—In a long-haul sensor network, sensors are remotely deployed over a large geographical area to perform certain tasks, such as target tracking. In this work, we study the scenari...
Qiang Liu, Xin Wang, Nageswara S. V. Rao, Katharin...
—It has been recently discovered that heavy-tailed completion times can result from protocol interaction even when file sizes are light-tailed. A key to this phenomenon is the u...
Jayakrishnan Nair, Martin Andreasson, Lachlan L. H...
Abstract—Congestion control becomes indispensable in highlyutilized consolidated networks running demanding applications. In this paper, proactive congestion management schemes f...
Nikolaos Chrysos, Lydia Y. Chen, Christoforos Kach...
—We present the architecture and protocols of ROME, a layer-2 network designed to be backwards compatible with Ethernet and scalable to tens of thousands of switches and millions...
Abstract—This paper studies the problem of detecting the information source in a network in which the spread of information follows the popular Susceptible-Infected-Recovered (SI...
—Proportional Fair (PF) scheduling algorithms are the de-facto standard in cellular networks. They exploit the users’ channel state diversity (induced by fast-fading), and are ...
Robert Margolies, Ashwin Sridharan, Vaneet Aggarwa...
—To provide wide-area network services, resources from different infrastructure providers are needed. Leveraging the consensus-based resource allocation literature, we propose a ...
—We consider a distributed multi-user system where individual entities possess observations or perceptions of one another, while the truth is only known to themselves and they mi...
—Access Control Lists (ACLs) are the core of many networking and security devices. As new threats and vulnerabilities emerge, ACLs on routers and firewalls are getting larger. T...