Search
Now showing items 1-10 of 24
Half-Baked Cookies: Client Authentication on the Modern Web
(Georgia Institute of Technology, 2014)
Modern websites set multiple authentication cookies during
the login process to allow users to remain authenticated over
the duration of a web session. Web applications use cookie-based authentication to provide different ...
Network-Wide Prediction of BGP Routes
(Georgia Institute of Technology, 2006)
This paper presents provably correct algorithms for
computing the outcome of the BGP route-selection process for
each router in a network, without simulating the complex details
of BGP message passing. The algorithms ...
Characterizing and Mitigating Web Performance Bottlenecks in Broadband Access Networks
(Georgia Institute of Technology, 2013)
We present the first large-scale analysis of Web performance
bottlenecks as measured from broadband access networks,
using data collected from two extensive home router deployments.
We design and implement tools and ...
Lithium: Event-Driven Network Control
(Georgia Institute of Technology, 2012)
This paper introduces event-driven network control, a network
control framework that makes networks easier to manage
by automating many tasks that must currently be performed
by manually modifying low-level, distributed, ...
WTF? Locating Performance Problems in Home Networks
(Georgia Institute of Technology, 2013)
Most users of home networks have experienced the intense
frustration that comes with diagnosing poor performance.
Even determining something as simple as whether a performance
problem lies with the ISP or somewhere in ...
Towards an Internet Connectivity Market
(Georgia Institute of Technology, 2009)
Today’s Internet achieves end-to-end connectivity through
bilateral contracts between neighboring networks; unfortunately,
this “one size fits all” connectivity results in less efficient
paths, unsold capacity and unmet ...
Autonomous Traffic Engineering using Self-Configuring Link Weights
(Georgia Institute of Technology, 2010)
Network operators use traffic engineering to control the flow of traffic across their networks. Existing TE methods establish static topologies offline, either by setting link weights or by configuring paths a priori. These ...
Spam or Ham? Characterizing and Detecting Fraudulent "Not Spam" Reports in Web Mail Systems
(Georgia Institute of Technology, 2011)
Web mail providers rely on users to “vote” to quickly and
collaboratively identify spam messages. Unfortunately,
spammers have begun to use large collections of compromised
accounts not only to send spam, but also to ...
Which Factors Affect Access Network Performance?
(Georgia Institute of Technology, 2010)
This paper presents an analysis of the performance of residential
access networks using over four months of round-trip, download,
and upload measurements from more than 7,000 users across four
ADSL and cable providers ...
Distributed Implementation of Coordinated, Network-Wide Policies and Protocols with FlowFlex
(Georgia Institute of Technology, 2010)
The increasing programmability of network devices gives protocol designers and network operators considerably
more flexibility in defining custom protocols and traffic
processing functions. Today, network operators and ...