• Publications
  • Influence
Modeling TCP throughput: a simple model and its empirical validation
TLDR
In this paper we develop a simple analytic characterization of the steady state throughput, as a function of loss rate and round trip time for a bulk transfer TCP flow, i.e., a flow with an unlimited amount of data to send. Expand
  • 2,574
  • 198
  • PDF
Modeling TCP Reno performance: a simple model and its empirical validation
TLDR
The steady-state performance of a bulk transfer TCP flow (i.e., a flow with a large amount of data to send, such as FTP transfers) may be characterized by the send rate as a function of loss rate and round trip time (RTT). Expand
  • 1,232
  • 118
  • PDF
Fluid-based analysis of a network of AQM routers supporting TCP flows with an application to RED
TLDR
In this paper we use jump process driven Stochastic Differential Equations to model the interactions of a set of TCP flows and Active Queue Management routers in a network setting. Expand
  • 1,054
  • 114
  • PDF
Analysis and design of controllers for AQM routers supporting TCP flows
TLDR
This paper does three things: 1) it relates key network parameters such as number of TCP sessions, link capacity and round-trip time to the underlying feedback control problem; 2) it analyzes the present de facto AQM standard: random early detection (RED) and determines that REDs queue-averaging is not beneficial; and 3) it recommends alternative AQM schemes which amount to classical proportional and proportional-integral control. Expand
  • 870
  • 113
  • PDF
A control theoretic analysis of RED
TLDR
We use a previously developed nonlinear dynamic model of TCP to analyze and design active queue management (AQM) control systems using random early detection (RED). Expand
  • 1,020
  • 102
  • PDF
On designing improved controllers for AQM routers supporting TCP flows
TLDR
We study a previously developed linearized model of TCP and active queue management (AQM). Expand
  • 1,027
  • 98
  • PDF
Resisting structural re-identification in anonymized social networks
TLDR
In this paper, we introduce a parameterized model of structural knowledge available to the adversary and quantify the success of attacks on individuals in anonymized networks. Expand
  • 413
  • 60
  • PDF
Diffusion-Convolutional Neural Networks
TLDR
We present diffusion-convolutional neural networks (DCNNs), a new model for graph-structured data and explore their performance at various classification tasks on graphical data. Expand
  • 540
  • 58
  • PDF
On distinguishing between Internet power law topology generators
  • T. Bu, D. Towsley
  • Computer Science
  • Proceedings.Twenty-First Annual Joint Conference…
  • 7 November 2002
TLDR
We evaluate the effectiveness of these generators to generate representative AS-level topologies. Expand
  • 574
  • 57
  • PDF
Code red worm propagation modeling and analysis
TLDR
We derive a general Internet worm model called the two-factor worm model by accounting for two factors: one is the dynamic countermeasures taken by ISPs and users; the other is the slowed down worm infection rate because Code Red rampant propagation caused congestion and troubles to some routers. Expand
  • 839
  • 54
  • PDF
...
1
2
3
4
5
...