Software-defined network (SDNs) have fundamentally changed network infrastructure by decoupling the data plane and the control plane. This architectural shift rejuvenates the …
We describe the results of a randomized controlled trial of video-streaming algorithms for bitrate selection and network prediction. Over the last year, we have streamed 38.6 years of …
FY Yan, J Ma, GD Hill, D Raghavan… - 2018 USENIX Annual …, 2018 - usenix.org
Internet transport algorithms are foundational to the performance of network applications. But a number of practical challenges make it difficult to evaluate new ideas and algorithms in …
H Fanaee-T, J Gama - Progress in Artificial Intelligence, 2014 - Springer
Event labeling is the process of marking events in unlabeled data. Traditionally, this is done by involving one or more human experts through an expensive and time-consuming task. In …
R Sommer, V Paxson - 2010 IEEE symposium on security and …, 2010 - ieeexplore.ieee.org
In network intrusion detection research, one popular strategy for finding attacks is monitoring a network's activity for anomalies: deviations from profiles of normality previously learned …
Three experimental environments traditionally support network and distributed systems research: network emulators, network simulators, and live networks. The continued use of …
Network models are an essential block of modern networks. For example, they are widely used in network planning and optimization. However, as networks increase in scale and …
Evaluating anomaly detectors is a crucial task in traffic monitoring made particularly difficult due to the lack of ground truth. The goal of the present article is to assist researchers in the …
All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP's congestion control algorithm. In …