• Publications
  • Influence
Online aggregation
TLDR
A new online aggregation interface is proposed that permits users to both observe the progress of their aggregation queries and control execution on the fly, and a suite of techniques that extend a database system to meet these requirements are presented. Expand
SecondNet: a data center network virtualization architecture with bandwidth guarantees
TLDR
This paper proposes virtual data center (VDC) as the unit of resource allocation for multiple tenants in the cloud and introduces a centralized VDC allocation algorithm for bandwidth guaranteed virtual to physical mapping. Expand
Distributing streaming media content using cooperative networking
TLDR
This work considers the problem that arises when the server is overwhelmed by the volume of requests from its clients, and proposes Cooperative Networking (CoopNet), where clients cooperate to distribute content, thereby alleviating the load on the server. Expand
Resilient peer-to-peer streaming
TLDR
A simple tree management algorithm is presented that provides the necessary path diversity and an adaptation framework for MDC based on scalable receiver feedback is described, which shows very significant benefits in using multiple distribution trees and MDC, with a 22 dB improvement in PSNR in some cases. Expand
Policy-enabled handoffs across heterogeneous wireless networks
TLDR
A policy-enabled handoff system that allows users to express policies on what is the "best" wireless system at any moment, and make tradeoffs among network characteristics and dynamics such as cost, performance and power consumption is described. Expand
Permission Re-Delegation: Attacks and Defenses
TLDR
IPC Inspection prevents opportunities for permission redelegation by reducing an application's permissions after it receives communication from a less privileged application, and it is shown that it prevents the attacks found in the Android system applications. Expand
Enabling Security in Cloud Storage SLAs with CloudProof
TLDR
In CloudProof, customers can not only detect violations of integrity, write-serializability, and freshness, they can also prove the occurrence of these violations to a third party, which is critical to enabling security guarantees in SLAs. Expand
Automatic Misconfiguration Troubleshooting with PeerPressure
TLDR
A novel troubleshooting system: PeerPressure, which uses statistics from a set of sample machines to diagnose the root-cause misconfigurations on a sick machine, and introduces a ranking metric for misconfiguration candidates, based on empirical Bayesian estimation. Expand
Discoverer: Automatic Protocol Reverse Engineering from Network Traces
TLDR
The efficacy of Discoverer is evaluated over one text protocol (HTTP) and two binary protocols (RPC and CIFS/SMB) by comparing the authors' inferred formats with true formats obtained from Ethereal. Expand
An evaluation of scalable application-level multicast built using peer-to-peer overlays
TLDR
This paper reports the first head-to-head comparison of CAN-style versus Pastry-style overlay networks, using multicast communication workloads running on an identical simulation infrastructure and shows that Pastry provides better performance than CAN. Expand
...
1
2
3
4
5
...