Impacting IP prefix reachability via RPKI manipulations
Impacting IP prefix reachability via RPKI manipulations Brogle, Kyle; Cooper, Danny; Goldberg, Sharon; Reyzin, Leonid The RPKI is an infrastructure that will provide digitally signed attestations for...
View ArticleA typing theory for flow networks (part I)
A typing theory for flow networks (part I) Kfoury, Assaf A flow network N is a capacited finite directed graph, with multiple sources (or input arcs) and multiple sinks (or output arcs). A flow f in N...
View ArticleStrategic and operational services for workload management in the cloud (PhD...
Strategic and operational services for workload management in the cloud (PhD thesis) Ishakian, Vatche In hosting environments such as Infrastructure as a Service (IaaS) clouds, desirable application...
View ArticleReusable requirements in automated verification of distributed systems
Reusable requirements in automated verification of distributed systems Skowyra, Rick; Lapets, Andrei; Bestavros, Azer; Kfoury, Assaf The growing popularity of infrastructure-as-a-service cloud...
View ArticleOptimizing on-demand resource deployment for peer-assisted content delivery...
Optimizing on-demand resource deployment for peer-assisted content delivery (PhD thesis) Sweha, Raymond Increasingly, content delivery solutions leverage client resources in exchange for service in a...
View ArticleSoftware-defined IDS for securing embedded mobile devices
Software-defined IDS for securing embedded mobile devices Skowyra, Rick; Bahargam, Sanaz; Bestavros, Azer The increasing deployment of networked mobile embedded devices leads to unique challenges in...
View ArticleTotal order broadcast for fault tolerant exascale systems
Total order broadcast for fault tolerant exascale systems Schatzberg, Dan; Cadden, James; Krieger, Orran; Appavoo, Jonathan In the process of designing a new fault tolerant run-time for future exascale...
View ArticleUsing alloy to formally model and reason about an OpenFlow network switch
Using alloy to formally model and reason about an OpenFlow network switch Mirzaei, Saber; Bahargam, Sanaz; Skowyra, Richard; Kfoury, Assaf; Bestavros, Azer Openflow provides a standard interface for...
View ArticleInferring hidden features in the Internet (PhD thesis)
Inferring hidden features in the Internet (PhD thesis) Gursun, Gonca The Internet is a large-scale decentralized system that is composed of thousands of independent networks. In this system, there are...
View ArticleJTP, an energy-aware transport protocol for mobile ad hoc networks (PhD thesis)
JTP, an energy-aware transport protocol for mobile ad hoc networks (PhD thesis) Riga, Niky Wireless ad-hoc networks are based on a cooperative communication model, where all nodes not only generate...
View ArticleVINEA: a policy-based virtual network embedding architecture
VINEA: a policy-based virtual network embedding architecture Esposito, Flavio; Matta, Ibrahim; Wang, Yuefeng Network virtualization has enabled new business models by allowing infrastructure providers...
View ArticleA policy-based architecture for virtual network embedding (PhD thesis)
A policy-based architecture for virtual network embedding (PhD thesis) Esposito, Flavio Network virtualization is a technology that enables multiple virtual instances to coexist on a common physical...
View ArticleRINA: an architecture for policy-based dynamic service management
RINA: an architecture for policy-based dynamic service management Wang, Yuefeng; Esposito, Flavio; Matta, Ibrahim; Day, John Management is a vital component for delivering requested network services....
View ArticleRecursive InterNetworking Architecture (RINA) Boston University prototype...
Recursive InterNetworking Architecture (RINA) Boston University prototype programming manual (version 1.0) Wang, Yuefeng; Esposito, Flavio; Matta, Ibrahim; Day, John The lack of a complete Internet...
View ArticleQuest-V: a virtualized multikernel for safety-critical real-time systems
Quest-V: a virtualized multikernel for safety-critical real-time systems West, Richard; Li, Ye; Missimer, Eric Modern processors are increasingly featuring multiple cores, as well as support for...
View ArticleA compositional approach to network algorithms
A compositional approach to network algorithms Kfoury, Assaf We present elements of a typing theory for flow networks, where “types”, “typings”, and “type inference” are formulated in terms of familiar...
View ArticlePredictable migration and communication in the Quest-V multikernal
Predictable migration and communication in the Quest-V multikernal Li, Ye; Missimer, Eric; West, Richard Quest-V is a system we have been developing from the ground up, with objectives focusing on...
View ArticleTowards an open cloud marketplace: vision and first steps
Towards an open cloud marketplace: vision and first steps Bestavros, Azer; Krieger, Orran As one of the most promising, emerging concepts in Information Technology (IT), cloud computing is transforming...
View ArticleHow to collect high quality segmentations: use human or computer drawn object...
How to collect high quality segmentations: use human or computer drawn object boundaries? Gurari, Danna; Wu, Zheng; Isenberg, Brett; Zhang, Chentian; Purwada, Alberto; Wong, Joyce; Betke, Margrit High...
View ArticleThe Quest-V separation kernel for mixed criticality systems
The Quest-V separation kernel for mixed criticality systems Li, Ye; West, Richard; Missimer, Eric Multi- and many-core processors are becoming increasingly popular in embedded systems. Many of these...
View Article