A survey of information-centric networking research

G Xylomenos, CN Ververidis, VA Siris… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
The current Internet architecture was founded upon a host-centric communication model,
which was appropriate for coping with the needs of the early Internet users. Internet usage …

Big privacy: Challenges and opportunities of privacy study in the age of big data

S Yu - IEEE access, 2016 - ieeexplore.ieee.org
One of the biggest concerns of big data is privacy. However, the study on big data privacy is
still at a very early stage. We believe the forthcoming solutions and theories of big data …

A large-scale analysis of hundreds of in-memory key-value cache clusters at twitter

J Yang, Y Yue, KV Rashmi - ACM Transactions on Storage (TOS), 2021 - dl.acm.org
Modern web services use in-memory caching extensively to increase throughput and reduce
latency. There have been several workload analyses of production systems that have fueled …

An analysis of Facebook photo caching

Q Huang, K Birman, R Van Renesse, W Lloyd… - Proceedings of the …, 2013 - dl.acm.org
This paper examines the workload of Facebook's photo-serving stack and the effectiveness
of the many layers of caching it employs. Facebook's image-management infrastructure is …

[图书][B] Distributed systems

M Van Steen, AS Tanenbaum - 2017 - dgma.donetsk.ua
This is the third edition of “Distributed Systems.” In many ways, it is a huge difference
compared to the previous editions, the most important one perhaps being that we have fully …

Cloud mobile media: Reflections and outlook

Y Wen, X Zhu, JJPC Rodrigues… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
This paper surveys the emerging paradigm of cloud mobile media. We start with two
alternative perspectives for cloud mobile media networks: an end-to-end view and a layered …

[HTML][HTML] Survey on peer-assisted content delivery networks

N Anjum, D Karamshuk, M Shikh-Bahaei, N Sastry - Computer Networks, 2017 - Elsevier
Peer-assisted content delivery networks have recently emerged as an economically viable
alternative to traditional content delivery approaches: the feasibility studies conducted for …

Expect the unexpected: Sub-second optimization for segment routing

S Gay, R Hartert, S Vissicchio - IEEE INFOCOM 2017-IEEE …, 2017 - ieeexplore.ieee.org
In this paper, we study how to perform traffic engineering at an extremely-small time scale
with segment routing, addressing a critical need for modern wide area networks. Prior work …

Characterizing flash events and distributed denial‐of‐service attacks: an empirical investigation

A Bhandari, AL Sangal, K Kumar - Security and …, 2016 - Wiley Online Library
In the information age where Internet is the most important means of delivery of plethora of
services, distributed denial‐of‐service (DDoS) attacks have emerged as one of the most …

Characterizing DDoS attacks and flash events: Review, research gaps and future directions

S Behal, K Kumar, M Sachdeva - Computer Science Review, 2017 - Elsevier
Abstract A Distributed Denial of Service (DDoS) attack is an austere menace to network
security. Nowadays in a technological era, DDoS attacks pose a severe threat to widely …