| 2285 | <td valign="top">2011</td> |
| 2286 | </tr> |
| 2287 | |
| 2288 | <tr> |
| 2289 | <td valign="top">Abstract</td> |
| 2290 | <td valign="top">Shared measurement services offer key advantages over conventional ad-hoc techniques for network monitoring. A measurement service may receive measurement requests concurrently from different applications and network administrators. These measurement requests are often served by injecting active network measurement traffic between two hosts. Two active measurements are said to interfere when the probe packets of one measurement tool are viewed as network traffic by the other. This may lead to faulty measurement readings. In this paper, we model the measurement interference problem, and show how to schedule measurement tasks to reduce interference and hence increase measurement accuracy. We propose twelve computationally tractable algorithms that decrease the total completion time (makespan) of measurement tasks, while avoiding interference. Our evaluation shows that the algorithm we refer to as Largest Area First, Busiest Node First - Earliest Interval Schedule (LAFBNF-EIS) has a mean makespan of about 5% more than the theoretical lower bound over our set of measurement workloads.</td> |
| 2291 | </tr> |
| 2292 | |
| 2293 | |
| 2294 | |
| 2295 | <tr> |
| 2296 | <td valign="top">DOI</td> |
| 2297 | <td valign="top">10.1109/IWQOS.2011.5931347</td> |
| 2298 | </tr> |
| 2299 | |
| 2300 | |
| 2301 | |
| 2302 | <tr> |
| 2303 | <td valign="top">URL</td> |
| 2304 | <td valign="top"><a href="http://dx.doi.org/10.1109/IWQOS.2011.5931347">http://dx.doi.org/10.1109/IWQOS.2011.5931347</a></td> |
| 2305 | </tr> |
| 2306 | |
| 2307 | |
| 2308 | </li> |
| 2309 | |
| 2310 | </table></div><br><br> |
| 2311 | |
| 2312 | |
| 2313 | |
| 2314 | |
| 2315 | <a class="EntryGoto" id="Gao, Jingcheng and Xiao, Yang"></a> |
| 2316 | <b class="myheading" style="position: relative; left: 5%;">Gao, Jingcheng and Xiao, Yang</b> |
| 2317 | |
| 2318 | <div class="BibEntry"> |
| 2319 | |
| 2320 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 2321 | |
| 2322 | <li> |
| 2323 | |
| 2324 | |
| 2325 | <tr> |
| 2326 | <td valign="top">Author</td> |
| 2327 | <td valign="top">Gao, Jingcheng and Xiao, Yang</td> |
| 2328 | </tr> |
| 2329 | |
| 2330 | <tr> |
| 2331 | <td valign="top">Title</td> |
| 2332 | <td valign="top">ProtoGENI DoS/DDoS Security Tests and Experiments</td> |
| 2333 | </tr> |
| 2334 | |
| 2335 | <tr> |
| 2336 | <td valign="top">Booktitle</td> |
| 2337 | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
| 2338 | </tr> |
| 2339 | |
| 2340 | <tr> |
| 2341 | <td valign="top">Location</td> |
| 2342 | <td valign="top">Los Angeles</td> |
| 2343 | </tr> |
| 2344 | |
| 2345 | <tr> |
| 2346 | <td valign="top">Year</td> |
| 2347 | <td valign="top">2012</td> |
| 2348 | </tr> |
| 2349 | |
| 2350 | <tr> |
| 2351 | <td valign="top">Abstract</td> |
| 2352 | <td valign="top">his paper will explain some tests and experiments to investigate selected security issues through ProtoGENI mainly during Spiral 3 time period and the beginning of Spiral 4. In this paper, we conduct multiple sets of DoS/ DDoS attacks in the current ProtoGENI testbed. These attacks show that it is very possible that ProtoGENI nodes may render vulnerabilities to such attacks.</td> |
| 2353 | </tr> |
| 2354 | |
| 2355 | |
| 2356 | |
| 2357 | |
| 2358 | |
| 2359 | |
| 2360 | </li> |
| 2361 | |
| 2362 | </table></div><br><br> |
| 2363 | |
| 2364 | |
| 2365 | |
| 2366 | |
| 2367 | <a class="EntryGoto" id="Gember, Aaron and Dragga, Chris and Akella, Aditya"></a> |
| 2368 | <b class="myheading" style="position: relative; left: 5%;">Gember, Aaron and Dragga, Chris and Akella, Aditya</b> |
| 2369 | |
| 2370 | <div class="BibEntry"> |
| 2371 | |
| 2372 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 2373 | |
| 2374 | <li> |
| 2375 | |
| 2376 | |
| 2377 | <tr> |
| 2378 | <td valign="top">Author</td> |
| 2379 | <td valign="top">Gember, Aaron and Dragga, Chris and Akella, Aditya</td> |
| 2380 | </tr> |
| 2381 | |
| 2382 | <tr> |
| 2383 | <td valign="top">Title</td> |
| 2384 | <td valign="top">ECOS: Practical Mobile Application Offloading for Enterprises</td> |
| 2385 | </tr> |
| 2386 | |
| 2387 | <tr> |
| 2388 | <td valign="top">Booktitle</td> |
| 2389 | <td valign="top">2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE '12)</td> |
| 2390 | </tr> |
| 2391 | |
| 2392 | <tr> |
| 2393 | <td valign="top">Year</td> |
| 2394 | <td valign="top">2012</td> |
| 2395 | </tr> |
| 2396 | |
| 2397 | <tr> |
| 2398 | <td valign="top">Abstract</td> |
| 2399 | <td valign="top">Offloading has emerged as a promising idea to allow handheld devices to access intensive applications without performance or energy costs. This could be particularly useful for enterprises seeking to run line-of-business applications on handhelds. However, we must address two practical roadblocks in order to make offloading amenable for enterprises: (i) ensuring data privacy and the use of trusted offloading resources, and (ii) accommodating offload at scale with diverse handheld objectives and compute resource capabilities. We present the design and implementation of an Enterprise-Centric Offloading System (ECOS) which augments prior offloading proposals to address these issues. ECOS uses a logically central controller to opportunistically leverage diverse compute resources, while tightly controlling where specific applications offload depending on privacy, performance, and energy constraints of users and applications. A wide range of experiments using a real prototype establish the effectiveness of our approach.</td> |
| 2400 | </tr> |
| 2401 | |
| 2402 | |
| 2403 | |
| 2404 | |
| 2405 | |
| 2406 | <tr> |
| 2407 | <td valign="top">URL</td> |
| 2408 | <td valign="top"><a href="http://www.usenix.org/conference/hot-ice12/ecos-practical-mobile-application-of%EF%AC%82oading-enterprises">http://www.usenix.org/conference/hot-ice12/ecos-practical-mobile-application-of%EF%AC%82oading-enterprises</a></td> |
| 2409 | </tr> |
| 2410 | |
| 2411 | |
| 2412 | </li> |
| 2413 | |
| 2414 | </table></div><br><br> |
| 2415 | |
| 2416 | |
| 2417 | |
| 2418 | |
| 2419 | <a class="EntryGoto" id="Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David"></a> |
| 2420 | <b class="myheading" style="position: relative; left: 5%;">Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David</b> |
| 2421 | |
| 2422 | <div class="BibEntry"> |
| 2423 | |
| 2424 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 2425 | |
| 2426 | <li> |
| 2427 | |
| 2428 | |
| 2429 | <tr> |
| 2430 | <td valign="top">Author</td> |
| 2431 | <td valign="top">Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David</td> |
| 2432 | </tr> |
| 2433 | |
| 2434 | <tr> |
| 2435 | <td valign="top">Title</td> |
| 2436 | <td valign="top">Supporting network evolution and incremental deployment with XIA</td> |
| 2437 | </tr> |
| 2438 | |
| 2439 | <tr> |
| 2440 | <td valign="top">Booktitle</td> |
| 2441 | <td valign="top">Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication</td> |
| 2442 | </tr> |
| 2443 | |
| 2444 | <tr> |
| 2445 | <td valign="top">Location</td> |
| 2446 | <td valign="top">Helsinki, Finland</td> |
| 2447 | </tr> |
| 2448 | |
| 2449 | <tr> |
| 2450 | <td valign="top">Publisher</td> |
| 2451 | <td valign="top">ACM</td> |
| 2452 | </tr> |
| 2453 | |
| 2454 | <tr> |
| 2455 | <td valign="top">Address</td> |
| 2456 | <td valign="top">New York, NY, USA</td> |
| 2457 | </tr> |
| 2458 | |
| 2459 | <tr> |
| 2460 | <td valign="top">Year</td> |
| 2461 | <td valign="top">2012</td> |
| 2462 | </tr> |
| 2463 | |
| 2464 | <tr> |
| 2465 | <td valign="top">Abstract</td> |
| 2466 | <td valign="top">eXpressive Internet Architecture (XIA) [1] is an architecture that natively supports multiple communication types and allows networks to evolve their abstractions and functionality to accommodate new styles of communication over time. XIA embeds an elegant mechanism for handling unforeseen communication types for legacy routers. In this demonstration, we show that XIA overcomes three key barriers in network evolution (outlined below) by (1) allowing end-hosts and applications to start using new communication types (e.g., service and content) before the network supports them, (2) ensuring that upgrading a subset of routers to support new functionalities immediately benefits applications, and (3) using the same mechanisms we employ for 1 and 2 to incrementally deploy XIA in IP networks.</td> |
| 2467 | </tr> |
| 2468 | |
| 2469 | |
| 2470 | |
| 2471 | <tr> |
| 2472 | <td valign="top">DOI</td> |
| 2473 | <td valign="top">10.1145/2342356.2342410</td> |
| 2474 | </tr> |
| 2475 | |
| 2476 | |
| 2477 | |
| 2478 | <tr> |
| 2479 | <td valign="top">URL</td> |
| 2480 | <td valign="top"><a href="http://dx.doi.org/10.1145/2342356.2342410">http://dx.doi.org/10.1145/2342356.2342410</a></td> |
| 2481 | </tr> |
| 2482 | |
| 2483 | |
| 2484 | </li> |
| 2485 | |
| 2486 | </table></div><br><br> |
| 2487 | |
| 2488 | |
| 2489 | |
| 2490 | |
| 2491 | <a class="EntryGoto" id="Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C."></a> |
| 2492 | <b class="myheading" style="position: relative; left: 5%;">Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</b> |
| 2493 | |
| 2494 | <div class="BibEntry"> |
| 2495 | |
| 2496 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 2497 | |
| 2498 | <li> |
| 2499 | |
| 2500 | |
| 2501 | <tr> |
| 2502 | <td valign="top">Author</td> |
| 2503 | <td valign="top">Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</td> |
| 2504 | </tr> |
| 2505 | |
| 2506 | <tr> |
| 2507 | <td valign="top">Title</td> |
| 2508 | <td valign="top">The design of an instrumentation system for federated and virtualized network testbeds</td> |
| 2509 | </tr> |
| 2510 | |
| 2511 | <tr> |
| 2512 | <td valign="top">Booktitle</td> |
| 2513 | <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td> |
| 2514 | </tr> |
| 2515 | |
| 2516 | <tr> |
| 2517 | <td valign="top">Publisher</td> |
| 2518 | <td valign="top">IEEE</td> |
| 2519 | </tr> |
| 2520 | |
| 2521 | <tr> |
| 2522 | <td valign="top">Year</td> |
| 2523 | <td valign="top">2012</td> |
| 2524 | </tr> |
| 2525 | |
| 2526 | <tr> |
| 2527 | <td valign="top">Abstract</td> |
| 2528 | <td valign="top">Much of the GENI effort in developing network testbeds has been focused on building the control frameworks needed to allocate and initialize the network resources that make up an experiment. We argue that building the instrumentation and measurement system to monitor and capture the behavior of the network is just as important and challenging as setting up the network itself, especially in a virtualized and federated environment where getting information from experimental nodes is too complicated and too much to handle for a typical user. In this paper, we describe the design of an instrumentation and measurement infrastructure that allows users to monitor their experiments. The challenge that virtualization and federation of GENI testbeds bring to instrumentation and monitoring is how to hide the details of instrumentation setup from users so that users do not need to be experts in system administration or network management of virtualized and federated systems, but are still able to ” see” what is going on with their experiments. Our instrumentation tool sets up experiment-specific monitoring infrastructure that is tailored to capture, record, and display only information associated with that experiment. Our tools are currently available in GENI, and we present a simple example of how to use them to instrument an experiment.</td> |
| 2529 | </tr> |
| 2530 | |
| 2531 | |
| 2532 | |
| 2533 | <tr> |
| 2534 | <td valign="top">DOI</td> |
| 2535 | <td valign="top">10.1109/NOMS.2012.6212061</td> |
| 2536 | </tr> |
| 2537 | |
| 2538 | |
| 2539 | |
| 2540 | <tr> |
| 2541 | <td valign="top">URL</td> |
| 2542 | <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6212061">http://dx.doi.org/10.1109/NOMS.2012.6212061</a></td> |
| 2543 | </tr> |
| 2544 | |
| 2545 | |
| 2546 | </li> |
| 2547 | |
| 2548 | </table></div><br><br> |
| 2549 | |
| 2550 | |
| 2551 | |
| 2552 | |
| 2553 | <a class="EntryGoto" id="Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles"></a> |
| 2554 | <b class="myheading" style="position: relative; left: 5%;">Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</b> |
| 2555 | |
| 2556 | <div class="BibEntry"> |
| 2557 | |
| 2558 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 2559 | |
| 2560 | <li> |
| 2561 | |
| 2562 | |
| 2563 | <tr> |
| 2564 | <td valign="top">Author</td> |
| 2565 | <td valign="top">Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td> |
| 2566 | </tr> |
| 2567 | |
| 2568 | <tr> |
| 2569 | <td valign="top">Title</td> |
| 2570 | <td valign="top">GENI-enabled Programming Experiments for Networking Classes</td> |
| 2571 | </tr> |
| 2572 | |
| 2573 | <tr> |
| 2574 | <td valign="top">Booktitle</td> |
| 2575 | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
| 2576 | </tr> |
| 2577 | |
| 2578 | <tr> |
| 2579 | <td valign="top">Location</td> |
| 2580 | <td valign="top">Salt Lake City, UT</td> |
| 2581 | </tr> |
| 2582 | |
| 2583 | <tr> |
| 2584 | <td valign="top">Publisher</td> |
| 2585 | <td valign="top">IEEE</td> |
| 2586 | </tr> |
| 2587 | |
| 2588 | <tr> |
| 2589 | <td valign="top">Year</td> |
| 2590 | <td valign="top">2013</td> |
| 2591 | </tr> |
| 2592 | |
| 2593 | |
| 2594 | |
| 2595 | <tr> |
| 2596 | <td valign="top">DOI</td> |
| 2597 | <td valign="top">10.1109/GREE.2013.30</td> |
| 2598 | </tr> |
| 2599 | |
| 2600 | |
| 2601 | |
| 2602 | <tr> |
| 2603 | <td valign="top">URL</td> |
| 2604 | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.30">http://dx.doi.org/10.1109/GREE.2013.30</a></td> |
| 2605 | </tr> |
| 2606 | |
| 2607 | |
| 2608 | </li> |
| 2609 | |
| 2610 | </table></div><br><br> |
| 2611 | |
| 2612 | |
| 2613 | |
| 2614 | |
| 2615 | <a class="EntryGoto" id="Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles"></a> |
| 2616 | <b class="myheading" style="position: relative; left: 5%;">Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</b> |
| 2617 | |
| 2618 | <div class="BibEntry"> |
| 2619 | |
| 2620 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 2621 | |
| 2622 | <li> |
| 2623 | |
| 2624 | |
| 2625 | <tr> |
| 2626 | <td valign="top">Author</td> |
| 2627 | <td valign="top">Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td> |
| 2628 | </tr> |
| 2629 | |
| 2630 | <tr> |
| 2631 | <td valign="top">Title</td> |
| 2632 | <td valign="top">Teaching with the Emerging GENI Network</td> |
| 2633 | </tr> |
| 2634 | |
| 2635 | <tr> |
| 2636 | <td valign="top">Booktitle</td> |
| 2637 | <td valign="top">Proceedings of the 2012 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS)</td> |
| 2638 | </tr> |
| 2639 | |
| 2640 | <tr> |
| 2641 | <td valign="top">Location</td> |
| 2642 | <td valign="top">Las Vegas</td> |
| 2643 | </tr> |
| 2644 | |
| 2645 | <tr> |
| 2646 | <td valign="top">Year</td> |
| 2647 | <td valign="top">2012</td> |
| 2648 | </tr> |
| 2649 | |
| 2650 | |
| 2651 | |
| 2652 | |
| 2653 | |
| 2654 | |
| 2655 | </li> |
| 2656 | |
| 2657 | </table></div><br><br> |
| 2658 | |
| 2659 | |
| 2660 | |
| 2661 | |
| 2662 | <a class="EntryGoto" id="Guan, Xinjie and Choi, Baek-Young and Song, Sejun"></a> |
| 2663 | <b class="myheading" style="position: relative; left: 5%;">Guan, Xinjie and Choi, Baek-Young and Song, Sejun</b> |
| 2664 | |
| 2665 | <div class="BibEntry"> |
| 2666 | |
| 2667 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 2668 | |
| 2669 | <li> |
| 2670 | |
| 2671 | |
| 2672 | <tr> |
| 2673 | <td valign="top">Author</td> |
| 2674 | <td valign="top">Guan, Xinjie and Choi, Baek-Young and Song, Sejun</td> |
| 2675 | </tr> |
| 2676 | |
| 2677 | <tr> |
| 2678 | <td valign="top">Title</td> |
| 2679 | <td valign="top">Reliability and Scalability Issues in Software Defined Network Frameworks</td> |
| 2680 | </tr> |
| 2681 | |
| 2682 | <tr> |
| 2683 | <td valign="top">Booktitle</td> |
| 2684 | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
| 2685 | </tr> |
| 2686 | |
| 2687 | <tr> |
| 2688 | <td valign="top">Location</td> |
| 2689 | <td valign="top">Salt Lake City, UT</td> |
| 2690 | </tr> |
| 2691 | |
| 2692 | <tr> |
| 2693 | <td valign="top">Publisher</td> |
| 2694 | <td valign="top">IEEE</td> |
| 2695 | </tr> |
| 2696 | |
| 2697 | <tr> |
| 2698 | <td valign="top">Year</td> |
| 2699 | <td valign="top">2013</td> |
| 2700 | </tr> |
| 2701 | |
| 2702 | |
| 2703 | |
| 2704 | <tr> |
| 2705 | <td valign="top">DOI</td> |
| 2706 | <td valign="top">10.1109/GREE.2013.28</td> |
| 2707 | </tr> |
| 2708 | |
| 2709 | |
| 2710 | |
| 2711 | <tr> |
| 2712 | <td valign="top">URL</td> |
| 2713 | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.28">http://dx.doi.org/10.1109/GREE.2013.28</a></td> |
| 2714 | </tr> |
| 2715 | |
| 2716 | |
| 2717 | </li> |
| 2718 | |
| 2719 | </table></div><br><br> |
| 2720 | |
| 2721 | |
| 2722 | |
| 2723 | |
| 2724 | <a class="EntryGoto" id="Herron, Jon-Paul"></a> |
| 2725 | <b class="myheading" style="position: relative; left: 5%;">Herron, Jon-Paul</b> |
| 2726 | |
| 2727 | <div class="BibEntry"> |
| 2728 | |
| 2729 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 2730 | |
| 2731 | <li> |
| 2732 | |
| 2733 | |
| 2734 | <tr> |
| 2735 | <td valign="top">Author</td> |
| 2736 | <td valign="top">Herron, Jon-Paul</td> |
| 2737 | </tr> |
| 2738 | |
| 2739 | <tr> |
| 2740 | <td valign="top">Title</td> |
| 2741 | <td valign="top">GENI Meta-Operations Center</td> |
| 2742 | </tr> |
| 2743 | |
| 2744 | <tr> |
| 2745 | <td valign="top">Booktitle</td> |
| 2746 | <td valign="top">2008 IEEE Fourth International Conference on eScience</td> |
| 2747 | </tr> |
| 2748 | |
| 2749 | <tr> |
| 2750 | <td valign="top">Location</td> |
| 2751 | <td valign="top">Indianapolis, IN, USA</td> |
| 2752 | </tr> |
| 2753 | |
| 2754 | <tr> |
| 2755 | <td valign="top">Publisher</td> |
| 2756 | <td valign="top">IEEE</td> |
| 2757 | </tr> |
| 2758 | |
| 2759 | <tr> |
| 2760 | <td valign="top">Year</td> |
| 2761 | <td valign="top">2008</td> |
| 2762 | </tr> |
| 2763 | |
| 2764 | <tr> |
| 2765 | <td valign="top">Abstract</td> |
| 2766 | <td valign="top">NSF's GENI program represents an opportunity to build the kind of programmable, virtualized testbed scientists exploring the future of networking will need to support their research. As with any other scientific instrument, it will be crucial that the GENI infrastructure offer repeatable, consistent results to the researchers using it.The GENI Meta-Operations Center, operated by the Global Research NOC at Indiana University, will develop the software, protocols, and processes needed to ensure the repeatability, consistency, and efficiency of GENI.</td> |
| 2767 | </tr> |
| 2768 | |
| 2769 | |
| 2770 | |
| 2771 | <tr> |
| 2772 | <td valign="top">DOI</td> |
| 2773 | <td valign="top">10.1109/eScience.2008.103</td> |
| 2774 | </tr> |
| 2775 | |
| 2776 | |
| 2777 | |
| 2778 | <tr> |
| 2779 | <td valign="top">URL</td> |
| 2780 | <td valign="top"><a href="http://dx.doi.org/10.1109/eScience.2008.103">http://dx.doi.org/10.1109/eScience.2008.103</a></td> |
| 2781 | </tr> |
| 2782 | |
| 2783 | |
| 2784 | </li> |
| 2785 | |
| 2786 | </table></div><br><br> |
| 2787 | |
| 2788 | |
| 2789 | |
| 2790 | |
| 2791 | <a class="EntryGoto" id="Huang, Shufeng and Griffioen, James and Calvert, Kenneth L."></a> |
| 2792 | <b class="myheading" style="position: relative; left: 5%;">Huang, Shufeng and Griffioen, James and Calvert, Kenneth L.</b> |
| 2793 | |
| 2794 | <div class="BibEntry"> |
| 2795 | |
| 2796 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 2797 | |
| 2798 | <li> |
| 2799 | |
| 2800 | |
| 2801 | <tr> |
| 2802 | <td valign="top">Author</td> |
| 2803 | <td valign="top">Huang, Shufeng and Griffioen, James and Calvert, Kenneth L.</td> |
| 2804 | </tr> |
| 2805 | |
| 2806 | <tr> |
| 2807 | <td valign="top">Title</td> |
| 2808 | <td valign="top">Fast-tracking GENI Experiments using HyperNets</td> |
| 2809 | </tr> |
| 2810 | |
| 2811 | <tr> |
| 2812 | <td valign="top">Booktitle</td> |
| 2813 | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
| 2814 | </tr> |
| 2815 | |
| 2816 | <tr> |
| 2817 | <td valign="top">Location</td> |
| 2818 | <td valign="top">Salt Lake City, UT</td> |
| 2819 | </tr> |
| 2820 | |
| 2821 | <tr> |
| 2822 | <td valign="top">Publisher</td> |
| 2823 | <td valign="top">IEEE</td> |
| 2824 | </tr> |
| 2825 | |
| 2826 | <tr> |
| 2827 | <td valign="top">Year</td> |
| 2828 | <td valign="top">2013</td> |
| 2829 | </tr> |
| 2830 | |
| 2831 | |
| 2832 | |
| 2833 | <tr> |
| 2834 | <td valign="top">DOI</td> |
| 2835 | <td valign="top">10.1109/GREE.2013.10</td> |
| 2836 | </tr> |
| 2837 | |
| 2838 | |
| 2839 | |
| 2840 | <tr> |
| 2841 | <td valign="top">URL</td> |
| 2842 | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.10">http://dx.doi.org/10.1109/GREE.2013.10</a></td> |
| 2843 | </tr> |
| 2844 | |
| 2845 | |
| 2846 | </li> |
| 2847 | |
| 2848 | </table></div><br><br> |
| 2849 | |
| 2850 | |
| 2851 | |
| 2852 | |
| 2853 | <a class="EntryGoto" id="Jin, Ruofan and Wang, Bing"></a> |
| 2854 | <b class="myheading" style="position: relative; left: 5%;">Jin, Ruofan and Wang, Bing</b> |
| 2855 | |
| 2856 | <div class="BibEntry"> |
| 2857 | |
| 2858 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 2859 | |
| 2860 | <li> |
| 2861 | |
| 2862 | |
| 2863 | <tr> |
| 2864 | <td valign="top">Author</td> |
| 2865 | <td valign="top">Jin, Ruofan and Wang, Bing</td> |
| 2866 | </tr> |
| 2867 | |
| 2868 | <tr> |
| 2869 | <td valign="top">Title</td> |
| 2870 | <td valign="top">Malware Detection for Mobile Devices Using Software-Defined Networking</td> |
| 2871 | </tr> |
| 2872 | |
| 2873 | <tr> |
| 2874 | <td valign="top">Booktitle</td> |
| 2875 | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
| 2876 | </tr> |
| 2877 | |
| 2878 | <tr> |
| 2879 | <td valign="top">Location</td> |
| 2880 | <td valign="top">Salt Lake City, UT</td> |
| 2881 | </tr> |
| 2882 | |
| 2883 | <tr> |
| 2884 | <td valign="top">Publisher</td> |
| 2885 | <td valign="top">IEEE</td> |
| 2886 | </tr> |
| 2887 | |
| 2888 | <tr> |
| 2889 | <td valign="top">Year</td> |
| 2890 | <td valign="top">2013</td> |
| 2891 | </tr> |
| 2892 | |
| 2893 | |
| 2894 | |
| 2895 | <tr> |
| 2896 | <td valign="top">DOI</td> |
| 2897 | <td valign="top">10.1109/GREE.2013.24</td> |
| 2898 | </tr> |
| 2899 | |
| 2900 | |
| 2901 | |
| 2902 | <tr> |
| 2903 | <td valign="top">URL</td> |
| 2904 | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.24">http://dx.doi.org/10.1109/GREE.2013.24</a></td> |
| 2905 | </tr> |
| 2906 | |
| 2907 | |
| 2908 | </li> |
| 2909 | |
| 2910 | </table></div><br><br> |
| 2911 | |
| 2912 | |
| 2913 | |
| 2914 | |
| 2915 | <a class="EntryGoto" id="Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng"></a> |
| 2916 | <b class="myheading" style="position: relative; left: 5%;">Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng</b> |
| 2917 | |
| 2918 | <div class="BibEntry"> |
| 2919 | |
| 2920 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 2921 | |
| 2922 | <li> |
| 2923 | |
| 2924 | |
| 2925 | <tr> |
| 2926 | <td valign="top">Author</td> |
| 2927 | <td valign="top">Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng</td> |
| 2928 | </tr> |
| 2929 | |
| 2930 | <tr> |
| 2931 | <td valign="top">Title</td> |
| 2932 | <td valign="top">LENS: resource specification for wireless sensor network experimentation infrastructures</td> |
| 2933 | </tr> |
| 2934 | |
| 2935 | <tr> |
| 2936 | <td valign="top">Booktitle</td> |
| 2937 | <td valign="top">Proceedings of the 6th ACM international workshop on Wireless network testbeds, experimental evaluation and characterization</td> |
| 2938 | </tr> |
| 2939 | |
| 2940 | <tr> |
| 2941 | <td valign="top">Location</td> |
| 2942 | <td valign="top">Las Vegas, Nevada, USA</td> |
| 2943 | </tr> |
| 2944 | |
| 2945 | <tr> |
| 2946 | <td valign="top">Publisher</td> |
| 2947 | <td valign="top">ACM</td> |
| 2948 | </tr> |
| 2949 | |
| 2950 | <tr> |
| 2951 | <td valign="top">Address</td> |
| 2952 | <td valign="top">New York, NY, USA</td> |
| 2953 | </tr> |
| 2954 | |
| 2955 | <tr> |
| 2956 | <td valign="top">Year</td> |
| 2957 | <td valign="top">2011</td> |
| 2958 | </tr> |
| 2959 | |
| 2960 | <tr> |
| 2961 | <td valign="top">Abstract</td> |
| 2962 | <td valign="top">As a first step towards predictable, repeatable WSN experimentation, we propose the resource specification language LENS (a.k.a. Language for Embedded Networked Sensing) for WSN experimentation infrastructures. Using the Resource Description Framework (RDF) and the Web Ontology Language (OWL), LENS defines a semantic ontology for WSN resources; LENS enables explicit control and measurement of uncertainty factors, and it enables reasoning about the relationships between WSN resources. Focusing on basic concepts of WSNs, LENS supports resource specification in a wide range of WSN experimentation infrastructures, and it is extensible to support potentially unforeseen technologies. LENS is also compatible with specification languages for other network resources such as optical networks. As a part of the NSF GENI initiative, we have implemented LENS in the KanseiGenie control framework, and LENS has been actively used to support experimentation in the federated WSN infrastructure involving Kansei and NetEye. Enabling reasoning about uncertainty factors in experimentation, LENS is expected to serve as a basis for developing methodologies and tools for predictable, repeatable WSN experimentation.</td> |
| 2963 | </tr> |
| 2964 | |
| 2965 | |
| 2966 | |
| 2967 | <tr> |
| 2968 | <td valign="top">DOI</td> |
| 2969 | <td valign="top">10.1145/2030718.2030727</td> |
| 2970 | </tr> |
| 2971 | |
| 2972 | |
| 2973 | |
| 2974 | <tr> |
| 2975 | <td valign="top">URL</td> |
| 2976 | <td valign="top"><a href="http://dx.doi.org/10.1145/2030718.2030727">http://dx.doi.org/10.1145/2030718.2030727</a></td> |
| 2977 | </tr> |
| 2978 | |
| 2979 | |
| 2980 | </li> |
| 2981 | |
| 2982 | </table></div><br><br> |
| 2983 | |
| 2984 | |
| 2985 | |
| 2986 | |
| 2987 | <a class="EntryGoto" id="Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten"></a> |
| 2988 | <b class="myheading" style="position: relative; left: 5%;">Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten</b> |
| 2989 | |
| 2990 | <div class="BibEntry"> |
| 2991 | |
| 2992 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 2993 | |
| 2994 | <li> |
| 2995 | |
| 2996 | |
| 2997 | <tr> |
| 2998 | <td valign="top">Author</td> |
| 2999 | <td valign="top">Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten</td> |
| 3000 | </tr> |
| 3001 | |
| 3002 | <tr> |
| 3003 | <td valign="top">Title</td> |
| 3004 | <td valign="top">VeriFlow: verifying network-wide invariants in real time</td> |
| 3005 | </tr> |
| 3006 | |
| 3007 | <tr> |
| 3008 | <td valign="top">Booktitle</td> |
| 3009 | <td valign="top">Proceedings of the first workshop on Hot topics in software defined networks</td> |
| 3010 | </tr> |
| 3011 | |
| 3012 | <tr> |
| 3013 | <td valign="top">Location</td> |
| 3014 | <td valign="top">Helsinki, Finland</td> |
| 3015 | </tr> |
| 3016 | |
| 3017 | <tr> |
| 3018 | <td valign="top">Publisher</td> |
| 3019 | <td valign="top">ACM</td> |
| 3020 | </tr> |
| 3021 | |
| 3022 | <tr> |
| 3023 | <td valign="top">Address</td> |
| 3024 | <td valign="top">New York, NY, USA</td> |
| 3025 | </tr> |
| 3026 | |
| 3027 | <tr> |
| 3028 | <td valign="top">Year</td> |
| 3029 | <td valign="top">2012</td> |
| 3030 | </tr> |
| 3031 | |
| 3032 | |
| 3033 | |
| 3034 | <tr> |
| 3035 | <td valign="top">DOI</td> |
| 3036 | <td valign="top">10.1145/2342441.2342452</td> |
| 3037 | </tr> |
| 3038 | |
| 3039 | |
| 3040 | |
| 3041 | <tr> |
| 3042 | <td valign="top">URL</td> |
| 3043 | <td valign="top"><a href="http://doi.acm.org/10.1145/2342441.2342452">http://doi.acm.org/10.1145/2342441.2342452</a></td> |
| 3044 | </tr> |
| 3045 | |
| 3046 | |
| 3047 | </li> |
| 3048 | |
| 3049 | </table></div><br><br> |
| 3050 | |
| 3051 | |
| 3052 | |
| 3053 | |
| 3054 | <a class="EntryGoto" id="Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki"></a> |
| 3055 | <b class="myheading" style="position: relative; left: 5%;">Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki</b> |
| 3056 | |
| 3057 | <div class="BibEntry"> |
| 3058 | |
| 3059 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3060 | |
| 3061 | <li> |
| 3062 | |
| 3063 | |
| 3064 | <tr> |
| 3065 | <td valign="top">Author</td> |
| 3066 | <td valign="top">Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki</td> |
| 3067 | </tr> |
| 3068 | |
| 3069 | <tr> |
| 3070 | <td valign="top">Title</td> |
| 3071 | <td valign="top">Future Internet: Challenges in Virtualization and Federation</td> |
| 3072 | </tr> |
| 3073 | |
| 3074 | <tr> |
| 3075 | <td valign="top">Booktitle</td> |
| 3076 | <td valign="top">2009 Fifth Advanced International Conference on Telecommunications</td> |
| 3077 | </tr> |
| 3078 | |
| 3079 | <tr> |
| 3080 | <td valign="top">Location</td> |
| 3081 | <td valign="top">Venice/Mestre, Italy</td> |
| 3082 | </tr> |
| 3083 | |
| 3084 | <tr> |
| 3085 | <td valign="top">Publisher</td> |
| 3086 | <td valign="top">IEEE</td> |
| 3087 | </tr> |
| 3088 | |
| 3089 | <tr> |
| 3090 | <td valign="top">Year</td> |
| 3091 | <td valign="top">2009</td> |
| 3092 | </tr> |
| 3093 | |
| 3094 | <tr> |
| 3095 | <td valign="top">Abstract</td> |
| 3096 | <td valign="top">Future Internet is a clean-slate research activity in the quest of new networking technologies to overcome the limits of the current Internet. In its experimental research, virtualization and federation are emerging as essential features, especially in the construction and operation of the testbeds. Moreover, they are believed to sustain as the fundamental features of the Future Internet itself. Visions and experiences on virtualization and federation are given by leading experts from US, EU, and Asia.</td> |
| 3097 | </tr> |
| 3098 | |
| 3099 | |
| 3100 | |
| 3101 | <tr> |
| 3102 | <td valign="top">DOI</td> |
| 3103 | <td valign="top">10.1109/AICT.2009.8</td> |
| 3104 | </tr> |
| 3105 | |
| 3106 | |
| 3107 | |
| 3108 | <tr> |
| 3109 | <td valign="top">URL</td> |
| 3110 | <td valign="top"><a href="http://dx.doi.org/10.1109/AICT.2009.8">http://dx.doi.org/10.1109/AICT.2009.8</a></td> |
| 3111 | </tr> |
| 3112 | |
| 3113 | |
| 3114 | </li> |
| 3115 | |
| 3116 | </table></div><br><br> |
| 3117 | |
| 3118 | |
| 3119 | |
| 3120 | |
| 3121 | <a class="EntryGoto" id="Kim, Hyunjun and Lee, Sungwon"></a> |
| 3122 | <b class="myheading" style="position: relative; left: 5%;">Kim, Hyunjun and Lee, Sungwon</b> |
| 3123 | |
| 3124 | <div class="BibEntry"> |
| 3125 | |
| 3126 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3127 | |
| 3128 | <li> |
| 3129 | |
| 3130 | |
| 3131 | <tr> |
| 3132 | <td valign="top">Author</td> |
| 3133 | <td valign="top">Kim, Hyunjun and Lee, Sungwon</td> |
| 3134 | </tr> |
| 3135 | |
| 3136 | <tr> |
| 3137 | <td valign="top">Title</td> |
| 3138 | <td valign="top">FiRST Cloud Aggregate Manager development over FiRST: Future Internet testbed</td> |
| 3139 | </tr> |
| 3140 | |
| 3141 | <tr> |
| 3142 | <td valign="top">Booktitle</td> |
| 3143 | <td valign="top">The International Conference on Information Network 2012</td> |
| 3144 | </tr> |
| 3145 | |
| 3146 | <tr> |
| 3147 | <td valign="top">Location</td> |
| 3148 | <td valign="top">Bali, Indonesia</td> |
| 3149 | </tr> |
| 3150 | |
| 3151 | <tr> |
| 3152 | <td valign="top">Publisher</td> |
| 3153 | <td valign="top">IEEE</td> |
| 3154 | </tr> |
| 3155 | |
| 3156 | <tr> |
| 3157 | <td valign="top">Year</td> |
| 3158 | <td valign="top">2012</td> |
| 3159 | </tr> |
| 3160 | |
| 3161 | <tr> |
| 3162 | <td valign="top">Abstract</td> |
| 3163 | <td valign="top">FiRST (Future Internet Research for Sustainable Test-bed) is the future internet platform development project being performed in Korea. The goal of the project is to create the virtualized and dynamic service creation environments over future internet networks; it is an experimental project to realize future innovative service ideas over real network environments. Among this, cloud computing is the key enabler to control and allocate virtualized network resources (such as CPU, storage, and virtualized network configuration) for the requested services. However, researches on interworking between future internet and cloud computing is in initial phase. In this paper, we propose the FiRST Cloud Aggregate Manager (AM) based on GENI (Global Environment for Network Innovation) AM Application Programming Interface (API) for the federation between future internet test-bed and open source OpenStack cloud computing platform. After that, we propose the zero-client service for mobile cloud management. In order to control the zero-client service, we develop Cloud Mobility Client/Server. And, we validate and verified our FiRST Cloud AM and zero-client service by developing experimental test-bed. Through this test-bed, we confirm that the proposed FiRST Cloud AM and zero-client service efficiently interworks with future internet control plane framework by using GENI Control Framework (GCF) tools.</td> |
| 3164 | </tr> |
| 3165 | |
| 3166 | |
| 3167 | |
| 3168 | <tr> |
| 3169 | <td valign="top">DOI</td> |
| 3170 | <td valign="top">10.1109/ICOIN.2012.6164436</td> |
| 3171 | </tr> |
| 3172 | |
| 3173 | |
| 3174 | |
| 3175 | <tr> |
| 3176 | <td valign="top">URL</td> |
| 3177 | <td valign="top"><a href="http://dx.doi.org/10.1109/ICOIN.2012.6164436">http://dx.doi.org/10.1109/ICOIN.2012.6164436</a></td> |
| 3178 | </tr> |
| 3179 | |
| 3180 | |
| 3181 | </li> |
| 3182 | |
| 3183 | </table></div><br><br> |
| 3184 | |
| 3185 | |
| 3186 | |
| 3187 | |
| 3188 | <a class="EntryGoto" id="Kline, Donald and Quan, John"></a> |
| 3189 | <b class="myheading" style="position: relative; left: 5%;">Kline, Donald and Quan, John</b> |
| 3190 | |
| 3191 | <div class="BibEntry"> |
| 3192 | |
| 3193 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3194 | |
| 3195 | <li> |
| 3196 | |
| 3197 | |
| 3198 | <tr> |
| 3199 | <td valign="top">Author</td> |
| 3200 | <td valign="top">Kline, Donald and Quan, John</td> |
| 3201 | </tr> |
| 3202 | |
| 3203 | <tr> |
| 3204 | <td valign="top">Title</td> |
| 3205 | <td valign="top">Attribute description service for large-scale networks</td> |
| 3206 | </tr> |
| 3207 | |
| 3208 | <tr> |
| 3209 | <td valign="top">Booktitle</td> |
| 3210 | <td valign="top">Proceedings of the 2nd international conference on Human centered design</td> |
| 3211 | </tr> |
| 3212 | |
| 3213 | <tr> |
| 3214 | <td valign="top">Location</td> |
| 3215 | <td valign="top">Orlando, FL, USA</td> |
| 3216 | </tr> |
| 3217 | |
| 3218 | <tr> |
| 3219 | <td valign="top">Publisher</td> |
| 3220 | <td valign="top">Springer-Verlag</td> |
| 3221 | </tr> |
| 3222 | |
| 3223 | <tr> |
| 3224 | <td valign="top">Address</td> |
| 3225 | <td valign="top">Berlin, Heidelberg</td> |
| 3226 | </tr> |
| 3227 | |
| 3228 | <tr> |
| 3229 | <td valign="top">Year</td> |
| 3230 | <td valign="top">2011</td> |
| 3231 | </tr> |
| 3232 | |
| 3233 | <tr> |
| 3234 | <td valign="top">Abstract</td> |
| 3235 | <td valign="top">An analysis of requesting resources from large-scale networks reveals a fundamental challenge. As the network grows, more and more resources become available, and so finding resources that fit experimental test criteria becomes difficult and time consuming. For example, the National Science Foundation sponsors GENI--an experimental network with a goal to gain enough resources to model the Internet at scale. Currently, GENI contains relatively few contributed resources donated from businesses and academia, and so matching resources to tests is rather simple. However, experimenters plan to conduct network experiments that are very complex and difficult to accurately model by using the vast numbers of resources expected in GENI. When GENI reaches its final state, finding the right resources that fit experimental test criteria out of many thousands of donated resources may be as difficult as conducting the experiment itself. This dilemma underscores the importance of establishing an attribute description service that promotes a standardized language for all interactions between the end users and the large-scale network.</td> |
| 3236 | </tr> |
| 3237 | |
| 3238 | |
| 3239 | |
| 3240 | <tr> |
| 3241 | <td valign="top">DOI</td> |
| 3242 | <td valign="top">10.1007/978-3-642-21753-1_58</td> |
| 3243 | </tr> |
| 3244 | |
| 3245 | |
| 3246 | |
| 3247 | <tr> |
| 3248 | <td valign="top">URL</td> |
| 3249 | <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=2021672.2021735">http://portal.acm.org/citation.cfm?id=2021672.2021735</a></td> |
| 3250 | </tr> |
| 3251 | |
| 3252 | |
| 3253 | </li> |
| 3254 | |
| 3255 | </table></div><br><br> |
| 3256 | |
| 3257 | |
| 3258 | |
| 3259 | |
| 3260 | <a class="EntryGoto" id="Krishnappa, D. K. and Irwin, D. and Lyons, E. and Zink, M."></a> |
| 3261 | <b class="myheading" style="position: relative; left: 5%;">Krishnappa, D. K. and Irwin, D. and Lyons, E. and Zink, M.</b> |
| 3262 | |
| 3263 | <div class="BibEntry"> |
| 3264 | |
| 3265 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3266 | |
| 3267 | <li> |
| 3268 | |
| 3269 | |
| 3270 | <tr> |
| 3271 | <td valign="top">Author</td> |
| 3272 | <td valign="top">Krishnappa, D. K. and Irwin, D. and Lyons, E. and Zink, M.</td> |
| 3273 | </tr> |
| 3274 | |
| 3275 | <tr> |
| 3276 | <td valign="top">Title</td> |
| 3277 | <td valign="top">CloudCast: Cloud Computing for Short-Term Weather Forecasts</td> |
| 3278 | </tr> |
| 3279 | |
| 3280 | <tr> |
| 3281 | <td valign="top">Journal</td> |
| 3282 | <td valign="top">Computing in Science & Engineering</td> |
| 3283 | </tr> |
| 3284 | |
| 3285 | <tr> |
| 3286 | <td valign="top">Publisher</td> |
| 3287 | <td valign="top">IEEE</td> |
| 3288 | </tr> |
| 3289 | |
| 3290 | <tr> |
| 3291 | <td valign="top">Year</td> |
| 3292 | <td valign="top">2013</td> |
| 3293 | </tr> |
| 3294 | |
| 3295 | <tr> |
| 3296 | <td valign="top">Abstract</td> |
| 3297 | <td valign="top">CloudCast provides personalized short-term weather forecasts to clients based on their current location using cloud services, generating accurate forecasts tens of minutes in the future for small areas. Results show that it takes less than two minutes from the start of data sampling to deliver a 15-minute forecast to a client.</td> |
| 3298 | </tr> |
| 3299 | |
| 3300 | |
| 3301 | |
| 3302 | <tr> |
| 3303 | <td valign="top">DOI</td> |
| 3304 | <td valign="top">10.1109/mcse.2013.43</td> |
| 3305 | </tr> |
| 3306 | |
| 3307 | |
| 3308 | |
| 3309 | <tr> |
| 3310 | <td valign="top">URL</td> |
| 3311 | <td valign="top"><a href="http://dx.doi.org/10.1109/mcse.2013.43">http://dx.doi.org/10.1109/mcse.2013.43</a></td> |
| 3312 | </tr> |
| 3313 | |
| 3314 | |
| 3315 | </li> |
| 3316 | |
| 3317 | </table></div><br><br> |
| 3318 | |
| 3319 | |
| 3320 | |
| 3321 | |
| 3322 | <a class="EntryGoto" id="Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael"></a> |
| 3323 | <b class="myheading" style="position: relative; left: 5%;">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b> |
| 3324 | |
| 3325 | <div class="BibEntry"> |
| 3326 | |
| 3327 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3328 | |
| 3329 | <li> |
| 3330 | |
| 3331 | |
| 3332 | <tr> |
| 3333 | <td valign="top">Author</td> |
| 3334 | <td valign="top">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</td> |
| 3335 | </tr> |
| 3336 | |
| 3337 | <tr> |
| 3338 | <td valign="top">Title</td> |
| 3339 | <td valign="top">Performance of GENI Cloud Testbeds for Real Time Scientific Application</td> |
| 3340 | </tr> |
| 3341 | |
| 3342 | <tr> |
| 3343 | <td valign="top">Booktitle</td> |
| 3344 | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
| 3345 | </tr> |
| 3346 | |
| 3347 | <tr> |
| 3348 | <td valign="top">Location</td> |
| 3349 | <td valign="top">Los Angeles</td> |
| 3350 | </tr> |
| 3351 | |
| 3352 | <tr> |
| 3353 | <td valign="top">Year</td> |
| 3354 | <td valign="top">2012</td> |
| 3355 | </tr> |
| 3356 | |
| 3357 | <tr> |
| 3358 | <td valign="top">Abstract</td> |
| 3359 | <td valign="top">Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform.</td> |
| 3360 | </tr> |
| 3361 | |
| 3362 | |
| 3363 | |
| 3364 | |
| 3365 | |
| 3366 | |
| 3367 | </li> |
| 3368 | |
| 3369 | </table></div><br><br> |
| 3370 | |
| 3371 | |
| 3372 | |
| 3373 | |
| 3374 | <a class="EntryGoto" id="Lee, Jae W."></a> |
| 3375 | <b class="myheading" style="position: relative; left: 5%;">Lee, Jae W.</b> |
| 3376 | |
| 3377 | <div class="BibEntry"> |
| 3378 | |
| 3379 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3380 | |
| 3381 | <li> |
| 3382 | |
| 3383 | |
| 3384 | <tr> |
| 3385 | <td valign="top">Author</td> |
| 3386 | <td valign="top">Lee, Jae W.</td> |
| 3387 | </tr> |
| 3388 | |
| 3389 | <tr> |
| 3390 | <td valign="top">Title</td> |
| 3391 | <td valign="top">Towards a Common System Architecture for Dynamically Deploying Network Services in Routers and End Hosts</td> |
| 3392 | </tr> |
| 3393 | |
| 3394 | <tr> |
| 3395 | <td valign="top">Year</td> |
| 3396 | <td valign="top">2012</td> |
| 3397 | </tr> |
| 3398 | |
| 3399 | <tr> |
| 3400 | <td valign="top">Abstract</td> |
| 3401 | <td valign="top">The architectural simplicity of the core Internet is a double-edged sword. On the one hand, its agnostic nature paved the way for endless innovations of end-to-end applications. On the other hand, the inherent limitation of this simplicity makes it difficult to add new functions to the network core itself. This is exacerbated by the conservative tendency of commercial entities to l̈eave well-enough alone,̈ leading to the current situation often referred to as the ossification of the Internet. For decades, there has been practically no new functionality that has been added to the core Internet on a large scale. This thesis explores the possibility of enabling in-network services towards the goal of overcoming the ossification of the Internet. Our ultimate goal is to provide a common run-time environment supported by all Internet nodes and a wide-area deployment mechanism, so that network services can be freely installed, removed, and migrated among Internet nodes of all kinds–from a backbone router to a set-top box at home. In that vision of a future Internet, there is little difference between servers and routers for the purpose of running network services. Services can run anywhere on the Internet. Application service providers will have the freedom to choose the best place to run their code. This thesis presents NetServ, our first step to realize the vision of network services running anywhere on the Internet. NetServ is a node architecture for dynamically deploying in-network services on edge routers. Network functions and applications are implemented as software modules which can be deployed at any NetServ-enabled node on the Internet, subject to policy restrictions. The NetServ framework provides a common execution environment for service modules and the ability to dynamically install and remove the services without restarting the nodes. There are many challenges in designing such a system. The main contribution of this thesis lies in meeting those challenges. First, we recognize that the primary impetus for adopting new technologies is economics. To address the challenge of providing economic incentives for enabling in-network services, we demonstrate how NetServ can facilitate an economic alliance between content providers and ISPs. Using NetServ, content providers and the ISPs operating at the network edge (aka eyeball ISPs) can enter into a mutually beneficial economic relationship. ISPs make their NetServ-enabled edge routers available for hosting content providers' applications and contents. Content providers can operate closer to end users by deploying code modules on NetServ-enabled edge routers. We make our case by presenting NetServ applications which represent four concrete use cases. Second, our node architecture must support both traditional server applications and in-network packet processing applications since content providers' applications running on ISPs' routers will combine the traits of both. To address this challenge, NetServ framework can host a packet processing module that sits in the data path, a server module that uses the TCP/IP stack in the traditional way, or a combined module that does both. NetServ provides a unified runtime environment between routers and servers, taking us a step closer to the vision of the unified runtime available on all Internet nodes. Third, we must provide a fast and streamlined deployment mechanism. Content providers should be able to deploy their applications at any NetServ-enabled edge router on the Inter- net, given that they have proper authorizations. Moreover, in some application scenarios, content providers may not know the exact locations of the target routers. Content providers need a way to send a message to install or remove an application module towards a network destination, and have the NetServ-enabled routers located in the path catch and act on the message. To address this challenge, we adopted on-path signaling as the deployment mechanism for NetServ. A NetServ signaling message is sent in an IP packet towards a destination. The packet gets forwarded by IP routers as usual, but when it transits a NetServ-enabled router, the message gets intercepted and passed to the NetServ control layer. Fourth, a NetServ-enabled router must support the concurrent executions of multiple without restarting the nodes. There are many challenges in designing such a system. The main contribution of this thesis lies in meeting those challenges. First, we recognize that the primary impetus for adopting new technologies is economics. To address the challenge of providing economic incentives for enabling in-network services, we demonstrate how NetServ can facilitate an economic alliance between content providers and ISPs. Using NetServ, content providers and the ISPs operating at the network edge (aka eyeball ISPs) can enter into a mutually beneficial economic relationship. ISPs make their NetServ-enabled edge routers available for hosting content providers' applications and contents. Content providers can operate closer to end users by deploying code modules on NetServ-enabled edge routers. We make our case by presenting NetServ applications which represent four concrete use cases. Second, our node architecture must support both traditional server applications and in-network packet processing applications since content providers' applications running on ISPs' routers will combine the traits of both. To address this challenge, NetServ framework can host a packet processing module that sits in the data path, a server module that uses the TCP/IP stack in the traditional way, or a combined module that does both. NetServ provides a unified runtime environment between routers and servers, taking us a step closer to the vision of the unified runtime available on all Internet nodes. Third, we must provide a fast and streamlined deployment mechanism. Content providers should be able to deploy their applications at any NetServ-enabled edge router on the Internet, given that they have proper authorizations. Moreover, in some application scenarios, content providers may not know the exact locations of the target routers. Content providers need a way to send a message to install or remove an application module towards a network destination, and have the NetServ-enabled routers located in the path catch and act on the message. To address this challenge, we adopted on-path signaling as the deployment mechanism for NetServ. A NetServ signaling message is sent in an IP packet towards a destination. The packet gets forwarded by IP routers as usual, but when it transits a NetServ-enabled router, the message gets intercepted and passed to the NetServ control layer. Fourth, a NetServ-enabled router must support the concurrent executions of multiple content providers' applications. Each content provider's execution environment must be isolated from one another, and the resource usage of each must be controlled. To address the challenge of providing a robust multi-user execution environment, we chose to run NetServ modules in user space. This is in stark contrast to most programmable routers, which run service modules in kernel space for fast packet processing. Furthermore, NetServ modules are written in Java and run in Java Virtual Machines (JVMs). Our choice of user space execution and JVM allows us to leverage the decades of technology advances in operating systems, virtualization, and Java. Lastly, in order to host the services of a large number of content providers, NetServ must be able to scale beyond the single-box architecture. We address this challenge with the multi-box lateral expansion of NetServ using the OpenFlow forwarding engine. In this extended architecture, multiple NetServ nodes are attached to an OpenFlow switch, which provides a physically separate forwarding plane. The scalability of user services is no longer limited to a single NetServ box. Additionally, this thesis presents our prior work on improving service discovery in local and global networks. The service discovery work makes indirect contribution because the limitations of local and overlay networks encountered during those studies eventually led us to investigate in-network services, which resulted in NetServ. Specifically, we investigate the issues involved in bootstrapping large-scale structured overlay networks, present a tool to merge service announcements from multiple local networks, and propose an enhancement to structured overlay networks using link-local multicast.</td> |
| 3402 | </tr> |
| 3403 | |
| 3404 | |
| 3405 | |
| 3406 | |
| 3407 | |
| 3408 | <tr> |
| 3409 | <td valign="top">URL</td> |
| 3410 | <td valign="top"><a href="http://academiccommons.columbia.edu/download/fedora_content/download/ac:147210/CONTENT/Lee_columbia_0054D_10773.pdf">http://academiccommons.columbia.edu/download/fedora_content/download/ac:147210/CONTENT/Lee_columbia_0054D_10773.pdf</a></td> |
| 3411 | </tr> |
| 3412 | |
| 3413 | |
| 3414 | </li> |
| 3415 | |
| 3416 | </table></div><br><br> |
| 3417 | |
| 3418 | |
| 3419 | |
| 3420 | |
| 3421 | <a class="EntryGoto" id="Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang"></a> |
| 3422 | <b class="myheading" style="position: relative; left: 5%;">Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang</b> |
| 3423 | |
| 3424 | <div class="BibEntry"> |
| 3425 | |
| 3426 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3427 | |
| 3428 | <li> |
| 3429 | |
| 3430 | |
| 3431 | <tr> |
| 3432 | <td valign="top">Author</td> |
| 3433 | <td valign="top">Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang</td> |
| 3434 | </tr> |
| 3435 | |
| 3436 | <tr> |
| 3437 | <td valign="top">Title</td> |
| 3438 | <td valign="top">NetServ: Active Networking 2.0</td> |
| 3439 | </tr> |
| 3440 | |
| 3441 | <tr> |
| 3442 | <td valign="top">Booktitle</td> |
| 3443 | <td valign="top">2011 IEEE International Conference on Communications Workshops (ICC)</td> |
| 3444 | </tr> |
| 3445 | |
| 3446 | <tr> |
| 3447 | <td valign="top">Location</td> |
| 3448 | <td valign="top">Kyoto, Japan</td> |
| 3449 | </tr> |
| 3450 | |
| 3451 | <tr> |
| 3452 | <td valign="top">Publisher</td> |
| 3453 | <td valign="top">IEEE</td> |
| 3454 | </tr> |
| 3455 | |
| 3456 | <tr> |
| 3457 | <td valign="top">Year</td> |
| 3458 | <td valign="top">2011</td> |
| 3459 | </tr> |
| 3460 | |
| 3461 | <tr> |
| 3462 | <td valign="top">Abstract</td> |
| 3463 | <td valign="top">We present NetServ, a node architecture for deploying in-network services in the next generation Internet. NetServ-enabled network nodes provide a common execution environment, where network services implemented as modules can be dynamically installed and removed. We demonstrate three such modules. MicroCDN is a dynamic content distribution network (CDN) service which implements a content caching strategy specific to a content provider. The NAT Keep-alive module offloads the processing of keep-alive messages from SIP servers. The Media Relay module allows any NetServ node to act as a media relay, eliminating the need to manage standalone relay servers. NetServ aims to revive the Active Networking vision. It was too far ahead of its time a decade ago, but we believe its time has finally arrived.</td> |
| 3464 | </tr> |
| 3465 | |
| 3466 | |
| 3467 | |
| 3468 | <tr> |
| 3469 | <td valign="top">DOI</td> |
| 3470 | <td valign="top">10.1109/iccw.2011.5963554</td> |
| 3471 | </tr> |
| 3472 | |
| 3473 | |
| 3474 | |
| 3475 | <tr> |
| 3476 | <td valign="top">URL</td> |
| 3477 | <td valign="top"><a href="http://dx.doi.org/10.1109/iccw.2011.5963554">http://dx.doi.org/10.1109/iccw.2011.5963554</a></td> |
| 3478 | </tr> |
| 3479 | |
| 3480 | |
| 3481 | </li> |
| 3482 | |
| 3483 | </table></div><br><br> |
| 3484 | |
| 3485 | |
| 3486 | |
| 3487 | |
| 3488 | <a class="EntryGoto" id="Lee, Ki S. and Wang, Han and Weatherspoon, Hakim"></a> |
| 3489 | <b class="myheading" style="position: relative; left: 5%;">Lee, Ki S. and Wang, Han and Weatherspoon, Hakim</b> |
| 3490 | |
| 3491 | <div class="BibEntry"> |
| 3492 | |
| 3493 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3494 | |
| 3495 | <li> |
| 3496 | |
| 3497 | |
| 3498 | <tr> |
| 3499 | <td valign="top">Author</td> |
| 3500 | <td valign="top">Lee, Ki S. and Wang, Han and Weatherspoon, Hakim</td> |
| 3501 | </tr> |
| 3502 | |
| 3503 | <tr> |
| 3504 | <td valign="top">Title</td> |
| 3505 | <td valign="top">SoNIC: precise realtime software access and control of wired networks</td> |
| 3506 | </tr> |
| 3507 | |
| 3508 | <tr> |
| 3509 | <td valign="top">Booktitle</td> |
| 3510 | <td valign="top">Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation</td> |
| 3511 | </tr> |
| 3512 | |
| 3513 | <tr> |
| 3514 | <td valign="top">Location</td> |
| 3515 | <td valign="top">Lombard, IL</td> |
| 3516 | </tr> |
| 3517 | |
| 3518 | <tr> |
| 3519 | <td valign="top">Publisher</td> |
| 3520 | <td valign="top">USENIX Association</td> |
| 3521 | </tr> |
| 3522 | |
| 3523 | <tr> |
| 3524 | <td valign="top">Address</td> |
| 3525 | <td valign="top">Berkeley, CA, USA</td> |
| 3526 | </tr> |
| 3527 | |
| 3528 | <tr> |
| 3529 | <td valign="top">Year</td> |
| 3530 | <td valign="top">2013</td> |
| 3531 | </tr> |
| 3532 | |
| 3533 | |
| 3534 | |
| 3535 | |
| 3536 | |
| 3537 | <tr> |
| 3538 | <td valign="top">URL</td> |
| 3539 | <td valign="top"><a href="http://dl.acm.org/citation.cfm?id=2482626.2482648">http://dl.acm.org/citation.cfm?id=2482626.2482648</a></td> |
| 3540 | </tr> |
| 3541 | |
| 3542 | |
| 3543 | </li> |
| 3544 | |
| 3545 | </table></div><br><br> |
| 3546 | |
| 3547 | |
| 3548 | |
| 3549 | |
| 3550 | <a class="EntryGoto" id="Li, Dawei and Hong, Xiaoyan"></a> |
| 3551 | <b class="myheading" style="position: relative; left: 5%;">Li, Dawei and Hong, Xiaoyan</b> |
| 3552 | |
| 3553 | <div class="BibEntry"> |
| 3554 | |
| 3555 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3556 | |
| 3557 | <li> |
| 3558 | |
| 3559 | |
| 3560 | <tr> |
| 3561 | <td valign="top">Author</td> |
| 3562 | <td valign="top">Li, Dawei and Hong, Xiaoyan</td> |
| 3563 | </tr> |
| 3564 | |
| 3565 | <tr> |
| 3566 | <td valign="top">Title</td> |
| 3567 | <td valign="top">Practical exploitation on system vulnerability of ProtoGENI</td> |
| 3568 | </tr> |
| 3569 | |
| 3570 | <tr> |
| 3571 | <td valign="top">Booktitle</td> |
| 3572 | <td valign="top">Proceedings of the 49th Annual Southeast Regional Conference</td> |
| 3573 | </tr> |
| 3574 | |
| 3575 | <tr> |
| 3576 | <td valign="top">Location</td> |
| 3577 | <td valign="top">Kennesaw, Georgia</td> |
| 3578 | </tr> |
| 3579 | |
| 3580 | <tr> |
| 3581 | <td valign="top">Publisher</td> |
| 3582 | <td valign="top">ACM</td> |
| 3583 | </tr> |
| 3584 | |
| 3585 | <tr> |
| 3586 | <td valign="top">Address</td> |
| 3587 | <td valign="top">New York, NY, USA</td> |
| 3588 | </tr> |
| 3589 | |
| 3590 | <tr> |
| 3591 | <td valign="top">Year</td> |
| 3592 | <td valign="top">2011</td> |
| 3593 | </tr> |
| 3594 | |
| 3595 | <tr> |
| 3596 | <td valign="top">Abstract</td> |
| 3597 | <td valign="top">Global Environment for Network Innovations (GENI) is a unique virtual laboratory for at-scale networking experimentation exploring future Internets. The successful development of GENI has to consider security problems from the design and prototyping stages. However, in many cases, system vulnerability cannot be found unless through real experimentation bearing purposeful and meaningful designs. In this paper, we introduce some of our efforts in exploring the security vulnerabilities in ProtoGENI, a prototype implementation and deployment of GENI. Our results show potential breach on security of GENI in terms of availability. We make suggestions on potential defense strategies in order to improve the ProtoGENI security and its development.</td> |
| 3598 | </tr> |
| 3599 | |
| 3600 | |
| 3601 | |
| 3602 | <tr> |
| 3603 | <td valign="top">DOI</td> |
| 3604 | <td valign="top">10.1145/2016039.2016073</td> |
| 3605 | </tr> |
| 3606 | |
| 3607 | |
| 3608 | |
| 3609 | <tr> |
| 3610 | <td valign="top">URL</td> |
| 3611 | <td valign="top"><a href="http://dx.doi.org/10.1145/2016039.2016073">http://dx.doi.org/10.1145/2016039.2016073</a></td> |
| 3612 | </tr> |
| 3613 | |
| 3614 | |
| 3615 | </li> |
| 3616 | |
| 3617 | </table></div><br><br> |
| 3618 | |
| 3619 | |
| 3620 | |
| 3621 | |
| 3622 | <a class="EntryGoto" id="Li, Dawei and Hong, Xiaoyan and Bowman, Jason"></a> |
| 3623 | <b class="myheading" style="position: relative; left: 5%;">Li, Dawei and Hong, Xiaoyan and Bowman, Jason</b> |
| 3624 | |
| 3625 | <div class="BibEntry"> |
| 3626 | |
| 3627 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3628 | |
| 3629 | <li> |
| 3630 | |
| 3631 | |
| 3632 | <tr> |
| 3633 | <td valign="top">Author</td> |
| 3634 | <td valign="top">Li, Dawei and Hong, Xiaoyan and Bowman, Jason</td> |
| 3635 | </tr> |
| 3636 | |
| 3637 | <tr> |
| 3638 | <td valign="top">Title</td> |
| 3639 | <td valign="top">Evaluation of Security Vulnerabilities by Using ProtoGENI as a Launchpad</td> |
| 3640 | </tr> |
| 3641 | |
| 3642 | <tr> |
| 3643 | <td valign="top">Booktitle</td> |
| 3644 | <td valign="top">IEEE Global Communications Conference (GLOBECOM 2011)</td> |
| 3645 | </tr> |
| 3646 | |
| 3647 | <tr> |
| 3648 | <td valign="top">Year</td> |
| 3649 | <td valign="top">2011</td> |
| 3650 | </tr> |
| 3651 | |
| 3652 | <tr> |
| 3653 | <td valign="top">Abstract</td> |
| 3654 | <td valign="top">In this paper we analyze the security architecture of ProtoGENI. ProtoGENI is a prototype control framework implementation of GENI (Global Environment for Network Innovations). We perform a variety of experiments in an effort to identify potential vulnerabilities presented in the current implementation. We classify our attacks into three types: data plane to data plane, data plane to control plane, and data plane to Internet. Our results indicate the potential for a breach of confidentiality and availability internally within ProtoGENI, as well as risks to external Internet. We make suggestions outlining possible defense strategies to improve ProtoGENI security and aid in future development</td> |
| 3655 | </tr> |
| 3656 | |
| 3657 | |
| 3658 | |
| 3659 | |
| 3660 | |
| 3661 | <tr> |
| 3662 | <td valign="top">URL</td> |
| 3663 | <td valign="top"><a href="ftp://202.38.75.7/pub/%D0%C2%CE%C4%BC%FE%BC%D0%20(2)/DATA/PID1102190.PDF">ftp://202.38.75.7/pub/%D0%C2%CE%C4%BC%FE%BC%D0%20(2)/DATA/PID1102190.PDF</a></td> |
| 3664 | </tr> |
| 3665 | |
| 3666 | |
| 3667 | </li> |
| 3668 | |
| 3669 | </table></div><br><br> |
| 3670 | |
| 3671 | |
| 3672 | |
| 3673 | |
| 3674 | <a class="EntryGoto" id="Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason"></a> |
| 3675 | <b class="myheading" style="position: relative; left: 5%;">Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason</b> |
| 3676 | |
| 3677 | <div class="BibEntry"> |
| 3678 | |
| 3679 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3680 | |
| 3681 | <li> |
| 3682 | |
| 3683 | |
| 3684 | <tr> |
| 3685 | <td valign="top">Author</td> |
| 3686 | <td valign="top">Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason</td> |
| 3687 | </tr> |
| 3688 | |
| 3689 | <tr> |
| 3690 | <td valign="top">Title</td> |
| 3691 | <td valign="top">Simulation studies of OpenFlow-based in-network caching strategies</td> |
| 3692 | </tr> |
| 3693 | |
| 3694 | <tr> |
| 3695 | <td valign="top">Booktitle</td> |
| 3696 | <td valign="top">Proceedings of the 15th Communications and Networking Simulation Symposium</td> |
| 3697 | </tr> |
| 3698 | |
| 3699 | <tr> |
| 3700 | <td valign="top">Location</td> |
| 3701 | <td valign="top">Orlando, Florida</td> |
| 3702 | </tr> |
| 3703 | |
| 3704 | <tr> |
| 3705 | <td valign="top">Publisher</td> |
| 3706 | <td valign="top">Society for Computer Simulation International</td> |
| 3707 | </tr> |
| 3708 | |
| 3709 | <tr> |
| 3710 | <td valign="top">Address</td> |
| 3711 | <td valign="top">San Diego, CA, USA</td> |
| 3712 | </tr> |
| 3713 | |
| 3714 | <tr> |
| 3715 | <td valign="top">Year</td> |
| 3716 | <td valign="top">2012</td> |
| 3717 | </tr> |
| 3718 | |
| 3719 | <tr> |
| 3720 | <td valign="top">Abstract</td> |
| 3721 | <td valign="top">We propose an in-network caching architecture using Open-Flow to coordinate caching decisions in the network. Our scheme, called CacheFlow, extends the cache-and-forward concept by moving contents closer to the clients hop-by-hop using TCP for sending requests and retrieving contents. As such, CacheFlow can be incrementally implemented and deployed in the real network. In this paper, we present a simulation study of several caching policies, including a random cache policy, a statically optimal cache placement policy and a new disk placement strategy that places popular contents at the c̈enter ̈of the network. Experimental results show that simple in-network caching policies can be realized using today's technology to improve network performance.</td> |
| 3722 | </tr> |
| 3723 | |
| 3724 | |
| 3725 | |
| 3726 | |
| 3727 | |
| 3728 | <tr> |
| 3729 | <td valign="top">URL</td> |
| 3730 | <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=2331762.2331774">http://portal.acm.org/citation.cfm?id=2331762.2331774</a></td> |
| 3731 | </tr> |
| 3732 | |
| 3733 | |
| 3734 | </li> |
| 3735 | |
| 3736 | </table></div><br><br> |
| 3737 | |
| 3738 | |
| 3739 | |
| 3740 | |
| 3741 | <a class="EntryGoto" id="Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross"></a> |
| 3742 | <b class="myheading" style="position: relative; left: 5%;">Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</b> |
| 3743 | |
| 3744 | <div class="BibEntry"> |
| 3745 | |
| 3746 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3747 | |
| 3748 | <li> |
| 3749 | |
| 3750 | |
| 3751 | <tr> |
| 3752 | <td valign="top">Author</td> |
| 3753 | <td valign="top">Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</td> |
| 3754 | </tr> |
| 3755 | |
| 3756 | <tr> |
| 3757 | <td valign="top">Title</td> |
| 3758 | <td valign="top">Work-in-Progress: Empirical Verification of A Subset Sum Hypothesis in GENI Cloud</td> |
| 3759 | </tr> |
| 3760 | |
| 3761 | <tr> |
| 3762 | <td valign="top">Booktitle</td> |
| 3763 | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
| 3764 | </tr> |
| 3765 | |
| 3766 | <tr> |
| 3767 | <td valign="top">Location</td> |
| 3768 | <td valign="top">Los Angeles</td> |
| 3769 | </tr> |
| 3770 | |
| 3771 | <tr> |
| 3772 | <td valign="top">Year</td> |
| 3773 | <td valign="top">2012</td> |
| 3774 | </tr> |
| 3775 | |
| 3776 | |
| 3777 | |
| 3778 | |
| 3779 | |
| 3780 | |
| 3781 | </li> |
| 3782 | |
| 3783 | </table></div><br><br> |
| 3784 | |
| 3785 | |
| 3786 | |
| 3787 | |
| 3788 | <a class="EntryGoto" id="Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi"></a> |
| 3789 | <b class="myheading" style="position: relative; left: 5%;">Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</b> |
| 3790 | |
| 3791 | <div class="BibEntry"> |
| 3792 | |
| 3793 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3794 | |
| 3795 | <li> |
| 3796 | |
| 3797 | |
| 3798 | <tr> |
| 3799 | <td valign="top">Author</td> |
| 3800 | <td valign="top">Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</td> |
| 3801 | </tr> |
| 3802 | |
| 3803 | <tr> |
| 3804 | <td valign="top">Title</td> |
| 3805 | <td valign="top">Assessment of Router Vulnerabilities on PlanetLab Infrastructure for Secure Cloud Computing</td> |
| 3806 | </tr> |
| 3807 | |
| 3808 | <tr> |
| 3809 | <td valign="top">Booktitle</td> |
| 3810 | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
| 3811 | </tr> |
| 3812 | |
| 3813 | <tr> |
| 3814 | <td valign="top">Location</td> |
| 3815 | <td valign="top">Los Angeles</td> |
| 3816 | </tr> |
| 3817 | |
| 3818 | <tr> |
| 3819 | <td valign="top">Year</td> |
| 3820 | <td valign="top">2012</td> |
| 3821 | </tr> |
| 3822 | |
| 3823 | <tr> |
| 3824 | <td valign="top">Abstract</td> |
| 3825 | <td valign="top">In recent times, the cloud computing based delivery model has been proven to reduce enterprise IT costs and complexities. In contrast to traditional enterprise IT solutions, the cloud computing model moves the application software and data to remote servers in large datacenters, which raises many security challenges. One of the critical challenges is the inability to characterize the impact of the vulnerabilities of routers on the cloud security and performance guarantees. In this paper, we analyze the degree of security provided by routers to data sharing applications deployed in cloud environments that span administrative and network domains. Our analysis is based on examining the security level of network applications on routers which lie between nodes on Planetlab infrastructure. We assume that some of the PlanetLab nodes will share the same wide area network path as the cloud servers. Our preliminary results confirm that the majority of the routers are plagued by insecure network protocols, leading to vulnerable routers. These results confirm our hypothesis that the security of the network infrastructure needs to be upgraded to assure the protection of information exchanged on the wide area network path.</td> |
| 3826 | </tr> |
| 3827 | |
| 3828 | |
| 3829 | |
| 3830 | |
| 3831 | |
| 3832 | |
| 3833 | </li> |
| 3834 | |
| 3835 | </table></div><br><br> |
| 3836 | |
| 3837 | |
| 3838 | |
| 3839 | |
| 3840 | <a class="EntryGoto" id="Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H."></a> |
| 3841 | <b class="myheading" style="position: relative; left: 5%;">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</b> |
| 3842 | |
| 3843 | <div class="BibEntry"> |
| 3844 | |
| 3845 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3846 | |
| 3847 | <li> |
| 3848 | |
| 3849 | |
| 3850 | <tr> |
| 3851 | <td valign="top">Author</td> |
| 3852 | <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td> |
| 3853 | </tr> |
| 3854 | |
| 3855 | <tr> |
| 3856 | <td valign="top">Title</td> |
| 3857 | <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td> |
| 3858 | </tr> |
| 3859 | |
| 3860 | <tr> |
| 3861 | <td valign="top">Booktitle</td> |
| 3862 | <td valign="top">2012 IEEE Network Operations and Management Symposium</td> |
| 3863 | </tr> |
| 3864 | |
| 3865 | <tr> |
| 3866 | <td valign="top">Location</td> |
| 3867 | <td valign="top">Maui, HI</td> |
| 3868 | </tr> |
| 3869 | |
| 3870 | <tr> |
| 3871 | <td valign="top">Publisher</td> |
| 3872 | <td valign="top">IEEE</td> |
| 3873 | </tr> |
| 3874 | |
| 3875 | <tr> |
| 3876 | <td valign="top">Year</td> |
| 3877 | <td valign="top">2012</td> |
| 3878 | </tr> |
| 3879 | |
| 3880 | <tr> |
| 3881 | <td valign="top">Abstract</td> |
| 3882 | <td valign="top">Autonomic management capabilities of the Future Internet can be provided through a recently proposed service architecture called NetServ. It consists of the interconnection of programmable nodes which enable dynamic deployment and execution of network and application services. This paper shows how this architecture can be further improved by introducing the OpenFlow architecture and implementing the OpenFlow controller as a NetServ service, thus improving both the NetServ management performance and its flexibility. These achievements are demonstrated experimentally on the GENI environment, showing the platform self-protecting capabilities in case of a SIP DoS attack.</td> |
| 3883 | </tr> |
| 3884 | |
| 3885 | |
| 3886 | |
| 3887 | <tr> |
| 3888 | <td valign="top">DOI</td> |
| 3889 | <td valign="top">10.1109/NOMS.2012.6211961</td> |
| 3890 | </tr> |
| 3891 | |
| 3892 | |
| 3893 | |
| 3894 | <tr> |
| 3895 | <td valign="top">URL</td> |
| 3896 | <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td> |
| 3897 | </tr> |
| 3898 | |
| 3899 | |
| 3900 | </li> |
| 3901 | |
| 3902 | </table></div><br><br> |
| 3903 | |
| 3904 | |
| 3905 | |
| 3906 | |
| 3907 | <a class="EntryGoto" id="Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y."></a> |
| 3908 | <b class="myheading" style="position: relative; left: 5%;">Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y.</b> |
| 3909 | |
| 3910 | <div class="BibEntry"> |
| 3911 | |
| 3912 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3913 | |
| 3914 | <li> |
| 3915 | |
| 3916 | |
| 3917 | <tr> |
| 3918 | <td valign="top">Author</td> |
| 3919 | <td valign="top">Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y.</td> |
| 3920 | </tr> |
| 3921 | |
| 3922 | <tr> |
| 3923 | <td valign="top">Title</td> |
| 3924 | <td valign="top">Space Versus Time Separation for Wireless Virtualization on an Indoor Grid</td> |
| 3925 | </tr> |
| 3926 | |
| 3927 | <tr> |
| 3928 | <td valign="top">Booktitle</td> |
| 3929 | <td valign="top">Next Generation Internet Networks, 2008. NGI 2008</td> |
| 3930 | </tr> |
| 3931 | |
| 3932 | <tr> |
| 3933 | <td valign="top">Publisher</td> |
| 3934 | <td valign="top">IEEE</td> |
| 3935 | </tr> |
| 3936 | |
| 3937 | <tr> |
| 3938 | <td valign="top">Year</td> |
| 3939 | <td valign="top">2008</td> |
| 3940 | </tr> |
| 3941 | |
| 3942 | <tr> |
| 3943 | <td valign="top">Abstract</td> |
| 3944 | <td valign="top">The decreasing cost of wireless hardware and ever increasing number of wireless testbeds has led to a shift in the protocol evaluation paradigm from simulations towards emulation. In addition, with a large number of users demanding experimental resources and lack of space and time for deploying more hardware, fair resource sharing among independent co-existing experiments is important. We study the proposed approaches to wireless virtualization with a focus on schemes conserving wireless channels rather than nodes. Our detailed comparison reveals that while experiments sharing a channel by space separation achieve better efficiency than those relying on time separation of a channel, the isolation between experiments in both cases is comparable. We propose and implement a policy manager to alleviate the isolation problem and suggest scenarios in which either of the schemes would provide a suitable virtualization solution.</td> |
| 3945 | </tr> |
| 3946 | |
| 3947 | |
| 3948 | |
| 3949 | <tr> |
| 3950 | <td valign="top">DOI</td> |
| 3951 | <td valign="top">10.1109/NGI.2008.36</td> |
| 3952 | </tr> |
| 3953 | |
| 3954 | |
| 3955 | |
| 3956 | <tr> |
| 3957 | <td valign="top">URL</td> |
| 3958 | <td valign="top"><a href="http://dx.doi.org/10.1109/NGI.2008.36">http://dx.doi.org/10.1109/NGI.2008.36</a></td> |
| 3959 | </tr> |
| 3960 | |
| 3961 | |
| 3962 | </li> |
| 3963 | |
| 3964 | </table></div><br><br> |
| 3965 | |
| 3966 | |
| 3967 | |
| 3968 | |
| 3969 | <a class="EntryGoto" id="Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D."></a> |
| 3970 | <b class="myheading" style="position: relative; left: 5%;">Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D.</b> |
| 3971 | |
| 3972 | <div class="BibEntry"> |
| 3973 | |
| 3974 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 3975 | |
| 3976 | <li> |
| 3977 | |
| 3978 | |
| 3979 | <tr> |
| 3980 | <td valign="top">Author</td> |
| 3981 | <td valign="top">Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D.</td> |
| 3982 | </tr> |
| 3983 | |
| 3984 | <tr> |
| 3985 | <td valign="top">Title</td> |
| 3986 | <td valign="top">Integration of heterogeneous networking testbeds</td> |
| 3987 | </tr> |
| 3988 | |
| 3989 | <tr> |
| 3990 | <td valign="top">Booktitle</td> |
| 3991 | <td valign="top">Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities</td> |
| 3992 | </tr> |
| 3993 | |
| 3994 | <tr> |
| 3995 | <td valign="top">Location</td> |
| 3996 | <td valign="top">Innsbruck, Austria</td> |
| 3997 | </tr> |
| 3998 | |
| 3999 | <tr> |
| 4000 | <td valign="top">Publisher</td> |
| 4001 | <td valign="top">ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)</td> |
| 4002 | </tr> |
| 4003 | |
| 4004 | <tr> |
| 4005 | <td valign="top">Address</td> |
| 4006 | <td valign="top">ICST, Brussels, Belgium, Belgium</td> |
| 4007 | </tr> |
| 4008 | |
| 4009 | <tr> |
| 4010 | <td valign="top">Year</td> |
| 4011 | <td valign="top">2008</td> |
| 4012 | </tr> |
| 4013 | |
| 4014 | <tr> |
| 4015 | <td valign="top">Abstract</td> |
| 4016 | <td valign="top">As networking research expands into new frontiers, the research community has felt a need for a heterogeneous networking research infrastructure to experiment with the interaction and integration of different types of networks, and to test the performance of various networking protocols in realistic environments. This requirement has led to the Global Environment for Network Innovations (GENI) initiative to create a global infrastructure for conducting networking experiments across diverse substrates such as wired (local and wide-area), wireless, sensor and cellular networks. In this paper, we discuss and present two models for building such an experimental infrastructure. The first model enables a wired testbed to link with wireless edge nodes during an experiment, whereas the second model enables a wireless testbed to link to wired testbeds. Proof-of-concept experiments are also presented reinforcing the usefulness of the models in terms of facilitating experiments over the integrated heterogeneous infrastructure.</td> |
| 4017 | </tr> |
| 4018 | |
| 4019 | |
| 4020 | |
| 4021 | |
| 4022 | |
| 4023 | <tr> |
| 4024 | <td valign="top">URL</td> |
| 4025 | <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=1390609">http://portal.acm.org/citation.cfm?id=1390609</a></td> |
| 4026 | </tr> |
| 4027 | |
| 4028 | |
| 4029 | </li> |
| 4030 | |
| 4031 | </table></div><br><br> |
| 4032 | |
| 4033 | |
| 4034 | |
| 4035 | |
| 4036 | <a class="EntryGoto" id="Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I."></a> |
| 4037 | <b class="myheading" style="position: relative; left: 5%;">Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I.</b> |
| 4038 | |
| 4039 | <div class="BibEntry"> |
| 4040 | |
| 4041 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4042 | |
| 4043 | <li> |
| 4044 | |
| 4045 | |
| 4046 | <tr> |
| 4047 | <td valign="top">Author</td> |
| 4048 | <td valign="top">Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I.</td> |
| 4049 | </tr> |
| 4050 | |
| 4051 | <tr> |
| 4052 | <td valign="top">Title</td> |
| 4053 | <td valign="top">Enabling Wide Area Single System Image Experimentation on the GENI Platform</td> |
| 4054 | </tr> |
| 4055 | |
| 4056 | <tr> |
| 4057 | <td valign="top">Booktitle</td> |
| 4058 | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
| 4059 | </tr> |
| 4060 | |
| 4061 | <tr> |
| 4062 | <td valign="top">Location</td> |
| 4063 | <td valign="top">Salt Lake City, UT</td> |
| 4064 | </tr> |
| 4065 | |
| 4066 | <tr> |
| 4067 | <td valign="top">Publisher</td> |
| 4068 | <td valign="top">IEEE</td> |
| 4069 | </tr> |
| 4070 | |
| 4071 | <tr> |
| 4072 | <td valign="top">Year</td> |
| 4073 | <td valign="top">2013</td> |
| 4074 | </tr> |
| 4075 | |
| 4076 | |
| 4077 | |
| 4078 | <tr> |
| 4079 | <td valign="top">DOI</td> |
| 4080 | <td valign="top">10.1109/GREE.2013.27</td> |
| 4081 | </tr> |
| 4082 | |
| 4083 | |
| 4084 | |
| 4085 | <tr> |
| 4086 | <td valign="top">URL</td> |
| 4087 | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.27">http://dx.doi.org/10.1109/GREE.2013.27</a></td> |
| 4088 | </tr> |
| 4089 | |
| 4090 | |
| 4091 | </li> |
| 4092 | |
| 4093 | </table></div><br><br> |
| 4094 | |
| 4095 | |
| 4096 | |
| 4097 | |
| 4098 | <a class="EntryGoto" id="Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming"></a> |
| 4099 | <b class="myheading" style="position: relative; left: 5%;">Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</b> |
| 4100 | |
| 4101 | <div class="BibEntry"> |
| 4102 | |
| 4103 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4104 | |
| 4105 | <li> |
| 4106 | |
| 4107 | |
| 4108 | <tr> |
| 4109 | <td valign="top">Author</td> |
| 4110 | <td valign="top">Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</td> |
| 4111 | </tr> |
| 4112 | |
| 4113 | <tr> |
| 4114 | <td valign="top">Title</td> |
| 4115 | <td valign="top">Socially Aware Single System Images</td> |
| 4116 | </tr> |
| 4117 | |
| 4118 | <tr> |
| 4119 | <td valign="top">Booktitle</td> |
| 4120 | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
| 4121 | </tr> |
| 4122 | |
| 4123 | <tr> |
| 4124 | <td valign="top">Location</td> |
| 4125 | <td valign="top">Los Angeles</td> |
| 4126 | </tr> |
| 4127 | |
| 4128 | <tr> |
| 4129 | <td valign="top">Year</td> |
| 4130 | <td valign="top">2012</td> |
| 4131 | </tr> |
| 4132 | |
| 4133 | <tr> |
| 4134 | <td valign="top">Abstract</td> |
| 4135 | <td valign="top">Cloud computing enables users to get access to huge amounts of computing resources as desired. There are many popular commercial cloud service providers which provide resources to users at a price. These providers can not be trusted as far as privacy of data is concerned. On the other hand, people do trust their close friends, relatives and other social contacts, albeit, to varying degrees. This paper reports the work-in-progress on S3I(Socially Aware Single System Images) which allows users to form computing clusters using resources owned by their social contacts. It tries to utilize the trust found between people in real life and translate it to provide trustworthy resource sharing between them.</td> |
| 4136 | </tr> |
| 4137 | |
| 4138 | |
| 4139 | |
| 4140 | |
| 4141 | |
| 4142 | |
| 4143 | </li> |
| 4144 | |
| 4145 | </table></div><br><br> |
| 4146 | |
| 4147 | |
| 4148 | |
| 4149 | |
| 4150 | <a class="EntryGoto" id="Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil"></a> |
| 4151 | <b class="myheading" style="position: relative; left: 5%;">Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil</b> |
| 4152 | |
| 4153 | <div class="BibEntry"> |
| 4154 | |
| 4155 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4156 | |
| 4157 | <li> |
| 4158 | |
| 4159 | |
| 4160 | <tr> |
| 4161 | <td valign="top">Author</td> |
| 4162 | <td valign="top">Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil</td> |
| 4163 | </tr> |
| 4164 | |
| 4165 | <tr> |
| 4166 | <td valign="top">Title</td> |
| 4167 | <td valign="top">WiMAX in the Classroom: Designing a Cellular Networking Hands-on Lab</td> |
| 4168 | </tr> |
| 4169 | |
| 4170 | <tr> |
| 4171 | <td valign="top">Booktitle</td> |
| 4172 | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
| 4173 | </tr> |
| 4174 | |
| 4175 | <tr> |
| 4176 | <td valign="top">Location</td> |
| 4177 | <td valign="top">Salt Lake City, UT</td> |
| 4178 | </tr> |
| 4179 | |
| 4180 | <tr> |
| 4181 | <td valign="top">Publisher</td> |
| 4182 | <td valign="top">IEEE</td> |
| 4183 | </tr> |
| 4184 | |
| 4185 | <tr> |
| 4186 | <td valign="top">Year</td> |
| 4187 | <td valign="top">2013</td> |
| 4188 | </tr> |
| 4189 | |
| 4190 | |
| 4191 | |
| 4192 | <tr> |
| 4193 | <td valign="top">DOI</td> |
| 4194 | <td valign="top">10.1109/GREE.2013.29</td> |
| 4195 | </tr> |
| 4196 | |
| 4197 | |
| 4198 | |
| 4199 | <tr> |
| 4200 | <td valign="top">URL</td> |
| 4201 | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.29">http://dx.doi.org/10.1109/GREE.2013.29</a></td> |
| 4202 | </tr> |
| 4203 | |
| 4204 | |
| 4205 | </li> |
| 4206 | |
| 4207 | </table></div><br><br> |
| 4208 | |
| 4209 | |
| 4210 | |
| 4211 | |
| 4212 | <a class="EntryGoto" id="Maziku, Hellen and Shetty, Sachin and Rogers, Tamara"></a> |
| 4213 | <b class="myheading" style="position: relative; left: 5%;">Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</b> |
| 4214 | |
| 4215 | <div class="BibEntry"> |
| 4216 | |
| 4217 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4218 | |
| 4219 | <li> |
| 4220 | |
| 4221 | |
| 4222 | <tr> |
| 4223 | <td valign="top">Author</td> |
| 4224 | <td valign="top">Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</td> |
| 4225 | </tr> |
| 4226 | |
| 4227 | <tr> |
| 4228 | <td valign="top">Title</td> |
| 4229 | <td valign="top">Measurement-based IP Geolocation of Routers on Planetlab Infrastructure</td> |
| 4230 | </tr> |
| 4231 | |
| 4232 | <tr> |
| 4233 | <td valign="top">Booktitle</td> |
| 4234 | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
| 4235 | </tr> |
| 4236 | |
| 4237 | <tr> |
| 4238 | <td valign="top">Location</td> |
| 4239 | <td valign="top">Los Angeles</td> |
| 4240 | </tr> |
| 4241 | |
| 4242 | <tr> |
| 4243 | <td valign="top">Year</td> |
| 4244 | <td valign="top">2012</td> |
| 4245 | </tr> |
| 4246 | |
| 4247 | <tr> |
| 4248 | <td valign="top">Abstract</td> |
| 4249 | <td valign="top">Location aware applications can benefit from a more accurate yet robust IP geolocation framework. Various approaches to IP geolocation have been well documented. The most recent approach casts IP geolocation as a machine learn- ing classification problem. This approach makes it possible to incorporate both delay and non delay based information. The accuracy of IP geolocation can be improved by incorporating additional types of geolocation information rather relying on network delay alone. To enhance the classification accuracy of the existing classification framework, we expand it to include 6 features (3 of which are novel). We use PlanetLab as a testbed to generate our measurement set. We select 67 PlanetLab nodes within the United States with known geographic location as our landmarks. We test the accuracy of our framework on 23,843 routers given ping measurements from the 67 landmarks. With only three features (average delay, average hops and population density) tested, our new classifier gives a reduced average error distance of 157.81 miles and a median error distance of 0 miles, compared to the present classifier that gives an average error distance of 253.34 miles. This is very promising as we move on to the next phase of incorporating data for the remaining 5 features. To the best of our knowledge, this is the first proposed framework that aims to improve the accuracy of the present classifier based IP geolocation.</td> |
| 4250 | </tr> |
| 4251 | |
| 4252 | |
| 4253 | |
| 4254 | |
| 4255 | |
| 4256 | |
| 4257 | </li> |
| 4258 | |
| 4259 | </table></div><br><br> |
| 4260 | |
| 4261 | |
| 4262 | |
| 4263 | |
| 4264 | <a class="EntryGoto" id="McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan"></a> |
| 4265 | <b class="myheading" style="position: relative; left: 5%;">McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan</b> |
| 4266 | |
| 4267 | <div class="BibEntry"> |
| 4268 | |
| 4269 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4270 | |
| 4271 | <li> |
| 4272 | |
| 4273 | |
| 4274 | <tr> |
| 4275 | <td valign="top">Author</td> |
| 4276 | <td valign="top">McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan</td> |
| 4277 | </tr> |
| 4278 | |
| 4279 | <tr> |
| 4280 | <td valign="top">Title</td> |
| 4281 | <td valign="top">OpenFlow: enabling innovation in campus networks</td> |
| 4282 | </tr> |
| 4283 | |
| 4284 | <tr> |
| 4285 | <td valign="top">Journal</td> |
| 4286 | <td valign="top">SIGCOMM Comput. Commun. Rev.</td> |
| 4287 | </tr> |
| 4288 | |
| 4289 | <tr> |
| 4290 | <td valign="top">Publisher</td> |
| 4291 | <td valign="top">ACM</td> |
| 4292 | </tr> |
| 4293 | |
| 4294 | <tr> |
| 4295 | <td valign="top">Address</td> |
| 4296 | <td valign="top">New York, NY, USA</td> |
| 4297 | </tr> |
| 4298 | |
| 4299 | <tr> |
| 4300 | <td valign="top">Year</td> |
| 4301 | <td valign="top">2008</td> |
| 4302 | </tr> |
| 4303 | |
| 4304 | |
| 4305 | |
| 4306 | <tr> |
| 4307 | <td valign="top">DOI</td> |
| 4308 | <td valign="top">10.1145/1355734.1355746</td> |
| 4309 | </tr> |
| 4310 | |
| 4311 | |
| 4312 | |
| 4313 | <tr> |
| 4314 | <td valign="top">URL</td> |
| 4315 | <td valign="top"><a href="http://doi.acm.org/10.1145/1355734.1355746">http://doi.acm.org/10.1145/1355734.1355746</a></td> |
| 4316 | </tr> |
| 4317 | |
| 4318 | |
| 4319 | </li> |
| 4320 | |
| 4321 | </table></div><br><br> |
| 4322 | |
| 4323 | |
| 4324 | |
| 4325 | |
| 4326 | <a class="EntryGoto" id="Mitroff, Sarah"></a> |
| 4327 | <b class="myheading" style="position: relative; left: 5%;">Mitroff, Sarah</b> |
| 4328 | |
| 4329 | <div class="BibEntry"> |
| 4330 | |
| 4331 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4332 | |
| 4333 | <li> |
| 4334 | |
| 4335 | |
| 4336 | <tr> |
| 4337 | <td valign="top">Author</td> |
| 4338 | <td valign="top">Mitroff, Sarah</td> |
| 4339 | </tr> |
| 4340 | |
| 4341 | <tr> |
| 4342 | <td valign="top">Title</td> |
| 4343 | <td valign="top">Lawrence Landweber Helped Build Today's Internet, Now He's Advising Its Future</td> |
| 4344 | </tr> |
| 4345 | |
| 4346 | <tr> |
| 4347 | <td valign="top">Journal</td> |
| 4348 | <td valign="top">Wired</td> |
| 4349 | </tr> |
| 4350 | |
| 4351 | <tr> |
| 4352 | <td valign="top">Year</td> |
| 4353 | <td valign="top">2012</td> |
| 4354 | </tr> |
| 4355 | |
| 4356 | |
| 4357 | |
| 4358 | |
| 4359 | |
| 4360 | <tr> |
| 4361 | <td valign="top">URL</td> |
| 4362 | <td valign="top"><a href="http://www.wired.com/business/2012/08/lawrence-landweber/">http://www.wired.com/business/2012/08/lawrence-landweber/</a></td> |
| 4363 | </tr> |
| 4364 | |
| 4365 | |
| 4366 | </li> |
| 4367 | |
| 4368 | </table></div><br><br> |
| 4369 | |
| 4370 | |
| 4371 | |
| 4372 | |
| 4373 | <a class="EntryGoto" id="Muhammad, Monzur and Cappos, Justin"></a> |
| 4374 | <b class="myheading" style="position: relative; left: 5%;">Muhammad, Monzur and Cappos, Justin</b> |
| 4375 | |
| 4376 | <div class="BibEntry"> |
| 4377 | |
| 4378 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4379 | |
| 4380 | <li> |
| 4381 | |
| 4382 | |
| 4383 | <tr> |
| 4384 | <td valign="top">Author</td> |
| 4385 | <td valign="top">Muhammad, Monzur and Cappos, Justin</td> |
| 4386 | </tr> |
| 4387 | |
| 4388 | <tr> |
| 4389 | <td valign="top">Title</td> |
| 4390 | <td valign="top">Towards a Representive Testbed: Harnessing Volunteers for Networks Research</td> |
| 4391 | </tr> |
| 4392 | |
| 4393 | <tr> |
| 4394 | <td valign="top">Booktitle</td> |
| 4395 | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
| 4396 | </tr> |
| 4397 | |
| 4398 | <tr> |
| 4399 | <td valign="top">Location</td> |
| 4400 | <td valign="top">Los Angeles</td> |
| 4401 | </tr> |
| 4402 | |
| 4403 | <tr> |
| 4404 | <td valign="top">Year</td> |
| 4405 | <td valign="top">2012</td> |
| 4406 | </tr> |
| 4407 | |
| 4408 | <tr> |
| 4409 | <td valign="top">Abstract</td> |
| 4410 | <td valign="top">A steady rise in home systems has been seen over the past few years. As more systems are designed and deployed, an appropriate testbed is required to test these systems. Sev- eral systems exist, such as PlanetLab, that currently provide a networking testbed allowing researchers and developers to test and measure various applications. However in the long run such testbeds will be unable to keep up and meet all the demands of many of the large scale modern day peer-to-peer systems. We outline the various challenges and essentials of a networking testbed and we provide an alternate network- ing testbed that is driven by resources that are voluntarily contributed. We talk about the various advantages and dis- advantages of the Seattle system, an open source peer-to- peer computing testbed that has the potential to meet these demands. The testbed is composed of sandboxed resources that are donated by volunteers. Seattle has been deployed for about three years and supports many researchers who are interested in a networking testbed. The testbed consists of over 4100 nodes and is constantly growing. Seattle looks to grow and meet the demands of networking testbeds as they are made.</td> |
| 4411 | </tr> |
| 4412 | |
| 4413 | |
| 4414 | |
| 4415 | |
| 4416 | |
| 4417 | |
| 4418 | </li> |
| 4419 | |
| 4420 | </table></div><br><br> |
| 4421 | |
| 4422 | |
| 4423 | |
| 4424 | |
| 4425 | <a class="EntryGoto" id="Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram"></a> |
| 4426 | <b class="myheading" style="position: relative; left: 5%;">Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram</b> |
| 4427 | |
| 4428 | <div class="BibEntry"> |
| 4429 | |
| 4430 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4431 | |
| 4432 | <li> |
| 4433 | |
| 4434 | |
| 4435 | <tr> |
| 4436 | <td valign="top">Author</td> |
| 4437 | <td valign="top">Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram</td> |
| 4438 | </tr> |
| 4439 | |
| 4440 | <tr> |
| 4441 | <td valign="top">Title</td> |
| 4442 | <td valign="top">OpenFlow Configuration (OFConfig) Protocol: Implementation for the OF Management Plane</td> |
| 4443 | </tr> |
| 4444 | |
| 4445 | <tr> |
| 4446 | <td valign="top">Booktitle</td> |
| 4447 | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
| 4448 | </tr> |
| 4449 | |
| 4450 | <tr> |
| 4451 | <td valign="top">Location</td> |
| 4452 | <td valign="top">Salt Lake City, UT</td> |
| 4453 | </tr> |
| 4454 | |
| 4455 | <tr> |
| 4456 | <td valign="top">Publisher</td> |
| 4457 | <td valign="top">IEEE</td> |
| 4458 | </tr> |
| 4459 | |
| 4460 | <tr> |
| 4461 | <td valign="top">Year</td> |
| 4462 | <td valign="top">2013</td> |
| 4463 | </tr> |
| 4464 | |
| 4465 | |
| 4466 | |
| 4467 | <tr> |
| 4468 | <td valign="top">DOI</td> |
| 4469 | <td valign="top">10.1109/GREE.2013.21</td> |
| 4470 | </tr> |
| 4471 | |
| 4472 | |
| 4473 | |
| 4474 | <tr> |
| 4475 | <td valign="top">URL</td> |
| 4476 | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.21">http://dx.doi.org/10.1109/GREE.2013.21</a></td> |
| 4477 | </tr> |
| 4478 | |
| 4479 | |
| 4480 | </li> |
| 4481 | |
| 4482 | </table></div><br><br> |
| 4483 | |
| 4484 | |
| 4485 | |
| 4486 | |
| 4487 | <a class="EntryGoto" id="O'Neill, Derek and Aikat, Jay and Jeffay, Kevin"></a> |
| 4488 | <b class="myheading" style="position: relative; left: 5%;">O'Neill, Derek and Aikat, Jay and Jeffay, Kevin</b> |
| 4489 | |
| 4490 | <div class="BibEntry"> |
| 4491 | |
| 4492 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4493 | |
| 4494 | <li> |
| 4495 | |
| 4496 | |
| 4497 | <tr> |
| 4498 | <td valign="top">Author</td> |
| 4499 | <td valign="top">O'Neill, Derek and Aikat, Jay and Jeffay, Kevin</td> |
| 4500 | </tr> |
| 4501 | |
| 4502 | <tr> |
| 4503 | <td valign="top">Title</td> |
| 4504 | <td valign="top">Experiment Replication using ProtoGENI nodes</td> |
| 4505 | </tr> |
| 4506 | |
| 4507 | <tr> |
| 4508 | <td valign="top">Booktitle</td> |
| 4509 | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
| 4510 | </tr> |
| 4511 | |
| 4512 | <tr> |
| 4513 | <td valign="top">Location</td> |
| 4514 | <td valign="top">Salt Lake City, UT</td> |
| 4515 | </tr> |
| 4516 | |
| 4517 | <tr> |
| 4518 | <td valign="top">Publisher</td> |
| 4519 | <td valign="top">IEEE</td> |
| 4520 | </tr> |
| 4521 | |
| 4522 | <tr> |
| 4523 | <td valign="top">Year</td> |
| 4524 | <td valign="top">2013</td> |
| 4525 | </tr> |
| 4526 | |
| 4527 | |
| 4528 | |
| 4529 | <tr> |
| 4530 | <td valign="top">DOI</td> |
| 4531 | <td valign="top">10.1109/GREE.2013.11</td> |
| 4532 | </tr> |
| 4533 | |
| 4534 | |
| 4535 | |
| 4536 | <tr> |
| 4537 | <td valign="top">URL</td> |
| 4538 | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.11">http://dx.doi.org/10.1109/GREE.2013.11</a></td> |
| 4539 | </tr> |
| 4540 | |
| 4541 | |
| 4542 | </li> |
| 4543 | |
| 4544 | </table></div><br><br> |
| 4545 | |
| 4546 | |
| 4547 | |
| 4548 | |
| 4549 | <a class="EntryGoto" id="Ozcelik, Ilker and Brooks, Richard R."></a> |
| 4550 | <b class="myheading" style="position: relative; left: 5%;">Ozcelik, Ilker and Brooks, Richard R.</b> |
| 4551 | |
| 4552 | <div class="BibEntry"> |
| 4553 | |
| 4554 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4555 | |
| 4556 | <li> |
| 4557 | |
| 4558 | |
| 4559 | <tr> |
| 4560 | <td valign="top">Author</td> |
| 4561 | <td valign="top">Ozcelik, Ilker and Brooks, Richard R.</td> |
| 4562 | </tr> |
| 4563 | |
| 4564 | <tr> |
| 4565 | <td valign="top">Title</td> |
| 4566 | <td valign="top">Security experimentation using operational systems</td> |
| 4567 | </tr> |
| 4568 | |
| 4569 | <tr> |
| 4570 | <td valign="top">Booktitle</td> |
| 4571 | <td valign="top">Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research</td> |
| 4572 | </tr> |
| 4573 | |
| 4574 | <tr> |
| 4575 | <td valign="top">Location</td> |
| 4576 | <td valign="top">Oak Ridge, Tennessee</td> |
| 4577 | </tr> |
| 4578 | |
| 4579 | <tr> |
| 4580 | <td valign="top">Publisher</td> |
| 4581 | <td valign="top">ACM</td> |
| 4582 | </tr> |
| 4583 | |
| 4584 | <tr> |
| 4585 | <td valign="top">Address</td> |
| 4586 | <td valign="top">New York, NY, USA</td> |
| 4587 | </tr> |
| 4588 | |
| 4589 | <tr> |
| 4590 | <td valign="top">Year</td> |
| 4591 | <td valign="top">2011</td> |
| 4592 | </tr> |
| 4593 | |
| 4594 | <tr> |
| 4595 | <td valign="top">Abstract</td> |
| 4596 | <td valign="top">Computers and Internet have evolved into necessary tools for our professional, personal and social lives. As a result of this growing dependence, there is a concern that these systems remain protected and available. This concern increases exponentially when considering systems such as smart power grids. Therefore, research should be conducted to develop effective ways of detecting system anomalies. To have realistic results, the studies should be tested on real systems. However, it is not possible to test these experiments on the live network. With the recent collaboration of Universities and research labs, a new experiment test bed has been established. As a result, experiments can now be implemented on real networks. In our study, we design an experiment to analyze Distributed Denial of Service Attacks (DDoS Attack) on a real network with real Internet traffic. The approach that we use in our study can easily be generalized to apply to smart power grids.</td> |
| 4597 | </tr> |
| 4598 | |
| 4599 | |
| 4600 | |
| 4601 | <tr> |
| 4602 | <td valign="top">DOI</td> |
| 4603 | <td valign="top">10.1145/2179298.2179388</td> |
| 4604 | </tr> |
| 4605 | |
| 4606 | |
| 4607 | |
| 4608 | <tr> |
| 4609 | <td valign="top">URL</td> |
| 4610 | <td valign="top"><a href="http://dx.doi.org/10.1145/2179298.2179388">http://dx.doi.org/10.1145/2179298.2179388</a></td> |
| 4611 | </tr> |
| 4612 | |
| 4613 | |
| 4614 | </li> |
| 4615 | |
| 4616 | </table></div><br><br> |
| 4617 | |
| 4618 | |
| 4619 | <div class="BibEntry"> |
| 4620 | |
| 4621 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4622 | |
| 4623 | <li> |
| 4624 | |
| 4625 | |
| 4626 | <tr> |
| 4627 | <td valign="top">Author</td> |
| 4628 | <td valign="top">Ozcelik, Ilker and Brooks, Richard R.</td> |
| 4629 | </tr> |
| 4630 | |
| 4631 | <tr> |
| 4632 | <td valign="top">Title</td> |
| 4633 | <td valign="top">Performance Analysis of DDoS Detection Methods on Real Network</td> |
| 4634 | </tr> |
| 4635 | |
| 4636 | <tr> |
| 4637 | <td valign="top">Booktitle</td> |
| 4638 | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
| 4639 | </tr> |
| 4640 | |
| 4641 | <tr> |
| 4642 | <td valign="top">Location</td> |
| 4643 | <td valign="top">Los Angeles</td> |
| 4644 | </tr> |
| 4645 | |
| 4646 | <tr> |
| 4647 | <td valign="top">Year</td> |
| 4648 | <td valign="top">2012</td> |
| 4649 | </tr> |
| 4650 | |
| 4651 | <tr> |
| 4652 | <td valign="top">Abstract</td> |
| 4653 | <td valign="top">Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic.</td> |
| 4654 | </tr> |
| 4655 | |
| 4656 | |
| 4657 | |
| 4658 | |
| 4659 | |
| 4660 | |
| 4661 | </li> |
| 4662 | |
| 4663 | </table></div><br><br> |
| 4664 | |
| 4665 | |
| 4666 | |
| 4667 | |
| 4668 | <a class="EntryGoto" id="Ozcelik, Ilker and Fu, Yu and Brooks, Richard R."></a> |
| 4669 | <b class="myheading" style="position: relative; left: 5%;">Ozcelik, Ilker and Fu, Yu and Brooks, Richard R.</b> |
| 4670 | |
| 4671 | <div class="BibEntry"> |
| 4672 | |
| 4673 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4674 | |
| 4675 | <li> |
| 4676 | |
| 4677 | |
| 4678 | <tr> |
| 4679 | <td valign="top">Author</td> |
| 4680 | <td valign="top">Ozcelik, Ilker and Fu, Yu and Brooks, Richard R.</td> |
| 4681 | </tr> |
| 4682 | |
| 4683 | <tr> |
| 4684 | <td valign="top">Title</td> |
| 4685 | <td valign="top">DoS Detection is Easier Now</td> |
| 4686 | </tr> |
| 4687 | |
| 4688 | <tr> |
| 4689 | <td valign="top">Booktitle</td> |
| 4690 | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
| 4691 | </tr> |
| 4692 | |
| 4693 | <tr> |
| 4694 | <td valign="top">Location</td> |
| 4695 | <td valign="top">Salt Lake City, UT</td> |
| 4696 | </tr> |
| 4697 | |
| 4698 | <tr> |
| 4699 | <td valign="top">Publisher</td> |
| 4700 | <td valign="top">IEEE</td> |
| 4701 | </tr> |
| 4702 | |
| 4703 | <tr> |
| 4704 | <td valign="top">Year</td> |
| 4705 | <td valign="top">2013</td> |
| 4706 | </tr> |
| 4707 | |
| 4708 | |
| 4709 | |
| 4710 | <tr> |
| 4711 | <td valign="top">DOI</td> |
| 4712 | <td valign="top">10.1109/GREE.2013.18</td> |
| 4713 | </tr> |
| 4714 | |
| 4715 | |
| 4716 | |
| 4717 | <tr> |
| 4718 | <td valign="top">URL</td> |
| 4719 | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.18">http://dx.doi.org/10.1109/GREE.2013.18</a></td> |
| 4720 | </tr> |
| 4721 | |
| 4722 | |
| 4723 | </li> |
| 4724 | |
| 4725 | </table></div><br><br> |
| 4726 | |
| 4727 | |
| 4728 | |
| 4729 | |
| 4730 | <a class="EntryGoto" id="Paul, Subharthi and Pan, Jianli and Jain, Raj"></a> |
| 4731 | <b class="myheading" style="position: relative; left: 5%;">Paul, Subharthi and Pan, Jianli and Jain, Raj</b> |
| 4732 | |
| 4733 | <div class="BibEntry"> |
| 4734 | |
| 4735 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4736 | |
| 4737 | <li> |
| 4738 | |
| 4739 | |
| 4740 | <tr> |
| 4741 | <td valign="top">Author</td> |
| 4742 | <td valign="top">Paul, Subharthi and Pan, Jianli and Jain, Raj</td> |
| 4743 | </tr> |
| 4744 | |
| 4745 | <tr> |
| 4746 | <td valign="top">Title</td> |
| 4747 | <td valign="top">Architectures for the future networks and the next generation Internet: A survey</td> |
| 4748 | </tr> |
| 4749 | |
| 4750 | <tr> |
| 4751 | <td valign="top">Journal</td> |
| 4752 | <td valign="top">Computer Communications</td> |
| 4753 | </tr> |
| 4754 | |
| 4755 | <tr> |
| 4756 | <td valign="top">Publisher</td> |
| 4757 | <td valign="top">Elsevier Science Publishers B. V.</td> |
| 4758 | </tr> |
| 4759 | |
| 4760 | <tr> |
| 4761 | <td valign="top">Address</td> |
| 4762 | <td valign="top">Amsterdam, The Netherlands, The Netherlands</td> |
| 4763 | </tr> |
| 4764 | |
| 4765 | <tr> |
| 4766 | <td valign="top">Year</td> |
| 4767 | <td valign="top">2011</td> |
| 4768 | </tr> |
| 4769 | |
| 4770 | <tr> |
| 4771 | <td valign="top">Abstract</td> |
| 4772 | <td valign="top">Networking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet. We present a comprehensive survey of such research projects and activities. The topics covered include various testbeds for experimentations for new architectures, new security mechanisms, content delivery mechanisms, management and control frameworks, service architectures, and routing mechanisms. Delay/disruption tolerant networks which allow communications even when complete end-to-end path is not available are also discussed.</td> |
| 4773 | </tr> |
| 4774 | |
| 4775 | |
| 4776 | |
| 4777 | <tr> |
| 4778 | <td valign="top">DOI</td> |
| 4779 | <td valign="top">10.1016/j.comcom.2010.08.001</td> |
| 4780 | </tr> |
| 4781 | |
| 4782 | |
| 4783 | |
| 4784 | <tr> |
| 4785 | <td valign="top">URL</td> |
| 4786 | <td valign="top"><a href="http://dx.doi.org/10.1016/j.comcom.2010.08.001">http://dx.doi.org/10.1016/j.comcom.2010.08.001</a></td> |
| 4787 | </tr> |
| 4788 | |
| 4789 | |
| 4790 | </li> |
| 4791 | |
| 4792 | </table></div><br><br> |
| 4793 | |
| 4794 | |
| 4795 | |
| 4796 | |
| 4797 | <a class="EntryGoto" id="Qin, Z. and Xiong, X. and Chuah, M."></a> |
| 4798 | <b class="myheading" style="position: relative; left: 5%;">Qin, Z. and Xiong, X. and Chuah, M.</b> |
| 4799 | |
| 4800 | <div class="BibEntry"> |
| 4801 | |
| 4802 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4803 | |
| 4804 | <li> |
| 4805 | |
| 4806 | |
| 4807 | <tr> |
| 4808 | <td valign="top">Author</td> |
| 4809 | <td valign="top">Qin, Z. and Xiong, X. and Chuah, M.</td> |
| 4810 | </tr> |
| 4811 | |
| 4812 | <tr> |
| 4813 | <td valign="top">Title</td> |
| 4814 | <td valign="top">Lehigh Explorer: Android Application Utilizing Content Centric Features</td> |
| 4815 | </tr> |
| 4816 | |
| 4817 | <tr> |
| 4818 | <td valign="top">Booktitle</td> |
| 4819 | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
| 4820 | </tr> |
| 4821 | |
| 4822 | <tr> |
| 4823 | <td valign="top">Location</td> |
| 4824 | <td valign="top">Los Angeles</td> |
| 4825 | </tr> |
| 4826 | |
| 4827 | <tr> |
| 4828 | <td valign="top">Year</td> |
| 4829 | <td valign="top">2012</td> |
| 4830 | </tr> |
| 4831 | |
| 4832 | <tr> |
| 4833 | <td valign="top">Abstract</td> |
| 4834 | <td valign="top">Companies, government organizations or institutions from anywhere in the world publish different types of information e.g. news, health alerts, disaster warnings at any time. Rather than consuming all published data, users only desire access to information of interest to themselves irrespective of where the data is located and who publish them. Existing publish/subscribe systems built based on IP-based network can be inefficient and are not flexible enough to meet emerging requirements e.g. deal with mobile users, dynamic contents, searching over encrypted data. Recently content-centric networks have been proposed to provide flexibility to users to access such information. We have designed secure content centric mobile networks that allow users to publish and retrieve contents securely. As with any new architecture, one important issue is to have useful applications that can utilize features provided in the new architecture. In this paper, we describe an Android application we recently developed that allows visitors to explore Lehigh campus based on their expressed interests. Our application utilizes keyword based interest messages to retrieve matching data items of interests to a user. We are giving a demo of Lehigh Explorer at GEC13.</td> |
| 4835 | </tr> |
| 4836 | |
| 4837 | |
| 4838 | |
| 4839 | |
| 4840 | |
| 4841 | |
| 4842 | </li> |
| 4843 | |
| 4844 | </table></div><br><br> |
| 4845 | |
| 4846 | |
| 4847 | |
| 4848 | |
| 4849 | <a class="EntryGoto" id="Quan, John and Nance, Kara and Hay, Brian"></a> |
| 4850 | <b class="myheading" style="position: relative; left: 5%;">Quan, John and Nance, Kara and Hay, Brian</b> |
| 4851 | |
| 4852 | <div class="BibEntry"> |
| 4853 | |
| 4854 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4855 | |
| 4856 | <li> |
| 4857 | |
| 4858 | |
| 4859 | <tr> |
| 4860 | <td valign="top">Author</td> |
| 4861 | <td valign="top">Quan, John and Nance, Kara and Hay, Brian</td> |
| 4862 | </tr> |
| 4863 | |
| 4864 | <tr> |
| 4865 | <td valign="top">Title</td> |
| 4866 | <td valign="top">A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments</td> |
| 4867 | </tr> |
| 4868 | |
| 4869 | <tr> |
| 4870 | <td valign="top">Journal</td> |
| 4871 | <td valign="top">IT Professional</td> |
| 4872 | </tr> |
| 4873 | |
| 4874 | <tr> |
| 4875 | <td valign="top">Year</td> |
| 4876 | <td valign="top">2011</td> |
| 4877 | </tr> |
| 4878 | |
| 4879 | <tr> |
| 4880 | <td valign="top">Abstract</td> |
| 4881 | <td valign="top">Applying a mutualistic security service model to large-scale virtualized environments that rely on contributed hardware lets researchers improve security in exchange for resources. The authors discuss this model in the context of the Global Environment for Network Innovation (GENI) project.</td> |
| 4882 | </tr> |
| 4883 | |
| 4884 | |
| 4885 | |
| 4886 | <tr> |
| 4887 | <td valign="top">DOI</td> |
| 4888 | <td valign="top">10.1109/MITP.2011.36</td> |
| 4889 | </tr> |
| 4890 | |
| 4891 | |
| 4892 | |
| 4893 | <tr> |
| 4894 | <td valign="top">URL</td> |
| 4895 | <td valign="top"><a href="http://dx.doi.org/10.1109/MITP.2011.36">http://dx.doi.org/10.1109/MITP.2011.36</a></td> |
| 4896 | </tr> |
| 4897 | |
| 4898 | |
| 4899 | </li> |
| 4900 | |
| 4901 | </table></div><br><br> |
| 4902 | |
| 4903 | |
| 4904 | |
| 4905 | |
| 4906 | <a class="EntryGoto" id="Raychaudhuri, Dipankar and Nagaraja, Kiran and Venkataramani, Arun"></a> |
| 4907 | <b class="myheading" style="position: relative; left: 5%;">Raychaudhuri, Dipankar and Nagaraja, Kiran and Venkataramani, Arun</b> |
| 4908 | |
| 4909 | <div class="BibEntry"> |
| 4910 | |
| 4911 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4912 | |
| 4913 | <li> |
| 4914 | |
| 4915 | |
| 4916 | <tr> |
| 4917 | <td valign="top">Author</td> |
| 4918 | <td valign="top">Raychaudhuri, Dipankar and Nagaraja, Kiran and Venkataramani, Arun</td> |
| 4919 | </tr> |
| 4920 | |
| 4921 | <tr> |
| 4922 | <td valign="top">Title</td> |
| 4923 | <td valign="top">MobilityFirst: a robust and trustworthy mobility-centric architecture for the future internet</td> |
| 4924 | </tr> |
| 4925 | |
| 4926 | <tr> |
| 4927 | <td valign="top">Journal</td> |
| 4928 | <td valign="top">SIGMOBILE Mob. Comput. Commun. Rev.</td> |
| 4929 | </tr> |
| 4930 | |
| 4931 | <tr> |
| 4932 | <td valign="top">Publisher</td> |
| 4933 | <td valign="top">ACM</td> |
| 4934 | </tr> |
| 4935 | |
| 4936 | <tr> |
| 4937 | <td valign="top">Address</td> |
| 4938 | <td valign="top">New York, NY, USA</td> |
| 4939 | </tr> |
| 4940 | |
| 4941 | <tr> |
| 4942 | <td valign="top">Year</td> |
| 4943 | <td valign="top">2012</td> |
| 4944 | </tr> |
| 4945 | |
| 4946 | <tr> |
| 4947 | <td valign="top">Abstract</td> |
| 4948 | <td valign="top">This paper presents an overview of the MobilityFirst network architecture, currently under development as part of the US National Science Foundation's Future Internet Architecture (FIA) program. The proposed architecture is intended to directly address the challenges of wireless access and mobility at scale, while also providing new services needed for emerging mobile Internet application scenarios. After briefly outlining the original design goals of the project, we provide a discussion of the main architectural concepts behind the network design, identifying key features such as separation of names from addresses, public-key based globally unique identifiers (GUIDs) for named objects, global name resolution service (GNRS) for dynamic binding of names to addresses, storage-aware routing and late binding, content- and context-aware services, optional in-network compute layer, and so on. This is followed by a brief description of the MobilityFirst protocol stack as a whole, along with an explanation of how the protocol works at end-user devices and inside network routers. Example of specific advanced services supported by the protocol stack, including multi-homing, mobility with disconnection, and content retrieval/caching are given for illustration. Further design details of two key protocol components, the GNRS name resolution service and the GSTAR routing protocol, are also described along with sample results from evaluation. In conclusion, a brief description of an ongoing multi-site experimental proof-of-concept deployment of the MobilityFirst protocol stack on the GENI testbed is provided.</td> |
| 4949 | </tr> |
| 4950 | |
| 4951 | |
| 4952 | |
| 4953 | <tr> |
| 4954 | <td valign="top">DOI</td> |
| 4955 | <td valign="top">10.1145/2412096.2412098</td> |
| 4956 | </tr> |
| 4957 | |
| 4958 | |
| 4959 | |
| 4960 | <tr> |
| 4961 | <td valign="top">URL</td> |
| 4962 | <td valign="top"><a href="http://dx.doi.org/10.1145/2412096.2412098">http://dx.doi.org/10.1145/2412096.2412098</a></td> |
| 4963 | </tr> |
| 4964 | |
| 4965 | |
| 4966 | </li> |
| 4967 | |
| 4968 | </table></div><br><br> |
| 4969 | |
| 4970 | |
| 4971 | |
| 4972 | |
| 4973 | <a class="EntryGoto" id="Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon"></a> |
| 4974 | <b class="myheading" style="position: relative; left: 5%;">Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon</b> |
| 4975 | |
| 4976 | <div class="BibEntry"> |
| 4977 | |
| 4978 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4979 | |
| 4980 | <li> |
| 4981 | |
| 4982 | |
| 4983 | <tr> |
| 4984 | <td valign="top">Author</td> |
| 4985 | <td valign="top">Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon</td> |
| 4986 | </tr> |
| 4987 | |
| 4988 | <tr> |
| 4989 | <td valign="top">Title</td> |
| 4990 | <td valign="top">An Architecture For International Federation of Network Testbeds</td> |
| 4991 | </tr> |
| 4992 | |
| 4993 | <tr> |
| 4994 | <td valign="top">Journal</td> |
| 4995 | <td valign="top">IEICE Transactions on Communications</td> |
| 4996 | </tr> |
| 4997 | |
| 4998 | <tr> |
| 4999 | <td valign="top">Year</td> |
| 5000 | <td valign="top">2013</td> |
| 5001 | </tr> |
| 5002 | |
| 5003 | <tr> |
| 5004 | <td valign="top">Abstract</td> |
| 5005 | <td valign="top">Testbeds play a key role in the advancement of network science and the exploration of new network architectures. Because the scale and scope of any individual testbed is necessarily limited, federation is a useful technique for constructing testbeds that serve a wide range of experimenter needs. In a federated testbed, individual facilities maintain local autonomy while cooperating to provide a unified set of abstractions and interfaces to users. Forming an international federation is particularly challenging, because issues of trust, user access policy, and local laws and regulations are of greater concern that they are for federations within a single country. In this paper, we describe an architecture, based on the US National Science Foundation's GENI project, that is capable of supporting the needs of an international federation.</td> |
| 5006 | </tr> |
| 5007 | |
| 5008 | |
| 5009 | |
| 5010 | <tr> |
| 5011 | <td valign="top">DOI</td> |
| 5012 | <td valign="top">10.1587/transcom.E96.B.2</td> |
| 5013 | </tr> |
| 5014 | |
| 5015 | |
| 5016 | |
| 5017 | <tr> |
| 5018 | <td valign="top">URL</td> |
| 5019 | <td valign="top"><a href="http://dx.doi.org/10.1587/transcom.E96.B.2">http://dx.doi.org/10.1587/transcom.E96.B.2</a></td> |
| 5020 | </tr> |
| 5021 | |
| 5022 | |
| 5023 | </li> |
| 5024 | |
| 5025 | </table></div><br><br> |
| 5026 | |
| 5027 | |
| 5028 | |
| 5029 | |
| 5030 | <a class="EntryGoto" id="Rohrer, Justin P. and Çetinkaya, Egemen K. and Sterbenz, James P. G."></a> |
| 5031 | <b class="myheading" style="position: relative; left: 5%;">Rohrer, Justin P. and Çetinkaya, Egemen K. and Sterbenz, James P. G.</b> |
| 5032 | |
| 5033 | <div class="BibEntry"> |
| 5034 | |
| 5035 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 5036 | |
| 5037 | <li> |
| 5038 | |
| 5039 | |
| 5040 | <tr> |
| 5041 | <td valign="top">Author</td> |
| 5042 | <td valign="top">Rohrer, Justin P. and Çetinkaya, Egemen K. and Sterbenz, James P. G.</td> |
| 5043 | </tr> |
| 5044 | |
| 5045 | <tr> |
| 5046 | <td valign="top">Title</td> |
| 5047 | <td valign="top">Progress and challenges in large-scale future internet experimentation using the GpENI programmable testbed</td> |
| 5048 | </tr> |
| 5049 | |
| 5050 | <tr> |
| 5051 | <td valign="top">Booktitle</td> |
| 5052 | <td valign="top">Proceedings of the 6th International Conference on Future Internet Technologies</td> |
| 5053 | </tr> |
| 5054 | |
| 5055 | <tr> |
| 5056 | <td valign="top">Location</td> |
| 5057 | <td valign="top">Seoul, Republic of Korea</td> |
| 5058 | </tr> |
| 5059 | |
| 5060 | <tr> |
| 5061 | <td valign="top">Publisher</td> |
| 5062 | <td valign="top">ACM</td> |
| 5063 | </tr> |
| 5064 | |
| 5065 | <tr> |
| 5066 | <td valign="top">Address</td> |
| 5067 | <td valign="top">New York, NY, USA</td> |
| 5068 | </tr> |
| 5069 | |
| 5070 | <tr> |
| 5071 | <td valign="top">Year</td> |
| 5072 | <td valign="top">2011</td> |
| 5073 | </tr> |
| 5074 | |
| 5075 | <tr> |
| 5076 | <td valign="top">Abstract</td> |
| 5077 | <td valign="top">GpENI is evolving to provide a promising environment in which to do experimental research in the resilience and survivability of future networks, by allowing programmable control over topology and mechanism, while providing the scale and global reach needed to conduct network experiments far beyond the capabilities of a conventional testbed. Addressing this need at scale introduces a number of challenges both in deployment and in collecting results that can be directly compared to simulation results for cross-verification purposes. In this short paper we present the scope, design goals, challenges, and current status of the GpENI programmable testbed, as well as an overview and examples of the types of experiments we are beginning to run.</td> |
| 5078 | </tr> |
| 5079 | |
| 5080 | |
| 5081 | |
| 5082 | <tr> |
| 5083 | <td valign="top">DOI</td> |
| 5084 | <td valign="top">10.1145/2002396.2002409</td> |
| 5085 | </tr> |
| 5086 | |
| 5087 | |
| 5088 | |
| 5089 | <tr> |
| 5090 | <td valign="top">URL</td> |
| 5091 | <td valign="top"><a href="http://dx.doi.org/10.1145/2002396.2002409">http://dx.doi.org/10.1145/2002396.2002409</a></td> |
| 5092 | </tr> |
| 5093 | |
| 5094 | |
| 5095 | </li> |
| 5096 | |
| 5097 | </table></div><br><br> |
| 5098 | |
| 5099 | |
| 5100 | |
| 5101 | |
| 5102 | <a class="EntryGoto" id="Rosen, Aaron and Wang, Kuang-Ching"></a> |
| 5103 | <b class="myheading" style="position: relative; left: 5%;">Rosen, Aaron and Wang, Kuang-Ching</b> |
| 5104 | |
| 5105 | <div class="BibEntry"> |
| 5106 | |
| 5107 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 5108 | |
| 5109 | <li> |
| 5110 | |
| 5111 | |
| 5112 | <tr> |
| 5113 | <td valign="top">Author</td> |
| 5114 | <td valign="top">Rosen, Aaron and Wang, Kuang-Ching</td> |
| 5115 | </tr> |
| 5116 | |
| 5117 | <tr> |
| 5118 | <td valign="top">Title</td> |
| 5119 | <td valign="top">Steroid OpenFlow Service: Seamless Network Service Delivery in Software Defined Networks</td> |
| 5120 | </tr> |
| 5121 | |
| 5122 | <tr> |
| 5123 | <td valign="top">Booktitle</td> |
| 5124 | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
| 5125 | </tr> |
| 5126 | |
| 5127 | <tr> |
| 5128 | <td valign="top">Location</td> |
| 5129 | <td valign="top">Los Angeles</td> |
| 5130 | </tr> |
| 5131 | |
| 5132 | <tr> |
| 5133 | <td valign="top">Year</td> |
| 5134 | <td valign="top">2012</td> |
| 5135 | </tr> |
| 5136 | |
| 5137 | <tr> |
| 5138 | <td valign="top">Abstract</td> |
| 5139 | <td valign="top">In a software defined network (SDN), packet forwarding is controlled by software controllers. In an OpenFlow SDN, a controller can control the forwarding, rewriting, and dropping of packets based on their header attributes. The ability to handle packets in customizable ways in software has significant implications for both network users and operators. Via software, users can convey application specific expectations while operators can deliver application specific services to enhance user experiences. In this paper, we present the Steroid OpenFlow Services (SOS) paradigm for network services delivery. The paradigm enables operators to deliver network services without any setup requirements on user machines. SOS utilizes OpenFlow to redirect application specific traffic to application specific service agents; SOS also rewrites packet headers for a service to remain seamless to users. This paper presents an example SOS service for optimizing large volume TCP download across a large delay-bandwidth-product wide area network. SOS service agents on both ends of the connection seamlessly terminate a user TCP connection, launch a set of parallel TCP connections, and leverage multiple paths when available to maximize throughput. With the NSF GENI future Internet testbed, a prototype implementation achieved up to 320 times throughput enhancement seamless to the end users.</td> |
| 5140 | </tr> |
| 5141 | |
| 5142 | |
| 5143 | |
| 5144 | |
| 5145 | |
| 5146 | |
| 5147 | </li> |
| 5148 | |
| 5149 | </table></div><br><br> |
| 5150 | |
| 5151 | |
| 5152 | |
| 5153 | |
| 5154 | <a class="EntryGoto" id="Scoglio, Caterina M. and Sydney, Ali and Youssef, Mina and Schumm, Phillip and Kooij, Robert E."></a> |
| 5155 | <b class="myheading" style="position: relative; left: 5%;">Scoglio, Caterina M. and Sydney, Ali and Youssef, Mina and Schumm, Phillip and Kooij, Robert E.</b> |
| 5156 | |
| 5157 | <div class="BibEntry"> |
| 5158 | |
| 5159 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 5160 | |
| 5161 | <li> |
| 5162 | |
| 5163 | |
| 5164 | <tr> |
| 5165 | <td valign="top">Author</td> |
| 5166 | <td valign="top">Scoglio, Caterina M. and Sydney, Ali and Youssef, Mina and Schumm, Phillip and Kooij, Robert E.</td> |
| 5167 | </tr> |
| 5168 | |
| 5169 | <tr> |
| 5170 | <td valign="top">Title</td> |
| 5171 | <td valign="top">Elasticity and Viral Conductance: Unveiling Robustness in Complex Networks through Topological Characteristics</td> |
| 5172 | </tr> |
| 5173 | |
| 5174 | <tr> |
| 5175 | <td valign="top">Journal</td> |
| 5176 | <td valign="top">CoRR</td> |
| 5177 | </tr> |
| 5178 | |
| 5179 | <tr> |
| 5180 | <td valign="top">Year</td> |
| 5181 | <td valign="top">2008</td> |
| 5182 | </tr> |
| 5183 | |
| 5184 | |
| 5185 | |
| 5186 | |
| 5187 | |
| 5188 | |
| 5189 | </li> |
| 5190 | |
| 5191 | </table></div><br><br> |
| 5192 | |
| 5193 | |
| 5194 | |
| 5195 | |
| 5196 | <a class="EntryGoto" id="Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar"></a> |
| 5197 | <b class="myheading" style="position: relative; left: 5%;">Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar</b> |
| 5198 | |
| 5199 | <div class="BibEntry"> |
| 5200 | |
| 5201 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 5202 | |
| 5203 | <li> |
| 5204 | |
| 5205 | |
| 5206 | <tr> |
| 5207 | <td valign="top">Author</td> |
| 5208 | <td valign="top">Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar</td> |
| 5209 | </tr> |
| 5210 | |
| 5211 | <tr> |
| 5212 | <td valign="top">Title</td> |
| 5213 | <td valign="top">MobilityFirst future internet architecture project</td> |
| 5214 | </tr> |
| 5215 | |
| 5216 | <tr> |
| 5217 | <td valign="top">Booktitle</td> |
| 5218 | <td valign="top">Proceedings of the 7th Asian Internet Engineering Conference</td> |
| 5219 | </tr> |
| 5220 | |
| 5221 | <tr> |
| 5222 | <td valign="top">Location</td> |
| 5223 | <td valign="top">Bangkok, Thailand</td> |
| 5224 | </tr> |
| 5225 | |
| 5226 | <tr> |
| 5227 | <td valign="top">Publisher</td> |
| 5228 | <td valign="top">ACM</td> |
| 5229 | </tr> |
| 5230 | |
| 5231 | <tr> |
| 5232 | <td valign="top">Address</td> |
| 5233 | <td valign="top">New York, NY, USA</td> |
| 5234 | </tr> |
| 5235 | |
| 5236 | <tr> |
| 5237 | <td valign="top">Year</td> |
| 5238 | <td valign="top">2011</td> |
| 5239 | </tr> |
| 5240 | |
| 5241 | <tr> |
| 5242 | <td valign="top">Abstract</td> |
| 5243 | <td valign="top">This short paper presents an overview of the MobilityFirst network architecture, which is a clean-slate project being conducted as part of the NSF Future Internet Architecture (FIA) program. The proposed architecture is intended to directly address the challenges of wireless access and mobility at scale, while also providing new multicast, anycast, multi-path and context-aware services needed for emerging mobile Internet application scenarios. Key protocol components of the proposed architecture are: (a) separation of naming from addressing; (b) public key based self-certifying names (called globally unique identifiers or GUIDs) for network-attached objects; (c) global name resolution service (GNRS) for dynamic name-to-address binding; (d) delay-tolerant and storage-aware routing (GSTAR) capable of dealing with wireless link quality fluctuations and disconnections; (e) hop-by-hop transport of large protocol data units; and (f) location or context-aware services. The basic operations of a MobilityFirst router are outlined. This is followed by a discussion of ongoing proof-of-concept prototyping and experimental evaluation efforts for the MobilityFirst protocol stack. In conclusion, a brief description of an ongoing multi-site experimental deployment of the MobilityFirst protocol stack on the GENI testbed is provided.</td> |
| 5244 | </tr> |
| 5245 | |
| 5246 | |
| 5247 | |
| 5248 | <tr> |
| 5249 | <td valign="top">DOI</td> |
| 5250 | <td valign="top">10.1145/2089016.2089017</td> |
| 5251 | </tr> |
| 5252 | |
| 5253 | |
| 5254 | |
| 5255 | <tr> |
| 5256 | <td valign="top">URL</td> |
| 5257 | <td valign="top"><a href="http://dx.doi.org/10.1145/2089016.2089017">http://dx.doi.org/10.1145/2089016.2089017</a></td> |
| 5258 | </tr> |
| 5259 | |
| 5260 | |
| 5261 | </li> |
| 5262 | |
| 5263 | </table></div><br><br> |
| 5264 | |
| 5265 | |
| 5266 | |
| 5267 | |
| 5268 | <a class="EntryGoto" id="Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant"></a> |
| 5269 | <b class="myheading" style="position: relative; left: 5%;">Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant</b> |
| 5270 | |
| 5271 | <div class="BibEntry"> |
| 5272 | |
| 5273 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 5274 | |
| 5275 | <li> |
| 5276 | |
| 5277 | |
| 5278 | <tr> |
| 5279 | <td valign="top">Author</td> |
| 5280 | <td valign="top">Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant</td> |
| 5281 | </tr> |
| 5282 | |
| 5283 | <tr> |
| 5284 | <td valign="top">Title</td> |
| 5285 | <td valign="top">Cloudy Computing: Leveraging Weather Forecasts in Energy Harvesting Sensor Systems</td> |
| 5286 | </tr> |
| 5287 | |
| 5288 | <tr> |
| 5289 | <td valign="top">Booktitle</td> |
| 5290 | <td valign="top">2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)</td> |
| 5291 | </tr> |
| 5292 | |
| 5293 | <tr> |
| 5294 | <td valign="top">Location</td> |
| 5295 | <td valign="top">Boston, MA, USA</td> |
| 5296 | </tr> |
| 5297 | |
| 5298 | <tr> |
| 5299 | <td valign="top">Publisher</td> |
| 5300 | <td valign="top">IEEE</td> |
| 5301 | </tr> |
| 5302 | |
| 5303 | <tr> |
| 5304 | <td valign="top">Year</td> |
2035 | | <td valign="top">The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform, a v̈irtual laboratory ̈for the design, implementation and evaluation of future Internets. In this paper, we present an overview of PrimoGENI, a GENI project with the goal of extending the GENI suite of interoperable infrastructure to allow network experiments at scale, involving physical, simulated and emulated network entities.</td> |
2036 | | </tr> |
2037 | | |
2038 | | |
2039 | | |
2040 | | <tr> |
2041 | | <td valign="top">DOI</td> |
2042 | | <td valign="top">10.4108/ICST.SIMUTOOLS2010.8636</td> |
2043 | | </tr> |
2044 | | |
2045 | | |
2046 | | |
2047 | | <tr> |
2048 | | <td valign="top">URL</td> |
2049 | | <td valign="top"><a href="http://dx.doi.org/10.4108/ICST.SIMUTOOLS2010.8636">http://dx.doi.org/10.4108/ICST.SIMUTOOLS2010.8636</a></td> |
2050 | | </tr> |
2051 | | |
2052 | | |
2053 | | </table></div><br><br> |
2054 | | |
2055 | | |
2056 | | |
2057 | | |
2058 | | <a class="EntryGoto" id="Esposito, Flavio and Wang, Yuefeng and Matta, Ibrahim and Day, John"></a> |
2059 | | <b class="myheading" style="position: relative; left: 5%;">Esposito, Flavio and Wang, Yuefeng and Matta, Ibrahim and Day, John</b> |
2060 | | |
2061 | | <div class="BibEntry"> |
2062 | | |
2063 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2064 | | |
2065 | | |
2066 | | <tr> |
2067 | | <td valign="top">Author</td> |
2068 | | <td valign="top">Esposito, Flavio and Wang, Yuefeng and Matta, Ibrahim and Day, John</td> |
2069 | | </tr> |
2070 | | |
2071 | | <tr> |
2072 | | <td valign="top">Title</td> |
2073 | | <td valign="top">Dynamic Layer Instantiation as a Service</td> |
2074 | | </tr> |
2075 | | |
2076 | | <tr> |
2077 | | <td valign="top">Location</td> |
2078 | | <td valign="top">Lombard, IL</td> |
2079 | | </tr> |
2080 | | |
2081 | | <tr> |
2082 | | <td valign="top">Publisher</td> |
2083 | | <td valign="top">USENIX Association</td> |
2084 | | </tr> |
2085 | | |
2086 | | <tr> |
2087 | | <td valign="top">Address</td> |
2088 | | <td valign="top">Berkeley, CA, USA</td> |
2089 | | </tr> |
2090 | | |
2091 | | <tr> |
2092 | | <td valign="top">Year</td> |
2093 | | <td valign="top">2013</td> |
2094 | | </tr> |
2095 | | |
2096 | | |
2097 | | |
2098 | | |
2099 | | |
2100 | | <tr> |
2101 | | <td valign="top">URL</td> |
2102 | | <td valign="top"><a href="https://www.usenix.org/system/files/nsdip13-paper11.pdf">https://www.usenix.org/system/files/nsdip13-paper11.pdf</a></td> |
2103 | | </tr> |
2104 | | |
2105 | | |
2106 | | </table></div><br><br> |
2107 | | |
2108 | | |
2109 | | |
2110 | | |
2111 | | <a class="EntryGoto" id="Feamster, Nick and Gao, Lixin and Rexford, Jennifer"></a> |
2112 | | <b class="myheading" style="position: relative; left: 5%;">Feamster, Nick and Gao, Lixin and Rexford, Jennifer</b> |
2113 | | |
2114 | | <div class="BibEntry"> |
2115 | | |
2116 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2117 | | |
2118 | | |
2119 | | <tr> |
2120 | | <td valign="top">Author</td> |
2121 | | <td valign="top">Feamster, Nick and Gao, Lixin and Rexford, Jennifer</td> |
2122 | | </tr> |
2123 | | |
2124 | | <tr> |
2125 | | <td valign="top">Title</td> |
2126 | | <td valign="top">How to lease the internet in your spare time</td> |
2127 | | </tr> |
2128 | | |
2129 | | <tr> |
2130 | | <td valign="top">Journal</td> |
2131 | | <td valign="top">SIGCOMM Comput. Commun. Rev.</td> |
2132 | | </tr> |
2133 | | |
2134 | | <tr> |
2135 | | <td valign="top">Publisher</td> |
2136 | | <td valign="top">ACM</td> |
2137 | | </tr> |
2138 | | |
2139 | | <tr> |
2140 | | <td valign="top">Address</td> |
2141 | | <td valign="top">New York, NY, USA</td> |
2142 | | </tr> |
2143 | | |
2144 | | <tr> |
2145 | | <td valign="top">Year</td> |
2146 | | <td valign="top">2007</td> |
2147 | | </tr> |
2148 | | |
2149 | | |
2150 | | |
2151 | | <tr> |
2152 | | <td valign="top">DOI</td> |
2153 | | <td valign="top">10.1145/1198255.1198265</td> |
2154 | | </tr> |
2155 | | |
2156 | | |
2157 | | |
2158 | | <tr> |
2159 | | <td valign="top">URL</td> |
2160 | | <td valign="top"><a href="http://doi.acm.org/10.1145/1198255.1198265">http://doi.acm.org/10.1145/1198255.1198265</a></td> |
2161 | | </tr> |
2162 | | |
2163 | | |
2164 | | </table></div><br><br> |
2165 | | |
2166 | | |
2167 | | |
2168 | | |
2169 | | <a class="EntryGoto" id="Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram"></a> |
2170 | | <b class="myheading" style="position: relative; left: 5%;">Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram</b> |
2171 | | |
2172 | | <div class="BibEntry"> |
2173 | | |
2174 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2175 | | |
2176 | | |
2177 | | <tr> |
2178 | | <td valign="top">Author</td> |
2179 | | <td valign="top">Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram</td> |
2180 | | </tr> |
2181 | | |
2182 | | <tr> |
2183 | | <td valign="top">Title</td> |
2184 | | <td valign="top">Decoupling policy from configuration in campus and enterprise networks</td> |
2185 | | </tr> |
2186 | | |
2187 | | <tr> |
2188 | | <td valign="top">Booktitle</td> |
2189 | | <td valign="top">2010 17th IEEE Workshop on Local & Metropolitan Area Networks (LANMAN)</td> |
2190 | | </tr> |
2191 | | |
2192 | | <tr> |
2193 | | <td valign="top">Location</td> |
2194 | | <td valign="top">Long Branch, NJ, USA</td> |
2195 | | </tr> |
2196 | | |
2197 | | <tr> |
2198 | | <td valign="top">Publisher</td> |
2199 | | <td valign="top">IEEE</td> |
2200 | | </tr> |
2201 | | |
2202 | | <tr> |
2203 | | <td valign="top">Year</td> |
2204 | | <td valign="top">2010</td> |
2205 | | </tr> |
2206 | | |
2207 | | <tr> |
2208 | | <td valign="top">Abstract</td> |
2209 | | <td valign="top">This paper surveys our ongoing work on the use of software-defined networking to simplify two acute policy problems in campus and enterprise network operations: access control and information flow control. We describe how the current coupling of high-level policy with low-level configuration makes these problems challenging today. We describe the specific policy problems faced by campus and enterprise network operators; illustrate our approach, which leverages recent trends in separating the network's ” control plane” from the data plane; and show how this approach can be applied to simplify these two enterprise network management tasks. We also describe our ongoing deployment efforts to build a campus network testbed where trial designs can be deployed and evaluated. We close with a summary of current and future research challenges for solving challenges within enterprise networks within the context of this new paradigm.</td> |
2210 | | </tr> |
2211 | | |
2212 | | |
2213 | | |
2214 | | <tr> |
2215 | | <td valign="top">DOI</td> |
2216 | | <td valign="top">10.1109/LANMAN.2010.5507162</td> |
2217 | | </tr> |
2218 | | |
2219 | | |
2220 | | |
2221 | | <tr> |
2222 | | <td valign="top">URL</td> |
2223 | | <td valign="top"><a href="http://dx.doi.org/10.1109/LANMAN.2010.5507162">http://dx.doi.org/10.1109/LANMAN.2010.5507162</a></td> |
2224 | | </tr> |
2225 | | |
2226 | | |
2227 | | </table></div><br><br> |
2228 | | |
2229 | | |
2230 | | |
2231 | | |
2232 | | <a class="EntryGoto" id="Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning"></a> |
2233 | | <b class="myheading" style="position: relative; left: 5%;">Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning</b> |
2234 | | |
2235 | | <div class="BibEntry"> |
2236 | | |
2237 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2238 | | |
2239 | | |
2240 | | <tr> |
2241 | | <td valign="top">Author</td> |
2242 | | <td valign="top">Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning</td> |
2243 | | </tr> |
2244 | | |
2245 | | <tr> |
2246 | | <td valign="top">Title</td> |
2247 | | <td valign="top">An enabling platform for autonomic management of the future internet</td> |
2248 | | </tr> |
2249 | | |
2250 | | <tr> |
2251 | | <td valign="top">Journal</td> |
2252 | | <td valign="top">IEEE Network</td> |
2253 | | </tr> |
2254 | | |
2255 | | <tr> |
2256 | | <td valign="top">Year</td> |
2257 | | <td valign="top">2011</td> |
2258 | | </tr> |
2259 | | |
2260 | | <tr> |
2261 | | <td valign="top">Abstract</td> |
2262 | | <td valign="top">This article shows an autonomic management solution based on the recently defined programmable node architecture NetServ. The article starts with a general description of the classical network management requirements and their adaptation to the expected network evolution. After a description of the major issues characterizing the management of the expected Future Internet, the main autonomic management paradigms, and some recently introduced autonomic service platforms, we show and demonstrate the effectiveness of the NetServ architecture. Born as a means to deploy and execute networked services at runtime over programmable routers, NetServ has proved to be a suitable environment for hosting an autonomic management architecture.</td> |
2263 | | </tr> |
2264 | | |
2265 | | |
2266 | | |
2267 | | <tr> |
2268 | | <td valign="top">DOI</td> |
2269 | | <td valign="top">10.1109/MNET.2011.6085639</td> |
2270 | | </tr> |
2271 | | |
2272 | | |
2273 | | |
2274 | | <tr> |
2275 | | <td valign="top">URL</td> |
2276 | | <td valign="top"><a href="http://dx.doi.org/10.1109/MNET.2011.6085639">http://dx.doi.org/10.1109/MNET.2011.6085639</a></td> |
2277 | | </tr> |
2278 | | |
2279 | | |
2280 | | </table></div><br><br> |
2281 | | |
2282 | | |
2283 | | |
2284 | | |
2285 | | <a class="EntryGoto" id="Fund, Fraida and Wang, Cong and Korakis, Thanasis and Zink, Michael and Panwar, Shivendra"></a> |
2286 | | <b class="myheading" style="position: relative; left: 5%;">Fund, Fraida and Wang, Cong and Korakis, Thanasis and Zink, Michael and Panwar, Shivendra</b> |
2287 | | |
2288 | | <div class="BibEntry"> |
2289 | | |
2290 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2291 | | |
2292 | | |
2293 | | <tr> |
2294 | | <td valign="top">Author</td> |
2295 | | <td valign="top">Fund, Fraida and Wang, Cong and Korakis, Thanasis and Zink, Michael and Panwar, Shivendra</td> |
2296 | | </tr> |
2297 | | |
2298 | | <tr> |
2299 | | <td valign="top">Title</td> |
2300 | | <td valign="top">GENI WiMAX Performance: Evaluation and Comparison of Two Campus Testbeds</td> |
2301 | | </tr> |
2302 | | |
2303 | | <tr> |
2304 | | <td valign="top">Booktitle</td> |
2305 | | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
2306 | | </tr> |
2307 | | |
2308 | | <tr> |
2309 | | <td valign="top">Location</td> |
2310 | | <td valign="top">Salt Lake City, UT</td> |
2311 | | </tr> |
2312 | | |
2313 | | <tr> |
2314 | | <td valign="top">Publisher</td> |
2315 | | <td valign="top">IEEE</td> |
2316 | | </tr> |
2317 | | |
2318 | | <tr> |
2319 | | <td valign="top">Year</td> |
2320 | | <td valign="top">2013</td> |
2321 | | </tr> |
2322 | | |
2323 | | |
2324 | | |
2325 | | <tr> |
2326 | | <td valign="top">DOI</td> |
2327 | | <td valign="top">10.1109/GREE.2013.23</td> |
2328 | | </tr> |
2329 | | |
2330 | | |
2331 | | |
2332 | | <tr> |
2333 | | <td valign="top">URL</td> |
2334 | | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.23">http://dx.doi.org/10.1109/GREE.2013.23</a></td> |
2335 | | </tr> |
2336 | | |
2337 | | |
2338 | | </table></div><br><br> |
2339 | | |
2340 | | |
2341 | | |
2342 | | |
2343 | | <a class="EntryGoto" id="Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia"></a> |
2344 | | <b class="myheading" style="position: relative; left: 5%;">Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</b> |
2345 | | |
2346 | | <div class="BibEntry"> |
2347 | | |
2348 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2349 | | |
2350 | | |
2351 | | <tr> |
2352 | | <td valign="top">Author</td> |
2353 | | <td valign="top">Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</td> |
2354 | | </tr> |
2355 | | |
2356 | | <tr> |
2357 | | <td valign="top">Title</td> |
2358 | | <td valign="top">Exercises for Graduate Students using GENI</td> |
2359 | | </tr> |
2360 | | |
2361 | | <tr> |
2362 | | <td valign="top">Booktitle</td> |
2363 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
2364 | | </tr> |
2365 | | |
2366 | | <tr> |
2367 | | <td valign="top">Location</td> |
2368 | | <td valign="top">Los Angeles</td> |
2369 | | </tr> |
2370 | | |
2371 | | <tr> |
2372 | | <td valign="top">Year</td> |
2373 | | <td valign="top">2012</td> |
2374 | | </tr> |
2375 | | |
2376 | | <tr> |
2377 | | <td valign="top">Abstract</td> |
2378 | | <td valign="top">GENI brings together a wide variety of heterogeneous networking infrastructure and technologies under a common platform. We propose programming exercises for graduate students to introduce GENI and enable students to conduct high fidelity networking experiments. In this paper, we focus on an exercise to study congestion control and reliability using the ProtoGENI aggregate. A planned second exercise aims to leverage GENI OpenFlow aggregates to study firewalls and QoS mechanisms. We believe that these lab exercises will expose students to key networking concepts and recent research directions, e.g., in the data center context.</td> |
2379 | | </tr> |
2380 | | |
2381 | | |
2382 | | |
2383 | | |
2384 | | |
2385 | | |
2386 | | </table></div><br><br> |
2387 | | |
2388 | | |
2389 | | <div class="BibEntry"> |
2390 | | |
2391 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2392 | | |
2393 | | |
2394 | | <tr> |
2395 | | <td valign="top">Author</td> |
2396 | | <td valign="top">Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</td> |
2397 | | </tr> |
2398 | | |
2399 | | <tr> |
2400 | | <td valign="top">Title</td> |
2401 | | <td valign="top">Exercises for Graduate Students using GENI</td> |
2402 | | </tr> |
2403 | | |
2404 | | <tr> |
2405 | | <td valign="top">Booktitle</td> |
2406 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
2407 | | </tr> |
2408 | | |
2409 | | <tr> |
2410 | | <td valign="top">Location</td> |
2411 | | <td valign="top">Los Angeles</td> |
2412 | | </tr> |
2413 | | |
2414 | | <tr> |
2415 | | <td valign="top">Year</td> |
2416 | | <td valign="top">2012</td> |
2417 | | </tr> |
2418 | | |
2419 | | <tr> |
2420 | | <td valign="top">Abstract</td> |
2421 | | <td valign="top">GENI brings together a wide variety of heterogeneous networking infrastructure and technologies under a common platform. We propose programming exercises for graduate students to introduce GENI and enable students to conduct high fidelity networking experiments. In this paper, we focus on an exercise to study congestion control and reliability using the ProtoGENI aggregate. A planned second exercise aims to leverage GENI OpenFlow aggregates to study firewalls and QoS mechanisms. We believe that these lab exercises will expose students to key networking concepts and recent research directions, e.g., in the data center context.</td> |
2422 | | </tr> |
2423 | | |
2424 | | |
2425 | | |
2426 | | |
2427 | | |
2428 | | |
2429 | | </table></div><br><br> |
2430 | | |
2431 | | |
2432 | | |
2433 | | |
2434 | | <a class="EntryGoto" id="Gangam, Sriharsha and Fahmy, Sonia"></a> |
2435 | | <b class="myheading" style="position: relative; left: 5%;">Gangam, Sriharsha and Fahmy, Sonia</b> |
2436 | | |
2437 | | <div class="BibEntry"> |
2438 | | |
2439 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2440 | | |
2441 | | |
2442 | | <tr> |
2443 | | <td valign="top">Author</td> |
2444 | | <td valign="top">Gangam, Sriharsha and Fahmy, Sonia</td> |
2445 | | </tr> |
2446 | | |
2447 | | <tr> |
2448 | | <td valign="top">Title</td> |
2449 | | <td valign="top">Mitigating interference in a network measurement service</td> |
2450 | | </tr> |
2451 | | |
2452 | | <tr> |
2453 | | <td valign="top">Booktitle</td> |
2454 | | <td valign="top">2011 IEEE Nineteenth IEEE International Workshop on Quality of Service</td> |
2455 | | </tr> |
2456 | | |
2457 | | <tr> |
2458 | | <td valign="top">Location</td> |
2459 | | <td valign="top">San Jose, CA, USA</td> |
2460 | | </tr> |
2461 | | |
2462 | | <tr> |
2463 | | <td valign="top">Publisher</td> |
2464 | | <td valign="top">IEEE</td> |
2465 | | </tr> |
2466 | | |
2467 | | <tr> |
2468 | | <td valign="top">Year</td> |
2469 | | <td valign="top">2011</td> |
2470 | | </tr> |
2471 | | |
2472 | | <tr> |
2473 | | <td valign="top">Abstract</td> |
2474 | | <td valign="top">Shared measurement services offer key advantages over conventional ad-hoc techniques for network monitoring. A measurement service may receive measurement requests concurrently from different applications and network administrators. These measurement requests are often served by injecting active network measurement traffic between two hosts. Two active measurements are said to interfere when the probe packets of one measurement tool are viewed as network traffic by the other. This may lead to faulty measurement readings. In this paper, we model the measurement interference problem, and show how to schedule measurement tasks to reduce interference and hence increase measurement accuracy. We propose twelve computationally tractable algorithms that decrease the total completion time (makespan) of measurement tasks, while avoiding interference. Our evaluation shows that the algorithm we refer to as Largest Area First, Busiest Node First - Earliest Interval Schedule (LAFBNF-EIS) has a mean makespan of about 5% more than the theoretical lower bound over our set of measurement workloads.</td> |
2475 | | </tr> |
2476 | | |
2477 | | |
2478 | | |
2479 | | <tr> |
2480 | | <td valign="top">DOI</td> |
2481 | | <td valign="top">10.1109/IWQOS.2011.5931347</td> |
2482 | | </tr> |
2483 | | |
2484 | | |
2485 | | |
2486 | | <tr> |
2487 | | <td valign="top">URL</td> |
2488 | | <td valign="top"><a href="http://dx.doi.org/10.1109/IWQOS.2011.5931347">http://dx.doi.org/10.1109/IWQOS.2011.5931347</a></td> |
2489 | | </tr> |
2490 | | |
2491 | | |
2492 | | </table></div><br><br> |
2493 | | |
2494 | | |
2495 | | |
2496 | | |
2497 | | <a class="EntryGoto" id="Gao, Jingcheng and Xiao, Yang"></a> |
2498 | | <b class="myheading" style="position: relative; left: 5%;">Gao, Jingcheng and Xiao, Yang</b> |
2499 | | |
2500 | | <div class="BibEntry"> |
2501 | | |
2502 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2503 | | |
2504 | | |
2505 | | <tr> |
2506 | | <td valign="top">Author</td> |
2507 | | <td valign="top">Gao, Jingcheng and Xiao, Yang</td> |
2508 | | </tr> |
2509 | | |
2510 | | <tr> |
2511 | | <td valign="top">Title</td> |
2512 | | <td valign="top">ProtoGENI DoS/DDoS Security Tests and Experiments</td> |
2513 | | </tr> |
2514 | | |
2515 | | <tr> |
2516 | | <td valign="top">Booktitle</td> |
2517 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
2518 | | </tr> |
2519 | | |
2520 | | <tr> |
2521 | | <td valign="top">Location</td> |
2522 | | <td valign="top">Los Angeles</td> |
2523 | | </tr> |
2524 | | |
2525 | | <tr> |
2526 | | <td valign="top">Year</td> |
2527 | | <td valign="top">2012</td> |
2528 | | </tr> |
2529 | | |
2530 | | <tr> |
2531 | | <td valign="top">Abstract</td> |
2532 | | <td valign="top">his paper will explain some tests and experiments to investigate selected security issues through ProtoGENI mainly during Spiral 3 time period and the beginning of Spiral 4. In this paper, we conduct multiple sets of DoS/ DDoS attacks in the current ProtoGENI testbed. These attacks show that it is very possible that ProtoGENI nodes may render vulnerabilities to such attacks.</td> |
2533 | | </tr> |
2534 | | |
2535 | | |
2536 | | |
2537 | | |
2538 | | |
2539 | | |
2540 | | </table></div><br><br> |
2541 | | |
2542 | | |
2543 | | <div class="BibEntry"> |
2544 | | |
2545 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2546 | | |
2547 | | |
2548 | | <tr> |
2549 | | <td valign="top">Author</td> |
2550 | | <td valign="top">Gao, Jingcheng and Xiao, Yang</td> |
2551 | | </tr> |
2552 | | |
2553 | | <tr> |
2554 | | <td valign="top">Title</td> |
2555 | | <td valign="top">ProtoGENI DoS/DDoS Security Tests and Experiments</td> |
2556 | | </tr> |
2557 | | |
2558 | | <tr> |
2559 | | <td valign="top">Booktitle</td> |
2560 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
2561 | | </tr> |
2562 | | |
2563 | | <tr> |
2564 | | <td valign="top">Location</td> |
2565 | | <td valign="top">Los Angeles</td> |
2566 | | </tr> |
2567 | | |
2568 | | <tr> |
2569 | | <td valign="top">Year</td> |
2570 | | <td valign="top">2012</td> |
2571 | | </tr> |
2572 | | |
2573 | | <tr> |
2574 | | <td valign="top">Abstract</td> |
2575 | | <td valign="top">his paper will explain some tests and experiments to investigate selected security issues through ProtoGENI mainly during Spiral 3 time period and the beginning of Spiral 4. In this paper, we conduct multiple sets of DoS/ DDoS attacks in the current ProtoGENI testbed. These attacks show that it is very possible that ProtoGENI nodes may render vulnerabilities to such attacks.</td> |
2576 | | </tr> |
2577 | | |
2578 | | |
2579 | | |
2580 | | |
2581 | | |
2582 | | |
2583 | | </table></div><br><br> |
2584 | | |
2585 | | |
2586 | | |
2587 | | |
2588 | | <a class="EntryGoto" id="Gember, Aaron and Dragga, Chris and Akella, Aditya"></a> |
2589 | | <b class="myheading" style="position: relative; left: 5%;">Gember, Aaron and Dragga, Chris and Akella, Aditya</b> |
2590 | | |
2591 | | <div class="BibEntry"> |
2592 | | |
2593 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2594 | | |
2595 | | |
2596 | | <tr> |
2597 | | <td valign="top">Author</td> |
2598 | | <td valign="top">Gember, Aaron and Dragga, Chris and Akella, Aditya</td> |
2599 | | </tr> |
2600 | | |
2601 | | <tr> |
2602 | | <td valign="top">Title</td> |
2603 | | <td valign="top">ECOS: Practical Mobile Application Offloading for Enterprises</td> |
2604 | | </tr> |
2605 | | |
2606 | | <tr> |
2607 | | <td valign="top">Booktitle</td> |
2608 | | <td valign="top">2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE '12)</td> |
2609 | | </tr> |
2610 | | |
2611 | | <tr> |
2612 | | <td valign="top">Year</td> |
2613 | | <td valign="top">2012</td> |
2614 | | </tr> |
2615 | | |
2616 | | <tr> |
2617 | | <td valign="top">Abstract</td> |
2618 | | <td valign="top">Offloading has emerged as a promising idea to allow handheld devices to access intensive applications without performance or energy costs. This could be particularly useful for enterprises seeking to run line-of-business applications on handhelds. However, we must address two practical roadblocks in order to make offloading amenable for enterprises: (i) ensuring data privacy and the use of trusted offloading resources, and (ii) accommodating offload at scale with diverse handheld objectives and compute resource capabilities. We present the design and implementation of an Enterprise-Centric Offloading System (ECOS) which augments prior offloading proposals to address these issues. ECOS uses a logically central controller to opportunistically leverage diverse compute resources, while tightly controlling where specific applications offload depending on privacy, performance, and energy constraints of users and applications. A wide range of experiments using a real prototype establish the effectiveness of our approach.</td> |
2619 | | </tr> |
2620 | | |
2621 | | |
2622 | | |
2623 | | |
2624 | | |
2625 | | <tr> |
2626 | | <td valign="top">URL</td> |
2627 | | <td valign="top"><a href="http://www.usenix.org/conference/hot-ice12/ecos-practical-mobile-application-of%EF%AC%82oading-enterprises">http://www.usenix.org/conference/hot-ice12/ecos-practical-mobile-application-of%EF%AC%82oading-enterprises</a></td> |
2628 | | </tr> |
2629 | | |
2630 | | |
2631 | | </table></div><br><br> |
2632 | | |
2633 | | |
2634 | | |
2635 | | |
2636 | | <a class="EntryGoto" id="Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David"></a> |
2637 | | <b class="myheading" style="position: relative; left: 5%;">Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David</b> |
2638 | | |
2639 | | <div class="BibEntry"> |
2640 | | |
2641 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2642 | | |
2643 | | |
2644 | | <tr> |
2645 | | <td valign="top">Author</td> |
2646 | | <td valign="top">Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David</td> |
2647 | | </tr> |
2648 | | |
2649 | | <tr> |
2650 | | <td valign="top">Title</td> |
2651 | | <td valign="top">Supporting network evolution and incremental deployment with XIA</td> |
2652 | | </tr> |
2653 | | |
2654 | | <tr> |
2655 | | <td valign="top">Booktitle</td> |
2656 | | <td valign="top">Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication</td> |
2657 | | </tr> |
2658 | | |
2659 | | <tr> |
2660 | | <td valign="top">Location</td> |
2661 | | <td valign="top">Helsinki, Finland</td> |
2662 | | </tr> |
2663 | | |
2664 | | <tr> |
2665 | | <td valign="top">Publisher</td> |
2666 | | <td valign="top">ACM</td> |
2667 | | </tr> |
2668 | | |
2669 | | <tr> |
2670 | | <td valign="top">Address</td> |
2671 | | <td valign="top">New York, NY, USA</td> |
2672 | | </tr> |
2673 | | |
2674 | | <tr> |
2675 | | <td valign="top">Year</td> |
2676 | | <td valign="top">2012</td> |
2677 | | </tr> |
2678 | | |
2679 | | <tr> |
2680 | | <td valign="top">Abstract</td> |
2681 | | <td valign="top">eXpressive Internet Architecture (XIA) [1] is an architecture that natively supports multiple communication types and allows networks to evolve their abstractions and functionality to accommodate new styles of communication over time. XIA embeds an elegant mechanism for handling unforeseen communication types for legacy routers. In this demonstration, we show that XIA overcomes three key barriers in network evolution (outlined below) by (1) allowing end-hosts and applications to start using new communication types (e.g., service and content) before the network supports them, (2) ensuring that upgrading a subset of routers to support new functionalities immediately benefits applications, and (3) using the same mechanisms we employ for 1 and 2 to incrementally deploy XIA in IP networks.</td> |
2682 | | </tr> |
2683 | | |
2684 | | |
2685 | | |
2686 | | <tr> |
2687 | | <td valign="top">DOI</td> |
2688 | | <td valign="top">10.1145/2342356.2342410</td> |
2689 | | </tr> |
2690 | | |
2691 | | |
2692 | | |
2693 | | <tr> |
2694 | | <td valign="top">URL</td> |
2695 | | <td valign="top"><a href="http://dx.doi.org/10.1145/2342356.2342410">http://dx.doi.org/10.1145/2342356.2342410</a></td> |
2696 | | </tr> |
2697 | | |
2698 | | |
2699 | | </table></div><br><br> |
2700 | | |
2701 | | |
2702 | | <div class="BibEntry"> |
2703 | | |
2704 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2705 | | |
2706 | | |
2707 | | <tr> |
2708 | | <td valign="top">Author</td> |
2709 | | <td valign="top">Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David</td> |
2710 | | </tr> |
2711 | | |
2712 | | <tr> |
2713 | | <td valign="top">Title</td> |
2714 | | <td valign="top">Supporting network evolution and incremental deployment with XIA</td> |
2715 | | </tr> |
2716 | | |
2717 | | <tr> |
2718 | | <td valign="top">Booktitle</td> |
2719 | | <td valign="top">Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication</td> |
2720 | | </tr> |
2721 | | |
2722 | | <tr> |
2723 | | <td valign="top">Location</td> |
2724 | | <td valign="top">Helsinki, Finland</td> |
2725 | | </tr> |
2726 | | |
2727 | | <tr> |
2728 | | <td valign="top">Publisher</td> |
2729 | | <td valign="top">ACM</td> |
2730 | | </tr> |
2731 | | |
2732 | | <tr> |
2733 | | <td valign="top">Address</td> |
2734 | | <td valign="top">New York, NY, USA</td> |
2735 | | </tr> |
2736 | | |
2737 | | <tr> |
2738 | | <td valign="top">Year</td> |
2739 | | <td valign="top">2012</td> |
2740 | | </tr> |
2741 | | |
2742 | | <tr> |
2743 | | <td valign="top">Abstract</td> |
2744 | | <td valign="top">eXpressive Internet Architecture (XIA) [1] is an architecture that natively supports multiple communication types and allows networks to evolve their abstractions and functionality to accommodate new styles of communication over time. XIA embeds an elegant mechanism for handling unforeseen communication types for legacy routers. In this demonstration, we show that XIA overcomes three key barriers in network evolution (outlined below) by (1) allowing end-hosts and applications to start using new communication types (e.g., service and content) before the network supports them, (2) ensuring that upgrading a subset of routers to support new functionalities immediately benefits applications, and (3) using the same mechanisms we employ for 1 and 2 to incrementally deploy XIA in IP networks.</td> |
2745 | | </tr> |
2746 | | |
2747 | | |
2748 | | |
2749 | | <tr> |
2750 | | <td valign="top">DOI</td> |
2751 | | <td valign="top">10.1145/2342356.2342410</td> |
2752 | | </tr> |
2753 | | |
2754 | | |
2755 | | |
2756 | | <tr> |
2757 | | <td valign="top">URL</td> |
2758 | | <td valign="top"><a href="http://dx.doi.org/10.1145/2342356.2342410">http://dx.doi.org/10.1145/2342356.2342410</a></td> |
2759 | | </tr> |
2760 | | |
2761 | | |
2762 | | </table></div><br><br> |
2763 | | |
2764 | | |
2765 | | |
2766 | | |
2767 | | <a class="EntryGoto" id="Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C."></a> |
2768 | | <b class="myheading" style="position: relative; left: 5%;">Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</b> |
2769 | | |
2770 | | <div class="BibEntry"> |
2771 | | |
2772 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2773 | | |
2774 | | |
2775 | | <tr> |
2776 | | <td valign="top">Author</td> |
2777 | | <td valign="top">Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</td> |
2778 | | </tr> |
2779 | | |
2780 | | <tr> |
2781 | | <td valign="top">Title</td> |
2782 | | <td valign="top">The design of an instrumentation system for federated and virtualized network testbeds</td> |
2783 | | </tr> |
2784 | | |
2785 | | <tr> |
2786 | | <td valign="top">Booktitle</td> |
2787 | | <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td> |
2788 | | </tr> |
2789 | | |
2790 | | <tr> |
2791 | | <td valign="top">Publisher</td> |
2792 | | <td valign="top">IEEE</td> |
2793 | | </tr> |
2794 | | |
2795 | | <tr> |
2796 | | <td valign="top">Year</td> |
2797 | | <td valign="top">2012</td> |
2798 | | </tr> |
2799 | | |
2800 | | <tr> |
2801 | | <td valign="top">Abstract</td> |
2802 | | <td valign="top">Much of the GENI effort in developing network testbeds has been focused on building the control frameworks needed to allocate and initialize the network resources that make up an experiment. We argue that building the instrumentation and measurement system to monitor and capture the behavior of the network is just as important and challenging as setting up the network itself, especially in a virtualized and federated environment where getting information from experimental nodes is too complicated and too much to handle for a typical user. In this paper, we describe the design of an instrumentation and measurement infrastructure that allows users to monitor their experiments. The challenge that virtualization and federation of GENI testbeds bring to instrumentation and monitoring is how to hide the details of instrumentation setup from users so that users do not need to be experts in system administration or network management of virtualized and federated systems, but are still able to ” see” what is going on with their experiments. Our instrumentation tool sets up experiment-specific monitoring infrastructure that is tailored to capture, record, and display only information associated with that experiment. Our tools are currently available in GENI, and we present a simple example of how to use them to instrument an experiment.</td> |
2803 | | </tr> |
2804 | | |
2805 | | |
2806 | | |
2807 | | <tr> |
2808 | | <td valign="top">DOI</td> |
2809 | | <td valign="top">10.1109/NOMS.2012.6212061</td> |
2810 | | </tr> |
2811 | | |
2812 | | |
2813 | | |
2814 | | <tr> |
2815 | | <td valign="top">URL</td> |
2816 | | <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6212061">http://dx.doi.org/10.1109/NOMS.2012.6212061</a></td> |
2817 | | </tr> |
2818 | | |
2819 | | |
2820 | | </table></div><br><br> |
2821 | | |
2822 | | |
2823 | | |
2824 | | |
2825 | | <a class="EntryGoto" id="Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles"></a> |
2826 | | <b class="myheading" style="position: relative; left: 5%;">Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</b> |
2827 | | |
2828 | | <div class="BibEntry"> |
2829 | | |
2830 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2831 | | |
2832 | | |
2833 | | <tr> |
2834 | | <td valign="top">Author</td> |
2835 | | <td valign="top">Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td> |
2836 | | </tr> |
2837 | | |
2838 | | <tr> |
2839 | | <td valign="top">Title</td> |
2840 | | <td valign="top">GENI-enabled Programming Experiments for Networking Classes</td> |
2841 | | </tr> |
2842 | | |
2843 | | <tr> |
2844 | | <td valign="top">Booktitle</td> |
2845 | | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
2846 | | </tr> |
2847 | | |
2848 | | <tr> |
2849 | | <td valign="top">Location</td> |
2850 | | <td valign="top">Salt Lake City, UT</td> |
2851 | | </tr> |
2852 | | |
2853 | | <tr> |
2854 | | <td valign="top">Publisher</td> |
2855 | | <td valign="top">IEEE</td> |
2856 | | </tr> |
2857 | | |
2858 | | <tr> |
2859 | | <td valign="top">Year</td> |
2860 | | <td valign="top">2013</td> |
2861 | | </tr> |
2862 | | |
2863 | | |
2864 | | |
2865 | | <tr> |
2866 | | <td valign="top">DOI</td> |
2867 | | <td valign="top">10.1109/GREE.2013.30</td> |
2868 | | </tr> |
2869 | | |
2870 | | |
2871 | | |
2872 | | <tr> |
2873 | | <td valign="top">URL</td> |
2874 | | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.30">http://dx.doi.org/10.1109/GREE.2013.30</a></td> |
2875 | | </tr> |
2876 | | |
2877 | | |
2878 | | </table></div><br><br> |
2879 | | |
2880 | | |
2881 | | |
2882 | | |
2883 | | <a class="EntryGoto" id="Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles"></a> |
2884 | | <b class="myheading" style="position: relative; left: 5%;">Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</b> |
2885 | | |
2886 | | <div class="BibEntry"> |
2887 | | |
2888 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2889 | | |
2890 | | |
2891 | | <tr> |
2892 | | <td valign="top">Author</td> |
2893 | | <td valign="top">Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td> |
2894 | | </tr> |
2895 | | |
2896 | | <tr> |
2897 | | <td valign="top">Title</td> |
2898 | | <td valign="top">Teaching with the Emerging GENI Network</td> |
2899 | | </tr> |
2900 | | |
2901 | | <tr> |
2902 | | <td valign="top">Booktitle</td> |
2903 | | <td valign="top">Proceedings of the 2012 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS)</td> |
2904 | | </tr> |
2905 | | |
2906 | | <tr> |
2907 | | <td valign="top">Location</td> |
2908 | | <td valign="top">Las Vegas</td> |
2909 | | </tr> |
2910 | | |
2911 | | <tr> |
2912 | | <td valign="top">Year</td> |
2913 | | <td valign="top">2012</td> |
2914 | | </tr> |
2915 | | |
2916 | | |
2917 | | |
2918 | | |
2919 | | |
2920 | | |
2921 | | </table></div><br><br> |
2922 | | |
2923 | | |
2924 | | |
2925 | | |
2926 | | <a class="EntryGoto" id="Guan, Xinjie and Choi, Baek-Young and Song, Sejun"></a> |
2927 | | <b class="myheading" style="position: relative; left: 5%;">Guan, Xinjie and Choi, Baek-Young and Song, Sejun</b> |
2928 | | |
2929 | | <div class="BibEntry"> |
2930 | | |
2931 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2932 | | |
2933 | | |
2934 | | <tr> |
2935 | | <td valign="top">Author</td> |
2936 | | <td valign="top">Guan, Xinjie and Choi, Baek-Young and Song, Sejun</td> |
2937 | | </tr> |
2938 | | |
2939 | | <tr> |
2940 | | <td valign="top">Title</td> |
2941 | | <td valign="top">Reliability and Scalability Issues in Software Defined Network Frameworks</td> |
2942 | | </tr> |
2943 | | |
2944 | | <tr> |
2945 | | <td valign="top">Booktitle</td> |
2946 | | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
2947 | | </tr> |
2948 | | |
2949 | | <tr> |
2950 | | <td valign="top">Location</td> |
2951 | | <td valign="top">Salt Lake City, UT</td> |
2952 | | </tr> |
2953 | | |
2954 | | <tr> |
2955 | | <td valign="top">Publisher</td> |
2956 | | <td valign="top">IEEE</td> |
2957 | | </tr> |
2958 | | |
2959 | | <tr> |
2960 | | <td valign="top">Year</td> |
2961 | | <td valign="top">2013</td> |
2962 | | </tr> |
2963 | | |
2964 | | |
2965 | | |
2966 | | <tr> |
2967 | | <td valign="top">DOI</td> |
2968 | | <td valign="top">10.1109/GREE.2013.28</td> |
2969 | | </tr> |
2970 | | |
2971 | | |
2972 | | |
2973 | | <tr> |
2974 | | <td valign="top">URL</td> |
2975 | | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.28">http://dx.doi.org/10.1109/GREE.2013.28</a></td> |
2976 | | </tr> |
2977 | | |
2978 | | |
2979 | | </table></div><br><br> |
2980 | | |
2981 | | |
2982 | | |
2983 | | |
2984 | | <a class="EntryGoto" id="Herron, Jon-Paul"></a> |
2985 | | <b class="myheading" style="position: relative; left: 5%;">Herron, Jon-Paul</b> |
2986 | | |
2987 | | <div class="BibEntry"> |
2988 | | |
2989 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
2990 | | |
2991 | | |
2992 | | <tr> |
2993 | | <td valign="top">Author</td> |
2994 | | <td valign="top">Herron, Jon-Paul</td> |
2995 | | </tr> |
2996 | | |
2997 | | <tr> |
2998 | | <td valign="top">Title</td> |
2999 | | <td valign="top">GENI Meta-Operations Center</td> |
3000 | | </tr> |
3001 | | |
3002 | | <tr> |
3003 | | <td valign="top">Booktitle</td> |
3004 | | <td valign="top">2008 IEEE Fourth International Conference on eScience</td> |
3005 | | </tr> |
3006 | | |
3007 | | <tr> |
3008 | | <td valign="top">Location</td> |
3009 | | <td valign="top">Indianapolis, IN, USA</td> |
3010 | | </tr> |
3011 | | |
3012 | | <tr> |
3013 | | <td valign="top">Publisher</td> |
3014 | | <td valign="top">IEEE</td> |
3015 | | </tr> |
3016 | | |
3017 | | <tr> |
3018 | | <td valign="top">Year</td> |
3019 | | <td valign="top">2008</td> |
3020 | | </tr> |
3021 | | |
3022 | | <tr> |
3023 | | <td valign="top">Abstract</td> |
3024 | | <td valign="top">NSF's GENI program represents an opportunity to build the kind of programmable, virtualized testbed scientists exploring the future of networking will need to support their research. As with any other scientific instrument, it will be crucial that the GENI infrastructure offer repeatable, consistent results to the researchers using it.The GENI Meta-Operations Center, operated by the Global Research NOC at Indiana University, will develop the software, protocols, and processes needed to ensure the repeatability, consistency, and efficiency of GENI.</td> |
3025 | | </tr> |
3026 | | |
3027 | | |
3028 | | |
3029 | | <tr> |
3030 | | <td valign="top">DOI</td> |
3031 | | <td valign="top">10.1109/eScience.2008.103</td> |
3032 | | </tr> |
3033 | | |
3034 | | |
3035 | | |
3036 | | <tr> |
3037 | | <td valign="top">URL</td> |
3038 | | <td valign="top"><a href="http://dx.doi.org/10.1109/eScience.2008.103">http://dx.doi.org/10.1109/eScience.2008.103</a></td> |
3039 | | </tr> |
3040 | | |
3041 | | |
3042 | | </table></div><br><br> |
3043 | | |
3044 | | |
3045 | | |
3046 | | |
3047 | | <a class="EntryGoto" id="Huang, Shufeng and Griffioen, James and Calvert, Kenneth L."></a> |
3048 | | <b class="myheading" style="position: relative; left: 5%;">Huang, Shufeng and Griffioen, James and Calvert, Kenneth L.</b> |
3049 | | |
3050 | | <div class="BibEntry"> |
3051 | | |
3052 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3053 | | |
3054 | | |
3055 | | <tr> |
3056 | | <td valign="top">Author</td> |
3057 | | <td valign="top">Huang, Shufeng and Griffioen, James and Calvert, Kenneth L.</td> |
3058 | | </tr> |
3059 | | |
3060 | | <tr> |
3061 | | <td valign="top">Title</td> |
3062 | | <td valign="top">Fast-tracking GENI Experiments using HyperNets</td> |
3063 | | </tr> |
3064 | | |
3065 | | <tr> |
3066 | | <td valign="top">Booktitle</td> |
3067 | | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
3068 | | </tr> |
3069 | | |
3070 | | <tr> |
3071 | | <td valign="top">Location</td> |
3072 | | <td valign="top">Salt Lake City, UT</td> |
3073 | | </tr> |
3074 | | |
3075 | | <tr> |
3076 | | <td valign="top">Publisher</td> |
3077 | | <td valign="top">IEEE</td> |
3078 | | </tr> |
3079 | | |
3080 | | <tr> |
3081 | | <td valign="top">Year</td> |
3082 | | <td valign="top">2013</td> |
3083 | | </tr> |
3084 | | |
3085 | | |
3086 | | |
3087 | | <tr> |
3088 | | <td valign="top">DOI</td> |
3089 | | <td valign="top">10.1109/GREE.2013.10</td> |
3090 | | </tr> |
3091 | | |
3092 | | |
3093 | | |
3094 | | <tr> |
3095 | | <td valign="top">URL</td> |
3096 | | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.10">http://dx.doi.org/10.1109/GREE.2013.10</a></td> |
3097 | | </tr> |
3098 | | |
3099 | | |
3100 | | </table></div><br><br> |
3101 | | |
3102 | | |
3103 | | |
3104 | | |
3105 | | <a class="EntryGoto" id="Jin, Ruofan and Wang, Bing"></a> |
3106 | | <b class="myheading" style="position: relative; left: 5%;">Jin, Ruofan and Wang, Bing</b> |
3107 | | |
3108 | | <div class="BibEntry"> |
3109 | | |
3110 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3111 | | |
3112 | | |
3113 | | <tr> |
3114 | | <td valign="top">Author</td> |
3115 | | <td valign="top">Jin, Ruofan and Wang, Bing</td> |
3116 | | </tr> |
3117 | | |
3118 | | <tr> |
3119 | | <td valign="top">Title</td> |
3120 | | <td valign="top">Malware Detection for Mobile Devices Using Software-Defined Networking</td> |
3121 | | </tr> |
3122 | | |
3123 | | <tr> |
3124 | | <td valign="top">Booktitle</td> |
3125 | | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
3126 | | </tr> |
3127 | | |
3128 | | <tr> |
3129 | | <td valign="top">Location</td> |
3130 | | <td valign="top">Salt Lake City, UT</td> |
3131 | | </tr> |
3132 | | |
3133 | | <tr> |
3134 | | <td valign="top">Publisher</td> |
3135 | | <td valign="top">IEEE</td> |
3136 | | </tr> |
3137 | | |
3138 | | <tr> |
3139 | | <td valign="top">Year</td> |
3140 | | <td valign="top">2013</td> |
3141 | | </tr> |
3142 | | |
3143 | | |
3144 | | |
3145 | | <tr> |
3146 | | <td valign="top">DOI</td> |
3147 | | <td valign="top">10.1109/GREE.2013.24</td> |
3148 | | </tr> |
3149 | | |
3150 | | |
3151 | | |
3152 | | <tr> |
3153 | | <td valign="top">URL</td> |
3154 | | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.24">http://dx.doi.org/10.1109/GREE.2013.24</a></td> |
3155 | | </tr> |
3156 | | |
3157 | | |
3158 | | </table></div><br><br> |
3159 | | |
3160 | | |
3161 | | |
3162 | | |
3163 | | <a class="EntryGoto" id="Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng"></a> |
3164 | | <b class="myheading" style="position: relative; left: 5%;">Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng</b> |
3165 | | |
3166 | | <div class="BibEntry"> |
3167 | | |
3168 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3169 | | |
3170 | | |
3171 | | <tr> |
3172 | | <td valign="top">Author</td> |
3173 | | <td valign="top">Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng</td> |
3174 | | </tr> |
3175 | | |
3176 | | <tr> |
3177 | | <td valign="top">Title</td> |
3178 | | <td valign="top">LENS: resource specification for wireless sensor network experimentation infrastructures</td> |
3179 | | </tr> |
3180 | | |
3181 | | <tr> |
3182 | | <td valign="top">Booktitle</td> |
3183 | | <td valign="top">Proceedings of the 6th ACM international workshop on Wireless network testbeds, experimental evaluation and characterization</td> |
3184 | | </tr> |
3185 | | |
3186 | | <tr> |
3187 | | <td valign="top">Location</td> |
3188 | | <td valign="top">Las Vegas, Nevada, USA</td> |
3189 | | </tr> |
3190 | | |
3191 | | <tr> |
3192 | | <td valign="top">Publisher</td> |
3193 | | <td valign="top">ACM</td> |
3194 | | </tr> |
3195 | | |
3196 | | <tr> |
3197 | | <td valign="top">Address</td> |
3198 | | <td valign="top">New York, NY, USA</td> |
3199 | | </tr> |
3200 | | |
3201 | | <tr> |
3202 | | <td valign="top">Year</td> |
3203 | | <td valign="top">2011</td> |
3204 | | </tr> |
3205 | | |
3206 | | <tr> |
3207 | | <td valign="top">Abstract</td> |
3208 | | <td valign="top">As a first step towards predictable, repeatable WSN experimentation, we propose the resource specification language LENS (a.k.a. Language for Embedded Networked Sensing) for WSN experimentation infrastructures. Using the Resource Description Framework (RDF) and the Web Ontology Language (OWL), LENS defines a semantic ontology for WSN resources; LENS enables explicit control and measurement of uncertainty factors, and it enables reasoning about the relationships between WSN resources. Focusing on basic concepts of WSNs, LENS supports resource specification in a wide range of WSN experimentation infrastructures, and it is extensible to support potentially unforeseen technologies. LENS is also compatible with specification languages for other network resources such as optical networks. As a part of the NSF GENI initiative, we have implemented LENS in the KanseiGenie control framework, and LENS has been actively used to support experimentation in the federated WSN infrastructure involving Kansei and NetEye. Enabling reasoning about uncertainty factors in experimentation, LENS is expected to serve as a basis for developing methodologies and tools for predictable, repeatable WSN experimentation.</td> |
3209 | | </tr> |
3210 | | |
3211 | | |
3212 | | |
3213 | | <tr> |
3214 | | <td valign="top">DOI</td> |
3215 | | <td valign="top">10.1145/2030718.2030727</td> |
3216 | | </tr> |
3217 | | |
3218 | | |
3219 | | |
3220 | | <tr> |
3221 | | <td valign="top">URL</td> |
3222 | | <td valign="top"><a href="http://dx.doi.org/10.1145/2030718.2030727">http://dx.doi.org/10.1145/2030718.2030727</a></td> |
3223 | | </tr> |
3224 | | |
3225 | | |
3226 | | </table></div><br><br> |
3227 | | |
3228 | | |
3229 | | |
3230 | | |
3231 | | <a class="EntryGoto" id="Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten"></a> |
3232 | | <b class="myheading" style="position: relative; left: 5%;">Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten</b> |
3233 | | |
3234 | | <div class="BibEntry"> |
3235 | | |
3236 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3237 | | |
3238 | | |
3239 | | <tr> |
3240 | | <td valign="top">Author</td> |
3241 | | <td valign="top">Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten</td> |
3242 | | </tr> |
3243 | | |
3244 | | <tr> |
3245 | | <td valign="top">Title</td> |
3246 | | <td valign="top">VeriFlow: verifying network-wide invariants in real time</td> |
3247 | | </tr> |
3248 | | |
3249 | | <tr> |
3250 | | <td valign="top">Booktitle</td> |
3251 | | <td valign="top">Proceedings of the first workshop on Hot topics in software defined networks</td> |
3252 | | </tr> |
3253 | | |
3254 | | <tr> |
3255 | | <td valign="top">Location</td> |
3256 | | <td valign="top">Helsinki, Finland</td> |
3257 | | </tr> |
3258 | | |
3259 | | <tr> |
3260 | | <td valign="top">Publisher</td> |
3261 | | <td valign="top">ACM</td> |
3262 | | </tr> |
3263 | | |
3264 | | <tr> |
3265 | | <td valign="top">Address</td> |
3266 | | <td valign="top">New York, NY, USA</td> |
3267 | | </tr> |
3268 | | |
3269 | | <tr> |
3270 | | <td valign="top">Year</td> |
3271 | | <td valign="top">2012</td> |
3272 | | </tr> |
3273 | | |
3274 | | |
3275 | | |
3276 | | <tr> |
3277 | | <td valign="top">DOI</td> |
3278 | | <td valign="top">10.1145/2342441.2342452</td> |
3279 | | </tr> |
3280 | | |
3281 | | |
3282 | | |
3283 | | <tr> |
3284 | | <td valign="top">URL</td> |
3285 | | <td valign="top"><a href="http://doi.acm.org/10.1145/2342441.2342452">http://doi.acm.org/10.1145/2342441.2342452</a></td> |
3286 | | </tr> |
3287 | | |
3288 | | |
3289 | | </table></div><br><br> |
3290 | | |
3291 | | |
3292 | | |
3293 | | |
3294 | | <a class="EntryGoto" id="Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki"></a> |
3295 | | <b class="myheading" style="position: relative; left: 5%;">Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki</b> |
3296 | | |
3297 | | <div class="BibEntry"> |
3298 | | |
3299 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3300 | | |
3301 | | |
3302 | | <tr> |
3303 | | <td valign="top">Author</td> |
3304 | | <td valign="top">Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki</td> |
3305 | | </tr> |
3306 | | |
3307 | | <tr> |
3308 | | <td valign="top">Title</td> |
3309 | | <td valign="top">Future Internet: Challenges in Virtualization and Federation</td> |
3310 | | </tr> |
3311 | | |
3312 | | <tr> |
3313 | | <td valign="top">Booktitle</td> |
3314 | | <td valign="top">2009 Fifth Advanced International Conference on Telecommunications</td> |
3315 | | </tr> |
3316 | | |
3317 | | <tr> |
3318 | | <td valign="top">Location</td> |
3319 | | <td valign="top">Venice/Mestre, Italy</td> |
3320 | | </tr> |
3321 | | |
3322 | | <tr> |
3323 | | <td valign="top">Publisher</td> |
3324 | | <td valign="top">IEEE</td> |
3325 | | </tr> |
3326 | | |
3327 | | <tr> |
3328 | | <td valign="top">Year</td> |
3329 | | <td valign="top">2009</td> |
3330 | | </tr> |
3331 | | |
3332 | | <tr> |
3333 | | <td valign="top">Abstract</td> |
3334 | | <td valign="top">Future Internet is a clean-slate research activity in the quest of new networking technologies to overcome the limits of the current Internet. In its experimental research, virtualization and federation are emerging as essential features, especially in the construction and operation of the testbeds. Moreover, they are believed to sustain as the fundamental features of the Future Internet itself. Visions and experiences on virtualization and federation are given by leading experts from US, EU, and Asia.</td> |
3335 | | </tr> |
3336 | | |
3337 | | |
3338 | | |
3339 | | <tr> |
3340 | | <td valign="top">DOI</td> |
3341 | | <td valign="top">10.1109/AICT.2009.8</td> |
3342 | | </tr> |
3343 | | |
3344 | | |
3345 | | |
3346 | | <tr> |
3347 | | <td valign="top">URL</td> |
3348 | | <td valign="top"><a href="http://dx.doi.org/10.1109/AICT.2009.8">http://dx.doi.org/10.1109/AICT.2009.8</a></td> |
3349 | | </tr> |
3350 | | |
3351 | | |
3352 | | </table></div><br><br> |
3353 | | |
3354 | | |
3355 | | |
3356 | | |
3357 | | <a class="EntryGoto" id="Kim, Hyunjun and Lee, Sungwon"></a> |
3358 | | <b class="myheading" style="position: relative; left: 5%;">Kim, Hyunjun and Lee, Sungwon</b> |
3359 | | |
3360 | | <div class="BibEntry"> |
3361 | | |
3362 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3363 | | |
3364 | | |
3365 | | <tr> |
3366 | | <td valign="top">Author</td> |
3367 | | <td valign="top">Kim, Hyunjun and Lee, Sungwon</td> |
3368 | | </tr> |
3369 | | |
3370 | | <tr> |
3371 | | <td valign="top">Title</td> |
3372 | | <td valign="top">FiRST Cloud Aggregate Manager development over FiRST: Future Internet testbed</td> |
3373 | | </tr> |
3374 | | |
3375 | | <tr> |
3376 | | <td valign="top">Booktitle</td> |
3377 | | <td valign="top">The International Conference on Information Network 2012</td> |
3378 | | </tr> |
3379 | | |
3380 | | <tr> |
3381 | | <td valign="top">Location</td> |
3382 | | <td valign="top">Bali, Indonesia</td> |
3383 | | </tr> |
3384 | | |
3385 | | <tr> |
3386 | | <td valign="top">Publisher</td> |
3387 | | <td valign="top">IEEE</td> |
3388 | | </tr> |
3389 | | |
3390 | | <tr> |
3391 | | <td valign="top">Year</td> |
3392 | | <td valign="top">2012</td> |
3393 | | </tr> |
3394 | | |
3395 | | <tr> |
3396 | | <td valign="top">Abstract</td> |
3397 | | <td valign="top">FiRST (Future Internet Research for Sustainable Test-bed) is the future internet platform development project being performed in Korea. The goal of the project is to create the virtualized and dynamic service creation environments over future internet networks; it is an experimental project to realize future innovative service ideas over real network environments. Among this, cloud computing is the key enabler to control and allocate virtualized network resources (such as CPU, storage, and virtualized network configuration) for the requested services. However, researches on interworking between future internet and cloud computing is in initial phase. In this paper, we propose the FiRST Cloud Aggregate Manager (AM) based on GENI (Global Environment for Network Innovation) AM Application Programming Interface (API) for the federation between future internet test-bed and open source OpenStack cloud computing platform. After that, we propose the zero-client service for mobile cloud management. In order to control the zero-client service, we develop Cloud Mobility Client/Server. And, we validate and verified our FiRST Cloud AM and zero-client service by developing experimental test-bed. Through this test-bed, we confirm that the proposed FiRST Cloud AM and zero-client service efficiently interworks with future internet control plane framework by using GENI Control Framework (GCF) tools.</td> |
3398 | | </tr> |
3399 | | |
3400 | | |
3401 | | |
3402 | | <tr> |
3403 | | <td valign="top">DOI</td> |
3404 | | <td valign="top">10.1109/ICOIN.2012.6164436</td> |
3405 | | </tr> |
3406 | | |
3407 | | |
3408 | | |
3409 | | <tr> |
3410 | | <td valign="top">URL</td> |
3411 | | <td valign="top"><a href="http://dx.doi.org/10.1109/ICOIN.2012.6164436">http://dx.doi.org/10.1109/ICOIN.2012.6164436</a></td> |
3412 | | </tr> |
3413 | | |
3414 | | |
3415 | | </table></div><br><br> |
3416 | | |
3417 | | |
3418 | | |
3419 | | |
3420 | | <a class="EntryGoto" id="Kline, Donald and Quan, John"></a> |
3421 | | <b class="myheading" style="position: relative; left: 5%;">Kline, Donald and Quan, John</b> |
3422 | | |
3423 | | <div class="BibEntry"> |
3424 | | |
3425 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3426 | | |
3427 | | |
3428 | | <tr> |
3429 | | <td valign="top">Author</td> |
3430 | | <td valign="top">Kline, Donald and Quan, John</td> |
3431 | | </tr> |
3432 | | |
3433 | | <tr> |
3434 | | <td valign="top">Title</td> |
3435 | | <td valign="top">Attribute description service for large-scale networks</td> |
3436 | | </tr> |
3437 | | |
3438 | | <tr> |
3439 | | <td valign="top">Booktitle</td> |
3440 | | <td valign="top">Proceedings of the 2nd international conference on Human centered design</td> |
3441 | | </tr> |
3442 | | |
3443 | | <tr> |
3444 | | <td valign="top">Location</td> |
3445 | | <td valign="top">Orlando, FL, USA</td> |
3446 | | </tr> |
3447 | | |
3448 | | <tr> |
3449 | | <td valign="top">Publisher</td> |
3450 | | <td valign="top">Springer-Verlag</td> |
3451 | | </tr> |
3452 | | |
3453 | | <tr> |
3454 | | <td valign="top">Address</td> |
3455 | | <td valign="top">Berlin, Heidelberg</td> |
3456 | | </tr> |
3457 | | |
3458 | | <tr> |
3459 | | <td valign="top">Year</td> |
3460 | | <td valign="top">2011</td> |
3461 | | </tr> |
3462 | | |
3463 | | <tr> |
3464 | | <td valign="top">Abstract</td> |
3465 | | <td valign="top">An analysis of requesting resources from large-scale networks reveals a fundamental challenge. As the network grows, more and more resources become available, and so finding resources that fit experimental test criteria becomes difficult and time consuming. For example, the National Science Foundation sponsors GENI--an experimental network with a goal to gain enough resources to model the Internet at scale. Currently, GENI contains relatively few contributed resources donated from businesses and academia, and so matching resources to tests is rather simple. However, experimenters plan to conduct network experiments that are very complex and difficult to accurately model by using the vast numbers of resources expected in GENI. When GENI reaches its final state, finding the right resources that fit experimental test criteria out of many thousands of donated resources may be as difficult as conducting the experiment itself. This dilemma underscores the importance of establishing an attribute description service that promotes a standardized language for all interactions between the end users and the large-scale network.</td> |
3466 | | </tr> |
3467 | | |
3468 | | |
3469 | | |
3470 | | <tr> |
3471 | | <td valign="top">DOI</td> |
3472 | | <td valign="top">10.1007/978-3-642-21753-1_58</td> |
3473 | | </tr> |
3474 | | |
3475 | | |
3476 | | |
3477 | | <tr> |
3478 | | <td valign="top">URL</td> |
3479 | | <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=2021672.2021735">http://portal.acm.org/citation.cfm?id=2021672.2021735</a></td> |
3480 | | </tr> |
3481 | | |
3482 | | |
3483 | | </table></div><br><br> |
3484 | | |
3485 | | |
3486 | | |
3487 | | |
3488 | | <a class="EntryGoto" id="Krishnappa, D. K. and Irwin, D. and Lyons, E. and Zink, M."></a> |
3489 | | <b class="myheading" style="position: relative; left: 5%;">Krishnappa, D. K. and Irwin, D. and Lyons, E. and Zink, M.</b> |
3490 | | |
3491 | | <div class="BibEntry"> |
3492 | | |
3493 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3494 | | |
3495 | | |
3496 | | <tr> |
3497 | | <td valign="top">Author</td> |
3498 | | <td valign="top">Krishnappa, D. K. and Irwin, D. and Lyons, E. and Zink, M.</td> |
3499 | | </tr> |
3500 | | |
3501 | | <tr> |
3502 | | <td valign="top">Title</td> |
3503 | | <td valign="top">CloudCast: Cloud Computing for Short-Term Weather Forecasts</td> |
3504 | | </tr> |
3505 | | |
3506 | | <tr> |
3507 | | <td valign="top">Journal</td> |
3508 | | <td valign="top">Computing in Science & Engineering</td> |
3509 | | </tr> |
3510 | | |
3511 | | <tr> |
3512 | | <td valign="top">Publisher</td> |
3513 | | <td valign="top">IEEE</td> |
3514 | | </tr> |
3515 | | |
3516 | | <tr> |
3517 | | <td valign="top">Year</td> |
3518 | | <td valign="top">2013</td> |
3519 | | </tr> |
3520 | | |
3521 | | <tr> |
3522 | | <td valign="top">Abstract</td> |
3523 | | <td valign="top">CloudCast provides personalized short-term weather forecasts to clients based on their current location using cloud services, generating accurate forecasts tens of minutes in the future for small areas. Results show that it takes less than two minutes from the start of data sampling to deliver a 15-minute forecast to a client.</td> |
3524 | | </tr> |
3525 | | |
3526 | | |
3527 | | |
3528 | | <tr> |
3529 | | <td valign="top">DOI</td> |
3530 | | <td valign="top">10.1109/mcse.2013.43</td> |
3531 | | </tr> |
3532 | | |
3533 | | |
3534 | | |
3535 | | <tr> |
3536 | | <td valign="top">URL</td> |
3537 | | <td valign="top"><a href="http://dx.doi.org/10.1109/mcse.2013.43">http://dx.doi.org/10.1109/mcse.2013.43</a></td> |
3538 | | </tr> |
3539 | | |
3540 | | |
3541 | | </table></div><br><br> |
3542 | | |
3543 | | |
3544 | | |
3545 | | |
3546 | | <a class="EntryGoto" id="Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael"></a> |
3547 | | <b class="myheading" style="position: relative; left: 5%;">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b> |
3548 | | |
3549 | | <div class="BibEntry"> |
3550 | | |
3551 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3552 | | |
3553 | | |
3554 | | <tr> |
3555 | | <td valign="top">Author</td> |
3556 | | <td valign="top">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</td> |
3557 | | </tr> |
3558 | | |
3559 | | <tr> |
3560 | | <td valign="top">Title</td> |
3561 | | <td valign="top">Performance of GENI Cloud Testbeds for Real Time Scientific Application</td> |
3562 | | </tr> |
3563 | | |
3564 | | <tr> |
3565 | | <td valign="top">Booktitle</td> |
3566 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
3567 | | </tr> |
3568 | | |
3569 | | <tr> |
3570 | | <td valign="top">Location</td> |
3571 | | <td valign="top">Los Angeles</td> |
3572 | | </tr> |
3573 | | |
3574 | | <tr> |
3575 | | <td valign="top">Year</td> |
3576 | | <td valign="top">2012</td> |
3577 | | </tr> |
3578 | | |
3579 | | <tr> |
3580 | | <td valign="top">Abstract</td> |
3581 | | <td valign="top">Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform.</td> |
3582 | | </tr> |
3583 | | |
3584 | | |
3585 | | |
3586 | | |
3587 | | |
3588 | | |
3589 | | </table></div><br><br> |
3590 | | |
3591 | | |
3592 | | <div class="BibEntry"> |
3593 | | |
3594 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3595 | | |
3596 | | |
3597 | | <tr> |
3598 | | <td valign="top">Author</td> |
3599 | | <td valign="top">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</td> |
3600 | | </tr> |
3601 | | |
3602 | | <tr> |
3603 | | <td valign="top">Title</td> |
3604 | | <td valign="top">Performance of GENI Cloud Testbeds for Real Time Scientific Application</td> |
3605 | | </tr> |
3606 | | |
3607 | | <tr> |
3608 | | <td valign="top">Booktitle</td> |
3609 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
3610 | | </tr> |
3611 | | |
3612 | | <tr> |
3613 | | <td valign="top">Location</td> |
3614 | | <td valign="top">Los Angeles</td> |
3615 | | </tr> |
3616 | | |
3617 | | <tr> |
3618 | | <td valign="top">Year</td> |
3619 | | <td valign="top">2012</td> |
3620 | | </tr> |
3621 | | |
3622 | | <tr> |
3623 | | <td valign="top">Abstract</td> |
3624 | | <td valign="top">Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform.</td> |
3625 | | </tr> |
3626 | | |
3627 | | |
3628 | | |
3629 | | |
3630 | | |
3631 | | |
3632 | | </table></div><br><br> |
3633 | | |
3634 | | |
3635 | | |
3636 | | |
3637 | | <a class="EntryGoto" id="Lee, Jae W."></a> |
3638 | | <b class="myheading" style="position: relative; left: 5%;">Lee, Jae W.</b> |
3639 | | |
3640 | | <div class="BibEntry"> |
3641 | | |
3642 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3643 | | |
3644 | | |
3645 | | <tr> |
3646 | | <td valign="top">Author</td> |
3647 | | <td valign="top">Lee, Jae W.</td> |
3648 | | </tr> |
3649 | | |
3650 | | <tr> |
3651 | | <td valign="top">Title</td> |
3652 | | <td valign="top">Towards a Common System Architecture for Dynamically Deploying Network Services in Routers and End Hosts</td> |
3653 | | </tr> |
3654 | | |
3655 | | <tr> |
3656 | | <td valign="top">Year</td> |
3657 | | <td valign="top">2012</td> |
3658 | | </tr> |
3659 | | |
3660 | | <tr> |
3661 | | <td valign="top">Abstract</td> |
3662 | | <td valign="top">The architectural simplicity of the core Internet is a double-edged sword. On the one hand, its agnostic nature paved the way for endless innovations of end-to-end applications. On the other hand, the inherent limitation of this simplicity makes it difficult to add new functions to the network core itself. This is exacerbated by the conservative tendency of commercial entities to l̈eave well-enough alone,̈ leading to the current situation often referred to as the ossification of the Internet. For decades, there has been practically no new functionality that has been added to the core Internet on a large scale. This thesis explores the possibility of enabling in-network services towards the goal of overcoming the ossification of the Internet. Our ultimate goal is to provide a common run-time environment supported by all Internet nodes and a wide-area deployment mechanism, so that network services can be freely installed, removed, and migrated among Internet nodes of all kinds–from a backbone router to a set-top box at home. In that vision of a future Internet, there is little difference between servers and routers for the purpose of running network services. Services can run anywhere on the Internet. Application service providers will have the freedom to choose the best place to run their code. This thesis presents NetServ, our first step to realize the vision of network services running anywhere on the Internet. NetServ is a node architecture for dynamically deploying in-network services on edge routers. Network functions and applications are implemented as software modules which can be deployed at any NetServ-enabled node on the Internet, subject to policy restrictions. The NetServ framework provides a common execution environment for service modules and the ability to dynamically install and remove the services without restarting the nodes. There are many challenges in designing such a system. The main contribution of this thesis lies in meeting those challenges. First, we recognize that the primary impetus for adopting new technologies is economics. To address the challenge of providing economic incentives for enabling in-network services, we demonstrate how NetServ can facilitate an economic alliance between content providers and ISPs. Using NetServ, content providers and the ISPs operating at the network edge (aka eyeball ISPs) can enter into a mutually beneficial economic relationship. ISPs make their NetServ-enabled edge routers available for hosting content providers' applications and contents. Content providers can operate closer to end users by deploying code modules on NetServ-enabled edge routers. We make our case by presenting NetServ applications which represent four concrete use cases. Second, our node architecture must support both traditional server applications and in-network packet processing applications since content providers' applications running on ISPs' routers will combine the traits of both. To address this challenge, NetServ framework can host a packet processing module that sits in the data path, a server module that uses the TCP/IP stack in the traditional way, or a combined module that does both. NetServ provides a unified runtime environment between routers and servers, taking us a step closer to the vision of the unified runtime available on all Internet nodes. Third, we must provide a fast and streamlined deployment mechanism. Content providers should be able to deploy their applications at any NetServ-enabled edge router on the Inter- net, given that they have proper authorizations. Moreover, in some application scenarios, content providers may not know the exact locations of the target routers. Content providers need a way to send a message to install or remove an application module towards a network destination, and have the NetServ-enabled routers located in the path catch and act on the message. To address this challenge, we adopted on-path signaling as the deployment mechanism for NetServ. A NetServ signaling message is sent in an IP packet towards a destination. The packet gets forwarded by IP routers as usual, but when it transits a NetServ-enabled router, the message gets intercepted and passed to the NetServ control layer. Fourth, a NetServ-enabled router must support the concurrent executions of multiple without restarting the nodes. There are many challenges in designing such a system. The main contribution of this thesis lies in meeting those challenges. First, we recognize that the primary impetus for adopting new technologies is economics. To address the challenge of providing economic incentives for enabling in-network services, we demonstrate how NetServ can facilitate an economic alliance between content providers and ISPs. Using NetServ, content providers and the ISPs operating at the network edge (aka eyeball ISPs) can enter into a mutually beneficial economic relationship. ISPs make their NetServ-enabled edge routers available for hosting content providers' applications and contents. Content providers can operate closer to end users by deploying code modules on NetServ-enabled edge routers. We make our case by presenting NetServ applications which represent four concrete use cases. Second, our node architecture must support both traditional server applications and in-network packet processing applications since content providers' applications running on ISPs' routers will combine the traits of both. To address this challenge, NetServ framework can host a packet processing module that sits in the data path, a server module that uses the TCP/IP stack in the traditional way, or a combined module that does both. NetServ provides a unified runtime environment between routers and servers, taking us a step closer to the vision of the unified runtime available on all Internet nodes. Third, we must provide a fast and streamlined deployment mechanism. Content providers should be able to deploy their applications at any NetServ-enabled edge router on the Internet, given that they have proper authorizations. Moreover, in some application scenarios, content providers may not know the exact locations of the target routers. Content providers need a way to send a message to install or remove an application module towards a network destination, and have the NetServ-enabled routers located in the path catch and act on the message. To address this challenge, we adopted on-path signaling as the deployment mechanism for NetServ. A NetServ signaling message is sent in an IP packet towards a destination. The packet gets forwarded by IP routers as usual, but when it transits a NetServ-enabled router, the message gets intercepted and passed to the NetServ control layer. Fourth, a NetServ-enabled router must support the concurrent executions of multiple content providers' applications. Each content provider's execution environment must be isolated from one another, and the resource usage of each must be controlled. To address the challenge of providing a robust multi-user execution environment, we chose to run NetServ modules in user space. This is in stark contrast to most programmable routers, which run service modules in kernel space for fast packet processing. Furthermore, NetServ modules are written in Java and run in Java Virtual Machines (JVMs). Our choice of user space execution and JVM allows us to leverage the decades of technology advances in operating systems, virtualization, and Java. Lastly, in order to host the services of a large number of content providers, NetServ must be able to scale beyond the single-box architecture. We address this challenge with the multi-box lateral expansion of NetServ using the OpenFlow forwarding engine. In this extended architecture, multiple NetServ nodes are attached to an OpenFlow switch, which provides a physically separate forwarding plane. The scalability of user services is no longer limited to a single NetServ box. Additionally, this thesis presents our prior work on improving service discovery in local and global networks. The service discovery work makes indirect contribution because the limitations of local and overlay networks encountered during those studies eventually led us to investigate in-network services, which resulted in NetServ. Specifically, we investigate the issues involved in bootstrapping large-scale structured overlay networks, present a tool to merge service announcements from multiple local networks, and propose an enhancement to structured overlay networks using link-local multicast.</td> |
3663 | | </tr> |
3664 | | |
3665 | | |
3666 | | |
3667 | | |
3668 | | |
3669 | | <tr> |
3670 | | <td valign="top">URL</td> |
3671 | | <td valign="top"><a href="http://academiccommons.columbia.edu/download/fedora_content/download/ac:147210/CONTENT/Lee_columbia_0054D_10773.pdf">http://academiccommons.columbia.edu/download/fedora_content/download/ac:147210/CONTENT/Lee_columbia_0054D_10773.pdf</a></td> |
3672 | | </tr> |
3673 | | |
3674 | | |
3675 | | </table></div><br><br> |
3676 | | |
3677 | | |
3678 | | |
3679 | | |
3680 | | <a class="EntryGoto" id="Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang"></a> |
3681 | | <b class="myheading" style="position: relative; left: 5%;">Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang</b> |
3682 | | |
3683 | | <div class="BibEntry"> |
3684 | | |
3685 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3686 | | |
3687 | | |
3688 | | <tr> |
3689 | | <td valign="top">Author</td> |
3690 | | <td valign="top">Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang</td> |
3691 | | </tr> |
3692 | | |
3693 | | <tr> |
3694 | | <td valign="top">Title</td> |
3695 | | <td valign="top">NetServ: Active Networking 2.0</td> |
3696 | | </tr> |
3697 | | |
3698 | | <tr> |
3699 | | <td valign="top">Booktitle</td> |
3700 | | <td valign="top">2011 IEEE International Conference on Communications Workshops (ICC)</td> |
3701 | | </tr> |
3702 | | |
3703 | | <tr> |
3704 | | <td valign="top">Location</td> |
3705 | | <td valign="top">Kyoto, Japan</td> |
3706 | | </tr> |
3707 | | |
3708 | | <tr> |
3709 | | <td valign="top">Publisher</td> |
3710 | | <td valign="top">IEEE</td> |
3711 | | </tr> |
3712 | | |
3713 | | <tr> |
3714 | | <td valign="top">Year</td> |
3715 | | <td valign="top">2011</td> |
3716 | | </tr> |
3717 | | |
3718 | | <tr> |
3719 | | <td valign="top">Abstract</td> |
3720 | | <td valign="top">We present NetServ, a node architecture for deploying in-network services in the next generation Internet. NetServ-enabled network nodes provide a common execution environment, where network services implemented as modules can be dynamically installed and removed. We demonstrate three such modules. MicroCDN is a dynamic content distribution network (CDN) service which implements a content caching strategy specific to a content provider. The NAT Keep-alive module offloads the processing of keep-alive messages from SIP servers. The Media Relay module allows any NetServ node to act as a media relay, eliminating the need to manage standalone relay servers. NetServ aims to revive the Active Networking vision. It was too far ahead of its time a decade ago, but we believe its time has finally arrived.</td> |
3721 | | </tr> |
3722 | | |
3723 | | |
3724 | | |
3725 | | <tr> |
3726 | | <td valign="top">DOI</td> |
3727 | | <td valign="top">10.1109/iccw.2011.5963554</td> |
3728 | | </tr> |
3729 | | |
3730 | | |
3731 | | |
3732 | | <tr> |
3733 | | <td valign="top">URL</td> |
3734 | | <td valign="top"><a href="http://dx.doi.org/10.1109/iccw.2011.5963554">http://dx.doi.org/10.1109/iccw.2011.5963554</a></td> |
3735 | | </tr> |
3736 | | |
3737 | | |
3738 | | </table></div><br><br> |
3739 | | |
3740 | | |
3741 | | |
3742 | | |
3743 | | <a class="EntryGoto" id="Lee, Ki S. and Wang, Han and Weatherspoon, Hakim"></a> |
3744 | | <b class="myheading" style="position: relative; left: 5%;">Lee, Ki S. and Wang, Han and Weatherspoon, Hakim</b> |
3745 | | |
3746 | | <div class="BibEntry"> |
3747 | | |
3748 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3749 | | |
3750 | | |
3751 | | <tr> |
3752 | | <td valign="top">Author</td> |
3753 | | <td valign="top">Lee, Ki S. and Wang, Han and Weatherspoon, Hakim</td> |
3754 | | </tr> |
3755 | | |
3756 | | <tr> |
3757 | | <td valign="top">Title</td> |
3758 | | <td valign="top">SoNIC: precise realtime software access and control of wired networks</td> |
3759 | | </tr> |
3760 | | |
3761 | | <tr> |
3762 | | <td valign="top">Booktitle</td> |
3763 | | <td valign="top">Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation</td> |
3764 | | </tr> |
3765 | | |
3766 | | <tr> |
3767 | | <td valign="top">Location</td> |
3768 | | <td valign="top">Lombard, IL</td> |
3769 | | </tr> |
3770 | | |
3771 | | <tr> |
3772 | | <td valign="top">Publisher</td> |
3773 | | <td valign="top">USENIX Association</td> |
3774 | | </tr> |
3775 | | |
3776 | | <tr> |
3777 | | <td valign="top">Address</td> |
3778 | | <td valign="top">Berkeley, CA, USA</td> |
3779 | | </tr> |
3780 | | |
3781 | | <tr> |
3782 | | <td valign="top">Year</td> |
3783 | | <td valign="top">2013</td> |
3784 | | </tr> |
3785 | | |
3786 | | |
3787 | | |
3788 | | |
3789 | | |
3790 | | <tr> |
3791 | | <td valign="top">URL</td> |
3792 | | <td valign="top"><a href="http://dl.acm.org/citation.cfm?id=2482626.2482648">http://dl.acm.org/citation.cfm?id=2482626.2482648</a></td> |
3793 | | </tr> |
3794 | | |
3795 | | |
3796 | | </table></div><br><br> |
3797 | | |
3798 | | |
3799 | | |
3800 | | |
3801 | | <a class="EntryGoto" id="Li, Dawei and Hong, Xiaoyan"></a> |
3802 | | <b class="myheading" style="position: relative; left: 5%;">Li, Dawei and Hong, Xiaoyan</b> |
3803 | | |
3804 | | <div class="BibEntry"> |
3805 | | |
3806 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3807 | | |
3808 | | |
3809 | | <tr> |
3810 | | <td valign="top">Author</td> |
3811 | | <td valign="top">Li, Dawei and Hong, Xiaoyan</td> |
3812 | | </tr> |
3813 | | |
3814 | | <tr> |
3815 | | <td valign="top">Title</td> |
3816 | | <td valign="top">Practical exploitation on system vulnerability of ProtoGENI</td> |
3817 | | </tr> |
3818 | | |
3819 | | <tr> |
3820 | | <td valign="top">Booktitle</td> |
3821 | | <td valign="top">Proceedings of the 49th Annual Southeast Regional Conference</td> |
3822 | | </tr> |
3823 | | |
3824 | | <tr> |
3825 | | <td valign="top">Location</td> |
3826 | | <td valign="top">Kennesaw, Georgia</td> |
3827 | | </tr> |
3828 | | |
3829 | | <tr> |
3830 | | <td valign="top">Publisher</td> |
3831 | | <td valign="top">ACM</td> |
3832 | | </tr> |
3833 | | |
3834 | | <tr> |
3835 | | <td valign="top">Address</td> |
3836 | | <td valign="top">New York, NY, USA</td> |
3837 | | </tr> |
3838 | | |
3839 | | <tr> |
3840 | | <td valign="top">Year</td> |
3841 | | <td valign="top">2011</td> |
3842 | | </tr> |
3843 | | |
3844 | | <tr> |
3845 | | <td valign="top">Abstract</td> |
3846 | | <td valign="top">Global Environment for Network Innovations (GENI) is a unique virtual laboratory for at-scale networking experimentation exploring future Internets. The successful development of GENI has to consider security problems from the design and prototyping stages. However, in many cases, system vulnerability cannot be found unless through real experimentation bearing purposeful and meaningful designs. In this paper, we introduce some of our efforts in exploring the security vulnerabilities in ProtoGENI, a prototype implementation and deployment of GENI. Our results show potential breach on security of GENI in terms of availability. We make suggestions on potential defense strategies in order to improve the ProtoGENI security and its development.</td> |
3847 | | </tr> |
3848 | | |
3849 | | |
3850 | | |
3851 | | <tr> |
3852 | | <td valign="top">DOI</td> |
3853 | | <td valign="top">10.1145/2016039.2016073</td> |
3854 | | </tr> |
3855 | | |
3856 | | |
3857 | | |
3858 | | <tr> |
3859 | | <td valign="top">URL</td> |
3860 | | <td valign="top"><a href="http://dx.doi.org/10.1145/2016039.2016073">http://dx.doi.org/10.1145/2016039.2016073</a></td> |
3861 | | </tr> |
3862 | | |
3863 | | |
3864 | | </table></div><br><br> |
3865 | | |
3866 | | |
3867 | | |
3868 | | |
3869 | | <a class="EntryGoto" id="Li, Dawei and Hong, Xiaoyan and Bowman, Jason"></a> |
3870 | | <b class="myheading" style="position: relative; left: 5%;">Li, Dawei and Hong, Xiaoyan and Bowman, Jason</b> |
3871 | | |
3872 | | <div class="BibEntry"> |
3873 | | |
3874 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3875 | | |
3876 | | |
3877 | | <tr> |
3878 | | <td valign="top">Author</td> |
3879 | | <td valign="top">Li, Dawei and Hong, Xiaoyan and Bowman, Jason</td> |
3880 | | </tr> |
3881 | | |
3882 | | <tr> |
3883 | | <td valign="top">Title</td> |
3884 | | <td valign="top">Evaluation of Security Vulnerabilities by Using ProtoGENI as a Launchpad</td> |
3885 | | </tr> |
3886 | | |
3887 | | <tr> |
3888 | | <td valign="top">Booktitle</td> |
3889 | | <td valign="top">IEEE Global Communications Conference (GLOBECOM 2011)</td> |
3890 | | </tr> |
3891 | | |
3892 | | <tr> |
3893 | | <td valign="top">Year</td> |
3894 | | <td valign="top">2011</td> |
3895 | | </tr> |
3896 | | |
3897 | | <tr> |
3898 | | <td valign="top">Abstract</td> |
3899 | | <td valign="top">In this paper we analyze the security architecture of ProtoGENI. ProtoGENI is a prototype control framework implementation of GENI (Global Environment for Network Innovations). We perform a variety of experiments in an effort to identify potential vulnerabilities presented in the current implementation. We classify our attacks into three types: data plane to data plane, data plane to control plane, and data plane to Internet. Our results indicate the potential for a breach of confidentiality and availability internally within ProtoGENI, as well as risks to external Internet. We make suggestions outlining possible defense strategies to improve ProtoGENI security and aid in future development</td> |
3900 | | </tr> |
3901 | | |
3902 | | |
3903 | | |
3904 | | |
3905 | | |
3906 | | <tr> |
3907 | | <td valign="top">URL</td> |
3908 | | <td valign="top"><a href="ftp://202.38.75.7/pub/%D0%C2%CE%C4%BC%FE%BC%D0%20(2)/DATA/PID1102190.PDF">ftp://202.38.75.7/pub/%D0%C2%CE%C4%BC%FE%BC%D0%20(2)/DATA/PID1102190.PDF</a></td> |
3909 | | </tr> |
3910 | | |
3911 | | |
3912 | | </table></div><br><br> |
3913 | | |
3914 | | |
3915 | | |
3916 | | |
3917 | | <a class="EntryGoto" id="Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason"></a> |
3918 | | <b class="myheading" style="position: relative; left: 5%;">Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason</b> |
3919 | | |
3920 | | <div class="BibEntry"> |
3921 | | |
3922 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3923 | | |
3924 | | |
3925 | | <tr> |
3926 | | <td valign="top">Author</td> |
3927 | | <td valign="top">Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason</td> |
3928 | | </tr> |
3929 | | |
3930 | | <tr> |
3931 | | <td valign="top">Title</td> |
3932 | | <td valign="top">Simulation studies of OpenFlow-based in-network caching strategies</td> |
3933 | | </tr> |
3934 | | |
3935 | | <tr> |
3936 | | <td valign="top">Booktitle</td> |
3937 | | <td valign="top">Proceedings of the 15th Communications and Networking Simulation Symposium</td> |
3938 | | </tr> |
3939 | | |
3940 | | <tr> |
3941 | | <td valign="top">Location</td> |
3942 | | <td valign="top">Orlando, Florida</td> |
3943 | | </tr> |
3944 | | |
3945 | | <tr> |
3946 | | <td valign="top">Publisher</td> |
3947 | | <td valign="top">Society for Computer Simulation International</td> |
3948 | | </tr> |
3949 | | |
3950 | | <tr> |
3951 | | <td valign="top">Address</td> |
3952 | | <td valign="top">San Diego, CA, USA</td> |
3953 | | </tr> |
3954 | | |
3955 | | <tr> |
3956 | | <td valign="top">Year</td> |
3957 | | <td valign="top">2012</td> |
3958 | | </tr> |
3959 | | |
3960 | | <tr> |
3961 | | <td valign="top">Abstract</td> |
3962 | | <td valign="top">We propose an in-network caching architecture using Open-Flow to coordinate caching decisions in the network. Our scheme, called CacheFlow, extends the cache-and-forward concept by moving contents closer to the clients hop-by-hop using TCP for sending requests and retrieving contents. As such, CacheFlow can be incrementally implemented and deployed in the real network. In this paper, we present a simulation study of several caching policies, including a random cache policy, a statically optimal cache placement policy and a new disk placement strategy that places popular contents at the c̈enter ̈of the network. Experimental results show that simple in-network caching policies can be realized using today's technology to improve network performance.</td> |
3963 | | </tr> |
3964 | | |
3965 | | |
3966 | | |
3967 | | |
3968 | | |
3969 | | <tr> |
3970 | | <td valign="top">URL</td> |
3971 | | <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=2331762.2331774">http://portal.acm.org/citation.cfm?id=2331762.2331774</a></td> |
3972 | | </tr> |
3973 | | |
3974 | | |
3975 | | </table></div><br><br> |
3976 | | |
3977 | | |
3978 | | |
3979 | | |
3980 | | <a class="EntryGoto" id="Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross"></a> |
3981 | | <b class="myheading" style="position: relative; left: 5%;">Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</b> |
3982 | | |
3983 | | <div class="BibEntry"> |
3984 | | |
3985 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
3986 | | |
3987 | | |
3988 | | <tr> |
3989 | | <td valign="top">Author</td> |
3990 | | <td valign="top">Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</td> |
3991 | | </tr> |
3992 | | |
3993 | | <tr> |
3994 | | <td valign="top">Title</td> |
3995 | | <td valign="top">Work-in-Progress: Empirical Verification of A Subset Sum Hypothesis in GENI Cloud</td> |
3996 | | </tr> |
3997 | | |
3998 | | <tr> |
3999 | | <td valign="top">Booktitle</td> |
4000 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
4001 | | </tr> |
4002 | | |
4003 | | <tr> |
4004 | | <td valign="top">Location</td> |
4005 | | <td valign="top">Los Angeles</td> |
4006 | | </tr> |
4007 | | |
4008 | | <tr> |
4009 | | <td valign="top">Year</td> |
4010 | | <td valign="top">2012</td> |
4011 | | </tr> |
4012 | | |
4013 | | |
4014 | | |
4015 | | |
4016 | | |
4017 | | |
4018 | | </table></div><br><br> |
4019 | | |
4020 | | |
4021 | | <div class="BibEntry"> |
4022 | | |
4023 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4024 | | |
4025 | | |
4026 | | <tr> |
4027 | | <td valign="top">Author</td> |
4028 | | <td valign="top">Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</td> |
4029 | | </tr> |
4030 | | |
4031 | | <tr> |
4032 | | <td valign="top">Title</td> |
4033 | | <td valign="top">Work-in-Progress: Empirical Verification of A Subset Sum Hypothesis in GENI Cloud</td> |
4034 | | </tr> |
4035 | | |
4036 | | <tr> |
4037 | | <td valign="top">Booktitle</td> |
4038 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
4039 | | </tr> |
4040 | | |
4041 | | <tr> |
4042 | | <td valign="top">Location</td> |
4043 | | <td valign="top">Los Angeles</td> |
4044 | | </tr> |
4045 | | |
4046 | | <tr> |
4047 | | <td valign="top">Year</td> |
4048 | | <td valign="top">2012</td> |
4049 | | </tr> |
4050 | | |
4051 | | |
4052 | | |
4053 | | |
4054 | | |
4055 | | |
4056 | | </table></div><br><br> |
4057 | | |
4058 | | |
4059 | | |
4060 | | |
4061 | | <a class="EntryGoto" id="Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi"></a> |
4062 | | <b class="myheading" style="position: relative; left: 5%;">Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</b> |
4063 | | |
4064 | | <div class="BibEntry"> |
4065 | | |
4066 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4067 | | |
4068 | | |
4069 | | <tr> |
4070 | | <td valign="top">Author</td> |
4071 | | <td valign="top">Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</td> |
4072 | | </tr> |
4073 | | |
4074 | | <tr> |
4075 | | <td valign="top">Title</td> |
4076 | | <td valign="top">Assessment of Router Vulnerabilities on PlanetLab Infrastructure for Secure Cloud Computing</td> |
4077 | | </tr> |
4078 | | |
4079 | | <tr> |
4080 | | <td valign="top">Booktitle</td> |
4081 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
4082 | | </tr> |
4083 | | |
4084 | | <tr> |
4085 | | <td valign="top">Location</td> |
4086 | | <td valign="top">Los Angeles</td> |
4087 | | </tr> |
4088 | | |
4089 | | <tr> |
4090 | | <td valign="top">Year</td> |
4091 | | <td valign="top">2012</td> |
4092 | | </tr> |
4093 | | |
4094 | | <tr> |
4095 | | <td valign="top">Abstract</td> |
4096 | | <td valign="top">In recent times, the cloud computing based delivery model has been proven to reduce enterprise IT costs and complexities. In contrast to traditional enterprise IT solutions, the cloud computing model moves the application software and data to remote servers in large datacenters, which raises many security challenges. One of the critical challenges is the inability to characterize the impact of the vulnerabilities of routers on the cloud security and performance guarantees. In this paper, we analyze the degree of security provided by routers to data sharing applications deployed in cloud environments that span administrative and network domains. Our analysis is based on examining the security level of network applications on routers which lie between nodes on Planetlab infrastructure. We assume that some of the PlanetLab nodes will share the same wide area network path as the cloud servers. Our preliminary results confirm that the majority of the routers are plagued by insecure network protocols, leading to vulnerable routers. These results confirm our hypothesis that the security of the network infrastructure needs to be upgraded to assure the protection of information exchanged on the wide area network path.</td> |
4097 | | </tr> |
4098 | | |
4099 | | |
4100 | | |
4101 | | |
4102 | | |
4103 | | |
4104 | | </table></div><br><br> |
4105 | | |
4106 | | |
4107 | | <div class="BibEntry"> |
4108 | | |
4109 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4110 | | |
4111 | | |
4112 | | <tr> |
4113 | | <td valign="top">Author</td> |
4114 | | <td valign="top">Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</td> |
4115 | | </tr> |
4116 | | |
4117 | | <tr> |
4118 | | <td valign="top">Title</td> |
4119 | | <td valign="top">Assessment of Router Vulnerabilities on PlanetLab Infrastructure for Secure Cloud Computing</td> |
4120 | | </tr> |
4121 | | |
4122 | | <tr> |
4123 | | <td valign="top">Booktitle</td> |
4124 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
4125 | | </tr> |
4126 | | |
4127 | | <tr> |
4128 | | <td valign="top">Location</td> |
4129 | | <td valign="top">Los Angeles</td> |
4130 | | </tr> |
4131 | | |
4132 | | <tr> |
4133 | | <td valign="top">Year</td> |
4134 | | <td valign="top">2012</td> |
4135 | | </tr> |
4136 | | |
4137 | | <tr> |
4138 | | <td valign="top">Abstract</td> |
4139 | | <td valign="top">In recent times, the cloud computing based delivery model has been proven to reduce enterprise IT costs and complexities. In contrast to traditional enterprise IT solutions, the cloud computing model moves the application software and data to remote servers in large datacenters, which raises many security challenges. One of the critical challenges is the inability to characterize the impact of the vulnerabilities of routers on the cloud security and performance guarantees. In this paper, we analyze the degree of security provided by routers to data sharing applications deployed in cloud environments that span administrative and network domains. Our analysis is based on examining the security level of network applications on routers which lie between nodes on Planetlab infrastructure. We assume that some of the PlanetLab nodes will share the same wide area network path as the cloud servers. Our preliminary results confirm that the majority of the routers are plagued by insecure network protocols, leading to vulnerable routers. These results confirm our hypothesis that the security of the network infrastructure needs to be upgraded to assure the protection of information exchanged on the wide area network path.</td> |
4140 | | </tr> |
4141 | | |
4142 | | |
4143 | | |
4144 | | |
4145 | | |
4146 | | |
4147 | | </table></div><br><br> |
4148 | | |
4149 | | |
4150 | | |
4151 | | |
4152 | | <a class="EntryGoto" id="Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H."></a> |
4153 | | <b class="myheading" style="position: relative; left: 5%;">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</b> |
4154 | | |
4155 | | <div class="BibEntry"> |
4156 | | |
4157 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4158 | | |
4159 | | |
4160 | | <tr> |
4161 | | <td valign="top">Author</td> |
4162 | | <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td> |
4163 | | </tr> |
4164 | | |
4165 | | <tr> |
4166 | | <td valign="top">Title</td> |
4167 | | <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td> |
4168 | | </tr> |
4169 | | |
4170 | | <tr> |
4171 | | <td valign="top">Booktitle</td> |
4172 | | <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td> |
4173 | | </tr> |
4174 | | |
4175 | | <tr> |
4176 | | <td valign="top">Year</td> |
4177 | | <td valign="top">2012</td> |
4178 | | </tr> |
4179 | | |
4180 | | |
4181 | | |
4182 | | <tr> |
4183 | | <td valign="top">DOI</td> |
4184 | | <td valign="top">10.1109/NOMS.2012.6211961</td> |
4185 | | </tr> |
4186 | | |
4187 | | |
4188 | | |
4189 | | <tr> |
4190 | | <td valign="top">URL</td> |
4191 | | <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td> |
4192 | | </tr> |
4193 | | |
4194 | | |
4195 | | </table></div><br><br> |
4196 | | |
4197 | | |
4198 | | <div class="BibEntry"> |
4199 | | |
4200 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4201 | | |
4202 | | |
4203 | | <tr> |
4204 | | <td valign="top">Author</td> |
4205 | | <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td> |
4206 | | </tr> |
4207 | | |
4208 | | <tr> |
4209 | | <td valign="top">Title</td> |
4210 | | <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td> |
4211 | | </tr> |
4212 | | |
4213 | | <tr> |
4214 | | <td valign="top">Booktitle</td> |
4215 | | <td valign="top">2012 IEEE Network Operations and Management Symposium</td> |
4216 | | </tr> |
4217 | | |
4218 | | <tr> |
4219 | | <td valign="top">Location</td> |
4220 | | <td valign="top">Maui, HI</td> |
4221 | | </tr> |
4222 | | |
4223 | | <tr> |
4224 | | <td valign="top">Publisher</td> |
4225 | | <td valign="top">IEEE</td> |
4226 | | </tr> |
4227 | | |
4228 | | <tr> |
4229 | | <td valign="top">Year</td> |
4230 | | <td valign="top">2012</td> |
4231 | | </tr> |
4232 | | |
4233 | | <tr> |
4234 | | <td valign="top">Abstract</td> |
4235 | | <td valign="top">Autonomic management capabilities of the Future Internet can be provided through a recently proposed service architecture called NetServ. It consists of the interconnection of programmable nodes which enable dynamic deployment and execution of network and application services. This paper shows how this architecture can be further improved by introducing the OpenFlow architecture and implementing the OpenFlow controller as a NetServ service, thus improving both the NetServ management performance and its flexibility. These achievements are demonstrated experimentally on the GENI environment, showing the platform self-protecting capabilities in case of a SIP DoS attack.</td> |
4236 | | </tr> |
4237 | | |
4238 | | |
4239 | | |
4240 | | <tr> |
4241 | | <td valign="top">DOI</td> |
4242 | | <td valign="top">10.1109/NOMS.2012.6211961</td> |
4243 | | </tr> |
4244 | | |
4245 | | |
4246 | | |
4247 | | <tr> |
4248 | | <td valign="top">URL</td> |
4249 | | <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td> |
4250 | | </tr> |
4251 | | |
4252 | | |
4253 | | </table></div><br><br> |
4254 | | |
4255 | | |
4256 | | |
4257 | | |
4258 | | <a class="EntryGoto" id="Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y."></a> |
4259 | | <b class="myheading" style="position: relative; left: 5%;">Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y.</b> |
4260 | | |
4261 | | <div class="BibEntry"> |
4262 | | |
4263 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4264 | | |
4265 | | |
4266 | | <tr> |
4267 | | <td valign="top">Author</td> |
4268 | | <td valign="top">Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y.</td> |
4269 | | </tr> |
4270 | | |
4271 | | <tr> |
4272 | | <td valign="top">Title</td> |
4273 | | <td valign="top">Space Versus Time Separation for Wireless Virtualization on an Indoor Grid</td> |
4274 | | </tr> |
4275 | | |
4276 | | <tr> |
4277 | | <td valign="top">Booktitle</td> |
4278 | | <td valign="top">Next Generation Internet Networks, 2008. NGI 2008</td> |
4279 | | </tr> |
4280 | | |
4281 | | <tr> |
4282 | | <td valign="top">Publisher</td> |
4283 | | <td valign="top">IEEE</td> |
4284 | | </tr> |
4285 | | |
4286 | | <tr> |
4287 | | <td valign="top">Year</td> |
4288 | | <td valign="top">2008</td> |
4289 | | </tr> |
4290 | | |
4291 | | <tr> |
4292 | | <td valign="top">Abstract</td> |
4293 | | <td valign="top">The decreasing cost of wireless hardware and ever increasing number of wireless testbeds has led to a shift in the protocol evaluation paradigm from simulations towards emulation. In addition, with a large number of users demanding experimental resources and lack of space and time for deploying more hardware, fair resource sharing among independent co-existing experiments is important. We study the proposed approaches to wireless virtualization with a focus on schemes conserving wireless channels rather than nodes. Our detailed comparison reveals that while experiments sharing a channel by space separation achieve better efficiency than those relying on time separation of a channel, the isolation between experiments in both cases is comparable. We propose and implement a policy manager to alleviate the isolation problem and suggest scenarios in which either of the schemes would provide a suitable virtualization solution.</td> |
4294 | | </tr> |
4295 | | |
4296 | | |
4297 | | |
4298 | | <tr> |
4299 | | <td valign="top">DOI</td> |
4300 | | <td valign="top">10.1109/NGI.2008.36</td> |
4301 | | </tr> |
4302 | | |
4303 | | |
4304 | | |
4305 | | <tr> |
4306 | | <td valign="top">URL</td> |
4307 | | <td valign="top"><a href="http://dx.doi.org/10.1109/NGI.2008.36">http://dx.doi.org/10.1109/NGI.2008.36</a></td> |
4308 | | </tr> |
4309 | | |
4310 | | |
4311 | | </table></div><br><br> |
4312 | | |
4313 | | |
4314 | | |
4315 | | |
4316 | | <a class="EntryGoto" id="Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D."></a> |
4317 | | <b class="myheading" style="position: relative; left: 5%;">Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D.</b> |
4318 | | |
4319 | | <div class="BibEntry"> |
4320 | | |
4321 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4322 | | |
4323 | | |
4324 | | <tr> |
4325 | | <td valign="top">Author</td> |
4326 | | <td valign="top">Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D.</td> |
4327 | | </tr> |
4328 | | |
4329 | | <tr> |
4330 | | <td valign="top">Title</td> |
4331 | | <td valign="top">Integration of heterogeneous networking testbeds</td> |
4332 | | </tr> |
4333 | | |
4334 | | <tr> |
4335 | | <td valign="top">Booktitle</td> |
4336 | | <td valign="top">Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities</td> |
4337 | | </tr> |
4338 | | |
4339 | | <tr> |
4340 | | <td valign="top">Location</td> |
4341 | | <td valign="top">Innsbruck, Austria</td> |
4342 | | </tr> |
4343 | | |
4344 | | <tr> |
4345 | | <td valign="top">Publisher</td> |
4346 | | <td valign="top">ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)</td> |
4347 | | </tr> |
4348 | | |
4349 | | <tr> |
4350 | | <td valign="top">Address</td> |
4351 | | <td valign="top">ICST, Brussels, Belgium, Belgium</td> |
4352 | | </tr> |
4353 | | |
4354 | | <tr> |
4355 | | <td valign="top">Year</td> |
4356 | | <td valign="top">2008</td> |
4357 | | </tr> |
4358 | | |
4359 | | <tr> |
4360 | | <td valign="top">Abstract</td> |
4361 | | <td valign="top">As networking research expands into new frontiers, the research community has felt a need for a heterogeneous networking research infrastructure to experiment with the interaction and integration of different types of networks, and to test the performance of various networking protocols in realistic environments. This requirement has led to the Global Environment for Network Innovations (GENI) initiative to create a global infrastructure for conducting networking experiments across diverse substrates such as wired (local and wide-area), wireless, sensor and cellular networks. In this paper, we discuss and present two models for building such an experimental infrastructure. The first model enables a wired testbed to link with wireless edge nodes during an experiment, whereas the second model enables a wireless testbed to link to wired testbeds. Proof-of-concept experiments are also presented reinforcing the usefulness of the models in terms of facilitating experiments over the integrated heterogeneous infrastructure.</td> |
4362 | | </tr> |
4363 | | |
4364 | | |
4365 | | |
4366 | | |
4367 | | |
4368 | | <tr> |
4369 | | <td valign="top">URL</td> |
4370 | | <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=1390609">http://portal.acm.org/citation.cfm?id=1390609</a></td> |
4371 | | </tr> |
4372 | | |
4373 | | |
4374 | | </table></div><br><br> |
4375 | | |
4376 | | |
4377 | | |
4378 | | |
4379 | | <a class="EntryGoto" id="Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I."></a> |
4380 | | <b class="myheading" style="position: relative; left: 5%;">Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I.</b> |
4381 | | |
4382 | | <div class="BibEntry"> |
4383 | | |
4384 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4385 | | |
4386 | | |
4387 | | <tr> |
4388 | | <td valign="top">Author</td> |
4389 | | <td valign="top">Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I.</td> |
4390 | | </tr> |
4391 | | |
4392 | | <tr> |
4393 | | <td valign="top">Title</td> |
4394 | | <td valign="top">Enabling Wide Area Single System Image Experimentation on the GENI Platform</td> |
4395 | | </tr> |
4396 | | |
4397 | | <tr> |
4398 | | <td valign="top">Booktitle</td> |
4399 | | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
4400 | | </tr> |
4401 | | |
4402 | | <tr> |
4403 | | <td valign="top">Location</td> |
4404 | | <td valign="top">Salt Lake City, UT</td> |
4405 | | </tr> |
4406 | | |
4407 | | <tr> |
4408 | | <td valign="top">Publisher</td> |
4409 | | <td valign="top">IEEE</td> |
4410 | | </tr> |
4411 | | |
4412 | | <tr> |
4413 | | <td valign="top">Year</td> |
4414 | | <td valign="top">2013</td> |
4415 | | </tr> |
4416 | | |
4417 | | |
4418 | | |
4419 | | <tr> |
4420 | | <td valign="top">DOI</td> |
4421 | | <td valign="top">10.1109/GREE.2013.27</td> |
4422 | | </tr> |
4423 | | |
4424 | | |
4425 | | |
4426 | | <tr> |
4427 | | <td valign="top">URL</td> |
4428 | | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.27">http://dx.doi.org/10.1109/GREE.2013.27</a></td> |
4429 | | </tr> |
4430 | | |
4431 | | |
4432 | | </table></div><br><br> |
4433 | | |
4434 | | |
4435 | | |
4436 | | |
4437 | | <a class="EntryGoto" id="Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming"></a> |
4438 | | <b class="myheading" style="position: relative; left: 5%;">Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</b> |
4439 | | |
4440 | | <div class="BibEntry"> |
4441 | | |
4442 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4443 | | |
4444 | | |
4445 | | <tr> |
4446 | | <td valign="top">Author</td> |
4447 | | <td valign="top">Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</td> |
4448 | | </tr> |
4449 | | |
4450 | | <tr> |
4451 | | <td valign="top">Title</td> |
4452 | | <td valign="top">Socially Aware Single System Images</td> |
4453 | | </tr> |
4454 | | |
4455 | | <tr> |
4456 | | <td valign="top">Booktitle</td> |
4457 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
4458 | | </tr> |
4459 | | |
4460 | | <tr> |
4461 | | <td valign="top">Location</td> |
4462 | | <td valign="top">Los Angeles</td> |
4463 | | </tr> |
4464 | | |
4465 | | <tr> |
4466 | | <td valign="top">Year</td> |
4467 | | <td valign="top">2012</td> |
4468 | | </tr> |
4469 | | |
4470 | | <tr> |
4471 | | <td valign="top">Abstract</td> |
4472 | | <td valign="top">Cloud computing enables users to get access to huge amounts of computing resources as desired. There are many popular commercial cloud service providers which provide resources to users at a price. These providers can not be trusted as far as privacy of data is concerned. On the other hand, people do trust their close friends, relatives and other social contacts, albeit, to varying degrees. This paper reports the work-in-progress on S3I(Socially Aware Single System Images) which allows users to form computing clusters using resources owned by their social contacts. It tries to utilize the trust found between people in real life and translate it to provide trustworthy resource sharing between them.</td> |
4473 | | </tr> |
4474 | | |
4475 | | |
4476 | | |
4477 | | |
4478 | | |
4479 | | |
4480 | | </table></div><br><br> |
4481 | | |
4482 | | |
4483 | | <div class="BibEntry"> |
4484 | | |
4485 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4486 | | |
4487 | | |
4488 | | <tr> |
4489 | | <td valign="top">Author</td> |
4490 | | <td valign="top">Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</td> |
4491 | | </tr> |
4492 | | |
4493 | | <tr> |
4494 | | <td valign="top">Title</td> |
4495 | | <td valign="top">Socially Aware Single System Images</td> |
4496 | | </tr> |
4497 | | |
4498 | | <tr> |
4499 | | <td valign="top">Booktitle</td> |
4500 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
4501 | | </tr> |
4502 | | |
4503 | | <tr> |
4504 | | <td valign="top">Location</td> |
4505 | | <td valign="top">Los Angeles</td> |
4506 | | </tr> |
4507 | | |
4508 | | <tr> |
4509 | | <td valign="top">Year</td> |
4510 | | <td valign="top">2012</td> |
4511 | | </tr> |
4512 | | |
4513 | | <tr> |
4514 | | <td valign="top">Abstract</td> |
4515 | | <td valign="top">Cloud computing enables users to get access to huge amounts of computing resources as desired. There are many popular commercial cloud service providers which provide resources to users at a price. These providers can not be trusted as far as privacy of data is concerned. On the other hand, people do trust their close friends, relatives and other social contacts, albeit, to varying degrees. This paper reports the work-in-progress on S3I(Socially Aware Single System Images) which allows users to form computing clusters using resources owned by their social contacts. It tries to utilize the trust found between people in real life and translate it to provide trustworthy resource sharing between them.</td> |
4516 | | </tr> |
4517 | | |
4518 | | |
4519 | | |
4520 | | |
4521 | | |
4522 | | |
4523 | | </table></div><br><br> |
4524 | | |
4525 | | |
4526 | | |
4527 | | |
4528 | | <a class="EntryGoto" id="Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil"></a> |
4529 | | <b class="myheading" style="position: relative; left: 5%;">Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil</b> |
4530 | | |
4531 | | <div class="BibEntry"> |
4532 | | |
4533 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4534 | | |
4535 | | |
4536 | | <tr> |
4537 | | <td valign="top">Author</td> |
4538 | | <td valign="top">Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil</td> |
4539 | | </tr> |
4540 | | |
4541 | | <tr> |
4542 | | <td valign="top">Title</td> |
4543 | | <td valign="top">WiMAX in the Classroom: Designing a Cellular Networking Hands-on Lab</td> |
4544 | | </tr> |
4545 | | |
4546 | | <tr> |
4547 | | <td valign="top">Booktitle</td> |
4548 | | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
4549 | | </tr> |
4550 | | |
4551 | | <tr> |
4552 | | <td valign="top">Location</td> |
4553 | | <td valign="top">Salt Lake City, UT</td> |
4554 | | </tr> |
4555 | | |
4556 | | <tr> |
4557 | | <td valign="top">Publisher</td> |
4558 | | <td valign="top">IEEE</td> |
4559 | | </tr> |
4560 | | |
4561 | | <tr> |
4562 | | <td valign="top">Year</td> |
4563 | | <td valign="top">2013</td> |
4564 | | </tr> |
4565 | | |
4566 | | |
4567 | | |
4568 | | <tr> |
4569 | | <td valign="top">DOI</td> |
4570 | | <td valign="top">10.1109/GREE.2013.29</td> |
4571 | | </tr> |
4572 | | |
4573 | | |
4574 | | |
4575 | | <tr> |
4576 | | <td valign="top">URL</td> |
4577 | | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.29">http://dx.doi.org/10.1109/GREE.2013.29</a></td> |
4578 | | </tr> |
4579 | | |
4580 | | |
4581 | | </table></div><br><br> |
4582 | | |
4583 | | |
4584 | | |
4585 | | |
4586 | | <a class="EntryGoto" id="Maziku, Hellen and Shetty, Sachin and Rogers, Tamara"></a> |
4587 | | <b class="myheading" style="position: relative; left: 5%;">Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</b> |
4588 | | |
4589 | | <div class="BibEntry"> |
4590 | | |
4591 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4592 | | |
4593 | | |
4594 | | <tr> |
4595 | | <td valign="top">Author</td> |
4596 | | <td valign="top">Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</td> |
4597 | | </tr> |
4598 | | |
4599 | | <tr> |
4600 | | <td valign="top">Title</td> |
4601 | | <td valign="top">Measurement-based IP Geolocation of Routers on Planetlab Infrastructure</td> |
4602 | | </tr> |
4603 | | |
4604 | | <tr> |
4605 | | <td valign="top">Booktitle</td> |
4606 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
4607 | | </tr> |
4608 | | |
4609 | | <tr> |
4610 | | <td valign="top">Location</td> |
4611 | | <td valign="top">Los Angeles</td> |
4612 | | </tr> |
4613 | | |
4614 | | <tr> |
4615 | | <td valign="top">Year</td> |
4616 | | <td valign="top">2012</td> |
4617 | | </tr> |
4618 | | |
4619 | | <tr> |
4620 | | <td valign="top">Abstract</td> |
4621 | | <td valign="top">Location aware applications can benefit from a more accurate yet robust IP geolocation framework. Various approaches to IP geolocation have been well documented. The most recent approach casts IP geolocation as a machine learn- ing classification problem. This approach makes it possible to incorporate both delay and non delay based information. The accuracy of IP geolocation can be improved by incorporating additional types of geolocation information rather relying on network delay alone. To enhance the classification accuracy of the existing classification framework, we expand it to include 6 features (3 of which are novel). We use PlanetLab as a testbed to generate our measurement set. We select 67 PlanetLab nodes within the United States with known geographic location as our landmarks. We test the accuracy of our framework on 23,843 routers given ping measurements from the 67 landmarks. With only three features (average delay, average hops and population density) tested, our new classifier gives a reduced average error distance of 157.81 miles and a median error distance of 0 miles, compared to the present classifier that gives an average error distance of 253.34 miles. This is very promising as we move on to the next phase of incorporating data for the remaining 5 features. To the best of our knowledge, this is the first proposed framework that aims to improve the accuracy of the present classifier based IP geolocation.</td> |
4622 | | </tr> |
4623 | | |
4624 | | |
4625 | | |
4626 | | |
4627 | | |
4628 | | |
4629 | | </table></div><br><br> |
4630 | | |
4631 | | |
4632 | | <div class="BibEntry"> |
4633 | | |
4634 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4635 | | |
4636 | | |
4637 | | <tr> |
4638 | | <td valign="top">Author</td> |
4639 | | <td valign="top">Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</td> |
4640 | | </tr> |
4641 | | |
4642 | | <tr> |
4643 | | <td valign="top">Title</td> |
4644 | | <td valign="top">Measurement-based IP Geolocation of Routers on Planetlab Infrastructure</td> |
4645 | | </tr> |
4646 | | |
4647 | | <tr> |
4648 | | <td valign="top">Booktitle</td> |
4649 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
4650 | | </tr> |
4651 | | |
4652 | | <tr> |
4653 | | <td valign="top">Location</td> |
4654 | | <td valign="top">Los Angeles</td> |
4655 | | </tr> |
4656 | | |
4657 | | <tr> |
4658 | | <td valign="top">Year</td> |
4659 | | <td valign="top">2012</td> |
4660 | | </tr> |
4661 | | |
4662 | | <tr> |
4663 | | <td valign="top">Abstract</td> |
4664 | | <td valign="top">Location aware applications can benefit from a more accurate yet robust IP geolocation framework. Various approaches to IP geolocation have been well documented. The most recent approach casts IP geolocation as a machine learn- ing classification problem. This approach makes it possible to incorporate both delay and non delay based information. The accuracy of IP geolocation can be improved by incorporating additional types of geolocation information rather relying on network delay alone. To enhance the classification accuracy of the existing classification framework, we expand it to include 6 features (3 of which are novel). We use PlanetLab as a testbed to generate our measurement set. We select 67 PlanetLab nodes within the United States with known geographic location as our landmarks. We test the accuracy of our framework on 23,843 routers given ping measurements from the 67 landmarks. With only three features (average delay, average hops and population density) tested, our new classifier gives a reduced average error distance of 157.81 miles and a median error distance of 0 miles, compared to the present classifier that gives an average error distance of 253.34 miles. This is very promising as we move on to the next phase of incorporating data for the remaining 5 features. To the best of our knowledge, this is the first proposed framework that aims to improve the accuracy of the present classifier based IP geolocation.</td> |
4665 | | </tr> |
4666 | | |
4667 | | |
4668 | | |
4669 | | |
4670 | | |
4671 | | |
4672 | | </table></div><br><br> |
4673 | | |
4674 | | |
4675 | | |
4676 | | |
4677 | | <a class="EntryGoto" id="McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan"></a> |
4678 | | <b class="myheading" style="position: relative; left: 5%;">McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan</b> |
4679 | | |
4680 | | <div class="BibEntry"> |
4681 | | |
4682 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4683 | | |
4684 | | |
4685 | | <tr> |
4686 | | <td valign="top">Author</td> |
4687 | | <td valign="top">McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan</td> |
4688 | | </tr> |
4689 | | |
4690 | | <tr> |
4691 | | <td valign="top">Title</td> |
4692 | | <td valign="top">OpenFlow: enabling innovation in campus networks</td> |
4693 | | </tr> |
4694 | | |
4695 | | <tr> |
4696 | | <td valign="top">Journal</td> |
4697 | | <td valign="top">SIGCOMM Comput. Commun. Rev.</td> |
4698 | | </tr> |
4699 | | |
4700 | | <tr> |
4701 | | <td valign="top">Publisher</td> |
4702 | | <td valign="top">ACM</td> |
4703 | | </tr> |
4704 | | |
4705 | | <tr> |
4706 | | <td valign="top">Address</td> |
4707 | | <td valign="top">New York, NY, USA</td> |
4708 | | </tr> |
4709 | | |
4710 | | <tr> |
4711 | | <td valign="top">Year</td> |
4712 | | <td valign="top">2008</td> |
4713 | | </tr> |
4714 | | |
4715 | | |
4716 | | |
4717 | | <tr> |
4718 | | <td valign="top">DOI</td> |
4719 | | <td valign="top">10.1145/1355734.1355746</td> |
4720 | | </tr> |
4721 | | |
4722 | | |
4723 | | |
4724 | | <tr> |
4725 | | <td valign="top">URL</td> |
4726 | | <td valign="top"><a href="http://doi.acm.org/10.1145/1355734.1355746">http://doi.acm.org/10.1145/1355734.1355746</a></td> |
4727 | | </tr> |
4728 | | |
4729 | | |
4730 | | </table></div><br><br> |
4731 | | |
4732 | | |
4733 | | |
4734 | | |
4735 | | <a class="EntryGoto" id="Mitroff, Sarah"></a> |
4736 | | <b class="myheading" style="position: relative; left: 5%;">Mitroff, Sarah</b> |
4737 | | |
4738 | | <div class="BibEntry"> |
4739 | | |
4740 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4741 | | |
4742 | | |
4743 | | <tr> |
4744 | | <td valign="top">Author</td> |
4745 | | <td valign="top">Mitroff, Sarah</td> |
4746 | | </tr> |
4747 | | |
4748 | | <tr> |
4749 | | <td valign="top">Title</td> |
4750 | | <td valign="top">Lawrence Landweber Helped Build Today's Internet, Now He's Advising Its Future</td> |
4751 | | </tr> |
4752 | | |
4753 | | <tr> |
4754 | | <td valign="top">Journal</td> |
4755 | | <td valign="top">Wired</td> |
4756 | | </tr> |
4757 | | |
4758 | | <tr> |
4759 | | <td valign="top">Year</td> |
4760 | | <td valign="top">2012</td> |
4761 | | </tr> |
4762 | | |
4763 | | |
4764 | | |
4765 | | |
4766 | | |
4767 | | <tr> |
4768 | | <td valign="top">URL</td> |
4769 | | <td valign="top"><a href="http://www.wired.com/business/2012/08/lawrence-landweber/">http://www.wired.com/business/2012/08/lawrence-landweber/</a></td> |
4770 | | </tr> |
4771 | | |
4772 | | |
4773 | | </table></div><br><br> |
4774 | | |
4775 | | |
4776 | | |
4777 | | |
4778 | | <a class="EntryGoto" id="Muhammad, Monzur and Cappos, Justin"></a> |
4779 | | <b class="myheading" style="position: relative; left: 5%;">Muhammad, Monzur and Cappos, Justin</b> |
4780 | | |
4781 | | <div class="BibEntry"> |
4782 | | |
4783 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4784 | | |
4785 | | |
4786 | | <tr> |
4787 | | <td valign="top">Author</td> |
4788 | | <td valign="top">Muhammad, Monzur and Cappos, Justin</td> |
4789 | | </tr> |
4790 | | |
4791 | | <tr> |
4792 | | <td valign="top">Title</td> |
4793 | | <td valign="top">Towards a Representive Testbed: Harnessing Volunteers for Networks Research</td> |
4794 | | </tr> |
4795 | | |
4796 | | <tr> |
4797 | | <td valign="top">Booktitle</td> |
4798 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
4799 | | </tr> |
4800 | | |
4801 | | <tr> |
4802 | | <td valign="top">Location</td> |
4803 | | <td valign="top">Los Angeles</td> |
4804 | | </tr> |
4805 | | |
4806 | | <tr> |
4807 | | <td valign="top">Year</td> |
4808 | | <td valign="top">2012</td> |
4809 | | </tr> |
4810 | | |
4811 | | <tr> |
4812 | | <td valign="top">Abstract</td> |
4813 | | <td valign="top">A steady rise in home systems has been seen over the past few years. As more systems are designed and deployed, an appropriate testbed is required to test these systems. Sev- eral systems exist, such as PlanetLab, that currently provide a networking testbed allowing researchers and developers to test and measure various applications. However in the long run such testbeds will be unable to keep up and meet all the demands of many of the large scale modern day peer-to-peer systems. We outline the various challenges and essentials of a networking testbed and we provide an alternate network- ing testbed that is driven by resources that are voluntarily contributed. We talk about the various advantages and dis- advantages of the Seattle system, an open source peer-to- peer computing testbed that has the potential to meet these demands. The testbed is composed of sandboxed resources that are donated by volunteers. Seattle has been deployed for about three years and supports many researchers who are interested in a networking testbed. The testbed consists of over 4100 nodes and is constantly growing. Seattle looks to grow and meet the demands of networking testbeds as they are made.</td> |
4814 | | </tr> |
4815 | | |
4816 | | |
4817 | | |
4818 | | |
4819 | | |
4820 | | |
4821 | | </table></div><br><br> |
4822 | | |
4823 | | |
4824 | | <div class="BibEntry"> |
4825 | | |
4826 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4827 | | |
4828 | | |
4829 | | <tr> |
4830 | | <td valign="top">Author</td> |
4831 | | <td valign="top">Muhammad, Monzur and Cappos, Justin</td> |
4832 | | </tr> |
4833 | | |
4834 | | <tr> |
4835 | | <td valign="top">Title</td> |
4836 | | <td valign="top">Towards a Representive Testbed: Harnessing Volunteers for Networks Research</td> |
4837 | | </tr> |
4838 | | |
4839 | | <tr> |
4840 | | <td valign="top">Booktitle</td> |
4841 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
4842 | | </tr> |
4843 | | |
4844 | | <tr> |
4845 | | <td valign="top">Location</td> |
4846 | | <td valign="top">Los Angeles</td> |
4847 | | </tr> |
4848 | | |
4849 | | <tr> |
4850 | | <td valign="top">Year</td> |
4851 | | <td valign="top">2012</td> |
4852 | | </tr> |
4853 | | |
4854 | | <tr> |
4855 | | <td valign="top">Abstract</td> |
4856 | | <td valign="top">A steady rise in home systems has been seen over the past few years. As more systems are designed and deployed, an appropriate testbed is required to test these systems. Sev- eral systems exist, such as PlanetLab, that currently provide a networking testbed allowing researchers and developers to test and measure various applications. However in the long run such testbeds will be unable to keep up and meet all the demands of many of the large scale modern day peer-to-peer systems. We outline the various challenges and essentials of a networking testbed and we provide an alternate network- ing testbed that is driven by resources that are voluntarily contributed. We talk about the various advantages and dis- advantages of the Seattle system, an open source peer-to- peer computing testbed that has the potential to meet these demands. The testbed is composed of sandboxed resources that are donated by volunteers. Seattle has been deployed for about three years and supports many researchers who are interested in a networking testbed. The testbed consists of over 4100 nodes and is constantly growing. Seattle looks to grow and meet the demands of networking testbeds as they are made.</td> |
4857 | | </tr> |
4858 | | |
4859 | | |
4860 | | |
4861 | | |
4862 | | |
4863 | | |
4864 | | </table></div><br><br> |
4865 | | |
4866 | | |
4867 | | |
4868 | | |
4869 | | <a class="EntryGoto" id="Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram"></a> |
4870 | | <b class="myheading" style="position: relative; left: 5%;">Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram</b> |
4871 | | |
4872 | | <div class="BibEntry"> |
4873 | | |
4874 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4875 | | |
4876 | | |
4877 | | <tr> |
4878 | | <td valign="top">Author</td> |
4879 | | <td valign="top">Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram</td> |
4880 | | </tr> |
4881 | | |
4882 | | <tr> |
4883 | | <td valign="top">Title</td> |
4884 | | <td valign="top">OpenFlow Configuration (OFConfig) Protocol: Implementation for the OF Management Plane</td> |
4885 | | </tr> |
4886 | | |
4887 | | <tr> |
4888 | | <td valign="top">Booktitle</td> |
4889 | | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
4890 | | </tr> |
4891 | | |
4892 | | <tr> |
4893 | | <td valign="top">Location</td> |
4894 | | <td valign="top">Salt Lake City, UT</td> |
4895 | | </tr> |
4896 | | |
4897 | | <tr> |
4898 | | <td valign="top">Publisher</td> |
4899 | | <td valign="top">IEEE</td> |
4900 | | </tr> |
4901 | | |
4902 | | <tr> |
4903 | | <td valign="top">Year</td> |
4904 | | <td valign="top">2013</td> |
4905 | | </tr> |
4906 | | |
4907 | | |
4908 | | |
4909 | | <tr> |
4910 | | <td valign="top">DOI</td> |
4911 | | <td valign="top">10.1109/GREE.2013.21</td> |
4912 | | </tr> |
4913 | | |
4914 | | |
4915 | | |
4916 | | <tr> |
4917 | | <td valign="top">URL</td> |
4918 | | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.21">http://dx.doi.org/10.1109/GREE.2013.21</a></td> |
4919 | | </tr> |
4920 | | |
4921 | | |
4922 | | </table></div><br><br> |
4923 | | |
4924 | | |
4925 | | |
4926 | | |
4927 | | <a class="EntryGoto" id="O'Neill, Derek and Aikat, Jay and Jeffay, Kevin"></a> |
4928 | | <b class="myheading" style="position: relative; left: 5%;">O'Neill, Derek and Aikat, Jay and Jeffay, Kevin</b> |
4929 | | |
4930 | | <div class="BibEntry"> |
4931 | | |
4932 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4933 | | |
4934 | | |
4935 | | <tr> |
4936 | | <td valign="top">Author</td> |
4937 | | <td valign="top">O'Neill, Derek and Aikat, Jay and Jeffay, Kevin</td> |
4938 | | </tr> |
4939 | | |
4940 | | <tr> |
4941 | | <td valign="top">Title</td> |
4942 | | <td valign="top">Experiment Replication using ProtoGENI nodes</td> |
4943 | | </tr> |
4944 | | |
4945 | | <tr> |
4946 | | <td valign="top">Booktitle</td> |
4947 | | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
4948 | | </tr> |
4949 | | |
4950 | | <tr> |
4951 | | <td valign="top">Location</td> |
4952 | | <td valign="top">Salt Lake City, UT</td> |
4953 | | </tr> |
4954 | | |
4955 | | <tr> |
4956 | | <td valign="top">Publisher</td> |
4957 | | <td valign="top">IEEE</td> |
4958 | | </tr> |
4959 | | |
4960 | | <tr> |
4961 | | <td valign="top">Year</td> |
4962 | | <td valign="top">2013</td> |
4963 | | </tr> |
4964 | | |
4965 | | |
4966 | | |
4967 | | <tr> |
4968 | | <td valign="top">DOI</td> |
4969 | | <td valign="top">10.1109/GREE.2013.11</td> |
4970 | | </tr> |
4971 | | |
4972 | | |
4973 | | |
4974 | | <tr> |
4975 | | <td valign="top">URL</td> |
4976 | | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.11">http://dx.doi.org/10.1109/GREE.2013.11</a></td> |
4977 | | </tr> |
4978 | | |
4979 | | |
4980 | | </table></div><br><br> |
4981 | | |
4982 | | |
4983 | | |
4984 | | |
4985 | | <a class="EntryGoto" id="Ozcelik, Ilker and Brooks, Richard R."></a> |
4986 | | <b class="myheading" style="position: relative; left: 5%;">Ozcelik, Ilker and Brooks, Richard R.</b> |
4987 | | |
4988 | | <div class="BibEntry"> |
4989 | | |
4990 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4991 | | |
4992 | | |
4993 | | <tr> |
4994 | | <td valign="top">Author</td> |
4995 | | <td valign="top">Ozcelik, Ilker and Brooks, Richard R.</td> |
4996 | | </tr> |
4997 | | |
4998 | | <tr> |
4999 | | <td valign="top">Title</td> |
5000 | | <td valign="top">Security experimentation using operational systems</td> |
5001 | | </tr> |
5002 | | |
5003 | | <tr> |
5004 | | <td valign="top">Booktitle</td> |
5005 | | <td valign="top">Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research</td> |
5006 | | </tr> |
5007 | | |
5008 | | <tr> |
5009 | | <td valign="top">Location</td> |
5010 | | <td valign="top">Oak Ridge, Tennessee</td> |
5011 | | </tr> |
5012 | | |
5013 | | <tr> |
5014 | | <td valign="top">Publisher</td> |
5015 | | <td valign="top">ACM</td> |
5016 | | </tr> |
5017 | | |
5018 | | <tr> |
5019 | | <td valign="top">Address</td> |
5020 | | <td valign="top">New York, NY, USA</td> |
5021 | | </tr> |
5022 | | |
5023 | | <tr> |
5024 | | <td valign="top">Year</td> |
5025 | | <td valign="top">2011</td> |
5026 | | </tr> |
5027 | | |
5028 | | <tr> |
5029 | | <td valign="top">Abstract</td> |
5030 | | <td valign="top">Computers and Internet have evolved into necessary tools for our professional, personal and social lives. As a result of this growing dependence, there is a concern that these systems remain protected and available. This concern increases exponentially when considering systems such as smart power grids. Therefore, research should be conducted to develop effective ways of detecting system anomalies. To have realistic results, the studies should be tested on real systems. However, it is not possible to test these experiments on the live network. With the recent collaboration of Universities and research labs, a new experiment test bed has been established. As a result, experiments can now be implemented on real networks. In our study, we design an experiment to analyze Distributed Denial of Service Attacks (DDoS Attack) on a real network with real Internet traffic. The approach that we use in our study can easily be generalized to apply to smart power grids.</td> |
5031 | | </tr> |
5032 | | |
5033 | | |
5034 | | |
5035 | | <tr> |
5036 | | <td valign="top">DOI</td> |
5037 | | <td valign="top">10.1145/2179298.2179388</td> |
5038 | | </tr> |
5039 | | |
5040 | | |
5041 | | |
5042 | | <tr> |
5043 | | <td valign="top">URL</td> |
5044 | | <td valign="top"><a href="http://dx.doi.org/10.1145/2179298.2179388">http://dx.doi.org/10.1145/2179298.2179388</a></td> |
5045 | | </tr> |
5046 | | |
5047 | | |
5048 | | </table></div><br><br> |
5049 | | |
5050 | | |
5051 | | <div class="BibEntry"> |
5052 | | |
5053 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5054 | | |
5055 | | |
5056 | | <tr> |
5057 | | <td valign="top">Author</td> |
5058 | | <td valign="top">Ozcelik, Ilker and Brooks, Richard R.</td> |
5059 | | </tr> |
5060 | | |
5061 | | <tr> |
5062 | | <td valign="top">Title</td> |
5063 | | <td valign="top">Performance Analysis of DDoS Detection Methods on Real Network</td> |
5064 | | </tr> |
5065 | | |
5066 | | <tr> |
5067 | | <td valign="top">Booktitle</td> |
5068 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
5069 | | </tr> |
5070 | | |
5071 | | <tr> |
5072 | | <td valign="top">Location</td> |
5073 | | <td valign="top">Los Angeles</td> |
5074 | | </tr> |
5075 | | |
5076 | | <tr> |
5077 | | <td valign="top">Year</td> |
5078 | | <td valign="top">2012</td> |
5079 | | </tr> |
5080 | | |
5081 | | <tr> |
5082 | | <td valign="top">Abstract</td> |
5083 | | <td valign="top">Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic.</td> |
5084 | | </tr> |
5085 | | |
5086 | | |
5087 | | |
5088 | | |
5089 | | |
5090 | | |
5091 | | </table></div><br><br> |
5092 | | |
5093 | | |
5094 | | <div class="BibEntry"> |
5095 | | |
5096 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5097 | | |
5098 | | |
5099 | | <tr> |
5100 | | <td valign="top">Author</td> |
5101 | | <td valign="top">Ozcelik, Ilker and Brooks, Richard R.</td> |
5102 | | </tr> |
5103 | | |
5104 | | <tr> |
5105 | | <td valign="top">Title</td> |
5106 | | <td valign="top">Performance Analysis of DDoS Detection Methods on Real Network</td> |
5107 | | </tr> |
5108 | | |
5109 | | <tr> |
5110 | | <td valign="top">Booktitle</td> |
5111 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
5112 | | </tr> |
5113 | | |
5114 | | <tr> |
5115 | | <td valign="top">Location</td> |
5116 | | <td valign="top">Los Angeles</td> |
5117 | | </tr> |
5118 | | |
5119 | | <tr> |
5120 | | <td valign="top">Year</td> |
5121 | | <td valign="top">2012</td> |
5122 | | </tr> |
5123 | | |
5124 | | <tr> |
5125 | | <td valign="top">Abstract</td> |
5126 | | <td valign="top">Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic.</td> |
5127 | | </tr> |
5128 | | |
5129 | | |
5130 | | |
5131 | | |
5132 | | |
5133 | | |
5134 | | </table></div><br><br> |
5135 | | |
5136 | | |
5137 | | |
5138 | | |
5139 | | <a class="EntryGoto" id="Ozcelik, Ilker and Fu, Yu and Brooks, Richard R."></a> |
5140 | | <b class="myheading" style="position: relative; left: 5%;">Ozcelik, Ilker and Fu, Yu and Brooks, Richard R.</b> |
5141 | | |
5142 | | <div class="BibEntry"> |
5143 | | |
5144 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5145 | | |
5146 | | |
5147 | | <tr> |
5148 | | <td valign="top">Author</td> |
5149 | | <td valign="top">Ozcelik, Ilker and Fu, Yu and Brooks, Richard R.</td> |
5150 | | </tr> |
5151 | | |
5152 | | <tr> |
5153 | | <td valign="top">Title</td> |
5154 | | <td valign="top">DoS Detection is Easier Now</td> |
5155 | | </tr> |
5156 | | |
5157 | | <tr> |
5158 | | <td valign="top">Booktitle</td> |
5159 | | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
5160 | | </tr> |
5161 | | |
5162 | | <tr> |
5163 | | <td valign="top">Location</td> |
5164 | | <td valign="top">Salt Lake City, UT</td> |
5165 | | </tr> |
5166 | | |
5167 | | <tr> |
5168 | | <td valign="top">Publisher</td> |
5169 | | <td valign="top">IEEE</td> |
5170 | | </tr> |
5171 | | |
5172 | | <tr> |
5173 | | <td valign="top">Year</td> |
5174 | | <td valign="top">2013</td> |
5175 | | </tr> |
5176 | | |
5177 | | |
5178 | | |
5179 | | <tr> |
5180 | | <td valign="top">DOI</td> |
5181 | | <td valign="top">10.1109/GREE.2013.18</td> |
5182 | | </tr> |
5183 | | |
5184 | | |
5185 | | |
5186 | | <tr> |
5187 | | <td valign="top">URL</td> |
5188 | | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.18">http://dx.doi.org/10.1109/GREE.2013.18</a></td> |
5189 | | </tr> |
5190 | | |
5191 | | |
5192 | | </table></div><br><br> |
5193 | | |
5194 | | |
5195 | | |
5196 | | |
5197 | | <a class="EntryGoto" id="Paul, Subharthi and Pan, Jianli and Jain, Raj"></a> |
5198 | | <b class="myheading" style="position: relative; left: 5%;">Paul, Subharthi and Pan, Jianli and Jain, Raj</b> |
5199 | | |
5200 | | <div class="BibEntry"> |
5201 | | |
5202 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5203 | | |
5204 | | |
5205 | | <tr> |
5206 | | <td valign="top">Author</td> |
5207 | | <td valign="top">Paul, Subharthi and Pan, Jianli and Jain, Raj</td> |
5208 | | </tr> |
5209 | | |
5210 | | <tr> |
5211 | | <td valign="top">Title</td> |
5212 | | <td valign="top">Architectures for the future networks and the next generation Internet: A survey</td> |
5213 | | </tr> |
5214 | | |
5215 | | <tr> |
5216 | | <td valign="top">Journal</td> |
5217 | | <td valign="top">Computer Communications</td> |
5218 | | </tr> |
5219 | | |
5220 | | <tr> |
5221 | | <td valign="top">Publisher</td> |
5222 | | <td valign="top">Elsevier Science Publishers B. V.</td> |
5223 | | </tr> |
5224 | | |
5225 | | <tr> |
5226 | | <td valign="top">Address</td> |
5227 | | <td valign="top">Amsterdam, The Netherlands, The Netherlands</td> |
5228 | | </tr> |
5229 | | |
5230 | | <tr> |
5231 | | <td valign="top">Year</td> |
5232 | | <td valign="top">2011</td> |
5233 | | </tr> |
5234 | | |
5235 | | <tr> |
5236 | | <td valign="top">Abstract</td> |
5237 | | <td valign="top">Networking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet. We present a comprehensive survey of such research projects and activities. The topics covered include various testbeds for experimentations for new architectures, new security mechanisms, content delivery mechanisms, management and control frameworks, service architectures, and routing mechanisms. Delay/disruption tolerant networks which allow communications even when complete end-to-end path is not available are also discussed.</td> |
5238 | | </tr> |
5239 | | |
5240 | | |
5241 | | |
5242 | | <tr> |
5243 | | <td valign="top">DOI</td> |
5244 | | <td valign="top">10.1016/j.comcom.2010.08.001</td> |
5245 | | </tr> |
5246 | | |
5247 | | |
5248 | | |
5249 | | <tr> |
5250 | | <td valign="top">URL</td> |
5251 | | <td valign="top"><a href="http://dx.doi.org/10.1016/j.comcom.2010.08.001">http://dx.doi.org/10.1016/j.comcom.2010.08.001</a></td> |
5252 | | </tr> |
5253 | | |
5254 | | |
5255 | | </table></div><br><br> |
5256 | | |
5257 | | |
5258 | | |
5259 | | |
5260 | | <a class="EntryGoto" id="Qin, Z. and Xiong, X. and Chuah, M."></a> |
5261 | | <b class="myheading" style="position: relative; left: 5%;">Qin, Z. and Xiong, X. and Chuah, M.</b> |
5262 | | |
5263 | | <div class="BibEntry"> |
5264 | | |
5265 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5266 | | |
5267 | | |
5268 | | <tr> |
5269 | | <td valign="top">Author</td> |
5270 | | <td valign="top">Qin, Z. and Xiong, X. and Chuah, M.</td> |
5271 | | </tr> |
5272 | | |
5273 | | <tr> |
5274 | | <td valign="top">Title</td> |
5275 | | <td valign="top">Lehigh Explorer: Android Application Utilizing Content Centric Features</td> |
5276 | | </tr> |
5277 | | |
5278 | | <tr> |
5279 | | <td valign="top">Booktitle</td> |
5280 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
5281 | | </tr> |
5282 | | |
5283 | | <tr> |
5284 | | <td valign="top">Location</td> |
5285 | | <td valign="top">Los Angeles</td> |
5286 | | </tr> |
5287 | | |
5288 | | <tr> |
5289 | | <td valign="top">Year</td> |
5290 | | <td valign="top">2012</td> |
5291 | | </tr> |
5292 | | |
5293 | | <tr> |
5294 | | <td valign="top">Abstract</td> |
5295 | | <td valign="top">Companies, government organizations or institutions from anywhere in the world publish different types of information e.g. news, health alerts, disaster warnings at any time. Rather than consuming all published data, users only desire access to information of interest to themselves irrespective of where the data is located and who publish them. Existing publish/subscribe systems built based on IP-based network can be inefficient and are not flexible enough to meet emerging requirements e.g. deal with mobile users, dynamic contents, searching over encrypted data. Recently content-centric networks have been proposed to provide flexibility to users to access such information. We have designed secure content centric mobile networks that allow users to publish and retrieve contents securely. As with any new architecture, one important issue is to have useful applications that can utilize features provided in the new architecture. In this paper, we describe an Android application we recently developed that allows visitors to explore Lehigh campus based on their expressed interests. Our application utilizes keyword based interest messages to retrieve matching data items of interests to a user. We are giving a demo of Lehigh Explorer at GEC13.</td> |
5296 | | </tr> |
5297 | | |
5298 | | |
5299 | | |
5300 | | |
5301 | | |
5302 | | |
5303 | | </table></div><br><br> |
5304 | | |
5305 | | |
5306 | | <div class="BibEntry"> |
5307 | | |
5308 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5309 | | |
5310 | | |
5311 | | <tr> |
5312 | | <td valign="top">Author</td> |
5313 | | <td valign="top">Qin, Z. and Xiong, X. and Chuah, M.</td> |
5314 | | </tr> |
5315 | | |
5316 | | <tr> |
5317 | | <td valign="top">Title</td> |
5318 | | <td valign="top">Lehigh Explorer: Android Application Utilizing Content Centric Features</td> |
5319 | | </tr> |
5320 | | |
5321 | | <tr> |
5322 | | <td valign="top">Booktitle</td> |
5323 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
5324 | | </tr> |
5325 | | |
5326 | | <tr> |
5327 | | <td valign="top">Location</td> |
5328 | | <td valign="top">Los Angeles</td> |
5329 | | </tr> |
5330 | | |
5331 | | <tr> |
5332 | | <td valign="top">Year</td> |
5333 | | <td valign="top">2012</td> |
5334 | | </tr> |
5335 | | |
5336 | | <tr> |
5337 | | <td valign="top">Abstract</td> |
5338 | | <td valign="top">Companies, government organizations or institutions from anywhere in the world publish different types of information e.g. news, health alerts, disaster warnings at any time. Rather than consuming all published data, users only desire access to information of interest to themselves irrespective of where the data is located and who publish them. Existing publish/subscribe systems built based on IP-based network can be inefficient and are not flexible enough to meet emerging requirements e.g. deal with mobile users, dynamic contents, searching over encrypted data. Recently content-centric networks have been proposed to provide flexibility to users to access such information. We have designed secure content centric mobile networks that allow users to publish and retrieve contents securely. As with any new architecture, one important issue is to have useful applications that can utilize features provided in the new architecture. In this paper, we describe an Android application we recently developed that allows visitors to explore Lehigh campus based on their expressed interests. Our application utilizes keyword based interest messages to retrieve matching data items of interests to a user. We are giving a demo of Lehigh Explorer at GEC13.</td> |
5339 | | </tr> |
5340 | | |
5341 | | |
5342 | | |
5343 | | |
5344 | | |
5345 | | |
5346 | | </table></div><br><br> |
5347 | | |
5348 | | |
5349 | | |
5350 | | |
5351 | | <a class="EntryGoto" id="Quan, John and Nance, Kara and Hay, Brian"></a> |
5352 | | <b class="myheading" style="position: relative; left: 5%;">Quan, John and Nance, Kara and Hay, Brian</b> |
5353 | | |
5354 | | <div class="BibEntry"> |
5355 | | |
5356 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5357 | | |
5358 | | |
5359 | | <tr> |
5360 | | <td valign="top">Author</td> |
5361 | | <td valign="top">Quan, John and Nance, Kara and Hay, Brian</td> |
5362 | | </tr> |
5363 | | |
5364 | | <tr> |
5365 | | <td valign="top">Title</td> |
5366 | | <td valign="top">A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments</td> |
5367 | | </tr> |
5368 | | |
5369 | | <tr> |
5370 | | <td valign="top">Journal</td> |
5371 | | <td valign="top">IT Professional</td> |
5372 | | </tr> |
5373 | | |
5374 | | <tr> |
5375 | | <td valign="top">Year</td> |
5376 | | <td valign="top">2011</td> |
5377 | | </tr> |
5378 | | |
5379 | | <tr> |
5380 | | <td valign="top">Abstract</td> |
5381 | | <td valign="top">Applying a mutualistic security service model to large-scale virtualized environments that rely on contributed hardware lets researchers improve security in exchange for resources. The authors discuss this model in the context of the Global Environment for Network Innovation (GENI) project.</td> |
5382 | | </tr> |
5383 | | |
5384 | | |
5385 | | |
5386 | | <tr> |
5387 | | <td valign="top">DOI</td> |
5388 | | <td valign="top">10.1109/MITP.2011.36</td> |
5389 | | </tr> |
5390 | | |
5391 | | |
5392 | | |
5393 | | <tr> |
5394 | | <td valign="top">URL</td> |
5395 | | <td valign="top"><a href="http://dx.doi.org/10.1109/MITP.2011.36">http://dx.doi.org/10.1109/MITP.2011.36</a></td> |
5396 | | </tr> |
5397 | | |
5398 | | |
5399 | | </table></div><br><br> |
5400 | | |
5401 | | |
5402 | | |
5403 | | |
5404 | | <a class="EntryGoto" id="Raychaudhuri, Dipankar and Nagaraja, Kiran and Venkataramani, Arun"></a> |
5405 | | <b class="myheading" style="position: relative; left: 5%;">Raychaudhuri, Dipankar and Nagaraja, Kiran and Venkataramani, Arun</b> |
5406 | | |
5407 | | <div class="BibEntry"> |
5408 | | |
5409 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5410 | | |
5411 | | |
5412 | | <tr> |
5413 | | <td valign="top">Author</td> |
5414 | | <td valign="top">Raychaudhuri, Dipankar and Nagaraja, Kiran and Venkataramani, Arun</td> |
5415 | | </tr> |
5416 | | |
5417 | | <tr> |
5418 | | <td valign="top">Title</td> |
5419 | | <td valign="top">MobilityFirst: a robust and trustworthy mobility-centric architecture for the future internet</td> |
5420 | | </tr> |
5421 | | |
5422 | | <tr> |
5423 | | <td valign="top">Journal</td> |
5424 | | <td valign="top">SIGMOBILE Mob. Comput. Commun. Rev.</td> |
5425 | | </tr> |
5426 | | |
5427 | | <tr> |
5428 | | <td valign="top">Publisher</td> |
5429 | | <td valign="top">ACM</td> |
5430 | | </tr> |
5431 | | |
5432 | | <tr> |
5433 | | <td valign="top">Address</td> |
5434 | | <td valign="top">New York, NY, USA</td> |
5435 | | </tr> |
5436 | | |
5437 | | <tr> |
5438 | | <td valign="top">Year</td> |
5439 | | <td valign="top">2012</td> |
5440 | | </tr> |
5441 | | |
5442 | | <tr> |
5443 | | <td valign="top">Abstract</td> |
5444 | | <td valign="top">This paper presents an overview of the MobilityFirst network architecture, currently under development as part of the US National Science Foundation's Future Internet Architecture (FIA) program. The proposed architecture is intended to directly address the challenges of wireless access and mobility at scale, while also providing new services needed for emerging mobile Internet application scenarios. After briefly outlining the original design goals of the project, we provide a discussion of the main architectural concepts behind the network design, identifying key features such as separation of names from addresses, public-key based globally unique identifiers (GUIDs) for named objects, global name resolution service (GNRS) for dynamic binding of names to addresses, storage-aware routing and late binding, content- and context-aware services, optional in-network compute layer, and so on. This is followed by a brief description of the MobilityFirst protocol stack as a whole, along with an explanation of how the protocol works at end-user devices and inside network routers. Example of specific advanced services supported by the protocol stack, including multi-homing, mobility with disconnection, and content retrieval/caching are given for illustration. Further design details of two key protocol components, the GNRS name resolution service and the GSTAR routing protocol, are also described along with sample results from evaluation. In conclusion, a brief description of an ongoing multi-site experimental proof-of-concept deployment of the MobilityFirst protocol stack on the GENI testbed is provided.</td> |
5445 | | </tr> |
5446 | | |
5447 | | |
5448 | | |
5449 | | <tr> |
5450 | | <td valign="top">DOI</td> |
5451 | | <td valign="top">10.1145/2412096.2412098</td> |
5452 | | </tr> |
5453 | | |
5454 | | |
5455 | | |
5456 | | <tr> |
5457 | | <td valign="top">URL</td> |
5458 | | <td valign="top"><a href="http://dx.doi.org/10.1145/2412096.2412098">http://dx.doi.org/10.1145/2412096.2412098</a></td> |
5459 | | </tr> |
5460 | | |
5461 | | |
5462 | | </table></div><br><br> |
5463 | | |
5464 | | |
5465 | | |
5466 | | |
5467 | | <a class="EntryGoto" id="Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon"></a> |
5468 | | <b class="myheading" style="position: relative; left: 5%;">Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon</b> |
5469 | | |
5470 | | <div class="BibEntry"> |
5471 | | |
5472 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5473 | | |
5474 | | |
5475 | | <tr> |
5476 | | <td valign="top">Author</td> |
5477 | | <td valign="top">Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon</td> |
5478 | | </tr> |
5479 | | |
5480 | | <tr> |
5481 | | <td valign="top">Title</td> |
5482 | | <td valign="top">An Architecture For International Federation of Network Testbeds</td> |
5483 | | </tr> |
5484 | | |
5485 | | <tr> |
5486 | | <td valign="top">Journal</td> |
5487 | | <td valign="top">IEICE Transactions on Communications</td> |
5488 | | </tr> |
5489 | | |
5490 | | <tr> |
5491 | | <td valign="top">Year</td> |
5492 | | <td valign="top">2013</td> |
5493 | | </tr> |
5494 | | |
5495 | | <tr> |
5496 | | <td valign="top">Abstract</td> |
5497 | | <td valign="top">Testbeds play a key role in the advancement of network science and the exploration of new network architectures. Because the scale and scope of any individual testbed is necessarily limited, federation is a useful technique for constructing testbeds that serve a wide range of experimenter needs. In a federated testbed, individual facilities maintain local autonomy while cooperating to provide a unified set of abstractions and interfaces to users. Forming an international federation is particularly challenging, because issues of trust, user access policy, and local laws and regulations are of greater concern that they are for federations within a single country. In this paper, we describe an architecture, based on the US National Science Foundation's GENI project, that is capable of supporting the needs of an international federation.</td> |
5498 | | </tr> |
5499 | | |
5500 | | |
5501 | | |
5502 | | <tr> |
5503 | | <td valign="top">DOI</td> |
5504 | | <td valign="top">10.1587/transcom.E96.B.2</td> |
5505 | | </tr> |
5506 | | |
5507 | | |
5508 | | |
5509 | | <tr> |
5510 | | <td valign="top">URL</td> |
5511 | | <td valign="top"><a href="http://dx.doi.org/10.1587/transcom.E96.B.2">http://dx.doi.org/10.1587/transcom.E96.B.2</a></td> |
5512 | | </tr> |
5513 | | |
5514 | | |
5515 | | </table></div><br><br> |
5516 | | |
5517 | | |
5518 | | <div class="BibEntry"> |
5519 | | |
5520 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5521 | | |
5522 | | |
5523 | | <tr> |
5524 | | <td valign="top">Author</td> |
5525 | | <td valign="top">Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon</td> |
5526 | | </tr> |
5527 | | |
5528 | | <tr> |
5529 | | <td valign="top">Title</td> |
5530 | | <td valign="top">An Architecture For International Federation of Network Testbeds</td> |
5531 | | </tr> |
5532 | | |
5533 | | <tr> |
5534 | | <td valign="top">Journal</td> |
5535 | | <td valign="top">IEICE Transactions on Communications</td> |
5536 | | </tr> |
5537 | | |
5538 | | <tr> |
5539 | | <td valign="top">Year</td> |
5540 | | <td valign="top">2013</td> |
5541 | | </tr> |
5542 | | |
5543 | | <tr> |
5544 | | <td valign="top">Abstract</td> |
5545 | | <td valign="top">Testbeds play a key role in the advancement of network science and the exploration of new network architectures. Because the scale and scope of any individual testbed is necessarily limited, federation is a useful technique for constructing testbeds that serve a wide range of experimenter needs. In a federated testbed, individual facilities maintain local autonomy while cooperating to provide a unified set of abstractions and interfaces to users. Forming an international federation is particularly challenging, because issues of trust, user access policy, and local laws and regulations are of greater concern that they are for federations within a single country. In this paper, we describe an architecture, based on the US National Science Foundation's GENI project, that is capable of supporting the needs of an international federation.</td> |
5546 | | </tr> |
5547 | | |
5548 | | |
5549 | | |
5550 | | <tr> |
5551 | | <td valign="top">DOI</td> |
5552 | | <td valign="top">10.1587/transcom.E96.B.2</td> |
5553 | | </tr> |
5554 | | |
5555 | | |
5556 | | |
5557 | | <tr> |
5558 | | <td valign="top">URL</td> |
5559 | | <td valign="top"><a href="http://dx.doi.org/10.1587/transcom.E96.B.2">http://dx.doi.org/10.1587/transcom.E96.B.2</a></td> |
5560 | | </tr> |
5561 | | |
5562 | | |
5563 | | </table></div><br><br> |
5564 | | |
5565 | | |
5566 | | |
5567 | | |
5568 | | <a class="EntryGoto" id="Rohrer, Justin P. and Çetinkaya, Egemen K. and Sterbenz, James P. G."></a> |
5569 | | <b class="myheading" style="position: relative; left: 5%;">Rohrer, Justin P. and Çetinkaya, Egemen K. and Sterbenz, James P. G.</b> |
5570 | | |
5571 | | <div class="BibEntry"> |
5572 | | |
5573 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5574 | | |
5575 | | |
5576 | | <tr> |
5577 | | <td valign="top">Author</td> |
5578 | | <td valign="top">Rohrer, Justin P. and Çetinkaya, Egemen K. and Sterbenz, James P. G.</td> |
5579 | | </tr> |
5580 | | |
5581 | | <tr> |
5582 | | <td valign="top">Title</td> |
5583 | | <td valign="top">Progress and challenges in large-scale future internet experimentation using the GpENI programmable testbed</td> |
5584 | | </tr> |
5585 | | |
5586 | | <tr> |
5587 | | <td valign="top">Booktitle</td> |
5588 | | <td valign="top">Proceedings of the 6th International Conference on Future Internet Technologies</td> |
5589 | | </tr> |
5590 | | |
5591 | | <tr> |
5592 | | <td valign="top">Location</td> |
5593 | | <td valign="top">Seoul, Republic of Korea</td> |
5594 | | </tr> |
5595 | | |
5596 | | <tr> |
5597 | | <td valign="top">Publisher</td> |
5598 | | <td valign="top">ACM</td> |
5599 | | </tr> |
5600 | | |
5601 | | <tr> |
5602 | | <td valign="top">Address</td> |
5603 | | <td valign="top">New York, NY, USA</td> |
5604 | | </tr> |
5605 | | |
5606 | | <tr> |
5607 | | <td valign="top">Year</td> |
5608 | | <td valign="top">2011</td> |
5609 | | </tr> |
5610 | | |
5611 | | <tr> |
5612 | | <td valign="top">Abstract</td> |
5613 | | <td valign="top">GpENI is evolving to provide a promising environment in which to do experimental research in the resilience and survivability of future networks, by allowing programmable control over topology and mechanism, while providing the scale and global reach needed to conduct network experiments far beyond the capabilities of a conventional testbed. Addressing this need at scale introduces a number of challenges both in deployment and in collecting results that can be directly compared to simulation results for cross-verification purposes. In this short paper we present the scope, design goals, challenges, and current status of the GpENI programmable testbed, as well as an overview and examples of the types of experiments we are beginning to run.</td> |
5614 | | </tr> |
5615 | | |
5616 | | |
5617 | | |
5618 | | <tr> |
5619 | | <td valign="top">DOI</td> |
5620 | | <td valign="top">10.1145/2002396.2002409</td> |
5621 | | </tr> |
5622 | | |
5623 | | |
5624 | | |
5625 | | <tr> |
5626 | | <td valign="top">URL</td> |
5627 | | <td valign="top"><a href="http://dx.doi.org/10.1145/2002396.2002409">http://dx.doi.org/10.1145/2002396.2002409</a></td> |
5628 | | </tr> |
5629 | | |
5630 | | |
5631 | | </table></div><br><br> |
5632 | | |
5633 | | |
5634 | | |
5635 | | |
5636 | | <a class="EntryGoto" id="Rosen, Aaron and Wang, Kuang-Ching"></a> |
5637 | | <b class="myheading" style="position: relative; left: 5%;">Rosen, Aaron and Wang, Kuang-Ching</b> |
5638 | | |
5639 | | <div class="BibEntry"> |
5640 | | |
5641 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5642 | | |
5643 | | |
5644 | | <tr> |
5645 | | <td valign="top">Author</td> |
5646 | | <td valign="top">Rosen, Aaron and Wang, Kuang-Ching</td> |
5647 | | </tr> |
5648 | | |
5649 | | <tr> |
5650 | | <td valign="top">Title</td> |
5651 | | <td valign="top">Steroid OpenFlow Service: Seamless Network Service Delivery in Software Defined Networks</td> |
5652 | | </tr> |
5653 | | |
5654 | | <tr> |
5655 | | <td valign="top">Booktitle</td> |
5656 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
5657 | | </tr> |
5658 | | |
5659 | | <tr> |
5660 | | <td valign="top">Location</td> |
5661 | | <td valign="top">Los Angeles</td> |
5662 | | </tr> |
5663 | | |
5664 | | <tr> |
5665 | | <td valign="top">Year</td> |
5666 | | <td valign="top">2012</td> |
5667 | | </tr> |
5668 | | |
5669 | | <tr> |
5670 | | <td valign="top">Abstract</td> |
5671 | | <td valign="top">In a software defined network (SDN), packet forwarding is controlled by software controllers. In an OpenFlow SDN, a controller can control the forwarding, rewriting, and dropping of packets based on their header attributes. The ability to handle packets in customizable ways in software has significant implications for both network users and operators. Via software, users can convey application specific expectations while operators can deliver application specific services to enhance user experiences. In this paper, we present the Steroid OpenFlow Services (SOS) paradigm for network services delivery. The paradigm enables operators to deliver network services without any setup requirements on user machines. SOS utilizes OpenFlow to redirect application specific traffic to application specific service agents; SOS also rewrites packet headers for a service to remain seamless to users. This paper presents an example SOS service for optimizing large volume TCP download across a large delay-bandwidth-product wide area network. SOS service agents on both ends of the connection seamlessly terminate a user TCP connection, launch a set of parallel TCP connections, and leverage multiple paths when available to maximize throughput. With the NSF GENI future Internet testbed, a prototype implementation achieved up to 320 times throughput enhancement seamless to the end users.</td> |
5672 | | </tr> |
5673 | | |
5674 | | |
5675 | | |
5676 | | |
5677 | | |
5678 | | |
5679 | | </table></div><br><br> |
5680 | | |
5681 | | |
5682 | | <div class="BibEntry"> |
5683 | | |
5684 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5685 | | |
5686 | | |
5687 | | <tr> |
5688 | | <td valign="top">Author</td> |
5689 | | <td valign="top">Rosen, Aaron and Wang, Kuang-Ching</td> |
5690 | | </tr> |
5691 | | |
5692 | | <tr> |
5693 | | <td valign="top">Title</td> |
5694 | | <td valign="top">Steroid OpenFlow Service: Seamless Network Service Delivery in Software Defined Networks</td> |
5695 | | </tr> |
5696 | | |
5697 | | <tr> |
5698 | | <td valign="top">Booktitle</td> |
5699 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
5700 | | </tr> |
5701 | | |
5702 | | <tr> |
5703 | | <td valign="top">Location</td> |
5704 | | <td valign="top">Los Angeles</td> |
5705 | | </tr> |
5706 | | |
5707 | | <tr> |
5708 | | <td valign="top">Year</td> |
5709 | | <td valign="top">2012</td> |
5710 | | </tr> |
5711 | | |
5712 | | <tr> |
5713 | | <td valign="top">Abstract</td> |
5714 | | <td valign="top">In a software defined network (SDN), packet forwarding is controlled by software controllers. In an OpenFlow SDN, a controller can control the forwarding, rewriting, and dropping of packets based on their header attributes. The ability to handle packets in customizable ways in software has significant implications for both network users and operators. Via software, users can convey application specific expectations while operators can deliver application specific services to enhance user experiences. In this paper, we present the Steroid OpenFlow Services (SOS) paradigm for network services delivery. The paradigm enables operators to deliver network services without any setup requirements on user machines. SOS utilizes OpenFlow to redirect application specific traffic to application specific service agents; SOS also rewrites packet headers for a service to remain seamless to users. This paper presents an example SOS service for optimizing large volume TCP download across a large delay-bandwidth-product wide area network. SOS service agents on both ends of the connection seamlessly terminate a user TCP connection, launch a set of parallel TCP connections, and leverage multiple paths when available to maximize throughput. With the NSF GENI future Internet testbed, a prototype implementation achieved up to 320 times throughput enhancement seamless to the end users.</td> |
5715 | | </tr> |
5716 | | |
5717 | | |
5718 | | |
5719 | | |
5720 | | |
5721 | | |
5722 | | </table></div><br><br> |
5723 | | |
5724 | | |
5725 | | |
5726 | | |
5727 | | <a class="EntryGoto" id="Scoglio, Caterina M. and Sydney, Ali and Youssef, Mina and Schumm, Phillip and Kooij, Robert E."></a> |
5728 | | <b class="myheading" style="position: relative; left: 5%;">Scoglio, Caterina M. and Sydney, Ali and Youssef, Mina and Schumm, Phillip and Kooij, Robert E.</b> |
5729 | | |
5730 | | <div class="BibEntry"> |
5731 | | |
5732 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5733 | | |
5734 | | |
5735 | | <tr> |
5736 | | <td valign="top">Author</td> |
5737 | | <td valign="top">Scoglio, Caterina M. and Sydney, Ali and Youssef, Mina and Schumm, Phillip and Kooij, Robert E.</td> |
5738 | | </tr> |
5739 | | |
5740 | | <tr> |
5741 | | <td valign="top">Title</td> |
5742 | | <td valign="top">Elasticity and Viral Conductance: Unveiling Robustness in Complex Networks through Topological Characteristics</td> |
5743 | | </tr> |
5744 | | |
5745 | | <tr> |
5746 | | <td valign="top">Journal</td> |
5747 | | <td valign="top">CoRR</td> |
5748 | | </tr> |
5749 | | |
5750 | | <tr> |
5751 | | <td valign="top">Year</td> |
5752 | | <td valign="top">2008</td> |
5753 | | </tr> |
5754 | | |
5755 | | |
5756 | | |
5757 | | |
5758 | | |
5759 | | |
5760 | | </table></div><br><br> |
5761 | | |
5762 | | |
5763 | | |
5764 | | |
5765 | | <a class="EntryGoto" id="Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar"></a> |
5766 | | <b class="myheading" style="position: relative; left: 5%;">Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar</b> |
5767 | | |
5768 | | <div class="BibEntry"> |
5769 | | |
5770 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5771 | | |
5772 | | |
5773 | | <tr> |
5774 | | <td valign="top">Author</td> |
5775 | | <td valign="top">Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar</td> |
5776 | | </tr> |
5777 | | |
5778 | | <tr> |
5779 | | <td valign="top">Title</td> |
5780 | | <td valign="top">MobilityFirst future internet architecture project</td> |
5781 | | </tr> |
5782 | | |
5783 | | <tr> |
5784 | | <td valign="top">Booktitle</td> |
5785 | | <td valign="top">Proceedings of the 7th Asian Internet Engineering Conference</td> |
5786 | | </tr> |
5787 | | |
5788 | | <tr> |
5789 | | <td valign="top">Location</td> |
5790 | | <td valign="top">Bangkok, Thailand</td> |
5791 | | </tr> |
5792 | | |
5793 | | <tr> |
5794 | | <td valign="top">Publisher</td> |
5795 | | <td valign="top">ACM</td> |
5796 | | </tr> |
5797 | | |
5798 | | <tr> |
5799 | | <td valign="top">Address</td> |
5800 | | <td valign="top">New York, NY, USA</td> |
5801 | | </tr> |
5802 | | |
5803 | | <tr> |
5804 | | <td valign="top">Year</td> |
5805 | | <td valign="top">2011</td> |
5806 | | </tr> |
5807 | | |
5808 | | <tr> |
5809 | | <td valign="top">Abstract</td> |
5810 | | <td valign="top">This short paper presents an overview of the MobilityFirst network architecture, which is a clean-slate project being conducted as part of the NSF Future Internet Architecture (FIA) program. The proposed architecture is intended to directly address the challenges of wireless access and mobility at scale, while also providing new multicast, anycast, multi-path and context-aware services needed for emerging mobile Internet application scenarios. Key protocol components of the proposed architecture are: (a) separation of naming from addressing; (b) public key based self-certifying names (called globally unique identifiers or GUIDs) for network-attached objects; (c) global name resolution service (GNRS) for dynamic name-to-address binding; (d) delay-tolerant and storage-aware routing (GSTAR) capable of dealing with wireless link quality fluctuations and disconnections; (e) hop-by-hop transport of large protocol data units; and (f) location or context-aware services. The basic operations of a MobilityFirst router are outlined. This is followed by a discussion of ongoing proof-of-concept prototyping and experimental evaluation efforts for the MobilityFirst protocol stack. In conclusion, a brief description of an ongoing multi-site experimental deployment of the MobilityFirst protocol stack on the GENI testbed is provided.</td> |
5811 | | </tr> |
5812 | | |
5813 | | |
5814 | | |
5815 | | <tr> |
5816 | | <td valign="top">DOI</td> |
5817 | | <td valign="top">10.1145/2089016.2089017</td> |
5818 | | </tr> |
5819 | | |
5820 | | |
5821 | | |
5822 | | <tr> |
5823 | | <td valign="top">URL</td> |
5824 | | <td valign="top"><a href="http://dx.doi.org/10.1145/2089016.2089017">http://dx.doi.org/10.1145/2089016.2089017</a></td> |
5825 | | </tr> |
5826 | | |
5827 | | |
5828 | | </table></div><br><br> |
5829 | | |
5830 | | |
5831 | | |
5832 | | |
5833 | | <a class="EntryGoto" id="Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant"></a> |
5834 | | <b class="myheading" style="position: relative; left: 5%;">Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant</b> |
5835 | | |
5836 | | <div class="BibEntry"> |
5837 | | |
5838 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5839 | | |
5840 | | |
5841 | | <tr> |
5842 | | <td valign="top">Author</td> |
5843 | | <td valign="top">Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant</td> |
5844 | | </tr> |
5845 | | |
5846 | | <tr> |
5847 | | <td valign="top">Title</td> |
5848 | | <td valign="top">Cloudy Computing: Leveraging Weather Forecasts in Energy Harvesting Sensor Systems</td> |
5849 | | </tr> |
5850 | | |
5851 | | <tr> |
5852 | | <td valign="top">Booktitle</td> |
5853 | | <td valign="top">2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)</td> |
5854 | | </tr> |
5855 | | |
5856 | | <tr> |
5857 | | <td valign="top">Location</td> |
5858 | | <td valign="top">Boston, MA, USA</td> |
5859 | | </tr> |
5860 | | |
5861 | | <tr> |
5862 | | <td valign="top">Publisher</td> |
5863 | | <td valign="top">IEEE</td> |
5864 | | </tr> |
5865 | | |
5866 | | <tr> |
5867 | | <td valign="top">Year</td> |
5868 | | <td valign="top">2010</td> |
5869 | | </tr> |
5870 | | |
5871 | | <tr> |
5872 | | <td valign="top">Abstract</td> |
5873 | | <td valign="top">To sustain perpetual operation, systems that harvest environmental energy must carefully regulate their usage to satisfy their demand. Regulating energy usage is challenging if a system's demands are not elastic and its hardware components are not energy-proportional, since it cannot precisely scale its usage to match its supply. Instead, the system must choose when to satisfy its energy demands based on its current energy reserves and predictions of its future energy supply. In this paper, we explore the use of weather forecasts to improve a system's ability to satisfy demand by improving its predictions. We analyze weather forecast, observational, and energy harvesting data to formulate a model that translates a weather forecast to a wind or solar energy harvesting prediction, and quantify its accuracy. We evaluate our model for both energy sources in the context of two different energy harvesting sensor systems with inelastic demands: a sensor testbed that leases sensors to external users and a lexicographically fair sensor network that maintains steady node sensing rates. We show that using weather forecasts in both wind- and solar-powered sensor systems increases each system's ability to satisfy its demands compared with existing prediction strategies.</td> |
5874 | | </tr> |
5875 | | |
5876 | | |
5877 | | |
5878 | | <tr> |
5879 | | <td valign="top">DOI</td> |
5880 | | <td valign="top">10.1109/SECON.2010.5508260</td> |
5881 | | </tr> |
5882 | | |
5883 | | |
5884 | | |
5885 | | <tr> |
5886 | | <td valign="top">URL</td> |
5887 | | <td valign="top"><a href="http://dx.doi.org/10.1109/SECON.2010.5508260">http://dx.doi.org/10.1109/SECON.2010.5508260</a></td> |
5888 | | </tr> |
5889 | | |
5890 | | |
5891 | | </table></div><br><br> |
5892 | | |
5893 | | |
5894 | | |
5895 | | |
5896 | | <a class="EntryGoto" id="Shen, Haiying and Liu, Guoxin"></a> |
5897 | | <b class="myheading" style="position: relative; left: 5%;">Shen, Haiying and Liu, Guoxin</b> |
5898 | | |
5899 | | <div class="BibEntry"> |
5900 | | |
5901 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5902 | | |
5903 | | |
5904 | | <tr> |
5905 | | <td valign="top">Author</td> |
5906 | | <td valign="top">Shen, Haiying and Liu, Guoxin</td> |
5907 | | </tr> |
5908 | | |
5909 | | <tr> |
5910 | | <td valign="top">Title</td> |
5911 | | <td valign="top">Harmony: Integrated Resource and Reputation Management for Large-Scale Distributed Systems</td> |
5912 | | </tr> |
5913 | | |
5914 | | <tr> |
5915 | | <td valign="top">Booktitle</td> |
5916 | | <td valign="top">2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)</td> |
5917 | | </tr> |
5918 | | |
5919 | | <tr> |
5920 | | <td valign="top">Location</td> |
5921 | | <td valign="top">Lahaina, HI, USA</td> |
5922 | | </tr> |
5923 | | |
5924 | | <tr> |
5925 | | <td valign="top">Publisher</td> |
5926 | | <td valign="top">IEEE</td> |
5927 | | </tr> |
5928 | | |
5929 | | <tr> |
5930 | | <td valign="top">Year</td> |
5931 | | <td valign="top">2011</td> |
5932 | | </tr> |
5933 | | |
5934 | | <tr> |
5935 | | <td valign="top">Abstract</td> |
5936 | | <td valign="top">Advancements in technology over the past decade are leading to a promising future for large-scale distributed systems, where globally-scattered distributed resources are collectively pooled and used in a cooperative manner to achieve unprecedented petascale supercomputing capabilities. The issues of resource management (resMgt) and reputation management (repMgt) need to be addressed in order to ensure the successful deployment of large-scale distributed systems. However, these two issues have typically been addressed separately, despite the significant interdependencies between them: resMgt needs repMgt to provide a cooperative environment for resource sharing, and in turn facilitates repMgt to evaluate multi-faceted node reputations for providing different resources. Current repMgt methods provide a single reputation value for each node in providing all types of resources. However, a node willing to provide one resource may not be willing to provide another resource. In addition, current repMgt methods often guide node selection policy to select the highest-reputed nodes, which may overload these nodes. Also, few works exploited node reputation in resource selection in order to fully and fairly utilize resources in the system and to meet users' diverse QoS demands. We propose a system called Harmony that integrates resMgt and repMgt in a harmonious manner. Harmony incorporates two key innovations: integrated multi-faceted resource/reputation management and multi-QoS-oriented resource selection. The trace data we collected from an online trading platform confirms the importance of multi-faceted reputation and potential problems with highest-reputed node selection. Trace-driven experiments performed on PlanetLab show that Harmony outperforms existing resMgt and repMgt in terms of the success rate, service delay, and efficiency.</td> |
5937 | | </tr> |
5938 | | |
5939 | | |
5940 | | |
5941 | | <tr> |
5942 | | <td valign="top">DOI</td> |
5943 | | <td valign="top">10.1109/ICCCN.2011.6005739</td> |
5944 | | </tr> |
5945 | | |
5946 | | |
5947 | | |
5948 | | <tr> |
5949 | | <td valign="top">URL</td> |
5950 | | <td valign="top"><a href="http://dx.doi.org/10.1109/ICCCN.2011.6005739">http://dx.doi.org/10.1109/ICCCN.2011.6005739</a></td> |
5951 | | </tr> |
5952 | | |
5953 | | |
5954 | | </table></div><br><br> |
5955 | | |
5956 | | |
5957 | | |
5958 | | |
5959 | | <a class="EntryGoto" id="Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young"></a> |
5960 | | <b class="myheading" style="position: relative; left: 5%;">Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young</b> |
5961 | | |
5962 | | <div class="BibEntry"> |
5963 | | |
5964 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
5965 | | |
5966 | | |
5967 | | <tr> |
5968 | | <td valign="top">Author</td> |
5969 | | <td valign="top">Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young</td> |
5970 | | </tr> |
5971 | | |
5972 | | <tr> |
5973 | | <td valign="top">Title</td> |
5974 | | <td valign="top">Understanding the Performance of TCP and UDP-based Data Transfer Protocols using EMULAB</td> |
5975 | | </tr> |
5976 | | |
5977 | | <tr> |
5978 | | <td valign="top">Booktitle</td> |
5979 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
5980 | | </tr> |
5981 | | |
5982 | | <tr> |
5983 | | <td valign="top">Location</td> |
5984 | | <td valign="top">Los Angeles</td> |
5985 | | </tr> |
5986 | | |
5987 | | <tr> |
5988 | | <td valign="top">Year</td> |
5989 | | <td valign="top">2012</td> |
5990 | | </tr> |
5991 | | |
5992 | | <tr> |
5993 | | <td valign="top">Abstract</td> |
5994 | | <td valign="top">In this paper, we present a hands-on course project that explores the performance of data transfer protocols using a GENI resource. TCP is one of the key topics in networking courses, and understanding its behavior as well as limitations, from real experiments, offers an invaluable and deep learning experience. A protocol's performance is directly impacted by network parameters such as network bandwidth, delay and loss. However, it is difficult to control and even vary those parameters, if it is not evaluated with simulations. GENI facilities conveniently provide a virtual laboratory that enables us to control the network settings with real network systems. Through this educational project, students had an opportunity to control important network parameters, and measure and compare TCP's performance with a UDP-based data transfer protocol, UDT, using EMULAB. Students were enthusiastic to witness the protocols' performances, and the limitations of TCP under a high bandwidth delay product network in the presence of packet loss, and to recognize the importance of protocol design and system issues for the future Internet.</td> |
5995 | | </tr> |
5996 | | |
5997 | | |
5998 | | |
5999 | | |
6000 | | |
6001 | | |
6002 | | </table></div><br><br> |
6003 | | |
6004 | | |
6005 | | <div class="BibEntry"> |
6006 | | |
6007 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6008 | | |
6009 | | |
6010 | | <tr> |
6011 | | <td valign="top">Author</td> |
6012 | | <td valign="top">Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young</td> |
6013 | | </tr> |
6014 | | |
6015 | | <tr> |
6016 | | <td valign="top">Title</td> |
6017 | | <td valign="top">Understanding the Performance of TCP and UDP-based Data Transfer Protocols using EMULAB</td> |
6018 | | </tr> |
6019 | | |
6020 | | <tr> |
6021 | | <td valign="top">Booktitle</td> |
6022 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
6023 | | </tr> |
6024 | | |
6025 | | <tr> |
6026 | | <td valign="top">Location</td> |
6027 | | <td valign="top">Los Angeles</td> |
6028 | | </tr> |
6029 | | |
6030 | | <tr> |
6031 | | <td valign="top">Year</td> |
6032 | | <td valign="top">2012</td> |
6033 | | </tr> |
6034 | | |
6035 | | <tr> |
6036 | | <td valign="top">Abstract</td> |
6037 | | <td valign="top">In this paper, we present a hands-on course project that explores the performance of data transfer protocols using a GENI resource. TCP is one of the key topics in networking courses, and understanding its behavior as well as limitations, from real experiments, offers an invaluable and deep learning experience. A protocol's performance is directly impacted by network parameters such as network bandwidth, delay and loss. However, it is difficult to control and even vary those parameters, if it is not evaluated with simulations. GENI facilities conveniently provide a virtual laboratory that enables us to control the network settings with real network systems. Through this educational project, students had an opportunity to control important network parameters, and measure and compare TCP's performance with a UDP-based data transfer protocol, UDT, using EMULAB. Students were enthusiastic to witness the protocols' performances, and the limitations of TCP under a high bandwidth delay product network in the presence of packet loss, and to recognize the importance of protocol design and system issues for the future Internet.</td> |
6038 | | </tr> |
6039 | | |
6040 | | |
6041 | | |
6042 | | |
6043 | | |
6044 | | |
6045 | | </table></div><br><br> |
6046 | | |
6047 | | |
6048 | | |
6049 | | |
6050 | | <a class="EntryGoto" id="Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay"></a> |
6051 | | <b class="myheading" style="position: relative; left: 5%;">Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay</b> |
6052 | | |
6053 | | <div class="BibEntry"> |
6054 | | |
6055 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6056 | | |
6057 | | |
6058 | | <tr> |
6059 | | <td valign="top">Author</td> |
6060 | | <td valign="top">Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay</td> |
6061 | | </tr> |
6062 | | |
6063 | | <tr> |
6064 | | <td valign="top">Title</td> |
6065 | | <td valign="top">Closer to the Cloud - A Case for Emulating Cloud Dynamics by Controlling the Environment</td> |
6066 | | </tr> |
6067 | | |
6068 | | <tr> |
6069 | | <td valign="top">Booktitle</td> |
6070 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
6071 | | </tr> |
6072 | | |
6073 | | <tr> |
6074 | | <td valign="top">Location</td> |
6075 | | <td valign="top">Los Angeles</td> |
6076 | | </tr> |
6077 | | |
6078 | | <tr> |
6079 | | <td valign="top">Year</td> |
6080 | | <td valign="top">2012</td> |
6081 | | </tr> |
6082 | | |
6083 | | |
6084 | | |
6085 | | |
6086 | | |
6087 | | |
6088 | | </table></div><br><br> |
6089 | | |
6090 | | |
6091 | | <div class="BibEntry"> |
6092 | | |
6093 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6094 | | |
6095 | | |
6096 | | <tr> |
6097 | | <td valign="top">Author</td> |
6098 | | <td valign="top">Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay</td> |
6099 | | </tr> |
6100 | | |
6101 | | <tr> |
6102 | | <td valign="top">Title</td> |
6103 | | <td valign="top">Closer to the Cloud - A Case for Emulating Cloud Dynamics by Controlling the Environment</td> |
6104 | | </tr> |
6105 | | |
6106 | | <tr> |
6107 | | <td valign="top">Booktitle</td> |
6108 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
6109 | | </tr> |
6110 | | |
6111 | | <tr> |
6112 | | <td valign="top">Location</td> |
6113 | | <td valign="top">Los Angeles</td> |
6114 | | </tr> |
6115 | | |
6116 | | <tr> |
6117 | | <td valign="top">Year</td> |
6118 | | <td valign="top">2012</td> |
6119 | | </tr> |
6120 | | |
6121 | | |
6122 | | |
6123 | | |
6124 | | |
6125 | | |
6126 | | </table></div><br><br> |
6127 | | |
6128 | | |
6129 | | |
6130 | | |
6131 | | <a class="EntryGoto" id="Soroush, Hamed and Banerjee, Nilanjan and Corner, Mark and Levine, Brian and Lynn, Brian"></a> |
6132 | | <b class="myheading" style="position: relative; left: 5%;">Soroush, Hamed and Banerjee, Nilanjan and Corner, Mark and Levine, Brian and Lynn, Brian</b> |
6133 | | |
6134 | | <div class="BibEntry"> |
6135 | | |
6136 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6137 | | |
6138 | | |
6139 | | <tr> |
6140 | | <td valign="top">Author</td> |
6141 | | <td valign="top">Soroush, Hamed and Banerjee, Nilanjan and Corner, Mark and Levine, Brian and Lynn, Brian</td> |
6142 | | </tr> |
6143 | | |
6144 | | <tr> |
6145 | | <td valign="top">Title</td> |
6146 | | <td valign="top">A retrospective look at the UMass DOME mobile testbed</td> |
6147 | | </tr> |
6148 | | |
6149 | | <tr> |
6150 | | <td valign="top">Journal</td> |
6151 | | <td valign="top">SIGMOBILE Mob. Comput. Commun. Rev.</td> |
6152 | | </tr> |
6153 | | |
6154 | | <tr> |
6155 | | <td valign="top">Publisher</td> |
6156 | | <td valign="top">ACM</td> |
6157 | | </tr> |
6158 | | |
6159 | | <tr> |
6160 | | <td valign="top">Address</td> |
6161 | | <td valign="top">New York, NY, USA</td> |
6162 | | </tr> |
6163 | | |
6164 | | <tr> |
6165 | | <td valign="top">Year</td> |
6166 | | <td valign="top">2012</td> |
6167 | | </tr> |
6168 | | |
6169 | | <tr> |
6170 | | <td valign="top">Abstract</td> |
6171 | | <td valign="top">In this paper we describe the evolution of DOME, a diverse outdoor testbed for mobile experimentation. In addition, while highlighting the challenges faced in construction of DOME, we describe a concrete set of scientific results derived from this experience in a retrospective study. First, we argue that a broad range of mobility experiments could be performed in a testbed which provides the properties of temporal, technological, and spatial diversity. We demonstrate these properties in our testbed through analysis of data collected from DOME over a period of four years. Second, we crystallize a set of design principles that others should use when constructing testbeds of their own, including those related to deploying and managing a diverse testbed, distributing experiments remotely, and fostering collaborations among testbed stakeholders. Finally, using traces collected by DOME, we provide insights into several important problems in mobile systems research.</td> |
6172 | | </tr> |
6173 | | |
6174 | | |
6175 | | |
6176 | | <tr> |
6177 | | <td valign="top">DOI</td> |
6178 | | <td valign="top">10.1145/2169077.2169079</td> |
6179 | | </tr> |
6180 | | |
6181 | | |
6182 | | |
6183 | | <tr> |
6184 | | <td valign="top">URL</td> |
6185 | | <td valign="top"><a href="http://dx.doi.org/10.1145/2169077.2169079">http://dx.doi.org/10.1145/2169077.2169079</a></td> |
6186 | | </tr> |
6187 | | |
6188 | | |
6189 | | </table></div><br><br> |
6190 | | |
6191 | | |
6192 | | |
6193 | | |
6194 | | <a class="EntryGoto" id="Sridharan, Mukundan and Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex"></a> |
6195 | | <b class="myheading" style="position: relative; left: 5%;">Sridharan, Mukundan and Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex</b> |
6196 | | |
6197 | | <div class="BibEntry"> |
6198 | | |
6199 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6200 | | |
6201 | | |
6202 | | <tr> |
6203 | | <td valign="top">Author</td> |
6204 | | <td valign="top">Sridharan, Mukundan and Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex</td> |
6205 | | </tr> |
6206 | | |
6207 | | <tr> |
6208 | | <td valign="top">Title</td> |
6209 | | <td valign="top">Defragmentation of Resources in Virtual Desktop Clouds for Cost-Aware Utility-Optimal Allocation</td> |
6210 | | </tr> |
6211 | | |
6212 | | <tr> |
6213 | | <td valign="top">Booktitle</td> |
6214 | | <td valign="top">2011 Fourth IEEE International Conference on Utility and Cloud Computing</td> |
6215 | | </tr> |
6216 | | |
6217 | | <tr> |
6218 | | <td valign="top">Location</td> |
6219 | | <td valign="top">Melbourne, Australia</td> |
6220 | | </tr> |
6221 | | |
6222 | | <tr> |
6223 | | <td valign="top">Publisher</td> |
6224 | | <td valign="top">IEEE</td> |
6225 | | </tr> |
6226 | | |
6227 | | <tr> |
6228 | | <td valign="top">Year</td> |
6229 | | <td valign="top">2011</td> |
6230 | | </tr> |
6231 | | |
6232 | | <tr> |
6233 | | <td valign="top">Abstract</td> |
6234 | | <td valign="top">Cloud Service Providers (CSPs) make virtual desktop cloud (VDC) resource provisioning decisions within desktop pools based on user groups and their application profiles. Such provisioning is aimed to satisfy acceptable user quality of experience (QoE) levels and is coupled with subsequent placement of VDs across distributed data centers. The placement decisions are influenced by session latency, load balancing and operation cost constraints. In this paper, we identify the resource fragmentation problem that occurs when placement is done opportunistically to minimize provisioning time and deliver satisfactory user QoE. To solve this problem, which inherently is an NP-Hard problem, we propose a defragmentation scheme that has fast convergence time and has three levels of complexity: (i) ütility fair provisioning ̈(UFP) to optimize resource provisioning within a data center - to achieve relative fairness between desktop pools, (ii) s̈tatic migration-free utility optimal placement and provisioning ̈(MUPP) to optimize resource provisioning between multiple data centers - to improve performance, and (iii) d̈ynamic global utility optimal placement and provisioning ̈(GUPP) to optimize resource provisioning using cost-aware and utility-maximal VD re-allocations and migrations - to increase scalability. We evaluate our defragmentation scheme against 'least latency', 'least load', and 'least cost' schemes using a novel V̈DC-Sim ̈simulator that we have developed in this study. Our simulations leverage profiles of user groups and their applications within desktop pools, obtained from a real VDC test bed. Our simulation results demonstrate that defragmentation is an important optimization step that can enable CSPs to achieve fairness, substantially improve user QoE and increase VDC scalability.</td> |
6235 | | </tr> |
6236 | | |
6237 | | |
6238 | | |
6239 | | <tr> |
6240 | | <td valign="top">DOI</td> |
6241 | | <td valign="top">10.1109/UCC.2011.41</td> |
6242 | | </tr> |
6243 | | |
6244 | | |
6245 | | |
6246 | | <tr> |
6247 | | <td valign="top">URL</td> |
6248 | | <td valign="top"><a href="http://dx.doi.org/10.1109/UCC.2011.41">http://dx.doi.org/10.1109/UCC.2011.41</a></td> |
6249 | | </tr> |
6250 | | |
6251 | | |
6252 | | </table></div><br><br> |
6253 | | |
6254 | | |
6255 | | |
6256 | | |
6257 | | <a class="EntryGoto" id="Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish"></a> |
6258 | | <b class="myheading" style="position: relative; left: 5%;">Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish</b> |
6259 | | |
6260 | | <div class="BibEntry"> |
6261 | | |
6262 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6263 | | |
6264 | | |
6265 | | <tr> |
6266 | | <td valign="top">Author</td> |
6267 | | <td valign="top">Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish</td> |
6268 | | </tr> |
6269 | | |
6270 | | <tr> |
6271 | | <td valign="top">Title</td> |
6272 | | <td valign="top">From Kansei to KanseiGenie: Architecture of Federated, Programmable Wireless Sensor Fabrics</td> |
6273 | | </tr> |
6274 | | |
6275 | | <tr> |
6276 | | <td valign="top">Journal</td> |
6277 | | <td valign="top">Proceedings of the ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)</td> |
6278 | | </tr> |
6279 | | |
6280 | | <tr> |
6281 | | <td valign="top">Year</td> |
6282 | | <td valign="top">2010</td> |
6283 | | </tr> |
6284 | | |
6285 | | <tr> |
6286 | | <td valign="top">Abstract</td> |
6287 | | <td valign="top">This paper deals with challenges in federating wireless sensing fabrics. Federations of this sort are currently being developed in next generation global end-to-end experimentation infrastructures, such as GENI, to support rapid prototyping and hi-fidelity validation of protocols and applications. On one hand, federation should support access to diverse (and potentially provider-specific) wireless sensor resources and, on the other, it should enable users to uniformly task these resources. Instead of more simple basing federation upon a standard description of resources, we propose an architecture where the ontology of resource description can vary across providers, and a mapping of user needs to resources is performed to achieve uniform tasking. We illustrate one realization of this architecture, in terms of our refactoring the Kansei testbed to become the KanseiGenie federated fabric manager, which has full support for programmability, sliceability, and federated experimentation over heterogeneous sensing fabrics.</td> |
6288 | | </tr> |
6289 | | |
6290 | | |
6291 | | |
6292 | | |
6293 | | |
6294 | | |
6295 | | </table></div><br><br> |
6296 | | |
6297 | | |
6298 | | <div class="BibEntry"> |
6299 | | |
6300 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6301 | | |
6302 | | |
6303 | | <tr> |
6304 | | <td valign="top">Author</td> |
6305 | | <td valign="top">Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish</td> |
6306 | | </tr> |
6307 | | |
6308 | | <tr> |
6309 | | <td valign="top">Title</td> |
6310 | | <td valign="top">From Kansei to KanseiGenie: Architecture of Federated, Programmable Wireless Sensor Fabrics</td> |
6311 | | </tr> |
6312 | | |
6313 | | <tr> |
6314 | | <td valign="top">Journal</td> |
6315 | | <td valign="top">Proceedings of the ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)</td> |
6316 | | </tr> |
6317 | | |
6318 | | <tr> |
6319 | | <td valign="top">Year</td> |
6320 | | <td valign="top">2010</td> |
6321 | | </tr> |
6322 | | |
6323 | | <tr> |
6324 | | <td valign="top">Abstract</td> |
6325 | | <td valign="top">This paper deals with challenges in federating wireless sensing fabrics. Federations of this sort are currently being developed in next generation global end-to-end experimentation infrastructures, such as GENI, to support rapid prototyping and hi-fidelity validation of protocols and applications. On one hand, federation should support access to diverse (and potentially provider-specific) wireless sensor resources and, on the other, it should enable users to uniformly task these resources. Instead of more simple basing federation upon a standard description of resources, we propose an architecture where the ontology of resource description can vary across providers, and a mapping of user needs to resources is performed to achieve uniform tasking. We illustrate one realization of this architecture, in terms of our refactoring the Kansei testbed to become the KanseiGenie federated fabric manager, which has full support for programmability, sliceability, and federated experimentation over heterogeneous sensing fabrics.</td> |
6326 | | </tr> |
6327 | | |
6328 | | |
6329 | | |
6330 | | |
6331 | | |
6332 | | |
6333 | | </table></div><br><br> |
6334 | | |
6335 | | |
6336 | | |
6337 | | |
6338 | | <a class="EntryGoto" id="Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching"></a> |
6339 | | <b class="myheading" style="position: relative; left: 5%;">Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching</b> |
6340 | | |
6341 | | <div class="BibEntry"> |
6342 | | |
6343 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6344 | | |
6345 | | |
6346 | | <tr> |
6347 | | <td valign="top">Author</td> |
6348 | | <td valign="top">Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching</td> |
6349 | | </tr> |
6350 | | |
6351 | | <tr> |
6352 | | <td valign="top">Title</td> |
6353 | | <td valign="top">OneCloud: Controlling the Network in an OpenFlow Cloud</td> |
6354 | | </tr> |
6355 | | |
6356 | | <tr> |
6357 | | <td valign="top">Booktitle</td> |
6358 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
6359 | | </tr> |
6360 | | |
6361 | | <tr> |
6362 | | <td valign="top">Location</td> |
6363 | | <td valign="top">Los Angeles</td> |
6364 | | </tr> |
6365 | | |
6366 | | <tr> |
6367 | | <td valign="top">Year</td> |
6368 | | <td valign="top">2012</td> |
6369 | | </tr> |
6370 | | |
6371 | | <tr> |
6372 | | <td valign="top">Abstract</td> |
6373 | | <td valign="top">Cloud computing is an emerging paradigm for on-demand access to computing resources over the network. Beyond early Software as a Service (SaaS) offerings, there is an increasing interest in the Infrastructure as a Service (IaaS) model where users request specific storage, networking, and computing resources to meet their application needs. To provision the network in a cloud, IaaS providers, such as the Amazon Web Services, allow users to choose their IP addresses, which can be associated with a dynamic set of virtual hosts (Elastic IP) with VPN, dynamic DNS, and dynamic firewall services. In this paper, we analyze a range of cloud network provisioning needs and the means to realize them in an OpenFlow network. We present an OpenFlow enabled framework for cloud network provisioning, based on the Open- Nebula cloud provisioning engine. Specifically, we demonstrate an Elastic IP service compatible with the Amazon Elastic Compute Cloud (EC2) API. This demonstration is available on the Clemson OneCloud IaaS offering. Ongoing efforts focus on the enablement of additional cloud network services for campus networks and wide area experimental networks like the National Science Foundation's GENI network.</td> |
6374 | | </tr> |
6375 | | |
6376 | | |
6377 | | |
6378 | | |
6379 | | |
6380 | | |
6381 | | </table></div><br><br> |
6382 | | |
6383 | | |
6384 | | <div class="BibEntry"> |
6385 | | |
6386 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6387 | | |
6388 | | |
6389 | | <tr> |
6390 | | <td valign="top">Author</td> |
6391 | | <td valign="top">Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching</td> |
6392 | | </tr> |
6393 | | |
6394 | | <tr> |
6395 | | <td valign="top">Title</td> |
6396 | | <td valign="top">OneCloud: Controlling the Network in an OpenFlow Cloud</td> |
6397 | | </tr> |
6398 | | |
6399 | | <tr> |
6400 | | <td valign="top">Booktitle</td> |
6401 | | <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td> |
6402 | | </tr> |
6403 | | |
6404 | | <tr> |
6405 | | <td valign="top">Location</td> |
6406 | | <td valign="top">Los Angeles</td> |
6407 | | </tr> |
6408 | | |
6409 | | <tr> |
6410 | | <td valign="top">Year</td> |
6411 | | <td valign="top">2012</td> |
6412 | | </tr> |
6413 | | |
6414 | | <tr> |
6415 | | <td valign="top">Abstract</td> |
6416 | | <td valign="top">Cloud computing is an emerging paradigm for on-demand access to computing resources over the network. Beyond early Software as a Service (SaaS) offerings, there is an increasing interest in the Infrastructure as a Service (IaaS) model where users request specific storage, networking, and computing resources to meet their application needs. To provision the network in a cloud, IaaS providers, such as the Amazon Web Services, allow users to choose their IP addresses, which can be associated with a dynamic set of virtual hosts (Elastic IP) with VPN, dynamic DNS, and dynamic firewall services. In this paper, we analyze a range of cloud network provisioning needs and the means to realize them in an OpenFlow network. We present an OpenFlow enabled framework for cloud network provisioning, based on the Open- Nebula cloud provisioning engine. Specifically, we demonstrate an Elastic IP service compatible with the Amazon Elastic Compute Cloud (EC2) API. This demonstration is available on the Clemson OneCloud IaaS offering. Ongoing efforts focus on the enablement of additional cloud network services for campus networks and wide area experimental networks like the National Science Foundation's GENI network.</td> |
6417 | | </tr> |
6418 | | |
6419 | | |
6420 | | |
6421 | | |
6422 | | |
6423 | | |
6424 | | </table></div><br><br> |
6425 | | |
6426 | | |
6427 | | |
6428 | | |
6429 | | <a class="EntryGoto" id="Stabler, Greg and Rosen, Aaron and Goasguen, Sebastien and Wang, Kuang-Ching"></a> |
6430 | | <b class="myheading" style="position: relative; left: 5%;">Stabler, Greg and Rosen, Aaron and Goasguen, Sebastien and Wang, Kuang-Ching</b> |
6431 | | |
6432 | | <div class="BibEntry"> |
6433 | | |
6434 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6435 | | |
6436 | | |
6437 | | <tr> |
6438 | | <td valign="top">Author</td> |
6439 | | <td valign="top">Stabler, Greg and Rosen, Aaron and Goasguen, Sebastien and Wang, Kuang-Ching</td> |
6440 | | </tr> |
6441 | | |
6442 | | <tr> |
6443 | | <td valign="top">Title</td> |
6444 | | <td valign="top">Elastic IP and security groups implementation using OpenFlow</td> |
6445 | | </tr> |
6446 | | |
6447 | | <tr> |
6448 | | <td valign="top">Booktitle</td> |
6449 | | <td valign="top">Proceedings of the 6th international workshop on Virtualization Technologies in Distributed Computing Date</td> |
6450 | | </tr> |
6451 | | |
6452 | | <tr> |
6453 | | <td valign="top">Location</td> |
6454 | | <td valign="top">Delft, The Netherlands</td> |
6455 | | </tr> |
6456 | | |
6457 | | <tr> |
6458 | | <td valign="top">Publisher</td> |
6459 | | <td valign="top">ACM</td> |
6460 | | </tr> |
6461 | | |
6462 | | <tr> |
6463 | | <td valign="top">Address</td> |
6464 | | <td valign="top">New York, NY, USA</td> |
6465 | | </tr> |
6466 | | |
6467 | | <tr> |
6468 | | <td valign="top">Year</td> |
6469 | | <td valign="top">2012</td> |
6470 | | </tr> |
6471 | | |
6472 | | |
6473 | | |
6474 | | <tr> |
6475 | | <td valign="top">DOI</td> |
6476 | | <td valign="top">10.1145/2287056.2287069</td> |
6477 | | </tr> |
6478 | | |
6479 | | |
6480 | | |
6481 | | <tr> |
6482 | | <td valign="top">URL</td> |
6483 | | <td valign="top"><a href="http://doi.acm.org/10.1145/2287056.2287069">http://doi.acm.org/10.1145/2287056.2287069</a></td> |
6484 | | </tr> |
6485 | | |
6486 | | |
6487 | | </table></div><br><br> |
6488 | | |
6489 | | |
6490 | | |
6491 | | |
6492 | | <a class="EntryGoto" id="Sterbenz, J. P. G. and Egemen and Hameed, M. A. and Jabbar, A. and Rohrer, J. P."></a> |
6493 | | <b class="myheading" style="position: relative; left: 5%;">Sterbenz, J. P. G. and Egemen and Hameed, M. A. and Jabbar, A. and Rohrer, J. P.</b> |
6494 | | |
6495 | | <div class="BibEntry"> |
6496 | | |
6497 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6498 | | |
6499 | | |
6500 | | <tr> |
6501 | | <td valign="top">Author</td> |
6502 | | <td valign="top">Sterbenz, J. P. G. and Egemen and Hameed, M. A. and Jabbar, A. and Rohrer, J. P.</td> |
6503 | | </tr> |
6504 | | |
6505 | | <tr> |
6506 | | <td valign="top">Title</td> |
6507 | | <td valign="top">Modelling and analysis of network resilience</td> |
6508 | | </tr> |
6509 | | |
6510 | | <tr> |
6511 | | <td valign="top">Booktitle</td> |
6512 | | <td valign="top">2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)</td> |
6513 | | </tr> |
6514 | | |
6515 | | <tr> |
6516 | | <td valign="top">Location</td> |
6517 | | <td valign="top">Bangalore</td> |
6518 | | </tr> |
6519 | | |
6520 | | <tr> |
6521 | | <td valign="top">Publisher</td> |
6522 | | <td valign="top">IEEE</td> |
6523 | | </tr> |
6524 | | |
6525 | | <tr> |
6526 | | <td valign="top">Year</td> |
6527 | | <td valign="top">2011</td> |
6528 | | </tr> |
6529 | | |
6530 | | <tr> |
6531 | | <td valign="top">Abstract</td> |
6532 | | <td valign="top">As the Internet becomes increasingly important to all aspects of society, the consequences of disruption become increasingly severe. Thus it is critical to increase the resilience and survivability of the future network. We define resilience as the ability of the network to provide desired service even when challenged by attacks, large-scale disasters, and other failures. This paper describes a comprehensive methodology to evaluate network resilience using a combination of analytical and simulation techniques with the goal of improving the resilience and survivability of the Future Internet.</td> |
6533 | | </tr> |
6534 | | |
6535 | | |
6536 | | |
6537 | | <tr> |
6538 | | <td valign="top">DOI</td> |
6539 | | <td valign="top">10.1109/COMSNETS.2011.5716502</td> |
6540 | | </tr> |
6541 | | |
6542 | | |
6543 | | |
6544 | | <tr> |
6545 | | <td valign="top">URL</td> |
6546 | | <td valign="top"><a href="http://dx.doi.org/10.1109/COMSNETS.2011.5716502">http://dx.doi.org/10.1109/COMSNETS.2011.5716502</a></td> |
6547 | | </tr> |
6548 | | |
6549 | | |
6550 | | </table></div><br><br> |
6551 | | |
6552 | | |
6553 | | |
6554 | | |
6555 | | <a class="EntryGoto" id="Sterbenz, James P. G. and Çetinkaya, Egemen K. and Hameed, Mahmood A. and Jabbar, Abdul and Qian, Shi and Rohrer, Justin P."></a> |
6556 | | <b class="myheading" style="position: relative; left: 5%;">Sterbenz, James P. G. and Çetinkaya, Egemen K. and Hameed, Mahmood A. and Jabbar, Abdul and Qian, Shi and Rohrer, Justin P.</b> |
6557 | | |
6558 | | <div class="BibEntry"> |
6559 | | |
6560 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6561 | | |
6562 | | |
6563 | | <tr> |
6564 | | <td valign="top">Author</td> |
6565 | | <td valign="top">Sterbenz, James P. G. and Çetinkaya, Egemen K. and Hameed, Mahmood A. and Jabbar, Abdul and Qian, Shi and Rohrer, Justin P.</td> |
6566 | | </tr> |
6567 | | |
6568 | | <tr> |
6569 | | <td valign="top">Title</td> |
6570 | | <td valign="top">Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation</td> |
6571 | | </tr> |
6572 | | |
6573 | | <tr> |
6574 | | <td valign="top">Journal</td> |
6575 | | <td valign="top">Telecommunication Systems</td> |
6576 | | </tr> |
6577 | | |
6578 | | <tr> |
6579 | | <td valign="top">Publisher</td> |
6580 | | <td valign="top">Springer Netherlands</td> |
6581 | | </tr> |
6582 | | |
6583 | | <tr> |
6584 | | <td valign="top">Year</td> |
6585 | | <td valign="top">2011</td> |
6586 | | </tr> |
6587 | | |
6588 | | <tr> |
6589 | | <td valign="top">Abstract</td> |
6590 | | <td valign="top">As the Internet becomes increasingly important to all aspects of society, the consequences of disruption become increasingly severe. Thus it is critical to increase the resilience and survivability of future networks. We define resilience as the ability of the network to provide desired service even when challenged by attacks, large-scale disasters, and other failures. This paper describes a comprehensive methodology to evaluate network resilience using a combination of topology generation, analytical, simulation, and experimental emulation techniques with the goal of improving the resilience and survivability of the Future Internet.</td> |
6591 | | </tr> |
6592 | | |
6593 | | |
6594 | | |
6595 | | <tr> |
6596 | | <td valign="top">DOI</td> |
6597 | | <td valign="top">10.1007/s11235-011-9573-6</td> |
6598 | | </tr> |
6599 | | |
6600 | | |
6601 | | |
6602 | | <tr> |
6603 | | <td valign="top">URL</td> |
6604 | | <td valign="top"><a href="http://dx.doi.org/10.1007/s11235-011-9573-6">http://dx.doi.org/10.1007/s11235-011-9573-6</a></td> |
6605 | | </tr> |
6606 | | |
6607 | | |
6608 | | </table></div><br><br> |
6609 | | |
6610 | | |
6611 | | |
6612 | | |
6613 | | <a class="EntryGoto" id="Sydney, A. and Nutaro, J. and Scoglio, C. and Gruenbacher, D. and Schulz, N."></a> |
6614 | | <b class="myheading" style="position: relative; left: 5%;">Sydney, A. and Nutaro, J. and Scoglio, C. and Gruenbacher, D. and Schulz, N.</b> |
6615 | | |
6616 | | <div class="BibEntry"> |
6617 | | |
6618 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6619 | | |
6620 | | |
6621 | | <tr> |
6622 | | <td valign="top">Author</td> |
6623 | | <td valign="top">Sydney, A. and Nutaro, J. and Scoglio, C. and Gruenbacher, D. and Schulz, N.</td> |
6624 | | </tr> |
6625 | | |
6626 | | <tr> |
6627 | | <td valign="top">Title</td> |
6628 | | <td valign="top">Simulative Comparison of Multiprotocol Label Switching and OpenFlow Network Technologies for Transmission Operations</td> |
6629 | | </tr> |
6630 | | |
6631 | | <tr> |
6632 | | <td valign="top">Journal</td> |
6633 | | <td valign="top">Smart Grid, IEEE Transactions on</td> |
6634 | | </tr> |
6635 | | |
6636 | | <tr> |
6637 | | <td valign="top">Year</td> |
6638 | | <td valign="top">2013</td> |
6639 | | </tr> |
6640 | | |
6641 | | |
6642 | | |
6643 | | <tr> |
6644 | | <td valign="top">DOI</td> |
6645 | | <td valign="top">10.1109/TSG.2012.2227516</td> |
6646 | | </tr> |
6647 | | |
6648 | | |
6649 | | |
6650 | | <tr> |
6651 | | <td valign="top">URL</td> |
6652 | | <td valign="top"><a href="http://dx.doi.org/10.1109/TSG.2012.2227516">http://dx.doi.org/10.1109/TSG.2012.2227516</a></td> |
6653 | | </tr> |
6654 | | |
6655 | | |
6656 | | </table></div><br><br> |
6657 | | |
6658 | | |
6659 | | |
6660 | | |
6661 | | <a class="EntryGoto" id="Sydney, Ali"></a> |
6662 | | <b class="myheading" style="position: relative; left: 5%;">Sydney, Ali</b> |
6663 | | |
6664 | | <div class="BibEntry"> |
6665 | | |
6666 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6667 | | |
6668 | | |
6669 | | <tr> |
6670 | | <td valign="top">Author</td> |
6671 | | <td valign="top">Sydney, Ali</td> |
6672 | | </tr> |
6673 | | |
6674 | | <tr> |
6675 | | <td valign="top">Title</td> |
6676 | | <td valign="top">The evaluation of software defined networking for communication and control of cyber physical systems</td> |
6677 | | </tr> |
6678 | | |
6679 | | <tr> |
6680 | | <td valign="top">Year</td> |
6681 | | <td valign="top">2013</td> |
6682 | | </tr> |
6683 | | |
6684 | | |
6685 | | |
6686 | | |
6687 | | |
6688 | | <tr> |
6689 | | <td valign="top">URL</td> |
6690 | | <td valign="top"><a href="http://hdl.handle.net/2097/15577">http://hdl.handle.net/2097/15577</a></td> |
6691 | | </tr> |
6692 | | |
6693 | | |
6694 | | </table></div><br><br> |
6695 | | |
6696 | | |
6697 | | |
6698 | | |
6699 | | <a class="EntryGoto" id="Teerapittayanon, Surat and Fouli, Kerim and Médard, Muriel and Montpetit, Marie-José and Shi, Xiaomeng and Seskar, Ivan and Gosain, Abhimanyu"></a> |
6700 | | <b class="myheading" style="position: relative; left: 5%;">Teerapittayanon, Surat and Fouli, Kerim and Médard, Muriel and Montpetit, Marie-José and Shi, Xiaomeng and Seskar, Ivan and Gosain, Abhimanyu</b> |
6701 | | |
6702 | | <div class="BibEntry"> |
6703 | | |
6704 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6705 | | |
6706 | | |
6707 | | <tr> |
6708 | | <td valign="top">Author</td> |
6709 | | <td valign="top">Teerapittayanon, Surat and Fouli, Kerim and Médard, Muriel and Montpetit, Marie-José and Shi, Xiaomeng and Seskar, Ivan and Gosain, Abhimanyu</td> |
6710 | | </tr> |
6711 | | |
6712 | | <tr> |
6713 | | <td valign="top">Title</td> |
6714 | | <td valign="top">Network Coding as a WiMAX Link Reliability Mechanism</td> |
6715 | | </tr> |
6716 | | |
6717 | | <tr> |
6718 | | <td valign="top">Booktitle</td> |
6719 | | <td valign="top">Multiple Access Communications</td> |
6720 | | </tr> |
6721 | | |
6722 | | <tr> |
6723 | | <td valign="top">Publisher</td> |
6724 | | <td valign="top">Springer Berlin Heidelberg</td> |
6725 | | </tr> |
6726 | | |
6727 | | <tr> |
6728 | | <td valign="top">Year</td> |
6729 | | <td valign="top">2012</td> |
6730 | | </tr> |
6731 | | |
6732 | | <tr> |
6733 | | <td valign="top">Abstract</td> |
6734 | | <td valign="top">We design and implement a network-coding-enabled relia- bility architecture for next generation wireless networks. Our network coding (NC) architecture uses a flexible thread-based design, with each encoder-decoder instance applying systematic intra-session random lin- ear network coding as a packet erasure code at the IP layer. Using GENI WiMAX platforms, a series of point-to-point transmission experiments were conducted to compare the performance of the NC architecture to that of the Automatic Repeated reQuest (ARQ) and Hybrid ARQ (HARQ) mechanisms. In our scenarios, the proposed architecture is able to decrease packet loss from around 11-32% to nearly 0%; compared to HARQ and joint HARQ/ARQ mechanisms, the NC architecture offers up to 5.9 times gain in throughput and 5.5 times reduction in end-to- end file transfer delay. By establishing NC as a potential substitute for HARQ/ARQ, our experiments offer important insights into cross-layer designs of next generation wireless networks.</td> |
6735 | | </tr> |
6736 | | |
6737 | | |
6738 | | |
6739 | | <tr> |
6740 | | <td valign="top">DOI</td> |
6741 | | <td valign="top">10.1007/978-3-642-34976-8_1</td> |
6742 | | </tr> |
6743 | | |
6744 | | |
6745 | | |
6746 | | <tr> |
6747 | | <td valign="top">URL</td> |
6748 | | <td valign="top"><a href="http://dx.doi.org/10.1007/978-3-642-34976-8_1">http://dx.doi.org/10.1007/978-3-642-34976-8_1</a></td> |
6749 | | </tr> |
6750 | | |
6751 | | |
6752 | | </table></div><br><br> |
6753 | | |
6754 | | |
6755 | | <div class="BibEntry"> |
6756 | | |
6757 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6758 | | |
6759 | | |
6760 | | <tr> |
6761 | | <td valign="top">Author</td> |
6762 | | <td valign="top">Teerapittayanon, Surat and Fouli, Kerim and Médard, Muriel and Montpetit, Marie-José and Shi, Xiaomeng and Seskar, Ivan and Gosain, Abhimanyu</td> |
6763 | | </tr> |
6764 | | |
6765 | | <tr> |
6766 | | <td valign="top">Title</td> |
6767 | | <td valign="top">Network Coding as a WiMAX Link Reliability Mechanism</td> |
6768 | | </tr> |
6769 | | |
6770 | | <tr> |
6771 | | <td valign="top">Booktitle</td> |
6772 | | <td valign="top">Multiple Access Communications</td> |
6773 | | </tr> |
6774 | | |
6775 | | <tr> |
6776 | | <td valign="top">Publisher</td> |
6777 | | <td valign="top">Springer Berlin Heidelberg</td> |
6778 | | </tr> |
6779 | | |
6780 | | <tr> |
6781 | | <td valign="top">Year</td> |
6782 | | <td valign="top">2012</td> |
6783 | | </tr> |
6784 | | |
6785 | | <tr> |
6786 | | <td valign="top">Abstract</td> |
6787 | | <td valign="top">We design and implement a network-coding-enabled relia- bility architecture for next generation wireless networks. Our network coding (NC) architecture uses a flexible thread-based design, with each encoder-decoder instance applying systematic intra-session random lin- ear network coding as a packet erasure code at the IP layer. Using GENI WiMAX platforms, a series of point-to-point transmission experiments were conducted to compare the performance of the NC architecture to that of the Automatic Repeated reQuest (ARQ) and Hybrid ARQ (HARQ) mechanisms. In our scenarios, the proposed architecture is able to decrease packet loss from around 11-32% to nearly 0%; compared to HARQ and joint HARQ/ARQ mechanisms, the NC architecture offers up to 5.9 times gain in throughput and 5.5 times reduction in end-to- end file transfer delay. By establishing NC as a potential substitute for HARQ/ARQ, our experiments offer important insights into cross-layer designs of next generation wireless networks.</td> |
6788 | | </tr> |
6789 | | |
6790 | | |
6791 | | |
6792 | | <tr> |
6793 | | <td valign="top">DOI</td> |
6794 | | <td valign="top">10.1007/978-3-642-34976-8_1</td> |
6795 | | </tr> |
6796 | | |
6797 | | |
6798 | | |
6799 | | <tr> |
6800 | | <td valign="top">URL</td> |
6801 | | <td valign="top"><a href="http://dx.doi.org/10.1007/978-3-642-34976-8_1">http://dx.doi.org/10.1007/978-3-642-34976-8_1</a></td> |
6802 | | </tr> |
6803 | | |
6804 | | |
6805 | | </table></div><br><br> |
6806 | | |
6807 | | |
6808 | | |
6809 | | |
6810 | | <a class="EntryGoto" id="Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark"></a> |
6811 | | <b class="myheading" style="position: relative; left: 5%;">Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark</b> |
6812 | | |
6813 | | <div class="BibEntry"> |
6814 | | |
6815 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6816 | | |
6817 | | |
6818 | | <tr> |
6819 | | <td valign="top">Author</td> |
6820 | | <td valign="top">Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark</td> |
6821 | | </tr> |
6822 | | |
6823 | | <tr> |
6824 | | <td valign="top">Title</td> |
6825 | | <td valign="top">A Passive Measurement System for Network Testbeds</td> |
6826 | | </tr> |
6827 | | |
6828 | | <tr> |
6829 | | <td valign="top">Booktitle</td> |
6830 | | <td valign="top">8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2012)</td> |
6831 | | </tr> |
6832 | | |
6833 | | <tr> |
6834 | | <td valign="top">Year</td> |
6835 | | <td valign="top">2012</td> |
6836 | | </tr> |
6837 | | |
6838 | | <tr> |
6839 | | <td valign="top">Abstract</td> |
6840 | | <td valign="top">The ability to capture and process packet-level data is of intrinsic importance in network testbeds that offer broad experimental capabilities to researchers. In this paper we describe the design and implementation of a passive measurement system for network testbeds called GIMS. The system enables users to specify and centrally manage packet capture on a set of dedicated measurement nodes deployed on links in a distributed testbed. The first component of GIMS is a scalable experiment management system that coordinates multi-tenant access to measurement nodes through a web-based user interface. The second component of GIMS is a node management system that enables \\\\em (i) local processing on packets (\\\\em e.g., flow aggregation and sampling), \\\\em (ii) meta-data to be added to captured packets (\\\\em e.g., timestamps), \\\\em (iii) packet anonymization per local security policy, and \\\\em (iv) flexible data storage including transfer to remote archives. We demonstrate the capabilities of GIMS through a set of micro-benchmarks that specifically highlight the performance of the node management system deployed on a commodity workstation. Our implementations are openly available to the community and our development efforts are on-going.</td> |
6841 | | </tr> |
6842 | | |
6843 | | |
6844 | | |
6845 | | |
6846 | | |
6847 | | |
6848 | | </table></div><br><br> |
6849 | | |
6850 | | |
6851 | | |
6852 | | |
6853 | | <a class="EntryGoto" id="Tiako, Pierre F."></a> |
6854 | | <b class="myheading" style="position: relative; left: 5%;">Tiako, Pierre F.</b> |
6855 | | |
6856 | | <div class="BibEntry"> |
6857 | | |
6858 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6859 | | |
6860 | | |
6861 | | <tr> |
6862 | | <td valign="top">Author</td> |
6863 | | <td valign="top">Tiako, Pierre F.</td> |
6864 | | </tr> |
6865 | | |
6866 | | <tr> |
6867 | | <td valign="top">Title</td> |
6868 | | <td valign="top">Perspectives of delegation in team-based distributed software development over the GENI infrastructure (NIER track)</td> |
6869 | | </tr> |
6870 | | |
6871 | | <tr> |
6872 | | <td valign="top">Booktitle</td> |
6873 | | <td valign="top">Proceedings of the 33rd International Conference on Software Engineering</td> |
6874 | | </tr> |
6875 | | |
6876 | | <tr> |
6877 | | <td valign="top">Location</td> |
6878 | | <td valign="top">Waikiki, Honolulu, HI, USA</td> |
6879 | | </tr> |
6880 | | |
6881 | | <tr> |
6882 | | <td valign="top">Publisher</td> |
6883 | | <td valign="top">ACM</td> |
6884 | | </tr> |
6885 | | |
6886 | | <tr> |
6887 | | <td valign="top">Address</td> |
6888 | | <td valign="top">New York, NY, USA</td> |
6889 | | </tr> |
6890 | | |
6891 | | <tr> |
6892 | | <td valign="top">Year</td> |
6893 | | <td valign="top">2011</td> |
6894 | | </tr> |
6895 | | |
6896 | | <tr> |
6897 | | <td valign="top">Abstract</td> |
6898 | | <td valign="top">Team-based distributed software development (TBDSD) is one of the single biggest challenges facing software companies. The need to manage development efforts and resources in different locations increase the complexity and cost of modern day software development. Current software development environments do not provide suitable support to delegate task among teams with appropriate directives. TBDSD is also limited to the current internet capabilities. One of the resulting problems is the difficulty to delegate and control tasks assigned among remote teams. This paper proposes (1) a new framework for delegation in TBDSD, and (2) perspectives for deploying Process-centered Software Engineering Environments (PSEE) over the Global Environment for Network Innovations (GENI) infrastructure. GENI, the 'future Internet' that is taking shape in prototypes across the US, will allow, in the context of our study, to securely access and share software artifacts, resources, and tools as never before seen over the current Internet.</td> |
6899 | | </tr> |
6900 | | |
6901 | | |
6902 | | |
6903 | | <tr> |
6904 | | <td valign="top">DOI</td> |
6905 | | <td valign="top">10.1145/1985793.1985905</td> |
6906 | | </tr> |
6907 | | |
6908 | | |
6909 | | |
6910 | | <tr> |
6911 | | <td valign="top">URL</td> |
6912 | | <td valign="top"><a href="http://dx.doi.org/10.1145/1985793.1985905">http://dx.doi.org/10.1145/1985793.1985905</a></td> |
6913 | | </tr> |
6914 | | |
6915 | | |
6916 | | </table></div><br><br> |
6917 | | |
6918 | | |
6919 | | |
6920 | | |
6921 | | <a class="EntryGoto" id="Tredger, Stephen and Zhuang, Yanyan and Matthews, Chris and Short-Gershman, Jesse and Coady, Rick"></a> |
6922 | | <b class="myheading" style="position: relative; left: 5%;">Tredger, Stephen and Zhuang, Yanyan and Matthews, Chris and Short-Gershman, Jesse and Coady, Rick</b> |
6923 | | |
6924 | | <div class="BibEntry"> |
6925 | | |
6926 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6927 | | |
6928 | | |
6929 | | <tr> |
6930 | | <td valign="top">Author</td> |
6931 | | <td valign="top">Tredger, Stephen and Zhuang, Yanyan and Matthews, Chris and Short-Gershman, Jesse and Coady, Rick</td> |
6932 | | </tr> |
6933 | | |
6934 | | <tr> |
6935 | | <td valign="top">Title</td> |
6936 | | <td valign="top">Building Green Systems with Green Students: An Educational Experiment with GENI Infrastructure</td> |
6937 | | </tr> |
6938 | | |
6939 | | <tr> |
6940 | | <td valign="top">Booktitle</td> |
6941 | | <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td> |
6942 | | </tr> |
6943 | | |
6944 | | <tr> |
6945 | | <td valign="top">Location</td> |
6946 | | <td valign="top">Salt Lake City, UT</td> |
6947 | | </tr> |
6948 | | |
6949 | | <tr> |
6950 | | <td valign="top">Publisher</td> |
6951 | | <td valign="top">IEEE</td> |
6952 | | </tr> |
6953 | | |
6954 | | <tr> |
6955 | | <td valign="top">Year</td> |
6956 | | <td valign="top">2013</td> |
6957 | | </tr> |
6958 | | |
6959 | | |
6960 | | |
6961 | | <tr> |
6962 | | <td valign="top">DOI</td> |
6963 | | <td valign="top">10.1109/GREE.2013.15</td> |
6964 | | </tr> |
6965 | | |
6966 | | |
6967 | | |
6968 | | <tr> |
6969 | | <td valign="top">URL</td> |
6970 | | <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.15">http://dx.doi.org/10.1109/GREE.2013.15</a></td> |
6971 | | </tr> |
6972 | | |
6973 | | |
6974 | | </table></div><br><br> |
6975 | | |
6976 | | |
6977 | | |
6978 | | |
6979 | | <a class="EntryGoto" id="Tuncer, Hasan and Nozaki, Yoshihiro and Shenoy, Nirmala"></a> |
6980 | | <b class="myheading" style="position: relative; left: 5%;">Tuncer, Hasan and Nozaki, Yoshihiro and Shenoy, Nirmala</b> |
6981 | | |
6982 | | <div class="BibEntry"> |
6983 | | |
6984 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
6985 | | |
6986 | | |
6987 | | <tr> |
6988 | | <td valign="top">Author</td> |
6989 | | <td valign="top">Tuncer, Hasan and Nozaki, Yoshihiro and Shenoy, Nirmala</td> |
6990 | | </tr> |
6991 | | |
6992 | | <tr> |
6993 | | <td valign="top">Title</td> |
6994 | | <td valign="top">Virtual Mobility Domains - A Mobility Architecture for the Future Internet</td> |
6995 | | </tr> |
6996 | | |
6997 | | <tr> |
6998 | | <td valign="top">Booktitle</td> |
6999 | | <td valign="top">IEEE International Conference on Commnunications (IEE ICC 2012) Symposium on Next-Generation Networking</td> |
7000 | | </tr> |
7001 | | |
7002 | | <tr> |
7003 | | <td valign="top">Year</td> |
7004 | | <td valign="top">2012</td> |
7005 | | </tr> |
7006 | | |
7007 | | <tr> |
7008 | | <td valign="top">Abstract</td> |
7009 | | <td valign="top">This paper presents a novel mobility architecture called Virtual Mobility Domains that is designed to work with the Floating Cloud Tiered Internetworking model. Virtual Mobility Domains supports both inter Autonomous System (macro) and intra Autonomous System (micro) mobility by leveraging a tiered addressing, a network cloud concept, and a unique packet forwarding scheme introduced by the Floating Cloud Tiered Internetworking model. The proposed mobility architecture is distinct from others by not using IP addressing and classic routing protocols, and deploying user-centric overlapping mobility domains. The comparative simulation study of Virtual Mobility Domains against Mobile IPv6, Hierarchical Mobile IPv6, and Proxy Mobile IPv6 using OPNET shows that Virtual Mobility Domains brings lower latency, lesser signaling overhead, and fewer packets loss during handoffs, specially during inter Autonomous System roaming. The results highlight the potential for a seamless mobility management.</td> |
7010 | | </tr> |
7011 | | |
7012 | | |
7013 | | |
7014 | | <tr> |
7015 | | <td valign="top">DOI</td> |
7016 | | <td valign="top">10.1109/ICC.2012.6363872</td> |
7017 | | </tr> |
7018 | | |
7019 | | |
7020 | | |
7021 | | <tr> |
7022 | | <td valign="top">URL</td> |
7023 | | <td valign="top"><a href="ftp://lesc.det.unifi.it/pub/LenLar/proceedings/2012/ICC2012/symposia/papers/virtual_mobility_domains_-_a_mobility_architecture_for_the_\\_.pdf">ftp://lesc.det.unifi.it/pub/LenLar/proceedings/2012/ICC2012/symposia/papers/virtual_mobility_domains_-_a_mobility_architecture_for_the_\\_.pdf</a></td> |
7024 | | </tr> |
7025 | | |
7026 | | |
7027 | | </table></div><br><br> |
7028 | | |
7029 | | |
7030 | | <div class="BibEntry"> |
7031 | | |
7032 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
7033 | | |
7034 | | |
7035 | | <tr> |
7036 | | <td valign="top">Author</td> |
7037 | | <td valign="top">Tuncer, Hasan and Nozaki, Yoshihiro and Shenoy, Nirmala</td> |
7038 | | </tr> |
7039 | | |
7040 | | <tr> |
7041 | | <td valign="top">Title</td> |
7042 | | <td valign="top">Virtual Mobility Domains - A Mobility Architecture for the Future Internet</td> |
7043 | | </tr> |
7044 | | |
7045 | | <tr> |
7046 | | <td valign="top">Booktitle</td> |
7047 | | <td valign="top">IEEE International Conference on Commnunications (IEE ICC 2012) Symposium on Next-Generation Networking</td> |
7048 | | </tr> |
7049 | | |
7050 | | <tr> |
7051 | | <td valign="top">Year</td> |
7052 | | <td valign="top">2012</td> |
7053 | | </tr> |
7054 | | |
7055 | | <tr> |
7056 | | <td valign="top">Abstract</td> |
7057 | | <td valign="top">This paper presents a novel mobility architecture called Virtual Mobility Domains that is designed to work with the Floating Cloud Tiered Internetworking model. Virtual Mobility Domains supports both inter Autonomous System (macro) and intra Autonomous System (micro) mobility by leveraging a tiered addressing, a network cloud concept, and a unique packet forwarding scheme introduced by the Floating Cloud Tiered Internetworking model. The proposed mobility architecture is distinct from others by not using IP addressing and classic routing protocols, and deploying user-centric overlapping mobility domains. The comparative simulation study of Virtual Mobility Domains against Mobile IPv6, Hierarchical Mobile IPv6, and Proxy Mobile IPv6 using OPNET shows that Virtual Mobility Domains brings lower latency, lesser signaling overhead, and fewer packets loss during handoffs, specially during inter Autonomous System roaming. The results highlight the potential for a seamless mobility management.</td> |
7058 | | </tr> |
7059 | | |
7060 | | |
7061 | | |
7062 | | <tr> |
7063 | | <td valign="top">DOI</td> |
7064 | | <td valign="top">10.1109/ICC.2012.6363872</td> |
7065 | | </tr> |
7066 | | |
7067 | | |
7068 | | |
7069 | | <tr> |
7070 | | <td valign="top">URL</td> |
7071 | | <td valign="top"><a href="ftp://lesc.det.unifi.it/pub/LenLar/proceedings/2012/ICC2012/symposia/papers/virtual_mobility_domains_-_a_mobility_architecture_for_the_\\_.pdf">ftp://lesc.det.unifi.it/pub/LenLar/proceedings/2012/ICC2012/symposia/papers/virtual_mobility_domains_-_a_mobility_architecture_for_the_\\_.pdf</a></td> |
7072 | | </tr> |
7073 | | |
7074 | | |
7075 | | </table></div><br><br> |
7076 | | |
7077 | | |
7078 | | |
7079 | | |
7080 | | <a class="EntryGoto" id="Turner, Jonathan S."></a> |
7081 | | <b class="myheading" style="position: relative; left: 5%;">Turner, Jonathan S.</b> |
7082 | | |
7083 | | <div class="BibEntry"> |
7084 | | |
7085 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
7086 | | |
7087 | | |
7088 | | <tr> |
7089 | | <td valign="top">Author</td> |
7090 | | <td valign="top">Turner, Jonathan S.</td> |
7091 | | </tr> |
7092 | | |
7093 | | <tr> |
7094 | | <td valign="top">Title</td> |
7095 | | <td valign="top">A proposed architecture for the GENI backbone platform</td> |
7096 | | </tr> |
7097 | | |
7098 | | <tr> |
7099 | | <td valign="top">Booktitle</td> |
7100 | | <td valign="top">Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems</td> |
7101 | | </tr> |
7102 | | |
7103 | | <tr> |
7104 | | <td valign="top">Location</td> |
7105 | | <td valign="top">San Jose, California, USA</td> |
7106 | | </tr> |
7107 | | |
7108 | | <tr> |
7109 | | <td valign="top">Publisher</td> |
7110 | | <td valign="top">ACM</td> |
7111 | | </tr> |
7112 | | |
7113 | | <tr> |
7114 | | <td valign="top">Address</td> |
7115 | | <td valign="top">New York, NY, USA</td> |
7116 | | </tr> |
7117 | | |
7118 | | <tr> |
7119 | | <td valign="top">Year</td> |
7120 | | <td valign="top">2006</td> |
7121 | | </tr> |
7122 | | |
7123 | | <tr> |
7124 | | <td valign="top">Abstract</td> |
7125 | | <td valign="top">The GENI Project (Global Environment for Network Innovation) is a major NSF-sponsored initiative that seeks to create a national research facility to enable experimental deployment of innovative new network architectures on a sufficient scale to enable realistic evaluation. One key component of the GENI system will be the GENI Backbone Platform (GBP) that provides the resources needed to allow multiple experimental networks to co-exist within the shared GENI infrastructure. This paper reviews the objectives for the GBP, the key issues that affect its design and develops a reference architecture that provides a concrete example for how the objectives can be met, using commercially available subsystems.</td> |
7126 | | </tr> |
7127 | | |
7128 | | |
7129 | | |
7130 | | <tr> |
7131 | | <td valign="top">DOI</td> |
7132 | | <td valign="top">10.1145/1185347.1185349</td> |
7133 | | </tr> |
7134 | | |
7135 | | |
7136 | | |
7137 | | <tr> |
7138 | | <td valign="top">URL</td> |
7139 | | <td valign="top"><a href="http://dx.doi.org/10.1145/1185347.1185349">http://dx.doi.org/10.1145/1185347.1185349</a></td> |
7140 | | </tr> |
7141 | | |
7142 | | |
7143 | | </table></div><br><br> |
7144 | | |
7145 | | |
7146 | | |
7147 | | |
7148 | | <a class="EntryGoto" id="Turner, Jonathan S. and Crowley, Patrick and DeHart, John and Freestone, Amy and Heller, Brandon and Kuhns, Fred and Kumar, Sailesh and Lockwood, John and Lu, Jing and Wilson, Michael and Wiseman, Charles and Zar, David"></a> |
7149 | | <b class="myheading" style="position: relative; left: 5%;">Turner, Jonathan S. and Crowley, Patrick and DeHart, John and Freestone, Amy and Heller, Brandon and Kuhns, Fred and Kumar, Sailesh and Lockwood, John and Lu, Jing and Wilson, Michael and Wiseman, Charles and Zar, David</b> |
7150 | | |
7151 | | <div class="BibEntry"> |
7152 | | |
7153 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
7154 | | |
7155 | | |
7156 | | <tr> |
7157 | | <td valign="top">Author</td> |
7158 | | <td valign="top">Turner, Jonathan S. and Crowley, Patrick and DeHart, John and Freestone, Amy and Heller, Brandon and Kuhns, Fred and Kumar, Sailesh and Lockwood, John and Lu, Jing and Wilson, Michael and Wiseman, Charles and Zar, David</td> |
7159 | | </tr> |
7160 | | |
7161 | | <tr> |
7162 | | <td valign="top">Title</td> |
7163 | | <td valign="top">Supercharging planetlab: a high performance, multi-application, overlay network platform</td> |
7164 | | </tr> |
7165 | | |
7166 | | <tr> |
7167 | | <td valign="top">Journal</td> |
7168 | | <td valign="top">SIGCOMM Comput. Commun. Rev.</td> |
7169 | | </tr> |
7170 | | |
7171 | | <tr> |
7172 | | <td valign="top">Publisher</td> |
7173 | | <td valign="top">ACM</td> |
7174 | | </tr> |
7175 | | |
7176 | | <tr> |
7177 | | <td valign="top">Address</td> |
7178 | | <td valign="top">New York, NY, USA</td> |
7179 | | </tr> |
7180 | | |
7181 | | <tr> |
7182 | | <td valign="top">Year</td> |
7183 | | <td valign="top">2007</td> |
7184 | | </tr> |
7185 | | |
7186 | | <tr> |
7187 | | <td valign="top">Abstract</td> |
7188 | | <td valign="top">In recent years, overlay networks have become an important vehicle for delivering Internet applications. Overlay network nodes are typically implemented using general purpose servers or clusters. We investigate the performance benefits of more integrated architectures, combining general-purpose servers with high performance Network Processor (NP) subsystems. We focus on PlanetLab as our experimental context and report on the design and evaluation of an experimental PlanetLab platform capable of much higher levels of performance than typical system configurations. To make it easier for users to port applications, the system supports a fast path/slow path application structure that facilitates the mapping of the most performance-critical parts of an application onto an NP subsystem, while allowing the more complex control and exception-handling to be implemented within the programmer-friendly environment provided by conventional servers. We report on implementations of two sample applications, an IPv4 router, and a forwarding application for the Internet Indirection Infrastructure. We demonstrate an 80x improvement in packet processing rates and comparable reductions in latency.</td> |
7189 | | </tr> |
7190 | | |
7191 | | |
7192 | | |
7193 | | <tr> |
7194 | | <td valign="top">DOI</td> |
7195 | | <td valign="top">10.1145/1282427.1282391</td> |
7196 | | </tr> |
7197 | | |
7198 | | |
7199 | | |
7200 | | <tr> |
7201 | | <td valign="top">URL</td> |
7202 | | <td valign="top"><a href="http://dx.doi.org/10.1145/1282427.1282391">http://dx.doi.org/10.1145/1282427.1282391</a></td> |
7203 | | </tr> |
7204 | | |
7205 | | |
7206 | | </table></div><br><br> |
7207 | | |
7208 | | |
7209 | | |
7210 | | |
7211 | | <a class="EntryGoto" id="Valancius, Vytautas and Feamster, Nick"></a> |
7212 | | <b class="myheading" style="position: relative; left: 5%;">Valancius, Vytautas and Feamster, Nick</b> |
7213 | | |
7214 | | <div class="BibEntry"> |
7215 | | |
7216 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
7217 | | |
7218 | | |
7219 | | <tr> |
7220 | | <td valign="top">Author</td> |
7221 | | <td valign="top">Valancius, Vytautas and Feamster, Nick</td> |
7222 | | </tr> |
7223 | | |
7224 | | <tr> |
7225 | | <td valign="top">Title</td> |
7226 | | <td valign="top">Multiplexing BGP sessions with BGP-Mux</td> |
7227 | | </tr> |
7228 | | |
7229 | | <tr> |
7230 | | <td valign="top">Booktitle</td> |
7231 | | <td valign="top">Proceedings of the 2007 ACM CoNEXT conference</td> |
7232 | | </tr> |
7233 | | |
7234 | | <tr> |
7235 | | <td valign="top">Location</td> |
7236 | | <td valign="top">New York, New York</td> |
7237 | | </tr> |
7238 | | |
7239 | | <tr> |
7240 | | <td valign="top">Publisher</td> |
7241 | | <td valign="top">ACM</td> |
7242 | | </tr> |
7243 | | |
7244 | | <tr> |
7245 | | <td valign="top">Address</td> |
7246 | | <td valign="top">New York, NY, USA</td> |
7247 | | </tr> |
7248 | | |
7249 | | <tr> |
7250 | | <td valign="top">Year</td> |
7251 | | <td valign="top">2007</td> |
7252 | | </tr> |
7253 | | |
7254 | | <tr> |
7255 | | <td valign="top">Abstract</td> |
7256 | | <td valign="top">This paper describes a BGP-session multiplexer called BGP-Mux, which provides stable, on-demand access to global BGP route feeds. This gateway allows arbitrary and even transient client BGP connections to be provisioned and torn down on demand without affecting globally visible BGP sessions. BGP-Mux provides two capabilities: (1) the ability for a client network to receive multiple unfiltered routes per destination from a set of upstream ASes; and (2) the ability to provision BGP sessions without introducing global instability. Several applications could benefit from these features:</td> |
7257 | | </tr> |
7258 | | |
7259 | | |
7260 | | |
7261 | | <tr> |
7262 | | <td valign="top">DOI</td> |
7263 | | <td valign="top">10.1145/1364654.1364707</td> |
7264 | | </tr> |
7265 | | |
7266 | | |
7267 | | |
7268 | | <tr> |
7269 | | <td valign="top">URL</td> |
7270 | | <td valign="top"><a href="http://dx.doi.org/10.1145/1364654.1364707">http://dx.doi.org/10.1145/1364654.1364707</a></td> |
7271 | | </tr> |
7272 | | |
7273 | | |
7274 | | </table></div><br><br> |
7275 | | |
7276 | | |
7277 | | |
7278 | | |
7279 | | <a class="EntryGoto" id="Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao, Akihiro"></a> |
7280 | | <b class="myheading" style="position: relative; left: 5%;">Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao, Akihiro</b> |
7281 | | |
7282 | | <div class="BibEntry"> |
7283 | | |
7284 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
7285 | | |
7286 | | |
7287 | | <tr> |
7288 | | <td valign="top">Author</td> |
7289 | | <td valign="top">Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao, Akihiro</td> |
7290 | | </tr> |
7291 | | |
7292 | | <tr> |
7293 | | <td valign="top">Title</td> |
7294 | | <td valign="top">Wide-area route control for distributed services</td> |
7295 | | </tr> |
7296 | | |
7297 | | <tr> |
7298 | | <td valign="top">Booktitle</td> |
7299 | | <td valign="top">Proceedings of the 2010 USENIX conference on USENIX annual technical conference</td> |
7300 | | </tr> |
7301 | | |
7302 | | <tr> |
7303 | | <td valign="top">Location</td> |
7304 | | <td valign="top">Boston, MA</td> |
7305 | | </tr> |
7306 | | |
7307 | | <tr> |
7308 | | <td valign="top">Publisher</td> |
7309 | | <td valign="top">USENIX Association</td> |
7310 | | </tr> |
7311 | | |
7312 | | <tr> |
7313 | | <td valign="top">Address</td> |
7314 | | <td valign="top">Berkeley, CA, USA</td> |
7315 | | </tr> |
7316 | | |
7317 | | <tr> |
7318 | | <td valign="top">Year</td> |
7319 | | <td valign="top">2010</td> |
7320 | | </tr> |
7321 | | |
7322 | | <tr> |
7323 | | <td valign="top">Abstract</td> |
7324 | | <td valign="top">Many distributed services would benefit from control over the flow of traffic to and from their users, to offer better performance and higher reliability at a reasonable cost. Unfortunately, although today's cloud-computing platforms offer elastic computing and bandwidth resources, they do not give services control over wide-area routing. We propose replacing the data center's border router with a Transit Portal (TP) that gives each service the illusion of direct connectivity to upstream ISPs, without requiring each service to deploy hardware, acquire IP address space, or negotiate contracts with ISPs. Our TP prototype supports many layer-two connectivity mechanisms, amortizes memory and message overhead over multiple services, and protects the rest of the Internet from misconfigured and malicious applications. Our implementation extends and synthesizes open-source software components such as the Linux kernel and the Quagga routing daemon. We also implement a management plane based on the GENI control framework and couple this with our four-site TP deployment and Amazon EC2 facilities. Experiments with an anycast DNS application demonstrate the benefits the TP offers to distributed services.</td> |
7325 | | </tr> |
7326 | | |
7327 | | |
7328 | | |
7329 | | |
7330 | | |
7331 | | <tr> |
7332 | | <td valign="top">URL</td> |
7333 | | <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=1855842">http://portal.acm.org/citation.cfm?id=1855842</a></td> |
7334 | | </tr> |
7335 | | |
7336 | | |
7337 | | </table></div><br><br> |
7338 | | |
7339 | | |
7340 | | |
7341 | | |
7342 | | <a class="EntryGoto" id="Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick"></a> |
7343 | | <b class="myheading" style="position: relative; left: 5%;">Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick</b> |
7344 | | |
7345 | | <div class="BibEntry"> |
7346 | | |
7347 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
7348 | | |
7349 | | |
7350 | | <tr> |
7351 | | <td valign="top">Author</td> |
7352 | | <td valign="top">Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick</td> |
7353 | | </tr> |
7354 | | |
7355 | | <tr> |
7356 | | <td valign="top">Title</td> |
7357 | | <td valign="top">Transit portal: BGP connectivity as a service</td> |
7358 | | </tr> |
7359 | | |
7360 | | <tr> |
7361 | | <td valign="top">Journal</td> |
7362 | | <td valign="top">SIGCOMM Comput. Commun. Rev.</td> |
7363 | | </tr> |
7364 | | |
7365 | | <tr> |
7366 | | <td valign="top">Publisher</td> |
7367 | | <td valign="top">ACM</td> |
7368 | | </tr> |
7369 | | |
7370 | | <tr> |
7371 | | <td valign="top">Address</td> |
7372 | | <td valign="top">New York, NY, USA</td> |
7373 | | </tr> |
7374 | | |
7375 | | <tr> |
7376 | | <td valign="top">Year</td> |
7377 | | <td valign="top">2010</td> |
7378 | | </tr> |
7379 | | |
7380 | | <tr> |
7381 | | <td valign="top">Abstract</td> |