Two classic categories of models exist for computer networks: network information flow and network of queues. The network information flow model appropriately captures the multi-ho...
Energy-efficiency is a key requirement in data centers today. Storage systems constitute a significant fraction of the energy consumed in a data center and therefore enterprise st...
Sriram Sankar, Sudhanva Gurumurthi, Mircea R. Stan
BitTorrent (BT) has become an extremely popular and successful peer-to-peer (P2P) file sharing system. Although empirical evidence suggests that most nodes participate in multiple...
A key obstacle to large-scale network simulation over PC clusters is the memory balancing problem where a memory-overloaded machine can slow down an entire simulation due to disk ...
Lifetime of a wireless sensor network is affected by key factors such as network architecture, network size, sensor node population model, data generation rate, initial battery bu...
Anonymity protocols are a privacy-enhancing technology for Internet-based communication. Two important characteristics of anonymity protocols are the strength of anonymity provide...
Andreas Hirt, Michael J. Jacobson Jr., Carey L. Wi...