HIL: designing an exokernel for the data center
HIL: designing an exokernel for the data center Hennessey, Jason; Tikale, Sahil; Turk, Ata; Kaynar, Emine Ugur; Hill, Chris; Desnoyers, Peter; Krieger, Orran We propose a new Exokernel-like layer to...
View ArticleThe theory and history of authenticity
The theory and history of authenticity Lindholm, Charles Unpublished manuscript book chapter related to the book Culture and Authenticity (2007), Oxford: Basil Blackwell.
View ArticleThe real self: authenticity in the USA
The real self: authenticity in the USA Lindholm, Charles Unpublished manuscript book chapter related to the book Culture and Authenticity (2007), Oxford: Basil Blackwell.
View ArticleArabesk
Arabesk Lindholm, Charles Unpublished manuscript book chapter related to the book Culture and Authenticity (2007), Oxford: Basil Blackwell.
View ArticleFredrik Barth: in memoriam
Fredrik Barth: in memoriam Lindholm, Charles First published on Anthropology News, April 22, 2016. DOI: 10.1111/j.1556-3502.2016.570302.x
View ArticleGenerous envy
Generous envy Lindholm, Charles The willingness to share depends on different motifs – even envy. Examples from Pakistan, Latin America and the USA. Photo credits: The pictures were taken by Cherry...
View ArticleBook review – The Pathan Unarmed
Book review – The Pathan Unarmed Lindholm, Charles Book review of The Pathan Unarmed: Opposition and Memory in the North West Frontier by Mukulika Banerjee from Oxford University Press 2001 238pp. This...
View ArticleMoving in next door: Network flooding as a side channel in cloud environments
Moving in next door: Network flooding as a side channel in cloud environments Agarwal, Yatharth; Murale, Vishnu; Hennessey, Jason; Hogan, Kyle; Varia, Mayank Co-locating multiple tenants' virtual...
View ArticleOn distributed virtual network embedding with guarantees
On distributed virtual network embedding with guarantees Esposito, Flavio; Di Paola, Donato; Matta, Ibrahim To provide wide-area network services, resources from different infrastructure providers are...
View ArticleA compositional approach to the max-flow problem
A compositional approach to the max-flow problem Kfoury, Assaf Although written as a friendly rejoinder to two negative reviews of a 10-page extended abstract, entitled “A Compositional Approach to...
View ArticleAn alloy verification model for consensus-based auction protocols
An alloy verification model for consensus-based auction protocols Mirzaei, Saber; Esposito, Flavio Max Consensus-based Auction (MCA) protocols are an elegant approach to establish conflict-free...
View ArticleProgramming routing policies for video traffic
Programming routing policies for video traffic Wang, Yuefeng; Akhtar, Nabeel; Matta, Ibrahim Making the network programmable simplifies network management and enables network innovations. The Recursive...
View ArticleSDN management layer: design requirements and future direction
SDN management layer: design requirements and future direction Wang, Yuefeng; Matta, Ibrahim Computer networks are becoming more and more complex and difficult to manage. The research community has...
View ArticleImproving distributed virtual network embedding with offline optimization
Improving distributed virtual network embedding with offline optimization Tazine, Samir; Matta, Ibrahim To cope with the complexity of the ever changing internet architecture, network virtualization...
View ArticleEnd-to-end informed VM selection in compute clouds
End-to-end informed VM selection in compute clouds Teixeira, Mario; Bestavros, Azer The selection of resources, particularly VMs, in current public IaaS clouds is usually done in a blind fashion, as...
View ArticleNetwork-constrained packing of brokered workloads in virtualized environments
Network-constrained packing of brokered workloads in virtualized environments Bassem, Christine; Bestavros, Azer Providing resource allocation with performance predictability guarantees is increasingly...
View ArticleMulti-layer virtual transport network management (PhD thesis)
Multi-layer virtual transport network management (PhD thesis) Wang, Yuefeng Nowadays there is an increasing need for a general paradigm that can simplify network management and further enable network...
View ArticleEbbRT: a customizable operating system for cloud applications
EbbRT: a customizable operating system for cloud applications Schatzberg, Dan; Cadden, James; Dong, Han; Krieger, Orran; Appavoo, Jonathan Efficient use of hardware requires operating system components...
View ArticleEfficient reassembling of graphs, part 1: The linear case
Efficient reassembling of graphs, part 1: The linear case Kfoury, Assaf; Mirzaei, Saber The reassembling of a simple connected graph G = (V, E) is an abstraction of a problem arising in earlier studies...
View ArticleWeb-based multi-party computation with application to anonymous aggregate...
Web-based multi-party computation with application to anonymous aggregate compensation analytics Lapets, Andrei; Dunton, Eric; Holzinger, Kyle; Jansen, Frederick; Bestavros, Azer We describe the...
View Article