The Tor anonymisation network allows services, such as web servers, to be operated under a pseudonym. In previous work Murdoch described a novel attack to reveal such hidden servi...
In this paper we present a scalable protocol for conducting periodic probes of network performance in a way that minimizes collisions between separate probes. The goal of the prot...
Richard Wolski, Benjamin Gaidioz, Bernard Touranch...
In this paper, we examine the benefits of split-TCP proxies, deployed in an operational world-wide network, for accelerating cloud services. We consider a fraction of a network co...
Abhinav Pathak, Angela Wang, Cheng Huang, Albert G...
Abstract— In our previous studies, we proposed ImTCP, an inline network measurement technique that can obtain available bandwidth information of the network path between sender a...
Many large-scale online services use structured storage to persist metadata and sometimes data. The structured storage is typically provided by standard database servers such as Mi...