A survey of information-centric networking research

G Xylomenos, CN Ververidis, VA Siris… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
The current Internet architecture was founded upon a host-centric communication model,
which was appropriate for coping with the needs of the early Internet users. Internet usage …

The many faces of publish/subscribe

PT Eugster, PA Felber, R Guerraoui… - ACM computing surveys …, 2003 - dl.acm.org
Well adapted to the loosely coupled nature of distributed interaction in large-scale
applications, the publish/subscribe communication paradigm has recently received …

Serverless computing: One step forward, two steps back

JM Hellerstein, J Faleiro, JE Gonzalez… - arXiv preprint arXiv …, 2018 - arxiv.org
Serverless computing offers the potential to program the cloud in an autoscaling, pay-as-you
go manner. In this paper we address critical gaps in first-generation serverless computing …

Software-defined network function virtualization: A survey

Y Li, M Chen - IEEE Access, 2015 - ieeexplore.ieee.org
Diverse proprietary network appliances increase both the capital and operational expense
of service providers, meanwhile causing problems of network ossification. Network function …

Networking named content

V Jacobson, DK Smetters, JD Thornton… - Proceedings of the 5th …, 2009 - dl.acm.org
Network use has evolved to be dominated by content distribution and retrieval, while
networking technology still speaks only of connections between hosts. Accessing content …

A scalable content-addressable network

S Ratnasamy, P Francis, M Handley, R Karp… - Proceedings of the …, 2001 - dl.acm.org
Hash tables-which map" keys" onto" values"-are an essential building block in modern
software systems. We believe a similar functionality would be equally valuable to large …

A survey of network virtualization

NMMK Chowdhury, R Boutaba - Computer Networks, 2010 - Elsevier
Due to the existence of multiple stakeholders with conflicting goals and policies, alterations
to the existing Internet architecture are now limited to simple incremental updates; …

Recon: Revealing and controlling pii leaks in mobile network traffic

J Ren, A Rao, M Lindorfer, A Legout… - Proceedings of the 14th …, 2016 - dl.acm.org
It is well known that apps running on mobile devices extensively track and leak users'
personally identifiable information (PII); however, these users have little visibility into PII …

Tapestry: A resilient global-scale overlay for service deployment

BY Zhao, L Huang, J Stribling, SC Rhea… - IEEE Journal on …, 2004 - ieeexplore.ieee.org
We present Tapestry, a peer-to-peer overlay routing infrastructure offering efficient, scalable,
location-independent routing of messages directly to nearby copies of an object or service …

The cloud is not enough: Saving {IoT} from the cloud

B Zhang, N Mor, J Kolb, DS Chan, K Lutz… - 7th USENIX Workshop …, 2015 - usenix.org
The Internet of Things (IoT) represents a new class of applications that can benefit from
cloud infrastructure. However, the current approach of directly connecting smart devices to …