Now showing items 1-20 of 53

    • Algorithmic Aspects of the Internet 

      Saberi, Amin (Georgia Institute of Technology, 2004-07-12)
      The goal of this thesis is to use and advance the techniques developed in the field of exact and approximation algorithms for many of the problems arising in the context of the Internet. We will formalize the method of ...
    • Algorithms, protocols and services for scalable multimedia streaming 

      Chae, Youngsu (Georgia Institute of Technology, 2002)
    • Analysis of Passive End-to-End Network Performance Measurements 

      Simpson, Charles Robert, Jr. (Georgia Institute of Technology, 2007-01-02)
      NETI@home, a distributed network measurement infrastructure to collect passive end-to-end network measurements from Internet end-hosts was developed and discussed. The data collected by this infrastructure, as well as ...
    • The Arab world on-line : Arab-American communities using the Internet 

      Najarian, Aida (Georgia Institute of Technology, 1997-05)
    • A BGP Attack Against Traffic Engineering 

      Kim, Jintae; Ko, Steven Y.; Nicol, David M.; Dimitropoulos, Christos Xenofontas A.; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2004-12)
      As the Internet grows, traffic engineering has become a widely-used technique to control the flow of packets. For the inter-domain routing, traffic engineering relies on configurations of the border gateway protocol (BGP). ...
    • Control Techniques and Programming Issues for Time Delayed Internet Based Teleoperation 

      Munir, Saghir; Book, Wayne John (Georgia Institute of TechnologyAmerican Society of Mechanical Engineers, 2003-06)
      This article focuses on Internet-based real time control, such as remote bilateral teleoperation. In such applications it is required that the control loop be closed around a time delayed network. Although various researchers ...
    • Creating Realistic BGP Models 

      Dimitropoulos, Christos Xenofontas A.; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2003-10)
      Modeling the Internet infrastructure is a challenging endeavor. Complex interactions between protocols, increasing traffic volumes and the irregular structure of the Internet lead to demanding requirements for the simulation ...
    • Design and Analysis of Schedules for Virtual Network Migration 

      Lo, Samantha; Ammar, Mostafa; Zegura, Ellen (Georgia Institute of Technology, 2012)
      The Internet faces well-known challenges in realizing modifications to the core architecture. To help overcome these limitations, virtual networks run over physical networks and use Internet paths and protocols as ...
    • Design and development of BOOK : a book of on-line knowledge 

      Shephard, Jodi Marie (Georgia Institute of Technology, 1998)
    • The design and implementation of a robust, cost-conscious peer-to-peer lookup service 

      Harvesf, Cyrus Mehrabaun (Georgia Institute of Technology, 2008-11-17)
      Peer-to-peer (p2p) technology provides an excellent platform for the delivery of rich content and media that scales with the rapid growth of the Internet. This work presents a lookup service design and implementation that ...
    • Design of a Control Strategy for Teleoperation of a Platform with Significant Dynamics 

      Bratt, Mattias; Smith, Christian; Christensen, Henrik I. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, 2006-10)
      A teleoperation system for controlling a robot with fast dynamics over the Internet has been constructed. It employs a predictive control structure with an accurate dynamic model of the robot to overcome problems caused ...
    • Effective and scalable botnet detection in network traffic 

      Zhang, Junjie (Georgia Institute of Technology, 2012-07-03)
      Botnets represent one of the most serious threats against Internet security since they serve as platforms that are responsible for the vast majority of large-scale and coordinated cyber attacks, such as distributed denial ...
    • Efficient Routing Using NIx-Vectors 

      Riley, George F.; Ammar, Mostafa H. (Mostafa Hamed); Zegura, Ellen W. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2001)
      We introduce the concept of Neighbor-Index Vector (NIx-Vector) routing which gives efficient and consistent routing of packets in Internet routers. A NIx-Vector is a compact representation of a routing path, which is small ...
    • End-to-end inference of internet performance problems 

      Kanuparthy, Partha V. (Georgia Institute of Technology, 2012-11-15)
      Inference, measurement and estimation of network path properties is a fundamental problem in distributed systems and networking. We consider a specific subclass of problems which do not require special support from the ...
    • Evaluation of Worm Containment Algorithms and their Effect on Legitimate Traffic 

      Abdelhafez, Mohamed; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2005-03)
      Internet worm attacks have become increasingly more frequent and have had a major impact on the economy, making the detection and prevention of these attacks a top security concern. Several counter–measures have been ...
    • Exposing Cross-Channel Abuse in Converged Communications Infrastructure with Text-Messaging Scams 

      Srinivasan, Bharat (Georgia Institute of Technology, 2017-03-31)
      Recent convergence of the Internet with the telecommunications infrastructure offers malicious actors the ability to craft cross-channel attacks that leverage both telephony and Internet resources. In this talk, we first ...
    • Factory in the Cloud 

      Free, Mitch (Georgia Institute of Technology, 2013-10-31)
      We are in the midst of a new industrial revolution facilitated by a convergence of various digital technologies, globalization and ever shrinking product life spans. We will talk about shift that is happening and how ...
    • Finding the Red Balloon 

      Ludovice, Peter J.; Hunt, William D.; Trewhitt, Ethan; Briscoe, Erica (Georgia Institute of Technology, 2011-02-23)
      Erica Briscoe and the Ethan Trewhitt of the Georgia Tech Research Institute discuss their recent second place finish in the DARPA Network Challenge to use social media and the network to find 10 red balloons across the ...
    • Fishing for Phishing from the Network Stream 

      Ramachandran, Anirudh; Feamster, Nick; Krishnamurthy, Balachander; Spatscheck, Oliver; Van der Merwe, Jacobus (Georgia Institute of Technology, 2008)
      Phishing is an increasingly prevalent social-engineering attack that attempts identity theft using spoofed Web pages of legitimate organizations. Unfortunately, current phishing detection methods are neither complete ...
    • Flow Based Observations from NETI@home and Honeynet Data 

      Grizzard, Julian B.; Simpson, Charles Robert, Jr.; Krasser, Sven; Owen, Henry L., III; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2005-06)
      We conduct a flow based comparison of honeynet traffic, representing malicious traffic, and NETI@home traffic, representing typical end user traffic. We present a cumulative distribution function of the number of packets ...