Running multiple virtual networks, customized for different performance objectives, is a promising way to support diverse applications over a shared substrate. Despite being simpl...
Despite the many research activities that are performed in the field of attack prevention, detection, and mitigation, largescale attacks like Distributed Denial-of-Service (DDoS) ...
We address the problem of finding indirect overlay paths that reduce the latency between pairs of nodes in an overlay. To this end we propose to rely on an Internet Coordinate Sys...
Recent research on Internet traffic classification algorithms has yielded a flurry of proposed approaches for distinguishing types of traffic, but no systematic comparison of the ...
Hyunchul Kim, Kimberly C. Claffy, Marina Fomenkov,...
Internet service providers (ISPs) depend on one another to provide global network services. However, the profit-seeking nature of the ISPs leads to selfish behaviors that result i...
Richard T. B. Ma, Dah-Ming Chiu, John C. S. Lui, V...
We consider the problem of improving network capacity in wireless mesh networks from the angle of multi-flow diversity. As consecutive packets on a multihop path can interfere wit...
In this poster, we investigate the characteristics of online commenting behaviors which can influence on the popularity of various online contents, such as user created contents. ...
The current interdomain routing protocol, BGP, is not resilient to a path failure due to its single-path and slowlyconverging route calculation. This paper proposes a novel approa...