This page summarizes publications about Emulab as well as publications that used Emulab to validate research they present.

If you have a publications that used Utah's Emulab to validate your research please use this form to add it. For other updates or corrections please email papers@emulab.net.

Active Networks

  1. GAL: A Middleware Library for Multidimensional Adaptation. David Gotz, Ketan Mayer-Patel. Technical Report TR05-023, University of North Carolina at Chapel Hill, Oct 2005
  2. Bees: A Secure, Resource-Controlled, Java-Based Execution Environment. Tim Stack, Eric Eide, Jay Lepreau. IEEE Conference on Open Architectures and Network Programming, pages 97-106, San Francisco, CA, Apr 2003
  3. Upgrading Transport Protocols using Untrusted Mobile Code. Parveen Patel, Andrew Whitaker, David Wetherall, Jay Lepreau, Tim Stack. ACM Symposium on Operating Systems Principles, pages 1-14, 2003
  4. An OS Interface for Active Routers. Larry Peterson, Yitzchak Gottlieb, Mike Hibler, Patrick Tullmann, Jay Lepreau, Stephen Schwab, Hrishikesh Dandekar, Andrew Purtell, John Hartman. IEEE Journal on Selected Areas of Communication, Mar 2001
  5. Janos: A Java-Oriented OS for Active Network Nodes. P. Tullmann, M. Hibler, J. Lepreau. IEEE Journal on Selected Areas in Communications, Mar 2001

Adaptive Traffic Equalization

  1. NATALIE: An Adaptive, Network-Aware Traffic Equalizer. Yihua He, Jack Brassil. Proceedings of the IEEE International Conference on Communications (ICC), pages 595-602, Glasgow, Scotland, Jun 2007

Anonymous Communication

  1. Dissent in Numbers: Making Strong Anonymity Scale. David Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, Aaron Johnson. Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 179-192, Hollywood, CA, Oct 2012

Application and Experiment Support

  1. Motion Planning and Coordination of Mobile Robot Behavior for Medium Scale Distributed Wireless Network Experiments. Daniel Montrallo Flickinger. Thesis, University of Utah, Dec 2007
  2. Hercules: An Environment for Large-Scale Enterprise Infrastructure Testing. Lan Wang, Charles Ellis, Wei Yin, Dung Dinh Luong., May 2007
  3. An Environment for Benchmarking Distributed File Systems – Specifically for NFSv4Repli. André van Hoorn. Thesis, Carl von Ossietzky Universität Oldenburg, Dec 2006
  4. How good is Xen for simulating distributed applications?. Anirban Sinha, Gang Peng., 2006
  5. Upgrading Distributed Applications with the Version Manager. Mukesh Agrawal, Suman Nath, Srinivasan Seshan. Technical Report CMU-CS-05-117, Carnegie Mellon University, Mar 2005
  6. A Scalable, Accurate and Extensible Network Emulation Platform using the IXP1200 Network Processor. Abhijeet Joglekar.

AQM Congestion Control

  1. Towards Experimental Evaluation of Explicit Congestion Control. S. Jain, Y. Zhang, D. Loguinov. IEEE IWQoS, Jun 2008
  2. PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control. S. Jain, D. Loguinov. IEEE IWQoS, Jun 2007

Cloud Computing

  1. Performance Evaluation of the Illinois Cloud Computing Testbed. Ahmed Khurshid, Abdullah Al-Nayeem, Indranil Gupta. Technical Report , University of Illinois at Urbana-Champaign, Jun 2009

Databases

  1. Salt: Combining ACID and BASE in a Distributed Database. Chao Xie, Chunzhi Su, Manos Kapritsos, Yang Wang, Navid Yaghmazadeh, Lorenzo Alvisi, Prince Mahajan. Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 495-509, Broomfield, CO, Oct 2014
  2. Schema Mapping and Query Translation in Heterogeneous Peer-to-Peer XML Databases. Elaine Qing Chang. Thesis, Trent University (University of British Columbia), Oct 2005
  3. On the Performance of Consistent Wide-Area Database Replication. Yair Amir, Claudiu Danilov, Michal Miskin-Amir, Jonathan Stanton, Ciprian Tutu. Technical Report CNDS-2003-3, Dec 2003

Debugging Distributed Systems

  1. The effects of metadata corruption on NFS. Swetha Krishnan, Giridhar Ravipati, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Barton P. Miller. Sigsacc: Workshop on Storage Security and Survivability ISBN:978-1-59593-891-6, pages 37-41, Alexandria, Virginia, 2007
  2. Simplifying Distributed Application Upgrades with Simultaneous Execution. Mukesh Agrawal, Suman Nath, Srinivasan Seshan. Technical Report CMU-CS-05-190, Carnegie Mellon University, Nov 2005

Declarative Networking

  1. The Design and Implementation of Declarative Networks. Boon Thau Loo. Technical Report UCB/EECS-2006-177, UC Berkeley, Dec 2006

DHT & P2P

  1. Democratizing Content Distribution. Michael Joseph Freedman. Thesis, New York University, Sep 2007
  2. Management and Service Discovery in Satellite and Avionic Networks. Todd Sproull, John W. Lockwood, John Meier. Proceedings of the 2007 IEEE Aerospace Conference, pages 1-13, Big Sky, Montana, Mar 2007
  3. Defragmenting DHT-based Distributed File Systems. Jeffrey Pang, Phillip B. Gibbons, Michael Kaminsky, Srinivasan Seshan, Haifeng Yu. ICDCS '07, 2007
  4. BAR Gossip. Harry C. Li, Allen Clement, Edmund L. Wong, Jeff Napper, Indrajit Roy, Lorenzo Alvisi, Michael Dahlin. OSDI '06, pages 191-204, Seattle, WA, Nov 2006
  5. Agile Store: Experience with Quorum-Based Data Replication Techniques for Adaptive Byzantine Fault Tolerance. Lei Kong, Deepak J. Manohar, Arun Subbiah, Michael Sun, Mustaque Ahamad, Douglas M. Blough. Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS), Oct 2005
  6. Shark: Scaling File Servers via Cooperative Caching. Siddhartha Annapureddy, Michael J. Freedman, David Mazières. Proc. 2nd USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI '05), May 2005
  7. Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn. Jonathan Ledlie and Margo Seltzer. Proceedings of IEEE INFOCOM 2005, Mar 2005
  8. CubeCache: Efficient and Scalable Processing of OLAP Aggregation Queries in a Peer-to-Peer Network. Sangeetha Seshadri, Brian F.Cooper, Ling Liu. Technical Report GIT-CERCS-07-12, Georgia Institute of Technology, 2005
  9. DistribNet- A Global Peer-to-Peer Internet File System. Kevin Atkinson. Master's Thesis, University of Maryland, Baltimore County, 2005
  10. Flexible Consistency for Wide area Peer Replication. Sai Susarla, John Carter. ICDCS ’05, pages 199-208, 2005
  11. Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn. Jonathan Ledlie, Margo Seltzer. Technical Report TR-31-04, Harvard University, 2004
  12. Analysis of Erasure Coding in a Peer to Peer Backup System. Argyro Andreou, Deepti Chheda, Alexander Giamas, George Nychis.

Distributed Checkpointing

  1. Transparent Checkpoints of Closed Distributed Systems in Emulab. Anton Burtsev, Prashanth Radhakrishnan, Mike Hibler, Jay Lepreau. Proceedings of the Fourth ACM European Conference on Computer Systems, pages 173-186, Nuremberg, Germany, Apr 2009
  2. Stateful-Swapping in the Emulab Network Testbed. Prashanth Radhakrishnan. Master's Thesis, University of Utah, Aug 2008

Distributed Databases

  1. Using Hierarchies for Optimizing Distributed Stream Queries. Sangeetha Seshadri, Vibhore Kumar, Brian F. Cooper. Technical Report GIT-CERCS-06-06, Georgia Institute of Technology, 2006

Distributed Middleware

  1. Distributed Quota Enforcement for Spam Control. Michael Walfish, J.D. Zamfirescu, Hari Balakrishnan, David Karger, Scott Shenker. NSDI '06, pages 281–296, San Jose, CA, May 2006
  2. PLATO: Predictive Latency-Aware Total Ordering. Mahesh Balakrishnan, Ken Birman, Amar Phanishayee. SRDS 2006: 25th IEEE Symposium on Reliable Distributed Systems, 2006
  3. Fault-Tolerant Middleware and the Magical 1%. Tudor Dumitraş and Priya Narasimhan. ACM/IFIP/USENIX Conference on Middleware, Dec 2005
  4. Scalable Process Group Membership for the Spread Toolkit. Ryan W. Caudy. Thesis, Johns Hopkins University, Oct 2004

Distributed Systems and Networking

  1. Configuring Distributed Computations Using Response Surfaces. Adem Efe Gencer, David Bindel, Emin Gün Sirer, Robbert van Renesse. Middleware, Vancouver, Canada, Dec 2015
  2. Randomized Consensus in Wireless Environments: A Case Where More is Better. Bruno Vavala, Nuno Neves, Henrique Moniz, Paulo Verissimo. Third International Conference on Dependability, Venice, Italy, Jul 2010
  3. DepSpace: A Byzantine Fault-Tolerant Coordination Service. Alysson Neves Bessani, Eduardo Alchieri, Miguel Correia, Joni Silva Fraga. Proceedings of the 3rd ACM SIGOPS/EuroSys European Systems Conference - EuroSys'08, Apr 2008
  4. Towards a High Quality Path-oriented Network Measurement and Storage System. David Johnson, Daniel Gebhardt, Jay Lepreau. Proc. of the Ninth Passive and Active Measurement Conference (PAM 2008), Apr 2008
  5. A (condensed) parametric study of optimistic computation in wide-area, distributed environments. Craig A. Lee, Nikos Chrisochoides. Proceedings of the 15th ACM Mardi Gras conference, Baton Rouge, Louisiana, 2008
  6. SEMMO: a scalable engine for massively multiplayer online games. Nitin Gupta, Alan J. Demers, Johannes E. Gehrke.Talk. International Conference on Management of Data, Vancouver, Canada, 2008
  7. Sliver, a Fast Distributed Slicing Algorithm. Vincent Gramoli, Ymir Vigfusson, Ken Birman, Anne-Marie Kermarrec, Robbert van Renesse. Technical Report , Dec 2007
  8. Flexlab: A Realistic, Controlled, and Friendly Environment for Evaluating Networked Systems. Jonathon Duerig, Robert Ricci, Junxing Zhang, Daniel Gebhardt, Sneha Kasera, Jay Lepreau. Fifth Workshop on Hot Topics in Networks (HotNets-V), Nov 2006
  9. Towards Fingerpointing in the Emulab Dynamic Distributed System. Michael P. Kasick, Priya Narasimhan, Kevin Atkinson, Jay Lepreau. Third USENIX Workshop on Real, Large Distributed Systems (WORLDS 2006), Nov 2006
  10. Automatic Online Validation of Network Configuration in the Emulab Network Testbed. David S. Anderson, Leigh Stoller, Mike Hibler, Tim Stack, Jay Lepreau. Third IEEE International Conference on Autonomic Computing (ICAC 2006), Jun 2006
  11. Mobile Emulab: A Robotic Wireless and Sensor Network Testbed. David Johnson, Tim Stack, Russ Fish, Daniel Montrallo Flickinger, Leigh Stoller, Robert Ricci, Jay Lepreau. IEEE INFOCOM 2006, Apr 2006
  12. Automatic IP Address Assignment on Network Topologies. Jonathon Duerig, Robert Ricci, John Byers, Jay Lepreau. Technical Report FTN-2006-02, Feb 2006
  13. Issues in Integrated Network Experimentation using Simulation and Emulation. Shashikiran B. Guruprasad. Thesis, University of Utah, Aug 2005
  14. Optimizing IP Address Assignment on Network Topologies. Jonathon Duerig, Robert Ricci, John Byers, Jay Lepreau. Technical Report FTN-2005-04, University of Utah, Jul 2005
  15. TrueMobile: A Mobile Robotic Wireless and Sensor Network Testbed. David Johnson, Tim Stack, Russ Fish, Dan Flickinger, Rob Ricci, Jay Lepreau. Technical Report FTN-2005-02, University of Utah, Apr 2005
  16. Integrated Network Experimentation using Simulation and Emulation. Shashi Guruprasad, Rob Ricci, Jay Lepreau. First International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (Tridentcom 2005), Feb 2005
  17. A Solver for the Network Testbed Mapping Problem. Robert Ricci, Chris Alfeld, Jay Lepreau. ACM SIGCOMM Computer Communications Review, Vol. 32(2), pages 65-81, Apr 2003

Dynamic Systems

  1. Fast Distributed Slicing without Requiring Uniformity. Vincent Gramoli, Ymir Vigfusson, Ken Birman, Anne-Marie Kermarrec, Robbert van Renesse. Technical Report GVBKR07, Cornell University, Dec 2007

Education

  1. Isn't it time you had an emulab?. W. David Laverell, Zongming Fei, James N. Griffioen. ACM SIGCSE Bulletin, Vol. 40 No. 1, Mar 2008

Emulation

  1. A Federated Experiment Environment for Emulab-based Testbeds. Ted Faber, John Wroclawski. The 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, Washington, D. C., Apr 2009
  2. Modeling and Emulation of Internet Paths. Pramod Sanaga, Jonathon Duerig, Robert Ricci, Jay Lepreau. Proceedings of the Sixth USENIX Symposium on Networked Systems Design and Implementation (NSDI), pages 199-212, Boston, MA, Apr 2009
  3. An Architecture Independent Approach to Emulating Computation Intensive Workload for Early Integration Testing of Enterprise DRE Systems. James H. Hill. On the Move to Meaningful Internet Systems, 2009
  4. NEPI: using independent simulators, emulators, and testbeds for easy experimentation. Mathieu Lacage, Martin Ferrari, Mads Hansen, Thierry Turletti, Walid Dabbous. ACM SIGOPS Operating Systems Review, 2009
  5. High Capacity Network Link Emulation Using Network Processors. Abhijeet A. Joglekar. Thesis, University of Utah, May 2004

File Transfer & Streaming

  1. Adaptive File Transfers for Diverse Environments. Himabindu Pucha, Michael Kaminsky, David G. Andersen, Michael A. Kozuch. Proc. USENIX Annual Technical Conference, Jun 2008
  2. Exploiting Similarity for Multi-Source Downloads Using File Handprints. Himabindu Pucha, David G. Andersen, Michael Kaminsky. Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Apr 2007
  3. Optimizing Multiple Distributed Stream Queries Using Hierarchical Network Partitions. Sangeetha Seshadri, Vibhore Kumar, Brian F. Cooper, Ling Liu. IEEE International Parallel and Distributed Processing Symposium, pages 1-10, Mar 2007
  4. A Case for Small File Packing in Parallel Virtual File System (PVFS2). Faraz Shaikh and Mikhail Chainani. Advanced and Distributed Operating Sytems Fall 07, 2007
  5. An Overlay Architecture for High Quality VoIP Streams. Yair Amir, Claudiu Danilov, Stuart Goose, David Hedqvist, Andreas Terzis. IEEE Transactions on Multimedia, pages 1250-1262, Dec 2006
  6. Scalable and adaptive streaming for non-linear media. David Gotz. MULTIMEDIA '06, pages 357-366, Santa Barbara, CA, Oct 2006
  7. Channel Set Adaptation: Scalable and Adaptive Streaming for Non-Linear Media. David Gotz. Thesis, University of North Carolina at Chapel Hill, 2006
  8. Scalable Resilient Media Streaming. Suman Banerjee, Seungjoon Lee, Ryan Braud, Bobby Bhattacharjee, Aravind Srinivasan. ACM NOSSDAV, Jun 2004
  9. A Two-Stream approach for priority management and adaptive rate control in multimedia applications. Longin Jan Latecki, Tao Jin, Jaiwant Mulik. Journal of Internet Technology, pages 331-339, 2004
  10. Application-Controlled Loss-Tolerant Data Dissemination. Guanling Chen, David Kotz. Technical Report TR2004-488, Dartmouth College, 2004
  11. Improving Startup Performance using Active Measurements: Algorithm and Evaluation. Ningning Hu, Peter Steenkiste. Proceedings of the International Conference on Networking Protocol, pages 107-118, Nov 2003
  12. Better Audio Performance when Video Stream is Monitored by TCP Congestion Control. Longin Jan Latecki, Kishore Kulkarni, Jaiwant Mulik. Proceedings of the 2003 International Conference on Multimedia and Expo (ICME), Vol. II No. 10.1109/ICME.2003.1221618, pages 321-324, Baltimore, MD, Jul 2003
  13. MX: Mobile Object Exchange for Collaborative Applications. Liuba Shrira and Hong Tian. European Conference on Object-Oriented Programming (ECOOP 2003), Jul 2003
  14. Fast, Scalable Disk Imaging with Frisbee. Mike Hibler, Leigh Stoller, Jay Lepreau, Robert Ricci, Chad Barb. Proc. of the 2003 USENIX Annual Technical Conference, Jun 2003
  15. Scalable Resilient Media Streaming. Suman Banerjee, Seungjoon Lee, Bobby Bhattacharjee, Aravind Srinivasan, Ryan Braud. Technical Report CS-TR 4482, University of Maryland, Apr 2003
  16. IQ-RUDP: Coordinating Application Adaptation with Network Transport. Qi He, Karsten Schwan. Proceedings 11th IEEE International Synopsium on High Performance Distributed Computing ISBN: 0-7695-1686-6, pages 369-378, 2002

Graph Analytics

  1. LFGraph: Simple and Fast Distributed Graph Analytics. Imranul Hoque, Indranil Gupta. Proceedings of the 1st ACM Conference on Timely Results in Operating Systems (TRIOS), Farmington, PA, Nov 2013

GRID Computing

  1. Anomaly Detection and Diagnosis in Grid Environments. Lingyun Yang, Chuang Liu, Jennifer M. Schopf, Ian Foster. Proceedings of the 2007 ACM/IEEE Conference on Supercomputing (SC), Reno, NV, Nov 2007
  2. Log Summarization and Anomaly Detection for Troubleshooting Distributed Systems. Dan Gunter, Brian L. Tierney, Aaron Brown, Martin Swany, John Bresnahan, Jennifer M. Schopf. Proceedings of the 8th IEEE/ACM International Conference on Grid Computing 10.1109/GRID.2007.4354137, pages 226-234, Austin, TX, Sep 2007
  3. The File Mover: An Efficient Data Transfer System for Grid Applications. Cosimo Anglano, Massimo Canonico. Proceedings of the IEEE International Symposium on Cluster Computing and the Grid (CCGrid), pages 625-634, Chicago, IL, Apr 2004
  4. Topology-Aware Communication in Wide-Area Message-Passing. Craig A. Lee. Proceedings of the 10th European PVM/MPI User’s Group Meeting, Vol. LNCS 2840/2003, pages 644-652, Sep-Oct 2003
  5. Using Topology-Aware Communication Services in Grid Environments. Craig A. Lee, Eric Coe, B. Scott Michel, James Stepanek, Ignacio Solisy, J. Matt Clark, Brooks Davis. Proceedings of the 3rd International Symposium on Cluster Computing and the Grid (CCGRID), pages 534-541, May 2003
  6. Using the Emulab network testbed to evaluate the Armada I/O framework for computational grids. Ron Oldfield, David Kotz. Technical Report TR2002-433, Dept of Computer Science Dartmouth College, Sep 2002

Internet Availability

  1. Resilient Overlay Networks. David G. Andersen and Hari Balakrishnan and M. Frans Kaashoek, Robert Morris. 18th ACM Symp. on Operating Systems Principles (SOSP), Oct 2001

Measurements, Diagnosis, and Anomaly Detection

  1. cSamp:  A System for Network-Wide Flow Monitoring. Vyas Sekar, Michael K. Reiter, Walter Willinger, Hui Zhang, Ramana Rao Kompella, David G. Andersen. Proc. 5th USENIX NSDI, Apr 2008
  2. Detecting In-Flight Page Changes with Web Tripwires. Charles Reis, Steven D. Gribble, Tadayoshi Kohno, Nicholas C. Weaver. NSDI 2008, Apr 2008
  3. IMR-Pathload: Robust Available Bandwidth Estimation under End-Host Interrupt Delay. S.-R. Kang, D. Loguinov. PAM, Apr 2008
  4. A Stochastic Foundation of Available Bandwidth Estimation: Multi-Hop Analysis. Xiliang Liu, Kaliappa Ravindran, Dmitri Loguinov. Transactions on Networking, Vol. 16 No. 1, pages 130-143, Feb 2008
  5. A System Theoretic Approach to Bandwidth Estimation. Jorg Liebeherr, Markus Fidler, Shahrokh Valaee., Jan 2008
  6. Measuring Load-balanced Paths in the Internet. Brice Augustin, Renata Teixeira and Timur Friedman. Internet Measurement Conference, Oct 2007
  7. An Observation-Based Approach to Performance Characterization of Distributed n-Tier Applications. Calton Pu, Akhil Sahai, Jason Parekh, Gueyoung Jung, Ji Bae, You-Kyung Cha, Timothy Garcia,Danesh Irani, Jae Lee, Qifeng Lin. Proceedings of the 10th IEEE International Symposium on Workload Characterization (IISWC), pages 161-170, Boston, MA, Sep 2007
  8. The Measurement Manager: Modular End-to-End Measurement Services. Pavlos Papageorgiou., Apr 2007
  9. Architecture-Driven Diagnosis of Performance Failures in a Token Ring. Andrew Williams, Priya Narasimhan. USENIX: Proceedings of the 3rd workshop on Hot Topics in System Dependability Article No. 8, pages 1-4, Edinburgh, UK, 2007
  10. EtherFuse: An Ethernet Watchdog. Khaled Elmeleegy, Alan L. Cox, T.S. Eugene Ng. Sigcomm ISBN: 978-1-59593-713-1, pages 253-264, Kyoto, Japan, 2007
  11. Towards a Generalized Stochastic Model of End-to-End Packet-Pair Sampling. X. Liu, K. Ravindran, D. Loguinov., Dec 2006
  12. Controlling Quality-of-Service in a Distributed Real-time and Embedded Multimedia Application via Adaptive Middleware. Richard E. Schantz, Joseph P. Loyall, Craig Rodrigues, Douglas C. Schmidt. Software—Practice & Experience, Vol. 36 No. 11-12, pages 1189 - 1208, Sep 2006
  13. Measuring the Performance of a Distributed Quota Enforcement System for Spam Control. John Dalbert Zamfirescu-Pereira. Thesis, Massachusetts Institute of Technology, Aug 2006
  14. Network Monitoring and Diagnosis Based on Available Bandwidth Measurement. Ningning Hu. Thesis, Carnegie Mellon University, May 2006
  15. Challenges and Opportunities in Internet Data Mining. David G. Andersen, Nick Feamster. Technical Report CMU-PDL-06-102, Jan 2006
  16. Attack Profiling For DDOS Benchmarks. Erinc Arikan. Master's Thesis, University of Delaware, 2006
  17. Multi-Hop Probing Asymptotics in Available Bandwidth Estimation: Stochastic Analysis. X. Liu, K. Ravindran, D. Loguinov. USENIX/ACM IMC, Oct 2005
  18. A Stochastic Analysis of End-to-end Available Bandwidth Estimation. Xiliang Liu. Thesis, The City University of New York, May 2005
  19. Evaluating the Performance of Middleware Load Balancing Strategies. Jaiganesh Balasubramanian, Douglas C. Schmidt, Lawrence Dowdy, Ossama Othman. Proceedings of the 8th IEEE International Enterprise Distributed Object Computing Conference (EDOC), pages 135-146, Monterey, CA, Sep 2004
  20. CCMPerf: A Benchmarking Tool for CORBA Component Model Implementations. Arvind S. Krishna, Balachandran Natarajan, Aniruddha Gokhale, Douglas C. Schmidt, Nanbor Wang, Gautam Thaker. Proceedings of the Tenth IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2004), pages 140-147, May 2004
  21. RPT: A Low Overhead Single-End Probing Tool for Detecting Network Congestion Positions. Ningning Hu, Peter Steenkiste. Technical Report CMU-CS-03-218, Carnegie Mellon University, Dec 2003
  22. Evaluating the Running Time of a Communication Round over the Internet. Omar Bakr, Idit Keidar. Proceedings of the 21st Annual Symposium on Principles of Distributed Computing (PODC), pages 243-252, Monterey, CA, Jul 2002
  23. Inferring Scheduling Behavior with Hourglass. John Regehr. Proceedings of the USENIX 2002 Annual Technical Conference FREENIX track, Jun 2002
  24. System Support for Bandwidth Management and Content Adaptation in Internet Applications. David Andersen, Deepak Bansal, Dorothy Curtis, Srinivasan Seshan, Hari Balakrishnan. Proc. USENIX OSDI Conf., Oct 2000

Multicast and Broadcast

  1. Realization of a Scalable and Reliable Multicast Transport Protocol for Many-to-Many Sessions. Seungik Lee, Yangwoo Ko, Dongman Lee. ETRI Journal, Vol. 29 No. 6, pages 745-754, Dec 2007
  2. Ricochet: Lateral Error Correction for Time-Critical Multicast. Mahesh Balakrishnan, Ken Birman, Amar Phanishayee, Stefan Pleisch. NSDI 2007: Fourth Usenix Symposium on Networked Systems Design and Implementation, 2007
  3. Chunkyspread: Heterogeneous Unstructured End System Multicast. Vidhyashankar Venkataraman, Kaoru Yoshida, Paul Francis. Technical Report TR2006-2027, Cornell University, May 2006
  4. A Cost-Benefit Flow Control for Reliable Multicast and Unicast in Overlay Networks. Yair Amir, Baruch Awerbuch, Claudiu Danilov, Jonathan Stanton. ACM Transactions on Networking, Vol. vol. XIII, pages 1094-1106, Oct 2005
  5. Araneola: A Scalable Reliable Multicast System for Dynamic Environments. Roie Melamed and Idit Keidar. rd IEEE International Symposium on Network Computing and Applications (IEEE NCA), Sep 2004
  6. Connectivity Restrictions in Overlay Multicast. Aditya Ganjam, Hui Zhang. Proceedings of the 14th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), pages 54-59, Cork, Ireland, Jun 2004
  7. Application-Perceived Multicast Push Performance. Wenhui Zhang, Wei Li, Vincenzo Liberatore. Proceedings of the International Parallel and Distributed Processing Symposium, Apr 2004
  8. Multicast TCP via Concast Merged Acknowledgements. Billy Mullins, Jim Griffioen, Ken Calvert. ICCCN 2003, Oct 2003
  9. ORMCC: A Simple And Effective Single-Rate Multicast Congestion Control Scheme. Jiang Li, Shivkumar Kalyanaraman., 2002
  10. Mesh-Based Content Routing using XML. Alex C. Snoeren, Kenneth Conley, and David K. Gifford. SOSP '01, Banff, Canada, Oct 2001

Name Services

  1. A Framework for Multiparty Communication Types. Chamath Indika Keppitiyagama. Thesis, University of British Columbia, Jul 2005

Network Protocols

  1. EtherProxy: Scaling Ethernet By Suppressing Broadcast Traffic. Khaled Elmeleegy, Alan L. Cox. INFOCOM, Rio de Janeiro, Apr 2009
  2. Increasing TCP Throughput with an Enhanced Internet Control Plane. Andy Bavier, Larry Peterson, Jack Brassil, Rick McGeer, David Reed, Puneet Sharma, Praveen Yalagandula, Alex Henderson, Larry Roberts, Stephen Schwab, Roshan Thomas, Eric Wu, Brian Mark, Ben Zhao, Anthony Joseph. MILCOM, Oct 2006
  3. An Accumulation-based, Closed-loop Scheme for Expected Minimum Rate and Weighted Rate Services. David Harrison, Yong Xia, Shivkumar Kalyanaraman, Arvind Venkatesan. Computer Networks, Vol. 45 No. 6, pages 801-818, Aug 2004
  4. Evaluation of Emulab as Experimental Platform by Comparing TCP and SCTP. Johan Eklund. Thesis, Karlstad University, Jul 2004
  5. Deploying Safe User-Level Network Services with icTCP. Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau. USENIX Association OSDI ’04: 6th Symposium on Operating Systems Design and Implementation, pages 317-332, 2004
  6. Maelstrom: Transparent Error Correction for Lambda Networks. Mahesh Balakrishnan, Tudor Marian, Ken Birman, Hakim Weatherspoon, Einar Vollset. Accepted to NSDI 2008: Fifth Usenix Symposium on Networked Systems Design and Implementation

Overlay Networks

  1. MPAT: Aggregate TCP Congestion Management as a Building Block for Internet QoS. Manpreet Singh, Prashant Pradhan, Paul Francis. Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP), pages 129-138, Berlin, Germany, Oct 2004

Parallel Computing

  1. Adaptive parallel computation for heterogeneous processors. Christopher Alexander Stein. Thesis, Harvard University, May 2007
  2. Partial Order Reduction Assisted Parallel Model-Checking. Robert Palmer and Ganesh Gopalakrishnan., Aug 2002

Performance of Network Protocol

  1. Evaluating Transport Protocols for Real-Time Event Stream Processing Middleware and Applications. Joe Hoffert, Douglas C. Schmidt, Aniruddha Gokhale. On the Move to Meaningful Internet Systems, 2009
  2. Performance of Network Redundancy Mechanisms in SCTP. Johan Eklund, Anna Brunstrom. Technical Report 2005-48, Karlstad University, 2005

Pub/Sub & Dissemination Systems

  1. Using Machine Learning to Maintain Pub/Sub System QoS in Dynamic Environments. Joe Hoffert, Daniel Mack, Douglas Schmidt. Proceedings of the 8th International Workshop on Adaptive and Reflective MIddleware, Urbana Champaign, Illinois, Dec 2009
  2. Distributed Complex Event Processing with Query Rewriting. Nicholas Poul Schultz-Møller, Matteo Migliavacca, Peter Pietzuch. Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, Nashville, Tennessee, 2009
  3. Cobra: Content based Filtering and Aggregation of Blogs and RSS Feeds. Ian Rose, Rohan Murty, Peter Pietzuch, Jonathan Ledlie, Mema Roussopoulos, Matt Welsh. Proceedings of the 4th USENIX Symposium on Networked Systems Design & Implementation (NSDI '07), Apr 2007
  4. Cobra: Content-based Filtering and Aggregation of Blogs and RSS Feeds. Ian Rose, Rohan Murty, Peter Pietzuch, Jonathan Ledlie, Mema Roussopoulos, Matt Welsh. Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Apr 2007
  5. The Design and Performance of a Real-Time Notification Service. Pradeep Gore, Irfan Pyarali, Christopher D. Gill, Douglas C. Schmidt. Proceedings of the Real-time and Embedded Technology and Applications Symposium, pages 112-120, May 2004
  6. SANDS: Specialized Active Networking for Distributed Simulation. S. Zabele, M. Dorsch, Z. Ge, P. Ji, M. Keaton, J. Kurose, J. Shapiro, D. Towsley. DARPA Active NEtworks Conference and Exposition, pages 356 - 365, May 2002

QoS

  1. Fast Rerouting for IP Multicast in Managed IPTV Networks. Ralf Luebben, Guangzhi Li, Dongmei Wang, Robert Doverspike, Xiaoming Fu. IWQoS, 17th International Workshop on Quality of Service, 2009, 2009
  2. An Accumulation-based Congestion Control Model. Y. Xia, D. Harrison, S. Kalyanaraman, K. Ramachandran, A. Venkatesan. IEEE International Conference on Communications, May 2003
  3. User-specified Adaptive Scheduling in a Streaming Media Network. Michael Hicks, Adithya Nagarajan, Robbert van Renesse. Proceedings of the 2003 IEEE Conference on Open Architectures and Network Programming (OPENARCH), pages 87-96, San Francisco, CA, Apr 2003

Resource Allocation

  1. Hierarchical Control of Multiple Resources in Distributed Real-time and Embedded Systems. Nishanth Shankaran, Xenofon D. Koutsoukos, Douglas C. Schmidt, Yuan Xue, Chenyang Lu. Real-Time Systems, Vol. 39 No. 1-3, pages 237-282, Aug 2008
  2. Hierarchical Control of Multiple Resources in Distributed Real-time and Embedded Systems. Nishanth Shankaran, Xenofon D. Koutsoukos, Douglas C. Schmidt, Yuan Xue, Chenyang Lu. Proceedings of the 18th Euromicro Conference on Real-Time Systems (ECRTS ’06), Dresden, Germany, Jul 2006
  3. Integrated CORBA scheduling and resource management for distributed real-time embedded systems. Kevin Bryan, Lisa C. DiPippo, Victor Fay-Wolfe, Matthew Murphy, Jiangyin Zhangm, David T. Fleeman, David W. Juedes, Chang Liu, Lonnie R. Welch, Douglas Niehaus, Christopher D. Gill. RTAS '05, pages 375-384, San Francisco, CA, Mar 2005
  4. Dynamic CPU Management for Real-Time, Middleware-Based Systems. Eric Eide, Tim Stack, John Regehr, Jay Lepreau. RTAS '04, pages 286-295, Toronto, Canada, May 2004
  5. Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java. Godmar Back, Wilson C. Hsieh, Jay Lepreau. Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI 2000), Oct 2000

Robust Scalable Services

  1. SAMC: Semantic-Aware Model Checking for Fast Discovery of Deep Bugs in Cloud Systems. Tanakorn Leesatapornwongsa, Mingzhe Hao, Pallavi Joshi, Jeffrey F. Lukman, Haryadi S. Gunawi. Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 399-414, Broomfield, CO, Oct 2014
  2. Tempest: Soft State Replication in the Service Tier. Tudor Marian, Mahesh Balakrishnan, Ken Birman, Robbert van Renesse. DSN 2008, Anchorage, AL, Jun 2008
  3. TierStore: A Distributed Filesystem for Challenged Networks in Developing Regions. Michael Demmer, Bowei Du, Eric Brewer. FAST '08, San Jose, CA, Feb 2008
  4. Building Scalable Self-configuring Networks with SEIZE. Changhoon Kim, Matthew Caesar, Jennifer Rexford. Technical Report , Princeton University, 2007
  5. HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance. James Cowling, Daniel Myers, Barbara Liskov, Rodrigo Rodrigues, Liuba Shrira. OSDI '06, pages 177-190, Seattle, WA, Nov 2006
  6. Group Communication: Helping or Obscuring Failure Diagnosis?. Soila Pertet, Rajeev Gandhi, Priya Narasimhan. Technical Report CMU-PDL-06-107, Carnegie Mellon University, Jun 2006
  7. Applying database replication to multi-player online games. Yi Lin, Bettina Kemme, Marta Patino-Martinez, Ricardo Jimenez-Peris. NSSG: Proceedings of 5th ACM SIGCOMM workshop on Network and system support for games Article No. 15; ISBN: 1-59593-589-4, 2006
  8. Context-Specific Middleware Specialization Techniques for Optimizing Software Product-line Architectures. Arvind S. Krishna, Aniruddha S. Gokhale, Douglas C. Schmidt. ACM SIGOPS Operating Systems Review, pages 205-218, 2006
  9. Disruption Tolerant Networking for Heterogeneous Ad-Hoc Networks. Kevin Fall. Military Communications Conference, Vol. vol. IV, pages 2195-2201, Oct 2005
  10. Exploiting Redundancy for Robust Sensing. Suman Nath. Thesis, Carnegie Mellon University, Aug 2005
  11. Distributed Stream Management using Utility-Driven Self-Adaptive Middleware. Vibhore Kumar, Brian F. Cooper, Karsten Schwan. Proceedings of the 2nd International Conference on Autonomic Computing (ICAC), pages 3-14, Seattle, WA, Jun 2005
  12. Handling Cascading Failures: The Case for Topology-Aware Fault-Tolerance. Soila Pertet, Priya Narasimhan. HotDep '05, Jun 2005
  13. FlowMate: Scalable On-Line Flow Clustering. Ossama Younis, Sonia Fahmy. ACM Transactions on Networking, Vol. is. II vol. XIII, pages 288-301, Apr 2005
  14. A Scalable Information Management Middleware for Large Distributed Systems. Praveen Yalagandula. Thesis, University of Texas at Austin, 2005
  15. BAR Fault Tolerance for Cooperative Services Extended Technical Report TR0510. JeanPhilippe Martin, Amitanand S. Aiyer, Lorenzo Alvisi, Allen Clement, Michael Dahlin, Carl Porth. Technical Report TR-05-10, University of Texas at Austin, 2005
  16. Thema: Byzantine-Fault-Tolerant Middleware for Web-Service Applications. Michael G. Merideth, Arun Iyengar, Thomas Mikalsen, Stefan Tai, Isabelle Rouvellou, Priya Narasimhan. Proceedings of the IEEE Symposium on Reliable Distributed Systems, 2005
  17. Implementing Delay Tolerant Networking. Michael Demmer, Eric Brewer, Kevin Fall, Sushant Jain, Melissa Ho, Robin Patra. Technical Report IRB-TR-04-020, Dec 2004
  18. Tolerating Correlated Failures in Wide-Area Monitoring Services. Suman Nath, Haifeng Yu, Phillip B. Gibbons, Srinivasan Seshan. Technical Report IRP-TR-04-09, Intel Corporation, May 2004
  19. A Cost-Benefit Approach to Fault Tolerant Communication and Information Access. Yair Amir. Technical Report , The Johns Hopkins University, Feb 2004
  20. The Design and Performance of an Adaptive Middleware Load Balancing and Monitoring Service. Ossama Othman, Jaiganesh Balasubramanian, Douglas C. Schmidt. Proceedings of the 3rd International Workshop on Self-Adaptive Software (IWSAS), Arlington, VA, Jun 2003
  21. Astrolabe: A Robust and Scalable Technology for Distributed Systems Monitoring, Management, and Data Mining. Robbert van Renesse, Kenneth P. Birman, Werner Vogels. Transactions on Computer Systems, Vol. 21 No. 2, pages 164-206, May 2003
  22. On the Performance of Wide-Area Synchronous Database Replication. Yair Amir, Claudiu Danilov, Michal Miskin-Amir, Jonathan Stanton, Ciprian Tutu. Technical Report CNDS-2002-4, Nov 2002
  23. Practical Wide-Area Database Replication. Yair Amir, Claudiu Danilov, Michal Miskin-Amir, Jonathan Stanton, Ciprian Tutu. Technical Report CNDS-2002-1, Feb 2002

Routing

  1. Managing BGP Routes with a BGP Session Multiplexer. Vytautas Valancius, Nick Feamster. Technical Report GT-CS-08-05, Georgia Tech, 2008
  2. BGPRV: A Library for Fast and Efficient Routing Data Manipulation. Kevin Butlter, Patrick D. McDaniel and Sophie Y. Qiu. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  3. Understanding Internet Routing Anomalies And Building Robust Transport Layer Protocols. Ming Zhang. Thesis, Princeton University, Sep 2005
  4. Performing BGP Experiments on a Semi-realistic Internet Testbed Environment. Ke Zhang, Soon-Tee Teoh, Shih-Ming Tseng, Rattapon Limprasittipom, Kwan-Liu Ma, S. Felix Wu and Chen-Nee Chuah. Second International Workshop on Security in Distributed Computing Systems (SDCS), 2005
  5. A Connectionless Approach to Intra-domain Traffic Engineering. Hema Tahilramani Kaur, Shivkumar Kalyanaraman, Shifalika Kanwar, Andreas Weiss, Niharika Mateti, Biplab Sikdar. InfoComm '03, 2003

Routing Overlay

  1. A Multipath Flow Routing Approach for Increasing Throughput in the Internet. Brian L. Mark and Shidong Zhang. IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim) 10.1109/PACRIM.2007.4313167, pages 21-24, Victoria, BC, Aug 2007
  2. The Case for a Unified Extensible Data-centric Mobility Infrastructure. Yun Mao, Boon Thau Loo, Zachary Ives, Jonathan M. Smith. Proceedings of the 2nd ACM International Workshop on Mobility in the Evolving Internet Architecture (MobiArch), Kyoto, Japan, Aug 2007
  3. IQ-Paths: Predictably High Performance Data Streams across Dynamic Network Overlays. Zhongtang Cai, Vibhore Kumar, Karsten Schwan. HPDC '06, pages 18-29, Paris, France, Jun 2006
  4. Implementing Declarative Overlays. Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Timothy Roscoe, Ion Stoica. ACM SIGOPS Operating Systems Review, pages 75-90, 2005
  5. Performance and Functionality in Overlay Networks. Claudiu Danilov. Thesis, The Johns Hopkins University, Sep 2004
  6. A Transport Layer Approach for Improving End-to-End Performance and Robustness Using Redundant Paths. Ming Zhang, Junwen Lai, Arvind Krishnamurthy, Larry Peterson, Randolph Wang. Proceedings of the USENIX 2004 Annual Technical Conference, pages 99-112, Boston, MA, Jun-Jul 2004
  7. Passive Inference of Path Correlation. Lili Wang, James N. Griffioen, Kenneth L. Calvert, Sherlia Shi. Proceedings of the 14th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), pages 36-41, Cork, Ireland, Jun 2004
  8. Differential Bandwidth Allocation with Multiplexed TCP Connections. Hiroyoshi Iwashima. Thesis, MIT, Aug 2003
  9. Reliable Communication in Overlay Networks. Yair Amir, Claudiu Danilov. Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN), pages 511-520, San Francisco, CA, Jun 2003
  10. A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering. Hema T. Kaur, Shivkumar Kalyanaraman. New York Metro Area Networking Workshop, 2002

Security

  1. Cirripede: Circumvention Infrastructure Using Router Redirection with Plausible Deniability. Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov. 18th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, Oct 2011
  2. Trusted Disk Loading in the Emulab Network Testbed. Cody Cutler, Mike Hibler, Eric Eide, Robert Ricci. Proceedings of the Third Workshop on Cyber Security Experimentation and Test (CSET), Washington, DC, Aug 2010
  3. A Framework for Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks. A. Walters, D. Zage and C. Nita-Rotaru. IEEE/ACM Transactions on Networking, Feb 2009
  4. How to Test DoS Defenses. Jelena Mirkovic, Sonia Fahmy, Peter Reiher, Roshan K. Thomas. Cybersecurity Applications & Technology Conference For Homeland Security, 2009
  5. Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs. Amre Shakimov, Alexander Varshavsky, Landon P. Cox, Ramón Cáceres. Proceedings of the 2nd ACM workshop on Online social networks, Barcelona, Spain, 2009
  6. CRESTBOT: A New Family of Resilient Botnets. Duc Ha, Hung Q. Ngo, Madhusudhanan Chandrasekaran. IEEE Global Communications Conference (GLOBECOM), New Orleans, Louisiana, Dec 2008
  7. Securing the Frisbee Multicast Disk Loader. Robert Ricci, Jonathon Duerig. Proceedings of the 2008 Workshop on Cyber Security Experimentation and Test (CSET), San Jose, CA, Jul 2008
  8. Civitas: Toward a Secure Voting System. Michael R. Clarkson, Stephen Chong, Andrew C. Myers. Proceedings of the 2008 IEEE Symposium on Security and Privacy, May 2008
  9. Fidelity of Network Simulation and Emulation: A Case Study of TCP-Targeted Denial of Service Attacks. Roman Chertov, Sonia Fahmy, Ness B. Shroff. ACM Transactions on Modeling and Computer Simulation (TOMACS), Feb 2008
  10. Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Antonio Casimiro, Paulo Verıssimo. Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007), pages 357-364, Melbourne, Australia, Dec 2007
  11. A Plan for Malware Containment in the DETER Testbed. Ron Ostrenga and Stephen Schwab, Robert Braden. DETER Community Workshop on Cyber Security Experimentation and Test, Boston, Aug 2007
  12. Automating DDoS Experimentation. Jelena Mirkovic, Brett Wilson, Alefiya Hussain, Sonia Fahmy, Peter Reiher, Roshan Thomas and Stephen Schwab. DETER Community Workshop on Cyber Security Experimentation and Test, Boston, Aug 2007
  13. Dependency-based Distributed Intrusion Detection. Ji Li, Dah-Yoh Lim, and Karen Sollins. DETER Community Workshop on Cyber Security Experimentation and Test, Boston, Aug 2007
  14. Design and Implementation of an Isolated Sandbox with Mimetic Internet Used to Analyze Malwares. Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, and Yoichi Shinoda. DETER Community Workshop on Cyber Security Experimentation and Test, Boston, Aug 2007
  15. Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed. Yu Chen, Kai Hwang, Wei-Shinn Ku. DETER Community Workshop on Cyber Security Experimentation and Test, Boston, Aug 2007
  16. Emulating an Embedded Firewall. Clifford Neuman and Deepak Dayama. DETER Community Workshop on Cyber Security Experimentation and Test, Boston, Aug 2007
  17. Evaluation of Collaborative Worm Containments on DETER Testbed. L. Li, P. Liu, Y.C. Jhi, G. Kesidis. DETER Community Workshop on Cyber Security Experimentation and Test, Boston, Aug 2007
  18. Stress Testing Cluster Bro. Nicholas Weaver and Robin Sommer. DETER Community Workshop on Cyber Security Experimentation and Test, Boston, Aug 2007
  19. A Comparison of SYN Flood Detection Algorithms. Matt Beaumont-Gay. Proceedings of the Second International Conference on Internet Monitoring and Protection (ICIMP) 10.1109/ICIMP.2007.1, Jul 2007
  20. Collaborative Detection of DDoS Attacks over Multiple Network Domains. Chen Yu, Hwang Kai and Ku. Wei-Shinn. IEEE Transactions on Parallel and Distributed Systems, Jun 2007
  21. Civitas: A Secure Voting System. Michael R. Clarkson, Stephen Chong, Andrew C. Myers. Technical Report TR-2007-2081, Cornell University, May 2007
  22. CLID: A general approach to validate security policies in a dynamic network. Yanyan Yang, C. Martel, S. F. Wu. 10th IFIP/IEEE International Symposium on Integrated Network Management, May 2007
  23. DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed. Jelena Mirkovic, Songjie Wei, Alefiya Hussain, Brett Wilson, Roshan Thomas, Stephen Schwab, Sonia Fahmy, Roman Chertov, Peter Reiher. ridentcom (International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities), May 2007
  24. Toward Botnet Mesocosms. Paul Barford, Mike Blodgett. Proceedings of the First Workshop on Hot Topics in Understanding Botnets (HotBots), Cambridge, MA, Apr 2007
  25. The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention. Nicholas Weaver, Vern Paxson, Jose M. Gonzalez. ACM/SIGDA International Symposium on Field Programmable Gate Arrays (FPGA), Feb 2007
  26. Detecting Malicious Routers. Alper Tugay Mızrak. Thesis, University of California, San Diego, 2007
  27. Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations. Maitreya Natu, Jelena Mirkovic. ACM SIGCOMM Data Communication Festival, 2007
  28. On the Effects of Finite Memory on Intrusion-Tolerant Systems. Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Paulo Verissimo. PRDC 2007, pages 401-404, 2007
  29. Towards User-Centric Metrics for Denial-of-Service Measurement. Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter Reiher, Roshan Thomas, Wei-Min Yao, Stephen Schwab. Workshop on Experimental Computer Science, 2007
  30. Very Fast Containment of Scanning Worms, Revisited. Nicholas Weaver, Stuart Staniford. Malware Detection, Springer Verlag, Vol. 27, pages 113-145, 2007
  31. When is Service Really Denied? A User-Centric DoS Metric. Jelena Mirkovic, Alefiya Hussain, Brett Willson, Sonia Fahmy, Wei-Min Yao, Peter Reiher, Stephen Schwab and Roshan Thomas. International Conference on Measurement and Modeling of Computer Systems, 2007
  32. Visual Toolkit for Network Security Experiment Specification and Data Analysis. L. Li, P. Liu, G. Kesidis. Proceedings of the 3rd International Workshop on Visualization for Computer Security (VizSEC), pages 7-14, Alexandria, VA, Nov 2006
  33. Benchmarks for DDoS Defense Evaluation. Jelena Mirkovic, Erinc Arikan, Songjie Wei, Sonia Fahmy, Roshan Thomas, Peter Reiher. MILCOM, Oct 2006
  34. A Distributed Host-based Worm Detection System. Senthilkumar G. Cheetancheri, John Mark Agosta, Denver H. Dash, Karl N. Levitt, Jeff Rowe, Eve M. Schooler. Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense (LSAD), pages 107-113, Pisa, Italy, Sep 2006
  35. DDoS Defense by Offense. Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker. Sigcomm ISBN: 1-59593-308-5, pages 303-314, Pisa, Italy, Sep 2006
  36. Application of DETER in Large-Scale Cyber Security Exercises. Ron Ostrenga and Paul Walczak. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  37. Benchmarks for DDoS Defense Evaluation. Jelena Mirkovic, Erinc Arikan, Songjie Wei, Sonia Fahmy, Roshan Thomas and Peter Reiher. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  38. Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. Yu Chen and Kai Hwang. Journal of Parallel and Distributed Computing, Vol. 66 No. 9, pages 1137-1151, Jun 2006
  39. DDoS Experiment Methodology. Alefiya Hussain, Stephen Schwab, Roshan Thomas, Sonia Fahmy and Jelena Mirkovic. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  40. ELISHA: A Visual and Interactive Tool for BGP Anomaly Detection and Analysis. Chuah, SoonShih-Ming Tseng, S. Felix Wu, Kwan-Liu Ma, Chen-Nee -Tee Teoh, Ke Zhang and Xiaoliang Leon Zhao. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  41. Evaluation of a Collaborative End-Host Worm Defense System. Senthil Cheetancheri, Karl Levitt, Jeff Rowe, John Mark Agosta, Denver Dash and Eve Schoole. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  42. Formally Specifying Design Goals of Worm Defense Strategies. Linda Briesemeister, Phillip A. Porras. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  43. High Fidelity Denial of Service (DoS) Experimentation. Roman Chertov, Sonia Fahmy, Ness B. Shroff. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  44. Measuring Impact of DoS Attacks. Jelena Mirkovic, Sonia Fahmy, Peter Reiher, Roshan Thomas, Alefiya Hussain, Steven Schwab and Calvin Ko. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  45. Multidimensional Flow Mining for Digesting, Visualization, Anomaly Detection, and Signature Extraction. Jisheng Wang, David J. Miller and George Kesidis. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  46. Preliminary BGP Multiple-Origin Autonomous Systems (MOAS) Experiments on the DETER Testbed. Glenn Carl, George Kesidis, Shashi Phoha and Bharat Madan. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  47. Programmatically Generating Topologies and Configurations. Wesley Griffin and Ron Ostrenga. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  48. Running Live Self-Propagating Malware on the DETER Testbed. Cliff Neuman, Chinmay Shah and Kevin Lahey. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  49. Scanning worm emulation on the DETER testbed. Lunquan Li, George Kesidis and Peng Liu. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  50. Security Experimenters Workbench. Steve Schwab, Terry Benzel.Talk. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  51. Stress-Testing a Gbps Intrusion Prevention Device on DETER. Nicholas Weaver and Vern Paxson. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  52. Testing Large Scale BGP Security in Replayable Network Environments. Kevin Butler, Patrick McDaniel. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  53. Topology Generation, Instrumentation, and Experimental Control Tools for Emulation Testbeds. Roman Chertov, Sonia Fahmy, Pankaj Kumar, David Bettis, Abdallah Khreishah and Ness B. Shroff. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  54. Towards Systematic IDS Evaluation. Calvin Ko, Alefiya Hussain, Stephen Schwab, Roshan Thomas, Brett Wilson. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  55. Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Overlay Networks. Aaron Walters. Master's Thesis, Purdue University, May 2006
  56. Towards a framework for worm-defense evaluation. Senthilkumar G. Cheetancheri, Denys L. Ma, Karl N. Levitt, Todd L. Heberlein. Proceedings of the 25th IEEE International Performance, Computing, and Communications Conference (IPCCC) 10.1109/.2006.1629453, pages 559-565, Apr 2006
  57. Emulating sequential scanning worms on the DETER testbed. Lunquan Li, Soranun Jiwasurat, Peng Liu, George Kesidis and Clifford Neuman. Tridentcom (International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities), Mar 2006
  58. Emulation versus Simulation: A Case Study of TCP-Targeted Denial of Service Attacks. Roman Chertov, Sonia Fahmy, Ness B. Shroff. Proceedings of the 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM), Mar 2006
  59. Emulation versus Simulation: A Case Study of TCP-Targeted Denial of Service Attacks. Roman Chertov, Sonia Fahmy and Ness Shroff. Tridentcom (International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities), Mar 2006
  60. Co-ordinated Port Scans: A Model, A Detector and an Evaluation Methodology. Carrie Gates. PhD Thesis, Dalhausie University, Feb 2006
  61. Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast. Gal Badishi, Idit Keidar, Amir Sasson. IEEE Transactions on Dependable and Secure Computing, Vol. vo. III, pages 45-61, Jan 2006
  62. A Dynamic Countermeasure Method for Large-Scale Network Attacks. Zhaoyu Liu and Roopesh Uppala. International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), 2006
  63. Decentralized Information Sharing for Detection and Protection against Network Attacks. Guangsen Zhang. Thesis, Rutgers University, 2006
  64. Measuring Denial of Service. Jelena Mirkovic, Peter Reiher, Sonia Fahmy, Roshan Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko. Workshop on Quality of Protection, 2006
  65. Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks. AAron Walters, Kevin Bauer and Cristina Nita-Rotaru. , 4th IEEE International Conference on Network Protocols (ICNP), 2006
  66. Extensible Network Configuration and Communication Framework. Todd Sproull, John Lockwood. Proceedings of the 7th Annual International Working Conference on Active and Programmable Networks (IWAN), Nov 2005
  67. Methodologies and Metrics for the Testing and Analysis of Distributed Denial of Service Attacks and Defenses. S. Schwab, B. Wilson, R. Thomas. MILCOM, Oct 2005
  68. Modeling and Automated Containment of Worms. S. Sellke, N.B. Shroff, S. Bagchi. International Conference on Dependable Systems and Networks (DSN), Jun-Jul 2005
  69. Distributed Defense Against DDoS Attacks. Jelena Mirkovic, Max Robinson, Peter Reiher, George Oikonomou. Technical Report CIS-TR-2005-02, Feb 2005
  70. Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Interent Worms. G. Kesidis, I. Hamadeh and S. Jiwasurat. International Workshop on QoS In Multiservice IP Networks (QoS-IP), 2005
  71. A hybrid quarantine defense. P. Porras, L. Biesemeister, K. Levitt, J. Rowe, K. Skinner, A. Ting. WORM, Washington, DC, Oct 2004
  72. Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP. S.T. Teoh, K. Zhang, S.-M. Tseng, K.-L. Ma and S. F. Wu. VizSEC/CMSEC, Washington, DC, Oct 2004
  73. Preliminary results using scale-down to explore worm dynamics. Nicholas Weaver, Ihab Hamadeh, George Kesidis and Vern Paxson. Workshop on Rapid Malcode, 2004

Simulation

  1. A Realistic Simulation of Internet-Scale Events. Songjie Wei, Jelena Mirkovic. Proceedings of the 1st International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS), Pisa, Italy, Oct 2006

State Machines

  1. All about Eve: Execute-Verify Replication for Multi-Core Servers. Manos Kapritsos, Yang Wang, Vivien Quema, Allen Clement, Lorenzo Alvisi, Mike Dahlin. Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 237-250, Hollywood, CA, Oct 2012
  2. Static Analysis Meets Distributed Fault-Tolerance: Enabling State-Machine Replication with Nondeterminism. Joseph G. Slember, Priya Narasimhan. Proceedings of the Second Workshop on Hot Topics in System Dependability (HotDep '06), Nov 2006

Testing

  1. Test-Case Reduction for C Compiler Bugs. John Regehr, Yang Chen, Pascal Cuoq, Eric Eide, Chucky Ellison, Xuejun Yang. Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), pages 335-346, Beijing, China, Jun 2012
  2. A Framework for Performing Statistical Testing of Distributed Systems. Michael Horie, Stephen W. Neville, Chris Mueller, Fiona Warman. 24th International Conference on Advanced Information Networking and Applications Workshops, Perth, Australia, Apr 2010
  3. Volatiles Are Miscompiled, and What to Do about It. Eric Eide, John Regehr. Proceedings of the Eighth ACM and IEEE International Conference on Embedded Software (EMSOFT), pages 255-264, Atlanta, GA, Oct 2008
  4. Four Enhancements to Automated Distributed System Experimentation Methods. Yanyan Wang, Antonio Carzaniga, Alexander L. Wolf. Proceedings of the 30th international conference on Software engineering, Leipzig, Germany, 2008

Virtualization

  1. Abstractions for Practical Virtual Machine Replay. Anton Burtsev, David Johnson, Mike Hibler, Eric Eide, John Regehr. Proceedings of the 12th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE), Atlanta, GA, Apr 2016
  2. Composable Multi-Level Debugging with Stackdb. David Johnson, Mike Hibler, Eric Eide. Proceedings of the 10th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE), pages 213-225, Salt Lake City, UT, Mar 2014
  3. Automated Control of Multiple Resources. Pradeep Padala, Karen Hou, Xiaoyun Zhu, Mustafa Uysal, Sharad Singhal, Kang Shin, Arif Merchant. Eurosys, Nuremberg, Germany, Apr 2009
  4. Large-scale Virtualization in the Emulab Network Testbed. Mike Hibler, Robert Ricci, Leigh Stoller, Jonathon Duerig, Shashi Guruprasad, Tim Stack, Kirk Webb, Jay Lepreau. Proceedings of the 2008 USENIX Annual Technical Conference, pages 113-128, Boston, MA, Jun 2008
  5. Trellis: A Platform for Building Flexible, Fast Virtual Networks on Commodity Hardware. Sapan Bhatia, Murtaza Motiwala, Wolfgang Muhlbauer, Yogesh Mundada, Vytautas Valancius, Andy Bavier, Nick Feamster, Larry Peterson, Jennifer Rexford. International Conference On Emerging Networking Experiments And Technologies, Madrid, Spain, 2008
  6. Can a file system virtualize processors?. Lex Stein, David Holland, Margo Seltzer, Zheng Zhang. HPCVirt ’07, 2007
  7. Study of Virtual Machine Performance over Network File Systems. Roxana Geambasu, John P John., Jun 2006
  8. Emulation of “single-packet” UDP Scanning Worms in Large Enterprises. Lunquan Li, Soranun Jiwasurat, Peng Liu, George Kesidis. Proceedings of the 19th International Teletraffic Congress (ITC19), Beijing, China, Aug 2005

Vision & Architecture

  1. Toward Replayable Research in Networking and Systems. Eric Eide. Position paper presented at Archive '10, the NSF Workshop on Archiving Experiments to Raise Scientific Standards, Salt Lake City, UT, May 2010
  2. Enhancing Realism And Scalability In Network Testbeds. Robert Ricci. PhD Thesis, University of Utah, 2010
  3. Experiments on an Election Algorithm for Decision Element Failures in 4D Future Internet Architecture. Songqing Yue, Yang Xiao, Geoffrey G. Xie. Future Generation Information Technology Conference, Jeju Island, Korea, Dec 2009
  4. A Networked Robot System for Wireless Network Emulation. Tzi-cker Chiueh, Rupa Krishnan, Pradipta De, Jui-Hao Chiang. Technical Report TR-219, Stony Brook University, Oct 2007
  5. A DETER Federation Architecture. Ted Faber, John Wroclawski, and Kevin Lahey. DETER Community Workshop on Cyber Security Experimentation and Test, Boston, Aug 2007
  6. A Hypervisor Based Security Testbed. Dan Duchamp and Greg DeAngelis. DETER Community Workshop on Cyber Security Experimentation and Test, Boston, Aug 2007
  7. Design, Deployment, and Use of the DETER Testbed. Terry Benzel, Robert Braden, Dongho Kim, Anthony Joseph, Clifford Neuman, Ron Ostrenga, Stephen Schwab, Keith Sklower. DETER Community Workshop on Cyber Security Experimentation and Test, Boston, Aug 2007
  8. SEER: A Security Experimentation EnviRonment for DETER. Stephen Schwab, Brett Wilson, Calvin Ko, and Alefiya Hussain. DETER Community Workshop on Cyber Security Experimentation and Test, Boston, Aug 2007
  9. Very Large Scale Cooperative Experiments in Emulab-Derived Systems. Keith Sklower, Anthony D. Joseph. DETER Community Workshop on Cyber Security Experimentation and Test 2007, Boston, MA, Aug 2007
  10. An Experimentation Workbench for Replayable Networking Research. Eric Eide, Leigh Stoller, Jay Lepreau. Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Apr 2007
  11. Tesseract: A 4D Network Control Plane. Hong Yan, David A. Maltz, T.S. Eugene Ng, Hemant Gogineni, Hui Zhang, Zheng Cai. NSDI '07, pages 369–382, Cambridge, MA, Apr 2007
  12. The Flexlab Approach to Realistic Evaluation of Networked Systems. Robert Ricci, Jonathon Duerig, Pramod Sanaga, Daniel Gebhardt, Mike Hibler, Kevin Atkinson, Junxing Zhang, Sneha Kasera, Jay Lepreau. Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Apr 2007
  13. Safe Speculative Replication. Mike Dahlin, Arun Iyengar, Ravi Kokku, Amol Nayate, Arun Venkataramani, Praveen Yalagandula., 2007
  14. In VINI Veritas: Realistic and Controlled Network Experimentation. Andy Bavier, Nick Feamster, Mark Huang, Larry Peterson, Jennifer Rexford. Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pages 3-14, Pisa, Italy, Sep 2006
  15. An Integrated Experiment Specification and Visualization Tool for Testbed Emulation. Lunquan Li, Peng Liu and George Kesidis. DETER Community Workshop on Cyber Security Experimentation and Test, Arlington, Virginia, Jun 2006
  16. Integrated Scientific Workflow Management for the Emulab Network Testbed. Eric Eide, Leigh Stoller, Tim Stack, Juliana Freire, Jay Lepreau. Proceedings of the 2006 USENIX Annual Technical Conference, pages 363-368, Boston, MA, May-Jun 2006
  17. An Architecture for Internet Data Transfer. Niraj Tolia, Michael Kaminsky, David G. Andersen, Swapnil Patil. NSDI '06, pages 253–266, San Jose, CA, May 2006
  18. Experience with DETER: A Testbed for Security Research. Terry Benzel, Robert Braden, Dongho Kim, Clifford Neuman, Anthony Joseph, Keith Sklower, Ron Ostrenga and Stephen Schwab. Tridentcom (International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities), Mar 2006
  19. FastPass: Providing First-Packet Delivery. Dan Wendlandt, David G. Andersen, Adrian Perrig. Technical Report CMU-CyLab-06-005, Carnegie Mellon University, Mar 2006
  20. OverDoSe: A Generic DDoS Protection Service Using and Overlay Network. Elaine Shi, Ion Stoica, David Andersen, Adrian Perrig. Technical Report CMU-CS-06-114, Carnegie Mellon University, Feb 2006
  21. Postmodern Internetwork Architecture. Bobby Bhattacharjee, Ken Calvert, Jim Griffioen, Neil Spring, James Sterbenz. Technical Report ITTC-FY2006-TR-45030-01, University of Kansas, Feb 2006
  22. Declarative Networking: Language, Execution and Optimization. Boon Thau Loo, Tyson Condie, Minos Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica. International Conference on Management of Data, pages 97-108, 2006
  23. Enabling Live Internet Broadcasting Using an Application Endpoint Architecture. Yang-hua Chu. Technical Report CMU-CS-05-133, Carnegie Mellon University, May 2005
  24. A Distributed Architecture for Interactive Multiplayer Games. Ashwin R. Bharambe, Jeff Pang, Srinivasan Seshan. Technical Report CMU-CS-05-112, Carnegie Mellon University, Jan 2005
  25. Cyber defense technology networking and evaluation. R. Bajcsy, et al.. Communications of the ACM, Special issue on Emerging Technologies for Homeland Security, Vol. 47 No. 3, pages 58-61, Mar 2004
  26. BANANAS: An Evolutionary Framework for Explicit and Multipath Routing in the Internet. H. Tahilramani Kaur, S. Kalyanaraman, A. Weiss, S. Kanwar, A. Gandhi. Proceedings of the ACM SIGCOMM Workshop on Future Directions in Network Architecture (FDNA), pages 277-288, Karlsruhe, Germany, Aug 2003
  27. An Integrated Experimental Environment for Distributed Systems and Networks. B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, A. Joglekar. Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI 2002), Dec 2002
  28. Shared memory consistency protocol verification against weak memory models: refinement via model-checking. Prosenjit Chatterjee, Hemanthkumar Sivaraj, Ganesh Gopalakrishnan. Proceedings of the 14th International Conference on Computer Aided Verification (CAV 2002), Jul 2002
  29. Design and Evaluation of a Continuous Consistency Model for Replicated Services. Haifeng Yu, Amin Vahdat. OSDI '00, pages 305-318, San Diego, CA, Oct 2000

Wide-area Experiments

  1. Colyseus: A Distributed Architecture for Online Multiplayer Games. Ashwin Bharambe, Jeffrey Pang, Srinivasan Seshan. NSDI 2006, pages 155-168, San Jose, CA, May 2006
  2. Subtleties in Tolerating Correlated Failures in Wide-area Storage Systems. Suman Nath, Haifeng Yu, Phillip B. Gibbons, Srinivasan Seshan. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006, May 2006
  3. Middleware Support for Locality-aware Wide area Replication. Sai Susarla, John Carter. Technical Report UUCS-04-017, University of Utah, Nov 2004
  4. Buddy-Cache, High Performance Object Storage for Collaborative Strong Consistency Applications in a WAN. Magnus Bjornsson and Liuba Shrira. ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2002), Nov 2002
  5. The Costs and Limits of Availability for Replicated Services. Haifeng Yu, Amin Vahdat. SOSP '01, pages 29-42, Banff, Canada, Oct 2001

Wireless

  1. Experimental evaluation of TCP performance in multi-rate 802.11 WLANs. Naeem Khademi, Michael Welzl, Stein Gjessing. IEEE WoWMoM 2012, San Francisco, US, Jun 2012
  2. Non-Intrusive, Dynamic Interference Detection for 802.11 Networks. Kan Cai, Michael Blackstock, Michael J. Feeley, Charles Krasic. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, Chicago, Illinois, 2009
  3. Ditto: A System for Opportunistic Caching in Multi-hop Wireless Mesh Networks. Fahad Dogar, Amar Phanishayee, Himabindu Pucha, Olatunji Ruwase, David Andersen. ACM MobiCom, San Francisco, Sep 2008
  4. Cognitive Geolocation. A. Farhang and N. Patwari. University of Utah Undergraduate Research Symposium, Apr 2008
  5. Entropic Analysis Of Spectrum Sensing For Cognitive Radio. J. Gaines and N. Patwari. University of Utah Undergraduate Research, Apr 2008
  6. Exploiting Parallel Networks Using Dynamic Channel Scheduling. Lara B. Deek, Kevin C. Almeroth, Mike P. Wittie, Khaled A. Harras. Proceedings of the 4th Annual International Conference on Wireless Internet, Maui, Hawaii, 2008
  7. Efficient Packet Error Rate Estimation in Wireless Networks. Bo Han, Seungjoon Lee. IEEE/Create-Net TridentCom, May 2007
  8. WISE Abstraction Framework For Wireless Networks. Seungjoon Lee. Thesis, University of Maryland, 2006

Uncategorized

  1. Agent Organization and Request Propagation in the Knowledge Plane. Ji Li, Karen Sollins. Technical Report MIT-CSAIL-TR-2007-039, MIT Computer Science and Artificial Intelligence Laboratory, Jul 2007
  2. . .