How powerful are graph neural networks?

K Xu, W Hu, J Leskovec, S Jegelka - arXiv preprint arXiv:1810.00826, 2018 - arxiv.org
Graph Neural Networks (GNNs) are an effective framework for representation learning of
graphs. GNNs follow a neighborhood aggregation scheme, where the representation vector …

Breaking the limit of graph neural networks by improving the assortativity of graphs with local mixing patterns

S Suresh, V Budde, J Neville, P Li, J Ma - Proceedings of the 27th ACM …, 2021 - dl.acm.org
Graph neural networks (GNNs) have achieved tremendous success on multiple graph-
based learning tasks by fusing network structure and node features. Modern GNN models …

Engineering egress with edge fabric: Steering oceans of content to the world

B Schlinker, H Kim, T Cui, E Katz-Bassett… - Proceedings of the …, 2017 - dl.acm.org
Large content providers build points of presence around the world, each connected to tens
or hundreds of networks. Ideally, this connectivity lets providers better serve users, but …

Five years at the edge: Watching internet from the isp network

M Trevisan, D Giordano, I Drago, M Mellia… - Proceedings of the 14th …, 2018 - dl.acm.org
The Internet and the way people use it are constantly changing. Knowing traffic is crucial for
operating the network, understanding users' need, and ultimately improving applications …

Network hygiene, incentives, and regulation: deployment of source address validation in the internet

M Luckie, R Beverly, R Koga, K Keys, JA Kroll… - Proceedings of the …, 2019 - dl.acm.org
The Spoofer project has collected data on the deployment and characteristics of IP source
address validation on the Internet since 2005. Data from the project comes from participants …

A data-driven method for future Internet route decision modeling

Z Tian, S Su, W Shi, X Du, M Guizani, X Yu - Future Generation Computer …, 2019 - Elsevier
Simulating the BGP routing system of Internet is crucial to the analysis of Internet backbone
network routing behavior, locating network failure and, evaluating network performance for …

Cloud provider connectivity in the flat internet

T Arnold, J He, W Jiang, M Calder, I Cunha… - Proceedings of the …, 2020 - dl.acm.org
The Tier-1 ISPs have been considered the Internet's backbone since the dawn of the
modern Internet 30 years ago, as they guarantee global reachability. However, their …

Mapping the expansion of Google's serving infrastructure

M Calder, X Fan, Z Hu, E Katz-Bassett… - Proceedings of the …, 2013 - dl.acm.org
Modern content-distribution networks both provide bulk content and act as" serving
infrastructure" for web services in order to reduce user-perceived latency. Serving …

ARTEMIS: Neutralizing BGP hijacking within a minute

P Sermpezis, V Kotronis, P Gigis… - … ACM transactions on …, 2018 - ieeexplore.ieee.org
Border gateway protocol (BGP) prefix hijacking is a critical threat to Internet organizations
and users. Despite the availability of several defense approaches (ranging from RPKI to …

Inferring complex AS relationships

V Giotsas, M Luckie, B Huffaker, KC Claffy - Proceedings of the 2014 …, 2014 - dl.acm.org
The traditional approach of modeling relationships between ASes abstracts relationship
types into three broad categories: transit, peering, and sibling. More complicated …