skip to main content
Reflects downloads up to 17 Oct 2024Bibliometrics
research-article
Memento: Making Sliding Windows Efficient for Heavy Hitters

Cloud operators require timely identification of Heavy Hitters (HH) and Hierarchical Heavy Hitters (HHH) for applications such as load balancing, traffic engineering, and attack mitigation. However, existing techniques are slow in detecting new heavy ...

research-article
Minimum Overhead Beamforming and Resource Allocation in D2D Edge Networks

Device-to-device (D2D) communications is expected to be a critical enabler of distributed computing in edge networks at scale. A key challenge in providing this capability is the requirement for judicious management of the heterogeneous communication and ...

research-article
On the Efficiency of Multi-Beam Medium Access for Millimeter-Wave Networks

The need of highly directional communications at mmWave band introduces high overhead for beam training and alignment, which also makes the medium access control (MAC) a grand challenge. However, the need of supporting highly directional multiple beams ...

research-article
Sensor-Assisted Rate Adaptation for UAV MU-MIMO Networks

Propelled by multi-user MIMO (MU-MIMO) technology, unmanned aerial vehicles (UAVs) as mobile hotspots have recently emerged as an attractive wireless communication paradigm. Rate adaptation (RA) becomes indispensable to enhance UAV communication ...

research-article
A Case for Sampling-Based Learning Techniques in Coflow Scheduling

Coflow scheduling improves data-intensive application performance by improving their networking performance. State-of-the-art online coflow schedulers in essence approximate the classic Shortest-Job-First (SJF) scheduling by learning the coflow <italic>...

research-article
Speed Scaling on Parallel Servers With MapReduce Type Precedence Constraints

A multiple server setting is considered, where each server has tunable speed, and increasing the speed incurs an energy cost. Jobs arrive to a single queue, and each job has two types of sub-tasks, map and reduce, and a <bold>precedence</bold> constraint ...

research-article
Task Offloading for Post-Disaster Rescue in Unmanned Aerial Vehicles Networks

Natural disasters often cause huge and unpredictable losses to human lives and properties. In such an emergency post-disaster rescue situation, unmanned aerial vehicles (UAVs) are effective tools to enter the damaged areas to perform immediate disaster ...

research-article
Open Access
A Converse Result on Convergence Time for Opportunistic Wireless Scheduling

This paper proves an impossibility result for stochastic network utility maximization for multi-user wireless systems, including multiple access and broadcast systems. Every time slot an access point observes the current channel states for each user and ...

research-article
Characterizing the Availability and Latency in AWS Network From the Perspective of Tenants

Scalability and performance requirements are driving tenants to increasingly move their applications to public clouds. Unfortunately, cloud providers do not provide a view of their networking infrastructure to the tenants, rather only provide some generic ...

research-article
Multi-Stage Hybrid Federated Learning Over Large-Scale D2D-Enabled Fog Networks

Federated learning has generated significant interest, with nearly all works focused on a &#x201C;star&#x201D; topology where nodes/devices are each connected to a central server. We migrate away from this architecture and extend it through the <italic>...

research-article
SNAG: SDN-Managed Network Architecture for GridFTP Transfers Using Application-Awareness

Increasingly, academic campus networks support large-scale data transfer workflows for data-intensive science. These data transfers rely on high-performance, scalable, and reliable protocols for moving large amounts of data over a high-bandwidth, high-...

research-article
Co-Scheduler: A Coflow-Aware Data-Parallel Job Scheduler in Hybrid Electrical/Optical Datacenter Networks

To support higher demand for datacenter networks, networking researchers have proposed hybrid electrical/optical datacenter networks (Hybrid-DCN) that leverages optical circuit switching (OCS) along with traditional electrical packet switching (EPS). ...

research-article
SDN-Based Resource Allocation in Edge and Cloud Computing Systems: An Evolutionary Stackelberg Differential Game Approach

Recently, the boosting growth of computation-heavy applications raises great challenges for the Fifth Generation (5G) and future wireless networks. As responding, the hybrid edge and cloud computing (ECC) system has been expected as a promising solution ...

research-article
DET: Enabling Efficient Probing of IPv6 Active Addresses

Fast IPv4 scanning significantly improves network measurement and security research. Nevertheless, it is infeasible to perform brute-force scanning of the IPv6 address space. Alternatively, one can find active IPv6 addresses through scanning the candidate ...

research-article
A Study on the Impact of Memory DoS Attacks on Cloud Applications and Exploring Real-Time Detection Schemes

Even though memory denial-of-service attacks can cause severe performance degradations on <italic>co-located</italic> virtual machines, a previous detection scheme against such attacks cannot accurately detect the attacks and also generates high detection ...

research-article
Beware of IPs in Sheep&#x2019;s Clothing: Measurement and Disclosure of IP Spoofing Vulnerabilities

Networks not employing destination-side source address validation (DSAV) expose themselves to a class of pernicious attacks which could be prevented by filtering inbound traffic purporting to originate from within the network. In this work, we survey the ...

research-article
Fast and Accurate Cardinality Estimation by Self-Morphing Bitmaps

Estimating the cardinality of a data stream is a fundamental problem underlying numerous applications such as traffic monitoring in a network or a datacenter and query optimization of Internet-scale P2P data networks. Existing solutions suffer from high ...

research-article
Transmission Failure Analysis of Multi-Protection Routing in Data Center Networks With Heterogeneous Edge-Core Servers

The recently proposed RCube network is a cube-based server-centric data center network (DCN), including two types of heterogeneous servers, called core servers and edge servers. Remarkably, it takes the latter as backup servers to deal with server ...

research-article
PeerProbe: Estimating Vehicular Neighbor Distribution With Adaptive Compressive Sensing

Acquiring the geographical distribution of neighbors can support more adaptive media access control (MAC) protocols and other safety applications in Vehicular ad hoc network (VANETs). However, it is very challenging for each vehicle to estimate its own ...

research-article
Voyager: Revisiting Available Bandwidth Estimation With a New Class of Methods&#x2014;Decreasing- Chirp-Train Methods

The available bandwidth (ABW) of a network path is a crucial metric for various applications, such as traffic engineering, congestion control, multimedia streaming, and path selection in software-defined wide-area networks (SDWAN). In recent years, a new ...

research-article
Wireless Training-Free Keystroke Inference Attack and Defense

Existing research work has identified a new class of attacks that can eavesdrop on the keystrokes in a non-invasive way without infecting the target computer to install malware. The common idea is that pressing a key of a keyboard can cause a unique and ...

research-article
Distributed and Local Scheduling Algorithms for mmWave Integrated Access and Backhaul

We consider the stability region of a mmWave integrated access and backhaul (IAB) network with stochastic arrivals and time-varying link rates. In the scheduling of links, we consider a limit on the number of RF chains, and the half-duplex constraint ...

research-article
Defending Trace-Back Attack in 3D Wireless Internet of Things

With the development of 5G, it is unsurprising that most of the smart devices in the Internet of Things (IoT) will be wirelessly connected with each other in the near future. This kind of lightweight, scalable and green network architecture will be well-...

research-article
Analysis of Dampers in Time-Sensitive Networks With Non-Ideal Clocks

Dampers are devices that reduce delay jitter in the context of time-sensitive networks, by delaying packets for the amount written in packet headers. Jitter reduction is required by some real-time applications; beyond this, dampers have the potential to ...

research-article
Open Access
Blackout Resilient Optical Core Network

A disaster may not necessarily demolish the telecommunications infrastructure, but instead it might affect the national grid and cause blackouts, consequently disrupting the network operation unless there is an alternative power source(s). In disaster-...

research-article
PolarTracker: Attitude-Aware Channel Access for Floating Low Power Wide Area Networks

Low Power Wide Area Networks (LPWAN) such as Long Range (LoRa) show great potential in emerging aquatic IoT applications. However, our deployment experience shows that the floating LPWAN suffers significant performance degradation, compared to the static ...

research-article
Multi-Stakeholder Service Placement via Iterative Bargaining With Incomplete Information

Mobile edge computing based on cloudlets is an emerging paradigm to improve service quality by bringing computation and storage facilities closer to end users and reducing operating cost for infrastructure providers (IPs) and service providers (SPs). To ...

research-article
Demand-Aware Network Design With Minimal Congestion and Route Lengths

Emerging communication technologies allow to reconfigure the physical network topology at runtime, enabling <italic>demand-aware networks (DANs)</italic>: networks whose topology is optimized toward the workload they serve. However, today, only little is ...

research-article
SCD2: Secure Content Delivery and Deduplication With Multiple Content Providers in Information Centric Networking

As one of the promising next generation network architectures, information centric networking (ICN) is highly anticipated to improve the bandwidth usage of the Internet and reduce duplicate traffic. Since contents in ICN are disseminated in the whole ...

research-article
Open Access
Joint Wireless and Edge Computing Resource Management With Dynamic Network Slice Selection

Network slicing is a promising approach for enabling low latency computation offloading in edge computing systems. In this paper, we consider an edge computing system under network slicing in which the wireless devices generate latency sensitive ...

Subjects

Comments