Quantcast
Channel: College of Arts and Sciences
Browsing all 1561 articles
Browse latest View live

Scather: programming with multi-party computation and MapReduce

Scather: programming with multi-party computation and MapReduce Volgushev, Nikolaj; Lapets, Andrei; Bestavros, Azer We present a prototype of a distributed computational infrastructure, an associated...

View Article


Programming support for an integrated multi-party computation and MapReduce...

Programming support for an integrated multi-party computation and MapReduce infrastructure Volgushev, Nikolaj; Lapets, Andrei; Bestavros, Azer We describe and present a prototype of a distributed...

View Article


Linear arrangement of Halin graphs

Linear arrangement of Halin graphs Kfoury, Assaf; Mirzaei, Saber We study the Optimal Linear Arrangement (OLA) problem of Halin graphs, one of the simplest classes of non-outerplanar graphs. We present...

View Article

Managing NFV using SDN and control theory

Managing NFV using SDN and control theory Akhtar, Nabeel; Matta, Ibrahim; Wang, Yuefeng Control theory and SDN (Software Defined Networking) are key components for NFV (Network Function Virtualization)...

View Article

A recursive approach to network management

A recursive approach to network management Wang, Yuefeng; Matta, Ibrahim Nowadays there is an increasing need for a general management paradigm which can simplify network management and further enable...

View Article


Minimum average delay of routing trees

Minimum average delay of routing trees Mirzaei, Saber The general communication tree embedding problem is the problem of mapping a set of communicating terminals, represented by a graph G, into the set...

View Article

EbbRT: a framework for building per-application library operating systems

EbbRT: a framework for building per-application library operating systems Schatzberg, Dan; Cadden, James; Dong, Han; Krieger, Orran; Appavoo, Jonathan Efficient use of high speed hardware requires...

View Article

Shortest path and maximum flow problems in planar flow networks with additive...

Shortest path and maximum flow problems in planar flow networks with additive gains and losses Mirzaei, Saber; Kfoury, Assaf In contrast to traditional flow networks, in additive flow networks, to...

View Article


What’s in it for me? Incentive-compatible route coordination of crowdsourced...

What’s in it for me? Incentive-compatible route coordination of crowdsourced resources Bassem, Christine; Bestavros, Azer With the recent trend in crowdsourcing, i.e., using the power of crowds to...

View Article


Scheduling of data-intensive workloads in a brokered virtualized environment

Scheduling of data-intensive workloads in a brokered virtualized environment Bassem, Christine; Bestavros, Azer Providing performance predictability guarantees is increasingly important in cloud...

View Article

PROVIDE: hiding from automated network scans with proofs of identity

PROVIDE: hiding from automated network scans with proofs of identity Koch, William; Bestavros, Azer Network scanners are a valuable tool for researchers and administrators, however they are also used...

View Article

Secure multi-party computation for analytics deployed as a lightweight web...

Secure multi-party computation for analytics deployed as a lightweight web application Lapets, Andrei; Volgushev, Nikolaj; Bestavros, Azer; Jansen, Frederick; Varia, Mayank We describe the definition,...

View Article

Markov modeling of moving target defense games

Markov modeling of moving target defense games Maleki, Hoda; Valizadeh, Mohammad; Koch, William; Bestavros, Azer; van Dijk, Marten van Dijk We introduce a Markov-model-based framework for Moving Target...

View Article


The effect of competition among brokers on the quality and price of...

The effect of competition among brokers on the quality and price of differentiated internet services Ghasemi, Maryam; Matta, Ibrahim; Esposito, Flavio Price war, as an important factor in undercutting...

View Article

Hyp3rArmor: reducing web application exposure to automated attacks

Hyp3rArmor: reducing web application exposure to automated attacks Koch, William; Bestavros, Azer Web applications (webapps) are subjected constantly to automated, opportunistic attacks from autonomous...

View Article


The story of Supreme Court politicization: The mass public v elite divide

The story of Supreme Court politicization: The mass public v elite divide Pastore, Matthew This paper explores how throughout American history, a divide in opinion has formed between the class of...

View Article

Public policy and economic fear: an experimental approach

Public policy and economic fear: an experimental approach Thesing, Benjamin Political scientists have long studied the connection between macroeconomic performance and presidential approval, electoral...

View Article


Democracy deserved? An analysis of statehood for Washington, D.C.

Democracy deserved? An analysis of statehood for Washington, D.C. Beal, Catherine Washington, D.C. was established to provide a sovereign space for the federal government to operate without the threat...

View Article

The relationship between the American public and demographics on the Supreme...

The relationship between the American public and demographics on the Supreme Court: an investigation of “The Harvard- Yale-ification of the Supreme Court.” Cohen, Julia There are currently only two law...

View Article

Buffer zone laws: tracking the evolution of the First Amendment in the modern...

Buffer zone laws: tracking the evolution of the First Amendment in the modern U.S. Supreme Court and its impact on state legislation Blankman, Alexandra

View Article
Browsing all 1561 articles
Browse latest View live