Abstract—Congestion control becomes indispensable in highlyutilized consolidated networks running demanding applications. In this paper, proactive congestion management schemes f...
Nikolaos Chrysos, Lydia Y. Chen, Christoforos Kach...
—We present the architecture and protocols of ROME, a layer-2 network designed to be backwards compatible with Ethernet and scalable to tens of thousands of switches and millions...
Abstract—This paper studies the problem of detecting the information source in a network in which the spread of information follows the popular Susceptible-Infected-Recovered (SI...
—Proportional Fair (PF) scheduling algorithms are the de-facto standard in cellular networks. They exploit the users’ channel state diversity (induced by fast-fading), and are ...
Robert Margolies, Ashwin Sridharan, Vaneet Aggarwa...
—To provide wide-area network services, resources from different infrastructure providers are needed. Leveraging the consensus-based resource allocation literature, we propose a ...
—We consider a distributed multi-user system where individual entities possess observations or perceptions of one another, while the truth is only known to themselves and they mi...
—Access Control Lists (ACLs) are the core of many networking and security devices. As new threats and vulnerabilities emerge, ACLs on routers and firewalls are getting larger. T...
Counting the number of RFID tags, or RFID counting, is needed by a wide array of important wireless applications. Motivated by its paramount practical importance, researchers have...
—Live media streaming has become one of the most popular applications over the Internet. We have witnessed the successful deployment of commercial systems with CDN- or peerto-pee...