Changes between Version 13 and Version 14 of GENIBibliography


Ignore:
Timestamp:
04/28/14 12:06:47 (7 years ago)
Author:
Mark Berman
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIBibliography

    v13 v14  
    352352
    353353
     354<a class="EntryGoto" id="Aug&#x65;&#x0301;, Jordan and Parmentelat, Thierry and Turro, Nicolas and Avakian, Sandrine and Baron, Lo\\ic and Larabi, Mohamed A. and Rahman, Mohammed Y. and Friedman, Timur and Fdida, Serge"></a>
     355<b class="myheading" style="position: relative; left: 5%;">Aug&#x65;&#x0301;, Jordan and Parmentelat, Thierry and Turro, Nicolas and Avakian, Sandrine and Baron, Lo\\ic and Larabi, Mohamed A. and Rahman, Mohammed Y. and Friedman, Timur and Fdida, Serge</b>
     356
     357<div class="BibEntry">
     358
     359<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     360
     361<li>
     362
     363
     364<tr>
     365     <td valign="top">Author</td>
     366     <td valign="top">Aug&#x65;&#x0301;, Jordan and Parmentelat, Thierry and Turro, Nicolas and Avakian, Sandrine and Baron, Lo\\ic and Larabi, Mohamed A. and Rahman, Mohammed Y. and Friedman, Timur and Fdida, Serge</td>
     367</tr>
     368
     369<tr>
     370     <td valign="top">Title</td>
     371     <td valign="top">Tools to foster a global federation of testbeds</td>
     372</tr>
     373
     374<tr>
     375     <td valign="top">Journal</td>
     376     <td valign="top">Computer Networks</td>
     377</tr>
     378
     379<tr>
     380     <td valign="top">Year</td>
     381     <td valign="top">2014</td>
     382</tr>
     383
     384<tr>
     385     <td valign="top">Abstract</td>
     386     <td valign="top">A global federation of experimental facilities in computer networking is being built on the basis of a thin waist, the Slice-based Federation Architecture (SFA), for managing testbed resources in a secure and efficient way. Its success will depend on the existence of tools that allow testbeds to expose their local resources and users to browse and select the resources most appropriate for their experiments. This paper presents two such tools. First, SFAWrap, which makes it relatively easy for a testbed owner to provide an SFA interface for their testbed. Second, MySlice, a tool that allows experimenters to browse and reserve testbed resources via SFA, and that is extensible through a system of plug-ins. Together, these tools should lower the barriers to entry for testbed owners who wish to join the global federation.</td>
     387</tr>
     388
     389
     390
     391<tr>
     392     <td valign="top">DOI</td>
     393     <td valign="top">10.1016/j.bjp.2013.12.038</td>
     394</tr>
     395
     396
     397
     398<tr>
     399     <td valign="top">URL</td>
     400     <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.12.038">http://dx.doi.org/10.1016/j.bjp.2013.12.038</a></td>
     401</tr>
     402
     403
     404</li>
     405
     406</table></div><br><br>
     407
     408
     409
     410
    354411<a class="EntryGoto" id="Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Renci, Chris H. and Chase, Unc-Ch J. and Marupadi, Varun and Yumerefendi, Aydan and Irwin, David"></a>
    355412<b class="myheading" style="position: relative; left: 5%;">Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Renci, Chris H. and Chase, Unc-Ch J. and Marupadi, Varun and Yumerefendi, Aydan and Irwin, David</b>
     
    26252682<tr>
    26262683     <td valign="top">Title</td>
     2684     <td valign="top">Measuring experiments in GENI</td>
     2685</tr>
     2686
     2687<tr>
     2688     <td valign="top">Journal</td>
     2689     <td valign="top">Computer Networks</td>
     2690</tr>
     2691
     2692<tr>
     2693     <td valign="top">Year</td>
     2694     <td valign="top">2014</td>
     2695</tr>
     2696
     2697<tr>
     2698     <td valign="top">Abstract</td>
     2699     <td valign="top">Experimentation with new network architectures and protocols is one of the primary motivations for building future Internet testbeds such as the Global Environment for Network Innovations (GENI) testbed. A key part of experimentation is the ability to observe, measure, evaluate, and compare these new architectures and protocols. Observing an experiment's network performance requires setting up the measurement infrastructure needed to monitor and record the behavior of the network. It also requires a full set of tools and user interfaces that enable access to the measurement data both while the experiment is running and later during post-analysis. To simplify the task of measuring experiments in future Internet testbeds like GENI, we developed an instrumentation and measurement system called INSTOOLS. It automates the process of setting up the measurement infrastructure, tailoring the measurement infrastructure and the data capture to the experimental network's topology and configuration. In addition, INSTOOLS provides a suite of tools via its ” portal” service that make it easy for users to observe, measure, format, and archive data from their experiments. This paper describes the INSTOOLS system and the set of interfaces/tools it offers to users. INSTOOLS has been in use for several years, and we provide performance results that illustrate its scalability. We also present our second-generation portal, the GENI One Stop Portal, that offers a comprehensive interface to a wide range of tools.</td>
     2700</tr>
     2701
     2702
     2703
     2704<tr>
     2705     <td valign="top">DOI</td>
     2706     <td valign="top">10.1016/j.bjp.2013.10.016</td>
     2707</tr>
     2708
     2709
     2710
     2711<tr>
     2712     <td valign="top">URL</td>
     2713     <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.10.016">http://dx.doi.org/10.1016/j.bjp.2013.10.016</a></td>
     2714</tr>
     2715
     2716
     2717</li>
     2718
     2719</table></div><br><br>
     2720
     2721
     2722<div class="BibEntry">
     2723
     2724<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2725
     2726<li>
     2727
     2728
     2729<tr>
     2730     <td valign="top">Author</td>
     2731     <td valign="top">Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td>
     2732</tr>
     2733
     2734<tr>
     2735     <td valign="top">Title</td>
    26272736     <td valign="top">GENI-enabled Programming Experiments for Networking Classes</td>
    26282737</tr>
     
    40884197<tr>
    40894198     <td valign="top">Booktitle</td>
     4199     <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td>
     4200</tr>
     4201
     4202<tr>
     4203     <td valign="top">Year</td>
     4204     <td valign="top">2012</td>
     4205</tr>
     4206
     4207
     4208
     4209<tr>
     4210     <td valign="top">DOI</td>
     4211     <td valign="top">10.1109/NOMS.2012.6211961</td>
     4212</tr>
     4213
     4214
     4215
     4216<tr>
     4217     <td valign="top">URL</td>
     4218     <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td>
     4219</tr>
     4220
     4221
     4222</li>
     4223
     4224</table></div><br><br>
     4225
     4226
     4227<div class="BibEntry">
     4228
     4229<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4230
     4231<li>
     4232
     4233
     4234<tr>
     4235     <td valign="top">Author</td>
     4236     <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td>
     4237</tr>
     4238
     4239<tr>
     4240     <td valign="top">Title</td>
     4241     <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td>
     4242</tr>
     4243
     4244<tr>
     4245     <td valign="top">Booktitle</td>
    40904246     <td valign="top">2012 IEEE Network Operations and Management Symposium</td>
    40914247</tr>
     
    41314287
    41324288
    4133 <div class="BibEntry">
    4134 
    4135 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4136 
    4137 <li>
    4138 
    4139 
    4140 <tr>
    4141      <td valign="top">Author</td>
    4142      <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td>
    4143 </tr>
    4144 
    4145 <tr>
    4146      <td valign="top">Title</td>
    4147      <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td>
    4148 </tr>
    4149 
    4150 <tr>
    4151      <td valign="top">Booktitle</td>
    4152      <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td>
    4153 </tr>
    4154 
    4155 <tr>
    4156      <td valign="top">Year</td>
    4157      <td valign="top">2012</td>
    4158 </tr>
    4159 
    4160 
    4161 
    4162 <tr>
    4163      <td valign="top">DOI</td>
    4164      <td valign="top">10.1109/NOMS.2012.6211961</td>
    4165 </tr>
    4166 
    4167 
    4168 
    4169 <tr>
    4170      <td valign="top">URL</td>
    4171      <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td>
    4172 </tr>
    4173 
    4174 
    4175 </li>
    4176 
    4177 </table></div><br><br>
    4178 
    4179 
    41804289
    41814290
     
    48694978
    48704979
     4980<a class="EntryGoto" id="Nozaki, Yoshihiro and Bakshi, Parth and Tuncer, Hasan and Shenoy, Nirmala"></a>
     4981<b class="myheading" style="position: relative; left: 5%;">Nozaki, Yoshihiro and Bakshi, Parth and Tuncer, Hasan and Shenoy, Nirmala</b>
     4982
     4983<div class="BibEntry">
     4984
     4985<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4986
     4987<li>
     4988
     4989
     4990<tr>
     4991     <td valign="top">Author</td>
     4992     <td valign="top">Nozaki, Yoshihiro and Bakshi, Parth and Tuncer, Hasan and Shenoy, Nirmala</td>
     4993</tr>
     4994
     4995<tr>
     4996     <td valign="top">Title</td>
     4997     <td valign="top">Evaluation of tiered routing protocol in floating cloud tiered internet architecture</td>
     4998</tr>
     4999
     5000<tr>
     5001     <td valign="top">Journal</td>
     5002     <td valign="top">Computer Networks</td>
     5003</tr>
     5004
     5005<tr>
     5006     <td valign="top">Year</td>
     5007     <td valign="top">2014</td>
     5008</tr>
     5009
     5010<tr>
     5011     <td valign="top">Abstract</td>
     5012     <td valign="top">Clean slate future Internet initiatives have been ongoing for a few years. An important consideration in the eventual deployment of solutions for such Internet architectures is the testing and validation of the design and its scalability in realistic network environments. Large scale emulation and experimentation testbeds sponsored and funded by major research organizations worldwide provide a suitable platform for the purpose. In this article, we present the implementation details of a new network and routing protocol that entirely replaces IP and its routing protocols from the protocol stack to provide efficient routing and forwarding of packets in a clean slate Floating Cloud Tiered (FCT) Internet architecture. The FCT architecture leverages the tier structure existing among ISPs, and has a new addressing and routing schema based on tiers. In this article, the implementation and evaluation details of the network protocol with these two features, namely the tiered addressing and tier-based routing using the Global Environmental for Network Innovations (GENI) testbed are presented. The performance of the protocol is also compared with Open Shortest Path First (OSPF) implemented over the GENI testbed for identical network topologies.</td>
     5013</tr>
     5014
     5015
     5016
     5017<tr>
     5018     <td valign="top">DOI</td>
     5019     <td valign="top">10.1016/j.bjp.2013.11.010</td>
     5020</tr>
     5021
     5022
     5023
     5024<tr>
     5025     <td valign="top">URL</td>
     5026     <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.11.010">http://dx.doi.org/10.1016/j.bjp.2013.11.010</a></td>
     5027</tr>
     5028
     5029
     5030</li>
     5031
     5032</table></div><br><br>
     5033
     5034
     5035
     5036
    48715037<a class="EntryGoto" id="O'Neill, Derek and Aikat, Jay and Jeffay, Kevin"></a>
    48725038<b class="myheading" style="position: relative; left: 5%;">O'Neill, Derek and Aikat, Jay and Jeffay, Kevin</b>
     
    50485214
    50495215
     5216<div class="BibEntry">
     5217
     5218<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5219
     5220<li>
     5221
     5222
     5223<tr>
     5224     <td valign="top">Author</td>
     5225     <td valign="top">Ozcelik, Ilker and Brooks, Richard R.</td>
     5226</tr>
     5227
     5228<tr>
     5229     <td valign="top">Title</td>
     5230     <td valign="top">Operational System Testing for Designed in Security</td>
     5231</tr>
     5232
     5233<tr>
     5234     <td valign="top">Booktitle</td>
     5235     <td valign="top">Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop</td>
     5236</tr>
     5237
     5238<tr>
     5239     <td valign="top">Location</td>
     5240     <td valign="top">Oak Ridge, Tennessee</td>
     5241</tr>
     5242
     5243<tr>
     5244     <td valign="top">Publisher</td>
     5245     <td valign="top">ACM</td>
     5246</tr>
     5247
     5248<tr>
     5249     <td valign="top">Address</td>
     5250     <td valign="top">New York, NY, USA</td>
     5251</tr>
     5252
     5253<tr>
     5254     <td valign="top">Year</td>
     5255     <td valign="top">2013</td>
     5256</tr>
     5257
     5258<tr>
     5259     <td valign="top">Abstract</td>
     5260     <td valign="top">To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance. In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities.</td>
     5261</tr>
     5262
     5263
     5264
     5265<tr>
     5266     <td valign="top">DOI</td>
     5267     <td valign="top">10.1145/2459976.2460038</td>
     5268</tr>
     5269
     5270
     5271
     5272<tr>
     5273     <td valign="top">URL</td>
     5274     <td valign="top"><a href="http://dx.doi.org/10.1145/2459976.2460038">http://dx.doi.org/10.1145/2459976.2460038</a></td>
     5275</tr>
     5276
     5277
     5278</li>
     5279
     5280</table></div><br><br>
     5281
     5282
    50505283
    50515284
     
    72397472<tr>
    72407473     <td valign="top">Title</td>
     7474     <td valign="top">PrimoGENI: Integrating Real-Time Network Simulation and Emulation in GENI</td>
     7475</tr>
     7476
     7477<tr>
     7478     <td valign="top">Booktitle</td>
     7479     <td valign="top">Principles of Advanced and Distributed Simulation (PADS), 2011 IEEE Workshop on</td>
     7480</tr>
     7481
     7482<tr>
     7483     <td valign="top">Location</td>
     7484     <td valign="top">Nice, France</td>
     7485</tr>
     7486
     7487<tr>
     7488     <td valign="top">Publisher</td>
     7489     <td valign="top">IEEE</td>
     7490</tr>
     7491
     7492<tr>
     7493     <td valign="top">Year</td>
     7494     <td valign="top">2011</td>
     7495</tr>
     7496
     7497<tr>
     7498     <td valign="top">Abstract</td>
     7499     <td valign="top">The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform -- a &#x76;&#x0308;irtual laboratory'' for the design, implementation and evaluation of future networks. The PrimoGENI project enables real-time network simulation by extending an existing network simulator to become part of the GENI federation to support large-scale experiments involving physical, simulated and emulated network entities. In this paper, we describe a novel design of PrimoGENI, which aims at supporting realistic, scalable, and flexible network experiments with real-time simulation and emulation capabilities. We present a flexible emulation infrastructure that allows both remote client machines and local cluster nodes running virtual machines to seamlessly interoperate with the simulated network running within a designated &#x73;&#x0308;lice'' of resources. We show the results of our preliminary validation and performance studies to demonstrate the capabilities and limitations of our approach.</td>
     7500</tr>
     7501
     7502
     7503
     7504<tr>
     7505     <td valign="top">DOI</td>
     7506     <td valign="top">10.1109/pads.2011.5936747</td>
     7507</tr>
     7508
     7509
     7510
     7511<tr>
     7512     <td valign="top">URL</td>
     7513     <td valign="top"><a href="http://dx.doi.org/10.1109/pads.2011.5936747">http://dx.doi.org/10.1109/pads.2011.5936747</a></td>
     7514</tr>
     7515
     7516
     7517</li>
     7518
     7519</table></div><br><br>
     7520
     7521
     7522<div class="BibEntry">
     7523
     7524<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     7525
     7526<li>
     7527
     7528
     7529<tr>
     7530     <td valign="top">Author</td>
     7531     <td valign="top">Van Vorst, N. and Erazo, M. and Liu, J.</td>
     7532</tr>
     7533
     7534<tr>
     7535     <td valign="top">Title</td>
    72417536     <td valign="top">PrimoGENI for hybrid network simulation and emulation experiments in GENI</td>
    72427537</tr>
     
    73417636
    73427637
    7343 <a class="EntryGoto" id="Van Vorst, Nathanael and Erazo, Miguel and Liu, Jason"></a>
    7344 <b class="myheading" style="position: relative; left: 5%;">Van Vorst, Nathanael and Erazo, Miguel and Liu, Jason</b>
    7345 
    7346 <div class="BibEntry">
    7347 
    7348 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    7349 
    7350 <li>
    7351 
    7352 
    7353 <tr>
    7354      <td valign="top">Author</td>
    7355      <td valign="top">Van Vorst, Nathanael and Erazo, Miguel and Liu, Jason</td>
    7356 </tr>
    7357 
    7358 <tr>
    7359      <td valign="top">Title</td>
    7360      <td valign="top">PrimoGENI: Integrating Real-Time Network Simulation and Emulation in GENI</td>
    7361 </tr>
    7362 
    7363 <tr>
    7364      <td valign="top">Booktitle</td>
    7365      <td valign="top">2011 IEEE Workshop on Principles of Advanced and Distributed Simulation</td>
    7366 </tr>
    7367 
    7368 <tr>
    7369      <td valign="top">Location</td>
    7370      <td valign="top">Nice, France</td>
     7638<a class="EntryGoto" id="Van Vorst, N. and Liu, J."></a>
     7639<b class="myheading" style="position: relative; left: 5%;">Van Vorst, N. and Liu, J.</b>
     7640
     7641<div class="BibEntry">
     7642
     7643<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     7644
     7645<li>
     7646
     7647
     7648<tr>
     7649     <td valign="top">Author</td>
     7650     <td valign="top">Van Vorst, N. and Liu, J.</td>
     7651</tr>
     7652
     7653<tr>
     7654     <td valign="top">Title</td>
     7655     <td valign="top">Realizing Large-Scale Interactive Network Simulation via Model Splitting</td>
     7656</tr>
     7657
     7658<tr>
     7659     <td valign="top">Booktitle</td>
     7660     <td valign="top">Principles of Advanced and Distributed Simulation (PADS), 2012 ACM/IEEE/SCS 26th Workshop on</td>
    73717661</tr>
    73727662
     
    73787668<tr>
    73797669     <td valign="top">Year</td>
    7380      <td valign="top">2011</td>
    7381 </tr>
    7382 
    7383 <tr>
    7384      <td valign="top">Abstract</td>
    7385      <td valign="top">The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform -- a &#x76;&#x0308;irtual laboratory'' for the design, implementation and evaluation of future networks. The PrimoGENI project enables real-time network simulation by extending an existing network simulator to become part of the GENI federation to support large-scale experiments involving physical, simulated and emulated network entities. In this paper, we describe a novel design of PrimoGENI, which aims at supporting realistic, scalable, and flexible network experiments with real-time simulation and emulation capabilities. We present a flexible emulation infrastructure that allows both remote client machines and local cluster nodes running virtual machines to seamlessly interoperate with the simulated network running within a designated &#x73;&#x0308;lice'' of resources. We show the results of our preliminary validation and performance studies to demonstrate the capabilities and limitations of our approach.</td>
    7386 </tr>
    7387 
    7388 
    7389 
    7390 <tr>
    7391      <td valign="top">DOI</td>
    7392      <td valign="top">10.1109/PADS.2011.5936747</td>
    7393 </tr>
    7394 
    7395 
    7396 
    7397 <tr>
    7398      <td valign="top">URL</td>
    7399      <td valign="top"><a href="http://dx.doi.org/10.1109/PADS.2011.5936747">http://dx.doi.org/10.1109/PADS.2011.5936747</a></td>
    7400 </tr>
    7401 
    7402 
    7403 </li>
    7404 
    7405 </table></div><br><br>
    7406 
    7407 
    7408 
    7409 
    7410 <a class="EntryGoto" id="Van Vorst, Nathanael and Liu, Jason"></a>
    7411 <b class="myheading" style="position: relative; left: 5%;">Van Vorst, Nathanael and Liu, Jason</b>
    7412 
    7413 <div class="BibEntry">
    7414 
    7415 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    7416 
    7417 <li>
    7418 
    7419 
    7420 <tr>
    7421      <td valign="top">Author</td>
    7422      <td valign="top">Van Vorst, Nathanael and Liu, Jason</td>
    7423 </tr>
    7424 
    7425 <tr>
    7426      <td valign="top">Title</td>
    7427      <td valign="top">Realizing Large-Scale Interactive Network Simulation via Model Splitting</td>
    7428 </tr>
    7429 
    7430 <tr>
    7431      <td valign="top">Booktitle</td>
    7432      <td valign="top">Proceedings of the 26th Workshop on Principles of Advanced and Distributed Simulation (PADS'12)</td>
    7433 </tr>
    7434 
    7435 <tr>
    7436      <td valign="top">Year</td>
    74377670     <td valign="top">2012</td>
    74387671</tr>
    74397672
    7440 
    7441 
    7442 
    7443 
    7444 <tr>
    7445      <td valign="top">URL</td>
    7446      <td valign="top"><a href="http://www.researchgate.net/publication/229476062&#x005F;Realizing&#x005F;Large-Scale&#x005F;Interactive&#x005F;Network&#x005F;Simulation&#x005F;via&#x005F;Model&#x005F;Splitting/file/d912f500eb6b911215.pdf">http://www.researchgate.net/publication/229476062&#x005F;Realizing&#x005F;Large-Scale&#x005F;Interactive&#x005F;Network&#x005F;Simulation&#x005F;via&#x005F;Model&#x005F;Splitting/file/d912f500eb6b911215.pdf</a></td>
     7673<tr>
     7674     <td valign="top">Abstract</td>
     7675     <td valign="top">This paper presents the model splitting method for large-scale interactive network simulation, which addresses the separation of concerns between network researchers, who focus on developing complex network models and conducting large-scale network experiments, and simulator developers, who are concerned with developing efficient simulation engines to achieve the best performance on parallel platforms. Modeling splitting divides the system into an interactive model to support user interaction, and an execution model to facilitate parallel processing. We describe techniques to maintain consistency and real-time synchronization between the two models. We also provide solutions to reduce the memory complexity of large network models and to ensure data persistency and access efficiency for out-of-core processing.</td>
     7676</tr>
     7677
     7678
     7679
     7680<tr>
     7681     <td valign="top">DOI</td>
     7682     <td valign="top">10.1109/pads.2012.35</td>
     7683</tr>
     7684
     7685
     7686
     7687<tr>
     7688     <td valign="top">URL</td>
     7689     <td valign="top"><a href="http://dx.doi.org/10.1109/pads.2012.35">http://dx.doi.org/10.1109/pads.2012.35</a></td>
    74477690</tr>
    74487691
     
    74777720<tr>
    74787721     <td valign="top">Booktitle</td>
    7479      <td valign="top">Eleventh ACM Workshop on Hot Topics in Networks (HotNets '12)</td>
     7722     <td valign="top">Proceedings of the 11th ACM Workshop on Hot Topics in Networks</td>
     7723</tr>
     7724
     7725<tr>
     7726     <td valign="top">Location</td>
     7727     <td valign="top">Redmond, Washington</td>
     7728</tr>
     7729
     7730<tr>
     7731     <td valign="top">Publisher</td>
     7732     <td valign="top">ACM</td>
     7733</tr>
     7734
     7735<tr>
     7736     <td valign="top">Address</td>
     7737     <td valign="top">New York, NY, USA</td>
    74807738</tr>
    74817739
     
    74857743</tr>
    74867744
    7487 
    7488 
    7489 
    7490 
    7491 <tr>
    7492      <td valign="top">URL</td>
    7493      <td valign="top"><a href="http://conferences.sigcomm.org/hotnets/2012/papers/hotnets12-final34.pdf">http://conferences.sigcomm.org/hotnets/2012/papers/hotnets12-final34.pdf</a></td>
     7745<tr>
     7746     <td valign="top">Abstract</td>
     7747     <td valign="top">Low latency is critical for interactive networked applications. But while we know how to scale systems to increase capacity, reducing latency --- especially the tail of the latency distribution --- can be much more difficult. We argue that the use of redundancy in the context of the wide-area Internet is an effective way to convert a small amount of extra capacity into reduced latency. By initiating redundant operations across diverse resources and using the first result which completes, redundancy improves a system's latency even under exceptional conditions. We demonstrate that redundancy can significantly reduce latency for small but critical tasks, and argue that it is an effective general-purpose strategy even on devices like cell phones where bandwidth is relatively constrained.</td>
     7748</tr>
     7749
     7750
     7751
     7752<tr>
     7753     <td valign="top">DOI</td>
     7754     <td valign="top">10.1145/2390231.2390234</td>
     7755</tr>
     7756
     7757
     7758
     7759<tr>
     7760     <td valign="top">URL</td>
     7761     <td valign="top"><a href="http://dx.doi.org/10.1145/2390231.2390234">http://dx.doi.org/10.1145/2390231.2390234</a></td>
    74947762</tr>
    74957763
     
    80458313
    80468314
    8047 <a class="EntryGoto" id="\\Oz&#x63;&#x0327;elik, &#x49;&#x0307;lker and Brooks, Richard R."></a>
    8048 <b class="myheading" style="position: relative; left: 5%;">\\Oz&#x63;&#x0327;elik, &#x49;&#x0307;lker and Brooks, Richard R.</b>
    8049 
    8050 <div class="BibEntry">
    8051 
    8052 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    8053 
    8054 <li>
    8055 
    8056 
    8057 <tr>
    8058      <td valign="top">Author</td>
    8059      <td valign="top">\\Oz&#x63;&#x0327;elik, &#x49;&#x0307;lker and Brooks, Richard R.</td>
    8060 </tr>
    8061 
    8062 <tr>
    8063      <td valign="top">Title</td>
    8064      <td valign="top">Operational System Testing for Designed in Security</td>
    8065 </tr>
    8066 
    8067 <tr>
    8068      <td valign="top">Booktitle</td>
    8069      <td valign="top">Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop</td>
    8070 </tr>
    8071 
    8072 <tr>
    8073      <td valign="top">Location</td>
    8074      <td valign="top">Oak Ridge, Tennessee</td>
    8075 </tr>
    8076 
    8077 <tr>
    8078      <td valign="top">Publisher</td>
    8079      <td valign="top">ACM</td>
    8080 </tr>
    8081 
    8082 <tr>
    8083      <td valign="top">Address</td>
    8084      <td valign="top">New York, NY, USA</td>
    8085 </tr>
    8086 
    8087 <tr>
    8088      <td valign="top">Year</td>
    8089      <td valign="top">2013</td>
    8090 </tr>
    8091 
    8092 <tr>
    8093      <td valign="top">Abstract</td>
    8094      <td valign="top">To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance. In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities.</td>
    8095 </tr>
    8096 
    8097 
    8098 
    8099 <tr>
    8100      <td valign="top">DOI</td>
    8101      <td valign="top">10.1145/2459976.2460038</td>
    8102 </tr>
    8103 
    8104 
    8105 
    8106 <tr>
    8107      <td valign="top">URL</td>
    8108      <td valign="top"><a href="http://dx.doi.org/10.1145/2459976.2460038">http://dx.doi.org/10.1145/2459976.2460038</a></td>
    8109 </tr>
    8110 
    8111 
    8112 </li>
    8113 
    8114 </table></div><br><br>
    8115 
    8116 
    8117 
    8118 
    81198315<br>
    81208316