• Publications
  • Influence
On power-law relationships of the Internet topology
TLDR
These power-laws hold for three snapshots of the Internet, between November 1997 and December 1998, despite a 45% growth of its size during that period, and can be used to generate and select realistic topologies for simulation purposes. Expand
BLINC: multilevel traffic classification in the dark
TLDR
This work presents a fundamentally different approach to classifying traffic flows according to the applications that generate them, based on observing and identifying patterns of host behavior at the transport layer and demonstrates the effectiveness of this approach on three real traces. Expand
Internet traffic classification demystified: myths, caveats, and the best practices
TLDR
This work critically revisit traffic classification by conducting a thorough evaluation of three classification approaches, based on transport layer ports, host behavior, and flow features, and extracts insights and recommendations for both the study and practical application of traffic classification. Expand
Transport layer identification of P2P traffic
TLDR
This paper develops a systematic methodology to identify P2P flows at the transport layer, i.e., based on connection patterns of P1P networks, and without relying on packet payload, and believes it is the first method for characterizing P2p traffic using only knowledge of network dynamics rather than any user payload. Expand
Is P2P dying or just hiding? [P2P traffic measurement]
TLDR
It is found that, if measured accurately, P2P traffic has never declined; indeed, the proportion of P 2P traffic decrease over time (any change is an increase) in any of the data sources. Expand
Gelling, and melting, large graphs by edge manipulation
TLDR
This work proposes effective and scalable algorithms to solve the dissemination of an entity on a large graph by shifting the problem to the level of edges and asking: which edges should be added or delete in order to speed-up or contain a dissemination. Expand
BiToS: Enhancing BitTorrent for Supporting Streaming Applications
TLDR
The approach gives higher download priority to pieces that are close to be reproduced by the player, in contrast to the original BT protocol, where pieces are downloaded in an out-of-order manner based solely on their rareness. Expand
A Cross-Layer Framework for Exploiting Virtual MISO Links in Mobile Ad Hoc Networks
TLDR
A novel multilayer approach for exploiting virtual MISO links in ad hoc networks that spans the physical, medium access control and routing layers, and provides a significant improvement in the end-to-end performance in terms of throughput and delay and robustness to mobility and interference-induced link failures. Expand
Power laws and the AS-level internet topology
TLDR
It is shown that the topology can be described efficiently with power laws and that the power laws hold even in the most recent and more complete topology with correlation coefficient above 99% for the degree-based power law. Expand
ProfileDroid: multi-layer profiling of android applications
TLDR
ProfileDroid is the first step towards a systematic approach for generating cost-effective but comprehensive app profiles, and identifying inconsistencies and surprising behaviors. Expand
...
1
2
3
4
5
...