Scather: programming with multi-party computation and MapReduce
Scather: programming with multi-party computation and MapReduce Volgushev, Nikolaj; Lapets, Andrei; Bestavros, Azer We present a prototype of a distributed computational infrastructure, an associated...
View ArticleProgramming support for an integrated multi-party computation and MapReduce...
Programming support for an integrated multi-party computation and MapReduce infrastructure Volgushev, Nikolaj; Lapets, Andrei; Bestavros, Azer We describe and present a prototype of a distributed...
View ArticleLinear arrangement of Halin graphs
Linear arrangement of Halin graphs Kfoury, Assaf; Mirzaei, Saber We study the Optimal Linear Arrangement (OLA) problem of Halin graphs, one of the simplest classes of non-outerplanar graphs. We present...
View ArticleManaging NFV using SDN and control theory
Managing NFV using SDN and control theory Akhtar, Nabeel; Matta, Ibrahim; Wang, Yuefeng Control theory and SDN (Software Defined Networking) are key components for NFV (Network Function Virtualization)...
View ArticleA recursive approach to network management
A recursive approach to network management Wang, Yuefeng; Matta, Ibrahim Nowadays there is an increasing need for a general management paradigm which can simplify network management and further enable...
View ArticleMinimum average delay of routing trees
Minimum average delay of routing trees Mirzaei, Saber The general communication tree embedding problem is the problem of mapping a set of communicating terminals, represented by a graph G, into the set...
View ArticleEbbRT: a framework for building per-application library operating systems
EbbRT: a framework for building per-application library operating systems Schatzberg, Dan; Cadden, James; Dong, Han; Krieger, Orran; Appavoo, Jonathan Efficient use of high speed hardware requires...
View ArticleShortest path and maximum flow problems in planar flow networks with additive...
Shortest path and maximum flow problems in planar flow networks with additive gains and losses Mirzaei, Saber; Kfoury, Assaf In contrast to traditional flow networks, in additive flow networks, to...
View ArticleWhat’s in it for me? Incentive-compatible route coordination of crowdsourced...
What’s in it for me? Incentive-compatible route coordination of crowdsourced resources Bassem, Christine; Bestavros, Azer With the recent trend in crowdsourcing, i.e., using the power of crowds to...
View ArticleScheduling of data-intensive workloads in a brokered virtualized environment
Scheduling of data-intensive workloads in a brokered virtualized environment Bassem, Christine; Bestavros, Azer Providing performance predictability guarantees is increasingly important in cloud...
View ArticlePROVIDE: hiding from automated network scans with proofs of identity
PROVIDE: hiding from automated network scans with proofs of identity Koch, William; Bestavros, Azer Network scanners are a valuable tool for researchers and administrators, however they are also used...
View ArticleSecure multi-party computation for analytics deployed as a lightweight web...
Secure multi-party computation for analytics deployed as a lightweight web application Lapets, Andrei; Volgushev, Nikolaj; Bestavros, Azer; Jansen, Frederick; Varia, Mayank We describe the definition,...
View ArticleMarkov modeling of moving target defense games
Markov modeling of moving target defense games Maleki, Hoda; Valizadeh, Mohammad; Koch, William; Bestavros, Azer; van Dijk, Marten van Dijk We introduce a Markov-model-based framework for Moving Target...
View ArticleThe effect of competition among brokers on the quality and price of...
The effect of competition among brokers on the quality and price of differentiated internet services Ghasemi, Maryam; Matta, Ibrahim; Esposito, Flavio Price war, as an important factor in undercutting...
View ArticleHyp3rArmor: reducing web application exposure to automated attacks
Hyp3rArmor: reducing web application exposure to automated attacks Koch, William; Bestavros, Azer Web applications (webapps) are subjected constantly to automated, opportunistic attacks from autonomous...
View ArticleThe story of Supreme Court politicization: The mass public v elite divide
The story of Supreme Court politicization: The mass public v elite divide Pastore, Matthew This paper explores how throughout American history, a divide in opinion has formed between the class of...
View ArticlePublic policy and economic fear: an experimental approach
Public policy and economic fear: an experimental approach Thesing, Benjamin Political scientists have long studied the connection between macroeconomic performance and presidential approval, electoral...
View ArticleDemocracy deserved? An analysis of statehood for Washington, D.C.
Democracy deserved? An analysis of statehood for Washington, D.C. Beal, Catherine Washington, D.C. was established to provide a sovereign space for the federal government to operate without the threat...
View ArticleThe relationship between the American public and demographics on the Supreme...
The relationship between the American public and demographics on the Supreme Court: an investigation of “The Harvard- Yale-ification of the Supreme Court.” Cohen, Julia There are currently only two law...
View ArticleBuffer zone laws: tracking the evolution of the First Amendment in the modern...
Buffer zone laws: tracking the evolution of the First Amendment in the modern U.S. Supreme Court and its impact on state legislation Blankman, Alexandra
View Article