    6040 
    6041 
    6042 
    6043 
    6044 
    6045 </table></div><br><br>
    6046 
    6047 
    6048 
    6049 
    6050 <a class="EntryGoto" id="Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay"></a>
    6051 <b class="myheading" style="position: relative; left: 5%;">Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay</b>
    6052 
    6053 <div class="BibEntry">
    6054 
    6055 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6056 
    6057 
    6058 <tr>
    6059      <td valign="top">Author</td>
    6060      <td valign="top">Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay</td>
    6061 </tr>
    6062 
    6063 <tr>
    6064      <td valign="top">Title</td>
    6065      <td valign="top">Closer to the Cloud - A Case for Emulating Cloud Dynamics by Controlling the Environment</td>
    6066 </tr>
    6067 
    6068 <tr>
    6069      <td valign="top">Booktitle</td>
    6070      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    6071 </tr>
    6072 
    6073 <tr>
    6074      <td valign="top">Location</td>
    6075      <td valign="top">Los Angeles</td>
    6076 </tr>
    6077 
    6078 <tr>
    6079      <td valign="top">Year</td>
    6080      <td valign="top">2012</td>
    6081 </tr>
    6082 
    6083 
    6084 
    6085 
    6086 
    6087 
    6088 </table></div><br><br>
    6089 
    6090 
    6091 <div class="BibEntry">
    6092 
    6093 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6094 
    6095 
    6096 <tr>
    6097      <td valign="top">Author</td>
    6098      <td valign="top">Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay</td>
    6099 </tr>
    6100 
    6101 <tr>
    6102      <td valign="top">Title</td>
    6103      <td valign="top">Closer to the Cloud - A Case for Emulating Cloud Dynamics by Controlling the Environment</td>
    6104 </tr>
    6105 
    6106 <tr>
    6107      <td valign="top">Booktitle</td>
    6108      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    6109 </tr>
    6110 
    6111 <tr>
    6112      <td valign="top">Location</td>
    6113      <td valign="top">Los Angeles</td>
    6114 </tr>
    6115 
    6116 <tr>
    6117      <td valign="top">Year</td>
    6118      <td valign="top">2012</td>
    6119 </tr>
    6120 
    6121 
    6122 
    6123 
    6124 
    6125 
    6126 </table></div><br><br>
    6127 
    6128 
    6129 
    6130 
    6131 <a class="EntryGoto" id="Soroush, Hamed and Banerjee, Nilanjan and Corner, Mark and Levine, Brian and Lynn, Brian"></a>
    6132 <b class="myheading" style="position: relative; left: 5%;">Soroush, Hamed and Banerjee, Nilanjan and Corner, Mark and Levine, Brian and Lynn, Brian</b>
    6133 
    6134 <div class="BibEntry">
    6135 
    6136 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6137 
    6138 
    6139 <tr>
    6140      <td valign="top">Author</td>
    6141      <td valign="top">Soroush, Hamed and Banerjee, Nilanjan and Corner, Mark and Levine, Brian and Lynn, Brian</td>
    6142 </tr>
    6143 
    6144 <tr>
    6145      <td valign="top">Title</td>
    6146      <td valign="top">A retrospective look at the UMass DOME mobile testbed</td>
    6147 </tr>
    6148 
    6149 <tr>
    6150      <td valign="top">Journal</td>
    6151      <td valign="top">SIGMOBILE Mob. Comput. Commun. Rev.</td>
    6152 </tr>
    6153 
    6154 <tr>
    6155      <td valign="top">Publisher</td>
    6156      <td valign="top">ACM</td>
    6157 </tr>
    6158 
    6159 <tr>
    6160      <td valign="top">Address</td>
    6161      <td valign="top">New York, NY, USA</td>
    6162 </tr>
    6163 
    6164 <tr>
    6165      <td valign="top">Year</td>
    6166      <td valign="top">2012</td>
    6167 </tr>
    6168 
    6169 <tr>
    6170      <td valign="top">Abstract</td>
    6171      <td valign="top">In this paper we describe the evolution of DOME, a diverse outdoor testbed for mobile experimentation. In addition, while highlighting the challenges faced in construction of DOME, we describe a concrete set of scientific results derived from this experience in a retrospective study. First, we argue that a broad range of mobility experiments could be performed in a testbed which provides the properties of temporal, technological, and spatial diversity. We demonstrate these properties in our testbed through analysis of data collected from DOME over a period of four years. Second, we crystallize a set of design principles that others should use when constructing testbeds of their own, including those related to deploying and managing a diverse testbed, distributing experiments remotely, and fostering collaborations among testbed stakeholders. Finally, using traces collected by DOME, we provide insights into several important problems in mobile systems research.</td>
    6172 </tr>
    6173 
    6174 
    6175 
    6176 <tr>
    6177      <td valign="top">DOI</td>
    6178      <td valign="top">10.1145/2169077.2169079</td>
    6179 </tr>
    6180 
    6181 
    6182 
    6183 <tr>
    6184      <td valign="top">URL</td>
    6185      <td valign="top"><a href="http://dx.doi.org/10.1145/2169077.2169079">http://dx.doi.org/10.1145/2169077.2169079</a></td>
    6186 </tr>
    6187 
    6188 
    6189 </table></div><br><br>
    6190 
    6191 
    6192 
    6193 
    6194 <a class="EntryGoto" id="Sridharan, Mukundan and Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex"></a>
    6195 <b class="myheading" style="position: relative; left: 5%;">Sridharan, Mukundan and Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex</b>
    6196 
    6197 <div class="BibEntry">
    6198 
    6199 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6200 
    6201 
    6202 <tr>
    6203      <td valign="top">Author</td>
    6204      <td valign="top">Sridharan, Mukundan and Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex</td>
    6205 </tr>
    6206 
    6207 <tr>
    6208      <td valign="top">Title</td>
    6209      <td valign="top">Defragmentation of Resources in Virtual Desktop Clouds for Cost-Aware Utility-Optimal Allocation</td>
    6210 </tr>
    6211 
    6212 <tr>
    6213      <td valign="top">Booktitle</td>
    6214      <td valign="top">2011 Fourth IEEE International Conference on Utility and Cloud Computing</td>
    6215 </tr>
    6216 
    6217 <tr>
    6218      <td valign="top">Location</td>
    6219      <td valign="top">Melbourne, Australia</td>
    6220 </tr>
    6221 
    6222 <tr>
    6223      <td valign="top">Publisher</td>
    6224      <td valign="top">IEEE</td>
    6225 </tr>
    6226 
    6227 <tr>
    6228      <td valign="top">Year</td>
    6229      <td valign="top">2011</td>
    6230 </tr>
    6231 
    6232 <tr>
    6233      <td valign="top">Abstract</td>
    6234      <td valign="top">Cloud Service Providers (CSPs) make virtual desktop cloud (VDC) resource provisioning decisions within desktop pools based on user groups and their application profiles. Such provisioning is aimed to satisfy acceptable user quality of experience (QoE) levels and is coupled with subsequent placement of VDs across distributed data centers. The placement decisions are influenced by session latency, load balancing and operation cost constraints. In this paper, we identify the resource fragmentation problem that occurs when placement is done opportunistically to minimize provisioning time and deliver satisfactory user QoE. To solve this problem, which inherently is an NP-Hard problem, we propose a defragmentation scheme that has fast convergence time and has three levels of complexity: (i) &#x75;&#x0308;tility fair provisioning&#x20;&#x0308;(UFP) to optimize resource provisioning within a data center - to achieve relative fairness between desktop pools, (ii) &#x73;&#x0308;tatic migration-free utility optimal placement and provisioning&#x20;&#x0308;(MUPP) to optimize resource provisioning between multiple data centers - to improve performance, and (iii) &#x64;&#x0308;ynamic global utility optimal placement and provisioning&#x20;&#x0308;(GUPP) to optimize resource provisioning using cost-aware and utility-maximal VD re-allocations and migrations - to increase scalability. We evaluate our defragmentation scheme against 'least latency', 'least load', and 'least cost' schemes using a novel &#x56;&#x0308;DC-Sim&#x20;&#x0308;simulator that we have developed in this study. Our simulations leverage profiles of user groups and their applications within desktop pools, obtained from a real VDC test bed. Our simulation results demonstrate that defragmentation is an important optimization step that can enable CSPs to achieve fairness, substantially improve user QoE and increase VDC scalability.</td>
    6235 </tr>
    6236 
    6237 
    6238 
    6239 <tr>
    6240      <td valign="top">DOI</td>
    6241      <td valign="top">10.1109/UCC.2011.41</td>
    6242 </tr>
    6243 
    6244 
    6245 
    6246 <tr>
    6247      <td valign="top">URL</td>
    6248      <td valign="top"><a href="http://dx.doi.org/10.1109/UCC.2011.41">http://dx.doi.org/10.1109/UCC.2011.41</a></td>
    6249 </tr>
    6250 
    6251 
    6252 </table></div><br><br>
    6253 
    6254 
    6255 
    6256 
    6257 <a class="EntryGoto" id="Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish"></a>
    6258 <b class="myheading" style="position: relative; left: 5%;">Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish</b>
    6259 
    6260 <div class="BibEntry">
    6261 
    6262 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6263 
    6264 
    6265 <tr>
    6266      <td valign="top">Author</td>
    6267      <td valign="top">Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish</td>
    6268 </tr>
    6269 
    6270 <tr>
    6271      <td valign="top">Title</td>
    6272      <td valign="top">From Kansei to KanseiGenie: Architecture of Federated, Programmable Wireless Sensor Fabrics</td>
    6273 </tr>
    6274 
    6275 <tr>
    6276      <td valign="top">Journal</td>
    6277      <td valign="top">Proceedings of the ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)</td>
    6278 </tr>
    6279 
    6280 <tr>
    6281      <td valign="top">Year</td>
    6282      <td valign="top">2010</td>
    6283 </tr>
    6284 
    6285 <tr>
    6286      <td valign="top">Abstract</td>
    6287      <td valign="top">This paper deals with challenges in federating wireless sensing fabrics. Federations of this sort are currently being developed in next generation global end-to-end experimentation infrastructures, such as GENI, to support rapid prototyping and hi-fidelity validation of protocols and applications. On one hand, federation should support access to diverse (and potentially provider-specific) wireless sensor resources and, on the other, it should enable users to uniformly task these resources. Instead of more simple basing federation upon a standard description of resources, we propose an architecture where the ontology of resource description can vary across providers, and a mapping of user needs to resources is performed to achieve uniform tasking. We illustrate one realization of this architecture, in terms of our refactoring the Kansei testbed to become the KanseiGenie federated fabric manager, which has full support for programmability, sliceability, and federated experimentation over heterogeneous sensing fabrics.</td>
    6288 </tr>
    6289 
    6290 
    6291 
    6292 
    6293 
    6294 
    6295 </table></div><br><br>
    6296 
    6297 
    6298 <div class="BibEntry">
    6299 
    6300 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6301 
    6302 
    6303 <tr>
    6304      <td valign="top">Author</td>
    6305      <td valign="top">Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish</td>
    6306 </tr>
    6307 
    6308 <tr>
    6309      <td valign="top">Title</td>
    6310      <td valign="top">From Kansei to KanseiGenie: Architecture of Federated, Programmable Wireless Sensor Fabrics</td>
    6311 </tr>
    6312 
    6313 <tr>
    6314      <td valign="top">Journal</td>
    6315      <td valign="top">Proceedings of the ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)</td>
    6316 </tr>
    6317 
    6318 <tr>
    6319      <td valign="top">Year</td>
    6320      <td valign="top">2010</td>
    6321 </tr>
    6322 
    6323 <tr>
    6324      <td valign="top">Abstract</td>
    6325      <td valign="top">This paper deals with challenges in federating wireless sensing fabrics. Federations of this sort are currently being developed in next generation global end-to-end experimentation infrastructures, such as GENI, to support rapid prototyping and hi-fidelity validation of protocols and applications. On one hand, federation should support access to diverse (and potentially provider-specific) wireless sensor resources and, on the other, it should enable users to uniformly task these resources. Instead of more simple basing federation upon a standard description of resources, we propose an architecture where the ontology of resource description can vary across providers, and a mapping of user needs to resources is performed to achieve uniform tasking. We illustrate one realization of this architecture, in terms of our refactoring the Kansei testbed to become the KanseiGenie federated fabric manager, which has full support for programmability, sliceability, and federated experimentation over heterogeneous sensing fabrics.</td>
    6326 </tr>
    6327 
    6328 
    6329 
    6330 
    6331 
    6332 
    6333 </table></div><br><br>
    6334 
    6335 
    6336 
    6337 
    6338 <a class="EntryGoto" id="Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching"></a>
    6339 <b class="myheading" style="position: relative; left: 5%;">Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching</b>
    6340 
    6341 <div class="BibEntry">
    6342 
    6343 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6344 
    6345 
    6346 <tr>
    6347      <td valign="top">Author</td>
    6348      <td valign="top">Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching</td>
    6349 </tr>
    6350 
    6351 <tr>
    6352      <td valign="top">Title</td>
    6353      <td valign="top">OneCloud: Controlling the Network in an OpenFlow Cloud</td>
    6354 </tr>
    6355 
    6356 <tr>
    6357      <td valign="top">Booktitle</td>
    6358      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    6359 </tr>
    6360 
    6361 <tr>
    6362      <td valign="top">Location</td>
    6363      <td valign="top">Los Angeles</td>
    6364 </tr>
    6365 
    6366 <tr>
    6367      <td valign="top">Year</td>
    6368      <td valign="top">2012</td>
    6369 </tr>
    6370 
    6371 <tr>
    6372      <td valign="top">Abstract</td>
    6373      <td valign="top">Cloud computing is an emerging paradigm for on-demand access to computing resources over the network. Beyond early Software as a Service (SaaS) offerings, there is an increasing interest in the Infrastructure as a Service (IaaS) model where users request specific storage, networking, and computing resources to meet their application needs. To provision the network in a cloud, IaaS providers, such as the Amazon Web Services, allow users to choose their IP addresses, which can be associated with a dynamic set of virtual hosts (Elastic IP) with VPN, dynamic DNS, and dynamic firewall services. In this paper, we analyze a range of cloud network provisioning needs and the means to realize them in an OpenFlow network. We present an OpenFlow enabled framework for cloud network provisioning, based on the Open- Nebula cloud provisioning engine. Specifically, we demonstrate an Elastic IP service compatible with the Amazon Elastic Compute Cloud (EC2) API. This demonstration is available on the Clemson OneCloud IaaS offering. Ongoing efforts focus on the enablement of additional cloud network services for campus networks and wide area experimental networks like the National Science Foundation's GENI network.</td>
    6374 </tr>
    6375 
    6376 
    6377 
    6378 
    6379 
    6380 
    6381 </table></div><br><br>
    6382 
    6383 
    6384 <div class="BibEntry">
    6385 
    6386 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6387 
    6388 
    6389 <tr>
    6390      <td valign="top">Author</td>
    6391      <td valign="top">Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching</td>
    6392 </tr>
    6393 
    6394 <tr>
    6395      <td valign="top">Title</td>
    6396      <td valign="top">OneCloud: Controlling the Network in an OpenFlow Cloud</td>
    6397 </tr>
    6398 
    6399 <tr>
    6400      <td valign="top">Booktitle</td>
    6401      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    6402 </tr>
    6403 
    6404 <tr>
    6405      <td valign="top">Location</td>
    6406      <td valign="top">Los Angeles</td>
    6407 </tr>
    6408 
    6409 <tr>
    6410      <td valign="top">Year</td>
    6411      <td valign="top">2012</td>
    6412 </tr>
    6413 
    6414 <tr>
    6415      <td valign="top">Abstract</td>
    6416      <td valign="top">Cloud computing is an emerging paradigm for on-demand access to computing resources over the network. Beyond early Software as a Service (SaaS) offerings, there is an increasing interest in the Infrastructure as a Service (IaaS) model where users request specific storage, networking, and computing resources to meet their application needs. To provision the network in a cloud, IaaS providers, such as the Amazon Web Services, allow users to choose their IP addresses, which can be associated with a dynamic set of virtual hosts (Elastic IP) with VPN, dynamic DNS, and dynamic firewall services. In this paper, we analyze a range of cloud network provisioning needs and the means to realize them in an OpenFlow network. We present an OpenFlow enabled framework for cloud network provisioning, based on the Open- Nebula cloud provisioning engine. Specifically, we demonstrate an Elastic IP service compatible with the Amazon Elastic Compute Cloud (EC2) API. This demonstration is available on the Clemson OneCloud IaaS offering. Ongoing efforts focus on the enablement of additional cloud network services for campus networks and wide area experimental networks like the National Science Foundation's GENI network.</td>
    6417 </tr>
    6418 
    6419 
    6420 
    6421 
    6422 
    6423 
    6424 </table></div><br><br>
    6425 
    6426 
    6427 
    6428 
    6429 <a class="EntryGoto" id="Stabler, Greg and Rosen, Aaron and Goasguen, Sebastien and Wang, Kuang-Ching"></a>
    6430 <b class="myheading" style="position: relative; left: 5%;">Stabler, Greg and Rosen, Aaron and Goasguen, Sebastien and Wang, Kuang-Ching</b>
    6431 
    6432 <div class="BibEntry">
    6433 
    6434 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6435 
    6436 
    6437 <tr>
    6438      <td valign="top">Author</td>
    6439      <td valign="top">Stabler, Greg and Rosen, Aaron and Goasguen, Sebastien and Wang, Kuang-Ching</td>
    6440 </tr>
    6441 
    6442 <tr>
    6443      <td valign="top">Title</td>
    6444      <td valign="top">Elastic IP and security groups implementation using OpenFlow</td>
    6445 </tr>
    6446 
    6447 <tr>
    6448      <td valign="top">Booktitle</td>
    6449      <td valign="top">Proceedings of the 6th international workshop on Virtualization Technologies in Distributed Computing Date</td>
    6450 </tr>
    6451 
    6452 <tr>
    6453      <td valign="top">Location</td>
    6454      <td valign="top">Delft, The Netherlands</td>
    6455 </tr>
    6456 
    6457 <tr>
    6458      <td valign="top">Publisher</td>
    6459      <td valign="top">ACM</td>
    6460 </tr>
    6461 
    6462 <tr>
    6463      <td valign="top">Address</td>
    6464      <td valign="top">New York, NY, USA</td>
    6465 </tr>
    6466 
    6467 <tr>
    6468      <td valign="top">Year</td>
    6469      <td valign="top">2012</td>
    6470 </tr>
    6471 
    6472 
    6473 
    6474 <tr>
    6475      <td valign="top">DOI</td>
    6476      <td valign="top">10.1145/2287056.2287069</td>
    6477 </tr>
    6478 
    6479 
    6480 
    6481 <tr>
    6482      <td valign="top">URL</td>
    6483      <td valign="top"><a href="http://doi.acm.org/10.1145/2287056.2287069">http://doi.acm.org/10.1145/2287056.2287069</a></td>
    6484 </tr>
    6485 
    6486 
    6487 </table></div><br><br>
    6488 
    6489 
    6490 
    6491 
    6492 <a class="EntryGoto" id="Sterbenz, J. P. G. and Egemen and Hameed, M. A. and Jabbar, A. and Rohrer, J. P."></a>
    6493 <b class="myheading" style="position: relative; left: 5%;">Sterbenz, J. P. G. and Egemen and Hameed, M. A. and Jabbar, A. and Rohrer, J. P.</b>
    6494 
    6495 <div class="BibEntry">
    6496 
    6497 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6498 
    6499 
    6500 <tr>
    6501      <td valign="top">Author</td>
    6502      <td valign="top">Sterbenz, J. P. G. and Egemen and Hameed, M. A. and Jabbar, A. and Rohrer, J. P.</td>
    6503 </tr>
    6504 
    6505 <tr>
    6506      <td valign="top">Title</td>
    6507      <td valign="top">Modelling and analysis of network resilience</td>
    6508 </tr>
    6509 
    6510 <tr>
    6511      <td valign="top">Booktitle</td>
    6512      <td valign="top">2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)</td>
    6513 </tr>
    6514 
    6515 <tr>
    6516      <td valign="top">Location</td>
    6517      <td valign="top">Bangalore</td>
    6518 </tr>
    6519 
    6520 <tr>
    6521      <td valign="top">Publisher</td>
    6522      <td valign="top">IEEE</td>
    6523 </tr>
    6524 
    6525 <tr>
    6526      <td valign="top">Year</td>
    6527      <td valign="top">2011</td>
    6528 </tr>
    6529 
    6530 <tr>
    6531      <td valign="top">Abstract</td>
    6532      <td valign="top">As the Internet becomes increasingly important to all aspects of society, the consequences of disruption become increasingly severe. Thus it is critical to increase the resilience and survivability of the future network. We define resilience as the ability of the network to provide desired service even when challenged by attacks, large-scale disasters, and other failures. This paper describes a comprehensive methodology to evaluate network resilience using a combination of analytical and simulation techniques with the goal of improving the resilience and survivability of the Future Internet.</td>
    6533 </tr>
    6534 
    6535 
    6536 
    6537 <tr>
    6538      <td valign="top">DOI</td>
    6539      <td valign="top">10.1109/COMSNETS.2011.5716502</td>
    6540 </tr>
    6541 
    6542 
    6543 
    6544 <tr>
    6545      <td valign="top">URL</td>
    6546      <td valign="top"><a href="http://dx.doi.org/10.1109/COMSNETS.2011.5716502">http://dx.doi.org/10.1109/COMSNETS.2011.5716502</a></td>
    6547 </tr>
    6548 
    6549 
    6550 </table></div><br><br>
    6551 
    6552 
    6553 
    6554 
    6555 <a class="EntryGoto" id="Sterbenz, James P. G. and &#x43;&#x0327;etinkaya, Egemen K. and Hameed, Mahmood A. and Jabbar, Abdul and Qian, Shi and Rohrer, Justin P."></a>
    6556 <b class="myheading" style="position: relative; left: 5%;">Sterbenz, James P. G. and &#x43;&#x0327;etinkaya, Egemen K. and Hameed, Mahmood A. and Jabbar, Abdul and Qian, Shi and Rohrer, Justin P.</b>
    6557 
    6558 <div class="BibEntry">
    6559 
    6560 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6561 
    6562 
    6563 <tr>
    6564      <td valign="top">Author</td>
    6565      <td valign="top">Sterbenz, James P. G. and &#x43;&#x0327;etinkaya, Egemen K. and Hameed, Mahmood A. and Jabbar, Abdul and Qian, Shi and Rohrer, Justin P.</td>
    6566 </tr>
    6567 
    6568 <tr>
    6569      <td valign="top">Title</td>
    6570      <td valign="top">Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation</td>
    6571 </tr>
    6572 
    6573 <tr>
    6574      <td valign="top">Journal</td>
    6575      <td valign="top">Telecommunication Systems</td>
    6576 </tr>
    6577 
    6578 <tr>
    6579      <td valign="top">Publisher</td>
    6580      <td valign="top">Springer Netherlands</td>
    6581 </tr>
    6582 
    6583 <tr>
    6584      <td valign="top">Year</td>
    6585      <td valign="top">2011</td>
    6586 </tr>
    6587 
    6588 <tr>
    6589      <td valign="top">Abstract</td>
    6590      <td valign="top">As the Internet becomes increasingly important to all aspects of society, the consequences of disruption become increasingly severe. Thus it is critical to increase the resilience and survivability of future networks. We define resilience as the ability of the network to provide desired service even when challenged by attacks, large-scale disasters, and other failures. This paper describes a comprehensive methodology to evaluate network resilience using a combination of topology generation, analytical, simulation, and experimental emulation techniques with the goal of improving the resilience and survivability of the Future Internet.</td>
    6591 </tr>
    6592 
    6593 
    6594 
    6595 <tr>
    6596      <td valign="top">DOI</td>
    6597      <td valign="top">10.1007/s11235-011-9573-6</td>
    6598 </tr>
    6599 
    6600 
    6601 
    6602 <tr>
    6603      <td valign="top">URL</td>
    6604      <td valign="top"><a href="http://dx.doi.org/10.1007/s11235-011-9573-6">http://dx.doi.org/10.1007/s11235-011-9573-6</a></td>
    6605 </tr>
    6606 
    6607 
    6608 </table></div><br><br>
    6609 
    6610 
    6611 
    6612 
    6613 <a class="EntryGoto" id="Sydney, A. and Nutaro, J. and Scoglio, C. and Gruenbacher, D. and Schulz, N."></a>
    6614 <b class="myheading" style="position: relative; left: 5%;">Sydney, A. and Nutaro, J. and Scoglio, C. and Gruenbacher, D. and Schulz, N.</b>
    6615 
    6616 <div class="BibEntry">
    6617 
    6618 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6619 
    6620 
    6621 <tr>
    6622      <td valign="top">Author</td>
    6623      <td valign="top">Sydney, A. and Nutaro, J. and Scoglio, C. and Gruenbacher, D. and Schulz, N.</td>
    6624 </tr>
    6625 
    6626 <tr>
    6627      <td valign="top">Title</td>
    6628      <td valign="top">Simulative Comparison of Multiprotocol Label Switching and OpenFlow Network Technologies for Transmission Operations</td>
    6629 </tr>
    6630 
    6631 <tr>
    6632      <td valign="top">Journal</td>
    6633      <td valign="top">Smart Grid, IEEE Transactions on</td>
    6634 </tr>
    6635 
    6636 <tr>
    6637      <td valign="top">Year</td>
    6638      <td valign="top">2013</td>
    6639 </tr>
    6640 
    6641 
    6642 
    6643 <tr>
    6644      <td valign="top">DOI</td>
    6645      <td valign="top">10.1109/TSG.2012.2227516</td>
    6646 </tr>
    6647 
    6648 
    6649 
    6650 <tr>
    6651      <td valign="top">URL</td>
    6652      <td valign="top"><a href="http://dx.doi.org/10.1109/TSG.2012.2227516">http://dx.doi.org/10.1109/TSG.2012.2227516</a></td>
    6653 </tr>
    6654 
    6655 
    6656 </table></div><br><br>
    6657 
    6658 
    6659 
    6660 
    6661 <a class="EntryGoto" id="Sydney, Ali"></a>
    6662 <b class="myheading" style="position: relative; left: 5%;">Sydney, Ali</b>
    6663 
    6664 <div class="BibEntry">
    6665 
    6666 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6667 
    6668 
    6669 <tr>
    6670      <td valign="top">Author</td>
    6671      <td valign="top">Sydney, Ali</td>
    6672 </tr>
    6673 
    6674 <tr>
    6675      <td valign="top">Title</td>
    6676      <td valign="top">The evaluation of software defined networking for communication and control of cyber physical systems</td>
    6677 </tr>
    6678 
    6679 <tr>
    6680      <td valign="top">Year</td>
    6681      <td valign="top">2013</td>
    6682 </tr>
    6683 
    6684 
    6685 
    6686 
    6687 
    6688 <tr>
    6689      <td valign="top">URL</td>
    6690      <td valign="top"><a href="http://hdl.handle.net/2097/15577">http://hdl.handle.net/2097/15577</a></td>
    6691 </tr>
    6692 
    6693 
    6694 </table></div><br><br>
    6695 
    6696 
    6697 
    6698 
    6699 <a class="EntryGoto" id="Teerapittayanon, Surat and Fouli, Kerim and M&#x65;&#x0301;dard, Muriel and Montpetit, Marie-Jos&#x65;&#x0301; and Shi, Xiaomeng and Seskar, Ivan and Gosain, Abhimanyu"></a>
    6700 <b class="myheading" style="position: relative; left: 5%;">Teerapittayanon, Surat and Fouli, Kerim and M&#x65;&#x0301;dard, Muriel and Montpetit, Marie-Jos&#x65;&#x0301; and Shi, Xiaomeng and Seskar, Ivan and Gosain, Abhimanyu</b>
    6701 
    6702 <div class="BibEntry">
    6703 
    6704 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6705 
    6706 
    6707 <tr>
    6708      <td valign="top">Author</td>
    6709      <td valign="top">Teerapittayanon, Surat and Fouli, Kerim and M&#x65;&#x0301;dard, Muriel and Montpetit, Marie-Jos&#x65;&#x0301; and Shi, Xiaomeng and Seskar, Ivan and Gosain, Abhimanyu</td>
    6710 </tr>
    6711 
    6712 <tr>
    6713      <td valign="top">Title</td>
    6714      <td valign="top">Network Coding as a WiMAX Link Reliability Mechanism</td>
    6715 </tr>
    6716 
    6717 <tr>
    6718      <td valign="top">Booktitle</td>
    6719      <td valign="top">Multiple Access Communications</td>
    6720 </tr>
    6721 
    6722 <tr>
    6723      <td valign="top">Publisher</td>
    6724      <td valign="top">Springer Berlin Heidelberg</td>
    6725 </tr>
    6726 
    6727 <tr>
    6728      <td valign="top">Year</td>
    6729      <td valign="top">2012</td>
    6730 </tr>
    6731 
    6732 <tr>
    6733      <td valign="top">Abstract</td>
    6734      <td valign="top">We design and implement a network-coding-enabled relia- bility architecture for next generation wireless networks. Our network coding (NC) architecture uses a flexible thread-based design, with each encoder-decoder instance applying systematic intra-session random lin- ear network coding as a packet erasure code at the IP layer. Using GENI WiMAX platforms, a series of point-to-point transmission experiments were conducted to compare the performance of the NC architecture to that of the Automatic Repeated reQuest (ARQ) and Hybrid ARQ (HARQ) mechanisms. In our scenarios, the proposed architecture is able to decrease packet loss from around 11-32&#x0025; to nearly 0&#x0025;; compared to HARQ and joint HARQ/ARQ mechanisms, the NC architecture offers up to 5.9 times gain in throughput and 5.5 times reduction in end-to- end file transfer delay. By establishing NC as a potential substitute for HARQ/ARQ, our experiments offer important insights into cross-layer designs of next generation wireless networks.</td>
    6735 </tr>
    6736 
    6737 
    6738 
    6739 <tr>
    6740      <td valign="top">DOI</td>
    6741      <td valign="top">10.1007/978-3-642-34976-8&#x005F;1</td>
    6742 </tr>
    6743 
    6744 
    6745 
    6746 <tr>
    6747      <td valign="top">URL</td>
    6748      <td valign="top"><a href="http://dx.doi.org/10.1007/978-3-642-34976-8&#x005F;1">http://dx.doi.org/10.1007/978-3-642-34976-8&#x005F;1</a></td>
    6749 </tr>
    6750 
    6751 
    6752 </table></div><br><br>
    6753 
    6754 
    6755 <div class="BibEntry">
    6756 
    6757 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6758 
    6759 
    6760 <tr>
    6761      <td valign="top">Author</td>
    6762      <td valign="top">Teerapittayanon, Surat and Fouli, Kerim and M&#x65;&#x0301;dard, Muriel and Montpetit, Marie-Jos&#x65;&#x0301; and Shi, Xiaomeng and Seskar, Ivan and Gosain, Abhimanyu</td>
    6763 </tr>
    6764 
    6765 <tr>
    6766      <td valign="top">Title</td>
    6767      <td valign="top">Network Coding as a WiMAX Link Reliability Mechanism</td>
    6768 </tr>
    6769 
    6770 <tr>
    6771      <td valign="top">Booktitle</td>
    6772      <td valign="top">Multiple Access Communications</td>
    6773 </tr>
    6774 
    6775 <tr>
    6776      <td valign="top">Publisher</td>
    6777      <td valign="top">Springer Berlin Heidelberg</td>
    6778 </tr>
    6779 
    6780 <tr>
    6781      <td valign="top">Year</td>
    6782      <td valign="top">2012</td>
    6783 </tr>
    6784 
    6785 <tr>
    6786      <td valign="top">Abstract</td>
    6787      <td valign="top">We design and implement a network-coding-enabled relia- bility architecture for next generation wireless networks. Our network coding (NC) architecture uses a flexible thread-based design, with each encoder-decoder instance applying systematic intra-session random lin- ear network coding as a packet erasure code at the IP layer. Using GENI WiMAX platforms, a series of point-to-point transmission experiments were conducted to compare the performance of the NC architecture to that of the Automatic Repeated reQuest (ARQ) and Hybrid ARQ (HARQ) mechanisms. In our scenarios, the proposed architecture is able to decrease packet loss from around 11-32&#x0025; to nearly 0&#x0025;; compared to HARQ and joint HARQ/ARQ mechanisms, the NC architecture offers up to 5.9 times gain in throughput and 5.5 times reduction in end-to- end file transfer delay. By establishing NC as a potential substitute for HARQ/ARQ, our experiments offer important insights into cross-layer designs of next generation wireless networks.</td>
    6788 </tr>
    6789 
    6790 
    6791 
    6792 <tr>
    6793      <td valign="top">DOI</td>
    6794      <td valign="top">10.1007/978-3-642-34976-8&#x005F;1</td>
    6795 </tr>
    6796 
    6797 
    6798 
    6799 <tr>
    6800      <td valign="top">URL</td>
    6801      <td valign="top"><a href="http://dx.doi.org/10.1007/978-3-642-34976-8&#x005F;1">http://dx.doi.org/10.1007/978-3-642-34976-8&#x005F;1</a></td>
    6802 </tr>
    6803 
    6804 
    6805 </table></div><br><br>
    6806 
    6807 
    6808 
    6809 
    6810 <a class="EntryGoto" id="Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark"></a>
    6811 <b class="myheading" style="position: relative; left: 5%;">Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark</b>
    6812 
    6813 <div class="BibEntry">
    6814 
    6815 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6816 
    6817 
    6818 <tr>
    6819      <td valign="top">Author</td>
    6820      <td valign="top">Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark</td>
    6821 </tr>
    6822 
    6823 <tr>
    6824      <td valign="top">Title</td>
    6825      <td valign="top">A Passive Measurement System for Network Testbeds</td>
    6826 </tr>
    6827 
    6828 <tr>
    6829      <td valign="top">Booktitle</td>
    6830      <td valign="top">8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2012)</td>
    6831 </tr>
    6832 
    6833 <tr>
    6834      <td valign="top">Year</td>
    6835      <td valign="top">2012</td>
    6836 </tr>
    6837 
    6838 <tr>
    6839      <td valign="top">Abstract</td>
    6840      <td valign="top">The ability to capture and process packet-level data is of intrinsic importance in network testbeds that offer broad experimental capabilities to researchers. In this paper we describe the design and implementation of a passive measurement system for network testbeds called GIMS. The system enables users to specify and centrally manage packet capture on a set of dedicated measurement nodes deployed on links in a distributed testbed. The first component of GIMS is a scalable experiment management system that coordinates multi-tenant access to measurement nodes through a web-based user interface. The second component of GIMS is a node management system that enables \\\\em (i) local processing on packets (\\\\em e.g., flow aggregation and sampling), \\\\em (ii) meta-data to be added to captured packets (\\\\em e.g., timestamps), \\\\em (iii) packet anonymization per local security policy, and \\\\em (iv) flexible data storage including transfer to remote archives. We demonstrate the capabilities of GIMS through a set of micro-benchmarks that specifically highlight the performance of the node management system deployed on a commodity workstation. Our implementations are openly available to the community and our development efforts are on-going.</td>
    6841 </tr>
    6842 
    6843 
    6844 
    6845 
    6846 
    6847 
    6848 </table></div><br><br>
    6849 
    6850 
    6851 
    6852 
    6853 <a class="EntryGoto" id="Tiako, Pierre F."></a>
    6854 <b class="myheading" style="position: relative; left: 5%;">Tiako, Pierre F.</b>
    6855 
    6856 <div class="BibEntry">
    6857 
    6858 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6859 
    6860 
    6861 <tr>
    6862      <td valign="top">Author</td>
    6863      <td valign="top">Tiako, Pierre F.</td>
    6864 </tr>
    6865 
    6866 <tr>
    6867      <td valign="top">Title</td>
    6868      <td valign="top">Perspectives of delegation in team-based distributed software development over the GENI infrastructure (NIER track)</td>
    6869 </tr>
    6870 
    6871 <tr>
    6872      <td valign="top">Booktitle</td>
    6873      <td valign="top">Proceedings of the 33rd International Conference on Software Engineering</td>
    6874 </tr>
    6875 
    6876 <tr>
    6877      <td valign="top">Location</td>
    6878      <td valign="top">Waikiki, Honolulu, HI, USA</td>
    6879 </tr>
    6880 
    6881 <tr>
    6882      <td valign="top">Publisher</td>
    6883      <td valign="top">ACM</td>
    6884 </tr>
    6885 
    6886 <tr>
    6887      <td valign="top">Address</td>
    6888      <td valign="top">New York, NY, USA</td>
    6889 </tr>
    6890 
    6891 <tr>
    6892      <td valign="top">Year</td>
    6893      <td valign="top">2011</td>
    6894 </tr>
    6895 
    6896 <tr>
    6897      <td valign="top">Abstract</td>
    6898      <td valign="top">Team-based distributed software development (TBDSD) is one of the single biggest challenges facing software companies. The need to manage development efforts and resources in different locations increase the complexity and cost of modern day software development. Current software development environments do not provide suitable support to delegate task among teams with appropriate directives. TBDSD is also limited to the current internet capabilities. One of the resulting problems is the difficulty to delegate and control tasks assigned among remote teams. This paper proposes (1) a new framework for delegation in TBDSD, and (2) perspectives for deploying Process-centered Software Engineering Environments (PSEE) over the Global Environment for Network Innovations (GENI) infrastructure. GENI, the 'future Internet' that is taking shape in prototypes across the US, will allow, in the context of our study, to securely access and share software artifacts, resources, and tools as never before seen over the current Internet.</td>
    6899 </tr>
    6900 
    6901 
    6902 
    6903 <tr>
    6904      <td valign="top">DOI</td>
    6905      <td valign="top">10.1145/1985793.1985905</td>
    6906 </tr>
    6907 
    6908 
    6909 
    6910 <tr>
    6911      <td valign="top">URL</td>
    6912      <td valign="top"><a href="http://dx.doi.org/10.1145/1985793.1985905">http://dx.doi.org/10.1145/1985793.1985905</a></td>
    6913 </tr>
    6914 
    6915 
    6916 </table></div><br><br>
    6917 
    6918 
    6919 
    6920 
    6921 <a class="EntryGoto" id="Tredger, Stephen and Zhuang, Yanyan and Matthews, Chris and Short-Gershman, Jesse and Coady, Rick"></a>
    6922 <b class="myheading" style="position: relative; left: 5%;">Tredger, Stephen and Zhuang, Yanyan and Matthews, Chris and Short-Gershman, Jesse and Coady, Rick</b>
    6923 
    6924 <div class="BibEntry">
    6925 
    6926 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6927 
    6928 
    6929 <tr>
    6930      <td valign="top">Author</td>
    6931      <td valign="top">Tredger, Stephen and Zhuang, Yanyan and Matthews, Chris and Short-Gershman, Jesse and Coady, Rick</td>
    6932 </tr>
    6933 
    6934 <tr>
    6935      <td valign="top">Title</td>
    6936      <td valign="top">Building Green Systems with Green Students: An Educational Experiment with GENI Infrastructure</td>
    6937 </tr>
    6938 
    6939 <tr>
    6940      <td valign="top">Booktitle</td>
    6941      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    6942 </tr>
    6943 
    6944 <tr>
    6945      <td valign="top">Location</td>
    6946      <td valign="top">Salt Lake City, UT</td>
    6947 </tr>
    6948 
    6949 <tr>
    6950      <td valign="top">Publisher</td>
    6951      <td valign="top">IEEE</td>
    6952 </tr>
    6953 
    6954 <tr>
    6955      <td valign="top">Year</td>
    6956      <td valign="top">2013</td>
    6957 </tr>
    6958 
    6959 
    6960 
    6961 <tr>
    6962      <td valign="top">DOI</td>
    6963      <td valign="top">10.1109/GREE.2013.15</td>
    6964 </tr>
    6965 
    6966 
    6967 
    6968 <tr>
    6969      <td valign="top">URL</td>
    6970      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.15">http://dx.doi.org/10.1109/GREE.2013.15</a></td>
    6971 </tr>
    6972 
    6973 
    6974 </table></div><br><br>
    6975 
    6976 
    6977 
    6978 
    6979 <a class="EntryGoto" id="Tuncer, Hasan and Nozaki, Yoshihiro and Shenoy, Nirmala"></a>
    6980 <b class="myheading" style="position: relative; left: 5%;">Tuncer, Hasan and Nozaki, Yoshihiro and Shenoy, Nirmala</b>
    6981 
    6982 <div class="BibEntry">
    6983 
    6984 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6985 
    6986 
    6987 <tr>
    6988      <td valign="top">Author</td>
    6989      <td valign="top">Tuncer, Hasan and Nozaki, Yoshihiro and Shenoy, Nirmala</td>
    6990 </tr>
    6991 
    6992 <tr>
    6993      <td valign="top">Title</td>
    6994      <td valign="top">Virtual Mobility Domains - A Mobility Architecture for the Future Internet</td>
    6995 </tr>
    6996 
    6997 <tr>
    6998      <td valign="top">Booktitle</td>
    6999      <td valign="top">IEEE International Conference on Commnunications (IEE ICC 2012) Symposium on Next-Generation Networking</td>
    7000 </tr>
    7001 
    7002 <tr>
    7003      <td valign="top">Year</td>
    7004      <td valign="top">2012</td>
    7005 </tr>
    7006 
    7007 <tr>
    7008      <td valign="top">Abstract</td>
    7009      <td valign="top">This paper presents a novel mobility architecture called Virtual Mobility Domains that is designed to work with the Floating Cloud Tiered Internetworking model. Virtual Mobility Domains supports both inter Autonomous System (macro) and intra Autonomous System (micro) mobility by leveraging a tiered addressing, a network cloud concept, and a unique packet forwarding scheme introduced by the Floating Cloud Tiered Internetworking model. The proposed mobility architecture is distinct from others by not using IP addressing and classic routing protocols, and deploying user-centric overlapping mobility domains. The comparative simulation study of Virtual Mobility Domains against Mobile IPv6, Hierarchical Mobile IPv6, and Proxy Mobile IPv6 using OPNET shows that Virtual Mobility Domains brings lower latency, lesser signaling overhead, and fewer packets loss during handoffs, specially during inter Autonomous System roaming. The results highlight the potential for a seamless mobility management.</td>
    7010 </tr>
    7011 
    7012 
    7013 
    7014 <tr>
    7015      <td valign="top">DOI</td>
    7016      <td valign="top">10.1109/ICC.2012.6363872</td>
    7017 </tr>
    7018 
    7019 
    7020 
    7021 <tr>
    7022      <td valign="top">URL</td>
    7023      <td valign="top"><a href="ftp://lesc.det.unifi.it/pub/LenLar/proceedings/2012/ICC2012/symposia/papers/virtual&#x005F;mobility&#x005F;domains&#x005F;-&#x005F;a&#x005F;mobility&#x005F;architecture&#x005F;for&#x005F;the&#x005F;\\_.pdf">ftp://lesc.det.unifi.it/pub/LenLar/proceedings/2012/ICC2012/symposia/papers/virtual&#x005F;mobility&#x005F;domains&#x005F;-&#x005F;a&#x005F;mobility&#x005F;architecture&#x005F;for&#x005F;the&#x005F;\\_.pdf</a></td>
    7024 </tr>
    7025 
    7026 
    7027 </table></div><br><br>
    7028 
    7029 
    7030 <div class="BibEntry">
    7031 
    7032 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    7033 
    7034 
    7035 <tr>
    7036      <td valign="top">Author</td>
    7037      <td valign="top">Tuncer, Hasan and Nozaki, Yoshihiro and Shenoy, Nirmala</td>
    7038 </tr>
    7039 
    7040 <tr>
    7041      <td valign="top">Title</td>
    7042      <td valign="top">Virtual Mobility Domains - A Mobility Architecture for the Future Internet</td>
    7043 </tr>
    7044 
    7045 <tr>
    7046      <td valign="top">Booktitle</td>
    7047      <td valign="top">IEEE International Conference on Commnunications (IEE ICC 2012) Symposium on Next-Generation Networking</td>
    7048 </tr>
    7049 
    7050 <tr>
    7051      <td valign="top">Year</td>
    7052      <td valign="top">2012</td>
    7053 </tr>
    7054 
    7055 <tr>
    7056      <td valign="top">Abstract</td>
    7057      <td valign="top">This paper presents a novel mobility architecture called Virtual Mobility Domains that is designed to work with the Floating Cloud Tiered Internetworking model. Virtual Mobility Domains supports both inter Autonomous System (macro) and intra Autonomous System (micro) mobility by leveraging a tiered addressing, a network cloud concept, and a unique packet forwarding scheme introduced by the Floating Cloud Tiered Internetworking model. The proposed mobility architecture is distinct from others by not using IP addressing and classic routing protocols, and deploying user-centric overlapping mobility domains. The comparative simulation study of Virtual Mobility Domains against Mobile IPv6, Hierarchical Mobile IPv6, and Proxy Mobile IPv6 using OPNET shows that Virtual Mobility Domains brings lower latency, lesser signaling overhead, and fewer packets loss during handoffs, specially during inter Autonomous System roaming. The results highlight the potential for a seamless mobility management.</td>
    7058 </tr>
    7059 
    7060 
    7061 
    7062 <tr>
    7063      <td valign="top">DOI</td>
    7064      <td valign="top">10.1109/ICC.2012.6363872</td>
    7065 </tr>
    7066 
    7067 
    7068 
    7069 <tr>
    7070      <td valign="top">URL</td>
    7071      <td valign="top"><a href="ftp://lesc.det.unifi.it/pub/LenLar/proceedings/2012/ICC2012/symposia/papers/virtual&#x005F;mobility&#x005F;domains&#x005F;-&#x005F;a&#x005F;mobility&#x005F;architecture&#x005F;for&#x005F;the&#x005F;\\_.pdf">ftp://lesc.det.unifi.it/pub/LenLar/proceedings/2012/ICC2012/symposia/papers/virtual&#x005F;mobility&#x005F;domains&#x005F;-&#x005F;a&#x005F;mobility&#x005F;architecture&#x005F;for&#x005F;the&#x005F;\\_.pdf</a></td>
    7072 </tr>
    7073 
    7074 
    7075 </table></div><br><br>
    7076 
    7077 
    7078 
    7079 
    7080 <a class="EntryGoto" id="Turner, Jonathan S."></a>
    7081 <b class="myheading" style="position: relative; left: 5%;">Turner, Jonathan S.</b>
    7082 
    7083 <div class="BibEntry">
    7084 
    7085 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    7086 
    7087 
    7088 <tr>
    7089      <td valign="top">Author</td>
    7090      <td valign="top">Turner, Jonathan S.</td>
    7091 </tr>
    7092 
    7093 <tr>
    7094      <td valign="top">Title</td>
    7095      <td valign="top">A proposed architecture for the GENI backbone platform</td>
    7096 </tr>
    7097 
    7098 <tr>
    7099      <td valign="top">Booktitle</td>
    7100      <td valign="top">Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems</td>
    7101 </tr>
    7102 
    7103 <tr>
    7104      <td valign="top">Location</td>
    7105      <td valign="top">San Jose, California, USA</td>
    7106 </tr>
    7107 
    7108 <tr>
    7109      <td valign="top">Publisher</td>
    7110      <td valign="top">ACM</td>
    7111 </tr>
    7112 
    7113 <tr>
    7114      <td valign="top">Address</td>
    7115      <td valign="top">New York, NY, USA</td>
    7116 </tr>
    7117 
    7118 <tr>
    7119      <td valign="top">Year</td>
    7120      <td valign="top">2006</td>
    7121 </tr>
    7122 
    7123 <tr>
    7124      <td valign="top">Abstract</td>
    7125      <td valign="top">The GENI Project (Global Environment for Network Innovation) is a major NSF-sponsored initiative that seeks to create a national research facility to enable experimental deployment of innovative new network architectures on a sufficient scale to enable realistic evaluation. One key component of the GENI system will be the GENI Backbone Platform (GBP) that provides the resources needed to allow multiple experimental networks to co-exist within the shared GENI infrastructure. This paper reviews the objectives for the GBP, the key issues that affect its design and develops a reference architecture that provides a concrete example for how the objectives can be met, using commercially available subsystems.</td>
    7126 </tr>
    7127 
    7128 
    7129 
    7130 <tr>
    7131      <td valign="top">DOI</td>
    7132      <td valign="top">10.1145/1185347.1185349</td>
    7133 </tr>
    7134 
    7135 
    7136 
    7137 <tr>
    7138      <td valign="top">URL</td>
    7139      <td valign="top"><a href="http://dx.doi.org/10.1145/1185347.1185349">http://dx.doi.org/10.1145/1185347.1185349</a></td>
    7140 </tr>
    7141 
    7142 
    7143 </table></div><br><br>
    7144 
    7145 
    7146 
    7147 
    7148 <a class="EntryGoto" id="Turner, Jonathan S. and Crowley, Patrick and DeHart, John and Freestone, Amy and Heller, Brandon and Kuhns, Fred and Kumar, Sailesh and Lockwood, John and Lu, Jing and Wilson, Michael and Wiseman, Charles and Zar, David"></a>
    7149 <b class="myheading" style="position: relative; left: 5%;">Turner, Jonathan S. and Crowley, Patrick and DeHart, John and Freestone, Amy and Heller, Brandon and Kuhns, Fred and Kumar, Sailesh and Lockwood, John and Lu, Jing and Wilson, Michael and Wiseman, Charles and Zar, David</b>
    7150 
    7151 <div class="BibEntry">
    7152 
    7153 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    7154 
    7155 
    7156 <tr>
    7157      <td valign="top">Author</td>
    7158      <td valign="top">Turner, Jonathan S. and Crowley, Patrick and DeHart, John and Freestone, Amy and Heller, Brandon and Kuhns, Fred and Kumar, Sailesh and Lockwood, John and Lu, Jing and Wilson, Michael and Wiseman, Charles and Zar, David</td>
    7159 </tr>
    7160 
    7161 <tr>
    7162      <td valign="top">Title</td>
    7163      <td valign="top">Supercharging planetlab: a high performance, multi-application, overlay network platform</td>
    7164 </tr>
    7165 
    7166 <tr>
    7167      <td valign="top">Journal</td>
    7168      <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
    7169 </tr>
    7170 
    7171 <tr>
    7172      <td valign="top">Publisher</td>
    7173      <td valign="top">ACM</td>
    7174 </tr>
    7175 
    7176 <tr>
    7177      <td valign="top">Address</td>
    7178      <td valign="top">New York, NY, USA</td>
    7179 </tr>
    7180 
    7181 <tr>
    7182      <td valign="top">Year</td>
    7183      <td valign="top">2007</td>
    7184 </tr>
    7185 
    7186 <tr>
    7187      <td valign="top">Abstract</td>
    7188      <td valign="top">In recent years, overlay networks have become an important vehicle for delivering Internet applications. Overlay network nodes are typically implemented using general purpose servers or clusters. We investigate the performance benefits of more integrated architectures, combining general-purpose servers with high performance Network Processor (NP) subsystems. We focus on PlanetLab as our experimental context and report on the design and evaluation of an experimental PlanetLab platform capable of much higher levels of performance than typical system configurations. To make it easier for users to port applications, the system supports a fast path/slow path application structure that facilitates the mapping of the most performance-critical parts of an application onto an NP subsystem, while allowing the more complex control and exception-handling to be implemented within the programmer-friendly environment provided by conventional servers. We report on implementations of two sample applications, an IPv4 router, and a forwarding application for the Internet Indirection Infrastructure. We demonstrate an 80x improvement in packet processing rates and comparable reductions in latency.</td>
    7189 </tr>
    7190 
    7191 
    7192 
    7193 <tr>
    7194      <td valign="top">DOI</td>
    7195      <td valign="top">10.1145/1282427.1282391</td>
    7196 </tr>
    7197 
    7198 
    7199 
    7200 <tr>
    7201      <td valign="top">URL</td>
    7202      <td valign="top"><a href="http://dx.doi.org/10.1145/1282427.1282391">http://dx.doi.org/10.1145/1282427.1282391</a></td>
    7203 </tr>
    7204 
    7205 
    7206 </table></div><br><br>
    7207 
    7208 
    7209 
    7210 
    7211 <a class="EntryGoto" id="Valancius, Vytautas and Feamster, Nick"></a>
    7212 <b class="myheading" style="position: relative; left: 5%;">Valancius, Vytautas and Feamster, Nick</b>
    7213 
    7214 <div class="BibEntry">
    7215 
    7216 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    7217 
    7218 
    7219 <tr>
    7220      <td valign="top">Author</td>
    7221      <td valign="top">Valancius, Vytautas and Feamster, Nick</td>
    7222 </tr>
    7223 
    7224 <tr>
    7225      <td valign="top">Title</td>
    7226      <td valign="top">Multiplexing BGP sessions with BGP-Mux</td>
    7227 </tr>
    7228 
    7229 <tr>
    7230      <td valign="top">Booktitle</td>
    7231      <td valign="top">Proceedings of the 2007 ACM CoNEXT conference</td>
    7232 </tr>
    7233 
    7234 <tr>
    7235      <td valign="top">Location</td>
    7236      <td valign="top">New York, New York</td>
    7237 </tr>
    7238 
    7239 <tr>
    7240      <td valign="top">Publisher</td>
    7241      <td valign="top">ACM</td>
    7242 </tr>
    7243 
    7244 <tr>
    7245      <td valign="top">Address</td>
    7246      <td valign="top">New York, NY, USA</td>
    7247 </tr>
    7248 
    7249 <tr>
    7250      <td valign="top">Year</td>
    7251      <td valign="top">2007</td>
    7252 </tr>
    7253 
    7254 <tr>
    7255      <td valign="top">Abstract</td>
    7256      <td valign="top">This paper describes a BGP-session multiplexer called BGP-Mux, which provides stable, on-demand access to global BGP route feeds. This gateway allows arbitrary and even transient client BGP connections to be provisioned and torn down on demand without affecting globally visible BGP sessions. BGP-Mux provides two capabilities: (1) the ability for a client network to receive multiple unfiltered routes per destination from a set of upstream ASes; and (2) the ability to provision BGP sessions without introducing global instability. Several applications could benefit from these features:</td>
    7257 </tr>
    7258 
    7259 
    7260 
    7261 <tr>
    7262      <td valign="top">DOI</td>
    7263      <td valign="top">10.1145/1364654.1364707</td>
    7264 </tr>
    7265 
    7266 
    7267 
    7268 <tr>
    7269      <td valign="top">URL</td>
    7270      <td valign="top"><a href="http://dx.doi.org/10.1145/1364654.1364707">http://dx.doi.org/10.1145/1364654.1364707</a></td>
    7271 </tr>
    7272 
    7273 
    7274 </table></div><br><br>
    7275 
    7276 
    7277 
    7278 
    7279 <a class="EntryGoto" id="Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao, Akihiro"></a>
    7280 <b class="myheading" style="position: relative; left: 5%;">Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao, Akihiro</b>
    7281 
    7282 <div class="BibEntry">
    7283 
    7284 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    7285 
    7286 
    7287 <tr>
    7288      <td valign="top">Author</td>
    7289      <td valign="top">Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao, Akihiro</td>
    7290 </tr>
    7291 
    7292 <tr>
    7293      <td valign="top">Title</td>
    7294      <td valign="top">Wide-area route control for distributed services</td>
    7295 </tr>
    7296 
    7297 <tr>
    7298      <td valign="top">Booktitle</td>
    7299      <td valign="top">Proceedings of the 2010 USENIX conference on USENIX annual technical conference</td>
    7300 </tr>
    7301 
    7302 <tr>
    7303      <td valign="top">Location</td>
    7304      <td valign="top">Boston, MA</td>
    7305 </tr>
    7306 
    7307 <tr>
    7308      <td valign="top">Publisher</td>
    7309      <td valign="top">USENIX Association</td>
    7310 </tr>
    7311 
    7312 <tr>
    7313      <td valign="top">Address</td>
    7314      <td valign="top">Berkeley, CA, USA</td>
    7315 </tr>
    7316 
    7317 <tr>
    7318      <td valign="top">Year</td>
    7319      <td valign="top">2010</td>
    7320 </tr>
    7321 
    7322 <tr>
    7323      <td valign="top">Abstract</td>
    7324      <td valign="top">Many distributed services would benefit from control over the flow of traffic to and from their users, to offer better performance and higher reliability at a reasonable cost. Unfortunately, although today's cloud-computing platforms offer elastic computing and bandwidth resources, they do not give services control over wide-area routing. We propose replacing the data center's border router with a Transit Portal (TP) that gives each service the illusion of direct connectivity to upstream ISPs, without requiring each service to deploy hardware, acquire IP address space, or negotiate contracts with ISPs. Our TP prototype supports many layer-two connectivity mechanisms, amortizes memory and message overhead over multiple services, and protects the rest of the Internet from misconfigured and malicious applications. Our implementation extends and synthesizes open-source software components such as the Linux kernel and the Quagga routing daemon. We also implement a management plane based on the GENI control framework and couple this with our four-site TP deployment and Amazon EC2 facilities. Experiments with an anycast DNS application demonstrate the benefits the TP offers to distributed services.</td>
    7325 </tr>
    7326 
    7327 
    7328 
    7329 
    7330 
    7331 <tr>
    7332      <td valign="top">URL</td>
    7333      <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=1855842">http://portal.acm.org/citation.cfm?id=1855842</a></td>
    7334 </tr>
    7335 
    7336 
    7337 </table></div><br><br>
    7338 
    7339 
    7340 
    7341 
    7342 <a class="EntryGoto" id="Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick"></a>
    7343 <b class="myheading" style="position: relative; left: 5%;">Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick</b>
    7344 
    7345 <div class="BibEntry">
    7346 
    7347 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    7348 
    7349 
    7350 <tr>
    7351      <td valign="top">Author</td>
    7352      <td valign="top">Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick</td>
    7353 </tr>
    7354 
    7355 <tr>
    7356      <td valign="top">Title</td>
    7357      <td valign="top">Transit portal: BGP connectivity as a service</td>
    7358 </tr>
    7359 
    7360 <tr>
    7361      <td valign="top">Journal</td>
    7362      <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
    7363 </tr>
    7364 
    7365 <tr>
    7366      <td valign="top">Publisher</td>
    7367      <td valign="top">ACM</td>
    7368 </tr>
    7369 
    7370 <tr>
    7371      <td valign="top">Address</td>
    7372      <td valign="top">New York, NY, USA</td>
    7373 </tr>
    7374 
    7375 <tr>
    7376      <td valign="top">Year</td>
    7377      <td valign="top">2010</td>
    7378 </tr>
    7379 
    7380 <tr>
    7381      <td valign="top">Abstract</td>
    73826644     <td valign="top">We demonstrate Transit Portal, a system that provides on-demand BGP Internet connectivity to multiple ISPs. Transit Portal provides connectivity to any virtual network or distributed service that needs to control its inbound and outbound route control. Examples of such services include virtual networks and distributed services in cloud computing environments (e.g., Amazon's EC2) that need to control inbound and outbound traffic.</td>
    73836645</tr>
     
    73976659</tr>
    73986660
     6661
     6662</li>
    73996663
    74006664</table></div><br><br>
     
    74106674<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    74116675
     6676<li>
     6677
    74126678
    74136679<tr>
     
    74516717
    74526718
     6719</li>
     6720
    74536721</table></div><br><br>
    74546722
     
    74636731<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    74646732
     6733<li>
     6734
    74656735
    74666736<tr>
     
    75086778</tr>
    75096779
     6780
     6781</li>
    75106782
    75116783</table></div><br><br>
     
    75216793<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    75226794
     6795<li>
     6796
    75236797
    75246798<tr>
     
    75716845</tr>
    75726846
     6847
     6848</li>
    75736849
    75746850</table></div><br><br>
     
    75846860<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    75856861
     6862<li>
     6863
    75866864
    75876865<tr>
     
    76146892</tr>
    76156893
     6894
     6895</li>
    76166896
    76176897</table></div><br><br>
     
    76276907<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    76286908
     6909<li>
     6910
    76296911
    76306912<tr>
     
    76576939</tr>
    76586940
     6941
     6942</li>
    76596943
    76606944</table></div><br><br>
     
    76706954<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    76716955
     6956<li>
     6957
    76726958
    76736959<tr>
     
    77157001</tr>
    77167002
     7003
     7004</li>
    77177005
    77187006</table></div><br><br>
     
    77287016<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    77297017
     7018<li>
     7019
    77307020
    77317021<tr>
     
    77737063</tr>
    77747064
     7065
     7066</li>
    77757067
    77767068</table></div><br><br>
     
    77867078<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    77877079
     7080<li>
     7081
    77887082
    77897083<tr>
     
    78317125</tr>
    78327126
     7127
     7128</li>
    78337129
    78347130</table></div><br><br>
     
    78447140<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    78457141
     7142<li>
     7143
    78467144
    78477145<tr>
     
    78897187</tr>
    78907188
     7189
     7190</li>
    78917191
    78927192</table></div><br><br>
     
    79027202<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    79037203
     7204<li>
     7205
    79047206
    79057207<tr>
     
    79477249</tr>
    79487250
     7251
     7252</li>
    79497253
    79507254</table></div><br><br>
     
    79607264<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    79617265
     7266<li>
     7267
    79627268
    79637269<tr>
     
    80057311</tr>
    80067312
     7313
     7314</li>
    80077315
    80087316</table></div><br><br>
     
    80187326<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    80197327
     7328<li>
     7329
    80207330
    80217331<tr>
     
    80637373</tr>
    80647374
     7375
     7376</li>
    80657377
    80667378</table></div><br><br>
     
    80757387
    80767388<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     7389
     7390<li>
    80777391
    80787392
     
    81137427
    81147428
     7429</li>
     7430
    81157431</table></div><br><br>
    81167432
     
    81257441<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    81267442
     7443<li>
     7444
    81277445
    81287446<tr>
     
    81707488</tr>
    81717489
     7490
     7491</li>
    81727492
    81737493</table></div><br><br>
     
    81837503<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    81847504
     7505<li>
     7506
    81857507
    81867508<tr>
     
    82397561
    82407562
     7563</li>
     7564
    82417565</table></div><br><br>
    82427566
     
    82467570<br>
    82477571
     7572</ol>
     7573
    82487574<!-- End HTML to be inserted into wiki page. -->
    82497575