Changes between Version 1 and Version 2 of NikySandbox/bib


Ignore:
Timestamp:
07/26/13 19:40:55 (6 years ago)
Author:
nriga@bbn.com
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • NikySandbox/bib

    v1 v2  
    1 {{{
    2 #!html
    3 
    4 
    5 <table border=1 cellpadding=0 cellspacing=0 width=1549 valign="center" align='center' >
    6  <col  width=8  >
    7  <col   width=70  >
    8 
    9  <col   width=8  >
    10  <col   width=22  >
    11  <col   width=109 span=4  >
    12  <col   width=8  >
    13  <col width=109  >
    14  <col   width=109 span=3  >
    15  <col   width=8  >
    16  <col   width=109 span=4  >
    17  <col   width=8  >
    18 
    19  <col   width=109  >
    20  <tr height=15  >
    21   <td height=15   width=8  >&nbsp;</td >
    22   <td   width=70  >&nbsp;</td >
    23   <td   width=8  >&nbsp;</td >
    24   <td   width=22  >&nbsp;</td >
    25   <td   width=109  >&nbsp;</td >
    26   <td   width=109  >&nbsp;</td >
    27   <td   width=109  >&nbsp;</td >
    28 
    29   <td   width=109  >&nbsp;</td >
    30   <td   width=8  >&nbsp;</td >
    31   <td   width=109  >&nbsp;</td >
    32   <td   width=109  >&nbsp;</td >
    33   <td   width=109  >&nbsp;</td >
    34   <td   width=109  >&nbsp;</td >
    35   <td   width=8  >&nbsp;</td >
    36   <td   width=109  >&nbsp;</td >
    37   <td   width=109  >&nbsp;</td >
    38 
    39   <td   width=109  >&nbsp;</td >
    40   <td   width=109  >&nbsp;</td >
    41   <td   width=8  >&nbsp;</td >
    42   <td   width=109  ></td >
    43  </tr >
    44  <tr   height=25  >
    45   <td height=25   width=8  >&nbsp;</td >
    46   <td   width=70  >&nbsp;</td >
    47   <td   width=8  >&nbsp;</td >
    48 
    49   <td   width=22  >&nbsp;</td >
    50   <td   width=109  >Experimenter<br >
    51   Track</td >
    52   <td   width=109  >Campus<br >
    53   Track</td >
    54   <td   width=109  >Software<br >
    55 
    56   Track</td >
    57   <td   width=109  >Spare <br >
    58   Track</td >
    59   <td   width=8  >&nbsp;</td >
    60   <td   width=109  >Experimenter<br >
    61   Track</td >
    62 
    63   <td   width=109  >Campus<br >
    64   Track</td >
    65   <td   width=109  >Software<br >
    66   Track</td >
    67   <td   width=109  >Ignite<br >
    68   Track</td >
    69 
    70   <td   width=8  >&nbsp;</td >
    71   <td   width=109  >Experimenter<br >
    72   Track</td >
    73   <td   width=109  >Campus<br >
    74   Track</td >
    75   <td   width=109  >Software<br >
    76 
    77   Track</td >
    78   <td   width=109  >Ignite <br >
    79   Track</td >
    80   <td   width=8  >&nbsp;</td >
    81   <td   width=109  ></td >
    82  </tr >
    83  <tr height=21  >
    84 
    85   <td height=21   width=8  >&nbsp;</td >
    86   <td   width=70  >start time</td >
    87   <td   width=8  >&nbsp;</td >
    88   <td   width=22  >&nbsp;</td >
    89   <td   colspan=2  >Day 1: Wed Nov 2</td >
    90   <td   width=109  >&nbsp;</td >
    91   <td   width=109  >&nbsp;</td >
    92   <td   width=8  >&nbsp;</td >
    93 
    94   <td   colspan=2  >Day 2: Thurs Nov 3</td >
    95   <td   width=109  >&nbsp;</td >
    96   <td   width=109  >&nbsp;</td >
    97   <td   width=8  >&nbsp;</td >
    98   <td   colspan=2  >Day 3: Fri Nov 4</td >
    99   <td   width=109  >&nbsp;</td >
    100   <td   width=109  >&nbsp;</td >
    101   <td   width=8  >&nbsp;</td >
    102 
    103   <td   width=109  ></td >
    104  </tr >
    105  <tr height=21  >
    106   <td height=21   width=8  >&nbsp;</td >
    107   <td   align=right width=70  >7:30 AM</td >
    108   <td   width=8  >&nbsp;</td >
    109   <td   width=22  >&nbsp;</td >
    110   <td colspan=4 rowspan=2   width=436 style='border-right:.5pt solid
    111 black  border-bottom:.5pt solid black;width:436pt' >Breakfast</td >
    112 
    113   <td   width=8  >&nbsp;</td >
    114   <td colspan=4 rowspan=2   width=436 style='border-right:.5pt solid
    115 black  border-bottom:.5pt solid black;width:436pt' >Breakfast</td >
    116   <td   width=8  >&nbsp;</td >
    117   <td colspan=4 rowspan=2   width=436 style='border-right:.5pt solid
    118 black  border-bottom:.5pt solid black;width:436pt' >Breakfast</td >
    119   <td   width=8  >&nbsp;</td >
    120   <td   width=109  ></td >
    121  </tr >
    122  <tr height=21  >
    123 
    124   <td height=21   width=8  >&nbsp;</td >
    125   <td   align=right width=70  >8:00 AM</td >
    126   <td   width=8  >&nbsp;</td >
    127   <td   width=22  >&nbsp;</td >
    128   <td   width=8  >&nbsp;</td >
    129   <td   width=8  >&nbsp;</td >
    130   <td   width=8  >&nbsp;</td >
    131   <td   width=109  ></td >
    132 
    133  </tr >
    134  <tr height=21  >
    135   <td height=21   width=8  >&nbsp;</td >
    136   <td   align=right width=70  >8:30 AM</td >
    137   <td   width=8  >&nbsp;</td >
    138   <td   width=22  >&nbsp;</td >
    139   <td rowspan=3   width=109  ><font   >&#9733;</font ><font
    140     > </font ><font   >GENI Concepts &ampResources</font ></td >
    141 
    142   <td   width=109  >&nbsp;</td >
    143   <td rowspan=3   width=109  >Project Highlights</td >
    144   <td rowspan=3   width=109  >I &amp; M Working Session</td >
    145   <td   width=8  >&nbsp;</td >
    146   <td colspan=4 rowspan=3   width=436 style='border-right:.5pt solid
    147 black  border-bottom:.5pt solid black;width:436pt' >Plenary Session: GENI Updates</td >
    148   <td   width=8  >&nbsp;</td >
    149 
    150   <td rowspan=4   width=109  ><font   >&#9733;</font ><font
    151     > </font ><font   >Tutorial: <br >
    152   OMNI &amp; Topologies</font ></td >
    153   <td rowspan=2   width=109  ><font   >Experimenter<br >
    154   Roundtable </font ><font
    155     ><br >
    156   </font ><font   >(w/SW track)</font ></td >
    157 
    158   <td rowspan=2   width=109  >ORCA <br >
    159   Cluster</td >
    160   <td rowspan=4   width=109  >Ignite Workshop <br >
    161   (by invite only)</td >
    162   <td   width=8  >&nbsp;</td >
    163   <td   width=109  ></td >
    164  </tr >
    165 
    166  <tr height=21  >
    167   <td height=21   width=8  >&nbsp;</td >
    168   <td   align=right width=70  >9:00 AM</td >
    169   <td   width=8  >&nbsp;</td >
    170   <td   width=22  >&nbsp;</td >
    171   <td   width=109  >&nbsp;</td >
    172   <td   width=8  >&nbsp;</td >
    173   <td   width=8  >&nbsp;</td >
    174 
    175   <td   width=8  >&nbsp;</td >
    176   <td   width=109  ></td >
    177  </tr >
    178  <tr height=21  >
    179   <td height=21   width=8  >&nbsp;</td >
    180   <td   align=right width=70  >9:30 AM</td >
    181   <td   width=8  >&nbsp;</td >
    182   <td   width=22  >&nbsp;</td >
    183 
    184   <td   width=109  >&nbsp;</td >
    185   <td   width=8  >&nbsp;</td >
    186   <td   width=8  >&nbsp;</td >
    187   <td rowspan=2   width=109  >Meso-scale Networking:<span
    188   style="mso-spacerun:yes" >&nbsp; </span >Looking Ahead</td >
    189   <td rowspan=2   width=109  >ProtoGENI <br >
    190   Cluster</td >
    191 
    192   <td   width=8  >&nbsp;</td >
    193   <td   width=109  ></td >
    194  </tr >
    195  <tr height=21  >
    196   <td height=21   width=8  >&nbsp;</td >
    197   <td   align=right width=70  >10:00 AM</td >
    198   <td   width=8  >&nbsp;</td >
    199   <td   width=22  >&nbsp;</td >
    200 
    201   <td colspan=4   width=436  >Break</td >
    202   <td   width=8  >&nbsp;</td >
    203   <td colspan=4   width=436  >Break</td >
    204   <td   width=8  >&nbsp;</td >
    205   <td   width=8  >&nbsp;</td >
    206   <td   width=109  ></td >
    207  </tr >
    208  <tr height=21  >
    209 
    210   <td height=21   width=8  >&nbsp;</td >
    211   <td   align=right width=70  >10:30 AM</td >
    212   <td   width=8  >&nbsp;</td >
    213   <td   width=22  >&nbsp;</td >
    214   <td rowspan=3   width=109  ><font   >&#9733;</font ><font
    215     > </font ><font   ><span
    216   style="mso-spacerun:yes" >&nbsp;</span >Tutorial: Introduction to GENI using
    217   Flack and the Instrumentation Portal</font ></td >
    218   <td rowspan=3   width=109  >GENI Deployment Updates</td >
    219   <td rowspan=3   width=109  >Control Framework Topics</td >
    220 
    221   <td rowspan=3   width=109  >I &amp; M Working Session (cont)</td >
    222   <td   width=8  >&nbsp;</td >
    223   <td colspan=4 rowspan=3   width=436 style='border-right:.5pt solid
    224 black  border-bottom:.5pt solid black;width:436pt' >Plenary Session: Ignite</td >
    225   <td   width=8  >&nbsp;</td >
    226   <td colspan=4   width=436  >Break</td >
    227   <td   width=8  >&nbsp;</td >
    228 
    229   <td   width=109  ></td >
    230  </tr >
    231  <tr height=21  >
    232   <td height=21   width=8  >&nbsp;</td >
    233   <td   align=right width=70  >11:00 AM</td >
    234   <td   width=8  >&nbsp;</td >
    235   <td   width=22  >&nbsp;</td >
    236   <td   width=8  >&nbsp;</td >
    237 
    238   <td   width=8  >&nbsp;</td >
    239   <td colspan=3 rowspan=2   style='border-bottom:.5pt solid
    240 black' >Outbriefs
    241   / Feedback<span style="mso-spacerun:yes" >&nbsp; </span >/ Wrap-up</td >
    242   <td rowspan=2   width=109  >Ignite Workshop <br >
    243   (by invite only)</td >
    244   <td   width=8  >&nbsp;</td >
    245   <td   width=109  ></td >
    246 
    247  </tr >
    248  <tr height=21  >
    249   <td height=21   width=8  >&nbsp;</td >
    250   <td   align=right width=70  >11:30 AM</td >
    251   <td   width=8  >&nbsp;</td >
    252   <td   width=22  >&nbsp;</td >
    253   <td   width=8  >&nbsp;</td >
    254   <td   width=8  >&nbsp;</td >
    255 
    256   <td   width=8  >&nbsp;</td >
    257   <td   ></td >
    258  </tr >
    259  <tr height=21  >
    260   <td height=21   width=8  >&nbsp;</td >
    261   <td   align=right width=70  >12:00 PM</td >
    262   <td   width=8  >&nbsp;</td >
    263   <td rowspan=10   width=22  >GPO Office Hours</td >
    264 
    265   <td colspan=4 rowspan=2   width=436 style='border-right:.5pt solid
    266 black  border-bottom:.5pt solid black;width:436pt' >Lunch</td >
    267   <td   width=8  >&nbsp;</td >
    268   <td colspan=4 rowspan=2   width=436 style='border-right:.5pt solid
    269 black  border-bottom:.5pt solid black;width:436pt' >Lunch</td >
    270   <td   width=8  >&nbsp;</td >
    271   <td colspan=4 rowspan=2   width=436 style='border-right:.5pt solid
    272 black  border-bottom:.5pt solid black;width:436pt' >Lunch</td >
    273   <td   width=8  >&nbsp;</td >
    274   <td   ></td >
    275 
    276  </tr >
    277  <tr height=21  >
    278   <td height=21   width=8  >&nbsp;</td >
    279   <td   align=right width=70  >12:30 PM</td >
    280   <td   width=8  >&nbsp;</td >
    281   <td   width=8  >&nbsp;</td >
    282   <td   width=8  >&nbsp;</td >
    283   <td   width=8  >&nbsp;</td >
    284 
    285   <td   ></td >
    286  </tr >
    287  <tr height=21  >
    288   <td height=21   width=8  >&nbsp;</td >
    289   <td   align=right width=70  >1:00 PM</td >
    290   <td   width=8  >&nbsp;</td >
    291   <td rowspan=3   width=109  ><font   >&#9733;</font ><font
    292     > </font ><font   ><span
    293   style="mso-spacerun:yes" >&nbsp;</span >Tutorial: Measurement System</font ></td >
    294 
    295   <td rowspan=2   width=109  >OpenFlow update</td >
    296   <td rowspan=3   width=109  >AM API</td >
    297   <td rowspan=3   width=109  ><font   >&#9733;</font ><font
    298     > </font ><font   >Tutorial: PrimoGENI</font ></td >
    299   <td   width=8  >&nbsp;</td >
    300   <td colspan=3 rowspan=4   width=327 style='border-bottom:.5pt solid
    301 black  width:327pt' >Plenary Session: Experimentation</td >
    302   <td rowspan=4   width=109  >Ignite Workshop <br >
    303 
    304   (by invite only)</td >
    305   <td   width=8  >&nbsp;</td >
    306   <td   width=109  >&nbsp;</td >
    307   <td rowspan=4   width=109  >WiMAX Campus Deployment &ampExperimentation</td >
    308   <td rowspan=6   width=109  >Coding Sprint for Developers and
    309   Experimenters<span style="mso-spacerun:yes" >&nbsp;</span ></td >
    310   <td rowspan=6   width=109  >Ignite Workshop <br >
    311 
    312   (by invite only)</td >
    313   <td   width=8  >&nbsp;</td >
    314   <td   ></td >
    315  </tr >
    316  <tr height=21  >
    317   <td height=21   width=8  >&nbsp;</td >
    318   <td   align=right width=70  >1:30 PM</td >
    319   <td   width=8  >&nbsp;</td >
    320 
    321   <td   width=8  >&nbsp;</td >
    322   <td   width=8  >&nbsp;</td >
    323   <td   width=109  >&nbsp;</td >
    324   <td   width=8  >&nbsp;</td >
    325   <td   width=109  ></td >
    326  </tr >
    327  <tr height=21  >
    328   <td height=21   width=8  >&nbsp;</td >
    329   <td   align=right width=70  >2:00 PM</td >
    330 
    331   <td   width=8  >&nbsp;</td >
    332   <td   width=109
    333  >Managing
    334   GENI Resources</td >
    335   <td   width=8  >&nbsp;</td >
    336   <td   width=8  >&nbsp;</td >
    337   <td   width=109  >&nbsp;</td >
    338   <td   width=8  >&nbsp;</td >
    339   <td   width=109  ></td >
    340  </tr >
    341 
    342  <tr height=21  >
    343   <td height=21   width=8  >&nbsp;</td >
    344   <td   align=right width=70  >2:30 PM</td >
    345   <td   width=8  >&nbsp;</td >
    346   <td colspan=4   width=436  >Break</td >
    347   <td   width=8  >&nbsp;</td >
    348   <td   width=8  >&nbsp;</td >
    349   <td   width=109  >&nbsp;</td >
    350 
    351   <td   width=8  >&nbsp;</td >
    352   <td   width=109  ></td >
    353  </tr >
    354  <tr height=21  >
    355   <td height=21   width=8  >&nbsp;</td >
    356   <td   align=right width=70  >3:00 PM</td >
    357   <td   width=8  >&nbsp;</td >
    358   <td rowspan=3   width=109  ><font   >Tutorial: <br >
    359 
    360   DI Cloud <br >
    361   </font ></td >
    362   <td   width=109
    363  >Managing
    364   GENI Resources</td >
    365   <td rowspan=3   width=109  >Authorization</td >
    366   <td rowspan=3   width=109  >New Projects: Experimenter Support and
    367 Training</td >
    368   <td   width=8  >&nbsp;</td >
    369   <td colspan=4   width=436  >Break</td >
    370 
    371   <td   width=8  >&nbsp;</td >
    372   <td   width=109  >&nbsp;</td >
    373   <td   width=109  >&nbsp;</td >
    374   <td   width=8  >&nbsp;</td >
    375   <td   width=109  ></td >
    376  </tr >
    377  <tr height=21  >
    378   <td height=21   width=8  >&nbsp;</td >
    379   <td   align=right width=70  >3:30 PM</td >
    380 
    381   <td   width=8  >&nbsp;</td >
    382   <td   width=109  >&nbsp;</td >
    383   <td   width=8  >&nbsp;</td >
    384   <td rowspan=4   width=109  >Adv. Tutorial:<span
    385   style="mso-spacerun:yes" >&nbsp; </span >NetServ</td >
    386   <td rowspan=4   width=109  >Meso-scale Monitoring</td >
    387   <td rowspan=4   width=109  >Cloud Computing in<span
    388   style="mso-spacerun:yes" >&nbsp; </span >GENI</td >
    389 
    390   <td rowspan=4   width=109  >Ignite Workshop <br >
    391   (by invite only)</td >
    392   <td   width=8  >&nbsp;</td >
    393   <td   width=109  >&nbsp;</td >
    394   <td   width=109  >&nbsp;</td >
    395   <td   width=8  >&nbsp;</td >
    396   <td   width=109  ></td >
    397  </tr >
    398 
    399  <tr height=21  >
    400   <td height=21   width=8  >&nbsp;</td >
    401   <td   align=right width=70  >4:00 PM</td >
    402   <td   width=8  >&nbsp;</td >
    403   <td   width=109  >&nbsp;</td >
    404   <td   width=8  >&nbsp;</td >
    405   <td   width=8  >&nbsp;</td >
    406   <td   width=109  >&nbsp;</td >
    407 
    408   <td   width=109  >&nbsp;</td >
    409   <td   width=109  >&nbsp;</td >
    410   <td   width=109  >&nbsp;</td >
    411   <td   width=8  >&nbsp;</td >
    412   <td   width=109  ></td >
    413  </tr >
    414  <tr height=21  >
    415   <td height=21   width=8  >&nbsp;</td >
    416   <td   align=right width=70  >4:30 PM</td >
    417 
    418   <td   width=8  >&nbsp;</td >
    419   <td colspan=4   width=436  >END
    420   EARLY TO TRAVEL TO SOCIAL</td >
    421   <td   width=8  >&nbsp;</td >
    422   <td   width=8  >&nbsp;</td >
    423   <td   width=109  >&nbsp;</td >
    424   <td   width=109  >&nbsp;</td >
    425   <td   width=109  >&nbsp;</td >
    426   <td   width=109  >&nbsp;</td >
    427 
    428   <td   width=8  >&nbsp;</td >
    429   <td   width=109  ></td >
    430  </tr >
    431  <tr height=21  >
    432   <td height=21   width=8  >&nbsp;</td >
    433   <td   align=right width=70  >5:00 PM</td >
    434   <td   width=8  >&nbsp;</td >
    435   <td   width=22  >&nbsp;</td >
    436 
    437   <td   width=109  >&nbsp;</td >
    438   <td   width=109  >&nbsp;</td >
    439   <td   width=109  >&nbsp;</td >
    440   <td   width=109  >&nbsp;</td >
    441   <td   width=8  >&nbsp;</td >
    442   <td   width=8  >&nbsp;</td >
    443   <td   width=109  >&nbsp;</td >
    444   <td   width=109  >&nbsp;</td >
    445   <td   width=109  >&nbsp;</td >
    446 
    447   <td   width=109  >&nbsp;</td >
    448   <td   width=8  >&nbsp;</td >
    449   <td   width=109  ></td >
    450  </tr >
    451  <tr height=21  >
    452   <td height=21   width=8  >&nbsp;</td >
    453   <td   align=right width=70  >5:30 PM</td >
    454   <td   width=8  >&nbsp;</td >
    455 
    456   <td   width=22  >&nbsp;</td >
    457   <td colspan=4 rowspan=4    >Demo &amp; Networking Event</td >
    458   <td   width=8  >&nbsp;</td >
    459   <td   width=109  >&nbsp;</td >
    460   <td   width=109  >&nbsp;</td >
    461   <td   width=109  >&nbsp;</td >
    462   <td   width=109  >&nbsp;</td >
    463 
    464   <td   width=8  >&nbsp;</td >
    465   <td   width=109  >&nbsp;</td >
    466   <td   width=109  >&nbsp;</td >
    467   <td   width=109  >&nbsp;</td >
    468   <td   width=109  >&nbsp;</td >
    469   <td   width=8  >&nbsp;</td >
    470   <td   width=109  ></td >
    471  </tr >
    472  <tr height=21  >
    473 
    474   <td height=21   width=8  >&nbsp;</td >
    475   <td   align=right width=70  >6:00 PM</td >
    476   <td   width=8  >&nbsp;</td >
    477   <td   width=22  >&nbsp;</td >
    478   <td   width=8  >&nbsp;</td >
    479   <td   width=109  >&nbsp;</td >
    480   <td   width=109  >&nbsp;</td >
    481   <td   width=109  >&nbsp;</td >
    482 
    483   <td   width=109  >&nbsp;</td >
    484   <td   width=8  >&nbsp;</td >
    485   <td   width=109  >&nbsp;</td >
    486   <td   width=109  >&nbsp;</td >
    487   <td   width=109  >&nbsp;</td >
    488   <td   width=109  >&nbsp;</td >
    489   <td   width=8  >&nbsp;</td >
    490   <td   width=109  ></td >
    491  </tr >
    492 
    493  <tr height=21  >
    494   <td height=21   width=8  >&nbsp;</td >
    495   <td   align=right width=70  >6:30 PM</td >
    496   <td   width=8  >&nbsp;</td >
    497   <td   width=22  >&nbsp;</td >
    498   <td   width=8  >&nbsp;</td >
    499   <td colspan=4 rowspan=3   width=436
    500  >Self-Organized
    501   BoF Dinners <br >
    502   <font   >(start times vary)</font ></td >
    503 
    504   <td   width=8  >&nbsp;</td >
    505   <td   width=109  >&nbsp;</td >
    506   <td   width=109  >&nbsp;</td >
    507   <td   width=109  >&nbsp;</td >
    508   <td   width=109  >&nbsp;</td >
    509   <td   width=8  >&nbsp;</td >
    510   <td   width=109  ></td >
    511  </tr >
    512  <tr height=21  >
    513 
    514   <td height=21   width=8  >&nbsp;</td >
    515   <td   align=right width=70  >7:00 PM</td >
    516   <td   width=8  >&nbsp;</td >
    517   <td   width=22  >&nbsp;</td >
    518   <td   width=8  >&nbsp;</td >
    519   <td   width=8  >&nbsp;</td >
    520   <td   width=109  >&nbsp;</td >
    521   <td   width=109  >&nbsp;</td >
    522 
    523   <td   width=109  >&nbsp;</td >
    524   <td   width=109  >&nbsp;</td >
    525   <td   width=8  >&nbsp;</td >
    526   <td   width=109  ></td >
    527  </tr >
    528  <tr height=21  >
    529   <td height=21   width=8  >&nbsp;</td >
    530   <td   align=right width=70  >7:30 PM</td >
    531 
    532   <td   width=8  >&nbsp;</td >
    533   <td   width=22  >&nbsp;</td >
    534   <td   width=109  >&nbsp;</td >
    535   <td   width=109  >&nbsp;</td >
    536   <td   width=109  >&nbsp;</td >
    537   <td   width=109  >&nbsp;</td >
    538   <td   width=8  >&nbsp;</td >
    539   <td   width=8  >&nbsp;</td >
    540   <td   width=109  >&nbsp;</td >
    541 
    542   <td   width=109  >&nbsp;</td >
    543   <td   width=109  >&nbsp;</td >
    544   <td   width=109  >&nbsp;</td >
    545   <td   width=8  >&nbsp;</td >
    546   <td   width=109  ></td >
    547  </tr >
    548  <tr height=21  >
    549   <td height=21   width=8  >&nbsp;</td >
    550   <td   width=70  >&nbsp;</td >
    551 
    552   <td   width=8  >&nbsp;</td >
    553   <td   width=22  >&nbsp;</td >
    554   <td   colspan=2  ><font
    555   >&#9733;</font ><font
    556     > </font ><font   >Recommended for
    557 newcomers</font ></td >
    558   <td   width=109  >&nbsp;</td >
    559   <td   width=109  >&nbsp;</td >
    560   <td   width=8  >&nbsp;</td >
    561   <td   width=109  >&nbsp;</td >
    562   <td   width=109  >&nbsp;</td >
    563 
    564   <td   width=109  >&nbsp;</td >
    565   <td   width=109  >&nbsp;</td >
    566   <td   width=8  >&nbsp;</td >
    567   <td   width=109  >&nbsp;</td >
    568   <td   width=109  >&nbsp;</td >
    569   <td   colspan=2  >REVISION: 6Sept11</td >
    570   <td   width=8  >&nbsp;</td >
    571   <td ></td >
    572 
    573 
    574 </table >
    575 
    576 }}}
    577 
    578 -----
     1<!-- HTML to be inserted into wiki page. -->
     2<!-- This page is auto-generated. Please do not edit by hand. -->
     3
     4<H1>GENI Bibliography</H1>
     5
     6
     7<a class="EntryGoto" id="Aikat, Jay and Hasan, Shaddi and Jeffay, Kevin and Smith, F. Donelson"></a>
     8<b class="myheading" style="position: relative; left: 5%;">Aikat, Jay and Hasan, Shaddi and Jeffay, Kevin and Smith, F. Donelson</b>
     9
     10<div class="BibEntry">
     11
     12<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     13
     14
     15<tr>
     16     <td valign="top">Author</td>
     17     <td valign="top">Aikat, Jay and Hasan, Shaddi and Jeffay, Kevin and Smith, F. Donelson</td>
     18</tr>
     19
     20<tr>
     21     <td valign="top">Title</td>
     22     <td valign="top">Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation</td>
     23</tr>
     24
     25<tr>
     26     <td valign="top">Booktitle</td>
     27     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     28</tr>
     29
     30<tr>
     31     <td valign="top">Location</td>
     32     <td valign="top">Los Angeles</td>
     33</tr>
     34
     35<tr>
     36     <td valign="top">Year</td>
     37     <td valign="top">2012</td>
     38</tr>
     39
     40<tr>
     41     <td valign="top">Abstract</td>
     42     <td valign="top">Empirical evaluations to study network performance, whether in a laboratory setting or on GENI testbeds, rely heavily on measurement-based modeling of round trip times (RTTs) to emulate realistic end-to-end delays of local and metropolitan area networks. For generating realistic traffic, we studied several models to emulate RTTs. In this paper, we performed experiments on real testbeds using synthetic TCP traffic generated from measurement data from a large university campus. As a result of our study, we present the Discrete- Approximation model for RTT (DA-RTT) emulation. Using three different metrics for performance evaluation, which include queue length at routers, connection response times, and connection durations, we demonstrate that the simple DA-RTT model closely represents the per-connection RTTs in the original traffic. While these experiments were performed in our laboratory, and not using GENI infrastructure, we present this as a possible model for adoption on GENI testbeds to emulate Round Trip Time Distributions for GENI experiments.</td>
     43</tr>
     44
     45
     46
     47
     48
     49
     50</table></div><br><br>
     51
     52
     53
     54
     55<a class="EntryGoto" id="Albrecht, J. and Huang, D. Y."></a>
     56<b class="myheading" style="position: relative; left: 5%;">Albrecht, J. and Huang, D. Y.</b>
     57
     58<div class="BibEntry">
     59
     60<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     61
     62
     63<tr>
     64     <td valign="top">Author</td>
     65     <td valign="top">Albrecht, J. and Huang, D. Y.</td>
     66</tr>
     67
     68<tr>
     69     <td valign="top">Title</td>
     70     <td valign="top">Managing distributed applications using Gush</td>
     71</tr>
     72
     73<tr>
     74     <td valign="top">Journal</td>
     75     <td valign="top">Proceedings of the ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, Testbed Practices Session (TridentCom)</td>
     76</tr>
     77
     78<tr>
     79     <td valign="top">Year</td>
     80     <td valign="top">2010</td>
     81</tr>
     82
     83<tr>
     84     <td valign="top">Abstract</td>
     85     <td valign="top">Deploying and controlling experiments running on a distributed set of resources is a challenging task. Software developers often spend a significant amount of time dealing with the complexities associated with resource configuration and management in these environments. Experiment control systems are designed to automate the process, and to ultimately help developers cope with the common problems that arise during the design, implementation, and evaluation of distributed systems. However, many of the existing control systems were designed with specific computing environments in mind, and thus do not provide support for heterogeneous resources in different testbeds. In this paper, we explore the functionality of Gush, an experiment control system, and discuss how it supports execution on three of the four GENI control frameworks.</td>
     86</tr>
     87
     88
     89
     90<tr>
     91     <td valign="top">DOI</td>
     92     <td valign="top">10.1007/978-3-642-17851-1&#x005F;31</td>
     93</tr>
     94
     95
     96
     97<tr>
     98     <td valign="top">URL</td>
     99     <td valign="top"><a href="http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;31">http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;31</a></td>
     100</tr>
     101
     102
     103</table></div><br><br>
     104
     105
     106
     107
     108<a class="EntryGoto" id="Albrecht, Jeannie R."></a>
     109<b class="myheading" style="position: relative; left: 5%;">Albrecht, Jeannie R.</b>
     110
     111<div class="BibEntry">
     112
     113<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     114
     115
     116<tr>
     117     <td valign="top">Author</td>
     118     <td valign="top">Albrecht, Jeannie R.</td>
     119</tr>
     120
     121<tr>
     122     <td valign="top">Title</td>
     123     <td valign="top">Bringing big systems to small schools: distributed systems for undergraduates</td>
     124</tr>
     125
     126<tr>
     127     <td valign="top">Journal</td>
     128     <td valign="top">SIGCSE Bull.</td>
     129</tr>
     130
     131<tr>
     132     <td valign="top">Publisher</td>
     133     <td valign="top">ACM</td>
     134</tr>
     135
     136<tr>
     137     <td valign="top">Address</td>
     138     <td valign="top">New York, NY, USA</td>
     139</tr>
     140
     141<tr>
     142     <td valign="top">Year</td>
     143     <td valign="top">2009</td>
     144</tr>
     145
     146<tr>
     147     <td valign="top">Abstract</td>
     148     <td valign="top">Distributed applications have become a core component of the Internet's infrastructure. However, many undergraduate curriculums, especially at small colleges, do not offer courses that focus on the design and implementation of distributed systems. The courses that are offered address the theoretical aspects of system design, but often fail to provide students with the opportunity to develop and evaluate distributed applications in real-world environments. As a result, undergraduate students are not as prepared as they should be for graduate study or careers in industry. This paper describes an undergraduate course in Distributed Systems that not only studies the key design principles of distributed systems, but also has a unique emphasis on giving students hands-on access to distributed systems through the use of shared computing testbeds, such as PlanetLab and GENI, and open-source technologies, such as Xen and Hadoop. Using these platforms, students can perform large-scale, distributed experimentation even at small colleges.</td>
     149</tr>
     150
     151
     152
     153<tr>
     154     <td valign="top">DOI</td>
     155     <td valign="top">10.1145/1539024.1508903</td>
     156</tr>
     157
     158
     159
     160<tr>
     161     <td valign="top">URL</td>
     162     <td valign="top"><a href="http://dx.doi.org/10.1145/1539024.1508903">http://dx.doi.org/10.1145/1539024.1508903</a></td>
     163</tr>
     164
     165
     166</table></div><br><br>
     167
     168
     169
     170
     171<a class="EntryGoto" id="Albrecht, Jeannie and Tuttle, Christopher and Braud, Ryan and Dao, Darren and Topilski, Nikolay and Snoeren, Alex C. and Vahdat, Amin"></a>
     172<b class="myheading" style="position: relative; left: 5%;">Albrecht, Jeannie and Tuttle, Christopher and Braud, Ryan and Dao, Darren and Topilski, Nikolay and Snoeren, Alex C. and Vahdat, Amin</b>
     173
     174<div class="BibEntry">
     175
     176<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     177
     178
     179<tr>
     180     <td valign="top">Author</td>
     181     <td valign="top">Albrecht, Jeannie and Tuttle, Christopher and Braud, Ryan and Dao, Darren and Topilski, Nikolay and Snoeren, Alex C. and Vahdat, Amin</td>
     182</tr>
     183
     184<tr>
     185     <td valign="top">Title</td>
     186     <td valign="top">Distributed application configuration, management, and visualization with plush</td>
     187</tr>
     188
     189<tr>
     190     <td valign="top">Journal</td>
     191     <td valign="top">ACM Trans. Internet Technol.</td>
     192</tr>
     193
     194<tr>
     195     <td valign="top">Publisher</td>
     196     <td valign="top">ACM</td>
     197</tr>
     198
     199<tr>
     200     <td valign="top">Address</td>
     201     <td valign="top">New York, NY, USA</td>
     202</tr>
     203
     204<tr>
     205     <td valign="top">Year</td>
     206     <td valign="top">2011</td>
     207</tr>
     208
     209<tr>
     210     <td valign="top">Abstract</td>
     211     <td valign="top">Support for distributed application management in large-scale networked environments remains in its early stages. Although a number of solutions exist for subtasks of application deployment, monitoring, and maintenance in distributed environments, few tools provide a unified framework for application management. Many of the existing tools address the management needs of a single type of application or service that runs in a specific environment, and these tools are not adaptable enough to be used for other applications or platforms. To this end, we present the design and implementation of Plush, a fully configurable application management infrastructure designed to meet the general requirements of several different classes of distributed applications. Plush allows developers to specifically define the flow of control needed by their computations using application building blocks. Through an extensible resource management interface, Plush supports execution in a variety of environments, including both live deployment platforms and emulated clusters. Plush also uses relaxed synchronization primitives for improving fault tolerance and liveness in failure-prone environments. To gain an understanding of how Plush manages different classes of distributed applications, we take a closer look at specific applications and evaluate how Plush provides support for each.</td>
     212</tr>
     213
     214
     215
     216<tr>
     217     <td valign="top">DOI</td>
     218     <td valign="top">10.1145/2049656.2049658</td>
     219</tr>
     220
     221
     222
     223<tr>
     224     <td valign="top">URL</td>
     225     <td valign="top"><a href="http://dx.doi.org/10.1145/2049656.2049658">http://dx.doi.org/10.1145/2049656.2049658</a></td>
     226</tr>
     227
     228
     229</table></div><br><br>
     230
     231
     232
     233
     234<a class="EntryGoto" id="Angu, Pragatheeswaran and Ramamurthy, Byrav"></a>
     235<b class="myheading" style="position: relative; left: 5%;">Angu, Pragatheeswaran and Ramamurthy, Byrav</b>
     236
     237<div class="BibEntry">
     238
     239<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     240
     241
     242<tr>
     243     <td valign="top">Author</td>
     244     <td valign="top">Angu, Pragatheeswaran and Ramamurthy, Byrav</td>
     245</tr>
     246
     247<tr>
     248     <td valign="top">Title</td>
     249     <td valign="top">Experiences with dynamic circuit creation in a regional network testbed</td>
     250</tr>
     251
     252<tr>
     253     <td valign="top">Booktitle</td>
     254     <td valign="top">2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)</td>
     255</tr>
     256
     257<tr>
     258     <td valign="top">Location</td>
     259     <td valign="top">Shanghai, China</td>
     260</tr>
     261
     262<tr>
     263     <td valign="top">Publisher</td>
     264     <td valign="top">IEEE</td>
     265</tr>
     266
     267<tr>
     268     <td valign="top">Year</td>
     269     <td valign="top">2011</td>
     270</tr>
     271
     272<tr>
     273     <td valign="top">Abstract</td>
     274     <td valign="top">In this paper we share our experiences of enabling dynamic circuit creation in the GpENI network. GpENI is a network research testbed in the mid-west USA involving several educational institutions. University of Nebraska-Lincoln is involved in provisioning dynamic circuits across the GpENI network among its participating universities. We discuss several options investigated for deploying dynamic circuits over the GpENI network as well as our demonstration experiments at the GENI engineering conferences. UNL has also collaborated with ProtoGENI project of University of Utah and Mid-Atlantic Crossroads (MAX) facility of Washington DC to create inter-domain dynamic circuits.</td>
     275</tr>
     276
     277
     278
     279<tr>
     280     <td valign="top">DOI</td>
     281     <td valign="top">10.1109/infcomw.2011.5928801</td>
     282</tr>
     283
     284
     285
     286<tr>
     287     <td valign="top">URL</td>
     288     <td valign="top"><a href="http://dx.doi.org/10.1109/infcomw.2011.5928801">http://dx.doi.org/10.1109/infcomw.2011.5928801</a></td>
     289</tr>
     290
     291
     292</table></div><br><br>
     293
     294
     295
     296
     297<a class="EntryGoto" id="Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Renci, Chris H. and Chase, Unc-Ch J. and Marupadi, Varun and Yumerefendi, Aydan and Irwin, David"></a>
     298<b class="myheading" style="position: relative; left: 5%;">Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Renci, Chris H. and Chase, Unc-Ch J. and Marupadi, Varun and Yumerefendi, Aydan and Irwin, David</b>
     299
     300<div class="BibEntry">
     301
     302<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     303
     304
     305<tr>
     306     <td valign="top">Author</td>
     307     <td valign="top">Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Renci, Chris H. and Chase, Unc-Ch J. and Marupadi, Varun and Yumerefendi, Aydan and Irwin, David</td>
     308</tr>
     309
     310<tr>
     311     <td valign="top">Title</td>
     312     <td valign="top">Networked cloud orchestration: A GENI perspective</td>
     313</tr>
     314
     315<tr>
     316     <td valign="top">Booktitle</td>
     317     <td valign="top">2010 IEEE Globecom Workshops</td>
     318</tr>
     319
     320<tr>
     321     <td valign="top">Location</td>
     322     <td valign="top">Miami, FL, USA</td>
     323</tr>
     324
     325<tr>
     326     <td valign="top">Publisher</td>
     327     <td valign="top">IEEE</td>
     328</tr>
     329
     330<tr>
     331     <td valign="top">Year</td>
     332     <td valign="top">2010</td>
     333</tr>
     334
     335<tr>
     336     <td valign="top">Abstract</td>
     337     <td valign="top">This paper describes the experience of developing a system for creation of distributed linked configurations of heterogeneous resources (slices) in GENI. Our work leverages a number of unique architectural solutions (distributed architecture, declarative resource specifications, unique approach to slice instantiation) which is applicable to a wider set of problems related to autonomic co-scheduling and provisioning of heterogeneous networked resources. We discuss the architecture, the resource description mechanisms and some of the algorithms used to enable our system. We conclude with an analysis of a real experiment at allocating resources from multiple providers across a very wide geographic area (spanning Massachusetts, Illinois and North Carolina) to create a single private Layer 2 network connecting virtual machines on the campus of Duke University to a sensor testbed at University of Massachusetts, Amherst.</td>
     338</tr>
     339
     340
     341
     342<tr>
     343     <td valign="top">DOI</td>
     344     <td valign="top">10.1109/GLOCOMW.2010.5700385</td>
     345</tr>
     346
     347
     348
     349<tr>
     350     <td valign="top">URL</td>
     351     <td valign="top"><a href="http://dx.doi.org/10.1109/GLOCOMW.2010.5700385">http://dx.doi.org/10.1109/GLOCOMW.2010.5700385</a></td>
     352</tr>
     353
     354
     355</table></div><br><br>
     356
     357
     358
     359
     360<a class="EntryGoto" id="Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Ruth, Paul and Yumerefendi, Aydan and Chase, Jeff"></a>
     361<b class="myheading" style="position: relative; left: 5%;">Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Ruth, Paul and Yumerefendi, Aydan and Chase, Jeff</b>
     362
     363<div class="BibEntry">
     364
     365<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     366
     367
     368<tr>
     369     <td valign="top">Author</td>
     370     <td valign="top">Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Ruth, Paul and Yumerefendi, Aydan and Chase, Jeff</td>
     371</tr>
     372
     373<tr>
     374     <td valign="top">Title</td>
     375     <td valign="top">ExoGENI: A Multi-Domain Infrastructure-as-a-Service Testbed</td>
     376</tr>
     377
     378<tr>
     379     <td valign="top">Booktitle</td>
     380     <td valign="top">8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2012)</td>
     381</tr>
     382
     383<tr>
     384     <td valign="top">Year</td>
     385     <td valign="top">2012</td>
     386</tr>
     387
     388<tr>
     389     <td valign="top">Abstract</td>
     390     <td valign="top">NSF's GENI program seeks to enable experiments that run within virtual network topologies built-to-order from testbed infrastructure offered by multiple providers (domains). GENI is often viewed as a network testbed integration effort, but behind it is an ambitious vision for multi-domain infrastructure-as-a-service (IaaS). This paper presents ExoGENI, a new GENI testbed that links GENI to two advances in virtual infrastructure services outside of GENI: open cloud computing (OpenStack) and dynamic circuit fabrics. ExoGENI orchestrates a federation of independent cloud sites and circuit providers through their native IaaS interfaces, and links them to other GENI tools and resources. The ExoGENI deployment consists of cloud site ``racks'' on host campuses within the US, linked with national research networks and other circuit networks through programmable exchange points. The ExoGENI sites and control software are enabled for software-defined networking using OpenFlow. ExoGENI offers a powerful unified hosting platform for deeply networked, multi-domain, multi-site cloud applications. We intend that ExoGENI will seed a larger, evolving platform linking other third-party cloud sites, transport networks, and other infrastructure services, and that it will enable real-world deployment of innovative distributed services and new visions of a Future Internet.</td>
     391</tr>
     392
     393
     394
     395
     396
     397
     398</table></div><br><br>
     399
     400
     401
     402
     403<a class="EntryGoto" id="Bavier, Andy and Coady, Yvonne and Mack, Tony and Matthews, Chris and Mambretti, Joe and McGeer, Rick and Mueller, Paul and Snoeren, Alex and Yuen, Marco"></a>
     404<b class="myheading" style="position: relative; left: 5%;">Bavier, Andy and Coady, Yvonne and Mack, Tony and Matthews, Chris and Mambretti, Joe and McGeer, Rick and Mueller, Paul and Snoeren, Alex and Yuen, Marco</b>
     405
     406<div class="BibEntry">
     407
     408<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     409
     410
     411<tr>
     412     <td valign="top">Author</td>
     413     <td valign="top">Bavier, Andy and Coady, Yvonne and Mack, Tony and Matthews, Chris and Mambretti, Joe and McGeer, Rick and Mueller, Paul and Snoeren, Alex and Yuen, Marco</td>
     414</tr>
     415
     416<tr>
     417     <td valign="top">Title</td>
     418     <td valign="top">GENICloud and transcloud</td>
     419</tr>
     420
     421<tr>
     422     <td valign="top">Booktitle</td>
     423     <td valign="top">Proceedings of the 2012 workshop on Cloud services, federation, and the 8th open cirrus summit</td>
     424</tr>
     425
     426<tr>
     427     <td valign="top">Location</td>
     428     <td valign="top">San Jose, California, USA</td>
     429</tr>
     430
     431<tr>
     432     <td valign="top">Publisher</td>
     433     <td valign="top">ACM</td>
     434</tr>
     435
     436<tr>
     437     <td valign="top">Address</td>
     438     <td valign="top">New York, NY, USA</td>
     439</tr>
     440
     441<tr>
     442     <td valign="top">Year</td>
     443     <td valign="top">2012</td>
     444</tr>
     445
     446<tr>
     447     <td valign="top">Abstract</td>
     448     <td valign="top">In this paper, we argue that federation of cloud systems requires a standard API for users to create, manage, and destroy virtual objects, and a standard naming scheme for virtual objects. We introduce an existing API for this purpose, the Slice-Based Federation Architecture, and demonstrate that it can be implemented on a number of existing cloud management systems. We introduce a simple naming scheme for virtual objects, and discuss its implementation.</td>
     449</tr>
     450
     451
     452
     453<tr>
     454     <td valign="top">DOI</td>
     455     <td valign="top">10.1145/2378975.2378980</td>
     456</tr>
     457
     458
     459
     460<tr>
     461     <td valign="top">URL</td>
     462     <td valign="top"><a href="http://dx.doi.org/10.1145/2378975.2378980">http://dx.doi.org/10.1145/2378975.2378980</a></td>
     463</tr>
     464
     465
     466</table></div><br><br>
     467
     468
     469
     470
     471<a class="EntryGoto" id="Berryman, Alex and Calyam, Prasad and Cecil, Joe and Adams, George B. and Comer, Douglas"></a>
     472<b class="myheading" style="position: relative; left: 5%;">Berryman, Alex and Calyam, Prasad and Cecil, Joe and Adams, George B. and Comer, Douglas</b>
     473
     474<div class="BibEntry">
     475
     476<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     477
     478
     479<tr>
     480     <td valign="top">Author</td>
     481     <td valign="top">Berryman, Alex and Calyam, Prasad and Cecil, Joe and Adams, George B. and Comer, Douglas</td>
     482</tr>
     483
     484<tr>
     485     <td valign="top">Title</td>
     486     <td valign="top">Advanced Manufacturing Use Cases and Early Results in GENI Infrastructure</td>
     487</tr>
     488
     489<tr>
     490     <td valign="top">Booktitle</td>
     491     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     492</tr>
     493
     494<tr>
     495     <td valign="top">Location</td>
     496     <td valign="top">Salt Lake City, UT</td>
     497</tr>
     498
     499<tr>
     500     <td valign="top">Publisher</td>
     501     <td valign="top">IEEE</td>
     502</tr>
     503
     504<tr>
     505     <td valign="top">Year</td>
     506     <td valign="top">2013</td>
     507</tr>
     508
     509
     510
     511
     512
     513
     514</table></div><br><br>
     515
     516
     517
     518
     519<a class="EntryGoto" id="Bhanage, G. and Daya, R. and Seskar, I. and Raychaudhuri, D."></a>
     520<b class="myheading" style="position: relative; left: 5%;">Bhanage, G. and Daya, R. and Seskar, I. and Raychaudhuri, D.</b>
     521
     522<div class="BibEntry">
     523
     524<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     525
     526
     527<tr>
     528     <td valign="top">Author</td>
     529     <td valign="top">Bhanage, G. and Daya, R. and Seskar, I. and Raychaudhuri, D.</td>
     530</tr>
     531
     532<tr>
     533     <td valign="top">Title</td>
     534     <td valign="top">VNTS: A Virtual Network Traffic Shaper for Air Time Fairness in 802.16e Systems</td>
     535</tr>
     536
     537<tr>
     538     <td valign="top">Booktitle</td>
     539     <td valign="top">Communications (ICC), 2010 IEEE International Conference on</td>
     540</tr>
     541
     542<tr>
     543     <td valign="top">Publisher</td>
     544     <td valign="top">IEEE</td>
     545</tr>
     546
     547<tr>
     548     <td valign="top">Year</td>
     549     <td valign="top">2010</td>
     550</tr>
     551
     552<tr>
     553     <td valign="top">Abstract</td>
     554     <td valign="top">The 802.16e standard for broadband wireless access mandates the presence of QoS classes, but does not specify guidelines for the scheduler implementation or mechanisms to ensure air time fairness. Our study demonstrates the feasibility of controlling downlink airtime fairness for slices while running above a proprietary WiMAX basestation (BS) scheduler. We design and implement a virtualized infrastructure that allows users to obtain at least an allocated percentage of BS resources in the presence of saturation and link degradation. Using Kernel virtual machines for creating slices and Click modular router for implementing the virtual network traffic shaping engine we show that it is possible to adaptively control slice usage for downlink traffic on a WiMAX Basestation. The fairness index and coupling coefficient show an improvement of up to 42&#x0025;, and 73&#x0025; with preliminary indoor walking mobility experiments. Outdoor vehicular measurements show an improvement of up to 27&#x0025;, and 70\\\\ with the fairness index and coupling coefficient respectively</td>
     555</tr>
     556
     557
     558
     559<tr>
     560     <td valign="top">DOI</td>
     561     <td valign="top">10.1109/ICC.2010.5502484</td>
     562</tr>
     563
     564
     565
     566<tr>
     567     <td valign="top">URL</td>
     568     <td valign="top"><a href="http://dx.doi.org/10.1109/ICC.2010.5502484">http://dx.doi.org/10.1109/ICC.2010.5502484</a></td>
     569</tr>
     570
     571
     572</table></div><br><br>
     573
     574
     575
     576
     577<a class="EntryGoto" id="Bhanage, G. and Seskar, I. and Zhang, Y. and Raychaudhuri, D. and Jain, S."></a>
     578<b class="myheading" style="position: relative; left: 5%;">Bhanage, G. and Seskar, I. and Zhang, Y. and Raychaudhuri, D. and Jain, S.</b>
     579
     580<div class="BibEntry">
     581
     582<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     583
     584
     585<tr>
     586     <td valign="top">Author</td>
     587     <td valign="top">Bhanage, G. and Seskar, I. and Zhang, Y. and Raychaudhuri, D. and Jain, S.</td>
     588</tr>
     589
     590<tr>
     591     <td valign="top">Title</td>
     592     <td valign="top">Experimental evaluation of openvz from a testbed deployment perspective</td>
     593</tr>
     594
     595<tr>
     596     <td valign="top">Journal</td>
     597     <td valign="top">Proceedings of the ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)</td>
     598</tr>
     599
     600<tr>
     601     <td valign="top">Year</td>
     602     <td valign="top">2010</td>
     603</tr>
     604
     605
     606
     607<tr>
     608     <td valign="top">DOI</td>
     609     <td valign="top">10.1007/978-3-642-17851-1&#x005F;7</td>
     610</tr>
     611
     612
     613
     614<tr>
     615     <td valign="top">URL</td>
     616     <td valign="top"><a href="http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;7">http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;7</a></td>
     617</tr>
     618
     619
     620</table></div><br><br>
     621
     622
     623
     624
     625<a class="EntryGoto" id="Bhanage, G. and Vete, D. and Seskar, I. and Raychaudhuri, D."></a>
     626<b class="myheading" style="position: relative; left: 5%;">Bhanage, G. and Vete, D. and Seskar, I. and Raychaudhuri, D.</b>
     627
     628<div class="BibEntry">
     629
     630<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     631
     632
     633<tr>
     634     <td valign="top">Author</td>
     635     <td valign="top">Bhanage, G. and Vete, D. and Seskar, I. and Raychaudhuri, D.</td>
     636</tr>
     637
     638<tr>
     639     <td valign="top">Title</td>
     640     <td valign="top">SplitAP: Leveraging Wireless Network Virtualization for Flexible Sharing of WLANs</td>
     641</tr>
     642
     643<tr>
     644     <td valign="top">Booktitle</td>
     645     <td valign="top">Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE</td>
     646</tr>
     647
     648<tr>
     649     <td valign="top">Publisher</td>
     650     <td valign="top">IEEE</td>
     651</tr>
     652
     653<tr>
     654     <td valign="top">Year</td>
     655     <td valign="top">2010</td>
     656</tr>
     657
     658<tr>
     659     <td valign="top">Abstract</td>
     660     <td valign="top">Providing air-time guarantees across a group of clients forms a fundamental building block in sharing an access point (AP) across different virtual network providers. Though this problem has a relatively simple solution for downlink group scheduling through traffic engineering at the AP, solving this problem for uplink (UL) traffic presents a challenge for fair sharing of wireless hotspots. Among other issues, the mechanism for uplink traffic control has to scale across a large user base, and provide flexible operation irrespective of the client channel conditions and network loads. In this study, we propose the SplitAP architecture that address the problem of sharing uplink airtime across groups of users by extending the idea of network virtualization. Our architecture allows us to deploy different algorithms for enforcing UL airtime fairness across client groups. In this study, we will highlight the design features of the SplitAP architecture, and present results from evaluation on a prototype deployed with: (1) LPFC and (2) LPFC+, two algorithms for controlling UL group fairness. Performance comparisons on the ORBIT testbed show that the proposed algorithms are capable of providing group air-time fairness across wireless clients irrespective of the network volume, and traffic type. The algorithms show up to 40&#x0025; improvement with a modified Jain fairness index.</td>
     661</tr>
     662
     663
     664
     665<tr>
     666     <td valign="top">DOI</td>
     667     <td valign="top">10.1109/GLOCOM.2010.5684328</td>
     668</tr>
     669
     670
     671
     672<tr>
     673     <td valign="top">URL</td>
     674     <td valign="top"><a href="http://dx.doi.org/10.1109/GLOCOM.2010.5684328">http://dx.doi.org/10.1109/GLOCOM.2010.5684328</a></td>
     675</tr>
     676
     677
     678</table></div><br><br>
     679
     680
     681
     682
     683<a class="EntryGoto" id="Bhanage, Gautam and Seskar, Ivan and Mahindra, Rajesh and Raychaudhuri, Dipankar"></a>
     684<b class="myheading" style="position: relative; left: 5%;">Bhanage, Gautam and Seskar, Ivan and Mahindra, Rajesh and Raychaudhuri, Dipankar</b>
     685
     686<div class="BibEntry">
     687
     688<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     689
     690
     691<tr>
     692     <td valign="top">Author</td>
     693     <td valign="top">Bhanage, Gautam and Seskar, Ivan and Mahindra, Rajesh and Raychaudhuri, Dipankar</td>
     694</tr>
     695
     696<tr>
     697     <td valign="top">Title</td>
     698     <td valign="top">Virtual basestation: architecture for an open shared WiMAX framework</td>
     699</tr>
     700
     701<tr>
     702     <td valign="top">Booktitle</td>
     703     <td valign="top">Proceedings of the second ACM SIGCOMM workshop on Virtualized infrastructure systems and architectures</td>
     704</tr>
     705
     706<tr>
     707     <td valign="top">Location</td>
     708     <td valign="top">New Delhi, India</td>
     709</tr>
     710
     711<tr>
     712     <td valign="top">Publisher</td>
     713     <td valign="top">ACM</td>
     714</tr>
     715
     716<tr>
     717     <td valign="top">Address</td>
     718     <td valign="top">New York, NY, USA</td>
     719</tr>
     720
     721<tr>
     722     <td valign="top">Year</td>
     723     <td valign="top">2010</td>
     724</tr>
     725
     726<tr>
     727     <td valign="top">Abstract</td>
     728     <td valign="top">This paper presents the architecture and performance evaluation of a virtualized wide-area &#x34;&#x0308;G&#x20;&#x0308;cellular wireless network. Specifically, it addresses the challenges of virtualization of resources in a cellular base station to enable shared use by multiple independent slice users (experimenters or mobile virtual network operators), each with possibly distinct flow types and network layer protocols. The proposed virtual basestation architecture is based on an external substrate which uses a layer-2 switched datapath, and an arbitrated control path to the WiMAX basestation. The framework implements virtualization of base station's radio resources to achieve isolation between multiple virtual networks. An algorithm for weighted fair sharing among multiple slices based on an airtime fairness metric has been implemented for the first release. Preliminary experimental results from the virtual basestation prototype are given, demonstrating mobile network performance, isolation across slices with different flow types, and custom flow scheduling capabilities.</td>
     729</tr>
     730
     731
     732
     733<tr>
     734     <td valign="top">DOI</td>
     735     <td valign="top">10.1145/1851399.1851401</td>
     736</tr>
     737
     738
     739
     740<tr>
     741     <td valign="top">URL</td>
     742     <td valign="top"><a href="http://dx.doi.org/10.1145/1851399.1851401">http://dx.doi.org/10.1145/1851399.1851401</a></td>
     743</tr>
     744
     745
     746</table></div><br><br>
     747
     748
     749
     750
     751<a class="EntryGoto" id="Bhanage, Gautam and Seskar, Ivan and Raychaudhuri, Dipankar"></a>
     752<b class="myheading" style="position: relative; left: 5%;">Bhanage, Gautam and Seskar, Ivan and Raychaudhuri, Dipankar</b>
     753
     754<div class="BibEntry">
     755
     756<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     757
     758
     759<tr>
     760     <td valign="top">Author</td>
     761     <td valign="top">Bhanage, Gautam and Seskar, Ivan and Raychaudhuri, Dipankar</td>
     762</tr>
     763
     764<tr>
     765     <td valign="top">Title</td>
     766     <td valign="top">A virtualization architecture for mobile WiMAX networks</td>
     767</tr>
     768
     769<tr>
     770     <td valign="top">Journal</td>
     771     <td valign="top">SIGMOBILE Mob. Comput. Commun. Rev.</td>
     772</tr>
     773
     774<tr>
     775     <td valign="top">Publisher</td>
     776     <td valign="top">ACM</td>
     777</tr>
     778
     779<tr>
     780     <td valign="top">Address</td>
     781     <td valign="top">New York, NY, USA</td>
     782</tr>
     783
     784<tr>
     785     <td valign="top">Year</td>
     786     <td valign="top">2012</td>
     787</tr>
     788
     789<tr>
     790     <td valign="top">Abstract</td>
     791     <td valign="top">Systems virtualization offers convenient means for sharing networking infrastructure while improving its utilization. This study addresses the challenges of virtualizing a commercial off-the-shelf 4G mobileWiMAX basestation. We highlight additions and modifications needed in theWiMAX network architecture for supporting multiple simultaneous virtual basestations on a single physical basestation. The most prominent features provided by the proposed virtual basestation framework include the capability to perform all frame switching at layer-2, and control mechanisms to provide isolation across slices needed to ensure experiment repeatability. By prototyping on a commercial WiMAX radio, this paper shows the usage of the virtual basestation system for housing mobile virtual network operators and testbeds alike. A use case is shown where the virtual basestation design is used to evaluate mobile handoff schemes. Another usage case is shown for optimizing a video delivery on the edge. The video delivery use case is used to show performance improvements of up to 5dB in the PSNR. Evaluation of prototype shows a significant improvement in the slice isolation, with aggregate throughput improvements of up to 192&#x0025; achievable through fair resource allocation.</td>
     792</tr>
     793
     794
     795
     796<tr>
     797     <td valign="top">DOI</td>
     798     <td valign="top">10.1145/2169077.2169082</td>
     799</tr>
     800
     801
     802
     803<tr>
     804     <td valign="top">URL</td>
     805     <td valign="top"><a href="http://dx.doi.org/10.1145/2169077.2169082">http://dx.doi.org/10.1145/2169077.2169082</a></td>
     806</tr>
     807
     808
     809</table></div><br><br>
     810
     811
     812
     813
     814<a class="EntryGoto" id="Blanton, Ethan and Chatterjee, Sarbajit and Gangam, Sriharsha and Kala, Sumit and Sharma, Deepti and Fahmy, Sonia and Sharma, Puneet"></a>
     815<b class="myheading" style="position: relative; left: 5%;">Blanton, Ethan and Chatterjee, Sarbajit and Gangam, Sriharsha and Kala, Sumit and Sharma, Deepti and Fahmy, Sonia and Sharma, Puneet</b>
     816
     817<div class="BibEntry">
     818
     819<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     820
     821
     822<tr>
     823     <td valign="top">Author</td>
     824     <td valign="top">Blanton, Ethan and Chatterjee, Sarbajit and Gangam, Sriharsha and Kala, Sumit and Sharma, Deepti and Fahmy, Sonia and Sharma, Puneet</td>
     825</tr>
     826
     827<tr>
     828     <td valign="top">Title</td>
     829     <td valign="top">Design and evaluation of the S<sup>3</sup> monitor network measurement service on GENI</td>
     830</tr>
     831
     832<tr>
     833     <td valign="top">Booktitle</td>
     834     <td valign="top">2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)</td>
     835</tr>
     836
     837<tr>
     838     <td valign="top">Location</td>
     839     <td valign="top">Bangalore, India</td>
     840</tr>
     841
     842<tr>
     843     <td valign="top">Publisher</td>
     844     <td valign="top">IEEE</td>
     845</tr>
     846
     847<tr>
     848     <td valign="top">Year</td>
     849     <td valign="top">2012</td>
     850</tr>
     851
     852<tr>
     853     <td valign="top">Abstract</td>
     854     <td valign="top">Network monitoring capabilities are critical for both network operators and networked applications. In the context of an experimental test facility, network measurement is important for researchers experimenting with new network architectures and applications, as well as operators of the test facility itself. The Global Environment for Network Innovations (GENI) is a sophisticated test facility comprised of multiple ” control frameworks.” In this paper, we describe the design and implementation of S</td>
     855</tr>
     856
     857
     858
     859<tr>
     860     <td valign="top">DOI</td>
     861     <td valign="top">10.1109/COMSNETS.2012.6151327</td>
     862</tr>
     863
     864
     865
     866<tr>
     867     <td valign="top">URL</td>
     868     <td valign="top"><a href="http://dx.doi.org/10.1109/COMSNETS.2012.6151327">http://dx.doi.org/10.1109/COMSNETS.2012.6151327</a></td>
     869</tr>
     870
     871
     872</table></div><br><br>
     873
     874
     875
     876
     877<a class="EntryGoto" id="Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A."></a>
     878<b class="myheading" style="position: relative; left: 5%;">Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A.</b>
     879
     880<div class="BibEntry">
     881
     882<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     883
     884
     885<tr>
     886     <td valign="top">Author</td>
     887     <td valign="top">Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A.</td>
     888</tr>
     889
     890<tr>
     891     <td valign="top">Title</td>
     892     <td valign="top">Enabling performance intelligence for application adaptation in the Future Internet</td>
     893</tr>
     894
     895<tr>
     896     <td valign="top">Journal</td>
     897     <td valign="top">Communications and Networks, Journal of</td>
     898</tr>
     899
     900<tr>
     901     <td valign="top">Year</td>
     902     <td valign="top">2011</td>
     903</tr>
     904
     905
     906
     907<tr>
     908     <td valign="top">DOI</td>
     909     <td valign="top">10.1109/JCN.2011.6157475</td>
     910</tr>
     911
     912
     913
     914<tr>
     915     <td valign="top">URL</td>
     916     <td valign="top"><a href="http://dx.doi.org/10.1109/JCN.2011.6157475">http://dx.doi.org/10.1109/JCN.2011.6157475</a></td>
     917</tr>
     918
     919
     920</table></div><br><br>
     921
     922
     923
     924
     925<a class="EntryGoto" id="Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio"></a>
     926<b class="myheading" style="position: relative; left: 5%;">Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio</b>
     927
     928<div class="BibEntry">
     929
     930<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     931
     932
     933<tr>
     934     <td valign="top">Author</td>
     935     <td valign="top">Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio</td>
     936</tr>
     937
     938<tr>
     939     <td valign="top">Title</td>
     940     <td valign="top">Experiences from Virtual Desktop CloudExperiments in GENI</td>
     941</tr>
     942
     943<tr>
     944     <td valign="top">Booktitle</td>
     945     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     946</tr>
     947
     948<tr>
     949     <td valign="top">Location</td>
     950     <td valign="top">Los Angeles</td>
     951</tr>
     952
     953<tr>
     954     <td valign="top">Year</td>
     955     <td valign="top">2012</td>
     956</tr>
     957
     958<tr>
     959     <td valign="top">Abstract</td>
     960     <td valign="top">Popular applications such as email, photo/video galleries, and file storage are increasingly being supported by cloud platforms in residential, academia and industry communities. The next frontier for these user communities will be to transition 'traditional desktops' that have dedicated hardware and software configurations into 'virtual desktop clouds' that are accessible via thin-clients. In this paper, we describe experiences from our research and development of virtual desktop cloud experiments in GENI. Our experimentation goal is to investigate and develop optimal resource allocation frameworks and performance bench- marking tools that can enable provisioning (i.e., resource sizing) and placement (i.e., resource mapping) of thin-client based virtual desktops at Internet-scale. We first motivate why virtual desktop cloud experiments cannot be done only at a table-top level, and why infrastructures such as GENI are essential. Next, we detail the methodology of our completed ” provisioning” experiments, and our work-in-progress ” placement” experiments in GENI that leverage multiple kinds of GENI resources such as aggregates, measurement services and experimenter workflow tools, as well as commercial software. Lastly, we present our vision on how our experiment slice setup and application development experiences, as well as outcomes can be leveraged in classroom labs, and 'living labs' that use GENI resources to foster training and wide- adoption of Future Internet applications.</td>
     961</tr>
     962
     963
     964
     965
     966
     967
     968</table></div><br><br>
     969
     970
     971
     972
     973<a class="EntryGoto" id="Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James"></a>
     974<b class="myheading" style="position: relative; left: 5%;">Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James</b>
     975
     976<div class="BibEntry">
     977
     978<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     979
     980
     981<tr>
     982     <td valign="top">Author</td>
     983     <td valign="top">Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James</td>
     984</tr>
     985
     986<tr>
     987     <td valign="top">Title</td>
     988     <td valign="top">WiMAX: Bandwidth Contention Resolution Vulnerability to Denial of Service Attacks</td>
     989</tr>
     990
     991<tr>
     992     <td valign="top">Booktitle</td>
     993     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     994</tr>
     995
     996<tr>
     997     <td valign="top">Location</td>
     998     <td valign="top">Los Angeles</td>
     999</tr>
     1000
     1001<tr>
     1002     <td valign="top">Year</td>
     1003     <td valign="top">2012</td>
     1004</tr>
     1005
     1006<tr>
     1007     <td valign="top">Abstract</td>
     1008     <td valign="top">Wireless communications is part of everyday life and 4G technology, including WiMAX, offers higher data rates and wider coverage than predecessor 3G technologies. Many security vulnerabilities have been discovered in 3G protocols and these vulnerabilities may still exist in next generation 4G protocols. This paper examines how system parameters for the WiMAX Bandwidth Contention Resolution process can affect network vulnerability to DoS attacks. It will present software simulations that explore system parameter settings and will cover the current phase of hardware simulations.</td>
     1009</tr>
     1010
     1011
     1012
     1013
     1014
     1015
     1016</table></div><br><br>
     1017
     1018
     1019
     1020
     1021<a class="EntryGoto" id="Chakrabortty, Aranya and Xin, Yufeng"></a>
     1022<b class="myheading" style="position: relative; left: 5%;">Chakrabortty, Aranya and Xin, Yufeng</b>
     1023
     1024<div class="BibEntry">
     1025
     1026<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1027
     1028
     1029<tr>
     1030     <td valign="top">Author</td>
     1031     <td valign="top">Chakrabortty, Aranya and Xin, Yufeng</td>
     1032</tr>
     1033
     1034<tr>
     1035     <td valign="top">Title</td>
     1036     <td valign="top">Hardware-in-the-Loop Simulations and Verifications of Smart Power Systems Over an Exo-GENI Testbed</td>
     1037</tr>
     1038
     1039<tr>
     1040     <td valign="top">Booktitle</td>
     1041     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     1042</tr>
     1043
     1044<tr>
     1045     <td valign="top">Location</td>
     1046     <td valign="top">Salt Lake City, UT</td>
     1047</tr>
     1048
     1049<tr>
     1050     <td valign="top">Publisher</td>
     1051     <td valign="top">IEEE</td>
     1052</tr>
     1053
     1054<tr>
     1055     <td valign="top">Year</td>
     1056     <td valign="top">2013</td>
     1057</tr>
     1058
     1059
     1060
     1061
     1062
     1063
     1064</table></div><br><br>
     1065
     1066
     1067
     1068
     1069<a class="EntryGoto" id="Chen, Kang and Shen, Haiying and Zhang, Haibo"></a>
     1070<b class="myheading" style="position: relative; left: 5%;">Chen, Kang and Shen, Haiying and Zhang, Haibo</b>
     1071
     1072<div class="BibEntry">
     1073
     1074<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1075
     1076
     1077<tr>
     1078     <td valign="top">Author</td>
     1079     <td valign="top">Chen, Kang and Shen, Haiying and Zhang, Haibo</td>
     1080</tr>
     1081
     1082<tr>
     1083     <td valign="top">Title</td>
     1084     <td valign="top">Leveraging Social Networks for P2P Content-Based File Sharing in Mobile Ad Hoc Networks</td>
     1085</tr>
     1086
     1087<tr>
     1088     <td valign="top">Booktitle</td>
     1089     <td valign="top">2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems</td>
     1090</tr>
     1091
     1092<tr>
     1093     <td valign="top">Location</td>
     1094     <td valign="top">Valencia, Spain</td>
     1095</tr>
     1096
     1097<tr>
     1098     <td valign="top">Publisher</td>
     1099     <td valign="top">IEEE</td>
     1100</tr>
     1101
     1102<tr>
     1103     <td valign="top">Year</td>
     1104     <td valign="top">2011</td>
     1105</tr>
     1106
     1107<tr>
     1108     <td valign="top">Abstract</td>
     1109     <td valign="top">Current P2P file sharing methods in mobile ad hoc networks (MANETs) can be classified into three groups: flooding-based, advertisement-based and social contact-based. The first two groups of methods can easily generate high overhead and low scalability, and the third group fails to consider the social interests (content) of mobile nodes, which otherwise can improve file searching efficiency. In this paper, we propose a P2P content-based file sharing system for MANETs. The system uses an interest extraction algorithm to derive a node's interests from its files for complex queries. For efficient file searching, it groups common-interest nodes that frequently meet with each other as communities. Further, it takes advantage of node mobility by designating stable nodes, which has frequent contact with community members, as community coordinators for intra-community searching, and highly-mobile nodes as community ambassadors for inter-community searching. An interest-oriented file searching scheme further enhances the file searching success rate. We first deployed our system on the real-world GENI Orbit testbed with a real trace and then conducted experiment on the ns2 simulator with both real trace and simulated disconnected and connected MANET scenario. The test results show that our system significantly lowers transmission cost and improves file searching success rate compared to current methods.</td>
     1110</tr>
     1111
     1112
     1113
     1114<tr>
     1115     <td valign="top">DOI</td>
     1116     <td valign="top">10.1109/MASS.2011.24</td>
     1117</tr>
     1118
     1119
     1120
     1121<tr>
     1122     <td valign="top">URL</td>
     1123     <td valign="top"><a href="http://dx.doi.org/10.1109/MASS.2011.24">http://dx.doi.org/10.1109/MASS.2011.24</a></td>
     1124</tr>
     1125
     1126
     1127</table></div><br><br>
     1128
     1129
     1130
     1131
     1132<a class="EntryGoto" id="Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze"></a>
     1133<b class="myheading" style="position: relative; left: 5%;">Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze</b>
     1134
     1135<div class="BibEntry">
     1136
     1137<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1138
     1139
     1140<tr>
     1141     <td valign="top">Author</td>
     1142     <td valign="top">Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze</td>
     1143</tr>
     1144
     1145<tr>
     1146     <td valign="top">Title</td>
     1147     <td valign="top">Experimentation of a MANET Routing Algorithm on the GENI ORBIT Testbed</td>
     1148</tr>
     1149
     1150<tr>
     1151     <td valign="top">Booktitle</td>
     1152     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     1153</tr>
     1154
     1155<tr>
     1156     <td valign="top">Location</td>
     1157     <td valign="top">Los Angeles</td>
     1158</tr>
     1159
     1160<tr>
     1161     <td valign="top">Year</td>
     1162     <td valign="top">2012</td>
     1163</tr>
     1164
     1165<tr>
     1166     <td valign="top">Abstract</td>
     1167     <td valign="top">This paper proposes a systematic procedure for experimentation of Mobile ad hoc networks (MANETs) on the ORBIT testbed. MANETs have attracted significant re- search interests in recent years. Most of routing or file sharing algorithms in MANETs were only evaluated by theoretical analysis or simulations because of the requirement of large scale networks. However, due to the distinctive properties of MANETs, such as mobility and decentralized structure, it has been non-trivial to deploy a real testbed for the verification. The Global Environment for Network Innovations (GENI) project sponsored by the National Science Foundation (NSF) provides an exploratory environment for academic real-world experiments, such as the ORBIT testbed. A stable and repeatable procedure for experimentation on real testbeds is necessary and important to assure the validity of results. In this paper, a MANET routing algorithm, namely LORD, was tested on the ORBIT testbed, using the proposed procedure. Specifically, we first configure the wireless interface on each node to enable the communication between each pair of nodes. Then a set of methods are adopted to construct the MANETs scenario for test. The network status is monitored throughout the entire duration of experiments. Finally, the experiment results of LORD on the GENI ORBIT testbed are demonstrated.</td>
     1168</tr>
     1169
     1170
     1171
     1172
     1173
     1174
     1175</table></div><br><br>
     1176
     1177
     1178
     1179
     1180<a class="EntryGoto" id="Cherukuri, Ramkumar and Liu, Xuan and Bavier, Andy and Sterbenz, James P. G. and Medhi, Deep"></a>
     1181<b class="myheading" style="position: relative; left: 5%;">Cherukuri, Ramkumar and Liu, Xuan and Bavier, Andy and Sterbenz, James P. G. and Medhi, Deep</b>
     1182
     1183<div class="BibEntry">
     1184
     1185<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1186
     1187
     1188<tr>
     1189     <td valign="top">Author</td>
     1190     <td valign="top">Cherukuri, Ramkumar and Liu, Xuan and Bavier, Andy and Sterbenz, James P. G. and Medhi, Deep</td>
     1191</tr>
     1192
     1193<tr>
     1194     <td valign="top">Title</td>
     1195     <td valign="top">Network virtualization in GpENI: Framework, implementation &#x0026;amp; integration experience</td>
     1196</tr>
     1197
     1198<tr>
     1199     <td valign="top">Booktitle</td>
     1200     <td valign="top">12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops</td>
     1201</tr>
     1202
     1203<tr>
     1204     <td valign="top">Location</td>
     1205     <td valign="top">Dublin, Ireland</td>
     1206</tr>
     1207
     1208<tr>
     1209     <td valign="top">Publisher</td>
     1210     <td valign="top">IEEE</td>
     1211</tr>
     1212
     1213<tr>
     1214     <td valign="top">Year</td>
     1215     <td valign="top">2011</td>
     1216</tr>
     1217
     1218<tr>
     1219     <td valign="top">Abstract</td>
     1220     <td valign="top">Great Plains Environment for Network Innovation (GpENI) is an international testbed for future Internet research. A key component of GpENI is programmable network virtualization (GpENI-VINI). The scope of this paper is to present the framework, implementation and integration experience with network virtualization in GpENI. In particular, this is described through our experience of implementing and integrating the XORP (eXtensible Open Router Platform) routing platform into GpENI-VINI. Preliminary results on measurements and validation are presented.</td>
     1221</tr>
     1222
     1223
     1224
     1225<tr>
     1226     <td valign="top">DOI</td>
     1227     <td valign="top">10.1109/INM.2011.5990568</td>
     1228</tr>
     1229
     1230
     1231
     1232<tr>
     1233     <td valign="top">URL</td>
     1234     <td valign="top"><a href="http://dx.doi.org/10.1109/INM.2011.5990568">http://dx.doi.org/10.1109/INM.2011.5990568</a></td>
     1235</tr>
     1236
     1237
     1238</table></div><br><br>
     1239
     1240
     1241
     1242
     1243<a class="EntryGoto" id="Chowdhury and Boutaba, Raouf"></a>
     1244<b class="myheading" style="position: relative; left: 5%;">Chowdhury and Boutaba, Raouf</b>
     1245
     1246<div class="BibEntry">
     1247
     1248<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1249
     1250
     1251<tr>
     1252     <td valign="top">Author</td>
     1253     <td valign="top">Chowdhury and Boutaba, Raouf</td>
     1254</tr>
     1255
     1256<tr>
     1257     <td valign="top">Title</td>
     1258     <td valign="top">A survey of network virtualization</td>
     1259</tr>
     1260
     1261<tr>
     1262     <td valign="top">Journal</td>
     1263     <td valign="top">Computer Networks</td>
     1264</tr>
     1265
     1266<tr>
     1267     <td valign="top">Year</td>
     1268     <td valign="top">2010</td>
     1269</tr>
     1270
     1271
     1272
     1273<tr>
     1274     <td valign="top">DOI</td>
     1275     <td valign="top">http://dx.doi.org/10.1016/j.comnet.2009.10.017</td>
     1276</tr>
     1277
     1278
     1279
     1280<tr>
     1281     <td valign="top">URL</td>
     1282     <td valign="top"><a href="http://www.sciencedirect.com/science/article/pii/S1389128609003387">http://www.sciencedirect.com/science/article/pii/S1389128609003387</a></td>
     1283</tr>
     1284
     1285
     1286</table></div><br><br>
     1287
     1288
     1289
     1290
     1291<a class="EntryGoto" id="Deng, Juan and Brooks, Richard R. and Martin, James"></a>
     1292<b class="myheading" style="position: relative; left: 5%;">Deng, Juan and Brooks, Richard R. and Martin, James</b>
     1293
     1294<div class="BibEntry">
     1295
     1296<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1297
     1298
     1299<tr>
     1300     <td valign="top">Author</td>
     1301     <td valign="top">Deng, Juan and Brooks, Richard R. and Martin, James</td>
     1302</tr>
     1303
     1304<tr>
     1305     <td valign="top">Title</td>
     1306     <td valign="top">Assessing the Effect of WiMAX System Parameter Settings on MAC-level Local DoS Vulnerability</td>
     1307</tr>
     1308
     1309<tr>
     1310     <td valign="top">Journal</td>
     1311     <td valign="top">International Journal of Performability Engineering</td>
     1312</tr>
     1313
     1314<tr>
     1315     <td valign="top">Year</td>
     1316     <td valign="top">2012</td>
     1317</tr>
     1318
     1319<tr>
     1320     <td valign="top">Abstract</td>
     1321     <td valign="top">The research community has established that WiMAX networks suffer from Denial of Service (DoS) vulnerabilities. In this paper, we analyze how WiMAX system parameter settings increase or decrease DoS vulnerabilities of WiMAX networks. The behavior of the WiMAX MAC level protocol is sensitive to the settings of core system parameters. Unlike traditional network-based DoS attacks, attacks resulting from parameter misconfiguration are difficult for network operators to detect. We focus on bandwidth contention resolution aspects of the WiMAX MAC protocol. Simulations are performed using the ns-2 simulator. Analysis of Variance (ANOVA) techniques on the resulting simulation data identify which bandwidth contention resolution parameter combinations are crucial for configuring WiMAX to be less vulnerable to DoS attacks.</td>
     1322</tr>
     1323
     1324
     1325
     1326
     1327
     1328
     1329</table></div><br><br>
     1330
     1331
     1332
     1333
     1334<a class="EntryGoto" id="Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Strum, Matt and Wong, Gary and Carpenter, Charles and Fei, Zongming and Griffioen, James and Nasir, Hussamuddin and Reed, Jeremy and Wu, Xiongqi"></a>
     1335<b class="myheading" style="position: relative; left: 5%;">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Strum, Matt and Wong, Gary and Carpenter, Charles and Fei, Zongming and Griffioen, James and Nasir, Hussamuddin and Reed, Jeremy and Wu, Xiongqi</b>
     1336
     1337<div class="BibEntry">
     1338
     1339<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1340
     1341
     1342<tr>
     1343     <td valign="top">Author</td>
     1344     <td valign="top">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Strum, Matt and Wong, Gary and Carpenter, Charles and Fei, Zongming and Griffioen, James and Nasir, Hussamuddin and Reed, Jeremy and Wu, Xiongqi</td>
     1345</tr>
     1346
     1347<tr>
     1348     <td valign="top">Title</td>
     1349     <td valign="top">Getting started with GENI: a user tutorial</td>
     1350</tr>
     1351
     1352<tr>
     1353     <td valign="top">Journal</td>
     1354     <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
     1355</tr>
     1356
     1357<tr>
     1358     <td valign="top">Publisher</td>
     1359     <td valign="top">ACM</td>
     1360</tr>
     1361
     1362<tr>
     1363     <td valign="top">Address</td>
     1364     <td valign="top">New York, NY, USA</td>
     1365</tr>
     1366
     1367<tr>
     1368     <td valign="top">Year</td>
     1369     <td valign="top">2012</td>
     1370</tr>
     1371
     1372<tr>
     1373     <td valign="top">Abstract</td>
     1374     <td valign="top">GENI, the Global Environment for Network Innovations, is a National Science Foundation project to create a &#x76;&#x0308;irtual laboratory at the frontiers of network science and engineering for exploring future internets at scale.&#x20;&#x0308;It provides researchers, educators, and students with resources that they can use to build their own networks that span the country and - through federation - the world. GENI enables experimenters to try out bold new network architectures and designs for networked systems, and to deploy and evaluate these systems on a diverse set of resources over a large footprint. This tutorial is a starting point for running experiments on GENI. It provides an overview of GENI and covers the process of creating a network and running a simple experiment using two tools: the Flack GUI and the INSTOOLS instrumentation service.</td>
     1375</tr>
     1376
     1377
     1378
     1379<tr>
     1380     <td valign="top">DOI</td>
     1381     <td valign="top">10.1145/2096149.2096161</td>
     1382</tr>
     1383
     1384
     1385
     1386<tr>
     1387     <td valign="top">URL</td>
     1388     <td valign="top"><a href="http://dx.doi.org/10.1145/2096149.2096161">http://dx.doi.org/10.1145/2096149.2096161</a></td>
     1389</tr>
     1390
     1391
     1392</table></div><br><br>
     1393
     1394
     1395
     1396
     1397<a class="EntryGoto" id="Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Wong, Gary and Chikkulapelly, Srikanth and Seok, Woojin"></a>
     1398<b class="myheading" style="position: relative; left: 5%;">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Wong, Gary and Chikkulapelly, Srikanth and Seok, Woojin</b>
     1399
     1400<div class="BibEntry">
     1401
     1402<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1403
     1404
     1405<tr>
     1406     <td valign="top">Author</td>
     1407     <td valign="top">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Wong, Gary and Chikkulapelly, Srikanth and Seok, Woojin</td>
     1408</tr>
     1409
     1410<tr>
     1411     <td valign="top">Title</td>
     1412     <td valign="top">Designing a Federated Testbed as a Distributed System</td>
     1413</tr>
     1414
     1415<tr>
     1416     <td valign="top">Journal</td>
     1417     <td valign="top">8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2012)</td>
     1418</tr>
     1419
     1420<tr>
     1421     <td valign="top">Year</td>
     1422     <td valign="top">2012</td>
     1423</tr>
     1424
     1425<tr>
     1426     <td valign="top">Abstract</td>
     1427     <td valign="top">Traditionally, testbeds for networking and systems research have been stand-alone facilities: each is owned and operated by a single administrative entity, and is intended to be used independently of other testbeds. However, this isolated facility model is at odds with researchers' ever-increasing needs for experiments at larger scale and with a broader diversity of network technologies. The research community will be much better served by a federated model. In this model, each federated testbed maintains its own autonomy and unique strengths, but all federates work together to make their resources available under a common framework. Our challenge, then, is to design a federated testbed framework that balances competing needs: We must establish trust, but at the same time maintain the autonomy of each federated facility. While providing a unified interface to a broad set of resources, we need to expose the diversity that makes them valuable. Finally, our federation should work smoothly in a coordinated fashion, but avoid central points of failure and inter-facility dependencies. We argue that treating testbed design as a federated distributed systems problem is an effective approach to achieving this balance. The technique is illustrated through the example of ProtoGENI, a system we have designed, built, and operated according to the federated model.</td>
     1428</tr>
     1429
     1430
     1431
     1432
     1433
     1434
     1435</table></div><br><br>
     1436
     1437
     1438
     1439
     1440<a class="EntryGoto" id="Elliott, Chip and Falk, Aaron"></a>
     1441<b class="myheading" style="position: relative; left: 5%;">Elliott, Chip and Falk, Aaron</b>
     1442
     1443<div class="BibEntry">
     1444
     1445<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1446
     1447
     1448<tr>
     1449     <td valign="top">Author</td>
     1450     <td valign="top">Elliott, Chip and Falk, Aaron</td>
     1451</tr>
     1452
     1453<tr>
     1454     <td valign="top">Title</td>
     1455     <td valign="top">An update on the GENI project</td>
     1456</tr>
     1457
     1458<tr>
     1459     <td valign="top">Journal</td>
     1460     <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
     1461</tr>
     1462
     1463<tr>
     1464     <td valign="top">Publisher</td>
     1465     <td valign="top">ACM</td>
     1466</tr>
     1467
     1468<tr>
     1469     <td valign="top">Address</td>
     1470     <td valign="top">New York, NY, USA</td>
     1471</tr>
     1472
     1473<tr>
     1474     <td valign="top">Year</td>
     1475     <td valign="top">2009</td>
     1476</tr>
     1477
     1478<tr>
     1479     <td valign="top">Abstract</td>
     1480     <td valign="top">Environment for Network Innovations. Early prototypes of GENI are starting to come online as an end-to-end system and network researchers are invited to participate by engaging in the design process or using GENI to conduct experiments.</td>
     1481</tr>
     1482
     1483
     1484
     1485<tr>
     1486     <td valign="top">DOI</td>
     1487     <td valign="top">10.1145/1568613.1568620</td>
     1488</tr>
     1489
     1490
     1491
     1492<tr>
     1493     <td valign="top">URL</td>
     1494     <td valign="top"><a href="http://dx.doi.org/10.1145/1568613.1568620">http://dx.doi.org/10.1145/1568613.1568620</a></td>
     1495</tr>
     1496
     1497
     1498</table></div><br><br>
     1499
     1500
     1501
     1502
     1503<a class="EntryGoto" id="Erazo, Miguel A. and Liu, Jason"></a>
     1504<b class="myheading" style="position: relative; left: 5%;">Erazo, Miguel A. and Liu, Jason</b>
     1505
     1506<div class="BibEntry">
     1507
     1508<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1509
     1510
     1511<tr>
     1512     <td valign="top">Author</td>
     1513     <td valign="top">Erazo, Miguel A. and Liu, Jason</td>
     1514</tr>
     1515
     1516<tr>
     1517     <td valign="top">Title</td>
     1518     <td valign="top">On enabling real-time large-scale network simulation in GENI: the PrimoGENI approach</td>
     1519</tr>
     1520
     1521<tr>
     1522     <td valign="top">Booktitle</td>
     1523     <td valign="top">Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques</td>
     1524</tr>
     1525
     1526<tr>
     1527     <td valign="top">Location</td>
     1528     <td valign="top">Torremolinos, Malaga, Spain</td>
     1529</tr>
     1530
     1531<tr>
     1532     <td valign="top">Publisher</td>
     1533     <td valign="top">ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)</td>
     1534</tr>
     1535
     1536<tr>
     1537     <td valign="top">Address</td>
     1538     <td valign="top">ICST, Brussels, Belgium, Belgium</td>
     1539</tr>
     1540
     1541<tr>
     1542     <td valign="top">Year</td>
     1543     <td valign="top">2010</td>
     1544</tr>
     1545
     1546<tr>
     1547     <td valign="top">Abstract</td>
     1548     <td valign="top">The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform, a &#x76;&#x0308;irtual laboratory&#x20;&#x0308;for the design, implementation and evaluation of future Internets. In this paper, we present an overview of PrimoGENI, a GENI project with the goal of extending the GENI suite of interoperable infrastructure to allow network experiments at scale, involving physical, simulated and emulated network entities.</td>
     1549</tr>
     1550
     1551
     1552
     1553<tr>
     1554     <td valign="top">DOI</td>
     1555     <td valign="top">10.4108/ICST.SIMUTOOLS2010.8636</td>
     1556</tr>
     1557
     1558
     1559
     1560<tr>
     1561     <td valign="top">URL</td>
     1562     <td valign="top"><a href="http://dx.doi.org/10.4108/ICST.SIMUTOOLS2010.8636">http://dx.doi.org/10.4108/ICST.SIMUTOOLS2010.8636</a></td>
     1563</tr>
     1564
     1565
     1566</table></div><br><br>
     1567
     1568
     1569
     1570
     1571<a class="EntryGoto" id="Esposito, Flavio and Wang, Yuefeng and Matta, Ibrahim and Day, John"></a>
     1572<b class="myheading" style="position: relative; left: 5%;">Esposito, Flavio and Wang, Yuefeng and Matta, Ibrahim and Day, John</b>
     1573
     1574<div class="BibEntry">
     1575
     1576<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1577
     1578
     1579<tr>
     1580     <td valign="top">Author</td>
     1581     <td valign="top">Esposito, Flavio and Wang, Yuefeng and Matta, Ibrahim and Day, John</td>
     1582</tr>
     1583
     1584<tr>
     1585     <td valign="top">Title</td>
     1586     <td valign="top">Dynamic Layer Instantiation as a Service</td>
     1587</tr>
     1588
     1589<tr>
     1590     <td valign="top">Location</td>
     1591     <td valign="top">Lombard, IL</td>
     1592</tr>
     1593
     1594<tr>
     1595     <td valign="top">Publisher</td>
     1596     <td valign="top">USENIX Association</td>
     1597</tr>
     1598
     1599<tr>
     1600     <td valign="top">Address</td>
     1601     <td valign="top">Berkeley, CA, USA</td>
     1602</tr>
     1603
     1604<tr>
     1605     <td valign="top">Year</td>
     1606     <td valign="top">2013</td>
     1607</tr>
     1608
     1609
     1610
     1611
     1612
     1613<tr>
     1614     <td valign="top">URL</td>
     1615     <td valign="top"><a href="https://www.usenix.org/system/files/nsdip13-paper11.pdf">https://www.usenix.org/system/files/nsdip13-paper11.pdf</a></td>
     1616</tr>
     1617
     1618
     1619</table></div><br><br>
     1620
     1621
     1622
     1623
     1624<a class="EntryGoto" id="Feamster, Nick and Gao, Lixin and Rexford, Jennifer"></a>
     1625<b class="myheading" style="position: relative; left: 5%;">Feamster, Nick and Gao, Lixin and Rexford, Jennifer</b>
     1626
     1627<div class="BibEntry">
     1628
     1629<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1630
     1631
     1632<tr>
     1633     <td valign="top">Author</td>
     1634     <td valign="top">Feamster, Nick and Gao, Lixin and Rexford, Jennifer</td>
     1635</tr>
     1636
     1637<tr>
     1638     <td valign="top">Title</td>
     1639     <td valign="top">How to lease the internet in your spare time</td>
     1640</tr>
     1641
     1642<tr>
     1643     <td valign="top">Journal</td>
     1644     <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
     1645</tr>
     1646
     1647<tr>
     1648     <td valign="top">Publisher</td>
     1649     <td valign="top">ACM</td>
     1650</tr>
     1651
     1652<tr>
     1653     <td valign="top">Address</td>
     1654     <td valign="top">New York, NY, USA</td>
     1655</tr>
     1656
     1657<tr>
     1658     <td valign="top">Year</td>
     1659     <td valign="top">2007</td>
     1660</tr>
     1661
     1662
     1663
     1664<tr>
     1665     <td valign="top">DOI</td>
     1666     <td valign="top">10.1145/1198255.1198265</td>
     1667</tr>
     1668
     1669
     1670
     1671<tr>
     1672     <td valign="top">URL</td>
     1673     <td valign="top"><a href="http://doi.acm.org/10.1145/1198255.1198265">http://doi.acm.org/10.1145/1198255.1198265</a></td>
     1674</tr>
     1675
     1676
     1677</table></div><br><br>
     1678
     1679
     1680
     1681
     1682<a class="EntryGoto" id="Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram"></a>
     1683<b class="myheading" style="position: relative; left: 5%;">Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram</b>
     1684
     1685<div class="BibEntry">
     1686
     1687<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1688
     1689
     1690<tr>
     1691     <td valign="top">Author</td>
     1692     <td valign="top">Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram</td>
     1693</tr>
     1694
     1695<tr>
     1696     <td valign="top">Title</td>
     1697     <td valign="top">Decoupling policy from configuration in campus and enterprise networks</td>
     1698</tr>
     1699
     1700<tr>
     1701     <td valign="top">Booktitle</td>
     1702     <td valign="top">2010 17th IEEE Workshop on Local &#x0026; Metropolitan Area Networks (LANMAN)</td>
     1703</tr>
     1704
     1705<tr>
     1706     <td valign="top">Location</td>
     1707     <td valign="top">Long Branch, NJ, USA</td>
     1708</tr>
     1709
     1710<tr>
     1711     <td valign="top">Publisher</td>
     1712     <td valign="top">IEEE</td>
     1713</tr>
     1714
     1715<tr>
     1716     <td valign="top">Year</td>
     1717     <td valign="top">2010</td>
     1718</tr>
     1719
     1720<tr>
     1721     <td valign="top">Abstract</td>
     1722     <td valign="top">This paper surveys our ongoing work on the use of software-defined networking to simplify two acute policy problems in campus and enterprise network operations: access control and information flow control. We describe how the current coupling of high-level policy with low-level configuration makes these problems challenging today. We describe the specific policy problems faced by campus and enterprise network operators; illustrate our approach, which leverages recent trends in separating the network's ” control plane” from the data plane; and show how this approach can be applied to simplify these two enterprise network management tasks. We also describe our ongoing deployment efforts to build a campus network testbed where trial designs can be deployed and evaluated. We close with a summary of current and future research challenges for solving challenges within enterprise networks within the context of this new paradigm.</td>
     1723</tr>
     1724
     1725
     1726
     1727<tr>
     1728     <td valign="top">DOI</td>
     1729     <td valign="top">10.1109/LANMAN.2010.5507162</td>
     1730</tr>
     1731
     1732
     1733
     1734<tr>
     1735     <td valign="top">URL</td>
     1736     <td valign="top"><a href="http://dx.doi.org/10.1109/LANMAN.2010.5507162">http://dx.doi.org/10.1109/LANMAN.2010.5507162</a></td>
     1737</tr>
     1738
     1739
     1740</table></div><br><br>
     1741
     1742
     1743
     1744
     1745<a class="EntryGoto" id="Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning"></a>
     1746<b class="myheading" style="position: relative; left: 5%;">Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning</b>
     1747
     1748<div class="BibEntry">
     1749
     1750<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1751
     1752
     1753<tr>
     1754     <td valign="top">Author</td>
     1755     <td valign="top">Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning</td>
     1756</tr>
     1757
     1758<tr>
     1759     <td valign="top">Title</td>
     1760     <td valign="top">An enabling platform for autonomic management of the future internet</td>
     1761</tr>
     1762
     1763<tr>
     1764     <td valign="top">Journal</td>
     1765     <td valign="top">IEEE Network</td>
     1766</tr>
     1767
     1768<tr>
     1769     <td valign="top">Year</td>
     1770     <td valign="top">2011</td>
     1771</tr>
     1772
     1773<tr>
     1774     <td valign="top">Abstract</td>
     1775     <td valign="top">This article shows an autonomic management solution based on the recently defined programmable node architecture NetServ. The article starts with a general description of the classical network management requirements and their adaptation to the expected network evolution. After a description of the major issues characterizing the management of the expected Future Internet, the main autonomic management paradigms, and some recently introduced autonomic service platforms, we show and demonstrate the effectiveness of the NetServ architecture. Born as a means to deploy and execute networked services at runtime over programmable routers, NetServ has proved to be a suitable environment for hosting an autonomic management architecture.</td>
     1776</tr>
     1777
     1778
     1779
     1780<tr>
     1781     <td valign="top">DOI</td>
     1782     <td valign="top">10.1109/MNET.2011.6085639</td>
     1783</tr>
     1784
     1785
     1786
     1787<tr>
     1788     <td valign="top">URL</td>
     1789     <td valign="top"><a href="http://dx.doi.org/10.1109/MNET.2011.6085639">http://dx.doi.org/10.1109/MNET.2011.6085639</a></td>
     1790</tr>
     1791
     1792
     1793</table></div><br><br>
     1794
     1795
     1796
     1797
     1798<a class="EntryGoto" id="Fund, Fraida and Wang, Cong and Korakis, Thanasis and Zink, Michael and Panwar, Shivendra"></a>
     1799<b class="myheading" style="position: relative; left: 5%;">Fund, Fraida and Wang, Cong and Korakis, Thanasis and Zink, Michael and Panwar, Shivendra</b>
     1800
     1801<div class="BibEntry">
     1802
     1803<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1804
     1805
     1806<tr>
     1807     <td valign="top">Author</td>
     1808     <td valign="top">Fund, Fraida and Wang, Cong and Korakis, Thanasis and Zink, Michael and Panwar, Shivendra</td>
     1809</tr>
     1810
     1811<tr>
     1812     <td valign="top">Title</td>
     1813     <td valign="top">GENI WiMAX Performance: Evaluation and Comparison of Two Campus Testbeds</td>
     1814</tr>
     1815
     1816<tr>
     1817     <td valign="top">Booktitle</td>
     1818     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     1819</tr>
     1820
     1821<tr>
     1822     <td valign="top">Location</td>
     1823     <td valign="top">Salt Lake City, UT</td>
     1824</tr>
     1825
     1826<tr>
     1827     <td valign="top">Publisher</td>
     1828     <td valign="top">IEEE</td>
     1829</tr>
     1830
     1831<tr>
     1832     <td valign="top">Year</td>
     1833     <td valign="top">2013</td>
     1834</tr>
     1835
     1836
     1837
     1838
     1839
     1840
     1841</table></div><br><br>
     1842
     1843
     1844
     1845
     1846<a class="EntryGoto" id="Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia"></a>
     1847<b class="myheading" style="position: relative; left: 5%;">Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</b>
     1848
     1849<div class="BibEntry">
     1850
     1851<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1852
     1853
     1854<tr>
     1855     <td valign="top">Author</td>
     1856     <td valign="top">Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</td>
     1857</tr>
     1858
     1859<tr>
     1860     <td valign="top">Title</td>
     1861     <td valign="top">Exercises for Graduate Students using GENI</td>
     1862</tr>
     1863
     1864<tr>
     1865     <td valign="top">Booktitle</td>
     1866     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     1867</tr>
     1868
     1869<tr>
     1870     <td valign="top">Location</td>
     1871     <td valign="top">Los Angeles</td>
     1872</tr>
     1873
     1874<tr>
     1875     <td valign="top">Year</td>
     1876     <td valign="top">2012</td>
     1877</tr>
     1878
     1879<tr>
     1880     <td valign="top">Abstract</td>
     1881     <td valign="top">GENI brings together a wide variety of heterogeneous networking infrastructure and technologies under a common platform. We propose programming exercises for graduate students to introduce GENI and enable students to conduct high fidelity networking experiments. In this paper, we focus on an exercise to study congestion control and reliability using the ProtoGENI aggregate. A planned second exercise aims to leverage GENI OpenFlow aggregates to study firewalls and QoS mechanisms. We believe that these lab exercises will expose students to key networking concepts and recent research directions, e.g., in the data center context.</td>
     1882</tr>
     1883
     1884
     1885
     1886
     1887
     1888
     1889</table></div><br><br>
     1890
     1891
     1892
     1893
     1894<a class="EntryGoto" id="Gangam, Sriharsha and Fahmy, Sonia"></a>
     1895<b class="myheading" style="position: relative; left: 5%;">Gangam, Sriharsha and Fahmy, Sonia</b>
     1896
     1897<div class="BibEntry">
     1898
     1899<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1900
     1901
     1902<tr>
     1903     <td valign="top">Author</td>
     1904     <td valign="top">Gangam, Sriharsha and Fahmy, Sonia</td>
     1905</tr>
     1906
     1907<tr>
     1908     <td valign="top">Title</td>
     1909     <td valign="top">Mitigating interference in a network measurement service</td>
     1910</tr>
     1911
     1912<tr>
     1913     <td valign="top">Booktitle</td>
     1914     <td valign="top">2011 IEEE Nineteenth IEEE International Workshop on Quality of Service</td>
     1915</tr>
     1916
     1917<tr>
     1918     <td valign="top">Location</td>
     1919     <td valign="top">San Jose, CA, USA</td>
     1920</tr>
     1921
     1922<tr>
     1923     <td valign="top">Publisher</td>
     1924     <td valign="top">IEEE</td>
     1925</tr>
     1926
     1927<tr>
     1928     <td valign="top">Year</td>
     1929     <td valign="top">2011</td>
     1930</tr>
     1931
     1932<tr>
     1933     <td valign="top">Abstract</td>
     1934     <td valign="top">Shared measurement services offer key advantages over conventional ad-hoc techniques for network monitoring. A measurement service may receive measurement requests concurrently from different applications and network administrators. These measurement requests are often served by injecting active network measurement traffic between two hosts. Two active measurements are said to interfere when the probe packets of one measurement tool are viewed as network traffic by the other. This may lead to faulty measurement readings. In this paper, we model the measurement interference problem, and show how to schedule measurement tasks to reduce interference and hence increase measurement accuracy. We propose twelve computationally tractable algorithms that decrease the total completion time (makespan) of measurement tasks, while avoiding interference. Our evaluation shows that the algorithm we refer to as Largest Area First, Busiest Node First - Earliest Interval Schedule (LAFBNF-EIS) has a mean makespan of about 5&#x0025; more than the theoretical lower bound over our set of measurement workloads.</td>
     1935</tr>
     1936
     1937
     1938
     1939<tr>
     1940     <td valign="top">DOI</td>
     1941     <td valign="top">10.1109/IWQOS.2011.5931347</td>
     1942</tr>
     1943
     1944
     1945
     1946<tr>
     1947     <td valign="top">URL</td>
     1948     <td valign="top"><a href="http://dx.doi.org/10.1109/IWQOS.2011.5931347">http://dx.doi.org/10.1109/IWQOS.2011.5931347</a></td>
     1949</tr>
     1950
     1951
     1952</table></div><br><br>
     1953
     1954
     1955
     1956
     1957<a class="EntryGoto" id="Gao, Jingcheng and Xiao, Yang"></a>
     1958<b class="myheading" style="position: relative; left: 5%;">Gao, Jingcheng and Xiao, Yang</b>
     1959
     1960<div class="BibEntry">
     1961
     1962<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     1963
     1964
     1965<tr>
     1966     <td valign="top">Author</td>
     1967     <td valign="top">Gao, Jingcheng and Xiao, Yang</td>
     1968</tr>
     1969
     1970<tr>
     1971     <td valign="top">Title</td>
     1972     <td valign="top">ProtoGENI DoS/DDoS Security Tests and Experiments</td>
     1973</tr>
     1974
     1975<tr>
     1976     <td valign="top">Booktitle</td>
     1977     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     1978</tr>
     1979
     1980<tr>
     1981     <td valign="top">Location</td>
     1982     <td valign="top">Los Angeles</td>
     1983</tr>
     1984
     1985<tr>
     1986     <td valign="top">Year</td>
     1987     <td valign="top">2012</td>
     1988</tr>
     1989
     1990<tr>
     1991     <td valign="top">Abstract</td>
     1992     <td valign="top">his paper will explain some tests and experiments to investigate selected security issues through ProtoGENI mainly during Spiral 3 time period and the beginning of Spiral 4. In this paper, we conduct multiple sets of DoS/ DDoS attacks in the current ProtoGENI testbed. These attacks show that it is very possible that ProtoGENI nodes may render vulnerabilities to such attacks.</td>
     1993</tr>
     1994
     1995
     1996
     1997
     1998
     1999
     2000</table></div><br><br>
     2001
     2002
     2003
     2004
     2005<a class="EntryGoto" id="Gember, Aaron and Dragga, Chris and Akella, Aditya"></a>
     2006<b class="myheading" style="position: relative; left: 5%;">Gember, Aaron and Dragga, Chris and Akella, Aditya</b>
     2007
     2008<div class="BibEntry">
     2009
     2010<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2011
     2012
     2013<tr>
     2014     <td valign="top">Author</td>
     2015     <td valign="top">Gember, Aaron and Dragga, Chris and Akella, Aditya</td>
     2016</tr>
     2017
     2018<tr>
     2019     <td valign="top">Title</td>
     2020     <td valign="top">ECOS: Practical Mobile Application Offloading for Enterprises</td>
     2021</tr>
     2022
     2023<tr>
     2024     <td valign="top">Booktitle</td>
     2025     <td valign="top">2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE '12)</td>
     2026</tr>
     2027
     2028<tr>
     2029     <td valign="top">Year</td>
     2030     <td valign="top">2012</td>
     2031</tr>
     2032
     2033<tr>
     2034     <td valign="top">Abstract</td>
     2035     <td valign="top">Offloading has emerged as a promising idea to allow handheld devices to access intensive applications without performance or energy costs. This could be particularly useful for enterprises seeking to run line-of-business applications on handhelds. However, we must address two practical roadblocks in order to make offloading amenable for enterprises: (i) ensuring data privacy and the use of trusted offloading resources, and (ii) accommodating offload at scale with diverse handheld objectives and compute resource capabilities. We present the design and implementation of an Enterprise-Centric Offloading System (ECOS) which augments prior offloading proposals to address these issues. ECOS uses a logically central controller to opportunistically leverage diverse compute resources, while tightly controlling where specific applications offload depending on privacy, performance, and energy constraints of users and applications. A wide range of experiments using a real prototype establish the effectiveness of our approach.</td>
     2036</tr>
     2037
     2038
     2039
     2040
     2041
     2042<tr>
     2043     <td valign="top">URL</td>
     2044     <td valign="top"><a href="http://www.usenix.org/conference/hot-ice12/ecos-practical-mobile-application-of&#x0025;EF&#x0025;AC&#x0025;82oading-enterprises">http://www.usenix.org/conference/hot-ice12/ecos-practical-mobile-application-of&#x0025;EF&#x0025;AC&#x0025;82oading-enterprises</a></td>
     2045</tr>
     2046
     2047
     2048</table></div><br><br>
     2049
     2050
     2051
     2052
     2053<a class="EntryGoto" id="Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David"></a>
     2054<b class="myheading" style="position: relative; left: 5%;">Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David</b>
     2055
     2056<div class="BibEntry">
     2057
     2058<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2059
     2060
     2061<tr>
     2062     <td valign="top">Author</td>
     2063     <td valign="top">Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David</td>
     2064</tr>
     2065
     2066<tr>
     2067     <td valign="top">Title</td>
     2068     <td valign="top">Supporting network evolution and incremental deployment with XIA</td>
     2069</tr>
     2070
     2071<tr>
     2072     <td valign="top">Booktitle</td>
     2073     <td valign="top">Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication</td>
     2074</tr>
     2075
     2076<tr>
     2077     <td valign="top">Location</td>
     2078     <td valign="top">Helsinki, Finland</td>
     2079</tr>
     2080
     2081<tr>
     2082     <td valign="top">Publisher</td>
     2083     <td valign="top">ACM</td>
     2084</tr>
     2085
     2086<tr>
     2087     <td valign="top">Address</td>
     2088     <td valign="top">New York, NY, USA</td>
     2089</tr>
     2090
     2091<tr>
     2092     <td valign="top">Year</td>
     2093     <td valign="top">2012</td>
     2094</tr>
     2095
     2096<tr>
     2097     <td valign="top">Abstract</td>
     2098     <td valign="top">eXpressive Internet Architecture (XIA) [1] is an architecture that natively supports multiple communication types and allows networks to evolve their abstractions and functionality to accommodate new styles of communication over time. XIA embeds an elegant mechanism for handling unforeseen communication types for legacy routers. In this demonstration, we show that XIA overcomes three key barriers in network evolution (outlined below) by (1) allowing end-hosts and applications to start using new communication types (e.g., service and content) before the network supports them, (2) ensuring that upgrading a subset of routers to support new functionalities immediately benefits applications, and (3) using the same mechanisms we employ for 1 and 2 to incrementally deploy XIA in IP networks.</td>
     2099</tr>
     2100
     2101
     2102
     2103<tr>
     2104     <td valign="top">DOI</td>
     2105     <td valign="top">10.1145/2342356.2342410</td>
     2106</tr>
     2107
     2108
     2109
     2110<tr>
     2111     <td valign="top">URL</td>
     2112     <td valign="top"><a href="http://dx.doi.org/10.1145/2342356.2342410">http://dx.doi.org/10.1145/2342356.2342410</a></td>
     2113</tr>
     2114
     2115
     2116</table></div><br><br>
     2117
     2118
     2119
     2120
     2121<a class="EntryGoto" id="Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C."></a>
     2122<b class="myheading" style="position: relative; left: 5%;">Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</b>
     2123
     2124<div class="BibEntry">
     2125
     2126<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2127
     2128
     2129<tr>
     2130     <td valign="top">Author</td>
     2131     <td valign="top">Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</td>
     2132</tr>
     2133
     2134<tr>
     2135     <td valign="top">Title</td>
     2136     <td valign="top">The design of an instrumentation system for federated and virtualized network testbeds</td>
     2137</tr>
     2138
     2139<tr>
     2140     <td valign="top">Booktitle</td>
     2141     <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td>
     2142</tr>
     2143
     2144<tr>
     2145     <td valign="top">Publisher</td>
     2146     <td valign="top">IEEE</td>
     2147</tr>
     2148
     2149<tr>
     2150     <td valign="top">Year</td>
     2151     <td valign="top">2012</td>
     2152</tr>
     2153
     2154<tr>
     2155     <td valign="top">Abstract</td>
     2156     <td valign="top">Much of the GENI effort in developing network testbeds has been focused on building the control frameworks needed to allocate and initialize the network resources that make up an experiment. We argue that building the instrumentation and measurement system to monitor and capture the behavior of the network is just as important and challenging as setting up the network itself, especially in a virtualized and federated environment where getting information from experimental nodes is too complicated and too much to handle for a typical user. In this paper, we describe the design of an instrumentation and measurement infrastructure that allows users to monitor their experiments. The challenge that virtualization and federation of GENI testbeds bring to instrumentation and monitoring is how to hide the details of instrumentation setup from users so that users do not need to be experts in system administration or network management of virtualized and federated systems, but are still able to ” see” what is going on with their experiments. Our instrumentation tool sets up experiment-specific monitoring infrastructure that is tailored to capture, record, and display only information associated with that experiment. Our tools are currently available in GENI, and we present a simple example of how to use them to instrument an experiment.</td>
     2157</tr>
     2158
     2159
     2160
     2161<tr>
     2162     <td valign="top">DOI</td>
     2163     <td valign="top">10.1109/NOMS.2012.6212061</td>
     2164</tr>
     2165
     2166
     2167
     2168<tr>
     2169     <td valign="top">URL</td>
     2170     <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6212061">http://dx.doi.org/10.1109/NOMS.2012.6212061</a></td>
     2171</tr>
     2172
     2173
     2174</table></div><br><br>
     2175
     2176
     2177
     2178
     2179<a class="EntryGoto" id="Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles"></a>
     2180<b class="myheading" style="position: relative; left: 5%;">Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</b>
     2181
     2182<div class="BibEntry">
     2183
     2184<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2185
     2186
     2187<tr>
     2188     <td valign="top">Author</td>
     2189     <td valign="top">Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td>
     2190</tr>
     2191
     2192<tr>
     2193     <td valign="top">Title</td>
     2194     <td valign="top">GENI-enabled Programming Experiments for Networking Classes</td>
     2195</tr>
     2196
     2197<tr>
     2198     <td valign="top">Booktitle</td>
     2199     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     2200</tr>
     2201
     2202<tr>
     2203     <td valign="top">Location</td>
     2204     <td valign="top">Salt Lake City, UT</td>
     2205</tr>
     2206
     2207<tr>
     2208     <td valign="top">Publisher</td>
     2209     <td valign="top">IEEE</td>
     2210</tr>
     2211
     2212<tr>
     2213     <td valign="top">Year</td>
     2214     <td valign="top">2013</td>
     2215</tr>
     2216
     2217
     2218
     2219
     2220
     2221
     2222</table></div><br><br>
     2223
     2224
     2225
     2226
     2227<a class="EntryGoto" id="Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles"></a>
     2228<b class="myheading" style="position: relative; left: 5%;">Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</b>
     2229
     2230<div class="BibEntry">
     2231
     2232<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2233
     2234
     2235<tr>
     2236     <td valign="top">Author</td>
     2237     <td valign="top">Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td>
     2238</tr>
     2239
     2240<tr>
     2241     <td valign="top">Title</td>
     2242     <td valign="top">Teaching with the Emerging GENI Network</td>
     2243</tr>
     2244
     2245<tr>
     2246     <td valign="top">Booktitle</td>
     2247     <td valign="top">Proceedings of the 2012 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS)</td>
     2248</tr>
     2249
     2250<tr>
     2251     <td valign="top">Location</td>
     2252     <td valign="top">Las Vegas</td>
     2253</tr>
     2254
     2255<tr>
     2256     <td valign="top">Year</td>
     2257     <td valign="top">2012</td>
     2258</tr>
     2259
     2260
     2261
     2262
     2263
     2264
     2265</table></div><br><br>
     2266
     2267
     2268
     2269
     2270<a class="EntryGoto" id="Guan, Xinjie and Choi, Baek-Young and Song, Sejun"></a>
     2271<b class="myheading" style="position: relative; left: 5%;">Guan, Xinjie and Choi, Baek-Young and Song, Sejun</b>
     2272
     2273<div class="BibEntry">
     2274
     2275<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2276
     2277
     2278<tr>
     2279     <td valign="top">Author</td>
     2280     <td valign="top">Guan, Xinjie and Choi, Baek-Young and Song, Sejun</td>
     2281</tr>
     2282
     2283<tr>
     2284     <td valign="top">Title</td>
     2285     <td valign="top">Reliability and Scalability Issues in Software Defined Network Frameworks</td>
     2286</tr>
     2287
     2288<tr>
     2289     <td valign="top">Booktitle</td>
     2290     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     2291</tr>
     2292
     2293<tr>
     2294     <td valign="top">Location</td>
     2295     <td valign="top">Salt Lake City, UT</td>
     2296</tr>
     2297
     2298<tr>
     2299     <td valign="top">Publisher</td>
     2300     <td valign="top">IEEE</td>
     2301</tr>
     2302
     2303<tr>
     2304     <td valign="top">Year</td>
     2305     <td valign="top">2013</td>
     2306</tr>
     2307
     2308
     2309
     2310
     2311
     2312
     2313</table></div><br><br>
     2314
     2315
     2316
     2317
     2318<a class="EntryGoto" id="Herron, Jon-Paul"></a>
     2319<b class="myheading" style="position: relative; left: 5%;">Herron, Jon-Paul</b>
     2320
     2321<div class="BibEntry">
     2322
     2323<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2324
     2325
     2326<tr>
     2327     <td valign="top">Author</td>
     2328     <td valign="top">Herron, Jon-Paul</td>
     2329</tr>
     2330
     2331<tr>
     2332     <td valign="top">Title</td>
     2333     <td valign="top">GENI Meta-Operations Center</td>
     2334</tr>
     2335
     2336<tr>
     2337     <td valign="top">Booktitle</td>
     2338     <td valign="top">2008 IEEE Fourth International Conference on eScience</td>
     2339</tr>
     2340
     2341<tr>
     2342     <td valign="top">Location</td>
     2343     <td valign="top">Indianapolis, IN, USA</td>
     2344</tr>
     2345
     2346<tr>
     2347     <td valign="top">Publisher</td>
     2348     <td valign="top">IEEE</td>
     2349</tr>
     2350
     2351<tr>
     2352     <td valign="top">Year</td>
     2353     <td valign="top">2008</td>
     2354</tr>
     2355
     2356<tr>
     2357     <td valign="top">Abstract</td>
     2358     <td valign="top">NSF's GENI program represents an opportunity to build the kind of programmable, virtualized testbed scientists exploring the future of networking will need to support their research. As with any other scientific instrument, it will be crucial that the GENI infrastructure offer repeatable, consistent results to the researchers using it.The GENI Meta-Operations Center, operated by the Global Research NOC at Indiana University, will develop the software, protocols, and processes needed to ensure the repeatability, consistency, and efficiency of GENI.</td>
     2359</tr>
     2360
     2361
     2362
     2363<tr>
     2364     <td valign="top">DOI</td>
     2365     <td valign="top">10.1109/eScience.2008.103</td>
     2366</tr>
     2367
     2368
     2369
     2370<tr>
     2371     <td valign="top">URL</td>
     2372     <td valign="top"><a href="http://dx.doi.org/10.1109/eScience.2008.103">http://dx.doi.org/10.1109/eScience.2008.103</a></td>
     2373</tr>
     2374
     2375
     2376</table></div><br><br>
     2377
     2378
     2379
     2380
     2381<a class="EntryGoto" id="Huang, Shufeng and Griffioen, James and Calvert, Kenneth L."></a>
     2382<b class="myheading" style="position: relative; left: 5%;">Huang, Shufeng and Griffioen, James and Calvert, Kenneth L.</b>
     2383
     2384<div class="BibEntry">
     2385
     2386<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2387
     2388
     2389<tr>
     2390     <td valign="top">Author</td>
     2391     <td valign="top">Huang, Shufeng and Griffioen, James and Calvert, Kenneth L.</td>
     2392</tr>
     2393
     2394<tr>
     2395     <td valign="top">Title</td>
     2396     <td valign="top">Fast-tracking GENI Experiments using HyperNets</td>
     2397</tr>
     2398
     2399<tr>
     2400     <td valign="top">Booktitle</td>
     2401     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     2402</tr>
     2403
     2404<tr>
     2405     <td valign="top">Location</td>
     2406     <td valign="top">Salt Lake City, UT</td>
     2407</tr>
     2408
     2409<tr>
     2410     <td valign="top">Publisher</td>
     2411     <td valign="top">IEEE</td>
     2412</tr>
     2413
     2414<tr>
     2415     <td valign="top">Year</td>
     2416     <td valign="top">2013</td>
     2417</tr>
     2418
     2419
     2420
     2421
     2422
     2423
     2424</table></div><br><br>
     2425
     2426
     2427
     2428
     2429<a class="EntryGoto" id="Jin, Ruofan and Wang, Bing"></a>
     2430<b class="myheading" style="position: relative; left: 5%;">Jin, Ruofan and Wang, Bing</b>
     2431
     2432<div class="BibEntry">
     2433
     2434<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2435
     2436
     2437<tr>
     2438     <td valign="top">Author</td>
     2439     <td valign="top">Jin, Ruofan and Wang, Bing</td>
     2440</tr>
     2441
     2442<tr>
     2443     <td valign="top">Title</td>
     2444     <td valign="top">Malware Detection for Mobile Devices Using Software-Defined Networking</td>
     2445</tr>
     2446
     2447<tr>
     2448     <td valign="top">Booktitle</td>
     2449     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     2450</tr>
     2451
     2452<tr>
     2453     <td valign="top">Location</td>
     2454     <td valign="top">Salt Lake City, UT</td>
     2455</tr>
     2456
     2457<tr>
     2458     <td valign="top">Publisher</td>
     2459     <td valign="top">IEEE</td>
     2460</tr>
     2461
     2462<tr>
     2463     <td valign="top">Year</td>
     2464     <td valign="top">2013</td>
     2465</tr>
     2466
     2467
     2468
     2469
     2470
     2471
     2472</table></div><br><br>
     2473
     2474
     2475
     2476
     2477<a class="EntryGoto" id="Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng"></a>
     2478<b class="myheading" style="position: relative; left: 5%;">Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng</b>
     2479
     2480<div class="BibEntry">
     2481
     2482<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2483
     2484
     2485<tr>
     2486     <td valign="top">Author</td>
     2487     <td valign="top">Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng</td>
     2488</tr>
     2489
     2490<tr>
     2491     <td valign="top">Title</td>
     2492     <td valign="top">LENS: resource specification for wireless sensor network experimentation infrastructures</td>
     2493</tr>
     2494
     2495<tr>
     2496     <td valign="top">Booktitle</td>
     2497     <td valign="top">Proceedings of the 6th ACM international workshop on Wireless network testbeds, experimental evaluation and characterization</td>
     2498</tr>
     2499
     2500<tr>
     2501     <td valign="top">Location</td>
     2502     <td valign="top">Las Vegas, Nevada, USA</td>
     2503</tr>
     2504
     2505<tr>
     2506     <td valign="top">Publisher</td>
     2507     <td valign="top">ACM</td>
     2508</tr>
     2509
     2510<tr>
     2511     <td valign="top">Address</td>
     2512     <td valign="top">New York, NY, USA</td>
     2513</tr>
     2514
     2515<tr>
     2516     <td valign="top">Year</td>
     2517     <td valign="top">2011</td>
     2518</tr>
     2519
     2520<tr>
     2521     <td valign="top">Abstract</td>
     2522     <td valign="top">As a first step towards predictable, repeatable WSN experimentation, we propose the resource specification language LENS (a.k.a. Language for Embedded Networked Sensing) for WSN experimentation infrastructures. Using the Resource Description Framework (RDF) and the Web Ontology Language (OWL), LENS defines a semantic ontology for WSN resources; LENS enables explicit control and measurement of uncertainty factors, and it enables reasoning about the relationships between WSN resources. Focusing on basic concepts of WSNs, LENS supports resource specification in a wide range of WSN experimentation infrastructures, and it is extensible to support potentially unforeseen technologies. LENS is also compatible with specification languages for other network resources such as optical networks. As a part of the NSF GENI initiative, we have implemented LENS in the KanseiGenie control framework, and LENS has been actively used to support experimentation in the federated WSN infrastructure involving Kansei and NetEye. Enabling reasoning about uncertainty factors in experimentation, LENS is expected to serve as a basis for developing methodologies and tools for predictable, repeatable WSN experimentation.</td>
     2523</tr>
     2524
     2525
     2526
     2527<tr>
     2528     <td valign="top">DOI</td>
     2529     <td valign="top">10.1145/2030718.2030727</td>
     2530</tr>
     2531
     2532
     2533
     2534<tr>
     2535     <td valign="top">URL</td>
     2536     <td valign="top"><a href="http://dx.doi.org/10.1145/2030718.2030727">http://dx.doi.org/10.1145/2030718.2030727</a></td>
     2537</tr>
     2538
     2539
     2540</table></div><br><br>
     2541
     2542
     2543
     2544
     2545<a class="EntryGoto" id="Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten"></a>
     2546<b class="myheading" style="position: relative; left: 5%;">Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten</b>
     2547
     2548<div class="BibEntry">
     2549
     2550<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2551
     2552
     2553<tr>
     2554     <td valign="top">Author</td>
     2555     <td valign="top">Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten</td>
     2556</tr>
     2557
     2558<tr>
     2559     <td valign="top">Title</td>
     2560     <td valign="top">VeriFlow: verifying network-wide invariants in real time</td>
     2561</tr>
     2562
     2563<tr>
     2564     <td valign="top">Booktitle</td>
     2565     <td valign="top">Proceedings of the first workshop on Hot topics in software defined networks</td>
     2566</tr>
     2567
     2568<tr>
     2569     <td valign="top">Location</td>
     2570     <td valign="top">Helsinki, Finland</td>
     2571</tr>
     2572
     2573<tr>
     2574     <td valign="top">Publisher</td>
     2575     <td valign="top">ACM</td>
     2576</tr>
     2577
     2578<tr>
     2579     <td valign="top">Address</td>
     2580     <td valign="top">New York, NY, USA</td>
     2581</tr>
     2582
     2583<tr>
     2584     <td valign="top">Year</td>
     2585     <td valign="top">2012</td>
     2586</tr>
     2587
     2588
     2589
     2590<tr>
     2591     <td valign="top">DOI</td>
     2592     <td valign="top">10.1145/2342441.2342452</td>
     2593</tr>
     2594
     2595
     2596
     2597<tr>
     2598     <td valign="top">URL</td>
     2599     <td valign="top"><a href="http://doi.acm.org/10.1145/2342441.2342452">http://doi.acm.org/10.1145/2342441.2342452</a></td>
     2600</tr>
     2601
     2602
     2603</table></div><br><br>
     2604
     2605
     2606
     2607
     2608<a class="EntryGoto" id="Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki"></a>
     2609<b class="myheading" style="position: relative; left: 5%;">Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki</b>
     2610
     2611<div class="BibEntry">
     2612
     2613<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2614
     2615
     2616<tr>
     2617     <td valign="top">Author</td>
     2618     <td valign="top">Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki</td>
     2619</tr>
     2620
     2621<tr>
     2622     <td valign="top">Title</td>
     2623     <td valign="top">Future Internet: Challenges in Virtualization and Federation</td>
     2624</tr>
     2625
     2626<tr>
     2627     <td valign="top">Booktitle</td>
     2628     <td valign="top">2009 Fifth Advanced International Conference on Telecommunications</td>
     2629</tr>
     2630
     2631<tr>
     2632     <td valign="top">Location</td>
     2633     <td valign="top">Venice/Mestre, Italy</td>
     2634</tr>
     2635
     2636<tr>
     2637     <td valign="top">Publisher</td>
     2638     <td valign="top">IEEE</td>
     2639</tr>
     2640
     2641<tr>
     2642     <td valign="top">Year</td>
     2643     <td valign="top">2009</td>
     2644</tr>
     2645
     2646<tr>
     2647     <td valign="top">Abstract</td>
     2648     <td valign="top">Future Internet is a clean-slate research activity in the quest of new networking technologies to overcome the limits of the current Internet. In its experimental research, virtualization and federation are emerging as essential features, especially in the construction and operation of the testbeds. Moreover, they are believed to sustain as the fundamental features of the Future Internet itself. Visions and experiences on virtualization and federation are given by leading experts from US, EU, and Asia.</td>
     2649</tr>
     2650
     2651
     2652
     2653<tr>
     2654     <td valign="top">DOI</td>
     2655     <td valign="top">10.1109/AICT.2009.8</td>
     2656</tr>
     2657
     2658
     2659
     2660<tr>
     2661     <td valign="top">URL</td>
     2662     <td valign="top"><a href="http://dx.doi.org/10.1109/AICT.2009.8">http://dx.doi.org/10.1109/AICT.2009.8</a></td>
     2663</tr>
     2664
     2665
     2666</table></div><br><br>
     2667
     2668
     2669
     2670
     2671<a class="EntryGoto" id="Kim, Hyunjun and Lee, Sungwon"></a>
     2672<b class="myheading" style="position: relative; left: 5%;">Kim, Hyunjun and Lee, Sungwon</b>
     2673
     2674<div class="BibEntry">
     2675
     2676<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2677
     2678
     2679<tr>
     2680     <td valign="top">Author</td>
     2681     <td valign="top">Kim, Hyunjun and Lee, Sungwon</td>
     2682</tr>
     2683
     2684<tr>
     2685     <td valign="top">Title</td>
     2686     <td valign="top">FiRST Cloud Aggregate Manager development over FiRST: Future Internet testbed</td>
     2687</tr>
     2688
     2689<tr>
     2690     <td valign="top">Booktitle</td>
     2691     <td valign="top">The International Conference on Information Network 2012</td>
     2692</tr>
     2693
     2694<tr>
     2695     <td valign="top">Location</td>
     2696     <td valign="top">Bali, Indonesia</td>
     2697</tr>
     2698
     2699<tr>
     2700     <td valign="top">Publisher</td>
     2701     <td valign="top">IEEE</td>
     2702</tr>
     2703
     2704<tr>
     2705     <td valign="top">Year</td>
     2706     <td valign="top">2012</td>
     2707</tr>
     2708
     2709<tr>
     2710     <td valign="top">Abstract</td>
     2711     <td valign="top">FiRST (Future Internet Research for Sustainable Test-bed) is the future internet platform development project being performed in Korea. The goal of the project is to create the virtualized and dynamic service creation environments over future internet networks; it is an experimental project to realize future innovative service ideas over real network environments. Among this, cloud computing is the key enabler to control and allocate virtualized network resources (such as CPU, storage, and virtualized network configuration) for the requested services. However, researches on interworking between future internet and cloud computing is in initial phase. In this paper, we propose the FiRST Cloud Aggregate Manager (AM) based on GENI (Global Environment for Network Innovation) AM Application Programming Interface (API) for the federation between future internet test-bed and open source OpenStack cloud computing platform. After that, we propose the zero-client service for mobile cloud management. In order to control the zero-client service, we develop Cloud Mobility Client/Server. And, we validate and verified our FiRST Cloud AM and zero-client service by developing experimental test-bed. Through this test-bed, we confirm that the proposed FiRST Cloud AM and zero-client service efficiently interworks with future internet control plane framework by using GENI Control Framework (GCF) tools.</td>
     2712</tr>
     2713
     2714
     2715
     2716<tr>
     2717     <td valign="top">DOI</td>
     2718     <td valign="top">10.1109/ICOIN.2012.6164436</td>
     2719</tr>
     2720
     2721
     2722
     2723<tr>
     2724     <td valign="top">URL</td>
     2725     <td valign="top"><a href="http://dx.doi.org/10.1109/ICOIN.2012.6164436">http://dx.doi.org/10.1109/ICOIN.2012.6164436</a></td>
     2726</tr>
     2727
     2728
     2729</table></div><br><br>
     2730
     2731
     2732
     2733
     2734<a class="EntryGoto" id="Kline, Donald and Quan, John"></a>
     2735<b class="myheading" style="position: relative; left: 5%;">Kline, Donald and Quan, John</b>
     2736
     2737<div class="BibEntry">
     2738
     2739<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2740
     2741
     2742<tr>
     2743     <td valign="top">Author</td>
     2744     <td valign="top">Kline, Donald and Quan, John</td>
     2745</tr>
     2746
     2747<tr>
     2748     <td valign="top">Title</td>
     2749     <td valign="top">Attribute description service for large-scale networks</td>
     2750</tr>
     2751
     2752<tr>
     2753     <td valign="top">Booktitle</td>
     2754     <td valign="top">Proceedings of the 2nd international conference on Human centered design</td>
     2755</tr>
     2756
     2757<tr>
     2758     <td valign="top">Location</td>
     2759     <td valign="top">Orlando, FL, USA</td>
     2760</tr>
     2761
     2762<tr>
     2763     <td valign="top">Publisher</td>
     2764     <td valign="top">Springer-Verlag</td>
     2765</tr>
     2766
     2767<tr>
     2768     <td valign="top">Address</td>
     2769     <td valign="top">Berlin, Heidelberg</td>
     2770</tr>
     2771
     2772<tr>
     2773     <td valign="top">Year</td>
     2774     <td valign="top">2011</td>
     2775</tr>
     2776
     2777<tr>
     2778     <td valign="top">Abstract</td>
     2779     <td valign="top">An analysis of requesting resources from large-scale networks reveals a fundamental challenge. As the network grows, more and more resources become available, and so finding resources that fit experimental test criteria becomes difficult and time consuming. For example, the National Science Foundation sponsors GENI--an experimental network with a goal to gain enough resources to model the Internet at scale. Currently, GENI contains relatively few contributed resources donated from businesses and academia, and so matching resources to tests is rather simple. However, experimenters plan to conduct network experiments that are very complex and difficult to accurately model by using the vast numbers of resources expected in GENI. When GENI reaches its final state, finding the right resources that fit experimental test criteria out of many thousands of donated resources may be as difficult as conducting the experiment itself. This dilemma underscores the importance of establishing an attribute description service that promotes a standardized language for all interactions between the end users and the large-scale network.</td>
     2780</tr>
     2781
     2782
     2783
     2784<tr>
     2785     <td valign="top">DOI</td>
     2786     <td valign="top">10.1007/978-3-642-21753-1&#x005F;58</td>
     2787</tr>
     2788
     2789
     2790
     2791<tr>
     2792     <td valign="top">URL</td>
     2793     <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=2021672.2021735">http://portal.acm.org/citation.cfm?id=2021672.2021735</a></td>
     2794</tr>
     2795
     2796
     2797</table></div><br><br>
     2798
     2799
     2800
     2801
     2802<a class="EntryGoto" id="Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael"></a>
     2803<b class="myheading" style="position: relative; left: 5%;">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
     2804
     2805<div class="BibEntry">
     2806
     2807<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2808
     2809
     2810<tr>
     2811     <td valign="top">Author</td>
     2812     <td valign="top">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</td>
     2813</tr>
     2814
     2815<tr>
     2816     <td valign="top">Title</td>
     2817     <td valign="top">Performance of GENI Cloud Testbeds for Real Time Scientific Application</td>
     2818</tr>
     2819
     2820<tr>
     2821     <td valign="top">Booktitle</td>
     2822     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     2823</tr>
     2824
     2825<tr>
     2826     <td valign="top">Location</td>
     2827     <td valign="top">Los Angeles</td>
     2828</tr>
     2829
     2830<tr>
     2831     <td valign="top">Year</td>
     2832     <td valign="top">2012</td>
     2833</tr>
     2834
     2835<tr>
     2836     <td valign="top">Abstract</td>
     2837     <td valign="top">Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform.</td>
     2838</tr>
     2839
     2840
     2841
     2842
     2843
     2844
     2845</table></div><br><br>
     2846
     2847
     2848
     2849
     2850<a class="EntryGoto" id="Lee, Jae W."></a>
     2851<b class="myheading" style="position: relative; left: 5%;">Lee, Jae W.</b>
     2852
     2853<div class="BibEntry">
     2854
     2855<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2856
     2857
     2858<tr>
     2859     <td valign="top">Author</td>
     2860     <td valign="top">Lee, Jae W.</td>
     2861</tr>
     2862
     2863<tr>
     2864     <td valign="top">Title</td>
     2865     <td valign="top">Towards a Common System Architecture for Dynamically Deploying Network Services in Routers and End Hosts</td>
     2866</tr>
     2867
     2868<tr>
     2869     <td valign="top">Year</td>
     2870     <td valign="top">2012</td>
     2871</tr>
     2872
     2873<tr>
     2874     <td valign="top">Abstract</td>
     2875     <td valign="top">The architectural simplicity of the core Internet is a double-edged sword. On the one hand, its agnostic nature paved the way for endless innovations of end-to-end applications. On the other hand, the inherent limitation of this simplicity makes it difficult to add new functions to the network core itself. This is exacerbated by the conservative tendency of commercial entities to &#x6c;&#x0308;eave well-enough alone&#x2c;&#x0308; leading to the current situation often referred to as the ossification of the Internet. For decades, there has been practically no new functionality that has been added to the core Internet on a large scale. This thesis explores the possibility of enabling in-network services towards the goal of overcoming the ossification of the Internet. Our ultimate goal is to provide a common run-time environment supported by all Internet nodes and a wide-area deployment mechanism, so that network services can be freely installed, removed, and migrated among Internet nodes of all kinds–from a backbone router to a set-top box at home. In that vision of a future Internet, there is little difference between servers and routers for the purpose of running network services. Services can run anywhere on the Internet. Application service providers will have the freedom to choose the best place to run their code. This thesis presents NetServ, our first step to realize the vision of network services running anywhere on the Internet. NetServ is a node architecture for dynamically deploying in-network services on edge routers. Network functions and applications are implemented as software modules which can be deployed at any NetServ-enabled node on the Internet, subject to policy restrictions. The NetServ framework provides a common execution environment for service modules and the ability to dynamically install and remove the services without restarting the nodes. There are many challenges in designing such a system. The main contribution of this thesis lies in meeting those challenges. First, we recognize that the primary impetus for adopting new technologies is economics. To address the challenge of providing economic incentives for enabling in-network services, we demonstrate how NetServ can facilitate an economic alliance between content providers and ISPs. Using NetServ, content providers and the ISPs operating at the network edge (aka eyeball ISPs) can enter into a mutually beneficial economic relationship. ISPs make their NetServ-enabled edge routers available for hosting content providers' applications and contents. Content providers can operate closer to end users by deploying code modules on NetServ-enabled edge routers. We make our case by presenting NetServ applications which represent four concrete use cases. Second, our node architecture must support both traditional server applications and in-network packet processing applications since content providers' applications running on ISPs' routers will combine the traits of both. To address this challenge, NetServ framework can host a packet processing module that sits in the data path, a server module that uses the TCP/IP stack in the traditional way, or a combined module that does both. NetServ provides a unified runtime environment between routers and servers, taking us a step closer to the vision of the unified runtime available on all Internet nodes. Third, we must provide a fast and streamlined deployment mechanism. Content providers should be able to deploy their applications at any NetServ-enabled edge router on the Inter- net, given that they have proper authorizations. Moreover, in some application scenarios, content providers may not know the exact locations of the target routers. Content providers need a way to send a message to install or remove an application module towards a network destination, and have the NetServ-enabled routers located in the path catch and act on the message. To address this challenge, we adopted on-path signaling as the deployment mechanism for NetServ. A NetServ signaling message is sent in an IP packet towards a destination. The packet gets forwarded by IP routers as usual, but when it transits a NetServ-enabled router, the message gets intercepted and passed to the NetServ control layer. Fourth, a NetServ-enabled router must support the concurrent executions of multiple without restarting the nodes. There are many challenges in designing such a system. The main contribution of this thesis lies in meeting those challenges. First, we recognize that the primary impetus for adopting new technologies is economics. To address the challenge of providing economic incentives for enabling in-network services, we demonstrate how NetServ can facilitate an economic alliance between content providers and ISPs. Using NetServ, content providers and the ISPs operating at the network edge (aka eyeball ISPs) can enter into a mutually beneficial economic relationship. ISPs make their NetServ-enabled edge routers available for hosting content providers' applications and contents. Content providers can operate closer to end users by deploying code modules on NetServ-enabled edge routers. We make our case by presenting NetServ applications which represent four concrete use cases. Second, our node architecture must support both traditional server applications and in-network packet processing applications since content providers' applications running on ISPs' routers will combine the traits of both. To address this challenge, NetServ framework can host a packet processing module that sits in the data path, a server module that uses the TCP/IP stack in the traditional way, or a combined module that does both. NetServ provides a unified runtime environment between routers and servers, taking us a step closer to the vision of the unified runtime available on all Internet nodes. Third, we must provide a fast and streamlined deployment mechanism. Content providers should be able to deploy their applications at any NetServ-enabled edge router on the Internet, given that they have proper authorizations. Moreover, in some application scenarios, content providers may not know the exact locations of the target routers. Content providers need a way to send a message to install or remove an application module towards a network destination, and have the NetServ-enabled routers located in the path catch and act on the message. To address this challenge, we adopted on-path signaling as the deployment mechanism for NetServ. A NetServ signaling message is sent in an IP packet towards a destination. The packet gets forwarded by IP routers as usual, but when it transits a NetServ-enabled router, the message gets intercepted and passed to the NetServ control layer. Fourth, a NetServ-enabled router must support the concurrent executions of multiple content providers' applications. Each content provider's execution environment must be isolated from one another, and the resource usage of each must be controlled. To address the challenge of providing a robust multi-user execution environment, we chose to run NetServ modules in user space. This is in stark contrast to most programmable routers, which run service modules in kernel space for fast packet processing. Furthermore, NetServ modules are written in Java and run in Java Virtual Machines (JVMs). Our choice of user space execution and JVM allows us to leverage the decades of technology advances in operating systems, virtualization, and Java. Lastly, in order to host the services of a large number of content providers, NetServ must be able to scale beyond the single-box architecture. We address this challenge with the multi-box lateral expansion of NetServ using the OpenFlow forwarding engine. In this extended architecture, multiple NetServ nodes are attached to an OpenFlow switch, which provides a physically separate forwarding plane. The scalability of user services is no longer limited to a single NetServ box. Additionally, this thesis presents our prior work on improving service discovery in local and global networks. The service discovery work makes indirect contribution because the limitations of local and overlay networks encountered during those studies eventually led us to investigate in-network services, which resulted in NetServ. Specifically, we investigate the issues involved in bootstrapping large-scale structured overlay networks, present a tool to merge service announcements from multiple local networks, and propose an enhancement to structured overlay networks using link-local multicast.</td>
     2876</tr>
     2877
     2878
     2879
     2880
     2881
     2882<tr>
     2883     <td valign="top">URL</td>
     2884     <td valign="top"><a href="http://academiccommons.columbia.edu/download/fedora&#x005F;content/download/ac:147210/CONTENT/Lee&#x005F;columbia&#x005F;0054D&#x005F;10773.pdf">http://academiccommons.columbia.edu/download/fedora&#x005F;content/download/ac:147210/CONTENT/Lee&#x005F;columbia&#x005F;0054D&#x005F;10773.pdf</a></td>
     2885</tr>
     2886
     2887
     2888</table></div><br><br>
     2889
     2890
     2891
     2892
     2893<a class="EntryGoto" id="Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang"></a>
     2894<b class="myheading" style="position: relative; left: 5%;">Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang</b>
     2895
     2896<div class="BibEntry">
     2897
     2898<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2899
     2900
     2901<tr>
     2902     <td valign="top">Author</td>
     2903     <td valign="top">Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang</td>
     2904</tr>
     2905
     2906<tr>
     2907     <td valign="top">Title</td>
     2908     <td valign="top">NetServ: Active Networking 2.0</td>
     2909</tr>
     2910
     2911<tr>
     2912     <td valign="top">Booktitle</td>
     2913     <td valign="top">2011 IEEE International Conference on Communications Workshops (ICC)</td>
     2914</tr>
     2915
     2916<tr>
     2917     <td valign="top">Location</td>
     2918     <td valign="top">Kyoto, Japan</td>
     2919</tr>
     2920
     2921<tr>
     2922     <td valign="top">Publisher</td>
     2923     <td valign="top">IEEE</td>
     2924</tr>
     2925
     2926<tr>
     2927     <td valign="top">Year</td>
     2928     <td valign="top">2011</td>
     2929</tr>
     2930
     2931<tr>
     2932     <td valign="top">Abstract</td>
     2933     <td valign="top">We present NetServ, a node architecture for deploying in-network services in the next generation Internet. NetServ-enabled network nodes provide a common execution environment, where network services implemented as modules can be dynamically installed and removed. We demonstrate three such modules. MicroCDN is a dynamic content distribution network (CDN) service which implements a content caching strategy specific to a content provider. The NAT Keep-alive module offloads the processing of keep-alive messages from SIP servers. The Media Relay module allows any NetServ node to act as a media relay, eliminating the need to manage standalone relay servers. NetServ aims to revive the Active Networking vision. It was too far ahead of its time a decade ago, but we believe its time has finally arrived.</td>
     2934</tr>
     2935
     2936
     2937
     2938<tr>
     2939     <td valign="top">DOI</td>
     2940     <td valign="top">10.1109/iccw.2011.5963554</td>
     2941</tr>
     2942
     2943
     2944
     2945<tr>
     2946     <td valign="top">URL</td>
     2947     <td valign="top"><a href="http://dx.doi.org/10.1109/iccw.2011.5963554">http://dx.doi.org/10.1109/iccw.2011.5963554</a></td>
     2948</tr>
     2949
     2950
     2951</table></div><br><br>
     2952
     2953
     2954
     2955
     2956<a class="EntryGoto" id="Lee, Ki S. and Wang, Han and Weatherspoon, Hakim"></a>
     2957<b class="myheading" style="position: relative; left: 5%;">Lee, Ki S. and Wang, Han and Weatherspoon, Hakim</b>
     2958
     2959<div class="BibEntry">
     2960
     2961<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     2962
     2963
     2964<tr>
     2965     <td valign="top">Author</td>
     2966     <td valign="top">Lee, Ki S. and Wang, Han and Weatherspoon, Hakim</td>
     2967</tr>
     2968
     2969<tr>
     2970     <td valign="top">Title</td>
     2971     <td valign="top">SoNIC: precise realtime software access and control of wired networks</td>
     2972</tr>
     2973
     2974<tr>
     2975     <td valign="top">Booktitle</td>
     2976     <td valign="top">Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation</td>
     2977</tr>
     2978
     2979<tr>
     2980     <td valign="top">Location</td>
     2981     <td valign="top">Lombard, IL</td>
     2982</tr>
     2983
     2984<tr>
     2985     <td valign="top">Publisher</td>
     2986     <td valign="top">USENIX Association</td>
     2987</tr>
     2988
     2989<tr>
     2990     <td valign="top">Address</td>
     2991     <td valign="top">Berkeley, CA, USA</td>
     2992</tr>
     2993
     2994<tr>
     2995     <td valign="top">Year</td>
     2996     <td valign="top">2013</td>
     2997</tr>
     2998
     2999
     3000
     3001
     3002
     3003<tr>
     3004     <td valign="top">URL</td>
     3005     <td valign="top"><a href="http://dl.acm.org/citation.cfm?id=2482626.2482648">http://dl.acm.org/citation.cfm?id=2482626.2482648</a></td>
     3006</tr>
     3007
     3008
     3009</table></div><br><br>
     3010
     3011
     3012
     3013
     3014<a class="EntryGoto" id="Li, Dawei and Hong, Xiaoyan"></a>
     3015<b class="myheading" style="position: relative; left: 5%;">Li, Dawei and Hong, Xiaoyan</b>
     3016
     3017<div class="BibEntry">
     3018
     3019<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3020
     3021
     3022<tr>
     3023     <td valign="top">Author</td>
     3024     <td valign="top">Li, Dawei and Hong, Xiaoyan</td>
     3025</tr>
     3026
     3027<tr>
     3028     <td valign="top">Title</td>
     3029     <td valign="top">Practical exploitation on system vulnerability of ProtoGENI</td>
     3030</tr>
     3031
     3032<tr>
     3033     <td valign="top">Booktitle</td>
     3034     <td valign="top">Proceedings of the 49th Annual Southeast Regional Conference</td>
     3035</tr>
     3036
     3037<tr>
     3038     <td valign="top">Location</td>
     3039     <td valign="top">Kennesaw, Georgia</td>
     3040</tr>
     3041
     3042<tr>
     3043     <td valign="top">Publisher</td>
     3044     <td valign="top">ACM</td>
     3045</tr>
     3046
     3047<tr>
     3048     <td valign="top">Address</td>
     3049     <td valign="top">New York, NY, USA</td>
     3050</tr>
     3051
     3052<tr>
     3053     <td valign="top">Year</td>
     3054     <td valign="top">2011</td>
     3055</tr>
     3056
     3057<tr>
     3058     <td valign="top">Abstract</td>
     3059     <td valign="top">Global Environment for Network Innovations (GENI) is a unique virtual laboratory for at-scale networking experimentation exploring future Internets. The successful development of GENI has to consider security problems from the design and prototyping stages. However, in many cases, system vulnerability cannot be found unless through real experimentation bearing purposeful and meaningful designs. In this paper, we introduce some of our efforts in exploring the security vulnerabilities in ProtoGENI, a prototype implementation and deployment of GENI. Our results show potential breach on security of GENI in terms of availability. We make suggestions on potential defense strategies in order to improve the ProtoGENI security and its development.</td>
     3060</tr>
     3061
     3062
     3063
     3064<tr>
     3065     <td valign="top">DOI</td>
     3066     <td valign="top">10.1145/2016039.2016073</td>
     3067</tr>
     3068
     3069
     3070
     3071<tr>
     3072     <td valign="top">URL</td>
     3073     <td valign="top"><a href="http://dx.doi.org/10.1145/2016039.2016073">http://dx.doi.org/10.1145/2016039.2016073</a></td>
     3074</tr>
     3075
     3076
     3077</table></div><br><br>
     3078
     3079
     3080
     3081
     3082<a class="EntryGoto" id="Li, Dawei and Hong, Xiaoyan and Bowman, Jason"></a>
     3083<b class="myheading" style="position: relative; left: 5%;">Li, Dawei and Hong, Xiaoyan and Bowman, Jason</b>
     3084
     3085<div class="BibEntry">
     3086
     3087<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3088
     3089
     3090<tr>
     3091     <td valign="top">Author</td>
     3092     <td valign="top">Li, Dawei and Hong, Xiaoyan and Bowman, Jason</td>
     3093</tr>
     3094
     3095<tr>
     3096     <td valign="top">Title</td>
     3097     <td valign="top">Evaluation of Security Vulnerabilities by Using ProtoGENI as a Launchpad</td>
     3098</tr>
     3099
     3100<tr>
     3101     <td valign="top">Booktitle</td>
     3102     <td valign="top">IEEE Global Communications Conference (GLOBECOM 2011)</td>
     3103</tr>
     3104
     3105<tr>
     3106     <td valign="top">Year</td>
     3107     <td valign="top">2011</td>
     3108</tr>
     3109
     3110<tr>
     3111     <td valign="top">Abstract</td>
     3112     <td valign="top">In this paper we analyze the security architecture of ProtoGENI. ProtoGENI is a prototype control framework implementation of GENI (Global Environment for Network Innovations). We perform a variety of experiments in an effort to identify potential vulnerabilities presented in the current implementation. We classify our attacks into three types: data plane to data plane, data plane to control plane, and data plane to Internet. Our results indicate the potential for a breach of confidentiality and availability internally within ProtoGENI, as well as risks to external Internet. We make suggestions outlining possible defense strategies to improve ProtoGENI security and aid in future development</td>
     3113</tr>
     3114
     3115
     3116
     3117
     3118
     3119<tr>
     3120     <td valign="top">URL</td>
     3121     <td valign="top"><a href="ftp://202.38.75.7/pub/&#x0025;D0&#x0025;C2&#x0025;CE&#x0025;C4&#x0025;BC&#x0025;FE&#x0025;BC&#x0025;D0&#x0025;20(2)/DATA/PID1102190.PDF">ftp://202.38.75.7/pub/&#x0025;D0&#x0025;C2&#x0025;CE&#x0025;C4&#x0025;BC&#x0025;FE&#x0025;BC&#x0025;D0&#x0025;20(2)/DATA/PID1102190.PDF</a></td>
     3122</tr>
     3123
     3124
     3125</table></div><br><br>
     3126
     3127
     3128
     3129
     3130<a class="EntryGoto" id="Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason"></a>
     3131<b class="myheading" style="position: relative; left: 5%;">Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason</b>
     3132
     3133<div class="BibEntry">
     3134
     3135<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3136
     3137
     3138<tr>
     3139     <td valign="top">Author</td>
     3140     <td valign="top">Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason</td>
     3141</tr>
     3142
     3143<tr>
     3144     <td valign="top">Title</td>
     3145     <td valign="top">Simulation studies of OpenFlow-based in-network caching strategies</td>
     3146</tr>
     3147
     3148<tr>
     3149     <td valign="top">Booktitle</td>
     3150     <td valign="top">Proceedings of the 15th Communications and Networking Simulation Symposium</td>
     3151</tr>
     3152
     3153<tr>
     3154     <td valign="top">Location</td>
     3155     <td valign="top">Orlando, Florida</td>
     3156</tr>
     3157
     3158<tr>
     3159     <td valign="top">Publisher</td>
     3160     <td valign="top">Society for Computer Simulation International</td>
     3161</tr>
     3162
     3163<tr>
     3164     <td valign="top">Address</td>
     3165     <td valign="top">San Diego, CA, USA</td>
     3166</tr>
     3167
     3168<tr>
     3169     <td valign="top">Year</td>
     3170     <td valign="top">2012</td>
     3171</tr>
     3172
     3173<tr>
     3174     <td valign="top">Abstract</td>
     3175     <td valign="top">We propose an in-network caching architecture using Open-Flow to coordinate caching decisions in the network. Our scheme, called CacheFlow, extends the cache-and-forward concept by moving contents closer to the clients hop-by-hop using TCP for sending requests and retrieving contents. As such, CacheFlow can be incrementally implemented and deployed in the real network. In this paper, we present a simulation study of several caching policies, including a random cache policy, a statically optimal cache placement policy and a new disk placement strategy that places popular contents at the &#x63;&#x0308;enter&#x20;&#x0308;of the network. Experimental results show that simple in-network caching policies can be realized using today's technology to improve network performance.</td>
     3176</tr>
     3177
     3178
     3179
     3180
     3181
     3182<tr>
     3183     <td valign="top">URL</td>
     3184     <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=2331762.2331774">http://portal.acm.org/citation.cfm?id=2331762.2331774</a></td>
     3185</tr>
     3186
     3187
     3188</table></div><br><br>
     3189
     3190
     3191
     3192
     3193<a class="EntryGoto" id="Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross"></a>
     3194<b class="myheading" style="position: relative; left: 5%;">Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</b>
     3195
     3196<div class="BibEntry">
     3197
     3198<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3199
     3200
     3201<tr>
     3202     <td valign="top">Author</td>
     3203     <td valign="top">Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</td>
     3204</tr>
     3205
     3206<tr>
     3207     <td valign="top">Title</td>
     3208     <td valign="top">Work-in-Progress: Empirical Verification of A Subset Sum Hypothesis in GENI Cloud</td>
     3209</tr>
     3210
     3211<tr>
     3212     <td valign="top">Booktitle</td>
     3213     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     3214</tr>
     3215
     3216<tr>
     3217     <td valign="top">Location</td>
     3218     <td valign="top">Los Angeles</td>
     3219</tr>
     3220
     3221<tr>
     3222     <td valign="top">Year</td>
     3223     <td valign="top">2012</td>
     3224</tr>
     3225
     3226
     3227
     3228
     3229
     3230
     3231</table></div><br><br>
     3232
     3233
     3234
     3235
     3236<a class="EntryGoto" id="Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi"></a>
     3237<b class="myheading" style="position: relative; left: 5%;">Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</b>
     3238
     3239<div class="BibEntry">
     3240
     3241<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3242
     3243
     3244<tr>
     3245     <td valign="top">Author</td>
     3246     <td valign="top">Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</td>
     3247</tr>
     3248
     3249<tr>
     3250     <td valign="top">Title</td>
     3251     <td valign="top">Assessment of Router Vulnerabilities on PlanetLab Infrastructure for Secure Cloud Computing</td>
     3252</tr>
     3253
     3254<tr>
     3255     <td valign="top">Booktitle</td>
     3256     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     3257</tr>
     3258
     3259<tr>
     3260     <td valign="top">Location</td>
     3261     <td valign="top">Los Angeles</td>
     3262</tr>
     3263
     3264<tr>
     3265     <td valign="top">Year</td>
     3266     <td valign="top">2012</td>
     3267</tr>
     3268
     3269<tr>
     3270     <td valign="top">Abstract</td>
     3271     <td valign="top">In recent times, the cloud computing based delivery model has been proven to reduce enterprise IT costs and complexities. In contrast to traditional enterprise IT solutions, the cloud computing model moves the application software and data to remote servers in large datacenters, which raises many security challenges. One of the critical challenges is the inability to characterize the impact of the vulnerabilities of routers on the cloud security and performance guarantees. In this paper, we analyze the degree of security provided by routers to data sharing applications deployed in cloud environments that span administrative and network domains. Our analysis is based on examining the security level of network applications on routers which lie between nodes on Planetlab infrastructure. We assume that some of the PlanetLab nodes will share the same wide area network path as the cloud servers. Our preliminary results confirm that the majority of the routers are plagued by insecure network protocols, leading to vulnerable routers. These results confirm our hypothesis that the security of the network infrastructure needs to be upgraded to assure the protection of information exchanged on the wide area network path.</td>
     3272</tr>
     3273
     3274
     3275
     3276
     3277
     3278
     3279</table></div><br><br>
     3280
     3281
     3282
     3283
     3284<a class="EntryGoto" id="Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H."></a>
     3285<b class="myheading" style="position: relative; left: 5%;">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</b>
     3286
     3287<div class="BibEntry">
     3288
     3289<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3290
     3291
     3292<tr>
     3293     <td valign="top">Author</td>
     3294     <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td>
     3295</tr>
     3296
     3297<tr>
     3298     <td valign="top">Title</td>
     3299     <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td>
     3300</tr>
     3301
     3302<tr>
     3303     <td valign="top">Booktitle</td>
     3304     <td valign="top">2012 IEEE Network Operations and Management Symposium</td>
     3305</tr>
     3306
     3307<tr>
     3308     <td valign="top">Location</td>
     3309     <td valign="top">Maui, HI</td>
     3310</tr>
     3311
     3312<tr>
     3313     <td valign="top">Publisher</td>
     3314     <td valign="top">IEEE</td>
     3315</tr>
     3316
     3317<tr>
     3318     <td valign="top">Year</td>
     3319     <td valign="top">2012</td>
     3320</tr>
     3321
     3322<tr>
     3323     <td valign="top">Abstract</td>
     3324     <td valign="top">Autonomic management capabilities of the Future Internet can be provided through a recently proposed service architecture called NetServ. It consists of the interconnection of programmable nodes which enable dynamic deployment and execution of network and application services. This paper shows how this architecture can be further improved by introducing the OpenFlow architecture and implementing the OpenFlow controller as a NetServ service, thus improving both the NetServ management performance and its flexibility. These achievements are demonstrated experimentally on the GENI environment, showing the platform self-protecting capabilities in case of a SIP DoS attack.</td>
     3325</tr>
     3326
     3327
     3328
     3329<tr>
     3330     <td valign="top">DOI</td>
     3331     <td valign="top">10.1109/NOMS.2012.6211961</td>
     3332</tr>
     3333
     3334
     3335
     3336<tr>
     3337     <td valign="top">URL</td>
     3338     <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td>
     3339</tr>
     3340
     3341
     3342</table></div><br><br>
     3343
     3344
     3345<div class="BibEntry">
     3346
     3347<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3348
     3349
     3350<tr>
     3351     <td valign="top">Author</td>
     3352     <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td>
     3353</tr>
     3354
     3355<tr>
     3356     <td valign="top">Title</td>
     3357     <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td>
     3358</tr>
     3359
     3360<tr>
     3361     <td valign="top">Booktitle</td>
     3362     <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td>
     3363</tr>
     3364
     3365<tr>
     3366     <td valign="top">Year</td>
     3367     <td valign="top">2012</td>
     3368</tr>
     3369
     3370
     3371
     3372<tr>
     3373     <td valign="top">DOI</td>
     3374     <td valign="top">10.1109/NOMS.2012.6211961</td>
     3375</tr>
     3376
     3377
     3378
     3379<tr>
     3380     <td valign="top">URL</td>
     3381     <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td>
     3382</tr>
     3383
     3384
     3385</table></div><br><br>
     3386
     3387
     3388
     3389
     3390<a class="EntryGoto" id="Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y."></a>
     3391<b class="myheading" style="position: relative; left: 5%;">Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y.</b>
     3392
     3393<div class="BibEntry">
     3394
     3395<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3396
     3397
     3398<tr>
     3399     <td valign="top">Author</td>
     3400     <td valign="top">Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y.</td>
     3401</tr>
     3402
     3403<tr>
     3404     <td valign="top">Title</td>
     3405     <td valign="top">Space Versus Time Separation for Wireless Virtualization on an Indoor Grid</td>
     3406</tr>
     3407
     3408<tr>
     3409     <td valign="top">Booktitle</td>
     3410     <td valign="top">Next Generation Internet Networks, 2008. NGI 2008</td>
     3411</tr>
     3412
     3413<tr>
     3414     <td valign="top">Publisher</td>
     3415     <td valign="top">IEEE</td>
     3416</tr>
     3417
     3418<tr>
     3419     <td valign="top">Year</td>
     3420     <td valign="top">2008</td>
     3421</tr>
     3422
     3423<tr>
     3424     <td valign="top">Abstract</td>
     3425     <td valign="top">The decreasing cost of wireless hardware and ever increasing number of wireless testbeds has led to a shift in the protocol evaluation paradigm from simulations towards emulation. In addition, with a large number of users demanding experimental resources and lack of space and time for deploying more hardware, fair resource sharing among independent co-existing experiments is important. We study the proposed approaches to wireless virtualization with a focus on schemes conserving wireless channels rather than nodes. Our detailed comparison reveals that while experiments sharing a channel by space separation achieve better efficiency than those relying on time separation of a channel, the isolation between experiments in both cases is comparable. We propose and implement a policy manager to alleviate the isolation problem and suggest scenarios in which either of the schemes would provide a suitable virtualization solution.</td>
     3426</tr>
     3427
     3428
     3429
     3430<tr>
     3431     <td valign="top">DOI</td>
     3432     <td valign="top">10.1109/NGI.2008.36</td>
     3433</tr>
     3434
     3435
     3436
     3437<tr>
     3438     <td valign="top">URL</td>
     3439     <td valign="top"><a href="http://dx.doi.org/10.1109/NGI.2008.36">http://dx.doi.org/10.1109/NGI.2008.36</a></td>
     3440</tr>
     3441
     3442
     3443</table></div><br><br>
     3444
     3445
     3446
     3447
     3448<a class="EntryGoto" id="Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D."></a>
     3449<b class="myheading" style="position: relative; left: 5%;">Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D.</b>
     3450
     3451<div class="BibEntry">
     3452
     3453<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3454
     3455
     3456<tr>
     3457     <td valign="top">Author</td>
     3458     <td valign="top">Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D.</td>
     3459</tr>
     3460
     3461<tr>
     3462     <td valign="top">Title</td>
     3463     <td valign="top">Integration of heterogeneous networking testbeds</td>
     3464</tr>
     3465
     3466<tr>
     3467     <td valign="top">Booktitle</td>
     3468     <td valign="top">Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks &#x0026; communities</td>
     3469</tr>
     3470
     3471<tr>
     3472     <td valign="top">Location</td>
     3473     <td valign="top">Innsbruck, Austria</td>
     3474</tr>
     3475
     3476<tr>
     3477     <td valign="top">Publisher</td>
     3478     <td valign="top">ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)</td>
     3479</tr>
     3480
     3481<tr>
     3482     <td valign="top">Address</td>
     3483     <td valign="top">ICST, Brussels, Belgium, Belgium</td>
     3484</tr>
     3485
     3486<tr>
     3487     <td valign="top">Year</td>
     3488     <td valign="top">2008</td>
     3489</tr>
     3490
     3491<tr>
     3492     <td valign="top">Abstract</td>
     3493     <td valign="top">As networking research expands into new frontiers, the research community has felt a need for a heterogeneous networking research infrastructure to experiment with the interaction and integration of different types of networks, and to test the performance of various networking protocols in realistic environments. This requirement has led to the Global Environment for Network Innovations (GENI) initiative to create a global infrastructure for conducting networking experiments across diverse substrates such as wired (local and wide-area), wireless, sensor and cellular networks. In this paper, we discuss and present two models for building such an experimental infrastructure. The first model enables a wired testbed to link with wireless edge nodes during an experiment, whereas the second model enables a wireless testbed to link to wired testbeds. Proof-of-concept experiments are also presented reinforcing the usefulness of the models in terms of facilitating experiments over the integrated heterogeneous infrastructure.</td>
     3494</tr>
     3495
     3496
     3497
     3498
     3499
     3500<tr>
     3501     <td valign="top">URL</td>
     3502     <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=1390609">http://portal.acm.org/citation.cfm?id=1390609</a></td>
     3503</tr>
     3504
     3505
     3506</table></div><br><br>
     3507
     3508
     3509
     3510
     3511<a class="EntryGoto" id="Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I."></a>
     3512<b class="myheading" style="position: relative; left: 5%;">Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I.</b>
     3513
     3514<div class="BibEntry">
     3515
     3516<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3517
     3518
     3519<tr>
     3520     <td valign="top">Author</td>
     3521     <td valign="top">Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I.</td>
     3522</tr>
     3523
     3524<tr>
     3525     <td valign="top">Title</td>
     3526     <td valign="top">Enabling Wide Area Single System Image Experimentation on the GENI Platform</td>
     3527</tr>
     3528
     3529<tr>
     3530     <td valign="top">Booktitle</td>
     3531     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     3532</tr>
     3533
     3534<tr>
     3535     <td valign="top">Location</td>
     3536     <td valign="top">Salt Lake City, UT</td>
     3537</tr>
     3538
     3539<tr>
     3540     <td valign="top">Publisher</td>
     3541     <td valign="top">IEEE</td>
     3542</tr>
     3543
     3544<tr>
     3545     <td valign="top">Year</td>
     3546     <td valign="top">2013</td>
     3547</tr>
     3548
     3549
     3550
     3551
     3552
     3553
     3554</table></div><br><br>
     3555
     3556
     3557
     3558
     3559<a class="EntryGoto" id="Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming"></a>
     3560<b class="myheading" style="position: relative; left: 5%;">Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</b>
     3561
     3562<div class="BibEntry">
     3563
     3564<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3565
     3566
     3567<tr>
     3568     <td valign="top">Author</td>
     3569     <td valign="top">Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</td>
     3570</tr>
     3571
     3572<tr>
     3573     <td valign="top">Title</td>
     3574     <td valign="top">Socially Aware Single System Images</td>
     3575</tr>
     3576
     3577<tr>
     3578     <td valign="top">Booktitle</td>
     3579     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     3580</tr>
     3581
     3582<tr>
     3583     <td valign="top">Location</td>
     3584     <td valign="top">Los Angeles</td>
     3585</tr>
     3586
     3587<tr>
     3588     <td valign="top">Year</td>
     3589     <td valign="top">2012</td>
     3590</tr>
     3591
     3592<tr>
     3593     <td valign="top">Abstract</td>
     3594     <td valign="top">Cloud computing enables users to get access to huge amounts of computing resources as desired. There are many popular commercial cloud service providers which provide resources to users at a price. These providers can not be trusted as far as privacy of data is concerned. On the other hand, people do trust their close friends, relatives and other social contacts, albeit, to varying degrees. This paper reports the work-in-progress on S3I(Socially Aware Single System Images) which allows users to form computing clusters using resources owned by their social contacts. It tries to utilize the trust found between people in real life and translate it to provide trustworthy resource sharing between them.</td>
     3595</tr>
     3596
     3597
     3598
     3599
     3600
     3601
     3602</table></div><br><br>
     3603
     3604
     3605
     3606
     3607<a class="EntryGoto" id="Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil"></a>
     3608<b class="myheading" style="position: relative; left: 5%;">Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil</b>
     3609
     3610<div class="BibEntry">
     3611
     3612<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3613
     3614
     3615<tr>
     3616     <td valign="top">Author</td>
     3617     <td valign="top">Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil</td>
     3618</tr>
     3619
     3620<tr>
     3621     <td valign="top">Title</td>
     3622     <td valign="top">WiMAX in the Classroom: Designing a Cellular Networking Hands-on Lab</td>
     3623</tr>
     3624
     3625<tr>
     3626     <td valign="top">Booktitle</td>
     3627     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     3628</tr>
     3629
     3630<tr>
     3631     <td valign="top">Location</td>
     3632     <td valign="top">Salt Lake City, UT</td>
     3633</tr>
     3634
     3635<tr>
     3636     <td valign="top">Publisher</td>
     3637     <td valign="top">IEEE</td>
     3638</tr>
     3639
     3640<tr>
     3641     <td valign="top">Year</td>
     3642     <td valign="top">2013</td>
     3643</tr>
     3644
     3645
     3646
     3647
     3648
     3649
     3650</table></div><br><br>
     3651
     3652
     3653
     3654
     3655<a class="EntryGoto" id="Maziku, Hellen and Shetty, Sachin and Rogers, Tamara"></a>
     3656<b class="myheading" style="position: relative; left: 5%;">Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</b>
     3657
     3658<div class="BibEntry">
     3659
     3660<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3661
     3662
     3663<tr>
     3664     <td valign="top">Author</td>
     3665     <td valign="top">Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</td>
     3666</tr>
     3667
     3668<tr>
     3669     <td valign="top">Title</td>
     3670     <td valign="top">Measurement-based IP Geolocation of Routers on Planetlab Infrastructure</td>
     3671</tr>
     3672
     3673<tr>
     3674     <td valign="top">Booktitle</td>
     3675     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     3676</tr>
     3677
     3678<tr>
     3679     <td valign="top">Location</td>
     3680     <td valign="top">Los Angeles</td>
     3681</tr>
     3682
     3683<tr>
     3684     <td valign="top">Year</td>
     3685     <td valign="top">2012</td>
     3686</tr>
     3687
     3688<tr>
     3689     <td valign="top">Abstract</td>
     3690     <td valign="top">Location aware applications can benefit from a more accurate yet robust IP geolocation framework. Various approaches to IP geolocation have been well documented. The most recent approach casts IP geolocation as a machine learn- ing classification problem. This approach makes it possible to incorporate both delay and non delay based information. The accuracy of IP geolocation can be improved by incorporating additional types of geolocation information rather relying on network delay alone. To enhance the classification accuracy of the existing classification framework, we expand it to include 6 features (3 of which are novel). We use PlanetLab as a testbed to generate our measurement set. We select 67 PlanetLab nodes within the United States with known geographic location as our landmarks. We test the accuracy of our framework on 23,843 routers given ping measurements from the 67 landmarks. With only three features (average delay, average hops and population density) tested, our new classifier gives a reduced average error distance of 157.81 miles and a median error distance of 0 miles, compared to the present classifier that gives an average error distance of 253.34 miles. This is very promising as we move on to the next phase of incorporating data for the remaining 5 features. To the best of our knowledge, this is the first proposed framework that aims to improve the accuracy of the present classifier based IP geolocation.</td>
     3691</tr>
     3692
     3693
     3694
     3695
     3696
     3697
     3698</table></div><br><br>
     3699
     3700
     3701
     3702
     3703<a class="EntryGoto" id="McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan"></a>
     3704<b class="myheading" style="position: relative; left: 5%;">McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan</b>
     3705
     3706<div class="BibEntry">
     3707
     3708<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3709
     3710
     3711<tr>
     3712     <td valign="top">Author</td>
     3713     <td valign="top">McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan</td>
     3714</tr>
     3715
     3716<tr>
     3717     <td valign="top">Title</td>
     3718     <td valign="top">OpenFlow: enabling innovation in campus networks</td>
     3719</tr>
     3720
     3721<tr>
     3722     <td valign="top">Journal</td>
     3723     <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
     3724</tr>
     3725
     3726<tr>
     3727     <td valign="top">Publisher</td>
     3728     <td valign="top">ACM</td>
     3729</tr>
     3730
     3731<tr>
     3732     <td valign="top">Address</td>
     3733     <td valign="top">New York, NY, USA</td>
     3734</tr>
     3735
     3736<tr>
     3737     <td valign="top">Year</td>
     3738     <td valign="top">2008</td>
     3739</tr>
     3740
     3741
     3742
     3743<tr>
     3744     <td valign="top">DOI</td>
     3745     <td valign="top">10.1145/1355734.1355746</td>
     3746</tr>
     3747
     3748
     3749
     3750<tr>
     3751     <td valign="top">URL</td>
     3752     <td valign="top"><a href="http://doi.acm.org/10.1145/1355734.1355746">http://doi.acm.org/10.1145/1355734.1355746</a></td>
     3753</tr>
     3754
     3755
     3756</table></div><br><br>
     3757
     3758
     3759
     3760
     3761<a class="EntryGoto" id="Mitroff, Sarah"></a>
     3762<b class="myheading" style="position: relative; left: 5%;">Mitroff, Sarah</b>
     3763
     3764<div class="BibEntry">
     3765
     3766<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3767
     3768
     3769<tr>
     3770     <td valign="top">Author</td>
     3771     <td valign="top">Mitroff, Sarah</td>
     3772</tr>
     3773
     3774<tr>
     3775     <td valign="top">Title</td>
     3776     <td valign="top">Lawrence Landweber Helped Build Today's Internet, Now He's Advising Its Future</td>
     3777</tr>
     3778
     3779<tr>
     3780     <td valign="top">Journal</td>
     3781     <td valign="top">Wired</td>
     3782</tr>
     3783
     3784<tr>
     3785     <td valign="top">Year</td>
     3786     <td valign="top">2012</td>
     3787</tr>
     3788
     3789
     3790
     3791
     3792
     3793<tr>
     3794     <td valign="top">URL</td>
     3795     <td valign="top"><a href="http://www.wired.com/business/2012/08/lawrence-landweber/">http://www.wired.com/business/2012/08/lawrence-landweber/</a></td>
     3796</tr>
     3797
     3798
     3799</table></div><br><br>
     3800
     3801
     3802
     3803
     3804<a class="EntryGoto" id="Muhammad, Monzur and Cappos, Justin"></a>
     3805<b class="myheading" style="position: relative; left: 5%;">Muhammad, Monzur and Cappos, Justin</b>
     3806
     3807<div class="BibEntry">
     3808
     3809<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3810
     3811
     3812<tr>
     3813     <td valign="top">Author</td>
     3814     <td valign="top">Muhammad, Monzur and Cappos, Justin</td>
     3815</tr>
     3816
     3817<tr>
     3818     <td valign="top">Title</td>
     3819     <td valign="top">Towards a Representive Testbed: Harnessing Volunteers for Networks Research</td>
     3820</tr>
     3821
     3822<tr>
     3823     <td valign="top">Booktitle</td>
     3824     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     3825</tr>
     3826
     3827<tr>
     3828     <td valign="top">Location</td>
     3829     <td valign="top">Los Angeles</td>
     3830</tr>
     3831
     3832<tr>
     3833     <td valign="top">Year</td>
     3834     <td valign="top">2012</td>
     3835</tr>
     3836
     3837<tr>
     3838     <td valign="top">Abstract</td>
     3839     <td valign="top">A steady rise in home systems has been seen over the past few years. As more systems are designed and deployed, an appropriate testbed is required to test these systems. Sev- eral systems exist, such as PlanetLab, that currently provide a networking testbed allowing researchers and developers to test and measure various applications. However in the long run such testbeds will be unable to keep up and meet all the demands of many of the large scale modern day peer-to-peer systems. We outline the various challenges and essentials of a networking testbed and we provide an alternate network- ing testbed that is driven by resources that are voluntarily contributed. We talk about the various advantages and dis- advantages of the Seattle system, an open source peer-to- peer computing testbed that has the potential to meet these demands. The testbed is composed of sandboxed resources that are donated by volunteers. Seattle has been deployed for about three years and supports many researchers who are interested in a networking testbed. The testbed consists of over 4100 nodes and is constantly growing. Seattle looks to grow and meet the demands of networking testbeds as they are made.</td>
     3840</tr>
     3841
     3842
     3843
     3844
     3845
     3846
     3847</table></div><br><br>
     3848
     3849
     3850
     3851
     3852<a class="EntryGoto" id="Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram"></a>
     3853<b class="myheading" style="position: relative; left: 5%;">Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram</b>
     3854
     3855<div class="BibEntry">
     3856
     3857<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3858
     3859
     3860<tr>
     3861     <td valign="top">Author</td>
     3862     <td valign="top">Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram</td>
     3863</tr>
     3864
     3865<tr>
     3866     <td valign="top">Title</td>
     3867     <td valign="top">OpenFlow Configuration (OFConfig) Protocol: Implementation for the OF Management Plane</td>
     3868</tr>
     3869
     3870<tr>
     3871     <td valign="top">Booktitle</td>
     3872     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     3873</tr>
     3874
     3875<tr>
     3876     <td valign="top">Location</td>
     3877     <td valign="top">Salt Lake City, UT</td>
     3878</tr>
     3879
     3880<tr>
     3881     <td valign="top">Publisher</td>
     3882     <td valign="top">IEEE</td>
     3883</tr>
     3884
     3885<tr>
     3886     <td valign="top">Year</td>
     3887     <td valign="top">2013</td>
     3888</tr>
     3889
     3890
     3891
     3892
     3893
     3894
     3895</table></div><br><br>
     3896
     3897
     3898
     3899
     3900<a class="EntryGoto" id="O'Neill, Derek and Aikat, Jay and Jeffay, Kevin"></a>
     3901<b class="myheading" style="position: relative; left: 5%;">O'Neill, Derek and Aikat, Jay and Jeffay, Kevin</b>
     3902
     3903<div class="BibEntry">
     3904
     3905<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3906
     3907
     3908<tr>
     3909     <td valign="top">Author</td>
     3910     <td valign="top">O'Neill, Derek and Aikat, Jay and Jeffay, Kevin</td>
     3911</tr>
     3912
     3913<tr>
     3914     <td valign="top">Title</td>
     3915     <td valign="top">Experiment Replication using ProtoGENI nodes</td>
     3916</tr>
     3917
     3918<tr>
     3919     <td valign="top">Booktitle</td>
     3920     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     3921</tr>
     3922
     3923<tr>
     3924     <td valign="top">Location</td>
     3925     <td valign="top">Salt Lake City, UT</td>
     3926</tr>
     3927
     3928<tr>
     3929     <td valign="top">Publisher</td>
     3930     <td valign="top">IEEE</td>
     3931</tr>
     3932
     3933<tr>
     3934     <td valign="top">Year</td>
     3935     <td valign="top">2013</td>
     3936</tr>
     3937
     3938
     3939
     3940
     3941
     3942
     3943</table></div><br><br>
     3944
     3945
     3946
     3947
     3948<a class="EntryGoto" id="Ozcelik, Ilker and Brooks, Richard R."></a>
     3949<b class="myheading" style="position: relative; left: 5%;">Ozcelik, Ilker and Brooks, Richard R.</b>
     3950
     3951<div class="BibEntry">
     3952
     3953<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     3954
     3955
     3956<tr>
     3957     <td valign="top">Author</td>
     3958     <td valign="top">Ozcelik, Ilker and Brooks, Richard R.</td>
     3959</tr>
     3960
     3961<tr>
     3962     <td valign="top">Title</td>
     3963     <td valign="top">Security experimentation using operational systems</td>
     3964</tr>
     3965
     3966<tr>
     3967     <td valign="top">Booktitle</td>
     3968     <td valign="top">Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research</td>
     3969</tr>
     3970
     3971<tr>
     3972     <td valign="top">Location</td>
     3973     <td valign="top">Oak Ridge, Tennessee</td>
     3974</tr>
     3975
     3976<tr>
     3977     <td valign="top">Publisher</td>
     3978     <td valign="top">ACM</td>
     3979</tr>
     3980
     3981<tr>
     3982     <td valign="top">Address</td>
     3983     <td valign="top">New York, NY, USA</td>
     3984</tr>
     3985
     3986<tr>
     3987     <td valign="top">Year</td>
     3988     <td valign="top">2011</td>
     3989</tr>
     3990
     3991<tr>
     3992     <td valign="top">Abstract</td>
     3993     <td valign="top">Computers and Internet have evolved into necessary tools for our professional, personal and social lives. As a result of this growing dependence, there is a concern that these systems remain protected and available. This concern increases exponentially when considering systems such as smart power grids. Therefore, research should be conducted to develop effective ways of detecting system anomalies. To have realistic results, the studies should be tested on real systems. However, it is not possible to test these experiments on the live network. With the recent collaboration of Universities and research labs, a new experiment test bed has been established. As a result, experiments can now be implemented on real networks. In our study, we design an experiment to analyze Distributed Denial of Service Attacks (DDoS Attack) on a real network with real Internet traffic. The approach that we use in our study can easily be generalized to apply to smart power grids.</td>
     3994</tr>
     3995
     3996
     3997
     3998<tr>
     3999     <td valign="top">DOI</td>
     4000     <td valign="top">10.1145/2179298.2179388</td>
     4001</tr>
     4002
     4003
     4004
     4005<tr>
     4006     <td valign="top">URL</td>
     4007     <td valign="top"><a href="http://dx.doi.org/10.1145/2179298.2179388">http://dx.doi.org/10.1145/2179298.2179388</a></td>
     4008</tr>
     4009
     4010
     4011</table></div><br><br>
     4012
     4013
     4014<div class="BibEntry">
     4015
     4016<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4017
     4018
     4019<tr>
     4020     <td valign="top">Author</td>
     4021     <td valign="top">Ozcelik, Ilker and Brooks, Richard R.</td>
     4022</tr>
     4023
     4024<tr>
     4025     <td valign="top">Title</td>
     4026     <td valign="top">Performance Analysis of DDoS Detection Methods on Real Network</td>
     4027</tr>
     4028
     4029<tr>
     4030     <td valign="top">Booktitle</td>
     4031     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     4032</tr>
     4033
     4034<tr>
     4035     <td valign="top">Location</td>
     4036     <td valign="top">Los Angeles</td>
     4037</tr>
     4038
     4039<tr>
     4040     <td valign="top">Year</td>
     4041     <td valign="top">2012</td>
     4042</tr>
     4043
     4044<tr>
     4045     <td valign="top">Abstract</td>
     4046     <td valign="top">Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic.</td>
     4047</tr>
     4048
     4049
     4050
     4051
     4052
     4053
     4054</table></div><br><br>
     4055
     4056
     4057
     4058
     4059<a class="EntryGoto" id="Ozcelik, Ilker and Fu, Yu and Brooks, Richard R."></a>
     4060<b class="myheading" style="position: relative; left: 5%;">Ozcelik, Ilker and Fu, Yu and Brooks, Richard R.</b>
     4061
     4062<div class="BibEntry">
     4063
     4064<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4065
     4066
     4067<tr>
     4068     <td valign="top">Author</td>
     4069     <td valign="top">Ozcelik, Ilker and Fu, Yu and Brooks, Richard R.</td>
     4070</tr>
     4071
     4072<tr>
     4073     <td valign="top">Title</td>
     4074     <td valign="top">DoS Detection is Easier Now</td>
     4075</tr>
     4076
     4077<tr>
     4078     <td valign="top">Booktitle</td>
     4079     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     4080</tr>
     4081
     4082<tr>
     4083     <td valign="top">Location</td>
     4084     <td valign="top">Salt Lake City, UT</td>
     4085</tr>
     4086
     4087<tr>
     4088     <td valign="top">Publisher</td>
     4089     <td valign="top">IEEE</td>
     4090</tr>
     4091
     4092<tr>
     4093     <td valign="top">Year</td>
     4094     <td valign="top">2013</td>
     4095</tr>
     4096
     4097
     4098
     4099
     4100
     4101
     4102</table></div><br><br>
     4103
     4104
     4105
     4106
     4107<a class="EntryGoto" id="Paul, Subharthi and Pan, Jianli and Jain, Raj"></a>
     4108<b class="myheading" style="position: relative; left: 5%;">Paul, Subharthi and Pan, Jianli and Jain, Raj</b>
     4109
     4110<div class="BibEntry">
     4111
     4112<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4113
     4114
     4115<tr>
     4116     <td valign="top">Author</td>
     4117     <td valign="top">Paul, Subharthi and Pan, Jianli and Jain, Raj</td>
     4118</tr>
     4119
     4120<tr>
     4121     <td valign="top">Title</td>
     4122     <td valign="top">Architectures for the future networks and the next generation Internet: A survey</td>
     4123</tr>
     4124
     4125<tr>
     4126     <td valign="top">Journal</td>
     4127     <td valign="top">Computer Communications</td>
     4128</tr>
     4129
     4130<tr>
     4131     <td valign="top">Publisher</td>
     4132     <td valign="top">Elsevier Science Publishers B. V.</td>
     4133</tr>
     4134
     4135<tr>
     4136     <td valign="top">Address</td>
     4137     <td valign="top">Amsterdam, The Netherlands, The Netherlands</td>
     4138</tr>
     4139
     4140<tr>
     4141     <td valign="top">Year</td>
     4142     <td valign="top">2011</td>
     4143</tr>
     4144
     4145<tr>
     4146     <td valign="top">Abstract</td>
     4147     <td valign="top">Networking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet. We present a comprehensive survey of such research projects and activities. The topics covered include various testbeds for experimentations for new architectures, new security mechanisms, content delivery mechanisms, management and control frameworks, service architectures, and routing mechanisms. Delay/disruption tolerant networks which allow communications even when complete end-to-end path is not available are also discussed.</td>
     4148</tr>
     4149
     4150
     4151
     4152<tr>
     4153     <td valign="top">DOI</td>
     4154     <td valign="top">10.1016/j.comcom.2010.08.001</td>
     4155</tr>
     4156
     4157
     4158
     4159<tr>
     4160     <td valign="top">URL</td>
     4161     <td valign="top"><a href="http://dx.doi.org/10.1016/j.comcom.2010.08.001">http://dx.doi.org/10.1016/j.comcom.2010.08.001</a></td>
     4162</tr>
     4163
     4164
     4165</table></div><br><br>
     4166
     4167
     4168
     4169
     4170<a class="EntryGoto" id="Qin, Z. and Xiong, X. and Chuah, M."></a>
     4171<b class="myheading" style="position: relative; left: 5%;">Qin, Z. and Xiong, X. and Chuah, M.</b>
     4172
     4173<div class="BibEntry">
     4174
     4175<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4176
     4177
     4178<tr>
     4179     <td valign="top">Author</td>
     4180     <td valign="top">Qin, Z. and Xiong, X. and Chuah, M.</td>
     4181</tr>
     4182
     4183<tr>
     4184     <td valign="top">Title</td>
     4185     <td valign="top">Lehigh Explorer: Android Application Utilizing Content Centric Features</td>
     4186</tr>
     4187
     4188<tr>
     4189     <td valign="top">Booktitle</td>
     4190     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     4191</tr>
     4192
     4193<tr>
     4194     <td valign="top">Location</td>
     4195     <td valign="top">Los Angeles</td>
     4196</tr>
     4197
     4198<tr>
     4199     <td valign="top">Year</td>
     4200     <td valign="top">2012</td>
     4201</tr>
     4202
     4203<tr>
     4204     <td valign="top">Abstract</td>
     4205     <td valign="top">Companies, government organizations or institutions from anywhere in the world publish different types of information e.g. news, health alerts, disaster warnings at any time. Rather than consuming all published data, users only desire access to information of interest to themselves irrespective of where the data is located and who publish them. Existing publish/subscribe systems built based on IP-based network can be inefficient and are not flexible enough to meet emerging requirements e.g. deal with mobile users, dynamic contents, searching over encrypted data. Recently content-centric networks have been proposed to provide flexibility to users to access such information. We have designed secure content centric mobile networks that allow users to publish and retrieve contents securely. As with any new architecture, one important issue is to have useful applications that can utilize features provided in the new architecture. In this paper, we describe an Android application we recently developed that allows visitors to explore Lehigh campus based on their expressed interests. Our application utilizes keyword based interest messages to retrieve matching data items of interests to a user. We are giving a demo of Lehigh Explorer at GEC13.</td>
     4206</tr>
     4207
     4208
     4209
     4210
     4211
     4212
     4213</table></div><br><br>
     4214
     4215
     4216
     4217
     4218<a class="EntryGoto" id="Quan, John and Nance, Kara and Hay, Brian"></a>
     4219<b class="myheading" style="position: relative; left: 5%;">Quan, John and Nance, Kara and Hay, Brian</b>
     4220
     4221<div class="BibEntry">
     4222
     4223<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4224
     4225
     4226<tr>
     4227     <td valign="top">Author</td>
     4228     <td valign="top">Quan, John and Nance, Kara and Hay, Brian</td>
     4229</tr>
     4230
     4231<tr>
     4232     <td valign="top">Title</td>
     4233     <td valign="top">A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments</td>
     4234</tr>
     4235
     4236<tr>
     4237     <td valign="top">Journal</td>
     4238     <td valign="top">IT Professional</td>
     4239</tr>
     4240
     4241<tr>
     4242     <td valign="top">Year</td>
     4243     <td valign="top">2011</td>
     4244</tr>
     4245
     4246<tr>
     4247     <td valign="top">Abstract</td>
     4248     <td valign="top">Applying a mutualistic security service model to large-scale virtualized environments that rely on contributed hardware lets researchers improve security in exchange for resources. The authors discuss this model in the context of the Global Environment for Network Innovation (GENI) project.</td>
     4249</tr>
     4250
     4251
     4252
     4253<tr>
     4254     <td valign="top">DOI</td>
     4255     <td valign="top">10.1109/MITP.2011.36</td>
     4256</tr>
     4257
     4258
     4259
     4260<tr>
     4261     <td valign="top">URL</td>
     4262     <td valign="top"><a href="http://dx.doi.org/10.1109/MITP.2011.36">http://dx.doi.org/10.1109/MITP.2011.36</a></td>
     4263</tr>
     4264
     4265
     4266</table></div><br><br>
     4267
     4268
     4269
     4270
     4271<a class="EntryGoto" id="Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon"></a>
     4272<b class="myheading" style="position: relative; left: 5%;">Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon</b>
     4273
     4274<div class="BibEntry">
     4275
     4276<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4277
     4278
     4279<tr>
     4280     <td valign="top">Author</td>
     4281     <td valign="top">Ricci, Robert and Wong, Gary and Stoller, Leigh and Duerig, Jonathon</td>
     4282</tr>
     4283
     4284<tr>
     4285     <td valign="top">Title</td>
     4286     <td valign="top">An Architecture For International Federation of Network Testbeds</td>
     4287</tr>
     4288
     4289<tr>
     4290     <td valign="top">Journal</td>
     4291     <td valign="top">IEICE Transactions on Communications</td>
     4292</tr>
     4293
     4294<tr>
     4295     <td valign="top">Year</td>
     4296     <td valign="top">2013</td>
     4297</tr>
     4298
     4299<tr>
     4300     <td valign="top">Abstract</td>
     4301     <td valign="top">Testbeds play a key role in the advancement of network science and the exploration of new network architectures. Because the scale and scope of any individual testbed is necessarily limited, federation is a useful technique for constructing testbeds that serve a wide range of experimenter needs. In a federated testbed, individual facilities maintain local autonomy while cooperating to provide a unified set of abstractions and interfaces to users. Forming an international federation is particularly challenging, because issues of trust, user access policy, and local laws and regulations are of greater concern that they are for federations within a single country. In this paper, we describe an architecture, based on the US National Science Foundation's GENI project, that is capable of supporting the needs of an international federation.</td>
     4302</tr>
     4303
     4304
     4305
     4306<tr>
     4307     <td valign="top">DOI</td>
     4308     <td valign="top">10.1587/transcom.E96.B.2</td>
     4309</tr>
     4310
     4311
     4312
     4313<tr>
     4314     <td valign="top">URL</td>
     4315     <td valign="top"><a href="http://dx.doi.org/10.1587/transcom.E96.B.2">http://dx.doi.org/10.1587/transcom.E96.B.2</a></td>
     4316</tr>
     4317
     4318
     4319</table></div><br><br>
     4320
     4321
     4322
     4323
     4324<a class="EntryGoto" id="Rohrer, Justin P. and &#x43;&#x0327;etinkaya, Egemen K. and Sterbenz, James P. G."></a>
     4325<b class="myheading" style="position: relative; left: 5%;">Rohrer, Justin P. and &#x43;&#x0327;etinkaya, Egemen K. and Sterbenz, James P. G.</b>
     4326
     4327<div class="BibEntry">
     4328
     4329<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4330
     4331
     4332<tr>
     4333     <td valign="top">Author</td>
     4334     <td valign="top">Rohrer, Justin P. and &#x43;&#x0327;etinkaya, Egemen K. and Sterbenz, James P. G.</td>
     4335</tr>
     4336
     4337<tr>
     4338     <td valign="top">Title</td>
     4339     <td valign="top">Progress and challenges in large-scale future internet experimentation using the GpENI programmable testbed</td>
     4340</tr>
     4341
     4342<tr>
     4343     <td valign="top">Booktitle</td>
     4344     <td valign="top">Proceedings of the 6th International Conference on Future Internet Technologies</td>
     4345</tr>
     4346
     4347<tr>
     4348     <td valign="top">Location</td>
     4349     <td valign="top">Seoul, Republic of Korea</td>
     4350</tr>
     4351
     4352<tr>
     4353     <td valign="top">Publisher</td>
     4354     <td valign="top">ACM</td>
     4355</tr>
     4356
     4357<tr>
     4358     <td valign="top">Address</td>
     4359     <td valign="top">New York, NY, USA</td>
     4360</tr>
     4361
     4362<tr>
     4363     <td valign="top">Year</td>
     4364     <td valign="top">2011</td>
     4365</tr>
     4366
     4367<tr>
     4368     <td valign="top">Abstract</td>
     4369     <td valign="top">GpENI is evolving to provide a promising environment in which to do experimental research in the resilience and survivability of future networks, by allowing programmable control over topology and mechanism, while providing the scale and global reach needed to conduct network experiments far beyond the capabilities of a conventional testbed. Addressing this need at scale introduces a number of challenges both in deployment and in collecting results that can be directly compared to simulation results for cross-verification purposes. In this short paper we present the scope, design goals, challenges, and current status of the GpENI programmable testbed, as well as an overview and examples of the types of experiments we are beginning to run.</td>
     4370</tr>
     4371
     4372
     4373
     4374<tr>
     4375     <td valign="top">DOI</td>
     4376     <td valign="top">10.1145/2002396.2002409</td>
     4377</tr>
     4378
     4379
     4380
     4381<tr>
     4382     <td valign="top">URL</td>
     4383     <td valign="top"><a href="http://dx.doi.org/10.1145/2002396.2002409">http://dx.doi.org/10.1145/2002396.2002409</a></td>
     4384</tr>
     4385
     4386
     4387</table></div><br><br>
     4388
     4389
     4390
     4391
     4392<a class="EntryGoto" id="Rosen, Aaron and Wang, Kuang-Ching"></a>
     4393<b class="myheading" style="position: relative; left: 5%;">Rosen, Aaron and Wang, Kuang-Ching</b>
     4394
     4395<div class="BibEntry">
     4396
     4397<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4398
     4399
     4400<tr>
     4401     <td valign="top">Author</td>
     4402     <td valign="top">Rosen, Aaron and Wang, Kuang-Ching</td>
     4403</tr>
     4404
     4405<tr>
     4406     <td valign="top">Title</td>
     4407     <td valign="top">Steroid OpenFlow Service: Seamless Network Service Delivery in Software Defined Networks</td>
     4408</tr>
     4409
     4410<tr>
     4411     <td valign="top">Booktitle</td>
     4412     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     4413</tr>
     4414
     4415<tr>
     4416     <td valign="top">Location</td>
     4417     <td valign="top">Los Angeles</td>
     4418</tr>
     4419
     4420<tr>
     4421     <td valign="top">Year</td>
     4422     <td valign="top">2012</td>
     4423</tr>
     4424
     4425<tr>
     4426     <td valign="top">Abstract</td>
     4427     <td valign="top">In a software defined network (SDN), packet forwarding is controlled by software controllers. In an OpenFlow SDN, a controller can control the forwarding, rewriting, and dropping of packets based on their header attributes. The ability to handle packets in customizable ways in software has significant implications for both network users and operators. Via software, users can convey application specific expectations while operators can deliver application specific services to enhance user experiences. In this paper, we present the Steroid OpenFlow Services (SOS) paradigm for network services delivery. The paradigm enables operators to deliver network services without any setup requirements on user machines. SOS utilizes OpenFlow to redirect application specific traffic to application specific service agents; SOS also rewrites packet headers for a service to remain seamless to users. This paper presents an example SOS service for optimizing large volume TCP download across a large delay-bandwidth-product wide area network. SOS service agents on both ends of the connection seamlessly terminate a user TCP connection, launch a set of parallel TCP connections, and leverage multiple paths when available to maximize throughput. With the NSF GENI future Internet testbed, a prototype implementation achieved up to 320 times throughput enhancement seamless to the end users.</td>
     4428</tr>
     4429
     4430
     4431
     4432
     4433
     4434
     4435</table></div><br><br>
     4436
     4437
     4438
     4439
     4440<a class="EntryGoto" id="Scoglio, Caterina M. and Sydney, Ali and Youssef, Mina and Schumm, Phillip and Kooij, Robert E."></a>
     4441<b class="myheading" style="position: relative; left: 5%;">Scoglio, Caterina M. and Sydney, Ali and Youssef, Mina and Schumm, Phillip and Kooij, Robert E.</b>
     4442
     4443<div class="BibEntry">
     4444
     4445<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4446
     4447
     4448<tr>
     4449     <td valign="top">Author</td>
     4450     <td valign="top">Scoglio, Caterina M. and Sydney, Ali and Youssef, Mina and Schumm, Phillip and Kooij, Robert E.</td>
     4451</tr>
     4452
     4453<tr>
     4454     <td valign="top">Title</td>
     4455     <td valign="top">Elasticity and Viral Conductance: Unveiling Robustness in Complex Networks through Topological Characteristics</td>
     4456</tr>
     4457
     4458<tr>
     4459     <td valign="top">Journal</td>
     4460     <td valign="top">CoRR</td>
     4461</tr>
     4462
     4463<tr>
     4464     <td valign="top">Year</td>
     4465     <td valign="top">2008</td>
     4466</tr>
     4467
     4468
     4469
     4470
     4471
     4472
     4473</table></div><br><br>
     4474
     4475
     4476
     4477
     4478<a class="EntryGoto" id="Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar"></a>
     4479<b class="myheading" style="position: relative; left: 5%;">Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar</b>
     4480
     4481<div class="BibEntry">
     4482
     4483<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4484
     4485
     4486<tr>
     4487     <td valign="top">Author</td>
     4488     <td valign="top">Seskar, Ivan and Nagaraja, Kiran and Nelson, Sam and Raychaudhuri, Dipankar</td>
     4489</tr>
     4490
     4491<tr>
     4492     <td valign="top">Title</td>
     4493     <td valign="top">MobilityFirst future internet architecture project</td>
     4494</tr>
     4495
     4496<tr>
     4497     <td valign="top">Booktitle</td>
     4498     <td valign="top">Proceedings of the 7th Asian Internet Engineering Conference</td>
     4499</tr>
     4500
     4501<tr>
     4502     <td valign="top">Location</td>
     4503     <td valign="top">Bangkok, Thailand</td>
     4504</tr>
     4505
     4506<tr>
     4507     <td valign="top">Publisher</td>
     4508     <td valign="top">ACM</td>
     4509</tr>
     4510
     4511<tr>
     4512     <td valign="top">Address</td>
     4513     <td valign="top">New York, NY, USA</td>
     4514</tr>
     4515
     4516<tr>
     4517     <td valign="top">Year</td>
     4518     <td valign="top">2011</td>
     4519</tr>
     4520
     4521<tr>
     4522     <td valign="top">Abstract</td>
     4523     <td valign="top">This short paper presents an overview of the MobilityFirst network architecture, which is a clean-slate project being conducted as part of the NSF Future Internet Architecture (FIA) program. The proposed architecture is intended to directly address the challenges of wireless access and mobility at scale, while also providing new multicast, anycast, multi-path and context-aware services needed for emerging mobile Internet application scenarios. Key protocol components of the proposed architecture are: (a) separation of naming from addressing; (b) public key based self-certifying names (called globally unique identifiers or GUIDs) for network-attached objects; (c) global name resolution service (GNRS) for dynamic name-to-address binding; (d) delay-tolerant and storage-aware routing (GSTAR) capable of dealing with wireless link quality fluctuations and disconnections; (e) hop-by-hop transport of large protocol data units; and (f) location or context-aware services. The basic operations of a MobilityFirst router are outlined. This is followed by a discussion of ongoing proof-of-concept prototyping and experimental evaluation efforts for the MobilityFirst protocol stack. In conclusion, a brief description of an ongoing multi-site experimental deployment of the MobilityFirst protocol stack on the GENI testbed is provided.</td>
     4524</tr>
     4525
     4526
     4527
     4528<tr>
     4529     <td valign="top">DOI</td>
     4530     <td valign="top">10.1145/2089016.2089017</td>
     4531</tr>
     4532
     4533
     4534
     4535<tr>
     4536     <td valign="top">URL</td>
     4537     <td valign="top"><a href="http://dx.doi.org/10.1145/2089016.2089017">http://dx.doi.org/10.1145/2089016.2089017</a></td>
     4538</tr>
     4539
     4540
     4541</table></div><br><br>
     4542
     4543
     4544
     4545
     4546<a class="EntryGoto" id="Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant"></a>
     4547<b class="myheading" style="position: relative; left: 5%;">Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant</b>
     4548
     4549<div class="BibEntry">
     4550
     4551<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4552
     4553
     4554<tr>
     4555     <td valign="top">Author</td>
     4556     <td valign="top">Sharma, Navin and Gummeson, Jeremy and Irwin, David and Shenoy, Prashant</td>
     4557</tr>
     4558
     4559<tr>
     4560     <td valign="top">Title</td>
     4561     <td valign="top">Cloudy Computing: Leveraging Weather Forecasts in Energy Harvesting Sensor Systems</td>
     4562</tr>
     4563
     4564<tr>
     4565     <td valign="top">Booktitle</td>
     4566     <td valign="top">2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)</td>
     4567</tr>
     4568
     4569<tr>
     4570     <td valign="top">Location</td>
     4571     <td valign="top">Boston, MA, USA</td>
     4572</tr>
     4573
     4574<tr>
     4575     <td valign="top">Publisher</td>
     4576     <td valign="top">IEEE</td>
     4577</tr>
     4578
     4579<tr>
     4580     <td valign="top">Year</td>
     4581     <td valign="top">2010</td>
     4582</tr>
     4583
     4584<tr>
     4585     <td valign="top">Abstract</td>
     4586     <td valign="top">To sustain perpetual operation, systems that harvest environmental energy must carefully regulate their usage to satisfy their demand. Regulating energy usage is challenging if a system's demands are not elastic and its hardware components are not energy-proportional, since it cannot precisely scale its usage to match its supply. Instead, the system must choose when to satisfy its energy demands based on its current energy reserves and predictions of its future energy supply. In this paper, we explore the use of weather forecasts to improve a system's ability to satisfy demand by improving its predictions. We analyze weather forecast, observational, and energy harvesting data to formulate a model that translates a weather forecast to a wind or solar energy harvesting prediction, and quantify its accuracy. We evaluate our model for both energy sources in the context of two different energy harvesting sensor systems with inelastic demands: a sensor testbed that leases sensors to external users and a lexicographically fair sensor network that maintains steady node sensing rates. We show that using weather forecasts in both wind- and solar-powered sensor systems increases each system's ability to satisfy its demands compared with existing prediction strategies.</td>
     4587</tr>
     4588
     4589
     4590
     4591<tr>
     4592     <td valign="top">DOI</td>
     4593     <td valign="top">10.1109/SECON.2010.5508260</td>
     4594</tr>
     4595
     4596
     4597
     4598<tr>
     4599     <td valign="top">URL</td>
     4600     <td valign="top"><a href="http://dx.doi.org/10.1109/SECON.2010.5508260">http://dx.doi.org/10.1109/SECON.2010.5508260</a></td>
     4601</tr>
     4602
     4603
     4604</table></div><br><br>
     4605
     4606
     4607
     4608
     4609<a class="EntryGoto" id="Shen, Haiying and Liu, Guoxin"></a>
     4610<b class="myheading" style="position: relative; left: 5%;">Shen, Haiying and Liu, Guoxin</b>
     4611
     4612<div class="BibEntry">
     4613
     4614<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4615
     4616
     4617<tr>
     4618     <td valign="top">Author</td>
     4619     <td valign="top">Shen, Haiying and Liu, Guoxin</td>
     4620</tr>
     4621
     4622<tr>
     4623     <td valign="top">Title</td>
     4624     <td valign="top">Harmony: Integrated Resource and Reputation Management for Large-Scale Distributed Systems</td>
     4625</tr>
     4626
     4627<tr>
     4628     <td valign="top">Booktitle</td>
     4629     <td valign="top">2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)</td>
     4630</tr>
     4631
     4632<tr>
     4633     <td valign="top">Location</td>
     4634     <td valign="top">Lahaina, HI, USA</td>
     4635</tr>
     4636
     4637<tr>
     4638     <td valign="top">Publisher</td>
     4639     <td valign="top">IEEE</td>
     4640</tr>
     4641
     4642<tr>
     4643     <td valign="top">Year</td>
     4644     <td valign="top">2011</td>
     4645</tr>
     4646
     4647<tr>
     4648     <td valign="top">Abstract</td>
     4649     <td valign="top">Advancements in technology over the past decade are leading to a promising future for large-scale distributed systems, where globally-scattered distributed resources are collectively pooled and used in a cooperative manner to achieve unprecedented petascale supercomputing capabilities. The issues of resource management (resMgt) and reputation management (repMgt) need to be addressed in order to ensure the successful deployment of large-scale distributed systems. However, these two issues have typically been addressed separately, despite the significant interdependencies between them: resMgt needs repMgt to provide a cooperative environment for resource sharing, and in turn facilitates repMgt to evaluate multi-faceted node reputations for providing different resources. Current repMgt methods provide a single reputation value for each node in providing all types of resources. However, a node willing to provide one resource may not be willing to provide another resource. In addition, current repMgt methods often guide node selection policy to select the highest-reputed nodes, which may overload these nodes. Also, few works exploited node reputation in resource selection in order to fully and fairly utilize resources in the system and to meet users' diverse QoS demands. We propose a system called Harmony that integrates resMgt and repMgt in a harmonious manner. Harmony incorporates two key innovations: integrated multi-faceted resource/reputation management and multi-QoS-oriented resource selection. The trace data we collected from an online trading platform confirms the importance of multi-faceted reputation and potential problems with highest-reputed node selection. Trace-driven experiments performed on PlanetLab show that Harmony outperforms existing resMgt and repMgt in terms of the success rate, service delay, and efficiency.</td>
     4650</tr>
     4651
     4652
     4653
     4654<tr>
     4655     <td valign="top">DOI</td>
     4656     <td valign="top">10.1109/ICCCN.2011.6005739</td>
     4657</tr>
     4658
     4659
     4660
     4661<tr>
     4662     <td valign="top">URL</td>
     4663     <td valign="top"><a href="http://dx.doi.org/10.1109/ICCCN.2011.6005739">http://dx.doi.org/10.1109/ICCCN.2011.6005739</a></td>
     4664</tr>
     4665
     4666
     4667</table></div><br><br>
     4668
     4669
     4670
     4671
     4672<a class="EntryGoto" id="Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young"></a>
     4673<b class="myheading" style="position: relative; left: 5%;">Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young</b>
     4674
     4675<div class="BibEntry">
     4676
     4677<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4678
     4679
     4680<tr>
     4681     <td valign="top">Author</td>
     4682     <td valign="top">Shin, Sunae and Dhondge, Kaustubh and Choi, Baek-Young</td>
     4683</tr>
     4684
     4685<tr>
     4686     <td valign="top">Title</td>
     4687     <td valign="top">Understanding the Performance of TCP and UDP-based Data Transfer Protocols using EMULAB</td>
     4688</tr>
     4689
     4690<tr>
     4691     <td valign="top">Booktitle</td>
     4692     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     4693</tr>
     4694
     4695<tr>
     4696     <td valign="top">Location</td>
     4697     <td valign="top">Los Angeles</td>
     4698</tr>
     4699
     4700<tr>
     4701     <td valign="top">Year</td>
     4702     <td valign="top">2012</td>
     4703</tr>
     4704
     4705<tr>
     4706     <td valign="top">Abstract</td>
     4707     <td valign="top">In this paper, we present a hands-on course project that explores the performance of data transfer protocols using a GENI resource. TCP is one of the key topics in networking courses, and understanding its behavior as well as limitations, from real experiments, offers an invaluable and deep learning experience. A protocol's performance is directly impacted by network parameters such as network bandwidth, delay and loss. However, it is difficult to control and even vary those parameters, if it is not evaluated with simulations. GENI facilities conveniently provide a virtual laboratory that enables us to control the network settings with real network systems. Through this educational project, students had an opportunity to control important network parameters, and measure and compare TCP's performance with a UDP-based data transfer protocol, UDT, using EMULAB. Students were enthusiastic to witness the protocols' performances, and the limitations of TCP under a high bandwidth delay product network in the presence of packet loss, and to recognize the importance of protocol design and system issues for the future Internet.</td>
     4708</tr>
     4709
     4710
     4711
     4712
     4713
     4714
     4715</table></div><br><br>
     4716
     4717
     4718
     4719
     4720<a class="EntryGoto" id="Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay"></a>
     4721<b class="myheading" style="position: relative; left: 5%;">Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay</b>
     4722
     4723<div class="BibEntry">
     4724
     4725<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4726
     4727
     4728<tr>
     4729     <td valign="top">Author</td>
     4730     <td valign="top">Sivakumar, Ashiwan and Shankaranarayanan, P. N. and Rao, Sanjay</td>
     4731</tr>
     4732
     4733<tr>
     4734     <td valign="top">Title</td>
     4735     <td valign="top">Closer to the Cloud - A Case for Emulating Cloud Dynamics by Controlling the Environment</td>
     4736</tr>
     4737
     4738<tr>
     4739     <td valign="top">Booktitle</td>
     4740     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     4741</tr>
     4742
     4743<tr>
     4744     <td valign="top">Location</td>
     4745     <td valign="top">Los Angeles</td>
     4746</tr>
     4747
     4748<tr>
     4749     <td valign="top">Year</td>
     4750     <td valign="top">2012</td>
     4751</tr>
     4752
     4753
     4754
     4755
     4756
     4757
     4758</table></div><br><br>
     4759
     4760
     4761
     4762
     4763<a class="EntryGoto" id="Soroush, Hamed and Banerjee, Nilanjan and Corner, Mark and Levine, Brian and Lynn, Brian"></a>
     4764<b class="myheading" style="position: relative; left: 5%;">Soroush, Hamed and Banerjee, Nilanjan and Corner, Mark and Levine, Brian and Lynn, Brian</b>
     4765
     4766<div class="BibEntry">
     4767
     4768<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4769
     4770
     4771<tr>
     4772     <td valign="top">Author</td>
     4773     <td valign="top">Soroush, Hamed and Banerjee, Nilanjan and Corner, Mark and Levine, Brian and Lynn, Brian</td>
     4774</tr>
     4775
     4776<tr>
     4777     <td valign="top">Title</td>
     4778     <td valign="top">A retrospective look at the UMass DOME mobile testbed</td>
     4779</tr>
     4780
     4781<tr>
     4782     <td valign="top">Journal</td>
     4783     <td valign="top">SIGMOBILE Mob. Comput. Commun. Rev.</td>
     4784</tr>
     4785
     4786<tr>
     4787     <td valign="top">Publisher</td>
     4788     <td valign="top">ACM</td>
     4789</tr>
     4790
     4791<tr>
     4792     <td valign="top">Address</td>
     4793     <td valign="top">New York, NY, USA</td>
     4794</tr>
     4795
     4796<tr>
     4797     <td valign="top">Year</td>
     4798     <td valign="top">2012</td>
     4799</tr>
     4800
     4801<tr>
     4802     <td valign="top">Abstract</td>
     4803     <td valign="top">In this paper we describe the evolution of DOME, a diverse outdoor testbed for mobile experimentation. In addition, while highlighting the challenges faced in construction of DOME, we describe a concrete set of scientific results derived from this experience in a retrospective study. First, we argue that a broad range of mobility experiments could be performed in a testbed which provides the properties of temporal, technological, and spatial diversity. We demonstrate these properties in our testbed through analysis of data collected from DOME over a period of four years. Second, we crystallize a set of design principles that others should use when constructing testbeds of their own, including those related to deploying and managing a diverse testbed, distributing experiments remotely, and fostering collaborations among testbed stakeholders. Finally, using traces collected by DOME, we provide insights into several important problems in mobile systems research.</td>
     4804</tr>
     4805
     4806
     4807
     4808<tr>
     4809     <td valign="top">DOI</td>
     4810     <td valign="top">10.1145/2169077.2169079</td>
     4811</tr>
     4812
     4813
     4814
     4815<tr>
     4816     <td valign="top">URL</td>
     4817     <td valign="top"><a href="http://dx.doi.org/10.1145/2169077.2169079">http://dx.doi.org/10.1145/2169077.2169079</a></td>
     4818</tr>
     4819
     4820
     4821</table></div><br><br>
     4822
     4823
     4824
     4825
     4826<a class="EntryGoto" id="Sridharan, Mukundan and Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex"></a>
     4827<b class="myheading" style="position: relative; left: 5%;">Sridharan, Mukundan and Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex</b>
     4828
     4829<div class="BibEntry">
     4830
     4831<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4832
     4833
     4834<tr>
     4835     <td valign="top">Author</td>
     4836     <td valign="top">Sridharan, Mukundan and Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex</td>
     4837</tr>
     4838
     4839<tr>
     4840     <td valign="top">Title</td>
     4841     <td valign="top">Defragmentation of Resources in Virtual Desktop Clouds for Cost-Aware Utility-Optimal Allocation</td>
     4842</tr>
     4843
     4844<tr>
     4845     <td valign="top">Booktitle</td>
     4846     <td valign="top">2011 Fourth IEEE International Conference on Utility and Cloud Computing</td>
     4847</tr>
     4848
     4849<tr>
     4850     <td valign="top">Location</td>
     4851     <td valign="top">Melbourne, Australia</td>
     4852</tr>
     4853
     4854<tr>
     4855     <td valign="top">Publisher</td>
     4856     <td valign="top">IEEE</td>
     4857</tr>
     4858
     4859<tr>
     4860     <td valign="top">Year</td>
     4861     <td valign="top">2011</td>
     4862</tr>
     4863
     4864<tr>
     4865     <td valign="top">Abstract</td>
     4866     <td valign="top">Cloud Service Providers (CSPs) make virtual desktop cloud (VDC) resource provisioning decisions within desktop pools based on user groups and their application profiles. Such provisioning is aimed to satisfy acceptable user quality of experience (QoE) levels and is coupled with subsequent placement of VDs across distributed data centers. The placement decisions are influenced by session latency, load balancing and operation cost constraints. In this paper, we identify the resource fragmentation problem that occurs when placement is done opportunistically to minimize provisioning time and deliver satisfactory user QoE. To solve this problem, which inherently is an NP-Hard problem, we propose a defragmentation scheme that has fast convergence time and has three levels of complexity: (i) &#x75;&#x0308;tility fair provisioning&#x20;&#x0308;(UFP) to optimize resource provisioning within a data center - to achieve relative fairness between desktop pools, (ii) &#x73;&#x0308;tatic migration-free utility optimal placement and provisioning&#x20;&#x0308;(MUPP) to optimize resource provisioning between multiple data centers - to improve performance, and (iii) &#x64;&#x0308;ynamic global utility optimal placement and provisioning&#x20;&#x0308;(GUPP) to optimize resource provisioning using cost-aware and utility-maximal VD re-allocations and migrations - to increase scalability. We evaluate our defragmentation scheme against 'least latency', 'least load', and 'least cost' schemes using a novel &#x56;&#x0308;DC-Sim&#x20;&#x0308;simulator that we have developed in this study. Our simulations leverage profiles of user groups and their applications within desktop pools, obtained from a real VDC test bed. Our simulation results demonstrate that defragmentation is an important optimization step that can enable CSPs to achieve fairness, substantially improve user QoE and increase VDC scalability.</td>
     4867</tr>
     4868
     4869
     4870
     4871<tr>
     4872     <td valign="top">DOI</td>
     4873     <td valign="top">10.1109/UCC.2011.41</td>
     4874</tr>
     4875
     4876
     4877
     4878<tr>
     4879     <td valign="top">URL</td>
     4880     <td valign="top"><a href="http://dx.doi.org/10.1109/UCC.2011.41">http://dx.doi.org/10.1109/UCC.2011.41</a></td>
     4881</tr>
     4882
     4883
     4884</table></div><br><br>
     4885
     4886
     4887
     4888
     4889<a class="EntryGoto" id="Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish"></a>
     4890<b class="myheading" style="position: relative; left: 5%;">Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish</b>
     4891
     4892<div class="BibEntry">
     4893
     4894<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4895
     4896
     4897<tr>
     4898     <td valign="top">Author</td>
     4899     <td valign="top">Sridharan, Mukundan and Zeng, Wenjie and Leal, William and Ju, Xi and Ramanath, Rajiv and Zhang, Hongwei and Arora, Anish</td>
     4900</tr>
     4901
     4902<tr>
     4903     <td valign="top">Title</td>
     4904     <td valign="top">From Kansei to KanseiGenie: Architecture of Federated, Programmable Wireless Sensor Fabrics</td>
     4905</tr>
     4906
     4907<tr>
     4908     <td valign="top">Journal</td>
     4909     <td valign="top">Proceedings of the ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)</td>
     4910</tr>
     4911
     4912<tr>
     4913     <td valign="top">Year</td>
     4914     <td valign="top">2010</td>
     4915</tr>
     4916
     4917<tr>
     4918     <td valign="top">Abstract</td>
     4919     <td valign="top">This paper deals with challenges in federating wireless sensing fabrics. Federations of this sort are currently being developed in next generation global end-to-end experimentation infrastructures, such as GENI, to support rapid prototyping and hi-fidelity validation of protocols and applications. On one hand, federation should support access to diverse (and potentially provider-specific) wireless sensor resources and, on the other, it should enable users to uniformly task these resources. Instead of more simple basing federation upon a standard description of resources, we propose an architecture where the ontology of resource description can vary across providers, and a mapping of user needs to resources is performed to achieve uniform tasking. We illustrate one realization of this architecture, in terms of our refactoring the Kansei testbed to become the KanseiGenie federated fabric manager, which has full support for programmability, sliceability, and federated experimentation over heterogeneous sensing fabrics.</td>
     4920</tr>
     4921
     4922
     4923
     4924
     4925
     4926
     4927</table></div><br><br>
     4928
     4929
     4930
     4931
     4932<a class="EntryGoto" id="Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching"></a>
     4933<b class="myheading" style="position: relative; left: 5%;">Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching</b>
     4934
     4935<div class="BibEntry">
     4936
     4937<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4938
     4939
     4940<tr>
     4941     <td valign="top">Author</td>
     4942     <td valign="top">Stabler, Greg and Goasguen, Sebastien and Rosen, Aaron and Wang, Kuang-Ching</td>
     4943</tr>
     4944
     4945<tr>
     4946     <td valign="top">Title</td>
     4947     <td valign="top">OneCloud: Controlling the Network in an OpenFlow Cloud</td>
     4948</tr>
     4949
     4950<tr>
     4951     <td valign="top">Booktitle</td>
     4952     <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
     4953</tr>
     4954
     4955<tr>
     4956     <td valign="top">Location</td>
     4957     <td valign="top">Los Angeles</td>
     4958</tr>
     4959
     4960<tr>
     4961     <td valign="top">Year</td>
     4962     <td valign="top">2012</td>
     4963</tr>
     4964
     4965<tr>
     4966     <td valign="top">Abstract</td>
     4967     <td valign="top">Cloud computing is an emerging paradigm for on-demand access to computing resources over the network. Beyond early Software as a Service (SaaS) offerings, there is an increasing interest in the Infrastructure as a Service (IaaS) model where users request specific storage, networking, and computing resources to meet their application needs. To provision the network in a cloud, IaaS providers, such as the Amazon Web Services, allow users to choose their IP addresses, which can be associated with a dynamic set of virtual hosts (Elastic IP) with VPN, dynamic DNS, and dynamic firewall services. In this paper, we analyze a range of cloud network provisioning needs and the means to realize them in an OpenFlow network. We present an OpenFlow enabled framework for cloud network provisioning, based on the Open- Nebula cloud provisioning engine. Specifically, we demonstrate an Elastic IP service compatible with the Amazon Elastic Compute Cloud (EC2) API. This demonstration is available on the Clemson OneCloud IaaS offering. Ongoing efforts focus on the enablement of additional cloud network services for campus networks and wide area experimental networks like the National Science Foundation's GENI network.</td>
     4968</tr>
     4969
     4970
     4971
     4972
     4973
     4974
     4975</table></div><br><br>
     4976
     4977
     4978
     4979
     4980<a class="EntryGoto" id="Stabler, Greg and Rosen, Aaron and Goasguen, Sebastien and Wang, Kuang-Ching"></a>
     4981<b class="myheading" style="position: relative; left: 5%;">Stabler, Greg and Rosen, Aaron and Goasguen, Sebastien and Wang, Kuang-Ching</b>
     4982
     4983<div class="BibEntry">
     4984
     4985<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     4986
     4987
     4988<tr>
     4989     <td valign="top">Author</td>
     4990     <td valign="top">Stabler, Greg and Rosen, Aaron and Goasguen, Sebastien and Wang, Kuang-Ching</td>
     4991</tr>
     4992
     4993<tr>
     4994     <td valign="top">Title</td>
     4995     <td valign="top">Elastic IP and security groups implementation using OpenFlow</td>
     4996</tr>
     4997
     4998<tr>
     4999     <td valign="top">Booktitle</td>
     5000     <td valign="top">Proceedings of the 6th international workshop on Virtualization Technologies in Distributed Computing Date</td>
     5001</tr>
     5002
     5003<tr>
     5004     <td valign="top">Location</td>
     5005     <td valign="top">Delft, The Netherlands</td>
     5006</tr>
     5007
     5008<tr>
     5009     <td valign="top">Publisher</td>
     5010     <td valign="top">ACM</td>
     5011</tr>
     5012
     5013<tr>
     5014     <td valign="top">Address</td>
     5015     <td valign="top">New York, NY, USA</td>
     5016</tr>
     5017
     5018<tr>
     5019     <td valign="top">Year</td>
     5020     <td valign="top">2012</td>
     5021</tr>
     5022
     5023
     5024
     5025<tr>
     5026     <td valign="top">DOI</td>
     5027     <td valign="top">10.1145/2287056.2287069</td>
     5028</tr>
     5029
     5030
     5031
     5032<tr>
     5033     <td valign="top">URL</td>
     5034     <td valign="top"><a href="http://doi.acm.org/10.1145/2287056.2287069">http://doi.acm.org/10.1145/2287056.2287069</a></td>
     5035</tr>
     5036
     5037
     5038</table></div><br><br>
     5039
     5040
     5041
     5042
     5043<a class="EntryGoto" id="Sterbenz, J. P. G. and Egemen and Hameed, M. A. and Jabbar, A. and Rohrer, J. P."></a>
     5044<b class="myheading" style="position: relative; left: 5%;">Sterbenz, J. P. G. and Egemen and Hameed, M. A. and Jabbar, A. and Rohrer, J. P.</b>
     5045
     5046<div class="BibEntry">
     5047
     5048<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5049
     5050
     5051<tr>
     5052     <td valign="top">Author</td>
     5053     <td valign="top">Sterbenz, J. P. G. and Egemen and Hameed, M. A. and Jabbar, A. and Rohrer, J. P.</td>
     5054</tr>
     5055
     5056<tr>
     5057     <td valign="top">Title</td>
     5058     <td valign="top">Modelling and analysis of network resilience</td>
     5059</tr>
     5060
     5061<tr>
     5062     <td valign="top">Booktitle</td>
     5063     <td valign="top">2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)</td>
     5064</tr>
     5065
     5066<tr>
     5067     <td valign="top">Location</td>
     5068     <td valign="top">Bangalore</td>
     5069</tr>
     5070
     5071<tr>
     5072     <td valign="top">Publisher</td>
     5073     <td valign="top">IEEE</td>
     5074</tr>
     5075
     5076<tr>
     5077     <td valign="top">Year</td>
     5078     <td valign="top">2011</td>
     5079</tr>
     5080
     5081<tr>
     5082     <td valign="top">Abstract</td>
     5083     <td valign="top">As the Internet becomes increasingly important to all aspects of society, the consequences of disruption become increasingly severe. Thus it is critical to increase the resilience and survivability of the future network. We define resilience as the ability of the network to provide desired service even when challenged by attacks, large-scale disasters, and other failures. This paper describes a comprehensive methodology to evaluate network resilience using a combination of analytical and simulation techniques with the goal of improving the resilience and survivability of the Future Internet.</td>
     5084</tr>
     5085
     5086
     5087
     5088<tr>
     5089     <td valign="top">DOI</td>
     5090     <td valign="top">10.1109/COMSNETS.2011.5716502</td>
     5091</tr>
     5092
     5093
     5094
     5095<tr>
     5096     <td valign="top">URL</td>
     5097     <td valign="top"><a href="http://dx.doi.org/10.1109/COMSNETS.2011.5716502">http://dx.doi.org/10.1109/COMSNETS.2011.5716502</a></td>
     5098</tr>
     5099
     5100
     5101</table></div><br><br>
     5102
     5103
     5104
     5105
     5106<a class="EntryGoto" id="Sterbenz, James P. G. and &#x43;&#x0327;etinkaya, Egemen K. and Hameed, Mahmood A. and Jabbar, Abdul and Qian, Shi and Rohrer, Justin P."></a>
     5107<b class="myheading" style="position: relative; left: 5%;">Sterbenz, James P. G. and &#x43;&#x0327;etinkaya, Egemen K. and Hameed, Mahmood A. and Jabbar, Abdul and Qian, Shi and Rohrer, Justin P.</b>
     5108
     5109<div class="BibEntry">
     5110
     5111<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5112
     5113
     5114<tr>
     5115     <td valign="top">Author</td>
     5116     <td valign="top">Sterbenz, James P. G. and &#x43;&#x0327;etinkaya, Egemen K. and Hameed, Mahmood A. and Jabbar, Abdul and Qian, Shi and Rohrer, Justin P.</td>
     5117</tr>
     5118
     5119<tr>
     5120     <td valign="top">Title</td>
     5121     <td valign="top">Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation</td>
     5122</tr>
     5123
     5124<tr>
     5125     <td valign="top">Journal</td>
     5126     <td valign="top">Telecommunication Systems</td>
     5127</tr>
     5128
     5129<tr>
     5130     <td valign="top">Publisher</td>
     5131     <td valign="top">Springer Netherlands</td>
     5132</tr>
     5133
     5134<tr>
     5135     <td valign="top">Year</td>
     5136     <td valign="top">2011</td>
     5137</tr>
     5138
     5139<tr>
     5140     <td valign="top">Abstract</td>
     5141     <td valign="top">As the Internet becomes increasingly important to all aspects of society, the consequences of disruption become increasingly severe. Thus it is critical to increase the resilience and survivability of future networks. We define resilience as the ability of the network to provide desired service even when challenged by attacks, large-scale disasters, and other failures. This paper describes a comprehensive methodology to evaluate network resilience using a combination of topology generation, analytical, simulation, and experimental emulation techniques with the goal of improving the resilience and survivability of the Future Internet.</td>
     5142</tr>
     5143
     5144
     5145
     5146<tr>
     5147     <td valign="top">DOI</td>
     5148     <td valign="top">10.1007/s11235-011-9573-6</td>
     5149</tr>
     5150
     5151
     5152
     5153<tr>
     5154     <td valign="top">URL</td>
     5155     <td valign="top"><a href="http://dx.doi.org/10.1007/s11235-011-9573-6">http://dx.doi.org/10.1007/s11235-011-9573-6</a></td>
     5156</tr>
     5157
     5158
     5159</table></div><br><br>
     5160
     5161
     5162
     5163
     5164<a class="EntryGoto" id="Sydney, A. and Nutaro, J. and Scoglio, C. and Gruenbacher, D. and Schulz, N."></a>
     5165<b class="myheading" style="position: relative; left: 5%;">Sydney, A. and Nutaro, J. and Scoglio, C. and Gruenbacher, D. and Schulz, N.</b>
     5166
     5167<div class="BibEntry">
     5168
     5169<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5170
     5171
     5172<tr>
     5173     <td valign="top">Author</td>
     5174     <td valign="top">Sydney, A. and Nutaro, J. and Scoglio, C. and Gruenbacher, D. and Schulz, N.</td>
     5175</tr>
     5176
     5177<tr>
     5178     <td valign="top">Title</td>
     5179     <td valign="top">Simulative Comparison of Multiprotocol Label Switching and OpenFlow Network Technologies for Transmission Operations</td>
     5180</tr>
     5181
     5182<tr>
     5183     <td valign="top">Journal</td>
     5184     <td valign="top">Smart Grid, IEEE Transactions on</td>
     5185</tr>
     5186
     5187<tr>
     5188     <td valign="top">Year</td>
     5189     <td valign="top">2013</td>
     5190</tr>
     5191
     5192
     5193
     5194<tr>
     5195     <td valign="top">DOI</td>
     5196     <td valign="top">10.1109/TSG.2012.2227516</td>
     5197</tr>
     5198
     5199
     5200
     5201<tr>
     5202     <td valign="top">URL</td>
     5203     <td valign="top"><a href="http://dx.doi.org/10.1109/TSG.2012.2227516">http://dx.doi.org/10.1109/TSG.2012.2227516</a></td>
     5204</tr>
     5205
     5206
     5207</table></div><br><br>
     5208
     5209
     5210
     5211
     5212<a class="EntryGoto" id="Sydney, Ali"></a>
     5213<b class="myheading" style="position: relative; left: 5%;">Sydney, Ali</b>
     5214
     5215<div class="BibEntry">
     5216
     5217<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5218
     5219
     5220<tr>
     5221     <td valign="top">Author</td>
     5222     <td valign="top">Sydney, Ali</td>
     5223</tr>
     5224
     5225<tr>
     5226     <td valign="top">Title</td>
     5227     <td valign="top">The evaluation of software defined networking for communication and control of cyber physical systems</td>
     5228</tr>
     5229
     5230<tr>
     5231     <td valign="top">Year</td>
     5232     <td valign="top">2013</td>
     5233</tr>
     5234
     5235
     5236
     5237
     5238
     5239<tr>
     5240     <td valign="top">URL</td>
     5241     <td valign="top"><a href="http://hdl.handle.net/2097/15577">http://hdl.handle.net/2097/15577</a></td>
     5242</tr>
     5243
     5244
     5245</table></div><br><br>
     5246
     5247
     5248
     5249
     5250<a class="EntryGoto" id="Teerapittayanon, Surat and Fouli, Kerim and M&#x65;&#x0301;dard, Muriel and Montpetit, Marie-Jos&#x65;&#x0301; and Shi, Xiaomeng and Seskar, Ivan and Gosain, Abhimanyu"></a>
     5251<b class="myheading" style="position: relative; left: 5%;">Teerapittayanon, Surat and Fouli, Kerim and M&#x65;&#x0301;dard, Muriel and Montpetit, Marie-Jos&#x65;&#x0301; and Shi, Xiaomeng and Seskar, Ivan and Gosain, Abhimanyu</b>
     5252
     5253<div class="BibEntry">
     5254
     5255<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5256
     5257
     5258<tr>
     5259     <td valign="top">Author</td>
     5260     <td valign="top">Teerapittayanon, Surat and Fouli, Kerim and M&#x65;&#x0301;dard, Muriel and Montpetit, Marie-Jos&#x65;&#x0301; and Shi, Xiaomeng and Seskar, Ivan and Gosain, Abhimanyu</td>
     5261</tr>
     5262
     5263<tr>
     5264     <td valign="top">Title</td>
     5265     <td valign="top">Network Coding as a WiMAX Link Reliability Mechanism</td>
     5266</tr>
     5267
     5268<tr>
     5269     <td valign="top">Booktitle</td>
     5270     <td valign="top">Multiple Access Communications</td>
     5271</tr>
     5272
     5273<tr>
     5274     <td valign="top">Publisher</td>
     5275     <td valign="top">Springer Berlin Heidelberg</td>
     5276</tr>
     5277
     5278<tr>
     5279     <td valign="top">Year</td>
     5280     <td valign="top">2012</td>
     5281</tr>
     5282
     5283<tr>
     5284     <td valign="top">Abstract</td>
     5285     <td valign="top">We design and implement a network-coding-enabled relia- bility architecture for next generation wireless networks. Our network coding (NC) architecture uses a flexible thread-based design, with each encoder-decoder instance applying systematic intra-session random lin- ear network coding as a packet erasure code at the IP layer. Using GENI WiMAX platforms, a series of point-to-point transmission experiments were conducted to compare the performance of the NC architecture to that of the Automatic Repeated reQuest (ARQ) and Hybrid ARQ (HARQ) mechanisms. In our scenarios, the proposed architecture is able to decrease packet loss from around 11-32&#x0025; to nearly 0&#x0025;; compared to HARQ and joint HARQ/ARQ mechanisms, the NC architecture offers up to 5.9 times gain in throughput and 5.5 times reduction in end-to- end file transfer delay. By establishing NC as a potential substitute for HARQ/ARQ, our experiments offer important insights into cross-layer designs of next generation wireless networks.</td>
     5286</tr>
     5287
     5288
     5289
     5290<tr>
     5291     <td valign="top">DOI</td>
     5292     <td valign="top">10.1007/978-3-642-34976-8&#x005F;1</td>
     5293</tr>
     5294
     5295
     5296
     5297<tr>
     5298     <td valign="top">URL</td>
     5299     <td valign="top"><a href="http://dx.doi.org/10.1007/978-3-642-34976-8&#x005F;1">http://dx.doi.org/10.1007/978-3-642-34976-8&#x005F;1</a></td>
     5300</tr>
     5301
     5302
     5303</table></div><br><br>
     5304
     5305
     5306
     5307
     5308<a class="EntryGoto" id="Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark"></a>
     5309<b class="myheading" style="position: relative; left: 5%;">Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark</b>
     5310
     5311<div class="BibEntry">
     5312
     5313<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5314
     5315
     5316<tr>
     5317     <td valign="top">Author</td>
     5318     <td valign="top">Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark</td>
     5319</tr>
     5320
     5321<tr>
     5322     <td valign="top">Title</td>
     5323     <td valign="top">A Passive Measurement System for Network Testbeds</td>
     5324</tr>
     5325
     5326<tr>
     5327     <td valign="top">Booktitle</td>
     5328     <td valign="top">8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2012)</td>
     5329</tr>
     5330
     5331<tr>
     5332     <td valign="top">Year</td>
     5333     <td valign="top">2012</td>
     5334</tr>
     5335
     5336<tr>
     5337     <td valign="top">Abstract</td>
     5338     <td valign="top">The ability to capture and process packet-level data is of intrinsic importance in network testbeds that offer broad experimental capabilities to researchers. In this paper we describe the design and implementation of a passive measurement system for network testbeds called GIMS. The system enables users to specify and centrally manage packet capture on a set of dedicated measurement nodes deployed on links in a distributed testbed. The first component of GIMS is a scalable experiment management system that coordinates multi-tenant access to measurement nodes through a web-based user interface. The second component of GIMS is a node management system that enables \\\\em (i) local processing on packets (\\\\em e.g., flow aggregation and sampling), \\\\em (ii) meta-data to be added to captured packets (\\\\em e.g., timestamps), \\\\em (iii) packet anonymization per local security policy, and \\\\em (iv) flexible data storage including transfer to remote archives. We demonstrate the capabilities of GIMS through a set of micro-benchmarks that specifically highlight the performance of the node management system deployed on a commodity workstation. Our implementations are openly available to the community and our development efforts are on-going.</td>
     5339</tr>
     5340
     5341
     5342
     5343
     5344
     5345
     5346</table></div><br><br>
     5347
     5348
     5349
     5350
     5351<a class="EntryGoto" id="Tiako, Pierre F."></a>
     5352<b class="myheading" style="position: relative; left: 5%;">Tiako, Pierre F.</b>
     5353
     5354<div class="BibEntry">
     5355
     5356<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5357
     5358
     5359<tr>
     5360     <td valign="top">Author</td>
     5361     <td valign="top">Tiako, Pierre F.</td>
     5362</tr>
     5363
     5364<tr>
     5365     <td valign="top">Title</td>
     5366     <td valign="top">Perspectives of delegation in team-based distributed software development over the GENI infrastructure (NIER track)</td>
     5367</tr>
     5368
     5369<tr>
     5370     <td valign="top">Booktitle</td>
     5371     <td valign="top">Proceedings of the 33rd International Conference on Software Engineering</td>
     5372</tr>
     5373
     5374<tr>
     5375     <td valign="top">Location</td>
     5376     <td valign="top">Waikiki, Honolulu, HI, USA</td>
     5377</tr>
     5378
     5379<tr>
     5380     <td valign="top">Publisher</td>
     5381     <td valign="top">ACM</td>
     5382</tr>
     5383
     5384<tr>
     5385     <td valign="top">Address</td>
     5386     <td valign="top">New York, NY, USA</td>
     5387</tr>
     5388
     5389<tr>
     5390     <td valign="top">Year</td>
     5391     <td valign="top">2011</td>
     5392</tr>
     5393
     5394<tr>
     5395     <td valign="top">Abstract</td>
     5396     <td valign="top">Team-based distributed software development (TBDSD) is one of the single biggest challenges facing software companies. The need to manage development efforts and resources in different locations increase the complexity and cost of modern day software development. Current software development environments do not provide suitable support to delegate task among teams with appropriate directives. TBDSD is also limited to the current internet capabilities. One of the resulting problems is the difficulty to delegate and control tasks assigned among remote teams. This paper proposes (1) a new framework for delegation in TBDSD, and (2) perspectives for deploying Process-centered Software Engineering Environments (PSEE) over the Global Environment for Network Innovations (GENI) infrastructure. GENI, the 'future Internet' that is taking shape in prototypes across the US, will allow, in the context of our study, to securely access and share software artifacts, resources, and tools as never before seen over the current Internet.</td>
     5397</tr>
     5398
     5399
     5400
     5401<tr>
     5402     <td valign="top">DOI</td>
     5403     <td valign="top">10.1145/1985793.1985905</td>
     5404</tr>
     5405
     5406
     5407
     5408<tr>
     5409     <td valign="top">URL</td>
     5410     <td valign="top"><a href="http://dx.doi.org/10.1145/1985793.1985905">http://dx.doi.org/10.1145/1985793.1985905</a></td>
     5411</tr>
     5412
     5413
     5414</table></div><br><br>
     5415
     5416
     5417
     5418
     5419<a class="EntryGoto" id="Tredger, Stephen and Zhuang, Yanyan and Matthews, Chris and Short-Gershman, Jesse and Coady, Rick"></a>
     5420<b class="myheading" style="position: relative; left: 5%;">Tredger, Stephen and Zhuang, Yanyan and Matthews, Chris and Short-Gershman, Jesse and Coady, Rick</b>
     5421
     5422<div class="BibEntry">
     5423
     5424<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5425
     5426
     5427<tr>
     5428     <td valign="top">Author</td>
     5429     <td valign="top">Tredger, Stephen and Zhuang, Yanyan and Matthews, Chris and Short-Gershman, Jesse and Coady, Rick</td>
     5430</tr>
     5431
     5432<tr>
     5433     <td valign="top">Title</td>
     5434     <td valign="top">Building Green Systems with Green Students: An Educational Experiment with GENI Infrastructure</td>
     5435</tr>
     5436
     5437<tr>
     5438     <td valign="top">Booktitle</td>
     5439     <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
     5440</tr>
     5441
     5442<tr>
     5443     <td valign="top">Location</td>
     5444     <td valign="top">Salt Lake City, UT</td>
     5445</tr>
     5446
     5447<tr>
     5448     <td valign="top">Publisher</td>
     5449     <td valign="top">IEEE</td>
     5450</tr>
     5451
     5452<tr>
     5453     <td valign="top">Year</td>
     5454     <td valign="top">2013</td>
     5455</tr>
     5456
     5457
     5458
     5459
     5460
     5461
     5462</table></div><br><br>
     5463
     5464
     5465
     5466
     5467<a class="EntryGoto" id="Tuncer, Hasan and Nozaki, Yoshihiro and Shenoy, Nirmala"></a>
     5468<b class="myheading" style="position: relative; left: 5%;">Tuncer, Hasan and Nozaki, Yoshihiro and Shenoy, Nirmala</b>
     5469
     5470<div class="BibEntry">
     5471
     5472<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5473
     5474
     5475<tr>
     5476     <td valign="top">Author</td>
     5477     <td valign="top">Tuncer, Hasan and Nozaki, Yoshihiro and Shenoy, Nirmala</td>
     5478</tr>
     5479
     5480<tr>
     5481     <td valign="top">Title</td>
     5482     <td valign="top">Virtual Mobility Domains - A Mobility Architecture for the Future Internet</td>
     5483</tr>
     5484
     5485<tr>
     5486     <td valign="top">Booktitle</td>
     5487     <td valign="top">IEEE International Conference on Commnunications (IEE ICC 2012) Symposium on Next-Generation Networking</td>
     5488</tr>
     5489
     5490<tr>
     5491     <td valign="top">Year</td>
     5492     <td valign="top">2012</td>
     5493</tr>
     5494
     5495<tr>
     5496     <td valign="top">Abstract</td>
     5497     <td valign="top">This paper presents a novel mobility architecture called Virtual Mobility Domains that is designed to work with the Floating Cloud Tiered Internetworking model. Virtual Mobility Domains supports both inter Autonomous System (macro) and intra Autonomous System (micro) mobility by leveraging a tiered addressing, a network cloud concept, and a unique packet forwarding scheme introduced by the Floating Cloud Tiered Internetworking model. The proposed mobility architecture is distinct from others by not using IP addressing and classic routing protocols, and deploying user-centric overlapping mobility domains. The comparative simulation study of Virtual Mobility Domains against Mobile IPv6, Hierarchical Mobile IPv6, and Proxy Mobile IPv6 using OPNET shows that Virtual Mobility Domains brings lower latency, lesser signaling overhead, and fewer packets loss during handoffs, specially during inter Autonomous System roaming. The results highlight the potential for a seamless mobility management.</td>
     5498</tr>
     5499
     5500
     5501
     5502<tr>
     5503     <td valign="top">DOI</td>
     5504     <td valign="top">10.1109/ICC.2012.6363872</td>
     5505</tr>
     5506
     5507
     5508
     5509<tr>
     5510     <td valign="top">URL</td>
     5511     <td valign="top"><a href="ftp://lesc.det.unifi.it/pub/LenLar/proceedings/2012/ICC2012/symposia/papers/virtual&#x005F;mobility&#x005F;domains&#x005F;-&#x005F;a&#x005F;mobility&#x005F;architecture&#x005F;for&#x005F;the&#x005F;\\_.pdf">ftp://lesc.det.unifi.it/pub/LenLar/proceedings/2012/ICC2012/symposia/papers/virtual&#x005F;mobility&#x005F;domains&#x005F;-&#x005F;a&#x005F;mobility&#x005F;architecture&#x005F;for&#x005F;the&#x005F;\\_.pdf</a></td>
     5512</tr>
     5513
     5514
     5515</table></div><br><br>
     5516
     5517
     5518
     5519
     5520<a class="EntryGoto" id="Turner, Jonathan S."></a>
     5521<b class="myheading" style="position: relative; left: 5%;">Turner, Jonathan S.</b>
     5522
     5523<div class="BibEntry">
     5524
     5525<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5526
     5527
     5528<tr>
     5529     <td valign="top">Author</td>
     5530     <td valign="top">Turner, Jonathan S.</td>
     5531</tr>
     5532
     5533<tr>
     5534     <td valign="top">Title</td>
     5535     <td valign="top">A proposed architecture for the GENI backbone platform</td>
     5536</tr>
     5537
     5538<tr>
     5539     <td valign="top">Booktitle</td>
     5540     <td valign="top">Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems</td>
     5541</tr>
     5542
     5543<tr>
     5544     <td valign="top">Location</td>
     5545     <td valign="top">San Jose, California, USA</td>
     5546</tr>
     5547
     5548<tr>
     5549     <td valign="top">Publisher</td>
     5550     <td valign="top">ACM</td>
     5551</tr>
     5552
     5553<tr>
     5554     <td valign="top">Address</td>
     5555     <td valign="top">New York, NY, USA</td>
     5556</tr>
     5557
     5558<tr>
     5559     <td valign="top">Year</td>
     5560     <td valign="top">2006</td>
     5561</tr>
     5562
     5563<tr>
     5564     <td valign="top">Abstract</td>
     5565     <td valign="top">The GENI Project (Global Environment for Network Innovation) is a major NSF-sponsored initiative that seeks to create a national research facility to enable experimental deployment of innovative new network architectures on a sufficient scale to enable realistic evaluation. One key component of the GENI system will be the GENI Backbone Platform (GBP) that provides the resources needed to allow multiple experimental networks to co-exist within the shared GENI infrastructure. This paper reviews the objectives for the GBP, the key issues that affect its design and develops a reference architecture that provides a concrete example for how the objectives can be met, using commercially available subsystems.</td>
     5566</tr>
     5567
     5568
     5569
     5570<tr>
     5571     <td valign="top">DOI</td>
     5572     <td valign="top">10.1145/1185347.1185349</td>
     5573</tr>
     5574
     5575
     5576
     5577<tr>
     5578     <td valign="top">URL</td>
     5579     <td valign="top"><a href="http://dx.doi.org/10.1145/1185347.1185349">http://dx.doi.org/10.1145/1185347.1185349</a></td>
     5580</tr>
     5581
     5582
     5583</table></div><br><br>
     5584
     5585
     5586
     5587
     5588<a class="EntryGoto" id="Turner, Jonathan S. and Crowley, Patrick and DeHart, John and Freestone, Amy and Heller, Brandon and Kuhns, Fred and Kumar, Sailesh and Lockwood, John and Lu, Jing and Wilson, Michael and Wiseman, Charles and Zar, David"></a>
     5589<b class="myheading" style="position: relative; left: 5%;">Turner, Jonathan S. and Crowley, Patrick and DeHart, John and Freestone, Amy and Heller, Brandon and Kuhns, Fred and Kumar, Sailesh and Lockwood, John and Lu, Jing and Wilson, Michael and Wiseman, Charles and Zar, David</b>
     5590
     5591<div class="BibEntry">
     5592
     5593<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5594
     5595
     5596<tr>
     5597     <td valign="top">Author</td>
     5598     <td valign="top">Turner, Jonathan S. and Crowley, Patrick and DeHart, John and Freestone, Amy and Heller, Brandon and Kuhns, Fred and Kumar, Sailesh and Lockwood, John and Lu, Jing and Wilson, Michael and Wiseman, Charles and Zar, David</td>
     5599</tr>
     5600
     5601<tr>
     5602     <td valign="top">Title</td>
     5603     <td valign="top">Supercharging planetlab: a high performance, multi-application, overlay network platform</td>
     5604</tr>
     5605
     5606<tr>
     5607     <td valign="top">Journal</td>
     5608     <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
     5609</tr>
     5610
     5611<tr>
     5612     <td valign="top">Publisher</td>
     5613     <td valign="top">ACM</td>
     5614</tr>
     5615
     5616<tr>
     5617     <td valign="top">Address</td>
     5618     <td valign="top">New York, NY, USA</td>
     5619</tr>
     5620
     5621<tr>
     5622     <td valign="top">Year</td>
     5623     <td valign="top">2007</td>
     5624</tr>
     5625
     5626<tr>
     5627     <td valign="top">Abstract</td>
     5628     <td valign="top">In recent years, overlay networks have become an important vehicle for delivering Internet applications. Overlay network nodes are typically implemented using general purpose servers or clusters. We investigate the performance benefits of more integrated architectures, combining general-purpose servers with high performance Network Processor (NP) subsystems. We focus on PlanetLab as our experimental context and report on the design and evaluation of an experimental PlanetLab platform capable of much higher levels of performance than typical system configurations. To make it easier for users to port applications, the system supports a fast path/slow path application structure that facilitates the mapping of the most performance-critical parts of an application onto an NP subsystem, while allowing the more complex control and exception-handling to be implemented within the programmer-friendly environment provided by conventional servers. We report on implementations of two sample applications, an IPv4 router, and a forwarding application for the Internet Indirection Infrastructure. We demonstrate an 80x improvement in packet processing rates and comparable reductions in latency.</td>
     5629</tr>
     5630
     5631
     5632
     5633<tr>
     5634     <td valign="top">DOI</td>
     5635     <td valign="top">10.1145/1282427.1282391</td>
     5636</tr>
     5637
     5638
     5639
     5640<tr>
     5641     <td valign="top">URL</td>
     5642     <td valign="top"><a href="http://dx.doi.org/10.1145/1282427.1282391">http://dx.doi.org/10.1145/1282427.1282391</a></td>
     5643</tr>
     5644
     5645
     5646</table></div><br><br>
     5647
     5648
     5649
     5650
     5651<a class="EntryGoto" id="Valancius, Vytautas and Feamster, Nick"></a>
     5652<b class="myheading" style="position: relative; left: 5%;">Valancius, Vytautas and Feamster, Nick</b>
     5653
     5654<div class="BibEntry">
     5655
     5656<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5657
     5658
     5659<tr>
     5660     <td valign="top">Author</td>
     5661     <td valign="top">Valancius, Vytautas and Feamster, Nick</td>
     5662</tr>
     5663
     5664<tr>
     5665     <td valign="top">Title</td>
     5666     <td valign="top">Multiplexing BGP sessions with BGP-Mux</td>
     5667</tr>
     5668
     5669<tr>
     5670     <td valign="top">Booktitle</td>
     5671     <td valign="top">Proceedings of the 2007 ACM CoNEXT conference</td>
     5672</tr>
     5673
     5674<tr>
     5675     <td valign="top">Location</td>
     5676     <td valign="top">New York, New York</td>
     5677</tr>
     5678
     5679<tr>
     5680     <td valign="top">Publisher</td>
     5681     <td valign="top">ACM</td>
     5682</tr>
     5683
     5684<tr>
     5685     <td valign="top">Address</td>
     5686     <td valign="top">New York, NY, USA</td>
     5687</tr>
     5688
     5689<tr>
     5690     <td valign="top">Year</td>
     5691     <td valign="top">2007</td>
     5692</tr>
     5693
     5694<tr>
     5695     <td valign="top">Abstract</td>
     5696     <td valign="top">This paper describes a BGP-session multiplexer called BGP-Mux, which provides stable, on-demand access to global BGP route feeds. This gateway allows arbitrary and even transient client BGP connections to be provisioned and torn down on demand without affecting globally visible BGP sessions. BGP-Mux provides two capabilities: (1) the ability for a client network to receive multiple unfiltered routes per destination from a set of upstream ASes; and (2) the ability to provision BGP sessions without introducing global instability. Several applications could benefit from these features:</td>
     5697</tr>
     5698
     5699
     5700
     5701<tr>
     5702     <td valign="top">DOI</td>
     5703     <td valign="top">10.1145/1364654.1364707</td>
     5704</tr>
     5705
     5706
     5707
     5708<tr>
     5709     <td valign="top">URL</td>
     5710     <td valign="top"><a href="http://dx.doi.org/10.1145/1364654.1364707">http://dx.doi.org/10.1145/1364654.1364707</a></td>
     5711</tr>
     5712
     5713
     5714</table></div><br><br>
     5715
     5716
     5717
     5718
     5719<a class="EntryGoto" id="Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao, Akihiro"></a>
     5720<b class="myheading" style="position: relative; left: 5%;">Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao, Akihiro</b>
     5721
     5722<div class="BibEntry">
     5723
     5724<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5725
     5726
     5727<tr>
     5728     <td valign="top">Author</td>
     5729     <td valign="top">Valancius, Vytautas and Feamster, Nick and Rexford, Jennifer and Nakao, Akihiro</td>
     5730</tr>
     5731
     5732<tr>
     5733     <td valign="top">Title</td>
     5734     <td valign="top">Wide-area route control for distributed services</td>
     5735</tr>
     5736
     5737<tr>
     5738     <td valign="top">Booktitle</td>
     5739     <td valign="top">Proceedings of the 2010 USENIX conference on USENIX annual technical conference</td>
     5740</tr>
     5741
     5742<tr>
     5743     <td valign="top">Location</td>
     5744     <td valign="top">Boston, MA</td>
     5745</tr>
     5746
     5747<tr>
     5748     <td valign="top">Publisher</td>
     5749     <td valign="top">USENIX Association</td>
     5750</tr>
     5751
     5752<tr>
     5753     <td valign="top">Address</td>
     5754     <td valign="top">Berkeley, CA, USA</td>
     5755</tr>
     5756
     5757<tr>
     5758     <td valign="top">Year</td>
     5759     <td valign="top">2010</td>
     5760</tr>
     5761
     5762<tr>
     5763     <td valign="top">Abstract</td>
     5764     <td valign="top">Many distributed services would benefit from control over the flow of traffic to and from their users, to offer better performance and higher reliability at a reasonable cost. Unfortunately, although today's cloud-computing platforms offer elastic computing and bandwidth resources, they do not give services control over wide-area routing. We propose replacing the data center's border router with a Transit Portal (TP) that gives each service the illusion of direct connectivity to upstream ISPs, without requiring each service to deploy hardware, acquire IP address space, or negotiate contracts with ISPs. Our TP prototype supports many layer-two connectivity mechanisms, amortizes memory and message overhead over multiple services, and protects the rest of the Internet from misconfigured and malicious applications. Our implementation extends and synthesizes open-source software components such as the Linux kernel and the Quagga routing daemon. We also implement a management plane based on the GENI control framework and couple this with our four-site TP deployment and Amazon EC2 facilities. Experiments with an anycast DNS application demonstrate the benefits the TP offers to distributed services.</td>
     5765</tr>
     5766
     5767
     5768
     5769
     5770
     5771<tr>
     5772     <td valign="top">URL</td>
     5773     <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=1855842">http://portal.acm.org/citation.cfm?id=1855842</a></td>
     5774</tr>
     5775
     5776
     5777</table></div><br><br>
     5778
     5779
     5780
     5781
     5782<a class="EntryGoto" id="Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick"></a>
     5783<b class="myheading" style="position: relative; left: 5%;">Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick</b>
     5784
     5785<div class="BibEntry">
     5786
     5787<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5788
     5789
     5790<tr>
     5791     <td valign="top">Author</td>
     5792     <td valign="top">Valancius, Vytautas and Kim, Hyojoon and Feamster, Nick</td>
     5793</tr>
     5794
     5795<tr>
     5796     <td valign="top">Title</td>
     5797     <td valign="top">Transit portal: BGP connectivity as a service</td>
     5798</tr>
     5799
     5800<tr>
     5801     <td valign="top">Journal</td>
     5802     <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
     5803</tr>
     5804
     5805<tr>
     5806     <td valign="top">Publisher</td>
     5807     <td valign="top">ACM</td>
     5808</tr>
     5809
     5810<tr>
     5811     <td valign="top">Address</td>
     5812     <td valign="top">New York, NY, USA</td>
     5813</tr>
     5814
     5815<tr>
     5816     <td valign="top">Year</td>
     5817     <td valign="top">2010</td>
     5818</tr>
     5819
     5820<tr>
     5821     <td valign="top">Abstract</td>
     5822     <td valign="top">We demonstrate Transit Portal, a system that provides on-demand BGP Internet connectivity to multiple ISPs. Transit Portal provides connectivity to any virtual network or distributed service that needs to control its inbound and outbound route control. Examples of such services include virtual networks and distributed services in cloud computing environments (e.g., Amazon's EC2) that need to control inbound and outbound traffic.</td>
     5823</tr>
     5824
     5825
     5826
     5827<tr>
     5828     <td valign="top">DOI</td>
     5829     <td valign="top">10.1145/1851182.1851265</td>
     5830</tr>
     5831
     5832
     5833
     5834<tr>
     5835     <td valign="top">URL</td>
     5836     <td valign="top"><a href="http://dl.acm.org/citation.cfm?id=1851265">http://dl.acm.org/citation.cfm?id=1851265</a></td>
     5837</tr>
     5838
     5839
     5840</table></div><br><br>
     5841
     5842
     5843
     5844
     5845<a class="EntryGoto" id="Van Vorst, N. and Erazo, M. and Liu, J."></a>
     5846<b class="myheading" style="position: relative; left: 5%;">Van Vorst, N. and Erazo, M. and Liu, J.</b>
     5847
     5848<div class="BibEntry">
     5849
     5850<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5851
     5852
     5853<tr>
     5854     <td valign="top">Author</td>
     5855     <td valign="top">Van Vorst, N. and Erazo, M. and Liu, J.</td>
     5856</tr>
     5857
     5858<tr>
     5859     <td valign="top">Title</td>
     5860     <td valign="top">PrimoGENI for hybrid network simulation and emulation experiments in GENI</td>
     5861</tr>
     5862
     5863<tr>
     5864     <td valign="top">Journal</td>
     5865     <td valign="top">Journal of Simulation</td>
     5866</tr>
     5867
     5868<tr>
     5869     <td valign="top">Year</td>
     5870     <td valign="top">2012</td>
     5871</tr>
     5872
     5873<tr>
     5874     <td valign="top">Abstract</td>
     5875     <td valign="top">The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform—a 'virtual laboratory' for the design, implementation, and evaluation of future networks. The PrimoGENI project enables real-time network simulation by extending an existing network simulator to become part of the GENI federation to support large-scale experiments involving physical, simulated, and emulated network entities. In this paper, we describe a novel design of PrimoGENI, which aims at supporting realistic, scalable, and flexible network experiments with real-time simulation and emulation capabilities. We present a flexible emulation infrastructure that allows both remote client machines, local cluster nodes running virtual machines, and external networks to seamlessly interoperate with the simulated network running within a designated 'slice' of resources. We present the results of our preliminary validation and performance studies to demonstrate the capabilities as well as limitations of our approach.</td>
     5876</tr>
     5877
     5878
     5879
     5880<tr>
     5881     <td valign="top">DOI</td>
     5882     <td valign="top">10.1057/jos.2012.5</td>
     5883</tr>
     5884
     5885
     5886
     5887<tr>
     5888     <td valign="top">URL</td>
     5889     <td valign="top"><a href="http://dx.doi.org/10.1057/jos.2012.5">http://dx.doi.org/10.1057/jos.2012.5</a></td>
     5890</tr>
     5891
     5892
     5893</table></div><br><br>
     5894
     5895
     5896
     5897
     5898<a class="EntryGoto" id="Van Vorst, N. and Li, Ting and Liu, J."></a>
     5899<b class="myheading" style="position: relative; left: 5%;">Van Vorst, N. and Li, Ting and Liu, J.</b>
     5900
     5901<div class="BibEntry">
     5902
     5903<table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
     5904
     5905
     5906<tr>
     5907     <td valign="top">Author</td>
     5908     <td valign="top">Van Vorst, N. and Li, Ting and Liu, J.</td>
     5909</tr>
     5910
     5911<tr>
     5912     <td valign="top">Title</td>
     5913     <td valign="top">How Low Can You Go? Spherical Routing for Scalable Network Simulations</td>
     5914</tr>
     5915
     5916<tr>
     5917     <td valign="top">Booktitle</td>
     591