Optimizing the Update Packet Stream for Web Applications

@inproceedings{Muthuprasanna2010OptimizingTU,
  title={Optimizing the Update Packet Stream for Web Applications},
  author={Muthusrinivasan Muthuprasanna and G. Manimaran},
  booktitle={BROADNETS},
  year={2010}
}
The Internet has evolved to an extent where users now expect any-where any-time and any-form access to their personalized data and applications of choice. However providing a coherent (seamless) user experience across multiple devices has been relatively hard to achieve. While the how to sync problem has been well studied in literature, the complementary when to sync problem has remained relatively unexplored. While frequent updates providing higher user satisfaction/ retention are naturally… 
1 Citations
A composable approach to design of newer techniques for large-scale denial-of-service attack attribution
TLDR
The proposed model has given a single framework that can not only address the individual shortcomings of the various known attack attribution techniques, but also provide a more wholesome counter-measure against DDoS attacks.

References

SHOWING 1-10 OF 26 REFERENCES
A Comparison of Push and Pull Techniques for AJAX
TLDR
The fundamental limits of browser-based applications are explored and push solutions for AJAX technology are analyzed and the results of an empirical study comparing push and pull are shown.
An Adaptive Push/Pull Algorithm for AJAX Applications
TLDR
This paper presents an adaptive algorithm that combines both solutions in order to increase scalability, network performance and userperceived latency.
Summary cache: a scalable wide-area web cache sharing protocol
TLDR
This paper demonstrates the benefits of cache sharing, measures the overhead of the existing protocols, and proposes a new protocol called "summary cache", which reduces the number of intercache protocol messages, reduces the bandwidth consumption, and eliminates 30% to 95% of the protocol CPU overhead, all while maintaining almost the same cache hit ratios as ICP.
Efficient PDA Synchronization
TLDR
This work proposes, analyze, and implements a novel PDA synchronization scheme (CPIsync), which shows that the computational complexity and energy consumption of CPIsync is practical and that the-overall latency is typically much smaller than that of slow sync or alternative synchronization approaches based on Bloom (1970) filters.
Disconnected Operation in the Coda File System
TLDR
This paper shows that disconmxted operation is feasible, efficient and usable by describing its design and implementation in the Coda File System and shows that caching of data, now widely used for performance, can also be exploited to improve availability.
Bigtable: A Distributed Storage System for Structured Data
TLDR
The simple data model provided by Bigtable is described, which gives clients dynamic control over data layout and format, and the design and implementation of Bigtable are described.
Interpreting the data: Parallel analysis with Sawzall
TLDR
The design -- including the separation into two phases, the form of the programming language, and the properties of the aggregators -- exploits the parallelism inherent in having data and computation distributed across many machines.
Algorithms for scalable synchronization on shared-memory multiprocessors
TLDR
The principal conclusion is that contention due to synchronization need not be a problemin large-scale shared-memory multiprocessors, and the existence of scalable algorithms greatly weakens the case for costly special-purpose hardware support for synchronization, and provides protection against so-called “dance hall” architectures.
Set reconciliation with nearly optimal communication complexity
TLDR
The problem of efficiently reconciling two similar sets held by different hosts while minimizing the communication complexity is considered, and an approach based on the encoding of sets as polynomials is described, exhibiting tractable computational complexity and nearly optimal communication complexity.
Pervasive Computing
TLDR
This work will reflect on some of the emerging pervasive and ubiquitous computing trends and potentials, and in particular on the software engineering issues associated with the provision of context aware systems.
...
1
2
3
...