Learn More
– End-to-end connections experience a high level of diversity in network characteristics. At one extreme, an application may receive highly degraded service, leaving the application unusable. At another extreme, the costs to guarantee some level of service may be undesirably high to the user or overall system. Open architecture networks help applications(More)
b b Computer networks are becoming more complex and diverse. Increasingly, an end-to-end connection will traverse several links with orders of magnitude differences in characteristics such as bandwidth, latency, error rate, jit-ter, and monetary cost. At the same time, most applications assume a level of network characteristics below which they either(More)
Server-class computers cannot consume power without bound, since increased energy consumption translates into increased heat dissipation, greater cooling requirements, reduced computational density, and higher operating costs. For a typical data center, storage alone accounts for 27% of the energy consumption, making storage an important target for energy(More)
The Smart Party is a new ubiquitous computing application for the home environment. This application gathers musical preferences for guests located in different rooms of a user's house. Based on their preferences and available media, the application chooses a music play list for each room, adjusting to changing membership as guests move through the party.(More)
Truffles is a system meant to address some of the major issues that still make it difficult to share files between users at different sites. In particular, it addresses the problems associated with secure file sharing, and the problems of high administrative overhead. Truffles will combine facilities of the Ficus file system and TIS/PEM, a privacy enhanced(More)
This paper proposes a future Internet architecture whose security foundations prevent todaypsilas major threats - IP spoofing, distributed denial-of-service attacks, distributed scanning and intrusions, and wide-spread worm infections.The core of the architecture are source signatures that are attached to each packet by its creator host. These lightweight,(More)