Learn More
TTL caching models have recently regained significant research interest, largely due to their ability to fit popular caching policies such as LRU. In this extended abstract we briefly describe our recent work on two <i>exact</i> methods to analyze TTL cache networks. The first method generalizes existing results for line networks under renewal requests to(More)
BACKGROUND Use of raltegravir with optimum background therapy is effective and well tolerated in treatment-experienced patients with multidrug-resistant HIV-1 infection. We compared the safety and efficacy of raltegravir with efavirenz as part of combination antiretroviral therapy for treatment-naive patients. METHODS Patients from 67 study centres on(More)
BACKGROUND To reduce lipid abnormalities and other side-effects associated with antiretroviral regimens containing lopinavir-ritonavir, patients might want to switch one or more components of their regimen. We compared substitution of raltegravir for lopinavir-ritonavir with continuation of lopinavir-ritonavir in HIV-infected patients with stable viral(More)
TTL caching models have recently regained significant research interest due to their connection to popular caching policies such as LRU. This paper advances the state-of-the-art analysis of TTL-based cache networks by developing two exact methods with orthogonal generality and computational complexity. The first method generalizes existing results for line(More)
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious aspects have received much attention in the literature. Yet, several recent works propose to turn the table and employ so-called friendly jamming for the benefit of a wireless network. For example, recently proposed friendly jamming applications include hiding(More)
TTL cache models provide an attractive unified approximation framework for caching policies like LRU and FIFO, whose exact analysis is notoriously hard. In this paper, we advance the understanding of TTL models by explicitly considering stochastic capacity constraints. We find in particular that reducing the variance of the cache occupancy is instrumental(More)
Adversarial models of traffic generation replace probabilis-tic assumptions by considering the deterministic worst-case. The framework of adversarial queueing theory (AQT) has discovered unexpected results on the stability of networks and has seen continuous research efforts over more than 15 years. So far, almost all AQT results have been derived(More)
—Frequency jamming is known as an efficient attack tool to disrupt wireless communication. This efficiency can also be exploited for the benefit of a network – an idea often referred to as friendly jamming. A prominent application case is the blocking of unauthenticated or malicious communication such as injection attacks. In this work we propose access(More)
Wireless communication is inherently prone to disruption by interference. Frequency Hopping (FH) can counter interference and promises to enable communication again even in the presence of intentional interference by jammers. Evaluations of this anti-jamming technique and of corresponding strategies are, however, often limited to theoretical or simulation(More)
Most major content providers use content delivery networks (CDNs) to serve web and video content to their users. A CDN is a large distributed system of servers that caches and delivers content to users. The first-level cache in a CDN server is the memory-resident Hot Object Cache (HOC). A major goal of a CDN is to maximize the object hit ratio (OHR) of its(More)