- Full text PDF available (6)
Mobility can be exploited to spread malware among wireless nodes. In this paper, we present an analytical model for estimating the evolution of infections spanning multiple network domains that host mobile nodes. We validate the accuracy of the proposed model by comparing its predictions to simulations driven by realistic mobility patterns. Our results show… (More)
Issues with the monolithic network subsystems Single point of failure. Difficult to achieve per-client resource accountability. Robustness-critical code is large. Difficult to maintain and debug the code. Simultaneous existence of multiple protocols not easy. Limit the ability to perform application specific optimizations.
We present the initial results from our evaluation study on the performance implications of anycast in DNS, using four anycast servers deployed at top-level DNS zones. Our results show that 15% to 55% of the queries sent to an anycast group, are answered by the topologically closest server and at least 10% of the queries experience an additional delay in… (More)
Router queues buffer packets during congestion epochs. A recent result by Appenzeller et al. showed that the size of FIFO queues can be reduced considerably without sacrificing utilization. While Appenzeller showed that link utilization is not affected, the impact of this reduction on other aspects of queue management such as fairness, is unclear. Recently,… (More)
Mobility can be exploited to spread malware among wireless nodes moving across network domains. Because such mobile worms spread across domains by exploiting the physical movement of mobile nodes, they cannot be contained by existing defenses. In this paper we address this new challenge using techniques for detecting the existence of stealthy mobile worms… (More)
Increasing size of surface models has lead to a great deal of research in progressive multi-resolution representation of these models. Network streaming visualization of large models is particularly interesting. Quite a few existing techniques use a point based rendering system. This approach accelerates rendering but suffers from a degradation in the image… (More)