Now showing items 1-20 of 93

    • Automatic Configuration of CESM/CCSM4 on Amazon EC2 Cloud 

      Ansari, Sameer; Dunlap, Rocky (Georgia Institute of Technology, 2010-09-07)
      The goal is to develop a prototype configurator service that automatically creates Amazon EC2 machine instances running on the EC2 Cloud containing ready-to-run configurations of the Community Earth System Model (CESM). ...
    • Autonomous Traffic Engineering using Self-Configuring Link Weights 

      Sundaresan, Srikanth; Lumezanu, Cristian; Feamster, Nick; François, Pierre (Georgia Institute of Technology, 2010)
      Network operators use traffic engineering to control the flow of traffic across their networks. Existing TE methods establish static topologies offline, either by setting link weights or by configuring paths a priori. These ...
    • AxBench: A Benchmark Suite for Approximate Computing Across the System Stack 

      Yazdanbakhsh, Amir; Mahajan, Divya; Lotfi-Kamran, Pejman; Esmaeilzadeh, Hadi (Georgia Institute of Technology, 2016)
      As the end of Dennard scaling looms, both the semiconductor industry and the research community are exploring for innovative solutions that allow energy efficiency and performance to continue to scale. Approximation ...
    • Building a Better Mousetrap 

      Ramachandran, Anirudh; Seetharaman, Srinivasan; Feamster, Nick; Vazirani, Vijay (Georgia Institute of Technology, 2007)
      Routers in the network core are unable to maintain detailed statistics for every packet; thus, traffic statistics are often based on packet sampling, which reduces accuracy. Because tracking large ("heavy-hitter") traffic ...
    • Capacity Enhancement Using Throw-Boxes in Mobile Delay Tolerant Networks 

      Zhao, Wenrui; Chen, Yang; Ammar, Mostafa H. (Mostafa Hamed); Corner, Mark D.; Levine, Brian; Zegura, Ellen W. (Georgia Institute of Technology, 2006)
      Delay tolerant networks (DTNs) are a class of emerging networks that are subject to frequent and long-duration partitions. Due to intermittent connectivity, DTNs might be significantly limited in supporting application ...
    • The Case for Microcontracts for Internet Connectivity 

      Valancius, Vytautas; Lumezanu, Cristian; Johari, Ramesh; Vazirani, Vijay (Georgia Institute of Technology, 2010)
      This paper introduces microcontracts, which are contracts for "slices" of the Internet connectivity along dimensions such as time, destination, volume, and application type. Microcontracts are motivated by the observation ...
    • Characterizing and Mitigating Web Performance Bottlenecks in Broadband Access Networks 

      Sundaresan, Srikanth; Magharei, Nazanin; Feamster, Nick; Teixeira, Renata (Georgia Institute of Technology, 2013)
      We present the first large-scale analysis of Web performance bottlenecks as measured from broadband access networks, using data collected from two extensive home router deployments. We design and implement tools and ...
    • Contech: A Tool for Analyzing Parallel Programs 

      Railing, Brian P.; Hein, Eric R.; Vassenko, Phillip; Conte, Thomas M. (Georgia Institute of Technology, 2013)
      The behavior and structure of a shared-memory parallel program can be characterized by a task graph that encodes the instructions, memory accesses, and dependencies of each piece of parallel work. Task graphs are not ...
    • A Crow or a Blackbird?: Using True Social Network and Tweeting Behavior to Detect Malicious Entities in Twitter 

      Balasubramaniyan, Vijay A.; Maheswaran, Arjun; Mahalingam, Viswanathan; Ahamad, Mustaque; Venkateswaran, H. (Georgia Institute of Technology, 2010)
      The growing popularity of Twitter and its ability to enable near instantaneous sharing of information has made it a target of attacks by malicious entities who use it to spam and provide links to malware. There is evidence ...
    • Deep Segments: Comparisons between Scenes and their Constituent Fragments using Deep Learning 

      Doshi, Jigar; Mason, Celeste; Wagner, Alan; Kira, Zsolt (Georgia Institute of Technology, 2014-09)
      We examine the problem of visual scene understanding and abstraction from first person video. This is an important problem and successful approaches would enable complex scene characterization tasks that go beyond ...
    • Derandomization of Probabilistic Auxiliary Pushdown Automata Classes 

      Venkateswaran, H. (Georgia Institute of Technology, 2009)
    • Design and Analysis of Schedules for Virtual Network Migration 

      Lo, Samantha; Ammar, Mostafa; Zegura, Ellen (Georgia Institute of Technology, 2012)
      The Internet faces well-known challenges in realizing modifications to the core architecture. To help overcome these limitations, virtual networks run over physical networks and use Internet paths and protocols as ...
    • Designing Enforceable Network Contracts 

      Lychev, Robert; Feamster, Nick (Georgia Institute of Technology, 2009)
      Internet connectivity depends on contractual agreements between cooperating entities, such as administrative domains (AD), where an agreement over a certain level of service is made. Contracts (e.g., SLAs) for providing ...
    • A Distributed Framework for Spatio-temporal Analysis on Large-scale Camera Networks 

      Hong, Kirak; Voelz, Marco; Govindaraju, Venu; Jayaraman, Bharat; Ramachandran, Umakishore (Georgia Institute of Technology, 2012)
      Cameras are becoming ubiquitous. Technological advances and the low cost of such sensors enable deployment of large-scale camera networks in metropolises such as London and New York. Applications including video-based ...
    • Distributed Implementation of Coordinated, Network-Wide Policies and Protocols with FlowFlex 

      Mundada, Yogesh; Sherwood, Rob; Feamster, Nick (Georgia Institute of Technology, 2010)
      The increasing programmability of network devices gives protocol designers and network operators considerably more flexibility in defining custom protocols and traffic processing functions. Today, network operators and ...
    • A Distributed Protocol for Fractional Stable Paths Problem 

      Kintali, Shiva (Georgia Institute of Technology, 2008)
      The Border Gateway Protocol (BGP) is currently the only interdomain routing protocol deployed in the Internet. BGP can be viewed as a distributed algorithm for solving the Stable Paths Problem (SPP) [4]. Not every instance ...
    • A Distributed System for Supporting Spatio-temporal Analysis on Large-scale Camera Networks 

      Hong, Kirak; Voelz, Marco; Govindaraju, Venu; Jayaraman, Bharat; Ramachandran, Umakishore (Georgia Institute of Technology, 2012)
      Cameras are becoming ubiquitous. Technological advances and the low cost of such sensors enable deployment of large-scale camera networks in metropolises such as London and New York. Applications such as video-base ...
    • Efficient Oblivious Computation Techniques for Privacy-Preserving Mobile Applications 

      Carter, Henry; Amrutkar, Chaitrali; Dacosta, Italo; Traynor, Patrick (Georgia Institute of Technology, 2011)
      The growth of smartphone capability has led to an explosion of new applications. Many of the most useful apps use context-sensitive data, such as GPS location or social network information. In these cases, users may not ...
    • An Empirical Evaluation of Security Indicators in Mobile Web Browsers 

      Amrutkar, Chaitrali; Traynor, Patrick; van Oorschot, Paul C. (Georgia Institute of Technology, 2011)
      Mobile browsers are increasingly being relied upon to perform security sensitive operations. Like their desktop counterparts, these applications can enable SSL/TLS to provide strong security guarantees for communications ...
    • Evaluating Bluetooth as a Medium for Botnet Command and Control 

      Jain, Nehil; Lee, Wenke; Sangal, Samrit; Singh, Kapil; Traynor, Patrick (Georgia Institute of Technology, 2009)
      Malware targeting mobile phones is being studied with increasing interest by the research community. While such attention has previously focused on viruses and worms, many of which use near-field communications in order ...