Quantcast
Channel: College of Arts and Sciences
Browsing all 1561 articles
Browse latest View live

Impacting IP prefix reachability via RPKI manipulations

Impacting IP prefix reachability via RPKI manipulations Brogle, Kyle; Cooper, Danny; Goldberg, Sharon; Reyzin, Leonid The RPKI is an infrastructure that will provide digitally signed attestations for...

View Article


A typing theory for flow networks (part I)

A typing theory for flow networks (part I) Kfoury, Assaf A flow network N is a capacited finite directed graph, with multiple sources (or input arcs) and multiple sinks (or output arcs). A flow f in N...

View Article


Strategic and operational services for workload management in the cloud (PhD...

Strategic and operational services for workload management in the cloud (PhD thesis) Ishakian, Vatche In hosting environments such as Infrastructure as a Service (IaaS) clouds, desirable application...

View Article

Reusable requirements in automated verification of distributed systems

Reusable requirements in automated verification of distributed systems Skowyra, Rick; Lapets, Andrei; Bestavros, Azer; Kfoury, Assaf The growing popularity of infrastructure-as-a-service cloud...

View Article

Optimizing on-demand resource deployment for peer-assisted content delivery...

Optimizing on-demand resource deployment for peer-assisted content delivery (PhD thesis) Sweha, Raymond Increasingly, content delivery solutions leverage client resources in exchange for service in a...

View Article


Software-defined IDS for securing embedded mobile devices

Software-defined IDS for securing embedded mobile devices Skowyra, Rick; Bahargam, Sanaz; Bestavros, Azer The increasing deployment of networked mobile embedded devices leads to unique challenges in...

View Article

Total order broadcast for fault tolerant exascale systems

Total order broadcast for fault tolerant exascale systems Schatzberg, Dan; Cadden, James; Krieger, Orran; Appavoo, Jonathan In the process of designing a new fault tolerant run-time for future exascale...

View Article

Using alloy to formally model and reason about an OpenFlow network switch

Using alloy to formally model and reason about an OpenFlow network switch Mirzaei, Saber; Bahargam, Sanaz; Skowyra, Richard; Kfoury, Assaf; Bestavros, Azer Openflow provides a standard interface for...

View Article


Inferring hidden features in the Internet (PhD thesis)

Inferring hidden features in the Internet (PhD thesis) Gursun, Gonca The Internet is a large-scale decentralized system that is composed of thousands of independent networks. In this system, there are...

View Article


JTP, an energy-aware transport protocol for mobile ad hoc networks (PhD thesis)

JTP, an energy-aware transport protocol for mobile ad hoc networks (PhD thesis) Riga, Niky Wireless ad-hoc networks are based on a cooperative communication model, where all nodes not only generate...

View Article

VINEA: a policy-based virtual network embedding architecture

VINEA: a policy-based virtual network embedding architecture Esposito, Flavio; Matta, Ibrahim; Wang, Yuefeng Network virtualization has enabled new business models by allowing infrastructure providers...

View Article

A policy-based architecture for virtual network embedding (PhD thesis)

A policy-based architecture for virtual network embedding (PhD thesis) Esposito, Flavio Network virtualization is a technology that enables multiple virtual instances to coexist on a common physical...

View Article

RINA: an architecture for policy-based dynamic service management

RINA: an architecture for policy-based dynamic service management Wang, Yuefeng; Esposito, Flavio; Matta, Ibrahim; Day, John Management is a vital component for delivering requested network services....

View Article


Recursive InterNetworking Architecture (RINA) Boston University prototype...

Recursive InterNetworking Architecture (RINA) Boston University prototype programming manual (version 1.0) Wang, Yuefeng; Esposito, Flavio; Matta, Ibrahim; Day, John The lack of a complete Internet...

View Article

Quest-V: a virtualized multikernel for safety-critical real-time systems

Quest-V: a virtualized multikernel for safety-critical real-time systems West, Richard; Li, Ye; Missimer, Eric Modern processors are increasingly featuring multiple cores, as well as support for...

View Article


A compositional approach to network algorithms

A compositional approach to network algorithms Kfoury, Assaf We present elements of a typing theory for flow networks, where “types”, “typings”, and “type inference” are formulated in terms of familiar...

View Article

Predictable migration and communication in the Quest-V multikernal

Predictable migration and communication in the Quest-V multikernal Li, Ye; Missimer, Eric; West, Richard Quest-V is a system we have been developing from the ground up, with objectives focusing on...

View Article


Towards an open cloud marketplace: vision and first steps

Towards an open cloud marketplace: vision and first steps Bestavros, Azer; Krieger, Orran As one of the most promising, emerging concepts in Information Technology (IT), cloud computing is transforming...

View Article

How to collect high quality segmentations: use human or computer drawn object...

How to collect high quality segmentations: use human or computer drawn object boundaries? Gurari, Danna; Wu, Zheng; Isenberg, Brett; Zhang, Chentian; Purwada, Alberto; Wong, Joyce; Betke, Margrit High...

View Article

The Quest-V separation kernel for mixed criticality systems

The Quest-V separation kernel for mixed criticality systems Li, Ye; West, Richard; Missimer, Eric Multi- and many-core processors are becoming increasingly popular in embedded systems. Many of these...

View Article
Browsing all 1561 articles
Browse latest View live