Security and privacy in cloud computing

Z Xiao, Y Xiao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

Resilient overlay networks

D Andersen, H Balakrishnan, F Kaashoek… - Proceedings of the …, 2001 - dl.acm.org
A Resilient Overlay Network (RON) is an architecture that allows distributed Internet
applications to detect and recover from path outages and periods of degraded performance …

Survey of bandwidth estimation techniques in communication networks

SS Chaudhari, RC Biradar - wireless personal communications, 2015 - Springer
Increased popularity and wealth-creation potential of conventional mobile phones, smart
phones and tablet computers resulted in the unprecedented penetration of wired and …

Throughput-optimal topology design for cross-silo federated learning

O Marfoq, C Xu, G Neglia… - Advances in Neural …, 2020 - proceedings.neurips.cc
Federated learning usually employs a client-server architecture where an orchestrator
iteratively aggregates model updates from remote clients and pushes them back a refined …

Bandwidth estimation: metrics, measurement techniques, and tools

R Prasad, C Dovrolis, M Murray, K Claffy - IEEE network, 2003 - ieeexplore.ieee.org
In a packet network, the terms bandwidth and throughput often characterize the amount of
data that the network can transfer per unit of time. Bandwidth estimation is of interest to users …

Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants

A Kuzmanovic, EW Knightly - Proceedings of the 2003 conference on …, 2003 - dl.acm.org
Denial of Service attacks are presenting an increasing threat to the global inter-networking
infrastructure. While TCP's congestion control algorithm is highly robust to diverse network …

Evaluation and characterization of available bandwidth probing techniques

N Hu, P Steenkiste - IEEE journal on Selected Areas in …, 2003 - ieeexplore.ieee.org
The packet pair mechanism has been shown to be a reliable method to measure the
bottleneck link capacity on a network path, but its use for measuring available bandwidth is …

The network weather service: A distributed resource performance forecasting service for metacomputing

R Wolski, NT Spring, J Hayes - Future Generation Computer Systems, 1999 - Elsevier
The goal of the Network Weather Service is to provide accurate forecasts of dynamically
changing performance characteristics from a distributed set of metacomputing resources …

MATE: MPLS adaptive traffic engineering

A Elwalid, C Jin, S Low, I Widjaja - … IEEE INFOCOM 2001 …, 2001 - ieeexplore.ieee.org
Destination-based forwarding in traditional IP routers has not been able to take full
advantage of multiple paths that frequently exist in Internet service provider networks. As a …

End-to-end available bandwidth: measurement methodology, dynamics, and relation with TCP throughput

M Jain, C Dovrolis - IEEE/ACM Transactions on networking, 2003 - ieeexplore.ieee.org
The available bandwidth (avail-bw) in a network path is of major importance in congestion
control, streaming applications, quality-of-service verification, server selection, and overlay …