The goal of this article is to raise a debate on the usefulness of providing data mining models as services on the internet. These services can be provided by anyone with adequate...
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
A computer system often has multiple power management modules controlling different power knobs. Uncoordinated operation of these knobs not only leads to suboptimal operation but ...
Aman Kansal, Jie Liu, Abhishek Singh, Ripal Nathuj...
Network emulation is valuable largely because of its ability to study applications running on real hosts and "somewhat real" networks. However, conservatively allocating...
Mike Hibler, Robert Ricci, Leigh Stoller, Jonathon...
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...