Today's disruptive approaches to rearchitecting the Internet, e.g., Clean Slate Networking initiatives require testbeds that present unprecedented flexibility to the experimen...
Dan Levin, Andreas Wundsam, Amir Mehmood, Anja Fel...
Continuous monitoring and diagnosis of network performance are of crucial importance for the Internet access service and virtual private network (VPN) service providers. Various o...
Yao Zhao, Zhaosheng Zhu, Yan Chen, Dan Pei, Jia Wa...
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To ...
I/O Virtualization provides a convenient way of device sharing among guest domains in a virtualized platform (e.g. Xen). However, with the ever-increasing number and variety of dev...
Tracking and tracing individual items is a new and emerging trend in many industries. Driven by maturing technologies such as Radio-Frequency Identification (RFID) and upcoming s...
Rakesh Agrawal, Alvin Cheung, Karin Kailing, Stefa...