Learn More
This paper presents the design, implementation, and experimental evaluation of CMAP (Conflict Maps), a system that increases the number of successful concurrent transmissions in a wireless network, achieving higher aggregate throughput compared to networks that use carrier sense multiple access (CSMA). CMAP correctly identifies and exploits exposed(More)
This paper presents SoftRate, a wireless bit rate adaptation protocol that is responsive to rapidly varying channel conditions. Unlike previous work that uses either frame receptions or signal-to-noise ratio (SNR) estimates to select bit rates, SoftRate uses confidence information calculated by the physical layer and exported to higher layers via the(More)
This paper presents the design, implementation, analysis, and experimental evaluation of <i>speak-up</i>, a defense against <i>application-level</i> distributed denial-of-service (DDoS), in which attackers cripple a server by sending legitimate-looking requests that consume computational resources (<i>e.g</i>., CPU cycles, disk). With speak-up, a victimized(More)
Over the past few years, researchers have developed many <i>cross-layer</i> wireless protocols to improve the performance of wireless networks. Experimental evaluations of these protocols have been carried out mostly using software-defined radios, which are typically two to three orders of magnitude slower than commodity hardware. FPGA-based platforms(More)
Information about the geographic locality of IP prefixes can be useful for understanding the issues related to IP address allocation, aggregation, and BGP routing table growth. In this paper, we use traceroute data and geographic mappings of IP addresses to study the geographic properties of IP prefixes and their implications on Internet routing. We find(More)
Network intrusion detection and prevention systems are vulnerable to evasion by attackers who craft ambiguous traffic to breach the defense of such systems. A normalizer is an inline network element that thwarts evasion attempts by removing ambiguities in network traffic. A particularly challenging step in normalization is the sound detection of(More)
— The Internet's current interdomain routing protocol, BGP (Border Gateway Protocol), has two modes of operation: eBGP (external BGP), used to exchange routing information between autonomous systems, and iBGP (internal BGP), used to propagate that information within an autonomous system (AS). In a " full mesh " iBGP configuration, every router has a BGP(More)
This dissertation is concerned with the problem of determining the track or trajectory of a mobile device — for example, a sequence of road segments on an outdoor map, or a sequence of rooms visited inside a building — in an energy-efficient and accurate manner. GPS, the dominant positioning technology today, has two major limitations. First, it consumes(More)
This poster describes the design of a distributed system to resolve flat semantic-free identifiers. Because Distributed Hash Tables (DHTs, [10, 13]) in theory allow users of the DHT to perform fast lookups on flat identifiers, researchers have—too eagerly, we argue—proposed using them as a sub-strate for various resolution tasks. For example, researchers(More)