Elliott Karpilovsky

Learn More
Our understanding of IPv6 deployment is surprisingly limited. In fact, it is not even clear how we should quantify IPv6 deployment. In this paper, we collect and analyze a variety of data to characterize the penetration of IPv6. We show that each analysis leads to somewhat different conclusions. For example: registry data shows IPv6 address allocations are(More)
Crises are frequent and varied, and may have profound effects on individuals and organizations. Effectively managing crises, regardless of their scope, requires the ability to quickly process potentially large amounts of information about a rapidly changing world. This paper presents a software architecture, the event web, that can be used to help(More)
[1] Observations of the OH column abundance have been made by the Fourier Transform Ultraviolet Spectrometer at the JPL Table Mountain Facility (TMF) near Los Angeles since July 1997. In the January 1998– December 2003 data set we used five OH lines to derive the OH column abundance in the atmosphere. This data set was used to quantify the OH(More)
This paper describes an approach for developing distributed applications that help deal with rapidly changing situations such as terrorist attacks, hurricanes and supply chain disruptions. Important characteristics of such applications are that they must handle unexpected events and that they are often modified on-the-fly, by multiple people who may belong(More)
IP multicast, after spending much of the last 20 years as the subject of research papers, protocol design efforts and limited experimental usage, is finally seeing significant deployment in production networks. The efficiency afforded by one-to-many network layer distribution is well-suited to such emerging applications as IPTV, file distribution,(More)
Running the Border Gateway Protocol (BGP), the Internet's interdomain routing protocol, consumes a large amount of memory. A BGP-speaking router typically stores one or more routes, each with multiple attributes, for more than 170,000 address blocks, and growing. When the router does not have enough memory to store a new route, it may crash or enter into(More)
The memory Internet routers use to store paths to destinations is expensive, and must be continually upgraded in the face of steadily increasing routing table size. Unfortunately, routing protocols are not designed to gracefully handle cases where memory becomes full, which arises increasingly often due to misconfigurations and routing table growth. Hence(More)
  • 1